• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    • Journal finder

      AI-powered journal recommender

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Paper
Search Paper
Cancel
Ask R Discovery Chat PDF
Explore

Feature

  • menu top paper My Feed
  • library Library
  • translate papers linkAsk R Discovery
  • chat pdf header iconChat PDF
  • audio papers link Audio Papers
  • translate papers link Paper Translation
  • chrome extension Chrome Extension

Content Type

  • preprints Preprints
  • conference papers Conference Papers
  • journal articles Journal Articles

More

  • resources areas Research Areas
  • topics Topics
  • resources Resources

2D Barcode Research Articles

  • Share Topic
  • Share on Facebook
  • Share on Twitter
  • Share on Mail
  • Share on SimilarCopy to clipboard
Follow Topic R Discovery
By following a topic, you will receive articles in your feed and get email alerts on round-ups.
Overview
257 Articles

Published in last 50 years

Related Topics

  • Quick Response Code
  • Quick Response Code
  • Two-dimensional Barcode
  • Two-dimensional Barcode
  • QR Code
  • QR Code
  • Bar Code
  • Bar Code

Articles published on 2D Barcode

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
243 Search results
Sort by
Recency
Implementation of Robust Barcode Modulation Mechanism for Large Data Trans Reception Using Android Device

Barcoding, since its evolution has emerged as a very secure and quick way to identify the data or things uniquely, but the other major use of the bar-coding is to secure the data using barcodes. The concept of 2-D barcodes is of great relevance for use in wireless data transmission between handheld electronic devices. In a general setup of barcode standalone systems, any file on a cell phone, for example, can be transferred to a second cell phone through a series of images on the LCD which are then captured and decoded through the barcode scanner of the second cell phone. In the proposed system, a new approach for data modulation in high capacity 2-D barcodes is introduced, where in the High capacity 2 D barcode of 448*63 pixels is used to barcode the data and thereby transmitted through any wireless or wired medium. The proposed barcode has a high capacity of encoding the large amount of data by making use of MD5 secure hashing algorithm for uniquely identifying the data. The data is hashed using MD5 algorithm and thereby retrieved by cross hashing the values decoded from the barcode. The proposed bar-coding and barcode modulation technique makes use of the latest technology for generating and reading the barcodes and thereby avail users to securely transmit the data. In this paper we have propose the survey of barcode types and compare this with high capacity 2D barcode.

Read full abstract
  • Journal IconInternational Journal Of Engineering And Computer Science
  • Publication Date IconMay 25, 2016
  • Author Icon Ashwini Kasurde + 1
Cite IconCite
Chat PDF IconChat PDF
Save

Image-Like 2D Barcodes Using Generalizations of the Kuznetsov–Tsybakov Problem

In this paper, we propose a novel method for generating visually appealing two-dimensional (2D) barcodes that resemble meaningful images to human observers. The technology of 2D barcodes, currently dominated by quick response codes, is widely adopted in many applications, including product tracking, document management, and general marketing. Such barcodes typically lack user friendly appearance and do not convey any visual significance to human observers. The proposed method addresses this problem by allowing 2D barcodes to resemble an arbitrary image or a logo. Our method is based on a generalization of the Kuznetsov–Tsybakov problem that served as a foundation for wet paper codes, commonly adopted in digital steganography. We introduce weaker statistical constraints to obtain additional flexibility allowing the barcode to assume the appearance of an arbitrary pattern. This paper provides the theoretical analysis of the proposed coding framework and a practical algorithm for rapid approximation of the optimal code. We also discuss the introduction of error correction capabilities, and experimentally evaluate a prototype implementation in a smartphone-based acquisition scenario.

Read full abstract
  • Journal IconIEEE Transactions on Information Forensics and Security
  • Publication Date IconApr 1, 2016
  • Author Icon Jaroslaw Duda + 4
Cite IconCite
Chat PDF IconChat PDF
Save

Life Sciences Discovery and Technology Highlights

Life Sciences Discovery and Technology Highlights

Read full abstract
  • Journal IconSLAS Technology
  • Publication Date IconApr 1, 2016
  • Author Icon Xiaole Mao + 1
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

A Semi-automated Approach to Preparing Antibody Cocktails for Immunophenotypic Analysis of Human Peripheral Blood

Immunophenotyping of peripheral blood by flow cytometry determines changes in the frequency and activation status of peripheral leukocytes during disease and treatment. It has the potential to predict therapeutic efficacy and identify novel therapeutic targets. Whole blood staining utilizes unmanipulated blood, which minimizes artifacts that can occur during sample preparation. However, whole blood staining must also be done on freshly collected blood to ensure the integrity of the sample. Additionally, it is best to prepare antibody cocktails on the same day to avoid potential instability of tandem-dyes and prevent reagent interaction between brilliant violet dyes. Therefore, whole blood staining requires careful standardization to control for intra and inter-experimental variability. Here, we report deployment of an automated liquid handler equipped with a two-dimensional (2D) barcode reader into a standard process of making antibody cocktails for flow cytometry. Antibodies were transferred into 2D barcoded tubes arranged in a 96 well format and their contents compiled in a database. The liquid handler could then locate the source antibody vials by referencing antibody names within the database. Our method eliminated tedious coordination for positioning of source antibody tubes. It provided versatility allowing the user to easily change any number of details in the antibody dispensing process such as specific antibody to use, volume, and destination by modifying the database without rewriting the scripting in the software method for each assay. A proof of concept experiment achieved outstanding inter and intra- assay precision, demonstrated by replicate preparation of an 11-color, 17-antibody flow cytometry assay. These methodologies increased overall throughput for flow cytometry assays and facilitated daily preparation of the complex antibody cocktails required for the detailed phenotypic characterization of freshly collected anticoagulated peripheral blood.

Read full abstract
  • Journal IconJournal of Visualized Experiments
  • Publication Date IconFeb 8, 2016
  • Author Icon Yoshinobu Koguchi + 6
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

A Semi-automated Approach to Preparing Antibody Cocktails for Immunophenotypic Analysis of Human Peripheral Blood

Immunophenotyping of peripheral blood by flow cytometry determines changes in the frequency and activation status of peripheral leukocytes during disease and treatment. It has the potential to predict therapeutic efficacy and identify novel therapeutic targets. Whole blood staining utilizes unmanipulated blood, which minimizes artifacts that can occur during sample preparation. However, whole blood staining must also be done on freshly collected blood to ensure the integrity of the sample. Additionally, it is best to prepare antibody cocktails on the same day to avoid potential instability of tandem-dyes and prevent reagent interaction between brilliant violet dyes. Therefore, whole blood staining requires careful standardization to control for intra and inter-experimental variability.Here, we report deployment of an automated liquid handler equipped with a two-dimensional (2D) barcode reader into a standard process of making antibody cocktails for flow cytometry. Antibodies were transferred into 2D barcoded tubes arranged in a 96 well format and their contents compiled in a database. The liquid handler could then locate the source antibody vials by referencing antibody names within the database. Our method eliminated tedious coordination for positioning of source antibody tubes. It provided versatility allowing the user to easily change any number of details in the antibody dispensing process such as specific antibody to use, volume, and destination by modifying the database without rewriting the scripting in the software method for each assay.A proof of concept experiment achieved outstanding inter and intra- assay precision, demonstrated by replicate preparation of an 11-color, 17-antibody flow cytometry assay. These methodologies increased overall throughput for flow cytometry assays and facilitated daily preparation of the complex antibody cocktails required for the detailed phenotypic characterization of freshly collected anticoagulated peripheral blood.

Read full abstract
  • Journal IconJournal of Visualized Experiments : JoVE
  • Publication Date IconFeb 8, 2016
  • Author Icon Yoshinobu Koguchi + 6
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption—almost every camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive mobile applications including mobile payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual nature, 2D barcodes are subject to eavesdropping when they are displayed on the smartphone screens. On the other hand, the fundamental design principles of 2D barcodes make it difficult to add security features. In this paper, we propose SBVLC—a secure system for barcode-based visible light communication (VLC) between smartphones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop three secure data exchange schemes that encode information in barcode streams. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and contactless payment. SBVLC is evaluated through extensive experiments on both Android and iOS smartphones.

Read full abstract
  • Journal IconIEEE Transactions on Mobile Computing
  • Publication Date IconFeb 1, 2016
  • Author Icon Bingsheng Zhang + 4
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

2D Barcode Identification Technology Application in Tool Management System for Workshop

With the development of advanced automation degree industries, the requirements of network management for workshop tool become more and more urgent. A very important part in network management system is identification technology of the tool. In this paper, 2D (two-dimensional) barcode identification technology is applied in the tool information in real-time query to realize network management. The 2D barcode reading device, which is combined with the local computer decoding software, could achieve communication between production line and the server. By using 2D barcode identification technology, it could achieve network management for workshop tool, improve production efficiency and reduce the artificial error.

Read full abstract
  • Journal IconMaterials Science Forum
  • Publication Date IconJan 1, 2016
  • Author Icon Wen Ping Du + 2
Cite IconCite
Chat PDF IconChat PDF
Save

Using circular dot pattern code tag for medical information on the round type medical package

Administration of medicines is important issue for patient safety in medical applications. Especially, manufacture date and expiry date are very important. Medical applications have strong needs for embedded tags on medical bottles to facilitate medicine management. One-dimensional 1D barcode cannot represent the required information capacity. Two-dimensional 2D barcode and radio-frequency identification RFID systems can support information capacity. However, 2D barcode is hard to recognition, if 2D barcode tag is attached on curvature surface. RFID is 100 times more expensive than barcode systems and also it is difficult to embed RFID tags on curvature. In this paper, we propose circular dot pattern code CDPC tag for cylindrical and round type medical bottle identification and management. CDPC is based on topology of dot pattern code, and it is well suited to recognising tags in curvature environments. Experimental results show that CDPC outperformed 2D barcode in its recognition rate on curvature, including cylindrical and round shape.

Read full abstract
  • Journal IconInternational Journal of Advanced Media and Communication
  • Publication Date IconJan 1, 2016
  • Author Icon Jae Youn Shim + 1
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

Based on 2D Barcode Technology to Design of Wolfberry Products Traceability System

The main purpose of this paper is to study the application of 2D barcode in the design of the Chinese wolfberry product traceability system. Through the design of Chinese wolfberry product traceability system, the application of 2D barcode technology, the application of 2D barcode to identify agricultural products, so as to improve the traceability of Chinese wolfberry products. The results confirmed that the application of 2D barcode technology to design the product traceability system, can improve the traceability of Chinese wolfberry products, compared with the previous increase of 6%, play a positive impact. Using 2D barcode technology to Ddetermine agricultural products, not only to enhance the design level of Chinese wolfberry product traceability system, but also effectively play the application value, improve the traceability of wolfberry products.

Read full abstract
  • Journal IconInternet of Things and Cloud Computing
  • Publication Date IconJan 1, 2016
  • Author Icon Wang Chen
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

Analysis on E-Ticket Image Recognition Technology Based on Mobile QR Code

<p>Currently, most urban rail transits have adopted IC card technology, yet a huge amount of passengers has to wait and buy tickets in the railway stations or stations located in large-scale shopping malls. As a result, there exists potential safety hazard to the operation department. This paper proposes the electronic ticket system based on mobile 2D barcode; the ticket inspection system is able to swiftly recognize 2D barcode ticket, which is a key technology; it mainly analyzes and researches the recognition of QR Code. QR Code image is recognized and analyzed to effectively reduce recognition time and upgrade recognition rate. With the development of the technology, it is able to realize swift ticket procurement and inspection in the rail transit field. </p>

Read full abstract
  • Journal IconElectronics Science Technology and Application
  • Publication Date IconDec 2, 2015
  • Author Icon Xiao Han
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

English

Nowadays, one of the popular multimedia data exchanged in the internet is Digital video. Protection requires in requires enhancing safety in commercial activity on the internet as well as media. A widely interesting research is the 2D Barcode with a digital watermark is in the field of security. By using the Quick Response (QR) Code technique, in this paper we recommend a video watermarking with text data. Via a robust video watermarking scheme the QR Code is prepared to be watermarked based on the SVD (singular value decomposition) and DWT (Discrete Wavelet Transform). SVD is an attractive arithmetical transform for watermarking applications. In addition to that logo (or) watermark gives the authorized ownership of video document. For the cover I-frame the SVD is applied. With logo (or) watermark there fused the extracted diagonal value. For SVD cover image and QR code image the SVD is applied. The watermarked image inverse transform and add the frame into video, to authorized customers this watermarked videofile sends. In the reverse process for authorized ownership check the logo and QR code. Acceptable imperceptibility achieved by these experimental results and in video processing there certain robustness.

Read full abstract
  • Journal IconInternational Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering
  • Publication Date IconOct 20, 2015
  • Author Icon Rituja S Darandale, S Iddhi S Kasabe,
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

Painting authentication by means of a biometric-like approach

<p>Artwork counterfeiting is a wide problem in the art market, both for private subject and museums. For this reason, it is important introducing innovative authentication solutions, based on state-of-the-art technologies. In particular, in this paper, the proposed solution is based on a mobile architecture, starting from the consideration that nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. The proposed solution uses smartphones as simple, robust and efficient sensor for artworks authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative and not-invasive method for the authentication of artworks based on random intrinsic object characteristics. This approach is based on biometry paradigm (analogue fingerprinting). The paper present a stand-alone solution, and an internet-based one, necessary for granting security verification also in case of problem with the used RFID tag. The proposed method uses an RFID Tag and a 2D barcode, in conjunction with an Internet-based Authentication Archive.</p>

Read full abstract
  • Journal IconACTA IMEKO
  • Publication Date IconSep 27, 2015
  • Author Icon Giuseppe Schirripa Spagnolo + 4
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

Printed Document Authentication Using Two-Dimensional (2D) Barcodes and Image Processing Techniques

Printed Document Authentication Using Two-Dimensional (2D) Barcodes and Image Processing Techniques

Read full abstract
  • Journal IconInternational Journal of Security and Its Applications
  • Publication Date IconAug 31, 2015
  • Author Icon Mohammed Al-Gawda + 2
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

DPM 2D Bar Code Locating based on Corner Detection and Clustering Analysis

Industrial DPM bar code is achieved by means of laser etching on metal surface; it uses Data Matrix bar code image as the main carrier, which can ensure the full life cycle tracking ability. But due to the ambient light and metal materials, collected industrial DPM images may exist uneven illumination, low contrast and other issues. How to identify this code type quickly and accurately is a problem, and how to locate the bar code area accurately is even more critical and difficult. In this paper, according to the characteristics of frequently appeared cartesian points in DPM bar code area, an adaptive corner detection method based on curvature scale space is used to detect the corners effectively. Then for the corners gathered by clusters, an improved density-based clustering method is proposed to achieve precise positioning results. Experimental results show that the proposed algorithm has certain suppression ability for low contrast, illumination and blur deformation images and is superior to the traditional algorithms on positioning precision and accuracy.

Read full abstract
  • Journal IconInternational Journal of Advanced Pervasive and Ubiquitous Computing
  • Publication Date IconJul 1, 2015
  • Author Icon Lingling Li + 2
Cite IconCite
Chat PDF IconChat PDF
Save

From sample to eluate; a validation study of Qiagen® QIAsymphony® DNA Investigator® Kit, a magnetic bead chemistry, on Hamilton® Microlab STAR® Autolys®

DNA extraction is arguably the most critical stage in the process of forensic profiling. If done poorly, the sample can be lost and all downstream processing steps will be fruitless as they are dependent on the quality of the extract. The main factors to take into consideration to ensure a good quality of extracted DNA are: the efficiency of the extraction method and the absence of cross-contamination between samples. In this article we will discuss the implementation and validation of a fully automated DNA extraction method that involves the use of Qiagen® QIAsymphony® DNA Investigator® kit being processed on a Hamilton® Microlab STAR® automated platform in conjunction with Autolys® technology (barcoded Autolys® tubes used for the initial lysis, and subsequent filtration of lysates). Forensic trace samples are first placed on the Hamilton® Microlab STAR® Autolys® in Autolys® tubes by the operator. After the lysis and extraction process, the DNA extracts are collected into tubes with unique two-dimensional (2D) barcodes ready for downstream processing. This method successfully resolves the problem of manual interaction between the initial lysis and the subsequent transfer onto the automated platform, a critical step which can potentially lead to problems such as sample mix-up and contamination. The use of automation and 2D barcodes for sample tracking significantly reduces the chances of issues like those mentioned occurring.

Read full abstract
  • Journal IconCanadian Society of Forensic Science Journal
  • Publication Date IconJun 18, 2015
  • Author Icon Christian Faccinetto + 5
Cite IconCite
Chat PDF IconChat PDF
Save

Improving vaccine registries through mobile technologies: a vision for mobile enhanced Immunization information systems.

Improving vaccine registries through mobile technologies: a vision for mobile enhanced Immunization information systems.

Read full abstract
  • Journal IconJournal of the American Medical Informatics Association : JAMIA
  • Publication Date IconJun 15, 2015
  • Author Icon Kumanan Wilson + 3
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

SECURE3 AUTHENTICATION FOR SENSITIVE DATA ON CLOUD USING TEXTUAL, CHESSBOARD AND QR CODE PASSWORD SYSTEM

Existing systems of authentication are plagued by many weaknesses. As a high speed cloud infrastructure is being developed and people are informationized, the sensitive data are also engaged in cloud feild. However, the existing cloud sensitive file upload and download on cloud was exposed to the danger of hacking. Recently, the personal information has been leaked by a high degree method such as Phishing or Pharming beyond snatching a user ID and Password. Seeing that most of examples which happened in the file uploading and downloading were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new authentication system file uploading and downloading on cloud using HADOOP technique. In HADOOP technique there are 3 technique but we can use HDFS (Hadoop Distributed File System).This authentication system is a combination of a three authentication system i.e. Secure3 in that 1)Textual,2)Chessboard,3)QR-code Authentication. In Textual authentication normal authentication is required to login .i.e username and password. In chessboard authentication user plays a steps of a chessboard and select that steps as authentication. In QR-code used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode. we also include a priority of a sensitive data in that low priority sensitive data have only a Textual authentication system. Medium priority sensitive data have Textual +chessboard authentication system. High priority sensitive data have Textual +chessboard +QR-code authentication system.

Read full abstract
  • Journal IconInternational Journal of Research in Engineering and Technology
  • Publication Date IconMay 25, 2015
  • Author Icon V R Waghmare
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

Effectiveness of 2D barcode tracking in recording instrument sterilization & avoiding spread of infection in operating theatre

Effectiveness of 2D barcode tracking in recording instrument sterilization & avoiding spread of infection in operating theatre

Read full abstract
  • Journal IconJournal of Microbiology, Immunology and Infection
  • Publication Date IconApr 1, 2015
  • Author Icon L.L Mei + 3
Cite IconCite
Chat PDF IconChat PDF
Save

Employee Attendance Checker in Manufacturing Using Barcode and Mobile with Embedded Camera

In Thailand Manufacturing, checking employee attendance is one of the important issues for human resource, because many manufacturing evaluate employees’ attendance and while giving the final bonus, HRs considers their total number of appearances on manufacture during the whole work time. This brings to the idea of having some tool to control employees’ attendance. Some manufacturing prefer to use paper sheet for controlling attendance, whereas some manufacturing prefer to use paper sheet for checking employees' attendance and after this, fill out these information into a system manually, like Thailand Manufacturing in Siracha Province does. However, this is not an efficient way since there will be spent much of time for checking employees names and putting marks like "presence" or "absence". Moreover, some employees may call his/her friend as "presence" even though this employee is currently absent. After thinking all these issues, researcher of the following research paper decided to create a system that makes easier to check employees’ attendance automatically, and this system is implemented in Thailand Manufacturing near SiRacha province. Actually, this is the first time when such kind of system is being used in manufacturing system of Thailand. The system is based on 1D barcode technology and run on mobile application with Android OS, and in this paper, details of this system are presented.

Read full abstract
  • Journal IconApplied Mechanics and Materials
  • Publication Date IconApr 1, 2015
  • Author Icon Puchong Subpratatsavee + 1
Cite IconCite
Chat PDF IconChat PDF
Save

Two Messages out of One 2D Matrix Bar Code

With the proposed principle of two-dimensional matrix bar code design based on masks, the whole surface of a 2D bar code is used for creating graphic patterns. Masks are a method of overlaying certain information with complete preservation of encoded information. In order to ensure suitable mask performance, it is essential to create a set of masks (mask folder) which are similar to each other. This ultimately allows additional error correction on the whole code level which is proven mathematically through an academic example of a QR code with a matrix of size 9 × 9. In order to create a mask folder, this article will investigate parameters based on Weber’s law. With the parameters founded in the research, this principle shows how QR codes, or any other 2D bar code, can be designed to display two different messages. This ultimately enables a better description of a 2D bar code, which will improve users’ visual recognition of 2D bar code purpose, and therefore users’ greater enjoyment and involvement.

Read full abstract
  • Journal IconKSII Transactions on Internet and Information Systems
  • Publication Date IconMar 31, 2015
  • Author Icon + 2
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2025 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers