Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Relevance of Advanced Plant Disease Detection Techniques in Disease and Pest Management for Ensuring Food Security and Their Implication: A Review
(Articles)
Matthew Abu John
,
Ibukunoluwa Bankole
,
Oluwatayo Ajayi-Moses
,
Tofunmi Ijila
,
Timilehin Jeje
,
Patil Lalit
American Journal of Plant Sciences
Vol.14 No.11
,November 17, 2023
DOI:
10.4236/ajps.2023.1411086
142
Downloads
851
Views
Citations
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia
(Articles)
Amir Mohamed Talib
,
Fahad Omar Alomary
,
Hanan Fouad Alwadi
,
Rawan Rashed Albusayli
Journal of Information Security
Vol.9 No.4
,October 26, 2018
DOI:
10.4236/jis.2018.94021
1,519
Downloads
3,547
Views
Citations
Putting Green Lean Six Sigma Framework into Practice in a Jute Industry of Bangladesh: A Case Study
(Articles)
Subrata Talapatra
,
Anindya Gaine
American Journal of Industrial and Business Management
Vol.9 No.12
,December 17, 2019
DOI:
10.4236/ajibm.2019.912144
1,226
Downloads
3,505
Views
Citations
Development of a Six Sigma Infrastructure for Trabeculectomy Process
(Articles)
Can Öztürker
,
İbrahim Şahbaz
,
Zeynep Karaarası Öztürker
,
Mehmet Tolga Taner
,
Şükrü Bayraktar
,
Gamze Kağan
American Journal of Operations Research
Vol.4 No.4
,July 10, 2014
DOI:
10.4236/ajor.2014.44024
2,517
Downloads
3,839
Views
Citations
A Comprehensive Evaluation of Eye Surgery Performance by Sigma Quality Level for Eye Care Hospitals in Turkey
(Articles)
İbrahim Şahbaz
,
Mehmet Tolga Taner
,
Gamze Kağan
,
Engin Erbaş
American Journal of Operations Research
Vol.5 No.5
,August 19, 2015
DOI:
10.4236/ajor.2015.55028
2,793
Downloads
3,599
Views
Citations
Quantitative Security Evaluation for Software System from Vulnerability Database
(Articles)
Hiroyuki Okamura
,
Masataka Tokuzane
,
Tadashi Dohi
Journal of Software Engineering and Applications
Vol.6 No.4A
,April 23, 2013
DOI:
10.4236/jsea.2013.64A003
4,406
Downloads
7,005
Views
Citations
This article belongs to the Special Issue on
Software Dependability
A Framework for Continuous Improvement in Supply Chain Management Education
(Articles)
Kaitie Perrine
,
Sime Curkovic
Creative Education
Vol.13 No.2
,February 16, 2022
DOI:
10.4236/ce.2022.132027
316
Downloads
1,681
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,550
Downloads
10,382
Views
Citations
Virtualization Security, Strategy and Management
(Articles)
Simon Tran
,
Stuart Gold
Int'l J. of Communications, Network and System Sciences
Vol.7 No.10
,October 16, 2014
DOI:
10.4236/ijcns.2014.710043
5,002
Downloads
6,404
Views
Citations
This article belongs to the Special Issue on
Virtual Network
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
(Articles)
Fauziyah Fauziyah
,
Zhaosun Wang
,
Gabriel Joy
Journal of Information Security
Vol.13 No.4
,September 23, 2022
DOI:
10.4236/jis.2022.134016
361
Downloads
1,985
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,905
Downloads
5,183
Views
Citations
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
(Articles)
Sina Ahmadi
Journal of Information Security
Vol.15 No.2
,March 27, 2024
DOI:
10.4236/jis.2024.152010
60
Downloads
596
Views
Citations
Case Study on the Lean Six Sigma Management for Information Technology Service Management Project of G Commercial Bank
(Articles)
Yongmei Xu
,
Fan Zhang
,
Xiaowen Ye
Technology and Investment
Vol.4 No.2
,May 24, 2013
DOI:
10.4236/ti.2013.42009
8,260
Downloads
13,547
Views
Citations
Evaluation of Laboratory Performance with Quality Indicators in Infectious Disease Hospital, Kano, Nigeria
(Articles)
Feyisayo Ebenezer Jegede
,
Henry Akwen Mbah
,
Mansur Aminu
,
Timothy Nathaniel Yakubu
,
Kwasi Torpey
Open Journal of Clinical Diagnostics
Vol.5 No.1
,February 11, 2015
DOI:
10.4236/ojcd.2015.51001
5,648
Downloads
8,824
Views
Citations
Reasons for Operational Excellence Deployment Failures and How to Avoid Them
(Articles)
Bruno G. Rüttimann
,
Martin T. Stöckli
Journal of Service Science and Management
Vol.8 No.4
,August 24, 2015
DOI:
10.4236/jssm.2015.84061
3,999
Downloads
5,432
Views
Citations
Lean, Six Sigma and Lean Six Sigma in Higher Education: A Review of Experiences around the World
(Articles)
Sylvie Nadeau
American Journal of Industrial and Business Management
Vol.7 No.5
,May 22, 2017
DOI:
10.4236/ajibm.2017.75044
3,824
Downloads
9,168
Views
Citations
Adapting Ethics and Compliance Programs for Modern Management Tools
(Articles)
Valeriu Deciu
American Journal of Industrial and Business Management
Vol.12 No.7
,July 19, 2022
DOI:
10.4236/ajibm.2022.127066
173
Downloads
808
Views
Citations
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
(Articles)
Abdulrahman H. Altalhi
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41011
5,175
Downloads
8,926
Views
Citations
An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks
(Articles)
Benamar Kadri
,
Djilalli Moussaoui
,
Mohammed Feham
,
Abdellah Mhammed
Wireless Sensor Network
Vol.4 No.6
,June 13, 2012
DOI:
10.4236/wsn.2012.46022
5,433
Downloads
10,877
Views
Citations
Competence of Security Officers in the Management of National Examinations in Secondary Schools in Eastern Province, Kenya
(Articles)
George M. George M. Muthaa
,
Peter K. Muriungi
,
Eunice Kagendo Njue
Open Journal of Social Sciences
Vol.2 No.12
,December 22, 2014
DOI:
10.4236/jss.2014.212010
3,544
Downloads
4,828
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top