Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Optimal Mission Task Assignment for Complex Military Simulator Operations
(Articles)
Eunghyun Lee
,
Suhwan Kim
,
Yongjin Kwon
Journal of Computer and Communications
Vol.3 No.11
,November 19, 2015
DOI:
10.4236/jcc.2015.311014
2,260
Downloads
2,819
Views
Citations
Analysis of Mission Task Loading Based on the External Disturbance
(Articles)
Eunghyun Lee
,
Suhwan Kim
,
Yongjin Kwon
Journal of Computer and Communications
Vol.3 No.11
,November 19, 2015
DOI:
10.4236/jcc.2015.311015
2,366
Downloads
2,943
Views
Citations
Analysis of Uncontrollable Variables to the Performance of Predefined Tasks
(Articles)
Eunghyun Lee
,
Jinwoo Lee
,
Jungwan Hong
,
Younghoon Ko
,
Yongjin Kwon
,
Sang C. Park
,
Jonghoon Lee
,
Miseon Yi
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 25, 2013
DOI:
10.4236/jsea.2012.512B027
3,860
Downloads
5,373
Views
Citations
Rotosonde: Acquiring Vertical Wind Profile of a Tropical Cyclone with Small Unmanned Helicopters
(Articles)
Chung-Kiak Poh
,
Chung-How Poh
Advances in Aerospace Science and Technology
Vol.2 No.2
,May 2, 2017
DOI:
10.4236/aast.2017.22002
1,837
Downloads
2,928
Views
Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
(Articles)
Akinjide A. Akinola
,
Adeyemi A. Adekoya
,
Ayoade O. Kuye
,
Abiodun Ayodeji
Journal of Information Security
Vol.10 No.3
,June 17, 2019
DOI:
10.4236/jis.2019.103006
733
Downloads
2,361
Views
Citations
Establishing Benchmarks for Helicopter EMS Patient Stabilization Times in Interfacility Transport for Primary Percutaneous Coronary Intervention
(Articles)
Loren Brown
,
Annette Arthur
,
Claudia Keeling
,
Christine Yuhas
,
Stephen H. Thomas
International Journal of Clinical Medicine
Vol.3 No.7A
,January 2, 2013
DOI:
10.4236/ijcm.2012.37A134
3,893
Downloads
5,515
Views
Citations
This article belongs to the Special Issue on
Emergency Medicine
Helicopter EMS beyond Trauma: Utilization of Air Transport for Non-Trauma Conditions
(Articles)
Stephen H. Thomas
,
Lori J. Whelan
,
Emily Williams
,
Loren Brown
International Journal of Clinical Medicine
Vol.4 No.12
,December 18, 2013
DOI:
10.4236/ijcm.2013.412090
4,396
Downloads
6,547
Views
Citations
The Evolution of Reliability and Efficiency of Aerospace Bearing Systems
(Articles)
Peter Gloeckner
,
Charles Rodway
Engineering
Vol.9 No.11
,November 30, 2017
DOI:
10.4236/eng.2017.911058
3,796
Downloads
8,552
Views
Citations
This article belongs to the Special Issue on
Aeronautical and Astronautical Engineering
An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack
(Articles)
Hyun Woo Lee
,
Tae Ho Cho
Wireless Sensor Network
Vol.4 No.8
,August 29, 2012
DOI:
10.4236/wsn.2012.48027
4,378
Downloads
6,491
Views
Citations
A Novel Solution to Handle DDOS Attack in MANET
(Articles)
Meghna Chhabra
,
Brij Gupta
,
Ammar Almomani
Journal of Information Security
Vol.4 No.3
,July 16, 2013
DOI:
10.4236/jis.2013.43019
7,448
Downloads
13,231
Views
Citations
Public Key Infrastructure: A Survey
(Articles)
Aysha Albarqi
,
Ethar Alzaid
,
Fatimah Al Ghamdi
,
Somaya Asiri
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 8, 2015
DOI:
10.4236/jis.2015.61004
5,702
Downloads
10,298
Views
Citations
A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack
(Articles)
Minmin Xie
,
Yong Wang
,
Chunming Zou
,
Yingjie Tian
,
Naiwang Guo
Journal of Computer and Communications
Vol.8 No.11
,November 24, 2020
DOI:
10.4236/jcc.2020.811007
352
Downloads
1,013
Views
Citations
Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks
(Articles)
Vennam Ratna Kumari
,
Aitha Nagaraju
,
Gaurav Pareek
Journal of Sensor Technology
Vol.4 No.2
,May 21, 2014
DOI:
10.4236/jst.2014.42006
3,916
Downloads
5,332
Views
Citations
Using of Particle Swarm for Performance Optimization of Helicopter Rotor Blades
(Articles)
Giorgio Guglieri
Applied Mathematics
Vol.3 No.10A
,November 1, 2012
DOI:
10.4236/am.2012.330197
4,920
Downloads
7,820
Views
Citations
This article belongs to the Special Issue on
Optimization
Safety Distance Determination for 500 kV AC Transmission Line’s Helicopter Inspection
(Articles)
Shuwei Wan
,
Xingming Bian
,
Lan Chen
,
Liming Wang
,
Zhicheng Guan
Energy and Power Engineering
Vol.5 No.4B
,November 15, 2013
DOI:
10.4236/epe.2013.54B219
7,092
Downloads
10,020
Views
Citations
Appliance of Geophysical Methods to Detect the Ancient Remains at “Tell Defenneh” Area, Ismailia, Egypt
(Articles)
Alhussein Adham Basheer
,
Ahmed El-Kotb Al-Imam
,
Abdelnasser Mohammed Abdelmotaal
,
Mostafa Sarhan Toni
,
Sayed Omar Elkhateeb
Archaeological Discovery
Vol.2 No.3
,July 23, 2014
DOI:
10.4236/ad.2014.23009
3,147
Downloads
4,883
Views
Citations
Numerical Study on Low-Reynolds Compressible Flows around Mars Helicopter Rotor Blade Airfoil
(Articles)
Takuma Yamaguchi
,
Masayuki Anyoji
Journal of Flow Control, Measurement & Visualization
Vol.11 No.2
,April 28, 2023
DOI:
10.4236/jfcmv.2023.112003
264
Downloads
1,611
Views
Citations
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment
(Articles)
Sanjeev Kumar
,
Orifiel Gomez
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12010
10,911
Downloads
21,174
Views
Citations
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks
(Articles)
Rodolfo Baez Junior
,
Sanjeev Kumar
Journal of Information Security
Vol.5 No.3
,July 24, 2014
DOI:
10.4236/jis.2014.53012
5,181
Downloads
6,985
Views
Citations
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods
(Articles)
Arman Sargolzaei
,
Kang Yen
,
Mohamed Abdelghani
,
Alireza Abbaspour
,
Saman Sargolzaei
Intelligent Control and Automation
Vol.8 No.3
,August 23, 2017
DOI:
10.4236/ica.2017.83013
1,283
Downloads
2,783
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top