Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Incidence of Incidental Thyroid Nodules on Computed Tomography (CT) Scan of the Chest Performed for Reasons other than Thyroid Disease
(Articles)
Kurt Scherer
,
Seth Means
,
Collins Chijioke
,
Paul Karmin
,
Mukta Panda
International Journal of Clinical Medicine
Vol.2 No.3
,July 19, 2011
DOI:
10.4236/ijcm.2011.23042
6,503
Downloads
9,995
Views
Citations
Identification of DNA Photolyase Gene of a Drought Tolerance Branching Line of Kenaf (
Hibiscus cannabinus
L.)
(Articles)
Estri Laras Arumingtyas
,
Nur Basuki
,
Sutiman Bambang Sumitro
,
Sudjindro
American Journal of Plant Sciences
Vol.3 No.6
,June 21, 2012
DOI:
10.4236/ajps.2012.36098
3,532
Downloads
6,159
Views
Citations
A Hybrid Method for Edge Continuity Based on Pixel Neighbors Pattern Analysis (PNPA) for Remote Sensing Satellite Images
(Articles)
Waqas Haider
,
Muhammad Sharif Malik
,
Mudassar Raza
,
Abdul Wahab
,
Izhar Ahmed Khan
,
Umar Zia
,
Jawad Tanveer
,
Hadia Bashir
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529072
5,324
Downloads
9,169
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Comparative antibody study for antigen detection in urine specimens for diagnosis of blastomycosis using a competitive enzyme-linked immunosorbent assay
(Articles)
Amanda Searle
,
Gene Scalarone
Open Journal of Immunology
Vol.2 No.4
,December 31, 2012
DOI:
10.4236/oji.2012.24017
5,943
Downloads
9,017
Views
Citations
Monitoring and Change Detection along the Eastern Side of Qena Bend, Nile Valley, Egypt Using GIS and Remote Sensing
(Articles)
Ahmed Omar Abd El-Aziz
Advances in Remote Sensing
Vol.2 No.3
,September 12, 2013
DOI:
10.4236/ars.2013.23030
5,391
Downloads
9,303
Views
Citations
Healthcare intelligence risk detection systems
(Articles)
Reza Safdari
,
Jebraeil Farzi
,
Marjan Ghazisaeidi
,
Mahboobeh Mirzaee
,
Azadeh Goodini
Open Journal of Preventive Medicine
Vol.3 No.8
,November 5, 2013
DOI:
10.4236/ojpm.2013.38062
3,592
Downloads
5,667
Views
Citations
Phytoplasmas and Phytoplasma Diseases: A Severe Threat to Agriculture
(Articles)
Assunta Bertaccini
,
Bojan Duduk
,
Samanta Paltrinieri
,
Nicoletta Contaldo
American Journal of Plant Sciences
Vol.5 No.12
,May 27, 2014
DOI:
10.4236/ajps.2014.512191
14,022
Downloads
23,143
Views
Citations
This article belongs to the Special Issue on
Advances in Plant Pathology
Rapid Detection Tool for Vancomycin-Resistant
Enterococcus
(VRE) Directly from Human Specimens
(Articles)
Stephen C. Edberg
Advances in Microbiology
Vol.4 No.12
,September 23, 2014
DOI:
10.4236/aim.2014.412092
4,098
Downloads
5,513
Views
Citations
Detection: From Electrochemistry to Spectroscopy with Chromatographic Techniques, Recent Trends with Nanotechnology
(Articles)
Tawfik A. Saleh
Detection
Vol.2 No.4
,January 6, 2015
DOI:
10.4236/detection.2014.24005
4,770
Downloads
6,575
Views
Citations
Statement Analysis of Deception Detection
(Articles)
Daoshan Ma
,
Dong’ao Lin
Open Access Library Journal
Vol.2 No.10
,October 13, 2015
DOI:
10.4236/oalib.1101975
4,588
Downloads
6,356
Views
Citations
Linguistic Methods to Detect Lies
(Articles)
Daoshan Ma
,
Dong’ao Lin
Open Access Library Journal
Vol.2 No.12
,December 22, 2015
DOI:
10.4236/oalib.1102173
3,748
Downloads
6,870
Views
Citations
Comparing the Accuracy of Network Utilization Performance between Real Network and Simulation Model for Local Area Network (LAN)
(Articles)
Mohd Nazri ISMAIL
,
Abdullah Mohd ZIN
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14042
9,918
Downloads
14,981
Views
Citations
Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries
(Articles)
Musaria K. Mahmood
,
Fawzi M. Al-Naima
Wireless Sensor Network
Vol.2 No.7
,July 9, 2010
DOI:
10.4236/wsn.2010.27064
5,734
Downloads
10,830
Views
Citations
Security Policy Management Process within Six Sigma Framework
(Articles)
Vijay Anand
,
Jafar Saniie
,
Erdal Oruklu
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31006
7,110
Downloads
14,051
Views
Citations
Vulnerability Analysis of Wide Area Measurement System in the Smart Grid
(Articles)
Mohd Rihan
,
Mukhtar Ahmad
,
M. Salim Beg
Smart Grid and Renewable Energy
Vol.4 No.6A
,September 3, 2013
DOI:
10.4236/sgre.2013.46A001
6,030
Downloads
9,436
Views
Citations
This article belongs to the Special Issue on
Smart Grid Security
Virtualization Security, Strategy and Management
(Articles)
Simon Tran
,
Stuart Gold
Int'l J. of Communications, Network and System Sciences
Vol.7 No.10
,October 16, 2014
DOI:
10.4236/ijcns.2014.710043
5,125
Downloads
6,699
Views
Citations
This article belongs to the Special Issue on
Virtual Network
A Case Study of Adopting Security Guidelines in Undergraduate Software Engineering Education
(Articles)
Yen-Hung Hu
,
Charles Scott
Journal of Computer and Communications
Vol.2 No.14
,December 12, 2014
DOI:
10.4236/jcc.2014.214003
4,279
Downloads
6,586
Views
Citations
The “Iterated Weakest Link” Model of Adaptive Security Investment
(Articles)
Rainer Böhme
,
Tyler Moore
Journal of Information Security
Vol.7 No.2
,March 31, 2016
DOI:
10.4236/jis.2016.72006
3,182
Downloads
4,622
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
The Effective Enhancement of Power System Security by Flexible Transmission Line Impedance with Minimal Rescheduling of Generators
(Articles)
Karuppasamy Muthulakshmi
,
R.M. Sasiraja
,
Selvarajan Mukesh Muthu
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74033
1,751
Downloads
2,502
Views
Citations
Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment
(Articles)
Ahmad Fayez S. Althobaiti
Journal of Information Security
Vol.8 No.1
,December 7, 2016
DOI:
10.4236/jis.2017.81001
3,534
Downloads
7,501
Views
Citations
<
...
13
14
15
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top