


default search action
Open Computer Science, Volume 12
Volume 12, Number 1, 2022
- Urmila Pilania, Rohit Tanwar, Prinima Gupta

:
An ROI-based robust video steganography technique using SVD in wavelet domain. 1-16 - Saman Shojae Chaeikar, Ali Ahmadi, Sasan Karamizadeh

, Nakisa Shoja Chaeikar:
SIKM - a smart cryptographic key management framework. 17-26 - Koyel Datta Gupta

, Rinky Dwivedi, Deepak Kumar Sharma
:
Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model. 27-36 - Mohit Dua

, Drishti Makhija, Pilla Yamini Lakshmi Manasa, Prashant Mishra:
3D chaotic map-cosine transformation based approach to video encryption and decryption. 37-56 - Jansi Rani Amalraj, Robert Lourdusamy:

Security and privacy issues in federated healthcare - An overview. 57-65 - Victor Krasnobayev, Alexandr Kuznetsov

, Anastasiia Kiian:
Designing of fault-tolerant computer system structures using residue number systems. 66-74 - Chuanyun Xu, Yu Zheng, Yang Zhang, Gang Li, Ying Wang:

A method for detecting objects in dense scenes. 75-82 - Penikalapati Pragathi, Agastyaraju Nagaraja Rao:

An effective integrated machine learning approach for detecting diabetic retinopathy. 83-91 - Joseph A. Erho

, Juliana I. Consul, Bunakiye R. Japheth:
Greatest-common-divisor dependency of juggling sequence rotation efficient performance. 92-102 - Alexander K. Skiba:

Construction of a gas condensate field development model. 103-111 - Fariba Sarhangnia, Shima Mahjoobi, Samaneh Jamshidi:

A novel similarity measure of link prediction in bipartite social networks based on neighborhood structure. 112-122 - Tamilarasu Sangeetha, Geetha Mary Amalanathan

:
Rough set-based entropy measure with weighted density outlier detection method. 123-133 - Tosin P. Adewumi, Foteini Liwicki, Marcus Liwicki:

Word2Vec: Optimal hyperparameters and their impact on natural language processing downstream tasks. 134-141 - Henry Chima Ukwuoma

, Arome Junior Gabriel, Aderonke F. Thompson, Boniface Kayode Alese
:
Post-quantum cryptography-driven security framework for cloud computing. 142-153 - Prasad Purnaye

, Vrushali Y. Kulkarni:
BiSHM: Evidence detection and preservation model for cloud forensics. 154-170 - Peter E. Creasey

:
Two hide-search games with rapid strategies for multiple parallel searches. 171-180 - Mehmet Sinan Basar

, Sinan Kul
:
A student-based central exam scheduling model using A* algorithm. 181-190 - Ahmed Sultan

, Walied Makram
, Mohammed Kayed, Abdelmaged Amin Ali:
Sign language identification and recognition: A comparative study. 191-210 - Suchismita Das, Srijib Bose, Gopal Krishna Nayak, Sanjay Saxena:

Deep learning-based ensemble model for brain tumor segmentation using multi-parametric MR scans. 211-226 - Hussain A. Jaber

, Hadeel K. Aljobouri
, Ilyas Çankaya:
Design of a web laboratory interface for ECG signal analysis using MATLAB builder NE. 227-237 - Vignesh Srinivasakumar

, Muthumanikandan Vanamoorthy, Siddarth Sairaj, Sainath Ganesh:
An alternative C++-based HPC system for Hadoop MapReduce. 238-247 - Ahmed Al-Gindy, Aya AlChikh Omar, Omar Mashal, Yomna O. Shaker, Eslam Alhogaraty, Sherif Moussa:

A new watermarking scheme for digital videos using DCT. 248-259 - Chitvan Gupta

, Laxman Singh, Rajdev Tiwari:
Wormhole attack detection techniques in ad-hoc network: A systematic review. 260-288 - Luhong Zhang, Kai Zhou, Weibin Zhao, Huiyan Zhou:

Research on the structure of smart medical industry based on the background of the internet of things. 289-299 - Haijie Shen, Yangyuan Li, Xinzhi Tian, Xiaofan Chen, Caihong Li, Qian Bian, Zhenduo Wang, Weihua Wang:

Mass data processing and multidimensional database management based on deep learning. 300-313 - Ganglong Fan, Bo Fan, Hongsheng Xu, Chuqiao Wang:

Research on the virtual simulation experiment evaluation model of e-commerce logistics smart warehousing based on multidimensional weighting. 314-322 - Mustain Billah, Md. Nasim Adnan

, Mostafijur Rahman Akhond, Romana Rahman Ema, Md. Alam Hossain, Syed Md. Galib
:
Rainfall prediction system for Bangladesh using long short-term memory. 323-331 - Wei Xu, Yujin Zhai:

Cross-modal biometric fusion intelligent traffic recognition system combined with real-time data operation. 332-344 - Yingle Yu:

Big data network security defense mode of deep learning algorithm. 345-356 - Shengwei Wen:

A study on the big data scientific research model and the key mechanism based on blockchain. 357-363 - Rao Nadeem, Rana M. Amir Latif

, Khalid Hussain
, N. Z. Jhanjhi
, Mamoona Humayun:
A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework. 364-377 - Wenhai Qiu:

Study on the random walk classification algorithm of polyant colony. 378-388 - Wenfeng Liu, Juanjuan Wu, Zhong Xi:

Privacy protection methods of location services in big data. 389-402 - Jie Cai, Jun Wang:

Data sharing platform and security mechanism based on cloud computing under the Internet of Things. 403-415 - Yahui Huang, Daozhong Lei:

Multisource data acquisition based on single-chip microcomputer and sensor technology. 416-426

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














