Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Secret Codes of Scale Distribution of Different Matter Stratums from Planck Scale to the Sun-Scale, Proof of Anthropic Principle and Different Stratum Sciences
(Articles)
Changyu Huang
,
Yong-Chang Huang
Journal of Modern Physics
Vol.8 No.9
,August 14, 2017
DOI:
10.4236/jmp.2017.89092
573
Downloads
852
Views
Citations
Sieving Error from Dry-Separating Silt-Sand-Gravel Soils
(Articles)
Hans Rönnqvist
Open Journal of Civil Engineering
Vol.9 No.4
,November 25, 2019
DOI:
10.4236/ojce.2019.94022
275
Downloads
700
Views
Citations
Lexicographic Constant-Weight Equidistant Codes over the Alphabet of Three, Four and Five Elements
(Articles)
Todor Todorov
,
Galina Bogdanova
,
Teodora Yorgova
Intelligent Information Management
Vol.2 No.3
,March 31, 2010
DOI:
10.4236/iim.2012.23021
4,087
Downloads
6,973
Views
Citations
A Multi-Secret Sharing Scheme with Many Keys Based on Hermite Interpolation
(Articles)
Tomoko Adachi
,
Chie Okazaki
Journal of Applied Mathematics and Physics
Vol.2 No.13
,December 23, 2014
DOI:
10.4236/jamp.2014.213140
3,876
Downloads
4,389
Views
Citations
Enhanced Contrast of Reconstructed Image for Image Secret Sharing Scheme Using Mathematical Morphology
(Articles)
Yogesh K. Meghrajani
,
Himanshu S. Mazumdar
Journal of Information Security
Vol.6 No.4
,September 25, 2015
DOI:
10.4236/jis.2015.64027
4,100
Downloads
4,650
Views
Citations
Quantum Secret Broadcast for Wireless Quantum Networks
(Articles)
Tao Shang
,
Gang Du
,
Jianwei Liu
Int'l J. of Communications, Network and System Sciences
Vol.10 No.8B
,August 14, 2017
DOI:
10.4236/ijcns.2017.108B002
689
Downloads
1,073
Views
Citations
Personal Data v. Big Data
: Challenges of Commodification of Personal Data
(Articles)
Maria Bottis
,
George Bouchagiar
Open Journal of Philosophy
Vol.8 No.3
,May 11, 2018
DOI:
10.4236/ojpp.2018.83015
1,006
Downloads
2,454
Views
Citations
Cyclic codes of length 2
k
over Z
8
(Articles)
Arpana Garg
,
Sucheta Dutt
Open Journal of Applied Sciences
Vol.2 No.4B
,January 15, 2013
DOI:
10.4236/ojapps.2012.24B025
2,112
Downloads
3,742
Views
Citations
The Code of the Symmetric Net with m = 4 and μ = 2
(Articles)
Ahmad N. Al-Kenani
Open Journal of Discrete Mathematics
Vol.2 No.1
,January 20, 2012
DOI:
10.4236/ojdm.2012.21001
3,432
Downloads
6,983
Views
Citations
Duadic Codes over the Ring F
q
[u] /<u
m
-u> and Their Gray Images
(Articles)
Mokshi Goyal
,
Madhu Raka
Journal of Computer and Communications
Vol.4 No.12
,October 27, 2016
DOI:
10.4236/jcc.2016.412003
1,093
Downloads
1,613
Views
Citations
This article belongs to the Special Issue on
Coding and Cryptography
New MDS Euclidean and Hermitian Self-Dual Codes over Finite Fields
(Articles)
Hongxi Tong
,
Xiaoqing Wang
Advances in Pure Mathematics
Vol.7 No.5
,May 10, 2017
DOI:
10.4236/apm.2017.75019
1,111
Downloads
1,513
Views
Citations
Technology of Secure File Archiving in the Uniformly Random Distributed Archive Scheme
(Articles)
Ahmed Tallat
,
Hiroshi Yasuda
,
Kilho Shin
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41006
2,943
Downloads
5,185
Views
Citations
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,712
Downloads
2,427
Views
Citations
Secrecy Reconsidered: Parents of Children with Autism Spectrum Disorder (ASD) React to a Children’s Book on the Subject of Autism
(Articles)
Boganim Orli
,
Baratz Lea
Open Access Library Journal
Vol.6 No.6
,June 11, 2019
DOI:
10.4236/oalib.1105456
196
Downloads
619
Views
Citations
Social Transformation including Class Conflict, Historical Restrictions and Free Will
(Articles)
Freddy Cante
Open Journal of Social Sciences
Vol.8 No.6
,June 16, 2020
DOI:
10.4236/jss.2020.86024
174
Downloads
544
Views
Citations
A Class of Constacyclic Codes over
R
+
vR
and Its Gray Image
(Articles)
Dajian Liao
,
Yuansheng Tang
Int'l J. of Communications, Network and System Sciences
Vol.5 No.4
,April 19, 2012
DOI:
10.4236/ijcns.2012.54029
6,036
Downloads
9,231
Views
Citations
Opportunistic Error Correction for OFDM-Based DVB Systems
(Articles)
Xiaoying Shao
,
Cornelis H. Slump
Communications and Network
Vol.5 No.4
,November 28, 2013
DOI:
10.4236/cn.2013.54043
4,017
Downloads
5,515
Views
Citations
Partition and the Perfect Codes in the Additive Channel
(Articles)
Garib Movsisyan
Open Journal of Discrete Mathematics
Vol.3 No.3
,July 2, 2013
DOI:
10.4236/ojdm.2013.33021
2,352
Downloads
4,254
Views
Citations
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression
(Articles)
Shinichi Murata
,
Yasunari Yoshitomi
,
Hiroaki Ishii
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23010
6,442
Downloads
12,995
Views
Citations
Cloud Computing Based PHR Architecture Using Multi Layers Model
(Articles)
Shinji Kikuchi
,
Shelly Sachdeva
,
Subhash Bhalla
Journal of Software Engineering and Applications
Vol.5 No.11A
,November 30, 2012
DOI:
10.4236/jsea.2012.531105
4,945
Downloads
8,169
Views
Citations
This article belongs to the Special Issue on
Cloud Computing
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2023 Scientific Research Publishing Inc. All Rights Reserved.
Top