Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,555
Downloads
5,320
Views
Citations
An Improved Moving Object Detection Algorithm Based on Gaussian Mixture Models
(Articles)
Xuegang Hu
,
Jiamin Zheng
Open Journal of Applied Sciences
Vol.6 No.7
,July 27, 2016
DOI:
10.4236/ojapps.2016.67045
2,450
Downloads
4,325
Views
Citations
Optimization of DNA Staining Technology for Development of Autonomous Microbe Sensor for Injection Seawater Systems
(Articles)
Mohammed A. Al-Moniee
,
Xiangyang Zhu
,
Lone Tang
,
Susanne Juhler
,
Fuad I. Nuwaiser
,
Peter F. Sanders
,
Fahad N. Al-Abeedi
Journal of Sensor Technology
Vol.6 No.3
,August 11, 2016
DOI:
10.4236/jst.2016.63003
2,360
Downloads
3,377
Views
Citations
Code Clone Detection Method Based on the Combination of Tree-Based and Token-Based Methods
(Articles)
Ryota Ami
,
Hirohide Haga
Journal of Software Engineering and Applications
Vol.10 No.13
,December 28, 2017
DOI:
10.4236/jsea.2017.1013051
1,392
Downloads
3,224
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,720
Downloads
3,925
Views
Citations
A Review of Researches on Deep Learning in Remote Sensing Application
(Articles)
Ming Zhu
,
Yongning He
,
Qingyu He
International Journal of Geosciences
Vol.10 No.1
,January 10, 2019
DOI:
10.4236/ijg.2019.101001
2,656
Downloads
7,417
Views
Citations
In-Vehicle Stereo Vision Systems with Improved Ant Colony Optimization Based Lane Detection: A Solution to Accidents Involving Large Goods Vehicles Due to Blind Spots
(Articles)
Ibrahim Adamu Umar
,
Shengbo Hu
,
Hongqiu Luo
Open Journal of Applied Sciences
Vol.12 No.3
,March 22, 2022
DOI:
10.4236/ojapps.2022.123025
217
Downloads
1,046
Views
Citations
Fast Object Extraction and Euler Number on Block Represented Images
(Articles)
Iraklis M. Spiliotis
,
Alexandros S. Peppas
,
Nikolaos D. Karampasis
,
Yiannis S. Boutalis
Journal of Data Analysis and Information Processing
Vol.10 No.2
,March 31, 2022
DOI:
10.4236/jdaip.2022.102006
246
Downloads
2,075
Views
Citations
Application of Dual-Energy X-Ray Image Detection of Dangerous Goods Based on YOLOv7
(Articles)
Baosheng Liu
,
Fei Wang
,
Ming Gao
,
Lei Zhao
Journal of Computer and Communications
Vol.11 No.7
,July 31, 2023
DOI:
10.4236/jcc.2023.117013
163
Downloads
750
Views
Citations
Relevance of Advanced Plant Disease Detection Techniques in Disease and Pest Management for Ensuring Food Security and Their Implication: A Review
(Articles)
Matthew Abu John
,
Ibukunoluwa Bankole
,
Oluwatayo Ajayi-Moses
,
Tofunmi Ijila
,
Timilehin Jeje
,
Patil Lalit
American Journal of Plant Sciences
Vol.14 No.11
,November 17, 2023
DOI:
10.4236/ajps.2023.1411086
406
Downloads
2,628
Views
Citations
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
(Articles)
Emmanuel S. Kolawole
,
Penrose S. Cofie
,
John H. Fuller
,
Cajetan M. Akujuobi
,
Emmanuel A. Dada
,
Justin F. Foreman
,
Pamela H. Obiomon
Communications and Network
Vol.16 No.3
,August 30, 2024
DOI:
10.4236/cn.2024.163006
110
Downloads
510
Views
Citations
Improved Mechanism for Detecting Examinations Impersonations in Public Higher Learning Institutions: Case of the Mwalimu Nyerere Memorial Academy (MNMA)
(Articles)
Jasson Lwangisa Domition
,
Rogers Philip Bhalalusesa
,
Selemani Ismail
Journal of Computer and Communications
Vol.12 No.9
,September 27, 2024
DOI:
10.4236/jcc.2024.129010
54
Downloads
428
Views
Citations
Evaluation of On-Vehicle Bone-Conduct Acoustic Emission Detection for Rail Defects
(Articles)
Lei Jia
,
Jee Woong Park
,
Ming Zhu
,
Yingtao Jiang
,
Hualiang Teng
Journal of Transportation Technologies
Vol.15 No.1
,January 16, 2025
DOI:
10.4236/jtts.2025.151006
35
Downloads
219
Views
Citations
Machine Learning for Identifying Harmful Online Behavior: A Cyberbullying Overview
(Articles)
Rikin Shrestha
,
Rushit Dave
Journal of Computer and Communications
Vol.13 No.1
,January 22, 2025
DOI:
10.4236/jcc.2025.131003
69
Downloads
622
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
,March 20, 2025
DOI:
10.4236/jcc.2025.133002
33
Downloads
161
Views
Citations
Compression of ECG signal using video codec technology-like scheme
(Articles)
Dihu Chen
,
Sheng Yang
Journal of Biomedical Science and Engineering
Vol.1 No.1
,June 6, 2008
DOI:
10.4236/jbise.2008.11004
6,367
Downloads
12,271
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,724
Downloads
14,819
Views
Citations
Two-Tier GCT Based Approach for Attack Detection
(Articles)
Zhiwen Wang
,
Qin Xia
,
Ke Lu
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11009
4,711
Downloads
8,381
Views
Citations
On the Scalable Fairness and Efficient Active Queue Management of RED
(Articles)
Hui WANG
,
Xiao-Hui LIN
,
Kai-Yu ZHOU
,
Nin XIE
,
Hui LI
Int'l J. of Communications, Network and System Sciences
Vol.2 No.1
,February 26, 2009
DOI:
10.4236/ijcns.2009.21009
6,053
Downloads
10,345
Views
Citations
Target Detection in Three-Dimension Sensor Networks Based on Clifford Algebra
(Articles)
Tiancheng HE
,
Weixin XIE
,
Wenming CAO
Wireless Sensor Network
Vol.1 No.2
,July 10, 2009
DOI:
10.4236/wsn.2009.12013
5,179
Downloads
9,648
Views
Citations
<
...
9
10
11
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top