Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Implementation of RANSAC Algorithm for Feature-Based Image Registration
(Articles)
Lan-Rong Dung
,
Chang-Min Huang
,
Yin-Yi Wu
Journal of Computer and Communications
Vol.1 No.6
,November 26, 2013
DOI:
10.4236/jcc.2013.16009
6,182
Downloads
9,745
Views
Citations
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,985
Downloads
3,192
Views
Citations
Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography
(Articles)
Lein Harn
,
Changlu Lin
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 16, 2014
DOI:
10.4236/ijcns.2014.71003
3,301
Downloads
5,568
Views
Citations
Lossless Image Compression Technique Using Combination Methods
(Articles)
A. Alarabeyyat
,
S. Al-Hashemi
,
T. Khdour
,
M. Hjouj Btoush
,
S. Bani-Ahmad
,
R. Al-Hashemi
,
S. Bani-Ahmad
Journal of Software Engineering and Applications
Vol.5 No.10
,October 31, 2012
DOI:
10.4236/jsea.2012.510088
10,746
Downloads
18,737
Views
Citations
The 3D Computer Image of the Anterior Corneal Surface
(Articles)
Bo Wang
,
Xueping Huang
,
Jinglu Ying
,
Mingguang Shi
Engineering
Vol.5 No.10B
,December 18, 2013
DOI:
10.4236/eng.2013.510B098
4,426
Downloads
5,790
Views
Citations
Human Plantar Pressure Image and Foot Shape Matching
(Articles)
A. K. Chong
,
J. A. Al-Baghdadi
,
P. Milburn
Journal of Biosciences and Medicines
Vol.3 No.6
,June 13, 2015
DOI:
10.4236/jbm.2015.36006
4,179
Downloads
5,661
Views
Citations
A Research on Single Image Dehazing Algorithms Based on Dark Channel Prior
(Articles)
Ebtesam Mohameed Alharbi
,
Peng Ge
,
Hong Wang
Journal of Computer and Communications
Vol.4 No.2
,February 25, 2016
DOI:
10.4236/jcc.2016.42006
3,389
Downloads
5,424
Views
Citations
Digital Refocusing: All-in-Focus Image Rendering Based on Holoscopic 3D Camera
(Articles)
Obaidullah Abdul Fatah
,
Peter Lanigan
,
Amar Aggoun
,
Mohammad Rafiq Swash
Journal of Computer and Communications
Vol.4 No.6
,May 30, 2016
DOI:
10.4236/jcc.2016.46003
2,087
Downloads
3,324
Views
Citations
This article belongs to the Special Issue on
Information Extraction and Retrieval
Determination of Statistical Properties of Microtubule Populations
(Articles)
Tyson DiLorenzo
,
Lee Ligon
,
Donald Drew
Applied Mathematics
Vol.7 No.13
,August 15, 2016
DOI:
10.4236/am.2016.713125
1,586
Downloads
2,314
Views
Citations
This article belongs to the Special Issue on
Mathematical Modelling of Natural Phenomena
Quantitative Measurement of the Exposure Response of Digital Cameras
(Articles)
Caitlin R. Kunchur
Journal of Analytical Sciences, Methods and Instrumentation
Vol.9 No.3
,September 5, 2019
DOI:
10.4236/jasmi.2019.93005
416
Downloads
1,219
Views
Citations
Research on the Image Presentation of Kenya Marathon
(Articles)
Yongle Qi
,
Jianli Zhang
,
Kaijie Yang
Open Access Library Journal
Vol.9 No.5
,May 27, 2022
DOI:
10.4236/oalib.1108811
59
Downloads
577
Views
Citations
Image Application in Single Isocenter Multiple Target SRS
(Articles)
Junfang Gao
,
Jeffrey P. Limmer
Int'l J. of Medical Physics, Clinical Eng. and Radiation Oncology
Vol.13 No.2
,March 19, 2024
DOI:
10.4236/ijmpcero.2024.132003
44
Downloads
319
Views
Citations
Design and Simulation of a Secure and Robust Underwater Acoustic Communication System in the Persian Gulf
(Articles)
Abdollah Doosti Aref
,
Mohammad Javad Jannati
,
Vahid Tabataba Vakili
Communications and Network
Vol.3 No.2
,May 19, 2011
DOI:
10.4236/cn.2011.32012
6,375
Downloads
13,018
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,537
Downloads
6,611
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,739
Downloads
7,682
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,905
Downloads
5,184
Views
Citations
A Fast FPGA Implementation for Triple DES Encryption Scheme
(Articles)
Edni Del Rosal
,
Sanjeev Kumar
Circuits and Systems
Vol.8 No.9
,September 25, 2017
DOI:
10.4236/cs.2017.89016
2,035
Downloads
5,212
Views
Citations
A Modern Method for Constructing the S-Box of Advanced Encryption Standard
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.4
,April 29, 2019
DOI:
10.4236/am.2019.104018
1,017
Downloads
6,834
Views
Citations
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
(Articles)
Shan Shi
,
Yong Wang
,
Cunming Zou
,
Yingjie Tian
Journal of Computer and Communications
Vol.10 No.1
,January 13, 2022
DOI:
10.4236/jcc.2022.101002
223
Downloads
1,778
Views
Citations
A Novel Hybrid Encryption Method Based on Honey Encryption and Advanced DNA Encoding Scheme in Key Generation
(Articles)
Nwe Ni Khin
,
Thanda Win
Journal of Computer and Communications
Vol.10 No.9
,September 9, 2022
DOI:
10.4236/jcc.2022.109002
134
Downloads
789
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top