Genetic variations analysis for complex brain disease diagnosis using machine learning techniques: opportunities and hurdles
Methods We used a methodology for literature surveys to obtain data from academic
databases. Criteria were defined for inclusion and exclusion. The selection of articles was …
databases. Criteria were defined for inclusion and exclusion. The selection of articles was …
An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …
steganography has gain wide popularity among users as well as attackers. Steganography …
An analysis of 3D steganography techniques
Steganography has become a preferred technique these days to successfully hide secret
messages. Various research has been done in the past to justify and analyze suitable types …
messages. Various research has been done in the past to justify and analyze suitable types …
Comparison of Data Hiding Techniques for Video Watermarking Applications
The basic idea for video watermarking technique is concealing information in the video host.
There are three popular techniques that can be used for data hiding those are …
There are three popular techniques that can be used for data hiding those are …
A framework to evaluate the performance of video watermarking techniques
This paper focuses on the current challenging problems of video watermarking techniques,
especially the robustness of spatial domain. This paper starts with background of the …
especially the robustness of spatial domain. This paper starts with background of the …
Genetic variants detection based on weighted sparse group lasso
Identification of genetic variants associated with complex traits is a critical step for improving
plant resistance and breeding. Although the majority of existing methods for variants …
plant resistance and breeding. Although the majority of existing methods for variants …
Video watermarking schemes resistance against tampering attacks
This paper reviews the video watermarking schemes resistance against tampering attacks.
There are several transform methods which are used for Video Watermarking including …
There are several transform methods which are used for Video Watermarking including …
[PDF][PDF] An Analysis of 3D Steganography Techniques. Electronics 2021, 10, 2357
Steganography has become a preferred technique these days to successfully hide secret
messages. Various research has been done in the past to justify and analyze suitable types …
messages. Various research has been done in the past to justify and analyze suitable types …
[PDF][PDF] A Proposed Hybrid Intelligent Model for Analyzing Genetic Deviations
LH Jwear, SAM Ramadhan - Journal of Education and Scientific Studies, 2022 - iasj.net
The rapid growth and massive volume of human genomic data, especially Single Nucleotide
Polymorphisms (SNPs), presents challenges for biomedical researchers as well as …
Polymorphisms (SNPs), presents challenges for biomedical researchers as well as …
[PDF][PDF] Research Article An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact …
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …
steganography has gain wide popularity among users as well as attackers. Steganography …