咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是51-60 订阅
排序:
Improving the recognition of fingerprint biometric system using enhanced image fusion
Improving the recognition of fingerprint biometric system us...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Alsharif, Salim El-Saba, Aed Stripathi, Reshma Univ S Alabama Dept Elect & Comp Engn Mobile AL 36688 USA
Fingerprints recognition systems have been widely used by financial institutions, law enforcement, border control, visa issuing, just to mention few. Biometric identifiers can be counterfeited, but considered more rel... 详细信息
来源: 评论
2D Hexagonal Quaternion Fourier Transform in Color image processing
2D Hexagonal Quaternion Fourier Transform in Color Image Pro...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Grigoryan, Artyom M. Agaian, Sos S. Univ Texas San Antonio Dept Elect & Comp Engn One UTSA Circle San Antonio TX 78249 USA
In this paper, we present a novel concept of the quaternion discrete Fourier transform on the two-dimensional hexagonal lattice, which we call the two-dimensional hexagonal quaternion discrete Fourier transform (2-D H... 详细信息
来源: 评论
Generalized Phi Number System and its applications for image Decomposition and Enhancement
Generalized Phi Number System and its Applications for Image...
收藏 引用
conference on multimedia on mobile Devices and multimedia Content Access - Algorithms and Systems V
作者: Agaian, Sarkis Zhou, Yicong Stanford Univ Dept Elect Engn Stanford CA 94305 USA Interdisciplinary Solut LLC San Antonio 78215 TX USA
Technologies and applications of the field-programmable gate array (FPGAs) and digital signal processing (DSP) require both new customizable number systems and new data formats. This paper introduces a new class of pa... 详细信息
来源: 评论
Creating Wi-Fi Bluetooth Mesh Network for Crisis Management applications
Creating Wi-Fi Bluetooth Mesh Network for Crisis Management ...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Al-Tekreeti, Safa Adams, Chris Al-Jawad, Naseer Univ Buckingham Appl Comp Dept Buckingham MK181EG England
This paper proposes a wireless mesh network implementation consisting of both Wi-Fi Ad-Hoc networks as well as Bluetooth Piconet/Scatternet networks, organised in an energy and throughput efficient structure. This typ... 详细信息
来源: 评论
A Fast, Efficiency-Preserving System for Simultaneous Compression & Encryption
A Fast, Efficiency-Preserving System for Simultaneous Compre...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Metzler, Richard E. L. Agaian, Sos S. Univ Texas San Antonio Dept Elect & Comp Engn San Antonio TX 78249 USA
Methods for embedment of stream cipher rules into compressive Elias-type entropy coders are presented. Such systems have the ability to simultaneously compress and encrypt input data;thereby providing a fast and secur... 详细信息
来源: 评论
Consideration of techniques to mitigate the unauthorized 3D printing production of keys
Consideration of techniques to mitigate the unauthorized 3D ...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Straub, Jeremy Kerlin, Scott Univ North Dakota Dept Comp Sci 3950 Campus RdStop 9015 Grand Forks ND 58202 USA
The illicit production of 3D printed keys based on remote-sensed imagery is problematic as it allows a would-be intruder to access a secured facility without the attack attempt being as obviously detectable as convent... 详细信息
来源: 评论
Performance study of MPLS and DS techniques to improve QoS routing for critical applications on IP networks
Performance study of MPLS and DS techniques to improve QoS r...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Alsharif, Salim Shahsavari, M. Mehdi Univ S Alabama Mobile AL 36688 USA Florida Inst Technol Melbourne FL 32901 USA
This paper aims to analyze the QoS performance of two main technology mechanisms, Multi-Protocol Label Switching (MPLS) and Differentiated Services (DS). The introduction of both mechanisms to Support throughput and d... 详细信息
来源: 评论
New Methods for High Capacity Embedding in multimedia Covers using Redundant Number Systems with Adjunctive Numerical Representations
New Methods for High Capacity Embedding in Multimedia Covers...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Agaian, Sos S. Collins, James C. Univ Texas San Antonio Multimedia & Mobile Signal Proc Lab San Antonio TX USA
In this paper, we introduce a novel technique for covertly embedding data throughout an image using redundant number system decomposition over non-standard digital bit planes. It will be shown that this new steganogra... 详细信息
来源: 评论
mobile object retrieval in server-based image databases
Mobile object retrieval in server-based image databases
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Manger, D. Pagel, F. Widak, H. Fraunhofer Inst Optron Syst Technol & Image Explo D-76131 Karlsruhe Germany
The increasing number of mobile phones equipped with powerful cameras leads to huge collections of user-generated images. To utilize the information of the images on site, image retrieval systems are becoming more and... 详细信息
来源: 评论
A New Approach for Cancelable Iris Recognition
A New Approach for Cancelable Iris Recognition
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Yang, Kai Yan, Sui Zhou, Zhi Du, Yingzi Zou, Xukai Indiana Univ Purdue Univ Dept Elect & Comp Engn Indianapolis IN 46202 USA Indiana Univ Purdue Univ Dept Comp Sci Indianapolis IN 46202 USA
The iris is a stable and reliable biometric for positive human identification. However, the traditional iris recognition scheme raises several privacy concerns. One's iris pattern is permanently bound with him and... 详细信息
来源: 评论