Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Relevance of Advanced Plant Disease Detection Techniques in Disease and Pest Management for Ensuring Food Security and Their Implication: A Review
(Articles)
Matthew Abu John
,
Ibukunoluwa Bankole
,
Oluwatayo Ajayi-Moses
,
Tofunmi Ijila
,
Timilehin Jeje
,
Patil Lalit
American Journal of Plant Sciences
Vol.14 No.11
,November 17, 2023
DOI:
10.4236/ajps.2023.1411086
154
Downloads
841
Views
Citations
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia
(Articles)
Amir Mohamed Talib
,
Fahad Omar Alomary
,
Hanan Fouad Alwadi
,
Rawan Rashed Albusayli
Journal of Information Security
Vol.9 No.4
,October 26, 2018
DOI:
10.4236/jis.2018.94021
1,529
Downloads
3,246
Views
Citations
Putting Green Lean Six Sigma Framework into Practice in a Jute Industry of Bangladesh: A Case Study
(Articles)
Subrata Talapatra
,
Anindya Gaine
American Journal of Industrial and Business Management
Vol.9 No.12
,December 17, 2019
DOI:
10.4236/ajibm.2019.912144
1,249
Downloads
3,091
Views
Citations
Development of a Six Sigma Infrastructure for Trabeculectomy Process
(Articles)
Can Öztürker
,
İbrahim Şahbaz
,
Zeynep Karaarası Öztürker
,
Mehmet Tolga Taner
,
Şükrü Bayraktar
,
Gamze Kağan
American Journal of Operations Research
Vol.4 No.4
,July 10, 2014
DOI:
10.4236/ajor.2014.44024
2,521
Downloads
3,766
Views
Citations
A Comprehensive Evaluation of Eye Surgery Performance by Sigma Quality Level for Eye Care Hospitals in Turkey
(Articles)
İbrahim Şahbaz
,
Mehmet Tolga Taner
,
Gamze Kağan
,
Engin Erbaş
American Journal of Operations Research
Vol.5 No.5
,August 19, 2015
DOI:
10.4236/ajor.2015.55028
2,797
Downloads
3,418
Views
Citations
Quantitative Security Evaluation for Software System from Vulnerability Database
(Articles)
Hiroyuki Okamura
,
Masataka Tokuzane
,
Tadashi Dohi
Journal of Software Engineering and Applications
Vol.6 No.4A
,April 23, 2013
DOI:
10.4236/jsea.2013.64A003
4,415
Downloads
6,859
Views
Citations
This article belongs to the Special Issue on
Software Dependability
A Framework for Continuous Improvement in Supply Chain Management Education
(Articles)
Kaitie Perrine
,
Sime Curkovic
Creative Education
Vol.13 No.2
,February 16, 2022
DOI:
10.4236/ce.2022.132027
323
Downloads
1,540
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,554
Downloads
10,275
Views
Citations
Virtualization Security, Strategy and Management
(Articles)
Simon Tran
,
Stuart Gold
Int'l J. of Communications, Network and System Sciences
Vol.7 No.10
,October 16, 2014
DOI:
10.4236/ijcns.2014.710043
5,008
Downloads
6,313
Views
Citations
This article belongs to the Special Issue on
Virtual Network
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
(Articles)
Fauziyah Fauziyah
,
Zhaosun Wang
,
Gabriel Joy
Journal of Information Security
Vol.13 No.4
,September 23, 2022
DOI:
10.4236/jis.2022.134016
371
Downloads
1,830
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,935
Downloads
4,630
Views
Citations
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
(Articles)
Sina Ahmadi
Journal of Information Security
Vol.15 No.2
,March 27, 2024
DOI:
10.4236/jis.2024.152010
74
Downloads
689
Views
Citations
Case Study on the Lean Six Sigma Management for Information Technology Service Management Project of G Commercial Bank
(Articles)
Yongmei Xu
,
Fan Zhang
,
Xiaowen Ye
Technology and Investment
Vol.4 No.2
,May 24, 2013
DOI:
10.4236/ti.2013.42009
8,282
Downloads
12,886
Views
Citations
Evaluation of Laboratory Performance with Quality Indicators in Infectious Disease Hospital, Kano, Nigeria
(Articles)
Feyisayo Ebenezer Jegede
,
Henry Akwen Mbah
,
Mansur Aminu
,
Timothy Nathaniel Yakubu
,
Kwasi Torpey
Open Journal of Clinical Diagnostics
Vol.5 No.1
,February 11, 2015
DOI:
10.4236/ojcd.2015.51001
5,670
Downloads
8,174
Views
Citations
Reasons for Operational Excellence Deployment Failures and How to Avoid Them
(Articles)
Bruno G. Rüttimann
,
Martin T. Stöckli
Journal of Service Science and Management
Vol.8 No.4
,August 24, 2015
DOI:
10.4236/jssm.2015.84061
4,009
Downloads
5,199
Views
Citations
Lean, Six Sigma and Lean Six Sigma in Higher Education: A Review of Experiences around the World
(Articles)
Sylvie Nadeau
American Journal of Industrial and Business Management
Vol.7 No.5
,May 22, 2017
DOI:
10.4236/ajibm.2017.75044
3,836
Downloads
8,091
Views
Citations
Adapting Ethics and Compliance Programs for Modern Management Tools
(Articles)
Valeriu Deciu
American Journal of Industrial and Business Management
Vol.12 No.7
,July 19, 2022
DOI:
10.4236/ajibm.2022.127066
184
Downloads
766
Views
Citations
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
(Articles)
Abdulrahman H. Altalhi
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41011
5,177
Downloads
8,828
Views
Citations
An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks
(Articles)
Benamar Kadri
,
Djilalli Moussaoui
,
Mohammed Feham
,
Abdellah Mhammed
Wireless Sensor Network
Vol.4 No.6
,June 13, 2012
DOI:
10.4236/wsn.2012.46022
5,451
Downloads
10,606
Views
Citations
Competence of Security Officers in the Management of National Examinations in Secondary Schools in Eastern Province, Kenya
(Articles)
George M. George M. Muthaa
,
Peter K. Muriungi
,
Eunice Kagendo Njue
Open Journal of Social Sciences
Vol.2 No.12
,December 22, 2014
DOI:
10.4236/jss.2014.212010
3,548
Downloads
4,173
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top