Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Quick Method for Judging the Feasibility of Security-Constrained Unit Commitment Problems within Lagrangian Relaxation Framework
(Articles)
Sangang Guo
Energy and Power Engineering
Vol.4 No.6
,November 29, 2012
DOI:
10.4236/epe.2012.46057
5,287
Downloads
7,470
Views
Citations
Trust and Security on Semantic HIM (Health Information Management)
(Articles)
Nasim Khozouei
,
Razie Vanda
,
Peyman Khozouei
Intelligent Information Management
Vol.4 No.6
,November 30, 2012
DOI:
10.4236/iim.2012.46045
4,432
Downloads
7,228
Views
Citations
Detection of Influenza Viruses Attached to an Optical Disk
(Articles)
Takayuki Shima
,
Makoto Fujimaki
,
Akihiro Yoshida
,
Subash C. B. Gopinath
,
Masashi Kuwahara
,
Yoshimichi Ohki
,
Koichi Awazu
Journal of Biomaterials and Nanobiotechnology
Vol.4 No.2
,April 17, 2013
DOI:
10.4236/jbnb.2013.42020
4,129
Downloads
5,822
Views
Citations
Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
(Articles)
Dmitry Silnov
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42014
5,154
Downloads
8,386
Views
Citations
Quantitative Security Evaluation for Software System from Vulnerability Database
(Articles)
Hiroyuki Okamura
,
Masataka Tokuzane
,
Tadashi Dohi
Journal of Software Engineering and Applications
Vol.6 No.4A
,April 23, 2013
DOI:
10.4236/jsea.2013.64A003
4,412
Downloads
6,850
Views
Citations
This article belongs to the Special Issue on
Software Dependability
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images
(Articles)
Yanping Zhang
,
Juan Jiang
,
Yongliang Zha
,
Heng Zhang
,
Shu Zhao
International Journal of Intelligence Science
Vol.3 No.2
,April 30, 2013
DOI:
10.4236/ijis.2013.32009
8,355
Downloads
13,762
Views
Citations
Web Security and Log Management: An Application Centric Perspective
(Articles)
Andrew Mwaura Kahonge
,
William Okello-Odongo
,
Evans K. Miriti
,
Elisha Abade
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43016
4,575
Downloads
7,924
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43017
10,408
Downloads
17,346
Views
Citations
Engaged Learning and Change through Undergraduate Research: A Case Study of the Heart of Gold Community Empowerment Project
(Articles)
David William Robinson
,
J. Laureen Styles
,
Nichola Evernden
,
Kassandra Kirkham
Creative Education
Vol.4 No.7B
,July 18, 2013
DOI:
10.4236/ce.2013.47A2013
3,937
Downloads
5,688
Views
Citations
This article belongs to the Special Issue on
Higher Education
An Inquiry into the Effectiveness of Student Generated MCQs as a Method of Assessment to Improve Teaching and Learning
(Articles)
Damien Hutchinson
,
Jason Wells
Creative Education
Vol.4 No.7B
,July 18, 2013
DOI:
10.4236/ce.2013.47A2014
6,324
Downloads
9,476
Views
Citations
This article belongs to the Special Issue on
Higher Education
Three-defense Line Coordination Strategy of the Guizhou Power Grid with the New Security Situation
(Articles)
Wencheng Zheng
,
Tao Yu
Energy and Power Engineering
Vol.5 No.3B
,July 31, 2013
DOI:
10.4236/epe.2013.53B008
4,464
Downloads
5,417
Views
Citations
Security Regulations in Mexican Renewable Energies: Case of Geothermal Projects
(Articles)
Alfonso Aragón-Aguilar
,
Georgina Izquierdo-Montalvo
,
Víctor Arellano-Gómez
Smart Grid and Renewable Energy
Vol.4 No.6A
,September 3, 2013
DOI:
10.4236/sgre.2013.46A003
31,127
Downloads
39,452
Views
Citations
This article belongs to the Special Issue on
Smart Grid Security
Computer Assisted Alerts Using Mental Model Approach for Customer Service Improvement
(Articles)
Abid Ghaffar
,
Mohamed Ridza Wahiddin
,
Asadullah Shaikh
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B005
3,695
Downloads
5,153
Views
Citations
Integrated Water Resources Management (IWRM) Impacts in South West Coastal Zone of Bangladesh and Fact-Finding on Tidal River Management (TRM)
(Articles)
Fahad Khan Khadim
,
Kanak Kanti Kar
,
Pronab Kumar Halder
,
Md. Atiqur Rahman
,
A.K.M. Mostafa Morshed
Journal of Water Resource and Protection
Vol.5 No.10
,October 21, 2013
DOI:
10.4236/jwarp.2013.510098
5,813
Downloads
11,908
Views
Citations
Study on Approach of Static Security Assessment Accounting for Electro-thermal Coupling
(Articles)
Mengxia Wang
,
Hongbin Sun
,
Jinxin Huang
,
Qiang Zhang
Energy and Power Engineering
Vol.5 No.4B
,October 31, 2013
DOI:
10.4236/epe.2013.54B136
4,400
Downloads
5,449
Views
Citations
Artificial Noise Based Security Algorithm for Multi-User MIMO System
(Articles)
Jian-hua Peng
,
Kai-zhi Huang
,
Jiang Ji
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2037
5,862
Downloads
7,569
Views
Citations
Research on Security Assessment Index System for Operating Reserve in Large Interconnected Power Grid
(Articles)
Mingsong Liu
,
Huadong Sun
,
Jian He
,
Hengxu Zhang
,
Jun Yi
,
Jian Zhang
Energy and Power Engineering
Vol.5 No.4B
,November 11, 2013
DOI:
10.4236/epe.2013.54B151
4,995
Downloads
6,145
Views
Citations
Study on the Real-Time Security Evaluation for the Train Service Status Using Safety Region Estimation
(Articles)
Guiling Liao
,
Yong Qin
,
Xiaoqing Cheng
,
Lisha Pan
,
Lin He
,
Shan Yu
,
Yuan Zhang
Journal of Intelligent Learning Systems and Applications
Vol.5 No.4
,November 12, 2013
DOI:
10.4236/jilsa.2013.54025
4,179
Downloads
5,811
Views
Citations
This article belongs to the Special Issue on
Intelligent Information Processing in Metro Train Safety-Critical System and Application
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,366
Downloads
8,030
Views
Citations
Evolution of Slum Redevelopment Policy
(Articles)
Deepika Andavarapu
,
David J. Edelman
Current Urban Studies
Vol.1 No.4
,December 24, 2013
DOI:
10.4236/cus.2013.14021
7,501
Downloads
12,928
Views
Citations
<
...
24
25
26
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top