Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Edge Detection with a Preprocessing Approach
(Articles)
Mohamed Abo-Zahhad
,
Reda Ragab Gharieb
,
Sabah M. Ahmed
,
Ahmed Abd El-Baset Donkol
Journal of Signal and Information Processing
Vol.5 No.4
,October 15, 2014
DOI:
10.4236/jsip.2014.54015
6,240
Downloads
8,480
Views
Citations
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
(Articles)
Jiangui Zhang
,
Huibin Qi
Journal of Computer and Communications
Vol.8 No.12
,December 24, 2020
DOI:
10.4236/jcc.2020.812012
460
Downloads
1,683
Views
Citations
Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm
(Articles)
Aninda Majumder
,
Mohammad Raihan Ruhin
,
Tahsina Hashem
,
Md. Imdadul Islam
Journal of Computer and Communications
Vol.4 No.2
,February 15, 2016
DOI:
10.4236/jcc.2016.42001
4,252
Downloads
5,271
Views
Citations
New Edge-Directed Interpolation Based-Lifting DWT and MSPIHT Algorithm for Image Compression
(Articles)
M. Varathaguru
,
R. S. Sabeenian
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79195
1,897
Downloads
2,999
Views
Citations
Comparison of Wavelet Types and Thresholding Methods on Wavelet Based Denoising of Heart Sounds
(Articles)
Burhan Ergen
Journal of Signal and Information Processing
Vol.4 No.3B
,October 17, 2013
DOI:
10.4236/jsip.2013.43B029
4,035
Downloads
5,980
Views
Citations
Logarithmic Sine and Cosine Transforms and Their Applications to Boundary-Value Problems Connected with Sectionally-Harmonic Functions
(Articles)
Mithat Idemen
Applied Mathematics
Vol.4 No.2
,February 27, 2013
DOI:
10.4236/am.2013.42058
3,725
Downloads
7,525
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,458
Downloads
9,121
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,034
Downloads
2,861
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Implementation of RANSAC Algorithm for Feature-Based Image Registration
(Articles)
Lan-Rong Dung
,
Chang-Min Huang
,
Yin-Yi Wu
Journal of Computer and Communications
Vol.1 No.6
,November 26, 2013
DOI:
10.4236/jcc.2013.16009
6,205
Downloads
9,409
Views
Citations
Secure Spread-Spectrum Watermarking for Telemedicine Applications
(Articles)
Basant Kumar
,
Harsh Vikram Singh
,
Surya Pal Singh
,
Anand Mohan
Journal of Information Security
Vol.2 No.2
,April 22, 2011
DOI:
10.4236/jis.2011.22009
6,306
Downloads
13,166
Views
Citations
Ultrasonic Rangefinder Spikes Rejection Using Discrete Wavelet Transform: Application to UAV
(Articles)
Ayman El-Badawy
,
Ramy Rashad
Journal of Sensor Technology
Vol.5 No.2
,June 2, 2015
DOI:
10.4236/jst.2015.52005
4,988
Downloads
5,949
Views
Citations
Detecting Periodicity Associated with the Alpha-Helix Structure Using Fourier Transform
(Articles)
Wen Cheng
,
Changhui Yan
Computational Molecular Bioscience
Vol.2 No.4
,December 12, 2012
DOI:
10.4236/cmb.2012.24011
6,142
Downloads
10,980
Views
Citations
Performance Enhancement of Discrete Multi-Tone Systems with a Trigonometric Transform
(Articles)
Samir Abd Elghafar
,
Salaheldin M. Diab
,
Bassiouny M. Sallam
,
Moawad I. Dessouky
,
El-Sayed M. El-Rabaie
,
Fathi E. Abd El-Samie
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 7, 2014
DOI:
10.4236/ijcns.2014.71001
3,163
Downloads
4,930
Views
Citations
Weyl Group Orbit Functions in Image Processing
(Articles)
Goce Chadzitaskos
,
Lenka Háková
,
Ondřej Kajínek
Applied Mathematics
Vol.5 No.3
,February 12, 2014
DOI:
10.4236/am.2014.53049
3,057
Downloads
4,537
Views
Citations
Pre-Processing Images of Public Signage for OCR Conversion
(Articles)
Amber Khan
,
Mariam Nida Usmani
,
Nashrah Rahman
,
Dinesh Prasad
Journal of Signal and Information Processing
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jsip.2019.101001
1,514
Downloads
2,890
Views
Citations
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
243
Downloads
1,920
Views
Citations
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,991
Downloads
3,096
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,630
Downloads
7,953
Views
Citations
Medical Image Enhancement Using Morphological Transformation
(Articles)
Raihan Firoz
,
Md. Shahjahan Ali
,
M. Nasir Uddin Khan
,
Md. Khalid Hossain
,
Md. Khairul Islam
,
Md. Shahinuzzaman
Journal of Data Analysis and Information Processing
Vol.4 No.1
,February 2, 2016
DOI:
10.4236/jdaip.2016.41001
7,647
Downloads
12,528
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,344
Downloads
9,651
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top