Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
(Articles)
Debnath BHATTACHARYYA
,
Jhuma DUTTA
,
Poulami DAS
,
Samir Kumar BANDYOPADHYAY
,
Tai-hoon KIM
Int'l J. of Communications, Network and System Sciences
Vol.2 No.5
,August 21, 2009
DOI:
10.4236/ijcns.2009.25040
5,417
Downloads
9,659
Views
Citations
Analytical Engineering for Data Stream
(Articles)
Rogério Rossi
,
Kechi Hirama
Journal of Computer and Communications
Vol.10 No.7
,July 18, 2022
DOI:
10.4236/jcc.2022.107002
133
Downloads
629
Views
Citations
CLUBAS: An Algorithm and Java Based Tool for Software Bug Classification Using Bug Attributes Similarities
(Articles)
Naresh Kumar Nagwani
,
Shrish Verma
Journal of Software Engineering and Applications
Vol.5 No.6
,June 19, 2012
DOI:
10.4236/jsea.2012.56050
6,788
Downloads
11,380
Views
Citations
An Effective Network Traffic Data Control Using Improved Apriori Rule Mining
(Articles)
Subbiyan Prakash
,
Murugasamy Vijayakumar
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710269
2,114
Downloads
3,251
Views
Citations
Anonymous Authentication for Secure Mobile Agent Based Internet Business
(Articles)
Sivaraman Audithan
,
Thanjavur Swaminathan Murunya
,
Pandi Vijayakumar
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78124
1,467
Downloads
2,302
Views
Citations
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets
(Articles)
Bhavesh Borisaniya
,
Dhiren Patel
Journal of Information Security
Vol.6 No.3
,July 28, 2015
DOI:
10.4236/jis.2015.63025
6,552
Downloads
8,698
Views
Citations
K-Means Graph Database Clustering and Matching for Fingerprint Recognition
(Articles)
Vaishali Pawar
,
Mukesh Zaveri
Intelligent Information Management
Vol.7 No.4
,July 30, 2015
DOI:
10.4236/iim.2015.74019
5,879
Downloads
7,238
Views
Citations
A Quantitative Analysis of Collision Resolution Protocol for Wireless Sensor Network
(Articles)
Reema Patel
,
Dhiren Patel
Journal of Software Engineering and Applications
Vol.8 No.8
,August 13, 2015
DOI:
10.4236/jsea.2015.88036
3,977
Downloads
4,818
Views
Citations
Graph Based Filtering and Matching for Symbol Recognition
(Articles)
Vaishali Pawar
,
Mukesh Zaveri
Journal of Signal and Information Processing
Vol.9 No.3
,August 9, 2018
DOI:
10.4236/jsip.2018.93010
986
Downloads
2,013
Views
Citations
Fuzzy Logic Recursive Gaussian Denoising of Color Video Sequences via Shot Change Detection
(Articles)
V. Sasikala
,
N. UmaMaheswari
,
R. Venkatesh
Circuits and Systems
Vol.7 No.8
,June 15, 2016
DOI:
10.4236/cs.2016.78136
1,576
Downloads
2,146
Views
Citations
Robust Digital Audio Watermarking Based on SVD and Modified Firefly Algorithm
(Articles)
Sayed Afzal Mortaza Rizvi
,
Sanjay Pratap Singh Chauhan
Journal of Information Security
Vol.9 No.1
,November 22, 2017
DOI:
10.4236/jis.2018.91001
1,129
Downloads
2,183
Views
Citations
Analysis of Fusion Process Model—Case Study
(Articles)
Rupinder Kaur
,
Jyotsna Sengupta
Journal of Software Engineering and Applications
Vol.5 No.3
,March 29, 2012
DOI:
10.4236/jsea.2012.53019
6,745
Downloads
9,762
Views
Citations
A Model for Software Product Quality Prediction
(Articles)
Brijendra Singh
,
Suresh Prasad Kannojia
Journal of Software Engineering and Applications
Vol.5 No.6
,June 19, 2012
DOI:
10.4236/jsea.2012.56046
6,225
Downloads
10,661
Views
Citations
Analytical Models for Delivery Performance of a Supplier or a Service Provider
(Articles)
M. Chandra Paul
,
A. Vinaya Babu
,
D. Mallikarjuna Reddy
,
Malla Reddy Perati
American Journal of Industrial and Business Management
Vol.3 No.6A
,October 29, 2013
DOI:
10.4236/ajibm.2013.36A005
3,635
Downloads
5,835
Views
Citations
This article belongs to the Special Issue on
A Cross-Layer Optimization Framework for Energy Efficiency in Wireless Sensor Networks
(Articles)
Karuna Babber
,
Rajneesh Randhawa
Wireless Sensor Network
Vol.9 No.6
,June 28, 2017
DOI:
10.4236/wsn.2017.96011
1,957
Downloads
4,079
Views
Citations
Assessment of School Infrastructure at Primary and Upper Primary Level: A Geospatial Analysis
(Articles)
Gouri Sankar Bhunia
,
Pravat Kumar Shit
,
Soumen Dubai
Journal of Geographic Information System
Vol.4 No.5
,November 1, 2012
DOI:
10.4236/jgis.2012.45047
8,564
Downloads
13,926
Views
Citations
A Homomorphic Crypto System for Electronic Election Schemes
(Articles)
Kannan Balasubramanian
,
M. Jayanthi
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710272
2,397
Downloads
4,380
Views
Citations
Biochemical Characterization of Detoxifying Enzymes in Dimethoate-Resistant Strains of Melon Aphid,
Aphis gossypii
(Hemiptera: Aphididae)
(Articles)
Dayanandam Lokeshwari
,
Nallur Kothandaraman Krishna Kumar
,
Hanumanthappa Manjunatha
,
Seshadri Shivashankar
Advances in Entomology
Vol.4 No.3
,July 22, 2016
DOI:
10.4236/ae.2016.43018
1,720
Downloads
3,147
Views
Citations
Link Utilization Based Multicast Congestion Control
(Articles)
Manisha Manjul
,
Rajesh Mishra
,
Joytsna
Communications and Network
Vol.5 No.3C
,January 15, 2014
DOI:
10.4236/cn.2013.53B2116
6,077
Downloads
7,725
Views
Citations
Two Pass Port Scan Detection Technique Based on Connection Pattern and Status on Sampled Data
(Articles)
Sunil Kumar
,
Kamlesh Dutta
,
Ankit Asati
Journal of Computer and Communications
Vol.3 No.9
,September 1, 2015
DOI:
10.4236/jcc.2015.39001
3,861
Downloads
4,762
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top