Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cryo-ET Workflow for Understanding Ion Channels Localization on the Nodes of Ranvier
(Articles)
Jiaxuan Wang
Journal of Biosciences and Medicines
Vol.8 No.2
,February 7, 2020
DOI:
10.4236/jbm.2020.82005
712
Downloads
2,070
Views
Citations
Using a Panel of Immunohistochemical Stains to Determine Risk of Lymph Node Metastases in Women with Endometrioid Adenocarcinoma of the Endometrium
(Articles)
Karina Zapiecki
,
Greg A. Miller
,
Zhen Zhou
,
Kelly J. Manahan
,
John P. Geisler
Journal of Cancer Therapy
Vol.2 No.4
,October 12, 2011
DOI:
10.4236/jct.2011.24067
4,682
Downloads
7,913
Views
Citations
Employing Orphan Nodes to Avoid Energy Holes in Wireless Sensor Networks
(Articles)
Sepideh Zareei
,
Elham Babaee
,
Rosli Salleh
,
Saeed Moghadam
Communications and Network
Vol.5 No.3C
,October 9, 2013
DOI:
10.4236/cn.2013.53B2112
3,244
Downloads
4,806
Views
Citations
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household
(Articles)
Xiangdong Hu
,
Hongru Xu
,
Kaimin Han
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27001
3,349
Downloads
4,509
Views
Citations
Wireless Sensor Networks for Water Quality Monitoring and Control within Lake Victoria Basin: Prototype Development
(Articles)
Anthony Faustine
,
Aloys N. Mvuma
,
Hector J. Mongi
,
Maria C. Gabriel
,
Albino J. Tenge
,
Samuel B. Kucel
Wireless Sensor Network
Vol.6 No.12
,December 11, 2014
DOI:
10.4236/wsn.2014.612027
12,626
Downloads
16,864
Views
Citations
Kimura’s Disease: A Case Report and Literature Review
(Review)
Atoumane Faye
,
Nafissatou Diagne Sakho
,
Awa Cheikh Ndao Mbengue
,
Fatou Samba D. Ndiaye
,
Seynabou Fall
,
Boundia Djiba
,
Baidy Sy Kane
,
Souhaibou Ndongo
,
Abdoulaye Pouye
Open Journal of Internal Medicine
Vol.5 No.2
,June 18, 2015
DOI:
10.4236/ojim.2015.52003
4,299
Downloads
5,794
Views
Citations
SCSBE: Secured Cluster and Sleep Based Energy-Efficient Sensory Data Collection with Mobile Sinks
(Articles)
S. Balaji
,
Y. Harold Robinson
,
M. Rajaram
Circuits and Systems
Vol.7 No.8
,June 28, 2016
DOI:
10.4236/cs.2016.78173
1,592
Downloads
2,458
Views
Citations
How Does the Cortactin Gene Expression Affect Breast Cancer among Iranian Females?
(Articles)
Tutunchi Sara
,
Saffari Mojtaba
,
Mazaheri Mahta
,
Nourmohammadi Parisa
,
Nourmohammadi Bahareh
,
Shirkoohi Reza
,
Ghasemi Nasrin
Advances in Breast Cancer Research
Vol.5 No.4
,September 12, 2016
DOI:
10.4236/abcr.2016.54017
1,535
Downloads
2,936
Views
Citations
Exploring the Identification and Effects of “Opinion Leader” under Different Information Release Strategies
(Articles)
Si Yang
Social Networking
Vol.7 No.3
,July 23, 2018
DOI:
10.4236/sn.2018.73013
773
Downloads
1,768
Views
Citations
Energy Efficient Direction-Based Topology Control Algorithm for WSN
(Articles)
Muhammad Asghar Khan
,
Sadam Hussain
Wireless Sensor Network
Vol.12 No.3
,March 27, 2020
DOI:
10.4236/wsn.2020.123003
679
Downloads
2,379
Views
Citations
Rational Approximation to |
x
| at Logarithmic Nodes
(Articles)
Jiao Fang
,
Yi Zhao
,
Guojing Hai
Advances in Pure Mathematics
Vol.11 No.1
,January 21, 2021
DOI:
10.4236/apm.2021.111003
295
Downloads
816
Views
Citations
Appraisal of Engineering Phases of a Mineral Asset: From Exploration to Mine Approval
(Articles)
Edmundo Tulcanaza
J. of Minerals and Materials Characterization and Eng.
Vol.11 No.3
,May 31, 2023
DOI:
10.4236/jmmce.2023.113007
130
Downloads
466
Views
Citations
A Case Series of Various Swelling of Fingers in Adults
(Articles)
S. K. Venkatesh Gupta
,
Srujith Kommera
Open Journal of Orthopedics
Vol.4 No.12
,December 10, 2014
DOI:
10.4236/ojo.2014.412052
3,285
Downloads
4,614
Views
Citations
A Two Step Secure Spectrum Sensing Algorithm Using Fuzzy Logic for Cognitive Radio Networks
(Articles)
Ehsan Moeen Taghavi
,
Bahman Abolhassani
Int'l J. of Communications, Network and System Sciences
Vol.4 No.8
,August 19, 2011
DOI:
10.4236/ijcns.2011.48062
5,490
Downloads
10,316
Views
Citations
Malicious Node Detection Using Confidence Level Evaluation in a Grid-Based Wireless Sensor Network
(Articles)
Min-Cheol Shin
,
Yoon-Hwa Choi
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53007
5,147
Downloads
9,020
Views
Citations
An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing
(Articles)
Siti-Hajar-Aminah Ali
,
Seiichi Ozawa
,
Junji Nakazato
,
Tao Ban
,
Jumpei Shimamura
Journal of Intelligent Learning Systems and Applications
Vol.7 No.2
,April 22, 2015
DOI:
10.4236/jilsa.2015.72005
5,233
Downloads
6,761
Views
Citations
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,153
Downloads
5,829
Views
Citations
Global Stability of SEIQRS Computer Virus Propagation Model with Non-Linear Incidence Function
(Articles)
Qaisar Badshah
Applied Mathematics
Vol.6 No.11
,October 29, 2015
DOI:
10.4236/am.2015.611170
2,433
Downloads
3,348
Views
Citations
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,760
Downloads
2,584
Views
Citations
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
(Articles)
Carlisle Adams
Journal of Information Security
Vol.13 No.4
,October 12, 2022
DOI:
10.4236/jis.2022.134018
152
Downloads
951
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top