Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Poisson Process and Its Application to the Storm Water Overflows
(Articles)
Malick Baldeh
,
Chris Samba
,
Kenneth Tuffour
,
Assane Boya
Computational Water, Energy, and Environmental Engineering
Vol.5 No.2
,April 19, 2016
DOI:
10.4236/cweee.2016.52005
2,706
Downloads
4,539
Views
Citations
Equivalence of Uniqueness in Law and Joint Uniqueness in Law for SDEs Driven by Poisson Processes
(Articles)
Huiyan Zhao
,
Chunhua Hu
,
Siyan Xu
Applied Mathematics
Vol.7 No.8
,May 20, 2016
DOI:
10.4236/am.2016.78070
1,944
Downloads
2,898
Views
Citations
This article belongs to the Special Issue on
Applied Probability
Arrival Analysis of Dry Weather Sanitary Sewer Overflows
(Articles)
Kenneth Tuffour
,
Chris Samba
Open Journal of Civil Engineering
Vol.6 No.3
,June 9, 2016
DOI:
10.4236/ojce.2016.63038
2,817
Downloads
4,649
Views
Citations
Local Communities Demand for Food Tree Species and the Potentialities of Their Landscapes in Two Ecological Zones of Burkina Faso
(Articles)
Daniabla Natacha Edwige Thiombiano
,
Niéyidouba Lamien
,
Ana M. Castro-Euler
,
Barbara Vinceti
,
Dolores Agundez
,
Issaka Joseph Boussim
Open Journal of Forestry
Vol.3 No.3
,July 18, 2013
DOI:
10.4236/ojf.2013.33014
3,985
Downloads
6,432
Views
Citations
A Computational Model for Gender Asset Gap Management with a Focus on Gender Disparity in Land Acquisition and Land Tenure Security
(Articles)
Oluwatosin Ogundare
,
Lewis Njualem
American Journal of Operations Research
Vol.15 No.3
,May 12, 2025
DOI:
10.4236/ajor.2025.153005
21
Downloads
121
Views
Citations
Performance of Simple Deterministic Stock Trading Strategies Using an Agent-Based Modelling Approach
(Articles)
Kristian Nikolai Jæger Hansen
Theoretical Economics Letters
Vol.14 No.5
,October 29, 2024
DOI:
10.4236/tel.2024.145093
26
Downloads
240
Views
Citations
Application of Quantitative Evaluation System Based on Sensitive Indicators of Accelerated Rehabilitation Nursing in Patients with Pancreaticoduodenal Surgery
(Articles)
Xia Pan
,
Yan Meng
,
Xiaoping Tan
Yangtze Medicine
Vol.9 No.1
,March 4, 2025
DOI:
10.4236/ym.2025.91003
22
Downloads
119
Views
Citations
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,104
Downloads
3,249
Views
Citations
Analysis of Rural Households Food Security in Western Ethiopia
(Articles)
Seid Sani
,
Biruk Kemaw
Food and Nutrition Sciences
Vol.10 No.3
,March 5, 2019
DOI:
10.4236/fns.2019.103019
2,179
Downloads
5,146
Views
Citations
This article belongs to the Special Issue on
Food Analysis
A Critical Analysis of the Nature and Effectiveness of a Floating Charge as a Security in Nigerian Law
(Articles)
Emuobo Emudainohwo
Beijing Law Review
Vol.12 No.1
,March 19, 2021
DOI:
10.4236/blr.2021.121011
646
Downloads
3,959
Views
Citations
Business Email Compromise Challenges to Medium and Large-Scale Firms in USA: An Analysis
(Articles)
Okechukwu Ogwo-Ude
Open Journal of Applied Sciences
Vol.13 No.6
,June 9, 2023
DOI:
10.4236/ojapps.2023.136064
273
Downloads
1,494
Views
Citations
Enhancing Mobile Security through Comprehensive Penetration Testing
(Articles)
Maryam Roshanaei
Journal of Information Security
Vol.15 No.2
,February 27, 2024
DOI:
10.4236/jis.2024.152006
404
Downloads
2,033
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Performance Measurement for Construction CALS Application of Ubiquitous Technology Using the Process Chart Method
(Articles)
Tae Hak Kim
,
Seong Yun Jeong
Open Journal of Social Sciences
Vol.1 No.5
,November 7, 2013
DOI:
10.4236/jss.2013.15002
3,728
Downloads
5,751
Views
Citations
A Statistical Analysis of Intensities Estimation on the Modeling of Non-Life Insurance Claim Counting Process
(Articles)
Uraiwan Jaroengeratikun
,
Winai Bodhisuwan
,
Ampai Thongteeraparp
Applied Mathematics
Vol.3 No.1
,January 4, 2012
DOI:
10.4236/am.2012.31016
4,461
Downloads
9,324
Views
Citations
Habitat Loss, Uneven Distribution of Resources and Fragmented Landscapes—A Resource Based Model of the Patch Size Effect
(Articles)
Paweł Adamski
,
Adam Marcin Ćmiel
,
Adam Marcin Ćmiel
Applied Mathematics
Vol.5 No.19
,November 12, 2014
DOI:
10.4236/am.2014.519299
4,462
Downloads
5,891
Views
Citations
This article belongs to the Special Issue on
Mathematical Biology
Measuring Dynamic Correlations of Words in Written Texts with an Autocorrelation Function
(Articles)
Hiroshi Ogura
,
Hiromi Amano
,
Masato Kondo
Journal of Data Analysis and Information Processing
Vol.7 No.2
,May 27, 2019
DOI:
10.4236/jdaip.2019.72004
704
Downloads
2,206
Views
Citations
Cybersecurity: Identifying the Vulnerability Intensity Function (
VIF
) and Vulnerability Index Indicator (
VII
) of a Computer Operating System
(Articles)
Ranju Karki
,
Chris P. Tsokos
Journal of Information Security
Vol.13 No.4
,October 28, 2022
DOI:
10.4236/jis.2022.134019
208
Downloads
1,069
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
Security Policy Management Process within Six Sigma Framework
(Articles)
Vijay Anand
,
Jafar Saniie
,
Erdal Oruklu
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31006
7,097
Downloads
13,972
Views
Citations
Risk Assessment of Land Subsidence in Kathmandu Valley, Nepal, Using Remote Sensing and GIS
(Articles)
Richa Bhattarai
,
Akihiko Kondoh
Advances in Remote Sensing
Vol.6 No.2
,June 20, 2017
DOI:
10.4236/ars.2017.62010
2,399
Downloads
5,370
Views
Citations
The Wartime Bridge Reliability Evaluation Model Based on Birth-and-Death Process
(Articles)
Duo-dian Wang
,
Guo-qing Qiu
American Journal of Computational Mathematics
Vol.1 No.4
,December 9, 2011
DOI:
10.4236/ajcm.2011.14034
4,433
Downloads
7,896
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top