咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是111-120 订阅
排序:
Latency-information theory and applications. Part II: On real-world knowledge aided radar
Latency-information theory and applications. Part II: On rea...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Feria, Erlan H. CUNY Coll Staten Isl Dept Engn Sci & Phys Staten Isl NY 10314 USA
In this second of a multi-paper series latency-information theory (LIT), the integration of information theory with its time dual, i.e., latency theory, is successfully applied to DARPA's knowledge aided sensor si... 详细信息
来源: 评论
Forensic Print Extraction Using 3-D Technology and its processing
Forensic Print Extraction Using 3-D Technology and its Proce...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Rajeev, Srijith Kamath, Shreyas K. M. Panetta, Karen Agaian, Sos S. Tufts Univ Dept Elect & Comp Engn Medford MA 02144 USA Univ Texas San Antonio Dept Elect & Comp Engn One UTSA Circle San Antonio TX 78249 USA CUNY Grad Ctr Dept Comp Sci New York NY USA
Biometric evidence plays a crucial role in criminal scene analysis. Forensic prints can be extracted from any solid surface such as firearms, doorknobs, carpets and mugs. Prints such as fingerprints, palm prints, foot... 详细信息
来源: 评论
Encryption for confidentiality of the network and influence of this to the quality of streaming video through network
Encryption for confidentiality of the network and influence ...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Sevcik, L. Uhrin, D. Frnda, J. Voznak, M. Toral-Cruz, Homer Mikulec, M. Jakovlev, Sergej VSB Tech Univ Ostrava 17 Listopadu 15-2172 Ostrava 70833 Czech Republic Univ Quintana Roo Chetmal Quintana Roo Mexico Klaipeda Univ LT-91225 Klaipeda Lithuania
Nowadays, the interest in real-time services, like audio and video, is growing. These services are mostly transmitted over packet networks, which are based on IP protocol. It leads to analyses of these services and th... 详细信息
来源: 评论
Develop a solution for protecting and securing Enterprise networks from malicious attacks
Develop a solution for protecting and securing Enterprise ne...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Kamuru, Harshitha Nijim, Mais Texas A&M Univ.-Kingsville (United States)
In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewal... 详细信息
来源: 评论
Advanced Research on Electronic Commerce, Web Application, and Communication  2011
收藏 引用
丛书名: Communications in Computer and Information Science
2011年
作者: Gang Shen Xiong Huang
The two-volume set CCIS 143 and CCIS 144 constitutes the refereed proceedings of the International conference on Electronic Commerce, Web Application, and Communication, ECWAC 2011, held in Guangzhou, China, in April ...
来源: 评论
Breaking Down the Barriers of Using Strong Authentication and Encryption in Resource Constrained Embedded Systems
Breaking Down the Barriers of Using Strong Authentication an...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Knobler, Ron Scheffel, Peter Jackson, Scott Gaj, Kris Kaps, Jens Peter McQ Inc 1551 Forbes St Fredericksburg VA USA George Mason Univ Cryptograph Engn Res Fairfax VA 22030 USA
Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each ... 详细信息
来源: 评论
CoBCom 2024 - International conference on Broadband Communications for Next Generation Networks and multimedia applications, co-located International conference and Workshop on Systems, Signals and image processing, IWSSIP 2024
CoBCom 2024 - International Conference on Broadband Communic...
收藏 引用
5th International conference on Broadband Communications for Next Generation Networks and multimedia applications, CoBCom 2024
The proceedings contain 21 papers. The topics discussed include: from ray tracing to channel impulse responses: a review on the description of polarimetric time-invariant SISO channels;an efficient algorithm for sched...
来源: 评论
Fixation oriented object segmentation using mobile eye tracker
Fixation oriented object segmentation using mobile eye track...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Wan, Qianwen Rajeev, Srijith Kaszowska, Aleksandra Panetta, Karen Taylor, Holly A. Agaian, Sos Tufts Univ Dept Elect & Comp Engn Medford MA 02155 USA Tufts Univ Dept Psychol Medford MA 02155 USA CUNY Comp Sci New York NY 10017 USA
Eye tracking technology allows researchers to monitor position of the eye and infer one's gaze direction, which is used to understand the nature of human attention within psychology, cognitive science, marketing a... 详细信息
来源: 评论
Satellite images encryption Review
Satellite images encryption Review
收藏 引用
International conference on Intelligent Computing and Human-Computer Interaction (ICHCI)
作者: Al-Khasawneh, Mahmoud Ahmad Abu-Ulbeh, Waheeb Khasawneh, Ahmad M. Al Madinah Int Univ Fac Comp Informat Technol Kuala Lumpur Malaysia Amman Arab Univ Cyber Secur Dept Amman Jordan Amman Arab Univ Mobile Comp Dept Amman Jordan
Rapid expansion of digital communication and multimedia application has led to the wide usage of digital image processing in every aspect of life of mankind. These include the use of remote sensing, medical field, met... 详细信息
来源: 评论
Selective Area Encryption using Machine Learning Technique
Selective Area Encryption using Machine Learning Technique
收藏 引用
IEEE International conference on Innovations in Power and Advanced Computing Technologies
作者: Kelur, Soumya Kumar, Ranjan H. S. Raju, K. NMAMIT Dept CS&E Karkala Karnataka India
Detection of object and recognition of objects in real world computing environment is one of the challenging tasks in computer vision. To solve this task there are many challenges in designing algorithm, we have to in... 详细信息
来源: 评论