咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是21-30 订阅
Data security and Privacy in the Cloud
Data Security and Privacy in the Cloud
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: di Vimercati, Sabrina De Capitani Foresti, Sara Livraga, Giovanni Samarati, Pierangela Univ Milan Dipartimento Informat Milan Italy
Relying on the cloud for storing data and performing computations has become a popular solution in today's society, which demands large data collections and/or analysis over them to be readily available, for examp... 详细信息
来源: 评论
Deep Learning on mobile Devices - A Review
Deep Learning on Mobile Devices - A Review
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Deng, Yunbin BAE Syst Inc Fast Labs Burlington MA 01803 USA
Recent breakthroughs in deep learning and artificial intelligence technologies have enabled numerous mobile applications. While traditional computation paradigms rely on mobile sensing and cloud computing, deep learni... 详细信息
来源: 评论
Quaternion-based local and global color image enhancement algorithm
Quaternion-based local and global color image enhancement al...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Voronin, V. Semenishchev, E. Zelensky, A. Agaian, S. Don State Tech Univ Lab Math Methods Image Proc & Comp Vis Intelligen Rostov Na Donu Russia Moscow State Univ Technol STANKIN Moscow Russia CUNY Coll Staten Isl Dept Comp Sci New York NY USA
Many images like medical images, satellite images, and real-life photographs may suffer poor contrast degradation. image enhancement is the image processing of improving the quality that the results are more suitable ... 详细信息
来源: 评论
Vision based pointing error estimation for mobile eye-tracking system
Vision based pointing error estimation for mobile eye-tracki...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Rao, Shishir Paramathma Wan, Qianwen Panetta, Karen Agaian, Sos Kaszowska, Aleksandra Taylor, Holly A. Tufts Univ Dept Elect & Comp Engn Medford MA 02155 USA CUNY Dept Comp Sci New York NY 10017 USA Tufts Univ Dept Psychol Medford MA 02155 USA
Translating environmental knowledge from bird's eye view perspective, such as a map, to first person egocentric perspective is notoriously challenging, but critical for effective navigation and environment learnin... 详细信息
来源: 评论
Selective Area Encryption using Machine Learning Technique
Selective Area Encryption using Machine Learning Technique
收藏 引用
IEEE International conference on Innovations in Power and Advanced Computing Technologies
作者: Kelur, Soumya Kumar, Ranjan H. S. Raju, K. NMAMIT Dept CS&E Karkala Karnataka India
Detection of object and recognition of objects in real world computing environment is one of the challenging tasks in computer vision. To solve this task there are many challenges in designing algorithm, we have to in... 详细信息
来源: 评论
Biometric Jammer: A Prevention Of Fake Acquisition Of Fngerprint For security Enhancement.
Biometric Jammer: A Prevention Of Fake Acquisition Of Fngerp...
收藏 引用
Emerging Trends in Information Technology and Engineering (ic-ETITE), conference on
作者: Priya Deshmukh Sharad Mohod Research scholar Prof. Ram Meghe Institute of Technology & Research Badnera-Amravati India Professor Prof. Ram Meghe Institute of Technology & Research Badnera-Amravati India
Biometric is a powerful tool use for the security in various domains such as mobile device security, law enforcement fields, civilian applications and military application. As the biometric has advantages properties a... 详细信息
来源: 评论
AIM 2020 Challenge on Real image Super-Resolution: Methods and Results  16th
AIM 2020 Challenge on Real Image Super-Resolution: Methods a...
收藏 引用
Workshops held at the 16th European conference on Computer Vision, ECCV 2020
作者: Wei, Pengxu Lu, Hannan Timofte, Radu Lin, Liang Zuo, Wangmeng Pan, Zhihong Li, Baopu Xi, Teng Fan, Yanwen Zhang, Gang Liu, Jingtuo Han, Junyu Ding, Errui Xie, Tangxin Cao, Liang Zou, Yan Shen, Yi Zhang, Jialiang Jia, Yu Cheng, Kaihua Wu, Chenhuan Lin, Yue Liu, Cen Peng, Yunbo Zou, Xueyi Luo, Zhipeng Yao, Yuehan Xu, Zhenyu Zamir, Syed Waqas Arora, Aditya Khan, Salman Hayat, Munawar Khan, Fahad Shahbaz Ahn, Keon-Hee Kim, Jun-Hyuk Choi, Jun-Ho Lee, Jong-Seok Zhao, Tongtong Zhao, Shanshan Han, Yoseob Kim, Byung-Hoon Baek, JaeHyun Wu, Haoning Xu, Dejia Zhou, Bo Guan, Wei Li, Xiaobo Ye, Chen Li, Hao Zhong, Haoyu Shi, Yukai Yang, Zhijing Yang, Xiaojun Li, Xin Jin, Xin Wu, Yaojun Pang, Yingxue Liu, Sen Liu, Zhi-Song Wang, Li-Wen Li, Chu-Tak Cani, Marie-Paule Siu, Wan-Chi Zhou, Yuanbo Umer, Rao Muhammad Micheloni, Christian Cong, Xiaofeng Gupta, Rajat Ahn, Keon-Hee Kim, Jun-Hyuk Choi, Jun-Ho Lee, Jong-Seok Almasri, Feras Vandamme, Thomas Debeir, Olivier Sun Yat-sen University Guangzhou China Harbin Institute of Technology University Harbin China Computer Vision Lab ETH Zurich Zurich Switzerland Baidu Research Silicon Valley United States Baidu Incorportation Silicon Valley United States China Electronic Technology Cyber Security Co. Ltd. Beijing China Guangdong OPPO Mobile Telecommunications Corp. Ltd. Dongguan China NetEase Games AI Lab Beijing China Noah’s Ark Lab Huawei Beijing China Co. Ltd. Shanghai China Beijing China Yonsei University Seodaemun-gu Korea Republic of Dalian Maritime Univerity Dalian China New Mexico United States Daejeon Korea Republic of Seattle United States Peking University Beijing China Jiangnan University Jiangnan China Karlsruher Institut fuer Technologie Karlsruher Germany Tongji University Tongji China Guangdong University of Technology Tongji China University of Science and Technology of China Hefei China Palaiseau France Center of Multimedia Signal Processing The Hong Kong Polytechnic University Hong Kong China Fuzhou University Fuzhou Fujian China University of Udine Udine Italy Indian Institute of Technology Khargapur India National University of Defense Technology Changsha China LISA Department Universie Libre de Bruxelles Brussels Belgium
This paper introduces the real image Super-Resolution (SR) challenge that was part of the Advances in image Manipulation (AIM) workshop, held in conjunction with ECCV 2020. This challenge involves three tracks to supe... 详细信息
来源: 评论
Face-It-Up: a scientific app for face processing using mobile devices and machine learning APIs
Face-It-Up: a scientific app for face processing using mobil...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Marques, Oge James, Jhanon Barcelos, Emilio Florida Atlantic Univ 777 Glades Rd Boca Raton FL 33431 USA Florida Inst Technol 150 W Univ Blvd Melbourne FL 32901 USA
image processing and Computer Vision solutions have become commodities for software developers, thanks to the growing availability of Application Programming Interfaces (APIs) that encapsulate rich functionality, powe... 详细信息
来源: 评论
Closed Frequent Itemset Mining Approach to image security Enhancement  2
Closed Frequent Itemset Mining Approach to Image Security En...
收藏 引用
2nd International conference on Computer, Communication, and Signal processing (ICCCSP) - Special Focus on Technology and Innovation for Smart Environment
作者: Swetha, Moolam Hima Sivaselvan, B. Oswald, C. Indian Inst Informat Technol Design & Manufacture Madras Tamil Nadu India
With the rapid development of multimedia applications which involves images, video and audio, security has become an important aspect of modern day digital communication. Various fields like multimedia systems, teleme... 详细信息
来源: 评论
Fixation oriented object segmentation using mobile eye tracker
Fixation oriented object segmentation using mobile eye track...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Wan, Qianwen Rajeev, Srijith Kaszowska, Aleksandra Panetta, Karen Taylor, Holly A. Agaian, Sos Tufts Univ Dept Elect & Comp Engn Medford MA 02155 USA Tufts Univ Dept Psychol Medford MA 02155 USA CUNY Comp Sci New York NY 10017 USA
Eye tracking technology allows researchers to monitor position of the eye and infer one's gaze direction, which is used to understand the nature of human attention within psychology, cognitive science, marketing a... 详细信息
来源: 评论