Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Optimal Mission Task Assignment for Complex Military Simulator Operations
(Articles)
Eunghyun Lee
,
Suhwan Kim
,
Yongjin Kwon
Journal of Computer and Communications
Vol.3 No.11
,November 19, 2015
DOI:
10.4236/jcc.2015.311014
2,269
Downloads
2,803
Views
Citations
Analysis of Mission Task Loading Based on the External Disturbance
(Articles)
Eunghyun Lee
,
Suhwan Kim
,
Yongjin Kwon
Journal of Computer and Communications
Vol.3 No.11
,November 19, 2015
DOI:
10.4236/jcc.2015.311015
2,376
Downloads
2,850
Views
Citations
Analysis of Uncontrollable Variables to the Performance of Predefined Tasks
(Articles)
Eunghyun Lee
,
Jinwoo Lee
,
Jungwan Hong
,
Younghoon Ko
,
Yongjin Kwon
,
Sang C. Park
,
Jonghoon Lee
,
Miseon Yi
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 25, 2013
DOI:
10.4236/jsea.2012.512B027
3,879
Downloads
5,281
Views
Citations
Rotosonde: Acquiring Vertical Wind Profile of a Tropical Cyclone with Small Unmanned Helicopters
(Articles)
Chung-Kiak Poh
,
Chung-How Poh
Advances in Aerospace Science and Technology
Vol.2 No.2
,May 2, 2017
DOI:
10.4236/aast.2017.22002
1,844
Downloads
2,838
Views
Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
(Articles)
Akinjide A. Akinola
,
Adeyemi A. Adekoya
,
Ayoade O. Kuye
,
Abiodun Ayodeji
Journal of Information Security
Vol.10 No.3
,June 17, 2019
DOI:
10.4236/jis.2019.103006
741
Downloads
2,389
Views
Citations
Establishing Benchmarks for Helicopter EMS Patient Stabilization Times in Interfacility Transport for Primary Percutaneous Coronary Intervention
(Articles)
Loren Brown
,
Annette Arthur
,
Claudia Keeling
,
Christine Yuhas
,
Stephen H. Thomas
International Journal of Clinical Medicine
Vol.3 No.7A
,January 2, 2013
DOI:
10.4236/ijcm.2012.37A134
3,903
Downloads
5,511
Views
Citations
This article belongs to the Special Issue on
Emergency Medicine
Helicopter EMS beyond Trauma: Utilization of Air Transport for Non-Trauma Conditions
(Articles)
Stephen H. Thomas
,
Lori J. Whelan
,
Emily Williams
,
Loren Brown
International Journal of Clinical Medicine
Vol.4 No.12
,December 18, 2013
DOI:
10.4236/ijcm.2013.412090
4,417
Downloads
6,389
Views
Citations
The Evolution of Reliability and Efficiency of Aerospace Bearing Systems
(Articles)
Peter Gloeckner
,
Charles Rodway
Engineering
Vol.9 No.11
,November 30, 2017
DOI:
10.4236/eng.2017.911058
3,904
Downloads
7,911
Views
Citations
This article belongs to the Special Issue on
Aeronautical and Astronautical Engineering
An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack
(Articles)
Hyun Woo Lee
,
Tae Ho Cho
Wireless Sensor Network
Vol.4 No.8
,August 29, 2012
DOI:
10.4236/wsn.2012.48027
4,392
Downloads
6,485
Views
Citations
A Novel Solution to Handle DDOS Attack in MANET
(Articles)
Meghna Chhabra
,
Brij Gupta
,
Ammar Almomani
Journal of Information Security
Vol.4 No.3
,July 16, 2013
DOI:
10.4236/jis.2013.43019
7,502
Downloads
12,479
Views
Citations
Public Key Infrastructure: A Survey
(Articles)
Aysha Albarqi
,
Ethar Alzaid
,
Fatimah Al Ghamdi
,
Somaya Asiri
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 8, 2015
DOI:
10.4236/jis.2015.61004
5,772
Downloads
9,326
Views
Citations
A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack
(Articles)
Minmin Xie
,
Yong Wang
,
Chunming Zou
,
Yingjie Tian
,
Naiwang Guo
Journal of Computer and Communications
Vol.8 No.11
,November 24, 2020
DOI:
10.4236/jcc.2020.811007
371
Downloads
1,027
Views
Citations
Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks
(Articles)
Vennam Ratna Kumari
,
Aitha Nagaraju
,
Gaurav Pareek
Journal of Sensor Technology
Vol.4 No.2
,May 21, 2014
DOI:
10.4236/jst.2014.42006
3,927
Downloads
5,304
Views
Citations
Using of Particle Swarm for Performance Optimization of Helicopter Rotor Blades
(Articles)
Giorgio Guglieri
Applied Mathematics
Vol.3 No.10A
,November 1, 2012
DOI:
10.4236/am.2012.330197
4,932
Downloads
7,754
Views
Citations
This article belongs to the Special Issue on
Optimization
Safety Distance Determination for 500 kV AC Transmission Line’s Helicopter Inspection
(Articles)
Shuwei Wan
,
Xingming Bian
,
Lan Chen
,
Liming Wang
,
Zhicheng Guan
Energy and Power Engineering
Vol.5 No.4B
,November 15, 2013
DOI:
10.4236/epe.2013.54B219
7,158
Downloads
9,570
Views
Citations
Appliance of Geophysical Methods to Detect the Ancient Remains at “Tell Defenneh” Area, Ismailia, Egypt
(Articles)
Alhussein Adham Basheer
,
Ahmed El-Kotb Al-Imam
,
Abdelnasser Mohammed Abdelmotaal
,
Mostafa Sarhan Toni
,
Sayed Omar Elkhateeb
Archaeological Discovery
Vol.2 No.3
,July 23, 2014
DOI:
10.4236/ad.2014.23009
3,172
Downloads
4,765
Views
Citations
Numerical Study on Low-Reynolds Compressible Flows around Mars Helicopter Rotor Blade Airfoil
(Articles)
Takuma Yamaguchi
,
Masayuki Anyoji
Journal of Flow Control, Measurement & Visualization
Vol.11 No.2
,April 28, 2023
DOI:
10.4236/jfcmv.2023.112003
283
Downloads
1,523
Views
Citations
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment
(Articles)
Sanjeev Kumar
,
Orifiel Gomez
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12010
11,041
Downloads
20,181
Views
Citations
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks
(Articles)
Rodolfo Baez Junior
,
Sanjeev Kumar
Journal of Information Security
Vol.5 No.3
,July 24, 2014
DOI:
10.4236/jis.2014.53012
5,209
Downloads
6,906
Views
Citations
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods
(Articles)
Arman Sargolzaei
,
Kang Yen
,
Mohamed Abdelghani
,
Alireza Abbaspour
,
Saman Sargolzaei
Intelligent Control and Automation
Vol.8 No.3
,August 23, 2017
DOI:
10.4236/ica.2017.83013
1,300
Downloads
2,746
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top