Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Distance Control and Positive Security for Intrinsic Equipment Working in Explosive Potential Atmospheres
(Articles)
Emil Pop
,
Gabriel-Ioan Ilcea
,
Ionut-Alin Popa
Engineering
Vol.10 No.3
,March 16, 2018
DOI:
10.4236/eng.2018.103006
1,053
Downloads
2,027
Views
Citations
This article belongs to the Special Issue on
Safety System Engineering
Extending the Network Lifetime Using Optimized Energy Efficient Cross Layer Module (OEEXLM) in Wireless Sensor Networks
(Articles)
T. V. PADMAVATHY
Wireless Sensor Network
Vol.1 No.1
,April 10, 2009
DOI:
10.4236/wsn.2009.11005
8,054
Downloads
12,869
Views
Citations
An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split
(Articles)
Rui TU
,
Jinshu SU
,
Ruoshan KONG
Int'l J. of Communications, Network and System Sciences
Vol.2 No.7
,October 20, 2009
DOI:
10.4236/ijcns.2009.27072
5,501
Downloads
8,917
Views
Citations
Link Layer Correction Techniques and Impact on TCP’s Performance in IEEE 802.11 Wireless Networks
(Articles)
Purvang Dalal
,
Mohanchur Sarkar
,
Kankar Dasgupta
,
Nikhil Kothari
Communications and Network
Vol.6 No.2
,May 8, 2014
DOI:
10.4236/cn.2014.62007
4,745
Downloads
6,634
Views
Citations
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
(Articles)
Adeniran Ishola Oluwaranti
,
Tayo Dorcas Obasanya
Wireless Sensor Network
Vol.6 No.7
,July 21, 2014
DOI:
10.4236/wsn.2014.67014
3,571
Downloads
5,140
Views
Citations
Control Access Point of Devices for Delay Reduction in WBAN Systems with CSMA/CA
(Articles)
Akinobu Nemoto
,
Pham Thanh Hiep
,
Ryuji Kohno
Communications and Network
Vol.7 No.1
,January 29, 2015
DOI:
10.4236/cn.2015.71001
5,305
Downloads
6,081
Views
Citations
Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing
(Articles)
Asma Alotaibi
,
Ahmed Barnawi
,
Mohammed Buhari
Journal of Information Security
Vol.8 No.3
,July 14, 2017
DOI:
10.4236/jis.2017.83014
1,747
Downloads
3,759
Views
Citations
Decoupling Control Research on Test System of Hydraulic Drive Unit of Quadruped Robot Based on Diagonal Matrix Method
(Articles)
Lingxiao Quan
,
Wei Zhang
,
Bin Yu
,
Liang Ha
Intelligent Control and Automation
Vol.4 No.3
,August 7, 2013
DOI:
10.4236/ica.2013.43033
4,485
Downloads
6,191
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,816
Downloads
4,513
Views
Citations
Active-Disturbance-Rejection-Control for Temperature Control of the HVAC System
(Articles)
Chun-E. Huang
,
Chunwang Li
,
Xiaojun Ma
Intelligent Control and Automation
Vol.9 No.1
,February 11, 2018
DOI:
10.4236/ica.2018.91001
1,491
Downloads
3,156
Views
Citations
Electronic Throttle Control System: Modeling, Identification and Model-Based Control Designs
(Articles)
Robert N. K. Loh
,
Witt Thanom
,
Jan S. Pyko
,
Anson Lee
Engineering
Vol.5 No.7
,July 15, 2013
DOI:
10.4236/eng.2013.57071
9,015
Downloads
16,655
Views
Citations
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
(Articles)
Fabio Garzia
,
Natale Tirocchi
,
Michele Scarpiniti
,
Roberto Cusani
Communications and Network
Vol.4 No.3
,August 31, 2012
DOI:
10.4236/cn.2012.43024
4,102
Downloads
7,264
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,489
Downloads
7,077
Views
Citations
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
(Articles)
Xiao-min Ran
,
You-quan Mo
,
Yu-lei Chen
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2039
5,665
Downloads
6,931
Views
Citations
Influences of ±800 kV Yunnan-Guangdong HVDC System on Security and Stability of China Southern Power Grid
(Articles)
Baorong Zhou
,
Xiaoming Jin
,
Chao Hong
,
Pei Zhang
,
Zhigang Wu
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B233
6,097
Downloads
7,644
Views
Citations
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,143
Downloads
6,629
Views
Citations
China’s Food Security Evaluation Based on Factor Analysis
(Articles)
Jie Zou
,
Shiqin Guo
American Journal of Industrial and Business Management
Vol.5 No.6
,June 29, 2015
DOI:
10.4236/ajibm.2015.56044
3,356
Downloads
4,914
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
2,962
Downloads
4,803
Views
Citations
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,065
Downloads
20,242
Views
Citations
An Immunity-Based IOT Environment Security Situation Awareness Model
(Articles)
Yuanquan Shi
,
Tao Li
,
Renfa Li
,
Xiaoning Peng
,
Pengju Tang
Journal of Computer and Communications
Vol.5 No.7
,May 25, 2017
DOI:
10.4236/jcc.2017.57016
1,610
Downloads
2,929
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top