咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是31-40 订阅
排序:
Enhancement of node connectivity for mobile ad hoc networks
Enhancement of node connectivity for mobile ad hoc networks
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Shi, Xiyu Li, Fanzhi Adams, Christopher Univ Buckingham Dept Informat Syst Buckingham MK18 1EG England
For secure mobile wireless networks whose topologies are changed dynamically in insecure environments, mobile users need to keep in contact with each other for the purpose of user authentications. For instance, the ne... 详细信息
来源: 评论
System for Non-Disruptive High Capacity Indexed Data Embedding and Recovery Using multimedia Signal Covers
System for Non-Disruptive High Capacity Indexed Data Embeddi...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Collins, James C. Agaian, Sos S. Univ Texas San Antonio Multimedia & Mobile Signal Proc Lab San Antonio TX USA
Over the past several years there has been an apparent shift in research focus in the area of digital steganography and steganalysis - a shift from primarily image based methods to a new focus on broader multimedia te... 详细信息
来源: 评论
Q-filter structures with applications in mobile communication systems
Q-filter structures with applications in mobile communicatio...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Mohamed, Magdi A. Xiao, Weimin Motorola Labs Phys & Digital Realizat Res CoE Schaumburg IL 60196 USA
An advanced approach for adaptive nonlinear digital data processing is described in this article. Three primal computational structures referred to as Q-Measures, Q-Metrics, and Q-Aggregates are introduced and utilize... 详细信息
来源: 评论
Reduced memory JPEG decompression for mobile devices
Reduced memory JPEG decompression for mobile devices
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Ioup, Elias Z. Mesick, Hillary Sample, John T. McCreedy, Frank P. USN Stennis Space Ctr Res Lab Stennis Space Ctr MS 39529 USA
imagery makes up a large percentage of geospatial data in use today. One feature of this imagery is that it tends to be large, often hundreds or thousands of megabytes. As a result JPEG compression is often used to ma... 详细信息
来源: 评论
Examination of mobile phones in a university forensic lab environment
Examination of mobile phones in a university forensic lab en...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Luttenberger, Silas Kroeger, Knut Creutzburg, Reiner Brandenburg Univ Appl Sci Dept Informat & Media D-14770 Brandenburg Germany
The aim of this article is to show forensic investigation methods for mobile phones to students in a university forensic lab environment. Students have to learn the usefulness of forensic procedures to ensure evidence... 详细信息
来源: 评论
Novel technology for enhanced security and trust in communication networks
Novel technology for enhanced security and trust in communic...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Milovanov, Alexander Bukshpun, Leonid Pradhan, Ranjit Jannson, Tomasz Phys Opt Corp Torrance CA 90501 USA
A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet struc... 详细信息
来源: 评论
Accuracy, security, and processing time comparisons of biometric fingerprint recognition system using digital and optical enhancements
Accuracy, security, and processing time comparisons of biome...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Alsharif, Salim El-Saba, Aed Jagapathi, Rajendarreddy Univ S Alabama Dept Elect & Comp Engn Mobile AL 36688 USA
Fingerprint recognition is one of the most commonly used forms of biometrics and has been widely used in daily life due to its feasibility, distinctiveness, permanence, accuracy, reliability, and acceptability. Beside... 详细信息
来源: 评论
INFORMATION security TRADES IN TACTICAL WIRELESS NETWORKS
INFORMATION SECURITY TRADES IN TACTICAL WIRELESS NETWORKS
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Kurdziel, Michael T. Alvermann, John A. Harris Corp RF Commun Div Rochester NY 14610 USA
Wireless networks are now ubiquitous across the tactical environment. They offer unprecedented communications and data access capabilities. However, providing information security to wireless transmissions without imp... 详细信息
来源: 评论
A New Approach for Willingness Test in Biometric Systems
A New Approach for Willingness Test in Biometric Systems
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Yang, Kai Du, Eliza Yingzi Zhou, Zhi Indiana Univ Purdue Univ Dept Elect & Comp Engn Indianapolis IN 46202 USA
Biometrics identifies/verifies a person using his/her physiological or behavioral characteristics. It is becoming an important ally for law enforcement and homeland security. However, there are some safety and privacy... 详细信息
来源: 评论
Ensuring security of H.264 videos by using watermarking
Ensuring security of H.264 videos by using watermarking
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Chaumont, Marc Univ Nimes F-30000 Nimes France
Watermarking is known to be a very difficult task. Robustness, Distortion, Payload, security, Complexity are many constraints to deal with. When applied to a video stream, the difficulty seems to be growing in compari... 详细信息
来源: 评论