Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Comparative Study of Email Forensic Tools
(Articles)
Vamshee Krishna Devendran
,
Hossain Shahriar
,
Victor Clincy
Journal of Information Security
Vol.6 No.2
,April 10, 2015
DOI:
10.4236/jis.2015.62012
12,499
Downloads
16,629
Views
Citations
A Gradient Search Algorithm for the Maximal Visible Area Polygon Problem
(Articles)
Helman I. Stern
,
Moshe Zofi
American Journal of Operations Research
Vol.5 No.3
,May 12, 2015
DOI:
10.4236/ajor.2015.53013
2,868
Downloads
3,576
Views
Citations
Quantum Inspired Differential Evolution Algorithm
(Articles)
Binxu Li
,
Panchi Li
Open Journal of Optimization
Vol.4 No.2
,May 15, 2015
DOI:
10.4236/ojop.2015.42004
8,181
Downloads
9,830
Views
Citations
Computed Tomography Image Enhancement Using Cuckoo Search: A Log Transform Based Approach
(Articles)
Amira S. Ashour
,
Sourav Samanta
,
Nilanjan Dey
,
Noreen Kausar
,
Wahiba Ben Abdessalemkaraa
,
Aboul Ella Hassanien
Journal of Signal and Information Processing
Vol.6 No.3
,August 31, 2015
DOI:
10.4236/jsip.2015.63023
6,236
Downloads
8,026
Views
Citations
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
(Articles)
Ping Zhang
,
Jianzhong Wang
Journal of Computer and Communications
Vol.3 No.9
,September 28, 2015
DOI:
10.4236/jcc.2015.39010
3,609
Downloads
4,577
Views
Citations
An 8 Bit 0.8 GS/s 8.352 mW Modified Successive Approximation Register Based Analog to Digital Converter in 65 nm CMOS
(Articles)
Ananthanarayanan Parthasarathy
Circuits and Systems
Vol.6 No.12
,December 30, 2015
DOI:
10.4236/cs.2015.612028
4,153
Downloads
5,101
Views
Citations
A New Approach of Solving Single Objective Unbalanced Assignment Problem
(Articles)
Ventepaka Yadaiah
,
V. V. Haragopal
American Journal of Operations Research
Vol.6 No.1
,January 29, 2016
DOI:
10.4236/ajor.2016.61011
8,120
Downloads
11,619
Views
Citations
Feature Selection Based on Enhanced Cuckoo Search for Breast Cancer Classification in Mammogram Image
(Articles)
M. N. Sudha
,
S. Selvarajan
Circuits and Systems
Vol.7 No.4
,April 27, 2016
DOI:
10.4236/cs.2016.74028
2,699
Downloads
4,425
Views
Citations
Global Convergence of Curve Search Methods for Unconstrained Optimization
(Articles)
Zhiwei Xu
,
Yongning Tang
,
Zhen-Jun Shi
Applied Mathematics
Vol.7 No.7
,April 28, 2016
DOI:
10.4236/am.2016.77066
1,817
Downloads
2,691
Views
Citations
Fast Face Detection with Multi-Scale Window Search Free from Image Resizing Using SGI Features
(Articles)
Masayuki Miyama
Journal of Computer and Communications
Vol.4 No.10
,August 10, 2016
DOI:
10.4236/jcc.2016.410003
1,653
Downloads
2,876
Views
Citations
This article belongs to the Special Issue on
Computer Vision and Image
An Alternating Direction Nonmonotone Approximate Newton Algorithm for Inverse Problems
(Articles)
Zhuhan Zhang
,
Zhensheng Yu
,
Xinyue Gan
Journal of Applied Mathematics and Physics
Vol.4 No.11
,November 30, 2016
DOI:
10.4236/jamp.2016.411206
1,523
Downloads
2,393
Views
Citations
Automated Picture Crawling for Electrical Power Maintenance
(Articles)
Bing He
,
Xuqi Zhang
,
Mei Wang
,
Xiu Cao
,
Zikun Zhuang
Journal of Computer and Communications
Vol.5 No.3
,March 13, 2017
DOI:
10.4236/jcc.2017.53007
1,028
Downloads
1,803
Views
Citations
Heru Search Method—Unique in the World that Uses Unprecedented Mathematical Formulas and Replaces the Binary Tree Breaking Various Paradigms Like 0(log
n
)
(Articles)
Carlos Roberto França
American Journal of Computational Mathematics
Vol.7 No.1
,March 31, 2017
DOI:
10.4236/ajcm.2017.71003
1,600
Downloads
3,070
Views
Citations
Searching for a Target Whose Truncated Brownian Motion
(Articles)
Abd Elmoneim A. Teamah
,
Mohamed A. El-Hadidy
,
Marwa M. El-Ghoul
Applied Mathematics
Vol.8 No.6
,June 14, 2017
DOI:
10.4236/am.2017.86061
1,562
Downloads
2,406
Views
Citations
On the Solution of the Eigenvalue Complementarity Problem by a Line Search Filter-SQP Algorithm
(Articles)
Qiu Yu
,
Zhensheng Yu
,
Yangchen Liu
Journal of Applied Mathematics and Physics
Vol.5 No.10
,October 25, 2017
DOI:
10.4236/jamp.2017.510168
975
Downloads
1,741
Views
Citations
Global Convergence of an Extended Descent Algorithm without Line Search for Unconstrained Optimization
(Articles)
Cuiling Chen
,
Liling Luo
,
Caihong Han
,
Yu Chen
Journal of Applied Mathematics and Physics
Vol.6 No.1
,January 16, 2018
DOI:
10.4236/jamp.2018.61013
918
Downloads
1,847
Views
Citations
The Study on China’s Flu Prediction Model Based on Web Search Data
(Articles)
Yan Bu
,
Jinhong Bai
,
Zhuo Chen
,
Mingjing Guo
,
Fan Yang
Journal of Data Analysis and Information Processing
Vol.6 No.3
,July 4, 2018
DOI:
10.4236/jdaip.2018.63006
1,279
Downloads
2,808
Views
Citations
Network Consumers’ Reference Price Formation Analysis
(Articles)
Haiyan Lin
Open Journal of Business and Management
Vol.6 No.3
,July 17, 2018
DOI:
10.4236/ojbm.2018.63053
1,193
Downloads
2,787
Views
Citations
Some Thoughts on Preferred Qualifications in the Search for Academic Jobs
(Articles)
Freddy A. Paniagua
Open Journal of Social Sciences
Vol.7 No.10
,October 22, 2019
DOI:
10.4236/jss.2019.710021
506
Downloads
1,661
Views
Citations
Improvised Technique for Analyzing Data and Detecting Terrorist Attack Using Machine Learning Approach Based on Twitter Data
(Articles)
Aditi Sarker
,
Partha Chakraborty
,
S. M. Shaheen Sha
,
Mahmuda Khatun
,
Md. Rakib Hasan
,
Kawshik Banerjee
Journal of Computer and Communications
Vol.8 No.7
,July 30, 2020
DOI:
10.4236/jcc.2020.87005
653
Downloads
2,441
Views
Citations
This article belongs to the Special Issue on
Artificial Intelligence & Applications
<
...
15
16
17
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top