default search action
Open Computer Science, Volume 12
Volume 12, Number 1, 2022
- Urmila Pilania, Rohit Tanwar, Prinima Gupta:
An ROI-based robust video steganography technique using SVD in wavelet domain. 1-16 - Saman Shojae Chaeikar, Ali Ahmadi, Sasan Karamizadeh, Nakisa Shoja Chaeikar:
SIKM - a smart cryptographic key management framework. 17-26 - Koyel Datta Gupta, Rinky Dwivedi, Deepak Kumar Sharma:
Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model. 27-36 - Mohit Dua, Drishti Makhija, Pilla Yamini Lakshmi Manasa, Prashant Mishra:
3D chaotic map-cosine transformation based approach to video encryption and decryption. 37-56 - Jansi Rani Amalraj, Robert Lourdusamy:
Security and privacy issues in federated healthcare - An overview. 57-65 - Victor Krasnobayev, Alexandr Kuznetsov, Anastasiia Kiian:
Designing of fault-tolerant computer system structures using residue number systems. 66-74 - Chuanyun Xu, Yu Zheng, Yang Zhang, Gang Li, Ying Wang:
A method for detecting objects in dense scenes. 75-82 - Penikalapati Pragathi, Agastyaraju Nagaraja Rao:
An effective integrated machine learning approach for detecting diabetic retinopathy. 83-91 - Joseph A. Erho, Juliana I. Consul, Bunakiye R. Japheth:
Greatest-common-divisor dependency of juggling sequence rotation efficient performance. 92-102 - Alexander K. Skiba:
Construction of a gas condensate field development model. 103-111 - Fariba Sarhangnia, Shima Mahjoobi, Samaneh Jamshidi:
A novel similarity measure of link prediction in bipartite social networks based on neighborhood structure. 112-122 - Tamilarasu Sangeetha, Geetha Mary Amalanathan:
Rough set-based entropy measure with weighted density outlier detection method. 123-133 - Tosin P. Adewumi, Foteini Liwicki, Marcus Liwicki:
Word2Vec: Optimal hyperparameters and their impact on natural language processing downstream tasks. 134-141 - Henry Chima Ukwuoma, Arome Junior Gabriel, Aderonke F. Thompson, Boniface Kayode Alese:
Post-quantum cryptography-driven security framework for cloud computing. 142-153 - Prasad Purnaye, Vrushali Y. Kulkarni:
BiSHM: Evidence detection and preservation model for cloud forensics. 154-170 - Peter E. Creasey:
Two hide-search games with rapid strategies for multiple parallel searches. 171-180 - Mehmet Sinan Basar, Sinan Kul:
A student-based central exam scheduling model using A* algorithm. 181-190 - Ahmed Sultan, Walied Makram, Mohammed Kayed, Abdelmaged Amin Ali:
Sign language identification and recognition: A comparative study. 191-210 - Suchismita Das, Srijib Bose, Gopal Krishna Nayak, Sanjay Saxena:
Deep learning-based ensemble model for brain tumor segmentation using multi-parametric MR scans. 211-226 - Hussain A. Jaber, Hadeel K. Aljobouri, Ilyas Çankaya:
Design of a web laboratory interface for ECG signal analysis using MATLAB builder NE. 227-237 - Vignesh Srinivasakumar, Muthumanikandan Vanamoorthy, Siddarth Sairaj, Sainath Ganesh:
An alternative C++-based HPC system for Hadoop MapReduce. 238-247 - Ahmed Al-Gindy, Aya AlChikh Omar, Omar Mashal, Yomna O. Shaker, Eslam Alhogaraty, Sherif Moussa:
A new watermarking scheme for digital videos using DCT. 248-259 - Chitvan Gupta, Laxman Singh, Rajdev Tiwari:
Wormhole attack detection techniques in ad-hoc network: A systematic review. 260-288 - Luhong Zhang, Kai Zhou, Weibin Zhao, Huiyan Zhou:
Research on the structure of smart medical industry based on the background of the internet of things. 289-299 - Haijie Shen, Yangyuan Li, Xinzhi Tian, Xiaofan Chen, Caihong Li, Qian Bian, Zhenduo Wang, Weihua Wang:
Mass data processing and multidimensional database management based on deep learning. 300-313 - Ganglong Fan, Bo Fan, Hongsheng Xu, Chuqiao Wang:
Research on the virtual simulation experiment evaluation model of e-commerce logistics smart warehousing based on multidimensional weighting. 314-322 - Mustain Billah, Md. Nasim Adnan, Mostafijur Rahman Akhond, Romana Rahman Ema, Md. Alam Hossain, Syed Md. Galib:
Rainfall prediction system for Bangladesh using long short-term memory. 323-331 - Wei Xu, Yujin Zhai:
Cross-modal biometric fusion intelligent traffic recognition system combined with real-time data operation. 332-344 - Yingle Yu:
Big data network security defense mode of deep learning algorithm. 345-356 - Shengwei Wen:
A study on the big data scientific research model and the key mechanism based on blockchain. 357-363 - Rao Nadeem, Rana M. Amir Latif, Khalid Hussain, N. Z. Jhanjhi, Mamoona Humayun:
A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework. 364-377 - Wenhai Qiu:
Study on the random walk classification algorithm of polyant colony. 378-388 - Wenfeng Liu, Juanjuan Wu, Zhong Xi:
Privacy protection methods of location services in big data. 389-402 - Jie Cai, Jun Wang:
Data sharing platform and security mechanism based on cloud computing under the Internet of Things. 403-415 - Yahui Huang, Daozhong Lei:
Multisource data acquisition based on single-chip microcomputer and sensor technology. 416-426
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.