Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Education Web Information Retrieval and Classification with Big Data Analysis
(Articles)
Rurui Zhou
Creative Education
Vol.7 No.18
,December 29, 2016
DOI:
10.4236/ce.2016.718265
1,741
Downloads
3,245
Views
Citations
Randomized Constraint Limit Linear Programming in Risk Management
(Articles)
Dennis Ridley
,
Abdullah Khan
Journal of Applied Mathematics and Physics
Vol.8 No.11
,November 30, 2020
DOI:
10.4236/jamp.2020.811199
434
Downloads
1,438
Views
Citations
Research on the Recommending Learning Model in the Intelligent Age
(Articles)
Haitang Lin
Open Access Library Journal
Vol.11 No.1
,January 25, 2024
DOI:
10.4236/oalib.1111132
58
Downloads
305
Views
Citations
Data-Driven Smart Agriculture: Use of AI/ML Technologies for Enhancing Crop Prediction
(Articles)
Lamia Islam
,
Tasnim Sultana
,
Raisa Tasneem
Agricultural Sciences
Vol.16 No.3
,March 5, 2025
DOI:
10.4236/as.2025.163021
96
Downloads
601
Views
Citations
Secure Signature Protocol
(Articles)
Shundong LI
,
Daoshun WANG
,
Yiqi DAI
Intelligent Information Management
Vol.1 No.3
,December 29, 2009
DOI:
10.4236/iim.2009.13026
5,457
Downloads
8,291
Views
Citations
Secure Messaging Implementation in OpenSC
(Articles)
Maurizio Talamo
,
Maulahikmah Galinium
,
Christian H. Schunck
,
Franco Arcieri
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34032
5,219
Downloads
8,677
Views
Citations
Private Personal Information Verification
(Articles)
Hoang Giang Do
,
Wee Keong Ng
Journal of Information Security
Vol.8 No.3
,July 18, 2017
DOI:
10.4236/jis.2017.83015
1,228
Downloads
3,605
Views
Citations
Erratum to “Scientific Foundation of Real-Time Input-Output Tabulation Method and AI” [American Journal of Industrial and Business Management 9 (2019) 1831-1872]
—Organic Combinations and Connections between the Optimal Input-Output Planning Model and Automation, Information, Intellectualization, Big Data, New Cloud Computing Technology, Internet of Things or New Internet Industry & AI Technology
(Articles)
Ning Kang
American Journal of Industrial and Business Management
Vol.11 No.7
,July 12, 2021
DOI:
10.4236/ajibm.2021.117047
351
Downloads
1,123
Views
Citations
Unveiling the Predictive Capabilities of Machine Learning in Air Quality Data Analysis: A Comparative Evaluation of Different Regression Models
(Articles)
Mosammat Mustari Khanaum
,
Md Saidul Borhan
,
Farzana Ferdoush
,
Mohammed Ali Nause Russel
,
Mustafa Murshed
Open Journal of Air Pollution
Vol.12 No.4
,December 11, 2023
DOI:
10.4236/ojap.2023.124009
155
Downloads
635
Views
Citations
Artificial Intelligence in the Stock Market: The Trends and Challenges Regarding AI-Driven Investments
(Articles)
Ness Kotecha
Open Journal of Business and Management
Vol.13 No.2
,February 8, 2025
DOI:
10.4236/ojbm.2025.132037
278
Downloads
2,136
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
303
Downloads
1,563
Views
Citations
Secure and Efficient Outsourced Computation in Cloud Computing Environments
(Articles)
Varun Dixit
,
Davinderjit Kaur
Journal of Software Engineering and Applications
Vol.17 No.9
,September 27, 2024
DOI:
10.4236/jsea.2024.179040
91
Downloads
524
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
9,044
Downloads
14,083
Views
Citations
Efficient Three-Party Quantum Secure Direct Communication with EPR Pairs
(Articles)
Xunru Yin
,
Wenping Ma
,
Dongsu Shen
,
Chaoyang Hao
Journal of Quantum Information Science
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/jqis.2013.31001
3,579
Downloads
6,699
Views
Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks
(Articles)
Hyeon Myeong Choi
,
Su Man Nam
,
Tae Ho Cho
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53005
5,238
Downloads
9,878
Views
Citations
Design of Secure Microsystems Using Current-to-Data Dependency Analysis
(Articles)
Haleh Vahedi
,
Radu Muresan
,
Stefano Gregori
Circuits and Systems
Vol.4 No.2
,April 17, 2013
DOI:
10.4236/cs.2013.42019
3,580
Downloads
5,945
Views
Citations
Secured Transmission of ECG Signals: Numerical and Electronic Simulations
(Articles)
Gutenbert Kenfack
,
Alain Tiedeu
Journal of Signal and Information Processing
Vol.4 No.2
,May 8, 2013
DOI:
10.4236/jsip.2013.42023
5,189
Downloads
8,184
Views
Citations
A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World
(Articles)
Terry C. House
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2087
5,023
Downloads
6,296
Views
Citations
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
(Articles)
Sankita J. Patel
,
Ankit Chouhan
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 17, 2014
DOI:
10.4236/jis.2014.51002
5,576
Downloads
9,441
Views
Citations
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household
(Articles)
Xiangdong Hu
,
Hongru Xu
,
Kaimin Han
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27001
3,433
Downloads
4,655
Views
Citations
<
...
8
9
10
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top