咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是121-130 订阅
排序:
processing Global and Local Features in Convolutional Neural Network (CNN) and Primate Visual Systems
Processing Global and Local Features in Convolutional Neural...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Zheng, Yufeng Huang, Jun Chen, Tianwen Ou, Yang Zhou, Wu Alcorn State Univ Lorman MS 39096 USA Univ Mississippi Med Ctr Jackson MS 39216 USA
In the human visual system, visible objects are recognized by features, which can be classified into local features that are based on their simple components (i.e., line segment, angle, color, etc.) and global feature... 详细信息
来源: 评论
Moving object detection from image sequence in context with multimedia processing
Moving object detection from image sequence in context with ...
收藏 引用
IET conference on Wireless, mobile and multimedia Networks
作者: Nagmode, M.S. Joshi, M.A. Pune University India Government College of Engg. Pune India
Research in motion analysis has evolved over the years as a challenging field. Moving object detection and tracking is of major interest in applications such as traffic monitoring, military, medicine and biological sc... 详细信息
来源: 评论
An Evaluation Framework for security Algorithms Performance Realization on FPGA
An Evaluation Framework for Security Algorithms Performance ...
收藏 引用
IEEE International conference on Current Trends in Advanced Computing (ICCTAC)
作者: Guruprasad, S. P. Chandrasekar, B. S. Jain Univ Dept ECE Bangalore Karnataka India Jain Univ CVLI Bangalore Karnataka India
security algorithms play a major role in most of the applications which include electronic gadgets, mobile banking, e-commerce, military, digital image processing, satellite & wireless communications, etc. The rea... 详细信息
来源: 评论
Distributed system for multiple camera tracking
Distributed system for multiple camera tracking
收藏 引用
2011 12th IEEE International conference on multimedia and Expo, ICME 2011
作者: Leman, Karianto N.T., Pham R., Chang C., Wirianto I., Pek Institute for Infocomm Research Singapore
In practical surveillance applications, methods for multiple camera tracking have to deal with many challenges such as noises and errors in estimating system parameters. In this paper, we propose a distributed multipl... 详细信息
来源: 评论
Proceedings of International conference on Advanced Computing applications  1
收藏 引用
丛书名: Advances in Intelligent Systems and Computing
1000年
作者: Jyotsna Kumar Mandal Rajkumar Buyya Debashis De
This book gathers selected high-quality research papers presented at the 2nd International conference on Advanced Computing applications (ICACA 2021), held virtually during 27––28 March 2021. The book is divided int... 详细信息
来源: 评论
Study on the Method of Adversarial Example Attack Based on MI-FGSM  17th
Study on the Method of Adversarial Example Attack Based on M...
收藏 引用
17th International conference on Intelligent Information Hiding and multimedia Signal processing (IIH-MSP) / 14th International conference on Frontiers of Information Technology, applications and Tools (FITAT)
作者: Mao, Guanqiao Li, Lu Wang, Qingyu Li, Junbao Harbin Inst Technol Sch Elect & Informat Engn Harbin 150001 Peoples R China Def Ind Secrecy Examinat & Certificat Ctr Beijing 100089 Peoples R China
Deep neural network outperformed human beings in many fields such as image classification [1-3], object detection [4, 5], and image semantic segmentation [6] in recent years. But this model has security risks;for inst... 详细信息
来源: 评论
CAMFNet: A Context-Aware Multiscale Fusion Network for Enhanced Multispectral image Fusion in Remote Sensing and security  4
CAMFNet: A Context-Aware Multiscale Fusion Network for Enhan...
收藏 引用
4th International conference on multimedia processing, Communication and Information Technology, MPCIT 2024
作者: Suneel, J.S. Dileep, M.R. Visvesvaraya Technological University Nitte Meenakshi Institute of Technology Department of Master of Computer Applications Bengaluru India Nitte Meenakshi Institute of Technology Department of Master of Computer Applications Bengaluru India
This research is mainly concerned with enhancing the object recognition and classification of multispectral imagery imagery especially of people and vehicles in the heavily vegetated regions. Sub-technology such as PC... 详细信息
来源: 评论
Complex Event processing for Content-Based Text, image, and Video Retrieval
Complex Event Processing for Content-Based Text, Image, and ...
收藏 引用
International conference on military Communications and Information Systems (ICMCIS)
作者: Bowman, Elizabeth K. Broome, Barbara D. Holland, V. Melissa Summers-Stay, Douglas Rao, Raghuveer M. Duselis, John Howe, Jonathan Madahar, Bhopinder K. Boury-Brisset, Anne-Claire Forrester, Bruce Kwantes, Peter Burghouts, Gertjan van Huis, Jasper Mulayim, Adem Yasar US Army Res Lab Computat & Informat Sci Directorate Dayton OH 45433 USA US Army Res Lab Sensors & Elect Devices Directorate Dayton OH 45433 USA US Army Res Lab Dayton OH 45433 USA UK Def Sci & Technol Lab Salisbury Wilts England Def Res & Dev Canada Valcartier PQ Canada Def Res & Dev Canada Toronto ON Canada TNO The Hague Netherlands Atos Turkey Ankara Turkey
This report summarizes the findings of an exploratory team of the North Atlantic Treaty Organization (NATO) Information Systems Technology panel into Content-Based Analytics (CBA). The team carried out a technical rev... 详细信息
来源: 评论
Biometric Jammer: A Prevention of Fake Acquisition of Fngerprint for security Enhancement.  1
Biometric Jammer: A Prevention of Fake Acquisition of Fngerp...
收藏 引用
1st International conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2020
作者: Deshmukh, Priya Mohod, Sharad Ram Meghe Institute of Technology Research Research Scholar Badnera-Amravati India
Biometric is a powerful tool use for the security in various domains such as mobile device security, law enforcement fields, civilian applications and military application. As the biometric has advantages properties a... 详细信息
来源: 评论
mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint
Mobile visual object identification: from SIFT-BoF-RANSAC to...
收藏 引用
conference on Media Watermarking, security, and Forensics
作者: Voloshynovskiy, Sviatoslav Diephuis, Mauritis Holotyak, Taras Univ Geneva Dept Comp Sci CH-1227 Carouge GE Switzerland
mobile object identification based on its visual features find many applications in the interaction with physical objects and security. Discriminative and robust content representation plays a central role in object a... 详细信息
来源: 评论