Journal articles on the topic 'Domain message'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Domain message.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wibisono, Gunawan, Tri Waluyo, and Erik Iman Heri Ujianto. "KAJIAN METODE METODE STEGANOGRAFI PADA DOMAIN SPASIAL." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 2 (February 1, 2020): 259–64. http://dx.doi.org/10.33480/jitk.v5i2.1212.
Full textEl Rezen Purba, Doni, and Desinta Purba. "Text Insertion By Utilizing Masking-Filtering Algorithms As Part of Text Message Security." Jurnal Info Sains : Informatika dan Sains 11, no. 1 (March 1, 2021): 1–4. http://dx.doi.org/10.54209/infosains.v11i1.18.
Full textKim, Kee Sung. "New Order-Revealing Encryption with Shorter Ciphertexts." Information 11, no. 10 (September 23, 2020): 457. http://dx.doi.org/10.3390/info11100457.
Full textShort, Kevin M. "Signal Extraction from Chaotic Communications." International Journal of Bifurcation and Chaos 07, no. 07 (July 1997): 1579–97. http://dx.doi.org/10.1142/s0218127497001230.
Full textGeschke, Daniel, Kai Sassenberg, Georg Ruhrmann, and Denise Sommer. "Behavior Speaks Louder than Traits." Zeitschrift für Psychologie / Journal of Psychology 215, no. 4 (January 2007): 248–54. http://dx.doi.org/10.1027/0044-3409.215.4.248.
Full textDemircioğlu, Emine Dumlu, and Oya Kalipsiz. "API Message-Driven Regression Testing Framework." Electronics 11, no. 17 (August 26, 2022): 2671. http://dx.doi.org/10.3390/electronics11172671.
Full textSrilakshmi, P., Ch Himabindu, N. Chaitanya, S. V. Muralidhar, M. V. Sumanth, and K. Vinay. "Text embedding using image steganography in spatial domain." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 1. http://dx.doi.org/10.14419/ijet.v7i3.6.14922.
Full textGoossen, William T. F., Marcel J. Jonker, Kai U. Heitmann, Irma C. Jongeneel-de Haas, Tom de Jong, Johannes W. van der Slikke, and Bert L. Kabbes. "Electronic patient records: domain message information model perinatology." International Journal of Medical Informatics 70, no. 2-3 (July 2003): 265–76. http://dx.doi.org/10.1016/s1386-5056(03)00054-6.
Full textBorges, Adilson, and Pierrick Gomez. "How products induce regulatory fit: evidence from the health domain." Journal of Consumer Marketing 32, no. 6 (September 14, 2015): 441–49. http://dx.doi.org/10.1108/jcm-01-2015-1292.
Full textKim, Dongkyun, and Yong-Hwan Kim. "A Network Federation Scheme for Inter-Domain SDN Communications." Webology 19, no. 1 (January 20, 2022): 4515–26. http://dx.doi.org/10.14704/web/v19i1/web19298.
Full textAwad, Ammar. "A Survey of Spatial Domain Techniques in Image Steganography." Journal of Education College Wasit University 1, no. 26 (January 12, 2018): 497–510. http://dx.doi.org/10.31185/eduj.vol1.iss26.105.
Full textPersky, Susan, Rebecca A. Ferrer, William M. P. Klein, Megan R. Goldring, Rachel W. Cohen, William D. Kistler, Haley E. Yaremych, and Sofia Bouhlal. "Effects of Fruit and Vegetable Feeding Messages on Mothers and Fathers: Interactions Between Emotional State and Health Message Framing." Annals of Behavioral Medicine 53, no. 9 (November 3, 2018): 789–800. http://dx.doi.org/10.1093/abm/kay088.
Full textJournal, Baghdad Science. "Steganography in Audio Using Wavelet and DES." Baghdad Science Journal 12, no. 2 (June 7, 2015): 431–36. http://dx.doi.org/10.21123/bsj.12.2.431-436.
Full textSKARMEAS, NIKOLAOS P., and KEITH L. CLARK. "COMPONENT BASED AGENT CONSTRUCTION." International Journal on Artificial Intelligence Tools 11, no. 01 (March 2002): 139–63. http://dx.doi.org/10.1142/s0218213002000812.
Full textGuo, Qinghua, Defeng Huang, Sven Nordholm, Jiangtao Xi, and Yanguang Yu. "Iterative Frequency Domain Equalization With Generalized Approximate Message Passing." IEEE Signal Processing Letters 20, no. 6 (June 2013): 559–62. http://dx.doi.org/10.1109/lsp.2013.2256783.
Full textAndriyanov, Nikita, Anatoliy Buldakovsky, and Kirill Risukhin. "Correlation analysis of voice communications in Russian language in the airspace of the Russian Federation." ITM Web of Conferences 30 (2019): 04001. http://dx.doi.org/10.1051/itmconf/20193004001.
Full textAbdulraman, Ladeh S., Sheerko R. Hma Salah, Halgurd S. Maghdid, and Azhin T. Sabir. "A robust way of steganography by using blocks of an image in spatial domain." Innovaciencia Facultad de Ciencias Exactas Físicas y Naturales 7, no. 1 (October 25, 2019): 1–7. http://dx.doi.org/10.15649/2346075x.690.
Full textLin, Jzau Sheng, Mei Wang, Pei Yu Lia, and Ze Jin Li. "An SSVEP-Based BCI System for SMS in a Mobile Phone." Applied Mechanics and Materials 513-517 (February 2014): 412–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.412.
Full textDavid, G., B. van der Schueren, P. Marynen, J. J. Cassiman, and H. van den Berghe. "Molecular cloning of amphiglycan, a novel integral membrane heparan sulfate proteoglycan expressed by epithelial and fibroblastic cells." Journal of Cell Biology 118, no. 4 (August 15, 1992): 961–69. http://dx.doi.org/10.1083/jcb.118.4.961.
Full textJarrah, Moath, and Bernard Zeigler. "A modeling and simulation-based methodology to support dynamic negotiation for web service applications." SIMULATION 88, no. 3 (November 1, 2010): 315–28. http://dx.doi.org/10.1177/0037549710385744.
Full textPurnami, Wening Handri. "RANAH PESAN PADA PAPAN PETUNJUK DI OBJEK WISATA DAERAH ISTIMEWA YOGYAKARTA." Widyaparwa 46, no. 2 (January 23, 2019): 157–67. http://dx.doi.org/10.26499/wdprw.v46i2.205.
Full textZhan, Xu, Yue Rong Lei, Ling Yan Du, Hui Ming Zeng, and Jian Ling Chen. "A Grayscale Image Fragile Watermark Authentication System in Spatial-Domain." Applied Mechanics and Materials 380-384 (August 2013): 2920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2920.
Full textNandakumar, Nachiketas, Bharadhwaj Sivakumaran, Arti Kalro, and Piyush Sharma. "Threat, efficacy and message framing in consumer healthcare." Marketing Intelligence & Planning 35, no. 4 (May 6, 2017): 442–57. http://dx.doi.org/10.1108/mip-07-2016-0117.
Full textRajan, Raghunandan, Radharamanan Radhakrishnan, and Philip A. Wilsey. "Dynamic Cancellation: Selecting Time Warp Cancellation Strategies at Runtime." VLSI Design 9, no. 3 (January 1, 1999): 237–51. http://dx.doi.org/10.1155/1999/61087.
Full textBattikh, Dalia, Safwan El El Assad, Thang Manh Hoang, Bassem Bakhache, Olivier Deforges, and Mohamad Khalil. "Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors." Entropy 21, no. 8 (July 30, 2019): 748. http://dx.doi.org/10.3390/e21080748.
Full textHuang, D. "Stochastic fm models and non-linear time series analysis." Advances in Applied Probability 29, no. 4 (December 1997): 986–1003. http://dx.doi.org/10.2307/1427850.
Full textPoehlman, Jon, Jennifer D. Uhrig, Allison Friedman, Monica Scales, Ann Forsythe, and Susan J. Robinson. "Bundling of STDs and HIV in Prevention Messages." Journal of Social Marketing 5, no. 1 (January 5, 2015): 2–20. http://dx.doi.org/10.1108/jsocm-08-2013-0051.
Full textShkotin, Alex. "Finite Systems Handling Language (YAFOLL message 1)." Studia Humana 4, no. 4 (December 1, 2015): 3–12. http://dx.doi.org/10.1515/sh-2015-0021.
Full textK. Jayanthi, S., and K. Sridevi. "Mean Square Error Optimization to Authenticate Multi-Modality Medical Images in Wavelet Domain." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 265. http://dx.doi.org/10.14419/ijet.v7i3.27.17890.
Full textHuang, D. "Stochastic fm models and non-linear time series analysis." Advances in Applied Probability 29, no. 04 (December 1997): 986–1003. http://dx.doi.org/10.1017/s0001867800047984.
Full textBroda, Martin, Vladimír Hajduk, and Dušan Levický. "Universal statistical steganalytic method." Journal of Electrical Engineering 68, no. 2 (March 28, 2017): 117–24. http://dx.doi.org/10.1515/jee-2017-0016.
Full textHussien, Amar Y. "Image Steganography Based Spatial and Transform Domain Techniques: A Review." Fusion: Practice and Applications 8, no. 1 (2022): 08–15. http://dx.doi.org/10.54216/fpa.080101.
Full textHoetger, Cosima, Rose S. Bono, Nicole E. Nicksic, Andrew J. Barnes, and Caroline O. Cobb. "Influence of Electronic Cigarette Characteristics on Susceptibility, Perceptions, and Abuse Liability Indices among Combustible Tobacco Cigarette Smokers and Non-Smokers." International Journal of Environmental Research and Public Health 16, no. 10 (May 23, 2019): 1825. http://dx.doi.org/10.3390/ijerph16101825.
Full textGarcia, P., T. Gomes, J. Monteiro, A. Tavares, and M. Ekpanyapong. "On-Chip Message Passing Sub-System for Embedded Inter-Domain Communication." IEEE Computer Architecture Letters 15, no. 1 (January 1, 2016): 33–36. http://dx.doi.org/10.1109/lca.2015.2419260.
Full textZhang, Chuanzong, Carles Navarro Manchon, Zhongyong Wang, and Bernard Henri Fleury. "Message-Passing Receivers for Single Carrier Systems with Frequency-Domain Equalization." IEEE Signal Processing Letters 22, no. 4 (April 2015): 404–7. http://dx.doi.org/10.1109/lsp.2014.2325401.
Full textTiani, Riris. "Judgement Sebagai Sistem Appraisal dalam Iklan Kecantikan Visual Media Cetak." Nusa: Jurnal Ilmu Bahasa dan Sastra 12, no. 4 (November 1, 2017): 256. http://dx.doi.org/10.14710/nusa.12.4.256-264.
Full textShao, Chen, and Xiaochen Chen. "Deep-Learning-Based Financial Message Sentiment Classification in Business Management." Computational Intelligence and Neuroscience 2022 (July 18, 2022): 1–9. http://dx.doi.org/10.1155/2022/3888675.
Full textMaji, Giridhar, Sharmistha Mandal, and Soumya Sen. "Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 83–101. http://dx.doi.org/10.4018/ijisp.2020040105.
Full textShi, Yang Chun, and You Bao Liu. "Interference Suppression for Satellite Navigation Based on Neural Network and Wavelet Packets Transform." Advanced Materials Research 457-458 (January 2012): 1111–17. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.1111.
Full textMa, Wen Zhong, Zhi Wang, Yao Rong Li, and Wei Zhang. "Research on Acquisition and Tracing Algorithm of GPS Receiver." Applied Mechanics and Materials 229-231 (November 2012): 1556–59. http://dx.doi.org/10.4028/www.scientific.net/amm.229-231.1556.
Full textShaukat, Kamran, Ibrahim A Hameed, Suhuai Luo, Imran Javed, Farhat Iqbal, Amber Faisal, Rabia Masood, et al. "Domain Specific Lexicon Generation through Sentiment Analysis." International Journal of Emerging Technologies in Learning (iJET) 15, no. 09 (May 15, 2020): 190. http://dx.doi.org/10.3991/ijet.v15i09.13109.
Full textSahmi, Imane, Abderrahim Abdellaoui, Tomader Mazri, and Nabil Hmina. "MQTT-PRESENT: Approach to secure internet of things applications using MQTT protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 4577. http://dx.doi.org/10.11591/ijece.v11i5.pp4577-4586.
Full textZhu, Huihu, Han Qiu, Junhu Zhu, and Di Chen. "SMSEI-SDN: A Suppression Method of Security Incident Impact for the Inter-Domain Routing System Based on Software-Defined Networking." Wireless Communications and Mobile Computing 2021 (May 17, 2021): 1–16. http://dx.doi.org/10.1155/2021/5539790.
Full textCastiglione, Aniello, Francesco Palmieri, Chin-Ling Chen, and Yao-Chung Chang. "A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment." International Journal of Data Warehousing and Mining 12, no. 1 (January 2016): 34–48. http://dx.doi.org/10.4018/ijdwm.2016010103.
Full textLagisetty, Pooja A., Shubadra Priyadarshini, Stephanie Terrell, Mary Hamati, Jessica Landgraf, Vineet Chopra, and Michele Heisler. "Culturally Targeted Strategies for Diabetes Prevention in Minority Population." Diabetes Educator 43, no. 1 (January 24, 2017): 54–77. http://dx.doi.org/10.1177/0145721716683811.
Full textYu, Wenle, Pengfei Wang, Wanyu Du, and Xiaochun Shen. "Researchon Visual Modeling Technology of 3D Mining Engineering Based on Deep Learning." Academic Journal of Science and Technology 2, no. 2 (August 17, 2022): 118–21. http://dx.doi.org/10.54097/ajst.v2i2.1297.
Full textWoods, David D., and Glenn Elias. "Significance Messages: An Integrated Display Concept." Proceedings of the Human Factors Society Annual Meeting 32, no. 19 (October 1988): 1350–54. http://dx.doi.org/10.1177/154193128803201909.
Full textAlsisi, Elaf Ali, Ahmed Al-Ashaab, and Wadhah Ahmed Abualfaraa. "The Development of a Smart Health Awareness Message Framework Based on the Use of Social Media: Quantitative Study." Journal of Medical Internet Research 22, no. 7 (July 23, 2020): e16212. http://dx.doi.org/10.2196/16212.
Full textMirin, A. A., J. J. Ambrosiano, J. H. Bolstad, A. J. Bourgeois, J. C. Brown, B. Chan, W. P. Dannevik, et al. "Climate system modeling using a domain and task decomposition message-passing approach." Computer Physics Communications 84, no. 1-3 (November 1994): 278–96. http://dx.doi.org/10.1016/0010-4655(94)90215-1.
Full textMachado, Irene. "Lotman’s scientific investigatory boldness: The semiosphere as a critical theory of communication in culture." Sign Systems Studies 39, no. 1 (June 1, 2011): 81–104. http://dx.doi.org/10.12697/sss.2011.39.1.03.
Full text