Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
808
Downloads
11,254
Views
Citations
Knowledge Discovery in Data: A Case Study
(Articles)
Ahmed Hammad
,
Simaan AbouRizk
Journal of Computer and Communications
Vol.2 No.5
,March 10, 2014
DOI:
10.4236/jcc.2014.25001
4,938
Downloads
8,277
Views
Citations
This article belongs to the Special Issue on
Information Mining Technology
Hybrid Warehouse Model and Solutions for Climate Data Analysis
(Articles)
Hasan Hashim
Journal of Computer and Communications
Vol.8 No.10
,October 30, 2020
DOI:
10.4236/jcc.2020.810008
606
Downloads
1,960
Views
Citations
Taxpayers Fraudulent Behavior Modeling The Use of Datamining in Fiscal Fraud Detecting Moroccan Case
(Articles)
Farid Ameur
,
Mohamed Tkiouat
Applied Mathematics
Vol.3 No.10
,October 12, 2012
DOI:
10.4236/am.2012.310176
5,608
Downloads
8,999
Views
Citations
Improvement of Mining Fuzzy Multiple-Level Association Rules from Quantitative Data
(Articles)
Alireza Mirzaei Nejad Kousari
,
Seyed Javad Mirabedini
,
Ehsan Ghasemkhani
Journal of Software Engineering and Applications
Vol.5 No.3
,March 29, 2012
DOI:
10.4236/jsea.2012.53025
6,832
Downloads
10,647
Views
Citations
Contrasting Vertical Structure of Recent Arctic Warming in Different Data Sets
(Articles)
Igor Esau
,
Vladimir Alexeev
,
Irina Repina
,
Svetlana Sorokina
Atmospheric and Climate Sciences
Vol.3 No.1
,January 30, 2013
DOI:
10.4236/acs.2013.31001
3,775
Downloads
6,394
Views
Citations
Current State and Development of the Soil Health Index in Localities with Various Soil-Climatic Conditions in the Slovak Republic
(Articles)
Jarmila Makovníková
,
Boris Pálka
,
Stanislav Kološta
Journal of Geoscience and Environment Protection
Vol.10 No.6
,June 17, 2022
DOI:
10.4236/gep.2022.106001
138
Downloads
690
Views
Citations
Incidence and Survivability of Acute Lymphocytic Leukemia Patients in the United States: Analysis of SEER Data Set from 2000-2019
(Articles)
Ishan Ghosh
,
Sudipto Mukherjee
Journal of Cancer Therapy
Vol.15 No.4
,April 19, 2024
DOI:
10.4236/jct.2024.154014
105
Downloads
517
Views
Citations
Risk Analysis Technique on Inconsistent Interview Big Data Based on Rough Set Approach
(Articles)
Riasat Azim
,
Abm Munibur Rahman
,
Shawon Barua
,
Israt Jahan
Journal of Data Analysis and Information Processing
Vol.4 No.3
,August 2, 2016
DOI:
10.4236/jdaip.2016.43009
2,198
Downloads
3,820
Views
Citations
Feature Selection for Intrusion Detection Using Random Forest
(Articles)
Md. Al Mehedi Hasan
,
Mohammed Nasser
,
Shamim Ahmad
,
Khademul Islam Molla
Journal of Information Security
Vol.7 No.3
,April 7, 2016
DOI:
10.4236/jis.2016.73009
5,208
Downloads
13,056
Views
Citations
Storing and Searching Metadata for Digital Broadcasting on Set-Top Box Environments
(Articles)
Jong-Hyun Park
,
Ji-Hoon Kang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11005
4,986
Downloads
9,361
Views
Citations
A Heuristic Reputation Based System to Detect Spam Activities in a Social Networking Platform, HRSSSNP
(Articles)
Manoj Rameshchandra Thakur
,
Sugata Sanyal
Social Networking
Vol.2 No.1
,January 30, 2013
DOI:
10.4236/sn.2013.21005
2,982
Downloads
5,683
Views
Citations
Threshold Selection Study on Fisher Discriminant Analysis Used in Exon Prediction for Unbalanced Data Sets
(Articles)
Yutao Ma
,
Yanbing Fang
,
Ping Liu
,
Jianfu Teng
Communications and Network
Vol.5 No.3C
,October 9, 2013
DOI:
10.4236/cn.2013.53B2108
4,960
Downloads
6,558
Views
Citations
Automatic Heart Disease Diagnosis System Based on Artificial Neural Network (ANN) and Adaptive Neuro-Fuzzy Inference Systems (ANFIS) Approaches
(Articles)
Mohammad A. M. Abushariah
,
Assal A. M. Alqudah
,
Omar Y. Adwan
,
Rana M. M. Yousef
Journal of Software Engineering and Applications
Vol.7 No.12
,November 28, 2014
DOI:
10.4236/jsea.2014.712093
6,741
Downloads
9,563
Views
Citations
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
(Articles)
Jiangui Zhang
,
Huibin Qi
Journal of Computer and Communications
Vol.8 No.12
,December 24, 2020
DOI:
10.4236/jcc.2020.812012
511
Downloads
1,829
Views
Citations
Pivot Points in Bivariate Linear Regression
(Articles)
Carl V. Lutzer
,
David L. Farnsworth
Open Journal of Statistics
Vol.11 No.3
,June 9, 2021
DOI:
10.4236/ojs.2021.113023
214
Downloads
1,400
Views
Citations
Early Nutrient Diagnosis of Kentucky Bluegrass Combining Machine Learning and Compositional Methods
(Articles)
Abdo Badra
,
Léon Etienne Parent
American Journal of Plant Sciences
Vol.13 No.9
,September 23, 2022
DOI:
10.4236/ajps.2022.139085
133
Downloads
602
Views
Citations
Difference Sets of Null Density Subsets of N
(Articles)
Dawoud Ahmadi Dastjerdi
,
Maryam Hosseini
Advances in Pure Mathematics
Vol.2 No.3
,May 29, 2012
DOI:
10.4236/apm.2012.23027
4,862
Downloads
8,311
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,634
Downloads
14,661
Views
Citations
An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set
(Articles)
Junyuan Shen
,
Jidong Wang
,
Hao Ai
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41006
6,255
Downloads
11,429
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top