Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A C-Based Variable Length and Vector Pipeline Architecture Design Methodology and Its Application
(Articles)
Takashi Kambe
,
Nobuyuki Araki
Circuits and Systems
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/cs.2012.31002
5,331
Downloads
8,327
Views
Citations
Automated Service Management for Semantic IP Multimedia System [S-IMS]
(Articles)
Kidd S. C. Toh
,
S. M. F. D. Syed Mustapha
Communications and Network
Vol.5 No.3
,August 2, 2013
DOI:
10.4236/cn.2013.53025
3,803
Downloads
5,596
Views
Citations
Seismic Imaging and Reservoir Architecture of Sub-Marine Channel Systems Offshore West Nile Delta of Egypt
(Articles)
Essam Sharaf
,
Ibrahim Korrat
,
Hamdy Seisa
,
Eslam Esmaiel
Open Journal of Geology
Vol.4 No.12
,December 31, 2014
DOI:
10.4236/ojg.2014.412052
6,489
Downloads
8,502
Views
Citations
ADTEM-Architecture Design Testability Evaluation Model to Assess Software Architecture Based on Testability Metrics
(Articles)
Amjad Hudaib
,
Fawaz Fawaz Al-Zaghoul
,
Maha Saadeh
,
Huda Saadeh
Journal of Software Engineering and Applications
Vol.8 No.4
,April 22, 2015
DOI:
10.4236/jsea.2015.84021
3,760
Downloads
5,591
Views
Citations
Phenotyping of Weedy Rice to Assess Root Characteristics Associated with Allelopathy
(Articles)
Brooklyn Schumaker
,
Shandrea Stallworth
,
Auriana Tucker
,
Ziming Yue
,
Te-Ming Tseng
American Journal of Plant Sciences
Vol.12 No.8
,August 9, 2021
DOI:
10.4236/ajps.2021.128084
294
Downloads
1,048
Views
Citations
Intelligent 3-Way Priority-Driven Traffic Light Control System for Emergency Vehicles
(Articles)
Joe Essien
,
Felix Uloko
Open Journal of Applied Sciences
Vol.13 No.8
,August 7, 2023
DOI:
10.4236/ojapps.2023.138095
216
Downloads
1,606
Views
Citations
A Smart Home Energy Monitoring System Based on Internet of Things and Inter Planetary File System for Secure Data Sharing
(Articles)
Aytun Onay
,
Gökhan Ertürk
,
Cem Kıranlı
,
Hande Ateş
,
Yunus E. Isikdemir
Journal of Computer and Communications
Vol.11 No.10
,October 24, 2023
DOI:
10.4236/jcc.2023.1110005
277
Downloads
2,262
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,919
Downloads
4,679
Views
Citations
Analysis of Database Security
(Articles)
Xueying Pan
,
Anthony Obahiaghon
,
Brendan Makar
,
Samuel Wilson
,
Christian Beard
Open Access Library Journal
Vol.11 No.4
,April 15, 2024
DOI:
10.4236/oalib.1111366
166
Downloads
1,263
Views
Citations
The Design of an Intelligent Security Access Control System Based on Fingerprint Sensor FPC1011C
(Articles)
Yan Wang
,
Hongli Liu
,
Jun Feng
Circuits and Systems
Vol.1 No.1
,July 28, 2010
DOI:
10.4236/cs.2010.11005
10,778
Downloads
20,724
Views
Citations
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
(Articles)
Fabio Garzia
,
Natale Tirocchi
,
Michele Scarpiniti
,
Roberto Cusani
Communications and Network
Vol.4 No.3
,August 31, 2012
DOI:
10.4236/cn.2012.43024
4,208
Downloads
7,426
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,596
Downloads
7,214
Views
Citations
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
(Articles)
Xiao-min Ran
,
You-quan Mo
,
Yu-lei Chen
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2039
5,791
Downloads
7,092
Views
Citations
Influences of ±800 kV Yunnan-Guangdong HVDC System on Security and Stability of China Southern Power Grid
(Articles)
Baorong Zhou
,
Xiaoming Jin
,
Chao Hong
,
Pei Zhang
,
Zhigang Wu
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B233
6,283
Downloads
7,869
Views
Citations
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,250
Downloads
6,628
Views
Citations
China’s Food Security Evaluation Based on Factor Analysis
(Articles)
Jie Zou
,
Shiqin Guo
American Journal of Industrial and Business Management
Vol.5 No.6
,June 29, 2015
DOI:
10.4236/ajibm.2015.56044
3,522
Downloads
5,053
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
3,056
Downloads
4,917
Views
Citations
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,799
Downloads
21,559
Views
Citations
An Immunity-Based IOT Environment Security Situation Awareness Model
(Articles)
Yuanquan Shi
,
Tao Li
,
Renfa Li
,
Xiaoning Peng
,
Pengju Tang
Journal of Computer and Communications
Vol.5 No.7
,May 25, 2017
DOI:
10.4236/jcc.2017.57016
1,696
Downloads
3,069
Views
Citations
A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System
(Articles)
Joseph R. Laracy
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5
,May 31, 2017
DOI:
10.4236/ijcns.2017.105005
1,741
Downloads
3,570
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top