Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Edge Detection with a Preprocessing Approach
(Articles)
Mohamed Abo-Zahhad
,
Reda Ragab Gharieb
,
Sabah M. Ahmed
,
Ahmed Abd El-Baset Donkol
Journal of Signal and Information Processing
Vol.5 No.4
,October 15, 2014
DOI:
10.4236/jsip.2014.54015
6,223
Downloads
9,721
Views
Citations
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
(Articles)
Jiangui Zhang
,
Huibin Qi
Journal of Computer and Communications
Vol.8 No.12
,December 24, 2020
DOI:
10.4236/jcc.2020.812012
447
Downloads
1,864
Views
Citations
Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm
(Articles)
Aninda Majumder
,
Mohammad Raihan Ruhin
,
Tahsina Hashem
,
Md. Imdadul Islam
Journal of Computer and Communications
Vol.4 No.2
,February 15, 2016
DOI:
10.4236/jcc.2016.42001
4,245
Downloads
5,305
Views
Citations
New Edge-Directed Interpolation Based-Lifting DWT and MSPIHT Algorithm for Image Compression
(Articles)
M. Varathaguru
,
R. S. Sabeenian
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79195
1,897
Downloads
3,209
Views
Citations
Comparison of Wavelet Types and Thresholding Methods on Wavelet Based Denoising of Heart Sounds
(Articles)
Burhan Ergen
Journal of Signal and Information Processing
Vol.4 No.3B
,October 17, 2013
DOI:
10.4236/jsip.2013.43B029
4,017
Downloads
6,270
Views
Citations
Logarithmic Sine and Cosine Transforms and Their Applications to Boundary-Value Problems Connected with Sectionally-Harmonic Functions
(Articles)
Mithat Idemen
Applied Mathematics
Vol.4 No.2
,February 27, 2013
DOI:
10.4236/am.2013.42058
3,724
Downloads
7,675
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,439
Downloads
9,785
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,021
Downloads
3,223
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Implementation of RANSAC Algorithm for Feature-Based Image Registration
(Articles)
Lan-Rong Dung
,
Chang-Min Huang
,
Yin-Yi Wu
Journal of Computer and Communications
Vol.1 No.6
,November 26, 2013
DOI:
10.4236/jcc.2013.16009
6,185
Downloads
9,753
Views
Citations
Secure Spread-Spectrum Watermarking for Telemedicine Applications
(Articles)
Basant Kumar
,
Harsh Vikram Singh
,
Surya Pal Singh
,
Anand Mohan
Journal of Information Security
Vol.2 No.2
,April 22, 2011
DOI:
10.4236/jis.2011.22009
6,302
Downloads
13,339
Views
Citations
Ultrasonic Rangefinder Spikes Rejection Using Discrete Wavelet Transform: Application to UAV
(Articles)
Ayman El-Badawy
,
Ramy Rashad
Journal of Sensor Technology
Vol.5 No.2
,June 2, 2015
DOI:
10.4236/jst.2015.52005
4,986
Downloads
6,022
Views
Citations
Detecting Periodicity Associated with the Alpha-Helix Structure Using Fourier Transform
(Articles)
Wen Cheng
,
Changhui Yan
Computational Molecular Bioscience
Vol.2 No.4
,December 12, 2012
DOI:
10.4236/cmb.2012.24011
6,124
Downloads
11,284
Views
Citations
Performance Enhancement of Discrete Multi-Tone Systems with a Trigonometric Transform
(Articles)
Samir Abd Elghafar
,
Salaheldin M. Diab
,
Bassiouny M. Sallam
,
Moawad I. Dessouky
,
El-Sayed M. El-Rabaie
,
Fathi E. Abd El-Samie
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 7, 2014
DOI:
10.4236/ijcns.2014.71001
3,164
Downloads
4,962
Views
Citations
Weyl Group Orbit Functions in Image Processing
(Articles)
Goce Chadzitaskos
,
Lenka Háková
,
Ondřej Kajínek
Applied Mathematics
Vol.5 No.3
,February 12, 2014
DOI:
10.4236/am.2014.53049
3,051
Downloads
4,630
Views
Citations
Pre-Processing Images of Public Signage for OCR Conversion
(Articles)
Amber Khan
,
Mariam Nida Usmani
,
Nashrah Rahman
,
Dinesh Prasad
Journal of Signal and Information Processing
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jsip.2019.101001
1,512
Downloads
3,151
Views
Citations
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
234
Downloads
1,959
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,627
Downloads
8,140
Views
Citations
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,988
Downloads
3,201
Views
Citations
Medical Image Enhancement Using Morphological Transformation
(Articles)
Raihan Firoz
,
Md. Shahjahan Ali
,
M. Nasir Uddin Khan
,
Md. Khalid Hossain
,
Md. Khairul Islam
,
Md. Shahinuzzaman
Journal of Data Analysis and Information Processing
Vol.4 No.1
,February 2, 2016
DOI:
10.4236/jdaip.2016.41001
7,624
Downloads
12,850
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,330
Downloads
10,500
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top