Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Prospect of 5G Technology Applied to Distance Medical Education and Clinical Practice
(Articles)
Jiaqi Xu
,
Yujie Cui
,
Xinfeng Huang
,
Shifu Mo
,
Liangyue Wang
,
Guangjin Su
,
Yong Cheng
Creative Education
Vol.11 No.12
,December 24, 2020
DOI:
10.4236/ce.2020.1112209
606
Downloads
1,742
Views
Citations
An Ecosystem (ECO) Approach on Wisdom Societies and Sociotechnical Systems
(Articles)
Antonio José Balloni
,
Adalberto Mantovani Martiniano de Azevedo
,
Marco Antonio Silveira
Open Journal of Political Science
Vol.2 No.3
,November 1, 2012
DOI:
10.4236/ojps.2012.23004
5,012
Downloads
9,780
Views
Citations
Prediction and Analysis of Society’s Networks
(Articles)
Xin Wang
,
Xinshe Qi
,
Na Wang
,
Na Qu
Journal of Applied Mathematics and Physics
Vol.6 No.1
,January 31, 2018
DOI:
10.4236/jamp.2018.61027
754
Downloads
1,275
Views
Citations
Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society
(Articles)
Dmitrii S. Brazevich
,
Zhanna S. Safronova
,
Tatyana N. Kosheleva
,
Alla V. Biryukova
Open Journal of Social Sciences
Vol.8 No.2
,February 28, 2020
DOI:
10.4236/jss.2020.82018
774
Downloads
2,331
Views
Citations
Social Media and Ghana’s 2012 Election Petition—A Discussion
(Articles)
Kirchuffs Atengble
Advances in Journalism and Communication
Vol.2 No.3
,September 29, 2014
DOI:
10.4236/ajc.2014.23013
4,032
Downloads
5,504
Views
Citations
Informed Consent: From Protection of Freedom to Protection of Digital Assets
(Articles)
Éfren Paulo Porfírio de Sá Lima
,
Alexandre Bento Bernardes de Albuquerque
Beijing Law Review
Vol.15 No.1
,March 26, 2024
DOI:
10.4236/blr.2024.151027
63
Downloads
201
Views
Citations
Hip Joint Pain Caused by Electromagnetic Waves Following an Operation for a Complex Humerus Fracture
(Case Report)
Yoshiro Fujii
Case Reports in Clinical Medicine
Vol.7 No.3
,March 13, 2018
DOI:
10.4236/crcm.2018.73020
643
Downloads
2,038
Views
Citations
Creative Education in the Critical Situations: A View from Russia
(Articles)
Oleg N. Yanitsky
Creative Education
Vol.10 No.10
,October 28, 2019
DOI:
10.4236/ce.2019.1010161
438
Downloads
920
Views
Citations
Democracy, the Open Society and Truth
(Articles)
Jan-Erik Lane
Open Journal of Philosophy
Vol.10 No.1
,February 11, 2020
DOI:
10.4236/ojpp.2020.101009
618
Downloads
2,084
Views
Citations
Modeling and Statistical Properties Research on Online Real-Time Information Transmission Network
(Articles)
Guangming Deng
,
Zhen Jia
Open Journal of Applied Sciences
Vol.4 No.5
,April 8, 2014
DOI:
10.4236/ojapps.2014.45023
5,119
Downloads
7,146
Views
Citations
New Measures of Chinese University Library Knowledge Service under the Cloudization Background
(Articles)
Jiayin Liu
,
Chen Chen
Intelligent Information Management
Vol.10 No.3
,May 11, 2018
DOI:
10.4236/iim.2018.103006
745
Downloads
1,413
Views
Citations
Simulating the Spreading of Two Competing Public Opinion Information on Complex Network
(Articles)
Mengshu Xie
,
Zhen Jia
,
Yanfei Chen
,
Qixiang Deng
Applied Mathematics
Vol.3 No.9
,September 27, 2012
DOI:
10.4236/am.2012.39158
4,085
Downloads
6,644
Views
Citations
Research on Quality Selection and Anti-Piracy Policy of Vendors under Network Externalities
(Articles)
Hui Jiang
Journal of Human Resource and Sustainability Studies
Vol.7 No.1
,February 25, 2019
DOI:
10.4236/jhrss.2019.71002
678
Downloads
1,212
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
641
Downloads
1,649
Views
Citations
Strengthening the Security of Supervised Networks by Automating Hardening Mechanisms
(Articles)
Patrick Dany Bavoua Kenfack
,
Alphonse Binele Abana
,
Emmanuel Tonye
,
Genevieve Elvira Ndjana Leka
Journal of Computer and Communications
Vol.11 No.5
,May 26, 2023
DOI:
10.4236/jcc.2023.115009
73
Downloads
432
Views
Citations
Research on Accurate Information Pushing Based on Human Network
(Articles)
Meijie Yang
,
Yu Wang
,
Xiaorong Hou
Social Networking
Vol.6 No.2
,April 30, 2017
DOI:
10.4236/sn.2017.62011
1,181
Downloads
2,104
Views
Citations
Legal Attributes of IP Attribution Information under China’s PIPL: Clarification of Identifiability Terminology and Operationalisation of Identifiability Criteria
(Articles)
Chaolin Zhang
,
Geng Wang
Beijing Law Review
Vol.13 No.3
,September 23, 2022
DOI:
10.4236/blr.2022.133040
128
Downloads
647
Views
Citations
The Socio-Technical Dynamics of e-Commerce Adoption in the Mainstream Grocery Supermarkets in South Africa
(Articles)
Nhlanhla Mlitwa
,
Nokuzola M. Raqa
iBusiness
Vol.4 No.4
,December 31, 2012
DOI:
10.4236/ib.2012.44044
5,050
Downloads
8,027
Views
Citations
Possible roles of electrical synapse in temporal information processing: A computational study
(Articles)
Xu-Long Wang
,
Xiao-Dong Jiang
,
Pei-Ji Liang
Journal of Biomedical Science and Engineering
Vol.1 No.1
,June 6, 2008
DOI:
10.4236/jbise.2008.11005
5,041
Downloads
9,422
Views
Citations
Two-Tier GCT Based Approach for Attack Detection
(Articles)
Zhiwen Wang
,
Qin Xia
,
Ke Lu
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11009
4,623
Downloads
8,141
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top