Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Probabilistic QOS Aware Congestion Control in Wireless Multimedia Sensor Networks
(Articles)
Muthuselvi Mayandi
,
Kavitha Velayudhan Pillai
Circuits and Systems
Vol.7 No.9
,July 5, 2016
DOI:
10.4236/cs.2016.79181
1,771
Downloads
2,724
Views
Citations
Near-Lossless Compression Based on a Full Range Gaussian Markov Random Field Model for 2D Monochrome Images
(Articles)
K. Seetharaman
,
V. Rekha
Journal of Signal and Information Processing
Vol.4 No.1
,February 27, 2013
DOI:
10.4236/jsip.2013.41002
4,272
Downloads
6,625
Views
Citations
Reverse Engineering Tool Based on Unified Mapping Method (RETUM): Class Diagram Visualizations
(Articles)
Rashmi Yadav
,
Ravindra Patel
,
Abhay Kothari
Journal of Computer and Communications
Vol.2 No.12
,October 29, 2014
DOI:
10.4236/jcc.2014.212005
3,912
Downloads
4,968
Views
Citations
Human Identity Verification Using Multispectral Palmprint Fusion
(Articles)
Dakshina Ranjan Kisku
,
Ajita Rattani
,
Phalguni Gupta
,
Jamuna Kanta Sing
,
C. Jinshong Hwang
Journal of Signal and Information Processing
Vol.3 No.2
,May 30, 2012
DOI:
10.4236/jsip.2012.32036
5,169
Downloads
9,379
Views
Citations
Automatic Classification of Unstructured Blog Text
(Articles)
Mita K. Dalal
,
Mukesh A. Zaveri
Journal of Intelligent Learning Systems and Applications
Vol.5 No.2
,May 22, 2013
DOI:
10.4236/jilsa.2013.52012
5,764
Downloads
8,755
Views
Citations
Performance Analysis of WDM RoF-EPON Link with and without DCF and FBG
(Articles)
Baljeet Kaur
,
Ajay K. Sharma
,
Vinod Kapoor
Optics and Photonics Journal
Vol.3 No.2
,June 7, 2013
DOI:
10.4236/opj.2013.32027
4,313
Downloads
6,842
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,893
Downloads
9,073
Views
Citations
A Homomorphic Crypto System for Electronic Election Schemes
(Articles)
Kannan Balasubramanian
,
M. Jayanthi
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710272
2,402
Downloads
4,402
Views
Citations
Treatment of Imbalance Dataset for Human Emotion Classification
(Articles)
Er. Shrawan Thakur
World Journal of Neuroscience
Vol.13 No.4
,November 6, 2023
DOI:
10.4236/wjns.2023.134012
95
Downloads
502
Views
Citations
Fuzzy Empowered Cognitive Spatial Relation Identification and Semantic Action Recognition
(Articles)
R. I. Minu
,
G. Nagarajan
Circuits and Systems
Vol.7 No.8
,June 24, 2016
DOI:
10.4236/cs.2016.78165
1,505
Downloads
2,215
Views
Citations
Anonymous Authentication for Secure Mobile Agent Based Internet Business
(Articles)
Sivaraman Audithan
,
Thanjavur Swaminathan Murunya
,
Pandi Vijayakumar
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78124
1,470
Downloads
2,314
Views
Citations
Reliability Estimation of Services Oriented Systems Using Adaptive Neuro Fuzzy Inference System
(Articles)
Ashish Seth
,
Himanshu Agarwal
,
Ashim Raj Singla
Journal of Software Engineering and Applications
Vol.7 No.7
,June 10, 2014
DOI:
10.4236/jsea.2014.77054
5,355
Downloads
6,625
Views
Citations
Feature Selection Based on Enhanced Cuckoo Search for Breast Cancer Classification in Mammogram Image
(Articles)
M. N. Sudha
,
S. Selvarajan
Circuits and Systems
Vol.7 No.4
,April 27, 2016
DOI:
10.4236/cs.2016.74028
2,623
Downloads
4,144
Views
Citations
Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks
(Articles)
Bhaskar Bhuyan
,
Nityananda Sarma
Communications and Network
Vol.8 No.1
,February 29, 2016
DOI:
10.4236/cn.2016.81006
3,386
Downloads
5,249
Views
Citations
All-Optical 3:8 Decoder with the Help of Terahertz Optical Asymmetric Demultiplexer
(Articles)
Dilip Kumar Gayen
Optics and Photonics Journal
Vol.6 No.7
,July 28, 2016
DOI:
10.4236/opj.2016.67020
1,414
Downloads
2,298
Views
Citations
CLUBAS: An Algorithm and Java Based Tool for Software Bug Classification Using Bug Attributes Similarities
(Articles)
Naresh Kumar Nagwani
,
Shrish Verma
Journal of Software Engineering and Applications
Vol.5 No.6
,June 19, 2012
DOI:
10.4236/jsea.2012.56050
6,811
Downloads
11,414
Views
Citations
The Context of Knowledge and Data Discovery in Highly Dense Data Points Using Heuristic Approach
(Articles)
C. S. Sasireka
,
P. Raviraj
Journal of Signal and Information Processing
Vol.4 No.1
,February 27, 2013
DOI:
10.4236/jsip.2013.41011
4,566
Downloads
6,460
Views
Citations
Wi-Fi: WPA2 Security Vulnerability and Solutions
(Articles)
Zahoor Ahmad Najar
,
Roohe Naaz Mir
Wireless Engineering and Technology
Vol.12 No.2
,April 18, 2021
DOI:
10.4236/wet.2021.122002
494
Downloads
2,907
Views
Citations
Computerized White Matter and Gray Matter Extraction from MRI of Brain Image
(Articles)
Sudipta Roy
,
Debayan Ganguly
,
Kingshuk Chatterjee
,
Samir Kumar Bandyopadhyay
Journal of Biomedical Science and Engineering
Vol.8 No.9
,September 4, 2015
DOI:
10.4236/jbise.2015.89054
3,243
Downloads
4,292
Views
Citations
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
(Articles)
Gulshan Kumar
,
Krishan Kumar
International Journal of Intelligence Science
Vol.2 No.4A
,November 1, 2012
DOI:
10.4236/ijis.2012.224016
7,797
Downloads
14,104
Views
Citations
This article belongs to the Special Issue on
Data-Oriented Intelligence
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top