Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Overview of Object Detection Algorithms Using Convolutional Neural Networks
(Articles)
Junsong Ren
,
Yi Wang
Journal of Computer and Communications
Vol.10 No.1
,January 29, 2022
DOI:
10.4236/jcc.2022.101006
1,735
Downloads
18,785
Views
Citations
Research on the Application of VMamba Scanning Algorithm in High-Resolution Remote Sensing Change Detection
(Articles)
Rui Shi
,
Zhenchuan Wang
Journal of Computer and Communications
Vol.13 No.4
,April 29, 2025
DOI:
10.4236/jcc.2025.134017
25
Downloads
187
Views
Citations
A Review of Methods for Detecting Rumors on Social Networks Using Social Circle Mining
(Articles)
Alaa Alassaf
,
Delel Rhouma
Social Networking
Vol.14 No.2
,April 30, 2025
DOI:
10.4236/sn.2025.142002
36
Downloads
230
Views
Citations
Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN
(Articles)
Linli Wang
,
Hu Wang
,
Hanlu Lei
Journal of Computer and Communications
Vol.11 No.5
,May 31, 2023
DOI:
10.4236/jcc.2023.115014
207
Downloads
739
Views
Citations
Influence of Proxies on the Reported Frequency of Falls, Fear of Falling and Activity Restriction in Older People
(Articles)
Elise Mendes da Costa
,
Isabelle Godin
,
Thierry Pepersack
,
Michèle Dramaix
,
Yves Coppieters
,
Martine Bantuelle
,
Alain Levêque
Health
Vol.6 No.12
,June 27, 2014
DOI:
10.4236/health.2014.612186
2,874
Downloads
3,980
Views
Citations
Phytocenoses at Environments Contact Sites as Proxies of Climate Dynamics with Time (East Siberia, Russia)
(Articles)
Alexander P. Sizykh
Natural Science
Vol.8 No.3
,March 11, 2016
DOI:
10.4236/ns.2016.83014
2,005
Downloads
2,681
Views
Citations
Current Networks of Long Proxies for Building Reconstruction Models of the Atlantic Multidecadal Oscillation
(Articles)
Markus Lindholm
,
Risto Jalkanen
,
Maxim G. Ogurtsov
Atmospheric and Climate Sciences
Vol.6 No.3
,May 23, 2016
DOI:
10.4236/acs.2016.63030
2,515
Downloads
3,318
Views
Citations
This article belongs to the Special Issue on
Climatology Research
Wildfire Monitoring and Detection System Using Wireless Sensor Network: A Case Study of Tanzania
(Articles)
Albert S. Lutakamale
,
Shubi Kaijage
Wireless Sensor Network
Vol.9 No.8
,August 18, 2017
DOI:
10.4236/wsn.2017.98015
2,518
Downloads
7,617
Views
Citations
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,313
Downloads
6,070
Views
Citations
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
(Articles)
Alese Boniface Kayode
,
Alowolodu Olufunso Dayo
,
Adekunle Adewale Uthman
Communications and Network
Vol.13 No.2
,May 27, 2021
DOI:
10.4236/cn.2021.132006
399
Downloads
1,302
Views
Citations
Multi-Energy Gamma-Ray Attenuations for Non-Destructive Detection of Hazardous Materials
(Articles)
Kaylyn Olshanoski
,
Chary Rangacharyulu
Journal of Modern Physics
Vol.13 No.1
,January 26, 2022
DOI:
10.4236/jmp.2022.131005
245
Downloads
1,152
Views
Citations
Strengthening the Authentication System of an IP Telephony Network through Facial Emotion Detection
(Articles)
Sekoude Jehovah-Nis Pedrie Sonon
,
Tahirou Djara
,
Matine Ousmane
Open Journal of Safety Science and Technology
Vol.15 No.1
,March 4, 2025
DOI:
10.4236/ojsst.2025.151003
39
Downloads
194
Views
Citations
Model of Combined Transport of Perishable Foodstuffs and Safety Inspection Based on Data Mining
(Articles)
Tongjuan Liu
,
Anqi Hu
Food and Nutrition Sciences
Vol.8 No.7
,July 27, 2017
DOI:
10.4236/fns.2017.87054
1,047
Downloads
1,958
Views
Citations
The Online Assessment of Electric Distribution Network Load Capability
(Articles)
Haoming Liu
,
Zhenkun Li
,
Kun Yu
,
Xingying Chen
Journal of Electromagnetic Analysis and Applications
Vol.1 No.1
,March 12, 2009
DOI:
10.4236/jemaa.2009.11008
5,508
Downloads
10,113
Views
Citations
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
(Articles)
Danwei Chen
,
Xizhou Yu
,
Xianghui Dong
Wireless Sensor Network
Vol.2 No.5
,May 27, 2010
DOI:
10.4236/wsn.2010.24049
5,632
Downloads
10,045
Views
Citations
Potential Vulnerability of Encrypted Messages: Decomposability of Discrete Logarithm Problems
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.8
,August 31, 2010
DOI:
10.4236/ijcns.2010.38086
4,705
Downloads
8,164
Views
Citations
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs
(Articles)
Aziz Baayer
,
Nourddine Enneya
,
Mohammed Elkoutbi
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33028
4,989
Downloads
8,665
Views
Citations
Web Security and Log Management: An Application Centric Perspective
(Articles)
Andrew Mwaura Kahonge
,
William Okello-Odongo
,
Evans K. Miriti
,
Elisha Abade
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43016
4,698
Downloads
8,264
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43017
11,478
Downloads
18,820
Views
Citations
A Way to Set up Security Layer over Internet
(Articles)
Xiangyi Hu
,
Guifen Zhao
,
Guanning Xu
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35022
2,616
Downloads
3,278
Views
Citations
<
...
6
7
8
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top