Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Relationship between Big Data and Decision Making. A Systematic Literature Review
(Articles)
Carlo Torre
,
Gianluca Maria Guazzo
,
Vilma Çekani
,
Vincenzo Bacco
Journal of Service Science and Management
Vol.15 No.2
,April 29, 2022
DOI:
10.4236/jssm.2022.152007
485
Downloads
2,968
Views
Citations
Data Integrity and Risk
(Articles)
Sasidhar Duggineni
Open Journal of Optimization
Vol.12 No.2
,June 7, 2023
DOI:
10.4236/ojop.2023.122003
279
Downloads
2,096
Views
Citations
Research and Case Analysis of Apriori Algorithm Based on Mining Frequent Item-Sets
(Articles)
Haoyu Xie
Open Journal of Social Sciences
Vol.9 No.4
,April 29, 2021
DOI:
10.4236/jss.2021.94034
1,409
Downloads
5,073
Views
Citations
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
(Articles)
Debnath BHATTACHARYYA
,
Jhuma DUTTA
,
Poulami DAS
,
Samir Kumar BANDYOPADHYAY
,
Tai-hoon KIM
Int'l J. of Communications, Network and System Sciences
Vol.2 No.5
,August 21, 2009
DOI:
10.4236/ijcns.2009.25040
5,403
Downloads
9,767
Views
Citations
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks
(Articles)
Vivaksha Jariwala
,
Vishal Singh
,
Prafulla Kumar
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 10, 2014
DOI:
10.4236/jis.2014.51001
3,711
Downloads
6,657
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,934
Downloads
4,989
Views
Citations
A Bioinformatics-Inspired Adaptation to Ukkonen’s Edit Distance Calculating Algorithm and Its Applicability Towards Distributed Data Mining
(Articles)
Johnson Bruce
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11002
6,688
Downloads
10,394
Views
Citations
Chlorophyll-a Estimation in Tachibana Bay by Data Fusion of GOCI and MODIS Using Linear Combination Index Algorithm
(Articles)
Yuji Sakuno
,
Keita Makio
,
Kazuhiko Koike
,
Maung-Saw-Htoo-Thaw  
,
Shigeru Kitahara
Advances in Remote Sensing
Vol.2 No.4
,December 5, 2013
DOI:
10.4236/ars.2013.24032
3,744
Downloads
6,992
Views
Citations
Developing an Evolutionary Algorithm to Search for an Optimal Multi-Mother Wavelet Packets Combination
(Articles)
Ohad Bar Siman Tov
,
J. David Schaffer
,
Kenneth J. McLeod
Journal of Biomedical Science and Engineering
Vol.8 No.7
,July 28, 2015
DOI:
10.4236/jbise.2015.87043
2,987
Downloads
3,931
Views
Citations
The Influence of Abnormal Data on Relay Protection
(Articles)
Xuze Zhang
,
Xiaoning Kang
,
Yali Ma
,
Hao Wang
,
Qiyue Huang
Energy and Power Engineering
Vol.9 No.4B
,April 6, 2017
DOI:
10.4236/epe.2017.94B012
2,501
Downloads
3,043
Views
Citations
Research on the Construction of Enterprise Accounting Data Analysis Platform Based on Cloud Computing
(Articles)
Weihua Zhang
Open Journal of Business and Management
Vol.10 No.6
,November 11, 2022
DOI:
10.4236/ojbm.2022.106156
111
Downloads
516
Views
Citations
A Data-Placement Strategy Based on Genetic Algorithm in Cloud Computing
(Articles)
Qiang Xu
,
Zhengquan Xu
,
Tao Wang
International Journal of Intelligence Science
Vol.5 No.3
,March 25, 2015
DOI:
10.4236/ijis.2015.53013
5,336
Downloads
7,672
Views
Citations
A Discrete-Time Traffic and Topology Adaptive Routing Algorithm for LEO Satellite Networks
(Articles)
Wenjuan Jiang
,
Peng Zong
Int'l J. of Communications, Network and System Sciences
Vol.4 No.1
,January 28, 2011
DOI:
10.4236/ijcns.2011.41005
7,115
Downloads
12,423
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
8,684
Downloads
14,865
Views
Citations
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
2,989
Downloads
8,239
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
197
Downloads
1,297
Views
Citations
Effect of Network Traffic on IPS Performance
(Articles)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32019
6,433
Downloads
11,162
Views
Citations
A State of Art Analysis of Telecommunication Data by k-Means and k-Medoids Clustering Algorithms
(Articles)
T. Velmurugan
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61019
1,002
Downloads
3,423
Views
Citations
Impact of Information Security Management System on Firm Financial Performance: Perspective of Corporate Reputation and Branding
(Articles)
Syed Asad Abbas Bokhari
,
Shahid Manzoor
American Journal of Industrial and Business Management
Vol.12 No.5
,May 26, 2022
DOI:
10.4236/ajibm.2022.125048
420
Downloads
3,027
Views
Citations
On Secure Digital Image Watermarking Techniques
(Articles)
Manjit Thapa
,
Sandeep Kumar Sood
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24017
8,268
Downloads
18,386
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top