Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Distance Control and Positive Security for Intrinsic Equipment Working in Explosive Potential Atmospheres
(Articles)
Emil Pop
,
Gabriel-Ioan Ilcea
,
Ionut-Alin Popa
Engineering
Vol.10 No.3
,March 16, 2018
DOI:
10.4236/eng.2018.103006
1,065
Downloads
1,974
Views
Citations
This article belongs to the Special Issue on
Safety System Engineering
Extending the Network Lifetime Using Optimized Energy Efficient Cross Layer Module (OEEXLM) in Wireless Sensor Networks
(Articles)
T. V. PADMAVATHY
Wireless Sensor Network
Vol.1 No.1
,April 10, 2009
DOI:
10.4236/wsn.2009.11005
8,061
Downloads
12,749
Views
Citations
An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split
(Articles)
Rui TU
,
Jinshu SU
,
Ruoshan KONG
Int'l J. of Communications, Network and System Sciences
Vol.2 No.7
,October 20, 2009
DOI:
10.4236/ijcns.2009.27072
5,516
Downloads
8,787
Views
Citations
Link Layer Correction Techniques and Impact on TCP’s Performance in IEEE 802.11 Wireless Networks
(Articles)
Purvang Dalal
,
Mohanchur Sarkar
,
Kankar Dasgupta
,
Nikhil Kothari
Communications and Network
Vol.6 No.2
,May 8, 2014
DOI:
10.4236/cn.2014.62007
4,762
Downloads
6,289
Views
Citations
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
(Articles)
Adeniran Ishola Oluwaranti
,
Tayo Dorcas Obasanya
Wireless Sensor Network
Vol.6 No.7
,July 21, 2014
DOI:
10.4236/wsn.2014.67014
3,581
Downloads
4,990
Views
Citations
Control Access Point of Devices for Delay Reduction in WBAN Systems with CSMA/CA
(Articles)
Akinobu Nemoto
,
Pham Thanh Hiep
,
Ryuji Kohno
Communications and Network
Vol.7 No.1
,January 29, 2015
DOI:
10.4236/cn.2015.71001
5,308
Downloads
6,045
Views
Citations
Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing
(Articles)
Asma Alotaibi
,
Ahmed Barnawi
,
Mohammed Buhari
Journal of Information Security
Vol.8 No.3
,July 14, 2017
DOI:
10.4236/jis.2017.83014
1,757
Downloads
3,503
Views
Citations
Decoupling Control Research on Test System of Hydraulic Drive Unit of Quadruped Robot Based on Diagonal Matrix Method
(Articles)
Lingxiao Quan
,
Wei Zhang
,
Bin Yu
,
Liang Ha
Intelligent Control and Automation
Vol.4 No.3
,August 7, 2013
DOI:
10.4236/ica.2013.43033
4,500
Downloads
6,021
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,822
Downloads
4,459
Views
Citations
Active-Disturbance-Rejection-Control for Temperature Control of the HVAC System
(Articles)
Chun-E. Huang
,
Chunwang Li
,
Xiaojun Ma
Intelligent Control and Automation
Vol.9 No.1
,February 11, 2018
DOI:
10.4236/ica.2018.91001
1,509
Downloads
2,989
Views
Citations
Electronic Throttle Control System: Modeling, Identification and Model-Based Control Designs
(Articles)
Robert N. K. Loh
,
Witt Thanom
,
Jan S. Pyko
,
Anson Lee
Engineering
Vol.5 No.7
,July 15, 2013
DOI:
10.4236/eng.2013.57071
9,063
Downloads
15,441
Views
Citations
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
(Articles)
Fabio Garzia
,
Natale Tirocchi
,
Michele Scarpiniti
,
Roberto Cusani
Communications and Network
Vol.4 No.3
,August 31, 2012
DOI:
10.4236/cn.2012.43024
4,116
Downloads
7,196
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,502
Downloads
6,998
Views
Citations
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
(Articles)
Xiao-min Ran
,
You-quan Mo
,
Yu-lei Chen
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2039
5,676
Downloads
6,875
Views
Citations
Influences of ±800 kV Yunnan-Guangdong HVDC System on Security and Stability of China Southern Power Grid
(Articles)
Baorong Zhou
,
Xiaoming Jin
,
Chao Hong
,
Pei Zhang
,
Zhigang Wu
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B233
6,113
Downloads
7,570
Views
Citations
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,149
Downloads
6,417
Views
Citations
China’s Food Security Evaluation Based on Factor Analysis
(Articles)
Jie Zou
,
Shiqin Guo
American Journal of Industrial and Business Management
Vol.5 No.6
,June 29, 2015
DOI:
10.4236/ajibm.2015.56044
3,372
Downloads
4,735
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
2,971
Downloads
4,666
Views
Citations
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,126
Downloads
19,670
Views
Citations
An Immunity-Based IOT Environment Security Situation Awareness Model
(Articles)
Yuanquan Shi
,
Tao Li
,
Renfa Li
,
Xiaoning Peng
,
Pengju Tang
Journal of Computer and Communications
Vol.5 No.7
,May 25, 2017
DOI:
10.4236/jcc.2017.57016
1,619
Downloads
2,816
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top