咨询与建议

限定检索结果

文献类型

  • 127 篇 会议

馆藏范围

  • 127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 95 篇 工学
    • 78 篇 计算机科学与技术...
    • 62 篇 软件工程
    • 30 篇 信息与通信工程
    • 9 篇 电气工程
    • 6 篇 动力工程及工程热...
    • 4 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 轻工技术与工程
    • 3 篇 生物工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 2 篇 农业工程
    • 2 篇 环境科学与工程(可...
  • 32 篇 理学
    • 20 篇 数学
    • 11 篇 物理学
    • 4 篇 统计学(可授理学、...
    • 3 篇 化学
    • 3 篇 生物学
    • 2 篇 系统科学
  • 24 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 8 篇 法学
    • 5 篇 社会学
    • 4 篇 法学
  • 4 篇 农学
    • 4 篇 作物学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 临床医学

主题

  • 7 篇 cryptography
  • 5 篇 image coding
  • 5 篇 image compressio...
  • 4 篇 signal to noise ...
  • 3 篇 computational mo...
  • 3 篇 visualization
  • 3 篇 codes
  • 3 篇 testing
  • 3 篇 watermarking
  • 2 篇 computer science
  • 2 篇 scalability
  • 2 篇 support vector m...
  • 2 篇 matlab
  • 2 篇 coding
  • 2 篇 speech enhanceme...
  • 2 篇 information tech...
  • 2 篇 bandwidth
  • 2 篇 smart cities
  • 2 篇 data mining
  • 2 篇 noise

机构

  • 3 篇 natl univ coll c...
  • 3 篇 college of compu...
  • 3 篇 kumoh national i...
  • 3 篇 philippine codin...
  • 3 篇 kumoh natl inst ...
  • 2 篇 research and dev...
  • 2 篇 department of el...
  • 2 篇 maharishi school...
  • 2 篇 school of comput...
  • 1 篇 department of in...
  • 1 篇 department of el...
  • 1 篇 mustansiriyah un...
  • 1 篇 school of comput...
  • 1 篇 nyu coll arts & ...
  • 1 篇 department of co...
  • 1 篇 sanjivani colleg...
  • 1 篇 information and ...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 department of co...

作者

  • 3 篇 jae-min lee
  • 3 篇 lee jae-min
  • 3 篇 gabriel avelino ...
  • 3 篇 kim dong-seong
  • 3 篇 dong-seong kim
  • 2 篇 sampedro gabriel...
  • 2 篇 aruan yohana jay...
  • 2 篇 kim ryanne gail ...
  • 2 篇 ryanne gail c. k...
  • 2 篇 yohana jayanti a...
  • 2 篇 salah m.m.
  • 2 篇 temple m.a.
  • 2 篇 bailey t.g.
  • 2 篇 raines r.a.
  • 1 篇 madaan abhishek
  • 1 篇 sasikumar s.
  • 1 篇 jukić marko
  • 1 篇 shaikh siraj a.
  • 1 篇 kouninef b.
  • 1 篇 saranya a.a.s.

语言

  • 124 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"任意字段=1st International Conference on Information Technology: Coding and Computing, ITCC 2000"
127 条 记 录,以下是91-100 订阅
排序:
A secure routing protocol for mobile Ad hoc networks
A secure routing protocol for mobile Ad hoc networks
收藏 引用
6th IEEE/ACIS international conference on Computer and information Science in conjunction with 1st IEEE/ACIS international Workshop on e-Activity
作者: Li, Zhitang Shi, Shudong Huazhong Univ Sci & Technol Sch Comp Sci & Technol Wuhan 430074 Peoples R China Hubei Normal Univ Dept Comp Sci Huangshi 435002 Peoples R China
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. In this paper, we present MSRP (secure routing protocol for mobi... 详细信息
来源: 评论
Research on dynamic change of grassland in west Jilin province based on 3s technology
收藏 引用
1st international conference on Computer and computing Technologies in Agriculture (CCTA 2007)
作者: Liu, Zhiming Ling, Nanyan NE Normal Univ Changchun 130024 Peoples R China
Grassland had been interpreted with the method that combined supervised and non-supervised classifications using Landsat data in autumns 1986, 1996 and 2000. The amelioration of algorithm promoted the accuracy. With t... 详细信息
来源: 评论
Enhanced Image Compression Technique to Improve Image Quality for Mobile Applications  1st
Enhanced Image Compression Technique to Improve Image Qualit...
收藏 引用
1st FICR international conference on Rising Threats in Expert Applications and Solutions, FICR-TEAS 2020
作者: Mayukha, S. Sundaresan, M. Department of Information Technology Bharathiar University CoimbatoreTamilnadu India
The concepts of image resizing and compression of images in mobile applications are discussed. The techniques which are currently existing can be enhanced to achieve improved image quality. Various types of image comp... 详细信息
来源: 评论
Improving image compression through the use of evolutionary computing algorithms
Improving image compression through the use of evolutionary ...
收藏 引用
1st international conference on Data Management and Security: Applications in Medicine, Sciences and Engineering, DATA 2013
作者: López-Granado, O. Galiano, V. Martí, A. Migallón, H. Martínez-Rach, M. Piñol, P. Malumbres, M.P. Miguel Hernandez University Spain Universidad Politécnica de Valencia Spain
Discrete Wavelet Transform has proved to be powerful for image compression because it is able to compact frequency and spatial localization of image energy into a small fraction of coefficients. For a long time it was... 详细信息
来源: 评论
Lossless Audio steganography in Spatial Domain (LASSD)
Lossless Audio Steganography in Spatial Domain (LASSD)
收藏 引用
1st international conference on Frontiers in Intelligent computing: Theory and Applications, FICTA 2012
作者: Pal, Dipankar Goswami, Anirban Ghoshal, Nabin Dept. of Computer Science and Engineering Techno India EM 4/1 Salt Lake Sec-V Kolkata 700091 India Dept. of Information Technology Techno India EM 4/1 Salt Lake Sec-V Kolkata 700091 India Dept. of Engineering and Technological Studies University of Kalyani Kalyani Nadia-741235 West Bengal India
In our proposed work we put an effort to make the technique of standard Least Significant Bit (LSB) coding more secured to embed secret information within an audio file. The prime focus here is to transmit any secret ... 详细信息
来源: 评论
Human Facial Expression Based Video Retrieval with Query Video Using EBCOT and MLP  1
收藏 引用
1st international conference on Mathematical Modeling and Computational Science, ICMMCS 2020
作者: Jeyalaksshmi, S. Akila, D. Padmapriya, D. Suseendran, G. Pal, Souvik Department of Information Technology Vels Institute of Science Technology & Advanced Studies Chennai India Global Institute of Management and Technology Krishnagar India
We can find a massive demand for systems that retrieve video with a query as image or video since the text-based retrieval system (text, images, video) was obsolete and the content-based video retrieval oriented. For ... 详细信息
来源: 评论
Volunteer computing Project SiDock@home for Virtual Drug Screening Against SARS-CoV-2  1
收藏 引用
1st IFIP TC 5 international conference on Computer Science Protecting Human Society Against Epidemics, ANTICOVID 2021
作者: Nikitina, Natalia Manzyuk, Maxim Podlipnik, Črtomir Jukić, Marko Karelian Research Center of the Russian Academy of Sciences Institute of Applied Mathematical Research Petrozavodsk185910 Russia Internet Portal BOINC.Ru Moscow Russia Faculty of Chemistry and Chemical Technology University of Ljubljana Ljubljana1000 Slovenia Laboratory of Physical Chemistry and Chemical Thermodynamics Faculty of Chemistry and Chemical Engineering University of Maribor Maribor2000 Slovenia Faculty of Mathematics Natural Sciences and Information Technologies University of Primorska Koper6000 Slovenia
In this paper, we describe a volunteer computing project SiDock@home aimed at high-throughput virtual screening of a specially developed library of small compounds against a set of targets playing important roles in t... 详细信息
来源: 评论
A simulation for real time data compression
A simulation for real time data compression
收藏 引用
international conference on information technology: coding and computing (itcc)
作者: T.L.P. Pham Hanoi University of Technology Vietnam
This paper presents one new basic step in real time data compression. The data under compression are random sequence of variable Y which at time t:y/sub 0/, y/sub 1/, ..., y/sub t/ have occurred. Y-random integer-{0, ... 详细信息
来源: 评论
Hand-dorsa vein recognition based on coded and weighted partition local binary patterns
Hand-dorsa vein recognition based on coded and weighted part...
收藏 引用
1st international conference on Hand-basedBiometrics, ICHB 2011
作者: Wang, Yiding Li, Kefeng Shark, Lik-Kwan Varley, Martin R. College of Information Engineering North China University of Technology Beijing China School of Computing Engineering and Physical Sciences University of Central Lancashire Preston PR1 2HE United Kingdom
In this paper, a new feature descriptor is presented and proposed for personal verification based on near infrared images of hand-dorsa veins. This new feature descriptor is a modification of the previously proposed p... 详细信息
来源: 评论
steganalysis of Adaptive steganography Under the Known Cover Image  1st
Steganalysis of Adaptive Steganography Under the Known Cover...
收藏 引用
1st international conference on Security and Privacy in Digital Economy, SPDE 2020
作者: Li, Jialin Luo, Xiangyang Zhang, Yi Zhang, Pei Yang, Chunfang Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Digital image steganography is one of the important ways to achieve covert communication to protect users’ data privacy. steganalysis technology is the key technology to check the security of steganography, and the e... 详细信息
来源: 评论