Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Combining Keyword Search Advertisement and Site- Targeted Advertisement in Search Engine Advertising
(Articles)
Li Chen
Journal of Service Science and Management
Vol.1 No.3
,December 30, 2008
DOI:
10.4236/jssm.2008.13025
13,303
Downloads
19,142
Views
Citations
A State Estimation Method for Sound Environment System with Unknown Observation Mechanism by Introducing Fuzzy Inference
(Articles)
Hisako Orimoto
,
Akira Ikuta
Intelligent Information Management
Vol.4 No.4
,July 27, 2012
DOI:
10.4236/iim.2012.44018
4,471
Downloads
6,700
Views
Citations
Factors of Acceptance for Mobile Learning in Corporate Settings: An Empirical Investigation in Banking Industry
(Articles)
Ayse Kok
Intelligent Information Management
Vol.5 No.5
,September 23, 2013
DOI:
10.4236/iim.2013.55015
3,925
Downloads
6,206
Views
Citations
Mobile Data Mining-Based Services on the Base of Mobile Device Management (MDM) System
(Articles)
Mazin Omar Khairo
Journal of Signal and Information Processing
Vol.5 No.3
,July 30, 2014
DOI:
10.4236/jsip.2014.53011
4,479
Downloads
5,534
Views
Citations
Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks
(Articles)
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.8 No.3
,March 5, 2015
DOI:
10.4236/ijcns.2015.83003
3,333
Downloads
3,907
Views
Citations
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite
(Articles)
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.8 No.3
,March 20, 2015
DOI:
10.4236/ijcns.2015.83004
3,941
Downloads
5,309
Views
Citations
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
10,702
Downloads
13,890
Views
Citations
Fault Tolerance Mechanisms in Distributed Systems
(Articles)
Arif Sari
,
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812042
35,090
Downloads
39,528
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Comparative Analysis of Wireless Security Protocols: WEP vs WPA
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812043
8,739
Downloads
12,659
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Security and Optimization Challenges of Green Data Centers
(Articles)
Arif Sari
,
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812044
5,836
Downloads
7,434
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,944
Downloads
4,893
Views
Citations
Role of Time-Domain Based Access Control Model
(Articles)
Chaoqun Liu
,
Zhen Peng
,
Lili Wu
Journal of Software Engineering and Applications
Vol.9 No.2
,February 26, 2016
DOI:
10.4236/jsea.2016.92004
3,283
Downloads
4,659
Views
Citations
Influence of Spatial Comfort and Environmental Workplace Ergonomics on Job Satisfaction of Librarians in the Federal and State University Libraries in Southern Nigeria
(Articles)
Chinyere N. Ikonne
,
Haliso Yacob
Open Access Library Journal
Vol.1 No.6
,September 17, 2014
DOI:
10.4236/oalib.1100814
1,597
Downloads
3,715
Views
Citations
Factors Influencing Job Satisfaction of Librarians in Federal and State University Libraries in Southern Nigeria
(Articles)
Chinyere N. Ikonne
,
Uloma D. Onuoha
Open Access Library Journal
Vol.2 No.2
,February 15, 2015
DOI:
10.4236/oalib.1101337
2,626
Downloads
4,935
Views
Citations
Statistical Fault Diagnosis Methods by Using Higher-Order Correlation Information between Sound and Vibration
(Articles)
Hisako Orimoto
Intelligent Information Management
Vol.8 No.4
,July 12, 2016
DOI:
10.4236/iim.2016.84007
1,852
Downloads
2,621
Views
Citations
Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level
(Articles)
Ra’ed Mas’adeh
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83011
1,733
Downloads
3,357
Views
Citations
The Investigation of Jordanian Education Ministry Employees’ Attitude toward the Using of Cloud ERP
(Articles)
Hassan Alhanatleh
,
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.9 No.11
,November 11, 2016
DOI:
10.4236/ijcns.2016.911036
1,498
Downloads
2,550
Views
Citations
This article belongs to the Special Issue on
Security, Privacy and Trust in Network-based Security Algorithms in Big Data and Cloud Computing Challenges
Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication
(Articles)
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/ijcns.2016.912046
1,857
Downloads
3,445
Views
Citations
State Estimation for Fuzzy Sound Environment System with Finite Amplitude Fluctuation
(Articles)
Akira Ikuta
,
Hisako Orimoto
,
Gerard Gallagher
Journal of Software Engineering and Applications
Vol.10 No.7
,June 23, 2017
DOI:
10.4236/jsea.2017.107034
1,167
Downloads
1,747
Views
Citations
This article belongs to the Special Issue on
Fuzzy Sets, Fuzzy Logic and Fuzzy Systems
A Bayesian Filter for Sound Environment System with Quantized Observation
*
(Articles)
Hisako Orimoto
,
Akira Ikuta
Intelligent Information Management
Vol.10 No.3
,May 25, 2018
DOI:
10.4236/iim.2018.103007
774
Downloads
1,327
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top