To search, Click below search items.
All Published Papers Search Service
Title
A Secure Image Steganography using LSB and Double XOR Operations
Author
Ali Ahmed and Abdelmotalib Ahmed
Vol. 20 No. 5 pp. 139-144
Keywords
Steganography, Cryptography, Least significant bit method, Hybrid security method, PSNR, MSE
Security Improvement Techniques for mobile applications of Industrial Internet of Things
A.A. Serkov, B.A. Lazurenko, K.A. Trubchaninova, A.E. Horiushkina
Vol. 20 No. 5 pp. 145-149
IIoT Mobile connection Noise immunity Security Ultra-wideband signals Flickering polarization
A Model for Processing Arabic Text on Twitter
Mohamed Osman Hegazi, Yasser Al-Dossari, Abdullah Al-Yahya, Abdulaziz Al-Sumari, and Anwer Hilal
Vol. 20 No. 5 pp. 150-157
Information retrieval Natural Language Processing Database Data Analysis Text Mining Arabic Text.
Socialize the Behavior of IOT on Human To Devices Interaction and Internet Marketing
Jahangir Jabbar, Hussain Mehmood, Umaima Hafeez, Hassaan Malik, Humayun Salahuddin , Taimoor Hassan Jabbar
Vol. 20 No. 5 pp. 158-164
Social Internet of Things (SIOT), Internet of Things (IOT), IOT ecosystem.