Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Dominant Meaning Method for Intelligent Topic-Based Information Agent towards More Flexible MOOCs
(Articles)
Mohammed Abdel Razek
Journal of Intelligent Learning Systems and Applications
Vol.6 No.4
,November 25, 2014
DOI:
10.4236/jilsa.2014.64015
4,663
Downloads
5,445
Views
Citations
Transformation of User Interface to Activity Models and Assessing Performance of WA/WS
(Articles)
Ch. Ram Mohan Reddy
,
D. Evangelin Geetha
,
R. V. Raghvendra Rao
,
T. V. Suresh Kumar
Journal of Software Engineering and Applications
Vol.12 No.5
,May 23, 2019
DOI:
10.4236/jsea.2019.125008
871
Downloads
2,392
Views
Citations
When Corporal Acts Are Labeled Criminal: Lack of Privacy among the Homeless
(Articles)
Matthew R. Taylor
,
Eileen T. Walsh
Sociology Mind
Vol.8 No.2
,April 3, 2018
DOI:
10.4236/sm.2018.82011
1,264
Downloads
5,043
Views
Citations
Quality Perception Evaluation: A Case Study of a Private Bank Branch in Campina Grande, PB
(Articles)
Allan Carlos Alves
,
Ângela Maria Cavalcanti Ramalho
,
Sandra Sereide Ferreira da Silva
,
Cicero de Sousa Lacerda
,
Juaceli Araújo Lima
,
Fabio Adriano Pereira da Silva
iBusiness
Vol.7 No.2
,June 18, 2015
DOI:
10.4236/ib.2015.72011
5,630
Downloads
6,603
Views
Citations
An Integrated Location-Routing-Inventory Problem by Considering Supply Disruption
(Articles)
Seyed Mohammad Seyedhosseini
,
Ali Bozorgi-Amiri
,
Sahar Daraei
iBusiness
Vol.6 No.2
,May 14, 2014
DOI:
10.4236/ib.2014.62004
4,380
Downloads
6,101
Views
Citations
Image Encryption Algorithm Based on a Chaotic Iterative Process
(Articles)
Michael François
,
Thomas Grosges
,
Dominique Barchiesi
,
Robert Erra
Applied Mathematics
Vol.3 No.12
,December 17, 2012
DOI:
10.4236/am.2012.312262
5,890
Downloads
9,843
Views
Citations
Image Encryption Scheme Based on Filter Bank and Lifting
(Articles)
Saleh Saraireh
,
Yazeed Al-Sbou
,
Ja’afer Al-Saraireh
,
Othman Alsmadi
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 24, 2014
DOI:
10.4236/ijcns.2014.71006
4,317
Downloads
7,380
Views
Citations
An Image Encryption Method Based on Quantum Fourier Transformation
(Articles)
Ying Liu
,
Bing Zhou
,
Zijing Li
,
Jiangnan Deng
,
Zhengying Cai
International Journal of Intelligence Science
Vol.8 No.3
,July 30, 2018
DOI:
10.4236/ijis.2018.83004
909
Downloads
1,948
Views
Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
,July 2, 2019
DOI:
10.4236/jis.2019.103007
1,204
Downloads
4,179
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
CPK Public Key and Its Basic Functions
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.9 No.1
,January 14, 2022
DOI:
10.4236/oalib.1108287
53
Downloads
748
Views
Citations
Analyzing Computational Components of Standard Block Encryption Schemes
(Articles)
Chu-Wen Cheng
,
Miranda Heather Cantu
,
Sanjeev Kumar
Journal of Computer and Communications
Vol.10 No.6
,June 30, 2022
DOI:
10.4236/jcc.2022.106007
110
Downloads
633
Views
Citations
This article belongs to the Special Issue on
Data Science and Applications
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
(Articles)
Abou-el-ela Abdou Hussien
,
Nagy Ramadan Darwish
,
Hesham A. Hefny
Journal of Information Security
Vol.6 No.3
,June 15, 2015
DOI:
10.4236/jis.2015.63019
4,754
Downloads
5,686
Views
Citations
Predicting Users Mobile App Privacy Preferences
(Articles)
Aziz Alshehri
,
Fayez Alotaibi
Journal of Computer and Communications
Vol.7 No.10
,October 22, 2019
DOI:
10.4236/jcc.2019.710014
469
Downloads
1,381
Views
Citations
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
(Articles)
Aljwhrh Almtrf
,
Mohamed Zohdy
Journal of Computer and Communications
Vol.7 No.12
,December 16, 2019
DOI:
10.4236/jcc.2019.712005
636
Downloads
1,663
Views
Citations
Approaches to Solve MID_CPLP Problem: Theoretical Framework and Empirical Investigation
(Articles)
Renduchintala Raghavendra Kumar Sharma
,
Pritee Agarwal
American Journal of Operations Research
Vol.4 No.3
,May 7, 2014
DOI:
10.4236/ajor.2014.43014
3,294
Downloads
4,563
Views
Citations
Quantification of the Impact of Seismic Anisotropy in Microseismic Location
(Articles)
Hongli Jing
,
Hua-Wei Zhou
,
Aibing Li
International Journal of Geosciences
Vol.7 No.7
,July 11, 2016
DOI:
10.4236/ijg.2016.77065
2,636
Downloads
3,706
Views
Citations
This article belongs to the Special Issue on
Research on Geophysics
Myoma Delivered through the Cervical during Labor: About a Case and Review of the Literature
(Articles)
Touré Écra Ana
,
Konan Blé Rémy
,
Marcel N’Cho Edi
,
Koffi Koffi Abdoul
,
Aka Edel
,
Konan Perel
,
Olou Luc
Open Journal of Obstetrics and Gynecology
Vol.13 No.1
,January 31, 2023
DOI:
10.4236/ojog.2023.131011
77
Downloads
615
Views
Citations
Hierarchical Production of Privacy: Gating in Compact Living in Hong Kong
(Articles)
Jun Wang
,
Stephen S. Y. Lau
Current Urban Studies
Vol.1 No.2
,June 13, 2013
DOI:
10.4236/cus.2013.12002
4,699
Downloads
8,642
Views
Citations
Privacy Preserving Two-Party Hierarchical Clustering Over Vertically Partitioned Dataset
(Articles)
Animesh Tripathy
,
Ipsa De
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B006
3,508
Downloads
5,114
Views
Citations
Privacy of Wearable Electronics in the Healthcare and Childcare Sectors: A Survey of Personal Perspectives from Finland and the United Kingdom
(Articles)
Johanna Virkki
,
Rebecca Aggarwal
Journal of Information Security
Vol.5 No.2
,March 17, 2014
DOI:
10.4236/jis.2014.52005
4,613
Downloads
7,377
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top