Most Accessed Articles

Smart Wireless Sensor Network to Detect and Protect Sheep and Goats to Wolf Attacks

, 2013; 2(2): 91-101.

Sandra Sendra, Ferran Llario, Lorena Parra and Jaime Lloret


DOI: 10.2174/22117407112016660012


Optimization of Outdoor Video Surveillance

, 2015; 4(1): 16-39.

Omneya Issa, Wei Li, Hong Liu and Ron Renaud


DOI: 10.2174/2215081104666150730222334


Towards the Design of Social Media to Promote Physical Activity

, 2014; 3(1): 25-32.

Yao Meng


DOI: 10.2174/2215081102666140225004735


Stability Analysis for a Class of Stochastic Fuzzy Cellular Neural Networks with Markovian Jumping and Mixed Time Delays

, 2014; 3(1): 55-61.

Jingyi Wang and Guoqiang Peng


DOI: 10.2174/2215081102666140620224251


Mobile 3D Secure Transmission Based on Anonymous Buyer-Seller Watermarking Protocol

, 2014; 3(1): 33-43.

Suk-Hwan Lee, Seong-Geun Kwon and Ki-Ryong Kwon


DOI: 10.2174/2215081102666140225004344


An Efficient Token Passing Strategy in Improved Logical Ring Structure

, 2013; 2(1): 50-60.

Zhonglan Luo, Kai Lu and Xiaoping Wang


DOI: 10.2174/22117407112019990002


Performance Evaluation of Multi-Cloud Management and Control Systems

, 2016; 5(1): 9-18.

Lav Gupta, Raj Jain*, Mohammed Samaka, Aiman Erbad and Deval Bhamare


DOI: 10.2174/2215081105999160523095630


Webmaster Contact: info@benthamscience.org
Copyright © 2018 Bentham Science