咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是61-70 订阅
排序:
Secure Wavelet-Based Isometric Projection for Face Recognition
Secure Wavelet-Based Isometric Projection for Face Recogniti...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Al-Assam, Hisham Sellahewa, Harin Jassim, Sabah Univ Buckingham Buckingham MK18 1EG England
Biometric systems such as face recognition must address four key challenges: efficiency, robustness, accuracy and security. Isometric projection has been proposed as a robust dimension reduction technique for a number... 详细信息
来源: 评论
Face-It-Up: a scientific app for face processing using mobile devices and machine learning APIs
Face-It-Up: a scientific app for face processing using mobil...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Marques, Oge James, Jhanon Barcelos, Emilio Florida Atlantic Univ 777 Glades Rd Boca Raton FL 33431 USA Florida Inst Technol 150 W Univ Blvd Melbourne FL 32901 USA
image processing and Computer Vision solutions have become commodities for software developers, thanks to the growing availability of Application Programming Interfaces (APIs) that encapsulate rich functionality, powe... 详细信息
来源: 评论
Restoration of images damaged by semi-transparent water blotches using localized image enhancement
Restoration of images damaged by semi-transparent water blot...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Greenblatt, Aaron Agaian, Sos Panetta, Karen Tufts Univ Dept Elect Engn 151 Coll Ave Medford MA 02155 USA Univ Texas San Antonio Dept Elect Engn San Antonio TX 78249 USA
Vast libraries of historic photographs are Currently degrading due to the effects of semi-transparent water blotches. Most Current restoration techniques involve heavy user interaction and are therefore too expensive ... 详细信息
来源: 评论
Multiple User Access and Testing for PreNotiS - a Fast mobile Event Reporting Solution
Multiple User Access and Testing for PreNotiS - a Fast Mobil...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Chan, Michael Kumar, Abhinav Akopian, David Agaian, Sos S. Univ Texas San Antonio San Antonio TX 78249 USA
The PreNotiS (preventive notification system) was proposed to address the current lack in consumer prevention and disaster informatics systems. The underscore of this letter is to propose PreNotiS as a provision of tr... 详细信息
来源: 评论
Automatic image cracks detection and removal on mobile devices
Automatic image cracks detection and removal on mobile devic...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Voronin, V. Marchuk, V. Sizyakin, R. Gapon, N. Pismenskova, M. Tokareva, S. Don State Tech Univ Dept Radioelect Syst Rostov Na Donu Russia
Some of old photographs are damaged due to improper archiving (e.g. affected by direct sunlight, humidity, insects, etc.) or have a physical damage resulting on appearance of cracks, scratches on photographs, non-nece... 详细信息
来源: 评论
SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly
SecurePhone: a mobile phone with biometric authentication an...
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Ricci, R. Chollet, G. Crispino, M. V. Jassim, S. Koreman, J. Olivar-Dimas, M. Garcia-Salicetti, S. Soria-Rodriguez, P. Informat SRL Via Magazzini Gen 31 I-00154 Rome Italy ENST GET Dept TSI F-75634 Paris France Nergal srl I-00155 Rome Italy Buckingham Univ Buckingham MK18 1EG England Univ Saarland D-66041 Saarbrucken Germany Telefonica Moviles Espana SA E-28001 Madrid Spain INT GET F-91011 Evry France Atos Origin E-28037 Madrid Spain
This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the "SecurePhone" - in whic... 详细信息
来源: 评论
Passive radiation detection using optically active CMOS sensors
Passive radiation detection using optically active CMOS sens...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Dosiek, Luke Schalk, Patrick D. Assured Informat Secur Inc Rome NY USA
Recently, there have been a number of small-scale and hobbyist successes in employing commodity CMOS-based camera sensors for radiation detection. For example, several smartphone applications initially developed for u... 详细信息
来源: 评论
The effects of malicious nodes on performance of mobile ad hoc networks
The effects of malicious nodes on performance of mobile ad h...
收藏 引用
mobile multimedia/image processing for military and security applications
作者: Li, Fanzhi Shi, Xiyu Jassim, Sabah Adams, Christopher Information Systems Department University of Buckingham Buckingham MK18 1EG United Kingdom CCSR University of Surrey Guildford GU2 7XH United Kingdom
Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired coun... 详细信息
来源: 评论
Privacy-aware access control for video data in intelligent surveillance systems
Privacy-aware access control for video data in intelligent s...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Vagts, Hauke Jakoby, Andreas Fraunhofer IOSB Fraunhoferstr 1 Karlsruhe Germany Karlsruhe Inst Technol Vis & Fus Lab Karlsruhe Germany
Surveillance systems became powerful. Objects can be identified and intelligent surveillance services can generate events when a specific situation occurs. Such surveillance services can be organized in a Service Orie... 详细信息
来源: 评论
High Capacity Embedding with Indexed Data Recovery using Adjunctive Numerical Relations in multimedia Signal Covers
High Capacity Embedding with Indexed Data Recovery using Adj...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Collins, James C. Agaian, Sos S. Univ Texas San Antonio Multimedia & Mobile Signal Proc Lab San Antonio TX USA
We introduce a technique for covertly embedding data throughout an audio file using redundant number system decomposition across non-standard digital bit-lines. This bit-line implementation integrates an index recover... 详细信息
来源: 评论