Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Asare-Nuamah, Peter, and Agyepong Emmanuel Darko. "University Students’ Perceptions on the Adoption of Electronic Voting." Global Journal of Interdisciplinary Social Sciences 5, no. 6 (2016): 7-13. Ugwueze, Michael I., Jonah Onuoha, and Ejikeme J. Nwagwu. "Electronic Governance and National Security in Nigeria." Mediterranean Journal of Social Sciences 7, no. 6 (2016). Lutui, Paula Raymond, Brian Cusack, and George Maeakafa. "ICT vision & strategy for a developing country harmonization of environment & engineering." In IEEE International Conference on Environmental Engineering (EE). Milan, Italy : IEEE , 2018. Shafique, Muhammad Aatif, Babar Hayat Malik, Yasar Mahmood, Sadaf Nawaz Cheema, Khizar Hameed, and Shabana Tabassum. "Determinants Impacting the Adoption of E-Government Information Systems and Suggesting Cloud Computing Migration Framework." International Journal of Advanced Computer Science and Applications (ijacsa) 8, no. 9 (2017). M.H., Mohammed Hitham, Hatem Elkadi H.K., and Sherine Ghoneim S.G.. "A 7-Layered E-Government Framework Consolidating Technical, Social and Managerial Aspects." International Journal of Advanced Computer Science and Applications (IJACSA) 8, no. 8 (2017). Saeed, Hassan. Development of E-Government Application in Iraq: A Case Study of Iraq Ministry of Education Employment Agency In Graduate School Of Natural and Applied Science, Computer Engineering . Vol. Master Thesis. Çankaya University, 2013. Abraham, Jobin, and Varghese Paul. "Watermark Captioning for Images in E-Governance." International Journal of Computer Applications in Engineering Sciences II, no. II (2012). Al-Muhtadi, Jalal, Basit Shahzad, Kashif Saleem, Wasif Jameel, and Mehmet A. Orgun. "Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment." Health Informatics Journal 10, no. 22 (2017). K. Naik, Seena, G. A. Ramachandra, and M. V. Bramhan Reddy. "An Extended Security Framework for E-Government." International Journal of Advanced Research in Computer Science 5, no. 1 (2014): 152-154. Meshu, Tesfayee, and Sanjiv G Rao. "Framework for Securing Educational E-Government Service." International Journal on Cybernetics & Informatics (IJCI) 5, no. 4 (2016). Røberg, Pernille Monstad. Unveiling barriers and enablers of risk management in interoperability efforts: A study from the Norwegian public sector In Faculty of Economic and Social Sciences, Department of Information Systems. Vol. Master’s Thesis. University of Agder, 2013. Hashim, Hasan Adnan. A Study of Adoption and Acceptance of e-Umrah System in Saudi Arabia: Overcoming Infrastructure Barriers and Limitations In Information School. Vol. Doctor of Philosophy. University of Sheffield, 2014. Asare-Nuamah, Peter, and ‘Darko Emmanuel Agyepong. "Techno Legal Support for E-Governance and Implementation Challenges in Ghana." SOCRATES: An International, Multi-lingual, Multi-disciplinary, Refereed (peer-reviewed), Indexed Scholarly journal 4, no. Extra 3 (2016): 47-57. Izzati, Berlian Maulidya. Analisis Pengaruh Kualitas Layanan Publik E-Government (Government to Citizen) Terhadap Penciptaan Public Value (Studi Kasus: Kota Surabaya) In Institut Teknologi Sepuluh Nopember. Vol. Masters thesis., 2017. Guo, Jing-Ming, and Ming-Feng Wu. "Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach." IEEE Transactions on Image Processing 8, no. 1 (2009). Guo, Jing-Ming, and Yun-Fu Liu. "Joint Compression/Watermarking Scheme Using Majority-Parity Guidance and Halftoning-Based Block Truncation Coding." IEEE Transactions on Image Processing 19, no. 8 (2010). Guo, Jing-Ming, Min-Feng Wu, and Yong-Chuen Kang. "Watermarking in conjugate ordered dither block truncation coding images." In IEEE International Symposium on Circuits and Systems. Taipei, Taiwan , 2009. Hu, Yu-Chen, Chun-Chi Lo, Wu-Lin Chen, and Chia-Hsien Wen. "Joint image coding and image authentication based on absolute moment block truncation coding." Journal of Electronic Imaging 22, no. 1 (2013). A.Saleh, Noura, Hoda N.Boghdady, Samir I.Shaheen, and Ahmed M.Darwish. "High capacity lossless data embedding technique for palette images based on histogram analysis." Digital Signal Processing 20, no. 6 (2010): 1629-1636. Hsu, Ching-Sheng, and Shu-Fen Tu. Digital Watermarking Scheme with Visual Cryptography In International MultiConference of Engineers and Computer Scientists, IMECS 2008. Vol. I. Hong Kong, 2008. Kim, Cheonshik, Dongkyoo Shin, and Dongil Shin. Data Hiding in a Halftone Image Using Hamming Code (15, 11) In Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science. Vol. 6592. Berlin, Heidelberg: Springer, 2011. Guo, Jing-Ming, and Jia-Jin Tsai. "Reversible data hiding in low complexity and high quality compression scheme." Digital Signal Processing 22, no. 5 (2012): 776-785. Kim, Cheonshik. Data Hiding Based on Compressed Dithering Images In Advances in Intelligent Information and Database Systems. Studies in Computational Intelligence. Vol. 283. Berlin, Heidelberg: Springer, 2010. Guo, Jing-Ming, and Jia-Jin Tsai. "Reversible data hiding in highly efficient compression scheme." In IEEE International Conference on Acoustics, Speech and Signal Processing. Taipei, Taiwan , 2009. Tu, Shu-Fen, and Ching-Sheng Hsu. "A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography." The International Arab Journal of Information Technology 9, no. 3 (2012). Pages« първа ‹ предишна … 341 342 343 344 345 346 347 348 349 … следваща › последна »