Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,890,190 papers from all fields of science
Search
Sign In
Create Free Account
Business Planning and Control System
Known as:
BPCS
Business Planning and Control System (BPCS) is an Enterprise Resource Planning (ERP) software designed for an OS/400 system. BPCS is a series of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Barcode
Enterprise resource planning
IBM System i
Inventory
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
High Complexity Bit-Plane Security Enchancement in BPCS Steganography
Andysah Putera
2016
Corpus ID: 64275461
In BPCS Steganography, data hiding will be split into blocks that have a high complexity where the blocks are categorized into…
Expand
Review
2015
Review
2015
A Survey on Data Hiding in Encrypted Images
Diptee D. Lad
,
G. H. Raisoni
2015
Corpus ID: 21688249
: Data hiding is the very sensible issue in today’s life. From last few year’s some researchers work on the data hiding…
Expand
Review
2010
Review
2010
Review: Steganography – Bit Plane Complexity Segmentation (BPCS) Technique
S. S. Khaire
,
DR. Sanjay
,
L. Nalbalwar
2010
Corpus ID: 1030885
: Steganography is an ancient technique of data hiding. Steganography is a technique in which secret data is hidden into vessel…
Expand
2010
2010
High Capacity Image Steganography in Wavelet Domain
Saeed Sarreshtedari
,
S. Ghaemmaghami
7th IEEE Consumer Communications and Networking…
2010
Corpus ID: 17442247
A new high capacity method for transform domain image steganography is introduced in this paper. The proposed steganography…
Expand
2007
2007
Spectators' Perceptions of Momentum and Personal Control: Testing the Antecedents-Consequences Model
C. Smisson
,
K. Burke
,
B. Joyner
,
B. Munkasy
,
L. Blom
2007
Corpus ID: 13745490
For the past 25 years, researchers have found momentum to be a difficult variable to quantify scientifically. While various…
Expand
2007
2007
A Model of Digital Contents Access Control System Using Steganographic Information Hiding Scheme
E. Kawaguchi
,
Michiro Maeta
,
H. Noda
,
K. Nozaki
European-Japanese Conference on Information…
2007
Corpus ID: 6562057
In the present paper we propose a model for a steganography-based digital contents access control system. It is suited for…
Expand
2006
2006
Bus Priority Control System Based on Wireless Sensor Network (WSN) and Zigbee
Zhizhou Wu
,
H. Chu
,
Yuqi Pan
,
Xiaoguang Yang
IEEE International Conference on Vehicular…
2006
Corpus ID: 33723195
In this paper, based on the analysis of the shortcomings of traditional technologies, including location technology…
Expand
2002
2002
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression
H. Noda
,
Jeremiah Spaulding
,
M. N. Shirazi
,
M. Niimi
,
E. Kawaguchi
Information Hiding
2002
Corpus ID: 43706696
This paper presents a steganography method based on JPEG2000 lossy compression scheme and bit-plane complexity segmentation (BPCS…
Expand
1998
1998
The use of broad phonetic class models in speaker recognition
J. Koolwaaij
,
J. D. Veth
ICSLP
1998
Corpus ID: 1235511
In this paper we investigate the use of broad phonetic class (BPC) models in a text independent speaker recognition task. These…
Expand
1987
1987
The Belief in Personal Control Scale: A Revised, Short Form.
J. L. Berrenberg
1987
Corpus ID: 140375249
The development and validation of a shortened and revised version of the Belief in Personal Control Scale (BPCS-RS) are described…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required