咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是41-50 订阅
排序:
Log-polar based framework for mobile vehicle tracking with road follower
Log-polar based framework for mobile vehicle tracking with r...
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Melnyk, Pavlo B. Messner, Richard A. Univ New Hampshire ECE Dept 33 Coll Rd Durham NH 03824 USA
A new computationally efficient framework for vehicle tracking on a mobile platform is proposed. The principal component of the framework is the log-polar transformation applied to video frames captured from a standar... 详细信息
来源: 评论
An Edge Detector based Integrated Database Framework for security applications
An Edge Detector based Integrated Database Framework for Sec...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Veeraraghavan, Sampathkumar Panetta, Karen Agaian, Sos Tufts Univ Dept Elect & Comp Engn Medford MA 02155 USA
In this paper, an integrated framework comprising of computer vision algorithms, Database system and Batch processing techniques has been developed to facilitate effective automatic threat recognition and detection fo... 详细信息
来源: 评论
security Solution against Denial of Service Attacks in BESIP System
Security Solution against Denial of Service Attacks in BESIP...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Rezac, Filip Voznak, Miroslav Safarik, Jakub Partila, Pavol Tomala, Karel Tech Univ Ostrava VSB Ostrava 70833 Czech Republic
This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - ... 详细信息
来源: 评论
A practical overview and comparison of certain commercial forensic software tools for processing large-scale digital investigations
A practical overview and comparison of certain commercial fo...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Kroeger, Knut Creutzburg, Reiner Brandenburg Univ Appl Sci Dept Informat & Media D-14737 Brandenburg Germany
The aim of this paper is to show the usefulness of modern forensic software tools for processing large-scale digital investigations. In particular, we focus on the new version of Nuix 4.2 and compare it with AccessDat... 详细信息
来源: 评论
A mobile System for Skin Cancer Diagnosis and Monitoring
A Mobile System for Skin Cancer Diagnosis and Monitoring
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Gu, Yanliang Tang, Jinshan Michigan Technol Univ Sch Technol Houghton MI 49931 USA
In this paper, we propose a mobile system for aiding doctors in skin cancer diagnosis and other persons in skin cancer monitoring. The basic idea is to use image retrieval techniques to help the users to find the simi... 详细信息
来源: 评论
Cell Phones as Imaging Sensors
Cell Phones as Imaging Sensors
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Bhatti, Nina Baker, Harlyn Marguier, Joanna Berclaz, Jerome Suesstrunk, Sabine Hewlett Packard Labs 1501 Page Mill Dr Palo Alto CA 94304 USA Ecole Polytech Fed Lausanne Sch Comp & Commun Sci IC Lausanne Switzerland
Camera phones are ubiquitous, and consumers have been adopting them faster than any other technology in modern history. When connected to a network, though, they are capable of more than just picture taking: Suddenly,... 详细信息
来源: 评论
A novel method of testing image randomness with applications to image shuffling and encryption
A novel method of testing image randomness with applications...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Wu, Yue Agaian, Sos Noonan, Joseph P. Tufts Univ 161 Coll Ave Medford MA 02155 USA Univ Texas San Antonio San Antonio 78149 TX USA
This paper discusses the problem of testing the degree of randomness within an image, particularly for a shuffled or encrypted image. Its key contributions are: 1) a mathematical model of perfectly shuffled images;2) ... 详细信息
来源: 评论
eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices
eBiometrics: an enhanced multi-biometrics authentication tec...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Kuseler, Torben Lami, Ihsan Jassim, Sabah Sellahewa, Harin Univ Buckingham Dept Appl Comp Buckingham MK18 1EG England
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as image capture, Location applications, and Biometric authentication such as Fingerprint veri... 详细信息
来源: 评论
Remote Object Authentication against counterfeiting using elliptic curves
Remote Object Authentication against counterfeiting using el...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Lancrenon, Jean Gillard, Roland Fournel, Thierry Univ St Etienne Lab H Curien 18 Rue Prof B Lauras F-42000 St Etienne France Univ Grenoble 1 Inst Fourier F-38402 St Martin Dheres France
This paper aims to provide a remote fingerprint object authentication protocol dedicated to anti-counterfeiting applications. The corresponding security model is given. The suggested scheme is based on an Elliptic Cur... 详细信息
来源: 评论
Data security and Privacy in the Cloud
Data Security and Privacy in the Cloud
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: di Vimercati, Sabrina De Capitani Foresti, Sara Livraga, Giovanni Samarati, Pierangela Univ Milan Dipartimento Informat Milan Italy
Relying on the cloud for storing data and performing computations has become a popular solution in today's society, which demands large data collections and/or analysis over them to be readily available, for examp... 详细信息
来源: 评论