Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Segmenting Salient Objects in 3D Point Clouds of Indoor Scenes Using Geodesic Distances
(Articles)
Shashank Bhatia
,
Stephan K. Chalup
Journal of Signal and Information Processing
Vol.4 No.3B
,October 16, 2013
DOI:
10.4236/jsip.2013.43B018
3,985
Downloads
5,689
Views
Citations
Implementation of RANSAC Algorithm for Feature-Based Image Registration
(Articles)
Lan-Rong Dung
,
Chang-Min Huang
,
Yin-Yi Wu
Journal of Computer and Communications
Vol.1 No.6
,November 26, 2013
DOI:
10.4236/jcc.2013.16009
6,194
Downloads
9,381
Views
Citations
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,990
Downloads
3,089
Views
Citations
Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography
(Articles)
Lein Harn
,
Changlu Lin
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 16, 2014
DOI:
10.4236/ijcns.2014.71003
3,303
Downloads
5,376
Views
Citations
Lossless Image Compression Technique Using Combination Methods
(Articles)
A. Alarabeyyat
,
S. Al-Hashemi
,
T. Khdour
,
M. Hjouj Btoush
,
S. Bani-Ahmad
,
R. Al-Hashemi
,
S. Bani-Ahmad
Journal of Software Engineering and Applications
Vol.5 No.10
,October 31, 2012
DOI:
10.4236/jsea.2012.510088
10,756
Downloads
17,967
Views
Citations
The 3D Computer Image of the Anterior Corneal Surface
(Articles)
Bo Wang
,
Xueping Huang
,
Jinglu Ying
,
Mingguang Shi
Engineering
Vol.5 No.10B
,December 18, 2013
DOI:
10.4236/eng.2013.510B098
4,428
Downloads
5,728
Views
Citations
Human Plantar Pressure Image and Foot Shape Matching
(Articles)
A. K. Chong
,
J. A. Al-Baghdadi
,
P. Milburn
Journal of Biosciences and Medicines
Vol.3 No.6
,June 13, 2015
DOI:
10.4236/jbm.2015.36006
4,181
Downloads
5,188
Views
Citations
A Research on Single Image Dehazing Algorithms Based on Dark Channel Prior
(Articles)
Ebtesam Mohameed Alharbi
,
Peng Ge
,
Hong Wang
Journal of Computer and Communications
Vol.4 No.2
,February 25, 2016
DOI:
10.4236/jcc.2016.42006
3,391
Downloads
5,321
Views
Citations
Digital Refocusing: All-in-Focus Image Rendering Based on Holoscopic 3D Camera
(Articles)
Obaidullah Abdul Fatah
,
Peter Lanigan
,
Amar Aggoun
,
Mohammad Rafiq Swash
Journal of Computer and Communications
Vol.4 No.6
,May 30, 2016
DOI:
10.4236/jcc.2016.46003
2,088
Downloads
3,277
Views
Citations
This article belongs to the Special Issue on
Information Extraction and Retrieval
Determination of Statistical Properties of Microtubule Populations
(Articles)
Tyson DiLorenzo
,
Lee Ligon
,
Donald Drew
Applied Mathematics
Vol.7 No.13
,August 15, 2016
DOI:
10.4236/am.2016.713125
1,587
Downloads
2,235
Views
Citations
This article belongs to the Special Issue on
Mathematical Modelling of Natural Phenomena
Quantitative Measurement of the Exposure Response of Digital Cameras
(Articles)
Caitlin R. Kunchur
Journal of Analytical Sciences, Methods and Instrumentation
Vol.9 No.3
,September 5, 2019
DOI:
10.4236/jasmi.2019.93005
418
Downloads
1,156
Views
Citations
Research on the Image Presentation of Kenya Marathon
(Articles)
Yongle Qi
,
Jianli Zhang
,
Kaijie Yang
Open Access Library Journal
Vol.9 No.5
,May 27, 2022
DOI:
10.4236/oalib.1108811
62
Downloads
554
Views
Citations
Image Application in Single Isocenter Multiple Target SRS
(Articles)
Junfang Gao
,
Jeffrey P. Limmer
Int'l J. of Medical Physics, Clinical Eng. and Radiation Oncology
Vol.13 No.2
,March 19, 2024
DOI:
10.4236/ijmpcero.2024.132003
48
Downloads
319
Views
Citations
Design and Simulation of a Secure and Robust Underwater Acoustic Communication System in the Persian Gulf
(Articles)
Abdollah Doosti Aref
,
Mohammad Javad Jannati
,
Vahid Tabataba Vakili
Communications and Network
Vol.3 No.2
,May 19, 2011
DOI:
10.4236/cn.2011.32012
6,393
Downloads
12,539
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,548
Downloads
6,350
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,744
Downloads
7,552
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,928
Downloads
4,610
Views
Citations
A Fast FPGA Implementation for Triple DES Encryption Scheme
(Articles)
Edni Del Rosal
,
Sanjeev Kumar
Circuits and Systems
Vol.8 No.9
,September 25, 2017
DOI:
10.4236/cs.2017.89016
2,038
Downloads
4,893
Views
Citations
A Modern Method for Constructing the S-Box of Advanced Encryption Standard
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.4
,April 29, 2019
DOI:
10.4236/am.2019.104018
1,022
Downloads
6,709
Views
Citations
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
(Articles)
Shan Shi
,
Yong Wang
,
Cunming Zou
,
Yingjie Tian
Journal of Computer and Communications
Vol.10 No.1
,January 13, 2022
DOI:
10.4236/jcc.2022.101002
229
Downloads
1,712
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top