Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Objective Function Value Optimization of Cloud Computing Resources Security Allocation of Artificial Firefly Algorithm
(Articles)
Xiaoxi Hu
Open Journal of Optimization
Vol.4 No.2
,May 15, 2015
DOI:
10.4236/ojop.2015.42005
3,421
Downloads
4,385
Views
Citations
Content Authoring and Cloud System Implementation for Smart Learning
(Articles)
Hyun-Seo Hwang
,
Jin-Tae Park
,
Kyeong-Taek Seo
,
Jun-Soo Yun
,
Il-Young Moon
,
Oh-Young Kwon
,
Byeong-Jun Kim
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35017
3,287
Downloads
4,000
Views
Citations
Collaboration in the Cloud for Online Learning Environments: An Experience Applied to Laboratories
(Articles)
Washington Luna
,
José Luis Castillo Sequera
Creative Education
Vol.6 No.13
,August 5, 2015
DOI:
10.4236/ce.2015.613144
4,426
Downloads
6,026
Views
Citations
This article belongs to the Special Issue on
Online Distance Education
An E-Negotiation Agent Using Rule Based and Case Based Approaches: A Comparative Study with Bilateral E-Negotiation with Prediction
(Articles)
Sheetal R. Vij
,
Amruta More
,
Debajyoti Mukhopadhyay
,
Avinash J. Agrawal
Journal of Software Engineering and Applications
Vol.8 No.10
,October 12, 2015
DOI:
10.4236/jsea.2015.810049
4,972
Downloads
5,834
Views
Citations
Apply AHP for Resource Allocation Problem in Cloud
(Articles)
Avtar Singh
,
Kamlesh Dutta
Journal of Computer and Communications
Vol.3 No.10
,October 23, 2015
DOI:
10.4236/jcc.2015.310002
3,596
Downloads
4,605
Views
Citations
The Reform of Higher Education through Alternative University Teaching Models
(Articles)
Stoyan Denchev
,
Ivanka Pavlova
,
Miriyana Pavlova
Creative Education
Vol.7 No.2
,February 26, 2016
DOI:
10.4236/ce.2016.72029
2,540
Downloads
3,548
Views
Citations
KELEA, Cosmic Rays, Cloud Formation and Electromagnetic Radiation: Electropollution as a Possible Explanation for Climate Change
(Articles)
W. John Martin
Atmospheric and Climate Sciences
Vol.6 No.2
,March 1, 2016
DOI:
10.4236/acs.2016.62015
3,226
Downloads
5,934
Views
Citations
Influence of Vegetation Cover on the Oh Soil Moisture Retrieval Model: A Case Study of the Malinda Wetland, Tanzania
(Articles)
Fridah Kirimi
,
David N. Kuria
,
Frank Thonfeld
,
Esther Amler
,
Kenneth Mubea
,
Salome Misana
,
Gunter Menz
Advances in Remote Sensing
Vol.5 No.1
,March 7, 2016
DOI:
10.4236/ars.2016.51003
3,054
Downloads
4,698
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,448
Downloads
5,074
Views
Citations
Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level
(Articles)
Ra’ed Mas’adeh
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83011
1,731
Downloads
3,407
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,528
Downloads
6,595
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,824
Downloads
3,247
Views
Citations
Scalability of the DVFS Power Management Technique as Applied to 3-Tier Data Center Architecture in Cloud Computing
(Articles)
Sulieman Bani-Ahmad
,
Saleh Sa’adeh
Journal of Computer and Communications
Vol.5 No.1
,January 20, 2017
DOI:
10.4236/jcc.2017.51007
1,961
Downloads
3,669
Views
Citations
Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
(Articles)
J. Athena
,
V. Sumathy
Circuits and Systems
Vol.8 No.3
,March 31, 2017
DOI:
10.4236/cs.2017.83005
2,047
Downloads
4,675
Views
Citations
Design and Implementation of a Real Time Wireless Monitor System for Urinary Incontinence
(Articles)
Xuhui Nie
,
Zongyu Song
,
Jinsong Yang
,
Ziwei Dengyun
,
Mingxi Yin
,
Xiaohui Duan
,
Bingli Jiao
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5B
,May 26, 2017
DOI:
10.4236/ijcns.2017.105B025
1,261
Downloads
2,277
Views
Citations
Data Integrity Checking Protocol with Data Dynamics in Cloud Computing
(Articles)
Junjie Feng
,
Shigong Long
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5B
,May 26, 2017
DOI:
10.4236/ijcns.2017.105B027
1,527
Downloads
3,878
Views
Citations
Subject Oriented Autonomic Cloud Data Center Networks Model
(Articles)
Hang Qin
,
Li Zhu
Journal of Data Analysis and Information Processing
Vol.5 No.3
,July 25, 2017
DOI:
10.4236/jdaip.2017.53007
1,036
Downloads
1,935
Views
Citations
Cloud Enabled Text Reader for Individuals with Vision Impairment
(Articles)
Abul K. M. Azad
,
Mohammed Misbahuddin
Advances in Internet of Things
Vol.7 No.4
,September 5, 2017
DOI:
10.4236/ait.2017.74007
1,339
Downloads
2,791
Views
Citations
A Survey of Cloud Computing Detection Techniques against DDoS Attacks
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.1
,December 21, 2017
DOI:
10.4236/jis.2018.91005
2,367
Downloads
7,239
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
On the Path from the Turbulent Vortex Dynamo Theory to Diagnosis of Tropical Cyclogenesis
(Articles)
Galina Levina
Open Journal of Fluid Dynamics
Vol.8 No.1
,March 29, 2018
DOI:
10.4236/ojfd.2018.81008
1,035
Downloads
2,141
Views
Citations
This article belongs to the Special Issue on
Turbulence and Vortex
<
...
12
13
14
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top