咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是71-80 订阅
排序:
Deep Learning on mobile Devices - A Review
Deep Learning on Mobile Devices - A Review
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Deng, Yunbin BAE Syst Inc Fast Labs Burlington MA 01803 USA
Recent breakthroughs in deep learning and artificial intelligence technologies have enabled numerous mobile applications. While traditional computation paradigms rely on mobile sensing and cloud computing, deep learni... 详细信息
来源: 评论
Quaternion-based local and global color image enhancement algorithm
Quaternion-based local and global color image enhancement al...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Voronin, V. Semenishchev, E. Zelensky, A. Agaian, S. Don State Tech Univ Lab Math Methods Image Proc & Comp Vis Intelligen Rostov Na Donu Russia Moscow State Univ Technol STANKIN Moscow Russia CUNY Coll Staten Isl Dept Comp Sci New York NY USA
Many images like medical images, satellite images, and real-life photographs may suffer poor contrast degradation. image enhancement is the image processing of improving the quality that the results are more suitable ... 详细信息
来源: 评论
On-line signature authentication: user adaptive template protection and renewability
On-line signature authentication: user adaptive template pro...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Maiorana, Emanuele Campisi, Patrizio Neri, Alessandro Univ Roma Tre Dip Elettron Applicata I-00146 Rome Italy
In this paper all adaptive feature-based approach to on-line signature verification is presented. Cryptographic techniques are employed to protect the extracted templates thus making impossible to derive the original ... 详细信息
来源: 评论
Assessment of heart rate variability based on mobile device for planning physical activity
Assessment of heart rate variability based on mobile device ...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Svirin, I. S. Epishina, E. V. Voronin, V. V. Semenishchev, E. A. Solodova, E. N. Nabilskaya, N. V. CJSC Nordavind Moscow Russia LLC Nordavind Dubna Dubna Russia Don State Tech Univ Dept Radioelect Syst Shakhty Russia LLC Sci Enterprise Tsezis Dubna Russia
In this paper we present a method for the functional analysis of human heart based on electrocardiography (ECG) signals. The approach using the apparatus of analytical and differential geometry and correlation and reg... 详细信息
来源: 评论
Face identification with frequency domain matched filtering in mobile environments
Face identification with frequency domain matched filtering ...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Lee, Dong-Su Woo, Yong-Hyun Yeom, Seokwon Kim, Shin-Hwan Daegu Univ Div Comp & Commun Engn Gyongsan 712714 Gyeongbuk South Korea
Face identification at a distance is very challenging since captured images are often degraded by blur and noise. Furthermore, the computational resources and memory are often limited in the mobile environments. Thus,... 详细信息
来源: 评论
Rapid Prototyping of an Automated Video Surveillance System: A Hardware-Software Co-Design Approach
Rapid Prototyping of an Automated Video Surveillance System:...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Ngo, Hau T. Rakvic, Ryan N. Broussard, Randy P. Ives, Robert W. US Naval Acad Dept Elect & Comp Engn Annapolis MD 21402 USA US Naval Acad Weapons & Syst Engn Dept Annapolis MD 21402 USA
FPGA devices with embedded DSP and memory blocks, and high-speed interfaces are ideal for real-time video processing applications. In this work, a hardware-software co-design approach is proposed to effectively utiliz... 详细信息
来源: 评论
image Segmentation in a Quaternion Framework for Remote Sensing applications
Image Segmentation in a Quaternion Framework for Remote Sens...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Voronin, V. Semenishchev, E. Zelensky, A. Tokareva, O. Agaian, S. Moscow State Univ Technol STANKIN Ctr Cognit Technol & Machine Vis Moscow Russia Don State Tech Univ Lab Math Methods Image Proc & Intelligent Comp Vi Rostov Na Donu Russia CUNY Dept Comp Sci New York NY 10021 USA
image segmentation is the critical step in imaging including applications such as video surveillance and security in controlled areas: detection and recognition of objects, their classification, analysis of crowd beha... 详细信息
来源: 评论
Mean field game theoretic approach for security in mobile ad-hoc networks
Mean field game theoretic approach for security in mobile ad...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Wang, Yanwei Tang, Helen Yu, F. Richard Huang, Minyi Carleton Univ Dept Syst & Comp Eng Ottawa ON K1S 5B6 Canada Defence R&D Canada Ottawa Ottawa ON Canada Carleton Univ Sch Math & Stat Ottawa ON K1S 5B6 Canada
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: a... 详细信息
来源: 评论
A scheme for protecting mobile agents based on combining obfuscated data and time checking technology
A scheme for protecting mobile agents based on combining obf...
收藏 引用
3rd International conference on Intelligent Information Hiding and multimedia Signal processing
作者: Wu, Jiehong Chang, Guiran Li, Jia Northeastern Univ Informat Sci & Engn Inst Shenyang Peoples R China
mobile agents are programs that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. In most applications, the security... 详细信息
来源: 评论
Taxonomy for Spatial Domain LSB Steganography Techniques
Taxonomy for Spatial Domain LSB Steganography Techniques
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Collins, James C. Agaian, Sos S. Univ Texas San Antonio Multimedia & Mobile Signal Proc Lab San Antonio TX 78249 USA
The Least Significant Bit (LSB) embedding technique is a well-known and broadly employed method in multimedia steganography, used mainly in applications involving single bit-plane manipulations in the spatial domain [... 详细信息
来源: 评论