Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
SEDSR: Soft Error Detection Using Software Redundancy
(Articles)
Seyyed Amir Asghari
,
Atena Abdi
,
Hassan Taheri
,
Hossein Pedram
,
Saadat Pourmozaffari
Journal of Software Engineering and Applications
Vol.5 No.9
,September 14, 2012
DOI:
10.4236/jsea.2012.59078
4,333
Downloads
7,262
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,778
Downloads
8,400
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Category-Based Intrusion Detection Using PCA
(Articles)
Gholam Reza Zargar
,
Tania Baghaie
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34033
5,645
Downloads
9,345
Views
Citations
Loss-of-Main Monitoring and Detection for Distributed Generations Using Dynamic Principal Component Analysis
(Articles)
Yuanjun Guo
,
Kang Li
,
D. M. Laverty
Journal of Power and Energy Engineering
Vol.2 No.4
,April 21, 2014
DOI:
10.4236/jpee.2014.24057
5,501
Downloads
6,707
Views
Citations
Mixed Model, AMMI and Eberhart-Russel Comparison via Simulation on Genotype × Environment Interaction Study in Sugarcane
(Articles)
Guilherme Moraes Ferraudo
,
Dilermando Perecin
Applied Mathematics
Vol.5 No.14
,July 28, 2014
DOI:
10.4236/am.2014.514205
5,050
Downloads
7,234
Views
Citations
This article belongs to the Special Issue on
Experimental Design
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,161
Downloads
5,527
Views
Citations
Spatiotemporal Analysis of Urban Sprawl and Its Contributions to Climate and Environment of Peshawar Using Remote Sensing and GIS Techniques
(Articles)
Rashid Mehmood
,
Syed Amer Mehmood
,
Muhammad Atif Butt
,
Imtiyaz Younas
,
Muhammad Adrees
Journal of Geographic Information System
Vol.8 No.2
,March 23, 2016
DOI:
10.4236/jgis.2016.82013
3,664
Downloads
6,055
Views
Citations
Optical-Elevation Data Co-Registration and Classification-Based Height Normalization for Building Detection in Stereo VHR Images
(Articles)
Alaeldin Suliman
,
Yun Zhang
Advances in Remote Sensing
Vol.6 No.2
,June 9, 2017
DOI:
10.4236/ars.2017.62008
1,537
Downloads
2,528
Views
Citations
Anomaly Detection of Store Cash Register Data Based on Improved LOF Algorithm
(Articles)
Ke Long
,
Yuhang Wu
,
Yufeng Gui
Applied Mathematics
Vol.9 No.6
,June 29, 2018
DOI:
10.4236/am.2018.96049
1,106
Downloads
2,239
Views
Citations
Heart Disease Detection by Using Machine Learning Algorithms and a Real-Time Cardiovascular Health Monitoring System
(Articles)
Shadman Nashif
,
Md. Rakib Raihan
,
Md. Rasedul Islam
,
Mohammad Hasan Imam
World Journal of Engineering and Technology
Vol.6 No.4
,November 22, 2018
DOI:
10.4236/wjet.2018.64057
8,940
Downloads
39,119
Views
Citations
Adaptive Financial Fraud Detection in Imbalanced Data with Time-Varying Poisson Processes
(Articles)
Régis Houssou
,
Jérôme Bovay
,
Stephan Robert
Journal of Financial Risk Management
Vol.8 No.4
,December 30, 2019
DOI:
10.4236/jfrm.2019.84020
740
Downloads
2,042
Views
Citations
Findings Seminal Papers Using Data Mining Techniques
(Articles)
Alexander Báez Hernández
,
Debrayan Bravo Hidalgo
Open Journal of Social Sciences
Vol.8 No.9
,September 25, 2020
DOI:
10.4236/jss.2020.89023
485
Downloads
1,693
Views
Citations
Real and Fitted Spherical Indentations
(Articles)
Gerd Kaupp
Advances in Materials Physics and Chemistry
Vol.10 No.10
,October 10, 2020
DOI:
10.4236/ampc.2020.1010016
377
Downloads
1,182
Views
Citations
Identifying Extreme Rainfall Events Using Functional Outliers Detection Methods
(Articles)
Mohanned Abduljabbar Hael
,
Yongsheng Yuan
Journal of Data Analysis and Information Processing
Vol.8 No.4
,November 5, 2020
DOI:
10.4236/jdaip.2020.84016
546
Downloads
1,717
Views
Citations
Magnetic Applications to Subsurface and Groundwater Investigations: A Case Study from Wadi El Assiuti, Egypt
(Articles)
Ahmed Mohamed
,
Elsayed M. Abu El Ella
International Journal of Geosciences
Vol.12 No.2
,February 8, 2021
DOI:
10.4236/ijg.2021.122006
643
Downloads
1,960
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
717
Downloads
10,673
Views
Citations
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
(Articles)
Gbenga Ikuomenisan
,
Yasser Morgan
Journal of Information Security
Vol.13 No.4
,August 23, 2022
DOI:
10.4236/jis.2022.134012
249
Downloads
1,212
Views
Citations
Detection and Mapping of Violent Crime Hotspots in Southwestern Nigeria
(Articles)
Michael Ajide Oyinloye
,
Suleiman Abdul-Azeez Adegboyega
,
Francis Omowonuola Akinluyi
,
Akinola Adesuji Komolafe
,
Joseph Olusola Akinyede
,
Olabanji Odunayo Aladejana
,
Samuel Olumide Akande
Journal of Geographic Information System
Vol.15 No.3
,June 29, 2023
DOI:
10.4236/jgis.2023.153017
204
Downloads
1,294
Views
Citations
Research on Track Fastener Service Status Detection Based on Improved Yolov4 Model
(Articles)
Jing He
,
Weiqi Wang
,
Nengpu Yang
Journal of Transportation Technologies
Vol.14 No.2
,April 15, 2024
DOI:
10.4236/jtts.2024.142013
31
Downloads
114
Views
Citations
Validation of Treatment Planning Dose Calculations: Experience Working with Medical Physics Practice Guideline 5.a.
(Articles)
Jinyu Xue
,
Jared D. Ohrt
,
James Fan
,
Peter Balter
,
Joo Han Park
,
Leonard Kim
,
Steven M. Kirsner
,
Geoffrey S. Ibbott
Int'l J. of Medical Physics, Clinical Eng. and Radiation Oncology
Vol.6 No.1
,February 24, 2017
DOI:
10.4236/ijmpcero.2017.61006
2,572
Downloads
5,026
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top