Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
(Articles)
Abou_el_ela Abdou Hussein
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121004
3,022
Downloads
12,632
Views
Citations
A Robust Non-Blind Watermarking for Biomedical Images Based on Chaos
(Articles)
Noura Alexendre
,
Ntsama Eloundou Pascal
,
Simo Thierry
,
Welba Colince
Journal of Computer and Communications
Vol.9 No.2
,February 3, 2021
DOI:
10.4236/jcc.2021.92001
404
Downloads
1,359
Views
Citations
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
(Articles)
Gulain Mugaruka Buduge
,
Jérémie Ndikumagenge
,
Justin Buhendwa Nyenyezi
Journal of Information Security
Vol.13 No.4
,September 30, 2022
DOI:
10.4236/jis.2022.134017
135
Downloads
584
Views
Citations
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
,November 30, 2022
DOI:
10.4236/ica.2022.134004
121
Downloads
916
Views
Citations
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
(Articles)
Pawan Kumar
,
Vipin Saxena
Journal of Computer and Communications
Vol.12 No.2
,February 29, 2024
DOI:
10.4236/jcc.2024.122012
47
Downloads
197
Views
Citations
Multimedia Streaming for Ad Hoc Wireless Mesh Networks Using Network Coding
(Articles)
Basil Saeed
,
Chung-Horng Lung
,
Thomas Kunz
,
Anand Srinivasan
Int'l J. of Communications, Network and System Sciences
Vol.6 No.5
,May 15, 2013
DOI:
10.4236/ijcns.2013.65024
4,023
Downloads
6,850
Views
Citations
An Efficient Approach for Segmentation, Feature Extraction and Classification of Audio Signals
(Articles)
Muthumari Arumugam
,
Mala Kaliappan
Circuits and Systems
Vol.7 No.4
,April 26, 2016
DOI:
10.4236/cs.2016.74024
2,865
Downloads
5,456
Views
Citations
Effects of Mental Activity on Hand Skill Rate Performance Ability among Second Grader Medical Students
(Articles)
Nimet Unay Gundogan
,
Erhan Kiziltan
,
Leyla Aydin
,
Ersin Ogus
Open Access Library Journal
Vol.3 No.1
,January 25, 2016
DOI:
10.4236/oalib.1102275
667
Downloads
1,326
Views
Citations
On Stable Reconstruction of the Impact in the System of Ordinary Differential Equations
(Articles)
Andrei Y. Vdovin
,
Svetlana S. Rubleva
Applied Mathematics
Vol.1 No.2
,July 22, 2010
DOI:
10.4236/am.2010.12015
6,477
Downloads
14,498
Views
Citations
Optimal Reconfiguration of Power Distribution Systems Based on Symbiotic Organism Search Algorithm
(Articles)
Alexandre Teplaira Boum
,
Patrik Roger Ndjependa
,
Jacquie Ngo Bisse
Journal of Power and Energy Engineering
Vol.5 No.11
,November 17, 2017
DOI:
10.4236/jpee.2017.511001
1,165
Downloads
2,564
Views
Citations
Study of the Interception Scheme Based on A* Path Finding Algorithm in Computer Game
(Articles)
Zhenjie Li
,
Haiming Li
Journal of Computer and Communications
Vol.8 No.7
,July 30, 2020
DOI:
10.4236/jcc.2020.87004
508
Downloads
1,803
Views
Citations
Nature Scene Signs Recognition by Affine Scale-Invariant Feature Transform
(Articles)
Xin Li
,
Liuguang Song
,
Yuqi Sun
Open Access Library Journal
Vol.8 No.12
,December 24, 2021
DOI:
10.4236/oalib.1108225
65
Downloads
373
Views
Citations
Integrated Optimization of Mechanisms with Genetic Algorithms
(Articles)
Jean-Luc Marcelin
Engineering
Vol.2 No.6
,July 1, 2010
DOI:
10.4236/eng.2010.26057
6,843
Downloads
11,271
Views
Citations
Rapid Quantum Search Algorithm
(Articles)
Yehuda Roth
Journal of Modern Physics
Vol.4 No.9
,September 3, 2013
DOI:
10.4236/jmp.2013.49158
4,415
Downloads
6,517
Views
Citations
Design and Simulation of a Secure and Robust Underwater Acoustic Communication System in the Persian Gulf
(Articles)
Abdollah Doosti Aref
,
Mohammad Javad Jannati
,
Vahid Tabataba Vakili
Communications and Network
Vol.3 No.2
,May 19, 2011
DOI:
10.4236/cn.2011.32012
6,374
Downloads
13,016
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,938
Downloads
5,006
Views
Citations
Efficient FPGA implementation of AES 128 bit for IEEE 802.16e mobile WiMax standards
(Articles)
P. Rajasekar
,
Dr. H. Mangalam
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74032
2,299
Downloads
4,032
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,531
Downloads
6,602
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,739
Downloads
7,669
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,828
Downloads
3,258
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top