Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Block Decompositions and Applications of Generalized Reflexive Matrices
(Articles)
Hsin-Chu Chen
Advances in Linear Algebra & Matrix Theory
Vol.8 No.3
,September 27, 2018
DOI:
10.4236/alamt.2018.83011
1,089
Downloads
2,157
Views
Citations
Decompositions of Some Special Block Tridiagonal Matrices
(Articles)
Hsin-Chu Chen
Advances in Linear Algebra & Matrix Theory
Vol.11 No.2
,June 10, 2021
DOI:
10.4236/alamt.2021.112005
384
Downloads
1,157
Views
Citations
Cybersecurity for Allied Future Submarines
(Articles)
Keith F. Joiner
,
Simon Reay Atkinson
,
Pete Christensen
,
Elena Sitnikova
World Journal of Engineering and Technology
Vol.6 No.4
,September 14, 2018
DOI:
10.4236/wjet.2018.64045
1,495
Downloads
3,371
Views
Citations
This article belongs to the Special Issue on
Marine Engineering
A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy
(Articles)
Zhenpeng Liu
,
Yawei Dong
,
Xuan Zhao
,
Bin Zhang
Journal of Information Security
Vol.8 No.4
,October 20, 2017
DOI:
10.4236/jis.2017.84021
1,161
Downloads
2,195
Views
Citations
Network Hot Topic Discovery of Fuzzy Clustering Based on Improved Firefly Algorithm
(Articles)
Zhenpeng Liu
,
Jing Dong
,
Bin Zhang
,
Mengjie He
,
Jianmin Xu
Journal of Computer and Communications
Vol.6 No.8
,August 2, 2018
DOI:
10.4236/jcc.2018.68001
829
Downloads
1,478
Views
Citations
Building a Neural Network Model to Analyze Teachers’ Satisfaction with Online Teaching during the COVID-19 Ravages
(Articles)
Gangxin Wen
,
Quanlong Guan
,
Xiaofeng Wu
,
Weiqi Luo
Journal of Computer and Communications
Vol.10 No.1
,January 27, 2022
DOI:
10.4236/jcc.2022.101005
238
Downloads
990
Views
Citations
Differences in Self-Assessment Regarding Eating Behaviors among Female University Students Living in Japan, Korea, and Austria
(Articles)
Mihoko Tominaga
,
Masanori Taguchi
,
Akiko Suzuki
,
Yoshiko Ikawa
,
Ho-Sook Youn
,
Kyubok Cho
,
Johannes Scherling
,
Roswith Roth
Food and Nutrition Sciences
Vol.3 No.12
,December 10, 2012
DOI:
10.4236/fns.2012.312219
4,142
Downloads
6,822
Views
Citations
Study on Demand Response of Residential Power Customer
(Articles)
Xiu Cao
,
Haiyong Jiang
,
Lei Huang
,
Xueping Wang
,
Xuqi Zhang
Journal of Power and Energy Engineering
Vol.4 No.7
,July 25, 2016
DOI:
10.4236/jpee.2016.47001
1,489
Downloads
2,224
Views
Citations
A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality
(Articles)
Mohammed Hussein Kurdi
,
Mohsen Denden
,
David Paul
Journal of Information Security
Vol.15 No.2
,April 24, 2024
DOI:
10.4236/jis.2024.152013
145
Downloads
787
Views
Citations
Optimizing Memory Access Efficiency in CUDA Kernel via Data Layout Technique
(Articles)
Neda Seifi
,
Abdullah Al-Mamun
Journal of Computer and Communications
Vol.12 No.5
,May 30, 2024
DOI:
10.4236/jcc.2024.125009
16
Downloads
88
Views
Citations
Impact of Information Security Management System on Firm Financial Performance: Perspective of Corporate Reputation and Branding
(Articles)
Syed Asad Abbas Bokhari
,
Shahid Manzoor
American Journal of Industrial and Business Management
Vol.12 No.5
,May 26, 2022
DOI:
10.4236/ajibm.2022.125048
444
Downloads
2,946
Views
Citations
Critical Energy Infrastructure: Cyberterrorism Threats and Means of Protection
(Articles)
V. A. Vasenin
Journal of Software Engineering and Applications
Vol.6 No.9A
,September 25, 2013
DOI:
10.4236/jsea.2013.69A003
6,306
Downloads
8,238
Views
Citations
This article belongs to the Special Issue on
Software Engineering for Safety-Critical Systems and Medical Devices
A Comparison of Paraconsistent Description Logics
(Articles)
Norihiro Kamide
International Journal of Intelligence Science
Vol.3 No.2
,April 30, 2013
DOI:
10.4236/ijis.2013.32011
3,089
Downloads
5,688
Views
Citations
Algebraic Cryptanalysis of GOST Encryption Algorithm
(Articles)
Ludmila Babenko
,
Ekaterina Maro
Journal of Computer and Communications
Vol.2 No.4
,March 17, 2014
DOI:
10.4236/jcc.2014.24002
4,686
Downloads
7,089
Views
Citations
Back to the Past: Evolution of Kidnapping and Hostage Taking in the Niger Delta, Nigeria
(Articles)
Isaac Olawale Albert
,
Nathaniel Danjibo
,
Olumayowa Albert
Beijing Law Review
Vol.11 No.1
,March 18, 2020
DOI:
10.4236/blr.2020.111015
675
Downloads
5,620
Views
Citations
Research on the Construction of Young Security Cadres in Colleges and Universities in the New Era
(Articles)
Dong Yan
,
Wei Fan
,
Yunche Wang
Sociology Mind
Vol.13 No.2
,April 11, 2023
DOI:
10.4236/sm.2023.132007
89
Downloads
358
Views
Citations
Security Implications of Using the Military in Maintaining Peace through Internal Security Operations, a Case of Central Equatoria State—Juba
(Articles)
Lual Chol Kur
,
Erick Bor
,
Panuel Mwaeke
Open Journal of Political Science
Vol.14 No.1
,January 22, 2024
DOI:
10.4236/ojps.2024.141005
69
Downloads
272
Views
Citations
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
(Articles)
Yan Dong
Journal of Computer and Communications
Vol.12 No.3
,March 21, 2024
DOI:
10.4236/jcc.2024.123007
40
Downloads
120
Views
Citations
The Simulation of Rumor’S Spreading and Controlling in Micro-Blog Users’ Network
(Articles)
Peng Chen
,
Nan Gao
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 11, 2013
DOI:
10.4236/jsea.2013.63B022
4,242
Downloads
6,230
Views
Citations
Power and Time Efficient IP Lookup Table Design Using Partitioned TCAMs
(Articles)
Youngjung Ahn
,
Yongsuk Lee
,
Gyungho Lee
Circuits and Systems
Vol.4 No.3
,June 27, 2013
DOI:
10.4236/cs.2013.43041
6,444
Downloads
8,475
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top