Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution
(Articles)
Fabio Garzia
,
Roberto Cusani
Communications and Network
Vol.2 No.3
,September 10, 2010
DOI:
10.4236/cn.2010.23025
7,140
Downloads
11,928
Views
Citations
Quantum Key Distribution with Qubit Pairs
(Articles)
Mohd Asad Siddiqui
,
Tabish Qureshi
Journal of Quantum Information Science
Vol.4 No.3
,August 13, 2014
DOI:
10.4236/jqis.2014.43014
3,700
Downloads
5,405
Views
Citations
A Design of Nuclear Electronics Filter Forming Circuit
(Articles)
Shaoqin Li
,
Yunrui Jiang
,
Jie Shi
Open Access Library Journal
Vol.8 No.9
,September 3, 2021
DOI:
10.4236/oalib.1107843
91
Downloads
525
Views
Citations
Differentiation of Value Creation for Suppliers and Consumers in Sharing Economy Business Models
(Articles)
Evgeny V. Popov
,
Anna Y. Veretennikova
,
Daria A. Selezneva
Open Journal of Social Sciences
Vol.10 No.12
,November 11, 2022
DOI:
10.4236/jss.2022.1012017
142
Downloads
701
Views
Citations
NeuroEvolutionary Feature Selection Using NEAT
(Articles)
Soroosh Sohangir
,
Shahram Rahimi
,
Bidyut Gupta
Journal of Software Engineering and Applications
Vol.7 No.7
,June 5, 2014
DOI:
10.4236/jsea.2014.77052
3,836
Downloads
6,014
Views
Citations
Information Protection Based on Extraction of Square Roots of Gaussian Integers
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.3
,March 10, 2011
DOI:
10.4236/ijcns.2011.43016
4,409
Downloads
8,657
Views
Citations
Cryptanalysis of the Double-Moduli Cryptosystem
(Articles)
Sonia Mihaela Bogos
,
Serge Vaudenay
Int'l J. of Communications, Network and System Sciences
Vol.5 No.12
,December 20, 2012
DOI:
10.4236/ijcns.2012.512088
4,649
Downloads
6,851
Views
Citations
The Feature-Based a New Object Coding Approach for Prismatic Parts at the Part Modeling
(Articles)
Ismet Celik
,
Ali Unuvar
Modeling and Numerical Simulation of Material Science
Vol.3 No.4
,October 7, 2013
DOI:
10.4236/mnsms.2013.34018
3,161
Downloads
5,222
Views
Citations
A Feature Subset Selection Technique for High Dimensional Data Using Symmetric Uncertainty
(Articles)
Bharat Singh
,
Nidhi Kushwaha
,
Om Prakash Vyas
Journal of Data Analysis and Information Processing
Vol.2 No.4
,November 18, 2014
DOI:
10.4236/jdaip.2014.24012
8,264
Downloads
11,830
Views
Citations
Research on Gesture Recognition Based on Improved GBMR Segmentation and Multiple Feature Fusion
(Articles)
Xianfei Zhu
,
Weizhong Yan
,
Dongzhi Chen
,
Cuicui Gao
Journal of Computer and Communications
Vol.7 No.7
,July 10, 2019
DOI:
10.4236/jcc.2019.77010
404
Downloads
1,010
Views
Citations
Reference Encryption for Access Right Segregation and Domain Representation
(Articles)
Lanfranco Lopriore
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32010
3,443
Downloads
6,002
Views
Citations
An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks
(Articles)
Benamar Kadri
,
Djilalli Moussaoui
,
Mohammed Feham
,
Abdellah Mhammed
Wireless Sensor Network
Vol.4 No.6
,June 13, 2012
DOI:
10.4236/wsn.2012.46022
5,419
Downloads
10,846
Views
Citations
Simulation Based Prospective Productivity Assessment of Complex Services
(Articles)
Andreas Petz
,
Sönke Duckwitz
,
Susanne Mütze-Niewöhner
,
Christopher M. Schlick
iBusiness
Vol.5 No.3B
,November 8, 2013
DOI:
10.4236/ib.2013.53B008
3,907
Downloads
5,067
Views
Citations
Population, Development and Deforestation in Songea District, Tanzania
(Articles)
Michael J. Haule
Natural Resources
Vol.5 No.1
,January 26, 2014
DOI:
10.4236/nr.2014.51004
4,391
Downloads
6,770
Views
Citations
Complexity and Uncertainty regarding Superannuation Do Not Explain Key Decisions Taken by Members
(Articles)
Necmi K. Avkiran
,
Elizabeth Zhu
Theoretical Economics Letters
Vol.8 No.11
,August 2, 2018
DOI:
10.4236/tel.2018.811135
717
Downloads
1,552
Views
Citations
This article belongs to the Special Issue on
Social Economics
A Clustering Algorithm for Key Frame Extraction Based on Density Peak
(Articles)
Hong Zhao
,
Tao Wang
,
Xiangyan Zeng
Journal of Computer and Communications
Vol.6 No.12
,December 26, 2018
DOI:
10.4236/jcc.2018.612012
961
Downloads
2,406
Views
Citations
Progress in Analysis of Key Technologies for Dynamic Wireless Charging of Electric Vehicles
(Articles)
Wanqing Li
,
Kai Wang
,
Pinduan Hu
Energy and Power Engineering
Vol.11 No.5
,May 24, 2019
DOI:
10.4236/epe.2019.115012
1,217
Downloads
2,260
Views
Citations
The Significant and Profound Impacts of Chou’s Distorted Key Theory for Developing Peptide Drugs
(Articles)
Kuo-Chen Chou
Natural Science
Vol.12 No.9
,September 10, 2020
DOI:
10.4236/ns.2020.129049
228
Downloads
663
Views
Citations
The Integration of Mainstream Psychotherapies in an Epistemological Framework
(Articles)
Zhizhong Kai
Open Journal of Social Sciences
Vol.9 No.1
,January 15, 2021
DOI:
10.4236/jss.2021.91005
517
Downloads
1,439
Views
Citations
A Complex Encryption System Design Implemented by AES
(Articles)
Zhimao Lu
,
Houmed Mohamed
Journal of Information Security
Vol.12 No.2
,April 30, 2021
DOI:
10.4236/jis.2021.122009
557
Downloads
3,611
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top