Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Relationship between Big Data and Decision Making. A Systematic Literature Review
(Articles)
Carlo Torre
,
Gianluca Maria Guazzo
,
Vilma Çekani
,
Vincenzo Bacco
Journal of Service Science and Management
Vol.15 No.2
,April 29, 2022
DOI:
10.4236/jssm.2022.152007
534
Downloads
2,877
Views
Citations
Data Integrity and Risk
(Articles)
Sasidhar Duggineni
Open Journal of Optimization
Vol.12 No.2
,June 7, 2023
DOI:
10.4236/ojop.2023.122003
418
Downloads
2,663
Views
Citations
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
(Articles)
Debnath BHATTACHARYYA
,
Jhuma DUTTA
,
Poulami DAS
,
Samir Kumar BANDYOPADHYAY
,
Tai-hoon KIM
Int'l J. of Communications, Network and System Sciences
Vol.2 No.5
,August 21, 2009
DOI:
10.4236/ijcns.2009.25040
5,423
Downloads
9,675
Views
Citations
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks
(Articles)
Vivaksha Jariwala
,
Vishal Singh
,
Prafulla Kumar
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 10, 2014
DOI:
10.4236/jis.2014.51001
3,715
Downloads
6,597
Views
Citations
Research and Case Analysis of Apriori Algorithm Based on Mining Frequent Item-Sets
(Articles)
Haoyu Xie
Open Journal of Social Sciences
Vol.9 No.4
,April 29, 2021
DOI:
10.4236/jss.2021.94034
1,520
Downloads
4,375
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,947
Downloads
4,902
Views
Citations
A Bioinformatics-Inspired Adaptation to Ukkonen’s Edit Distance Calculating Algorithm and Its Applicability Towards Distributed Data Mining
(Articles)
Johnson Bruce
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11002
6,697
Downloads
10,315
Views
Citations
Chlorophyll-a Estimation in Tachibana Bay by Data Fusion of GOCI and MODIS Using Linear Combination Index Algorithm
(Articles)
Yuji Sakuno
,
Keita Makio
,
Kazuhiko Koike
,
Maung-Saw-Htoo-Thaw  
,
Shigeru Kitahara
Advances in Remote Sensing
Vol.2 No.4
,December 5, 2013
DOI:
10.4236/ars.2013.24032
3,751
Downloads
6,872
Views
Citations
Developing an Evolutionary Algorithm to Search for an Optimal Multi-Mother Wavelet Packets Combination
(Articles)
Ohad Bar Siman Tov
,
J. David Schaffer
,
Kenneth J. McLeod
Journal of Biomedical Science and Engineering
Vol.8 No.7
,July 28, 2015
DOI:
10.4236/jbise.2015.87043
2,995
Downloads
3,887
Views
Citations
The Influence of Abnormal Data on Relay Protection
(Articles)
Xuze Zhang
,
Xiaoning Kang
,
Yali Ma
,
Hao Wang
,
Qiyue Huang
Energy and Power Engineering
Vol.9 No.4B
,April 6, 2017
DOI:
10.4236/epe.2017.94B012
2,508
Downloads
3,011
Views
Citations
Research on the Construction of Enterprise Accounting Data Analysis Platform Based on Cloud Computing
(Articles)
Weihua Zhang
Open Journal of Business and Management
Vol.10 No.6
,November 11, 2022
DOI:
10.4236/ojbm.2022.106156
124
Downloads
509
Views
Citations
A Data-Placement Strategy Based on Genetic Algorithm in Cloud Computing
(Articles)
Qiang Xu
,
Zhengquan Xu
,
Tao Wang
International Journal of Intelligence Science
Vol.5 No.3
,March 25, 2015
DOI:
10.4236/ijis.2015.53013
5,355
Downloads
7,363
Views
Citations
A Discrete-Time Traffic and Topology Adaptive Routing Algorithm for LEO Satellite Networks
(Articles)
Wenjuan Jiang
,
Peng Zong
Int'l J. of Communications, Network and System Sciences
Vol.4 No.1
,January 28, 2011
DOI:
10.4236/ijcns.2011.41005
7,158
Downloads
11,901
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
8,764
Downloads
13,513
Views
Citations
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
3,046
Downloads
7,635
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
205
Downloads
1,287
Views
Citations
Effect of Network Traffic on IPS Performance
(Articles)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32019
6,461
Downloads
10,615
Views
Citations
A State of Art Analysis of Telecommunication Data by k-Means and k-Medoids Clustering Algorithms
(Articles)
T. Velmurugan
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61019
1,018
Downloads
3,324
Views
Citations
Analysis of Secured Cloud Data Storage Model for Information
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Udo Chukwuebuka Chigozie
,
Duroha Austin Ekekwe
,
Georgina Chekwube Nwankwo
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175017
36
Downloads
110
Views
Citations
Impact of Information Security Management System on Firm Financial Performance: Perspective of Corporate Reputation and Branding
(Articles)
Syed Asad Abbas Bokhari
,
Shahid Manzoor
American Journal of Industrial and Business Management
Vol.12 No.5
,May 26, 2022
DOI:
10.4236/ajibm.2022.125048
449
Downloads
3,010
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top