Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Effective Network Traffic Data Control Using Improved Apriori Rule Mining
(Articles)
Subbiyan Prakash
,
Murugasamy Vijayakumar
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710269
2,114
Downloads
3,338
Views
Citations
Elastic Constants and Pressure Derivatives of Calcium Oxide
(Articles)
Krishna Murti Raju
Open Access Library Journal
Vol.1 No.7
,October 27, 2014
DOI:
10.4236/oalib.1100648
1,676
Downloads
2,199
Views
Citations
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
(Articles)
Gulshan Kumar
,
Krishan Kumar
International Journal of Intelligence Science
Vol.2 No.4A
,November 1, 2012
DOI:
10.4236/ijis.2012.224016
7,778
Downloads
14,326
Views
Citations
This article belongs to the Special Issue on
Data-Oriented Intelligence
Experience-Based Access Control in UbiComp: A New Paradigm
(Articles)
Nalini A. Mhetre
,
Arvind V. Deshpande
,
Parikshit N. Mahalle
Journal of Computer and Communications
Vol.10 No.1
,January 30, 2022
DOI:
10.4236/jcc.2022.101007
198
Downloads
835
Views
Citations
Rank-Me: A Java Tool for Ranking Team Members in Software Bug Repositories
(Articles)
Naresh Kumar Nagwani
,
Shrish Verma
Journal of Software Engineering and Applications
Vol.5 No.4
,April 23, 2012
DOI:
10.4236/jsea.2012.54030
5,515
Downloads
8,965
Views
Citations
ML-CLUBAS: A Multi Label Bug Classification Algorithm
(Articles)
Naresh Kumar Nagwani
,
Shrish Verma
Journal of Software Engineering and Applications
Vol.5 No.12
,December 31, 2012
DOI:
10.4236/jsea.2012.512113
6,076
Downloads
8,225
Views
Citations
Localized Coverage Connectivity Based on Shape and Area Using Mobile Sensor Robots in Wireless Sensor Networks
(Articles)
Rajaram Pichamuthu
,
Prakasam Periasamy
Circuits and Systems
Vol.7 No.8
,June 28, 2016
DOI:
10.4236/cs.2016.78171
1,602
Downloads
2,708
Views
Citations
Computerized White Matter and Gray Matter Extraction from MRI of Brain Image
(Articles)
Sudipta Roy
,
Debayan Ganguly
,
Kingshuk Chatterjee
,
Samir Kumar Bandyopadhyay
Journal of Biomedical Science and Engineering
Vol.8 No.9
,September 4, 2015
DOI:
10.4236/jbise.2015.89054
3,231
Downloads
4,368
Views
Citations
Test Suite Design Methodology Using Combinatorial Approach for Internet of Things Operating Systems
(Articles)
Abhinandan H. Patil
,
Neena Goveas
,
Krishnan Rangarajan
Journal of Software Engineering and Applications
Vol.8 No.7
,July 15, 2015
DOI:
10.4236/jsea.2015.87031
3,296
Downloads
4,531
Views
Citations
Agglomerative Approach for Identification and Elimination of Web Robots from Web Server Logs to Extract Knowledge about Actual Visitors
(Articles)
Dilip Singh Sisodia
,
Shrish Verma
,
Om Prakash Vyas
Journal of Data Analysis and Information Processing
Vol.3 No.1
,April 27, 2015
DOI:
10.4236/jdaip.2015.31001
4,238
Downloads
5,272
Views
Citations
Metaheuristic Based Noise Identification and Image Denoising Using Adaptive Block Selection Based Filtering
(Articles)
M. Sasikala Devi
,
R. Sukumar
Circuits and Systems
Vol.7 No.9
,July 29, 2016
DOI:
10.4236/cs.2016.79235
2,260
Downloads
4,418
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences
Vol.5 No.2
,February 28, 2012
DOI:
10.4236/ijcns.2012.52010
4,835
Downloads
9,075
Views
Citations
Corad Agile Method for Agile Software Cost Estimation
(Articles)
Govind Singh Rajput
,
Ratnesh Litoriya
Open Access Library Journal
Vol.1 No.3
,June 25, 2014
DOI:
10.4236/oalib.1100579
1,689
Downloads
3,686
Views
Citations
A Hybrid Associative Classification Model for Software Development Effort Estimation
(Articles)
S. Saraswathi
,
N. Kannan
Circuits and Systems
Vol.7 No.6
,May 17, 2016
DOI:
10.4236/cs.2016.76071
1,908
Downloads
2,718
Views
Citations
Two Pass Port Scan Detection Technique Based on Connection Pattern and Status on Sampled Data
(Articles)
Sunil Kumar
,
Kamlesh Dutta
,
Ankit Asati
Journal of Computer and Communications
Vol.3 No.9
,September 1, 2015
DOI:
10.4236/jcc.2015.39001
3,846
Downloads
4,846
Views
Citations
Fourth Dimension Data Representation and Its Analysis Using Turiyam Context
(Articles)
Prem Kumar Singh
Journal of Computer and Communications
Vol.9 No.6
,June 30, 2021
DOI:
10.4236/jcc.2021.96014
163
Downloads
957
Views
Citations
Turiyam Set a Fourth Dimension Data Representation
(Articles)
Prem Kumar Singh
Journal of Applied Mathematics and Physics
Vol.9 No.7
,July 30, 2021
DOI:
10.4236/jamp.2021.97116
171
Downloads
1,038
Views
Citations
Load Balancing in IP/MPLS Networks: A Survey
(Articles)
Ravindra Kumar Singh
,
Narendra S. Chaudhari
,
Kanak Saxena
Communications and Network
Vol.4 No.2
,May 18, 2012
DOI:
10.4236/cn.2012.42020
7,588
Downloads
14,919
Views
Citations
Probabilistic Selection of QoS Paths for Improving Survivability in MPLS Networks
(Articles)
Ravindra Kumar Singh
,
Narendra S. Chaudhari
,
Kanak Saxena
Communications and Network
Vol.5 No.4
,November 20, 2013
DOI:
10.4236/cn.2013.54041
3,979
Downloads
5,804
Views
Citations
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
(Articles)
Debnath BHATTACHARYYA
,
Jhuma DUTTA
,
Poulami DAS
,
Samir Kumar BANDYOPADHYAY
,
Tai-hoon KIM
Int'l J. of Communications, Network and System Sciences
Vol.2 No.5
,August 21, 2009
DOI:
10.4236/ijcns.2009.25040
5,409
Downloads
9,782
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top