Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Critical Evaluation of Linear Dimensionality Reduction Techniques for Cardiac Arrhythmia Classification
(Articles)
Rekha Rajagopal
,
Vidhyapriya Ranganathan
Circuits and Systems
Vol.7 No.9
,July 28, 2016
DOI:
10.4236/cs.2016.79225
1,452
Downloads
2,567
Views
Citations
An Improvement on Data-Driven Pole Placement for State Feedback Control and Model Identification
(Articles)
Pyone Ei Ei Shwe
,
Shigeru Yamamoto
Intelligent Control and Automation
Vol.8 No.3
,July 18, 2017
DOI:
10.4236/ica.2017.83011
1,402
Downloads
2,912
Views
Citations
Life: A Huge Archive Electronic Archive Has Become an Urgent Necessity in the Face of Enormous Technological Advances
(Articles)
Ahmed Yousef Laarfi
Journal of Computer and Communications
Vol.8 No.4
,March 31, 2020
DOI:
10.4236/jcc.2020.84001
893
Downloads
1,873
Views
Citations
Industrial 4.0 and an Application in Corum Industry
(Articles)
Hulya Cagiran Kendirli
,
Emre Berksun
Open Journal of Business and Management
Vol.8 No.4
,June 5, 2020
DOI:
10.4236/ojbm.2020.84087
847
Downloads
2,151
Views
Citations
Authoritative and Unbiased Responses to Geographic Queries
(Articles)
Mahalingam Ramkumar
,
Naresh Adhikari
Journal of Information Security
Vol.13 No.3
,June 30, 2022
DOI:
10.4236/jis.2022.133007
173
Downloads
640
Views
Citations
Integrating the Informal Social Security Arrangements into the Formal Sector in Botswana
(Articles)
Kholisani Solo
Beijing Law Review
Vol.12 No.2
,June 7, 2021
DOI:
10.4236/blr.2021.122031
356
Downloads
2,214
Views
Citations
Information Security in the Cloud: Emerging Trends and Challenges
(Articles)
Keerthana Chitreddy
,
Andrew Mikhl Anthony
,
Chinna Manikanta Bandaru
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/ijcns.2024.175005
162
Downloads
989
Views
Citations
Development of a Wireless Environmental Data Acquisition Prototype Adopting Agile Practices: An Experience Report
(Articles)
Paul Celicourt
,
Richard Sam
,
Michael Piasecki
Journal of Software Engineering and Applications
Vol.9 No.10
,October 10, 2016
DOI:
10.4236/jsea.2016.910031
1,949
Downloads
3,437
Views
Citations
Autonomous Data Exchange: The Malady and a Possible Path to Its Cure
(Articles)
Eli Rohn
Intelligent Information Management
Vol.7 No.1
,January 28, 2015
DOI:
10.4236/iim.2015.71003
7,935
Downloads
8,665
Views
Citations
Theoretical Reconstruction of Accounting Information Systems in the Big Data Era
(Articles)
Yueqi Huang
iBusiness
Vol.16 No.4
,December 3, 2024
DOI:
10.4236/ib.2024.164015
72
Downloads
475
Views
Citations
Third-Party Information Security: Generic Qualitative Inquiry in Banking and Financial Services
(Articles)
Genemar Arthur Lazo
Journal of Financial Risk Management
Vol.13 No.3
,September 27, 2024
DOI:
10.4236/jfrm.2024.133027
80
Downloads
506
Views
Citations
Security Engineering of SOA Applications Via Reliability Patterns
(Articles)
Luigi Coppolino
,
Luigi Romano
,
Valerio Vianello
Journal of Software Engineering and Applications
Vol.4 No.1
,January 27, 2011
DOI:
10.4236/jsea.2011.41001
5,944
Downloads
11,149
Views
Citations
On the Dependability of Highly Heterogeneous and Open Distributed Systems
(Articles)
Naftaly H. Minsky
Journal of Software Engineering and Applications
Vol.11 No.1
,January 30, 2018
DOI:
10.4236/jsea.2018.111003
835
Downloads
1,626
Views
Citations
This article belongs to the Special Issue on
Concurrent, Parallel and Distributed Systems
Research and Teaching Applications of Remote Sensing Integrated with GIS: Examples from the Field
(Articles)
Laura C. Loyola
,
Jason T. Knowles
,
Andrew J. Marx
,
Ryan McAlinden
,
Steven D. Fleming
Journal of Geographic Information System
Vol.11 No.6
,December 13, 2019
DOI:
10.4236/jgis.2019.116041
802
Downloads
2,752
Views
Citations
This article belongs to the Special Issue on
Integration of Remote Sensing and GIS
Characterization of Farming Systems Using Land as a Driver of Production and Sustainability in the Vhembe District, Limpopo, South Africa
(Articles)
Fenji Materechera
,
Mary Cathrine Scholes
Agricultural Sciences
Vol.12 No.11
,November 30, 2021
DOI:
10.4236/as.2021.1211087
420
Downloads
2,434
Views
Citations
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
(Articles)
Nana Li
,
Yong Wang
,
Pengfei Shen
,
Shuangfei Li
,
Lin Zhou
Journal of Computer and Communications
Vol.10 No.4
,April 7, 2022
DOI:
10.4236/jcc.2022.104001
207
Downloads
892
Views
Citations
Tailored Partitioning for Healthcare Big Data: A Novel Technique for Efficient Data Management and Hash Retrieval in RDBMS Relational Architectures
(Articles)
Ehsan Soltanmohammadi
,
Neset Hikmet
,
Dilek Akgun
Journal of Data Analysis and Information Processing
Vol.13 No.1
,January 22, 2025
DOI:
10.4236/jdaip.2025.131003
74
Downloads
438
Views
Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
5,034
Downloads
7,480
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,446
Downloads
8,751
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,942
Downloads
8,776
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
<
...
3
4
5
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top