Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Fingerprint Recognition with Artificial Neural Networks: Application to E-Learning
(Articles)
Stephane Kouamo
,
Claude Tangha
Journal of Intelligent Learning Systems and Applications
Vol.8 No.2
,May 30, 2016
DOI:
10.4236/jilsa.2016.82004
3,499
Downloads
7,755
Views
Citations
IoTSAMS: A Novel Framework for Internet of Things (IoT) Based Smart Attendance Management System
(Articles)
Farzana Akter
,
Amatul Bushra Akhi
,
Nusrat Jahan Farin
,
Md. Mohsin Khondoker
,
Md. Golam Saklayen
Intelligent Control and Automation
Vol.9 No.3
,August 17, 2018
DOI:
10.4236/ica.2018.93006
3,012
Downloads
7,157
Views
Citations
Serotypes, Antibiogram and Genetic Relatedness of
Pseudomonas aeruginosa
Isolates from Urinary Tract Infections at Urology and Nephrology Center, Mansoura, Egypt
(Articles)
Shaymaa H. Abdel-Rhman
,
Dina E. Rizk
Advances in Microbiology
Vol.8 No.8
,August 30, 2018
DOI:
10.4236/aim.2018.88042
921
Downloads
1,972
Views
Citations
Reduction of False Rejection in an Authentication System by Fingerprint with Deep Neural Networks
(Articles)
Stéphane Kouamo
,
Claude Tangha
,
Olaf Kouamo
Journal of Software Engineering and Applications
Vol.13 No.1
,January 31, 2020
DOI:
10.4236/jsea.2020.131001
460
Downloads
1,371
Views
Citations
Research on Intelligent Identification of PD Patterns Based on the Fingerprint Features
(Articles)
Qiuping Zheng
,
Ting Chen
,
Haitao Hu
,
Yingli Wang
,
Dawei Zhao
,
Chuntian Chen
,
Dianchun Zheng
Applied Mathematics
Vol.13 No.11
,November 30, 2022
DOI:
10.4236/am.2022.1311057
102
Downloads
353
Views
Citations
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker
(Articles)
Prabhu Kaliappan
,
Hartmut Koenig
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11003
6,189
Downloads
11,897
Views
Citations
Probabilistic Verification over GF(2m) Using Mod2-OBDDs
(Articles)
J.L. Imana
Intelligent Information Management
Vol.2 No.2
,March 16, 2010
DOI:
10.4236/iim.2010.22012
3,564
Downloads
6,633
Views
Citations
Eliminating Forgers Based on Intra Trial Variability in Online Signature Verification Using Handglove and Photometric Signals
(Articles)
Andrews Samraj
,
Shohel Sayeed
,
Loo Chu Kiong
,
Nikos E. Mastorokis
Journal of Information Security
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/jis.2010.11003
4,178
Downloads
7,946
Views
Citations
Verifying Monoid and Group Morphisms over Strongly Connected Algebraic Automata
(Articles)
Nazir Ahmad Zafar
,
Ajmal Hussain
,
Amir Ali
Journal of Software Engineering and Applications
Vol.3 No.8
,August 26, 2010
DOI:
10.4236/jsea.2010.38093
4,879
Downloads
8,054
Views
Citations
Extending the Strand Space Method with Timestamps: Part I the Theory
(Articles)
Yongjian Li
,
Jun Pang
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12006
5,258
Downloads
9,149
Views
Citations
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V
(Articles)
Yongjian Li
,
Jun Pang
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12007
5,800
Downloads
9,656
Views
Citations
Software Engineering Principles: Do They Meet Engineering Criteria?
(Articles)
Kenza Meridji
,
Alain Abran
Journal of Software Engineering and Applications
Vol.3 No.10
,November 19, 2010
DOI:
10.4236/jsea.2010.310114
7,530
Downloads
13,131
Views
Citations
Formal Verification of Secrecy in Group Key Protocols Using Event-B
(Articles)
Amjad Gawanmeh
,
Sofiène Tahar
,
Leila Jemni Ben Ayed
Int'l J. of Communications, Network and System Sciences
Vol.5 No.3
,March 21, 2012
DOI:
10.4236/ijcns.2012.53021
3,823
Downloads
6,147
Views
Citations
Syntax-Tree Regular Expression Based DFA FormalConstruction
(Articles)
Nazir Ahmad Zafar
,
Fawaz Alsaade
Intelligent Information Management
Vol.4 No.4
,July 27, 2012
DOI:
10.4236/iim.2012.44021
11,961
Downloads
17,641
Views
Citations
Behavior of the Numerical Integration Error
(Articles)
Tchavdar Marinov
,
Joe Omojola
,
Quintel Washington
,
LaQunia Banks
Applied Mathematics
Vol.5 No.10
,May 23, 2014
DOI:
10.4236/am.2014.510133
6,898
Downloads
8,812
Views
Citations
Applying DNA Computation to Error Detection Problem in Rule-Based Systems
(Articles)
Behrouz Madahian
,
Amin Salighehdar
,
Reza Amini
Journal of Intelligent Learning Systems and Applications
Vol.7 No.1
,February 13, 2015
DOI:
10.4236/jilsa.2015.71003
4,470
Downloads
5,508
Views
Citations
Empirical Analysis on the Practical Feasibility of Timber Legality Verification Work in China
(Articles)
Jianquan Li
,
Shaozhi Chen
Open Journal of Political Science
Vol.5 No.3
,April 2, 2015
DOI:
10.4236/ojps.2015.53018
2,920
Downloads
3,666
Views
Citations
Modeling and Simulation of Hydraulic Hammer for Sleeve Valve
(Articles)
Zishan Xu
,
Guoping Yang
Engineering
Vol.8 No.9
,September 29, 2016
DOI:
10.4236/eng.2016.89059
1,792
Downloads
3,338
Views
Citations
Data Processing of Fault Recorder in Power System
(Articles)
Yu Qin
,
Yu Bai
,
Minghao Wen
Energy and Power Engineering
Vol.9 No.4B
,April 6, 2017
DOI:
10.4236/epe.2017.94B006
2,728
Downloads
4,146
Views
Citations
Towards a Categorical Framework for Verifying Design and Implementation of Concurrent Systems
(Articles)
Ming Zhu
,
Jing Li
Journal of Computer and Communications
Vol.6 No.11
,November 27, 2018
DOI:
10.4236/jcc.2018.611022
643
Downloads
1,128
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top