Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Olive Mill Waste Water Management Study by Using Principal Component Analysis
(Articles)
Houda Sahnoun
,
Mohamed Moncef Serbaji
,
Boubaker Karray
,
Khaled Medhioub
International Journal of Geosciences
Vol.4 No.2
,March 29, 2013
DOI:
10.4236/ijg.2013.42041
4,489
Downloads
7,340
Views
Citations
Classification of Hourly Clearness Index of Solar Radiation in the District of Yamoussoukro
(Articles)
Siaman Paule Carine Yeboua
,
Yao N’Goran
,
Kouakou Konan
Energy and Power Engineering
Vol.11 No.5
,May 31, 2019
DOI:
10.4236/epe.2019.115014
744
Downloads
2,047
Views
Citations
Emotion Classification from EEG Signals Using Time-Frequency-DWT Features and ANN
(Articles)
Adrian Qi-Xiang Ang
,
Yi Qi Yeong
,
Wee Wee
Journal of Computer and Communications
Vol.5 No.3
,March 13, 2017
DOI:
10.4236/jcc.2017.53009
1,823
Downloads
3,795
Views
Citations
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis
(Articles)
John Babu
,
Sridevi Rangu
,
Pradyusha Manogna
Journal of Information Security
Vol.8 No.3
,July 14, 2017
DOI:
10.4236/jis.2017.83013
2,047
Downloads
4,594
Views
Citations
The Discriminate Analysis and Dimension Reduction Methods of High Dimension
(Articles)
Lan Fu
Open Journal of Social Sciences
Vol.3 No.3
,March 18, 2015
DOI:
10.4236/jss.2015.33002
5,987
Downloads
6,765
Views
Citations
Optical-Elevation Data Co-Registration and Classification-Based Height Normalization for Building Detection in Stereo VHR Images
(Articles)
Alaeldin Suliman
,
Yun Zhang
Advances in Remote Sensing
Vol.6 No.2
,June 9, 2017
DOI:
10.4236/ars.2017.62008
1,537
Downloads
2,522
Views
Citations
DM-L Based Feature Extraction and Classifier Ensemble for Object Recognition
(Articles)
Hamayun A. Khan
Journal of Signal and Information Processing
Vol.9 No.2
,May 31, 2018
DOI:
10.4236/jsip.2018.92006
1,233
Downloads
2,969
Views
Citations
Financial Anomalies and Creditworthiness: A Python-Driven Machine Learning Approach Using Mahalanobis Distance for ISE-Listed Companies in the Production and Manufacturing Sector
(Articles)
Hasan Demirhan
Journal of Financial Risk Management
Vol.13 No.1
,January 25, 2024
DOI:
10.4236/jfrm.2024.131001
83
Downloads
462
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
2,971
Downloads
4,667
Views
Citations
Analysis of Urban Change in Shenzhen City Based on Landsat Archived Data
(Articles)
Tingting Chen
,
Hermann Josef Kaufmann
Journal of Computer and Communications
Vol.6 No.11
,November 19, 2018
DOI:
10.4236/jcc.2018.611014
712
Downloads
1,423
Views
Citations
Research on the Influence of Industrial Upgrading on Independent Innovation Ability in China—Based on Inter-Provincial Panel Data
(Articles)
Tianhao Fu
,
Pengbo Shao
Open Journal of Business and Management
Vol.7 No.4
,October 18, 2019
DOI:
10.4236/ojbm.2019.74135
417
Downloads
1,142
Views
Citations
Function-on-Partially Linear Functional Additive Models
(Articles)
Jinyou Huang
,
Shuang Chen
Journal of Applied Mathematics and Physics
Vol.8 No.1
,December 26, 2019
DOI:
10.4236/jamp.2020.81001
498
Downloads
1,027
Views
Citations
Extracting Multiple Nodes in a Brain Region of Interest for Brain Functional Network Estimation and Classification
(Articles)
Chengcheng Wang
,
Haimei Wang
,
Yifan Qiao
,
Yining Zhang
Journal of Applied Mathematics and Physics
Vol.10 No.11
,November 29, 2022
DOI:
10.4236/jamp.2022.1011226
77
Downloads
282
Views
Citations
Review of Dimension Reduction Methods
(Articles)
Salifu Nanga
,
Ahmed Tijani Bawah
,
Benjamin Ansah Acquaye
,
Mac-Issaka Billa
,
Francis Delali Baeta
,
Nii Afotey Odai
,
Samuel Kwaku Obeng
,
Ampem Darko Nsiah
Journal of Data Analysis and Information Processing
Vol.9 No.3
,August 31, 2021
DOI:
10.4236/jdaip.2021.93013
1,257
Downloads
7,111
Views
Citations
A new projection method for biological semantic map generation
(Articles)
Hoan N. Nguyen
,
Nicolas Wicker
,
David Kieffer
,
Olivier Poch
Journal of Biomedical Science and Engineering
Vol.3 No.1
,January 12, 2010
DOI:
10.4236/jbise.2010.31002
5,451
Downloads
9,781
Views
Citations
Research on Face Recognition Algorithm Based on Robust 2DPCA
(Articles)
Haijun Kuang
,
Wanzhou Ye
,
Ze Zhu
Advances in Pure Mathematics
Vol.11 No.2
,February 22, 2021
DOI:
10.4236/apm.2021.112010
362
Downloads
1,172
Views
Citations
A Network Intrusion Detection Model Based on Immune Multi-Agent
(Articles)
Nian LIU
,
Sunjun LIU
,
Rui LI
,
Yong LIU
Int'l J. of Communications, Network and System Sciences
Vol.2 No.6
,September 22, 2009
DOI:
10.4236/ijcns.2009.26063
5,755
Downloads
10,097
Views
Citations
Research on Access Network Intrusion Detection System Based on DMT Technology
(Articles)
Lingxi Wu
,
Jie Zhan
,
Qiange He
,
Shuiyan He
Int'l J. of Communications, Network and System Sciences
Vol.3 No.5
,May 31, 2010
DOI:
10.4236/ijcns.2010.35064
4,381
Downloads
8,101
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,261
Downloads
8,103
Views
Citations
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
,March 12, 2014
DOI:
10.4236/jis.2014.52004
4,688
Downloads
6,369
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top