Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Objective Function Value Optimization of Cloud Computing Resources Security Allocation of Artificial Firefly Algorithm
(Articles)
Xiaoxi Hu
Open Journal of Optimization
Vol.4 No.2
,May 15, 2015
DOI:
10.4236/ojop.2015.42005
3,419
Downloads
4,380
Views
Citations
Content Authoring and Cloud System Implementation for Smart Learning
(Articles)
Hyun-Seo Hwang
,
Jin-Tae Park
,
Kyeong-Taek Seo
,
Jun-Soo Yun
,
Il-Young Moon
,
Oh-Young Kwon
,
Byeong-Jun Kim
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35017
3,284
Downloads
3,990
Views
Citations
Collaboration in the Cloud for Online Learning Environments: An Experience Applied to Laboratories
(Articles)
Washington Luna
,
José Luis Castillo Sequera
Creative Education
Vol.6 No.13
,August 5, 2015
DOI:
10.4236/ce.2015.613144
4,422
Downloads
6,008
Views
Citations
This article belongs to the Special Issue on
Online Distance Education
An E-Negotiation Agent Using Rule Based and Case Based Approaches: A Comparative Study with Bilateral E-Negotiation with Prediction
(Articles)
Sheetal R. Vij
,
Amruta More
,
Debajyoti Mukhopadhyay
,
Avinash J. Agrawal
Journal of Software Engineering and Applications
Vol.8 No.10
,October 12, 2015
DOI:
10.4236/jsea.2015.810049
4,969
Downloads
5,826
Views
Citations
Apply AHP for Resource Allocation Problem in Cloud
(Articles)
Avtar Singh
,
Kamlesh Dutta
Journal of Computer and Communications
Vol.3 No.10
,October 23, 2015
DOI:
10.4236/jcc.2015.310002
3,590
Downloads
4,593
Views
Citations
The Reform of Higher Education through Alternative University Teaching Models
(Articles)
Stoyan Denchev
,
Ivanka Pavlova
,
Miriyana Pavlova
Creative Education
Vol.7 No.2
,February 26, 2016
DOI:
10.4236/ce.2016.72029
2,535
Downloads
3,539
Views
Citations
KELEA, Cosmic Rays, Cloud Formation and Electromagnetic Radiation: Electropollution as a Possible Explanation for Climate Change
(Articles)
W. John Martin
Atmospheric and Climate Sciences
Vol.6 No.2
,March 1, 2016
DOI:
10.4236/acs.2016.62015
3,222
Downloads
5,917
Views
Citations
Influence of Vegetation Cover on the Oh Soil Moisture Retrieval Model: A Case Study of the Malinda Wetland, Tanzania
(Articles)
Fridah Kirimi
,
David N. Kuria
,
Frank Thonfeld
,
Esther Amler
,
Kenneth Mubea
,
Salome Misana
,
Gunter Menz
Advances in Remote Sensing
Vol.5 No.1
,March 7, 2016
DOI:
10.4236/ars.2016.51003
3,051
Downloads
4,692
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,446
Downloads
5,063
Views
Citations
Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level
(Articles)
Ra’ed Mas’adeh
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83011
1,728
Downloads
3,399
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,518
Downloads
6,572
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,818
Downloads
3,234
Views
Citations
Scalability of the DVFS Power Management Technique as Applied to 3-Tier Data Center Architecture in Cloud Computing
(Articles)
Sulieman Bani-Ahmad
,
Saleh Sa’adeh
Journal of Computer and Communications
Vol.5 No.1
,January 20, 2017
DOI:
10.4236/jcc.2017.51007
1,961
Downloads
3,663
Views
Citations
Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
(Articles)
J. Athena
,
V. Sumathy
Circuits and Systems
Vol.8 No.3
,March 31, 2017
DOI:
10.4236/cs.2017.83005
2,042
Downloads
4,662
Views
Citations
Design and Implementation of a Real Time Wireless Monitor System for Urinary Incontinence
(Articles)
Xuhui Nie
,
Zongyu Song
,
Jinsong Yang
,
Ziwei Dengyun
,
Mingxi Yin
,
Xiaohui Duan
,
Bingli Jiao
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5B
,May 26, 2017
DOI:
10.4236/ijcns.2017.105B025
1,258
Downloads
2,271
Views
Citations
Data Integrity Checking Protocol with Data Dynamics in Cloud Computing
(Articles)
Junjie Feng
,
Shigong Long
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5B
,May 26, 2017
DOI:
10.4236/ijcns.2017.105B027
1,525
Downloads
3,868
Views
Citations
Subject Oriented Autonomic Cloud Data Center Networks Model
(Articles)
Hang Qin
,
Li Zhu
Journal of Data Analysis and Information Processing
Vol.5 No.3
,July 25, 2017
DOI:
10.4236/jdaip.2017.53007
1,035
Downloads
1,927
Views
Citations
Cloud Enabled Text Reader for Individuals with Vision Impairment
(Articles)
Abul K. M. Azad
,
Mohammed Misbahuddin
Advances in Internet of Things
Vol.7 No.4
,September 5, 2017
DOI:
10.4236/ait.2017.74007
1,335
Downloads
2,783
Views
Citations
A Survey of Cloud Computing Detection Techniques against DDoS Attacks
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.1
,December 21, 2017
DOI:
10.4236/jis.2018.91005
2,363
Downloads
7,226
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
On the Path from the Turbulent Vortex Dynamo Theory to Diagnosis of Tropical Cyclogenesis
(Articles)
Galina Levina
Open Journal of Fluid Dynamics
Vol.8 No.1
,March 29, 2018
DOI:
10.4236/ojfd.2018.81008
1,032
Downloads
2,132
Views
Citations
This article belongs to the Special Issue on
Turbulence and Vortex
<
...
12
13
14
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top