Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Proxy Server Experiment and Network Security with Changing Nature of the Web
(Articles)
Olatunde Abiona
,
Adeniran Oluwaranti
,
Ayodeji Oluwatope
,
Surura Bello
,
Clement Onime
,
Mistura Sanni
,
Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences
Vol.7 No.12
,December 4, 2014
DOI:
10.4236/ijcns.2014.712052
4,061
Downloads
5,560
Views
Citations
A Quantitative Factorial Component Analysis to Investigate the Recent Changes of Japan’s Weight-Based Food Self-Sufficiency Ratio
(Articles)
Kunihisa Yoshii
,
Tatsuo Oyama
American Journal of Operations Research
Vol.6 No.1
,January 26, 2016
DOI:
10.4236/ajor.2016.61007
4,132
Downloads
5,059
Views
Citations
A SWOT Analysis of Maritime Transportation and Security in the Gulf of Guinea
(Articles)
Nana Raymond Lawrence Ofosu-Boateng
Open Journal of Social Sciences
Vol.5 No.8
,August 3, 2017
DOI:
10.4236/jss.2017.58002
2,748
Downloads
8,815
Views
Citations
Oil, Risk Analysis Techniques, Maritime Security and Safe Passage in Pirate Infested Gulf of Guinea Waters
(Articles)
Nana Raymond Lawrence Ofosu-Boateng
Open Journal of Social Sciences
Vol.5 No.12
,December 14, 2017
DOI:
10.4236/jss.2017.512008
1,114
Downloads
1,999
Views
Citations
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
(Articles)
Gulain Mugaruka Buduge
,
Jérémie Ndikumagenge
,
Justin Buhendwa Nyenyezi
Journal of Information Security
Vol.13 No.4
,September 30, 2022
DOI:
10.4236/jis.2022.134017
146
Downloads
546
Views
Citations
Optimization of Medical Supply Chains and Forward Store Locations for Recurrent Homecare Patient Demand with Periodic Interruptions
(Articles)
Ram Prashanth Radha Krishnan
,
James C. Benneyan
,
Sibel B. Sonuc
American Journal of Operations Research
Vol.8 No.3
,May 25, 2018
DOI:
10.4236/ajor.2018.83012
981
Downloads
2,342
Views
Citations
This article belongs to the Special Issue on
Linear Programming
Affective, Normative and Continuance: Predictors of Employees’ Commitment of Large-Cap It Firms in Indian Context
(Articles)
Radha Yadav
,
Ashu Khanna
,
Ruby Sengar
,
Sudipta Dasmohapatra
Theoretical Economics Letters
Vol.9 No.6
,August 8, 2019
DOI:
10.4236/tel.2019.96113
797
Downloads
1,994
Views
Citations
Optimization on Water Resource System Operation Policy during Drought
(Articles)
Hongyuan Fang
,
Yi Cheng
,
Songkai Yan
Journal of Water Resource and Protection
Vol.3 No.2
,February 28, 2011
DOI:
10.4236/jwarp.2011.32017
5,535
Downloads
11,206
Views
Citations
Schedule Control of Coal Mine Construction Projects Based on Factor Analysis
(Articles)
Lingling Fan
,
Hui Zhang
,
Xiao Li
Geomaterials
Vol.3 No.3
,July 16, 2013
DOI:
10.4236/gm.2013.33009
4,888
Downloads
7,131
Views
Citations
Research on the Contents and Indexes of Reservoir Operational Security
(Articles)
Jingchun Feng
,
Zhongnan Duan
Journal of Water Resource and Protection
Vol.2 No.11
,November 29, 2010
DOI:
10.4236/jwarp.2010.211115
6,099
Downloads
9,340
Views
Citations
Food Is Security: The Nexus of Health Security in Fragile and Failed States
(Articles)
John Quinn
,
Tomas Zeleny
,
Vladimir Bencko
Food and Nutrition Sciences
Vol.5 No.19
,October 14, 2014
DOI:
10.4236/fns.2014.519197
4,881
Downloads
6,218
Views
Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
(Articles)
Joseph E. Mbowe
,
Simon S. Msanjila
,
George S. Oreku
,
Khamisi Kalegele
Journal of Software Engineering and Applications
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/jsea.2016.912041
1,706
Downloads
2,652
Views
Citations
An Improved Differential Evolution Whale Algorithm for Economic Load Distribution
(Articles)
Haiming Li
,
Chunning Fu
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010007
85
Downloads
477
Views
Citations
Potentials of the Groundnut Sector towards Achieving Food Security in Senegal
(Articles)
Ndiaye Georges
,
Shaoyong Fang
,
Mukete Beckline
,
Ye Wu
Open Access Library Journal
Vol.3 No.9
,September 5, 2016
DOI:
10.4236/oalib.1102991
2,421
Downloads
4,027
Views
Citations
Agro-Ecological Assessment of Non-Traditional Export Crops in North East Trinidad
(Articles)
Nicole Ramlachan
,
Ravi Renie
,
Kristy Samaroo
,
Jewan Ramcharitar
,
Subesh Ramjattan
Agricultural Sciences
Vol.10 No.3
,March 13, 2019
DOI:
10.4236/as.2019.103024
996
Downloads
2,017
Views
Citations
Impact of Statelessness: Are We Ready to Face?
(Articles)
Bilkis Afroza Siddika
Open Journal of Social Sciences
Vol.7 No.12
,December 3, 2019
DOI:
10.4236/jss.2019.712001
931
Downloads
4,869
Views
Citations
This article belongs to the Special Issue on
Human Rights and Social Justice
Analysis of Risk Measures in Portfolio Optimization for the Uganda Securities Exchange
(Articles)
Criscent Birungi
,
Lucy Muthoni
Journal of Financial Risk Management
Vol.10 No.2
,June 7, 2021
DOI:
10.4236/jfrm.2021.102008
413
Downloads
2,030
Views
Citations
The Linear Formulation of Thermal Unit Commitment Problem with Uncertainties through a Computational Mixed Integer
(Articles)
Mian Khuram Ahsan
,
Tianhong Pan
,
Zhengming Li
Journal of Power and Energy Engineering
Vol.6 No.6
,June 20, 2018
DOI:
10.4236/jpee.2018.66001
1,067
Downloads
2,694
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,471
Downloads
9,138
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,352
Downloads
9,668
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top