咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是81-90 订阅
排序:
A New Approach for Willingness Test in Biometric Systems
A New Approach for Willingness Test in Biometric Systems
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Yang, Kai Du, Eliza Yingzi Zhou, Zhi Indiana Univ Purdue Univ Dept Elect & Comp Engn Indianapolis IN 46202 USA
Biometrics identifies/verifies a person using his/her physiological or behavioral characteristics. It is becoming an important ally for law enforcement and homeland security. However, there are some safety and privacy... 详细信息
来源: 评论
Ensuring security of H.264 videos by using watermarking
Ensuring security of H.264 videos by using watermarking
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Chaumont, Marc Univ Nimes F-30000 Nimes France
Watermarking is known to be a very difficult task. Robustness, Distortion, Payload, security, Complexity are many constraints to deal with. When applied to a video stream, the difficulty seems to be growing in compari... 详细信息
来源: 评论
Remote Object Authentication against counterfeiting using elliptic curves
Remote Object Authentication against counterfeiting using el...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Lancrenon, Jean Gillard, Roland Fournel, Thierry Univ St Etienne Lab H Curien 18 Rue Prof B Lauras F-42000 St Etienne France Univ Grenoble 1 Inst Fourier F-38402 St Martin Dheres France
This paper aims to provide a remote fingerprint object authentication protocol dedicated to anti-counterfeiting applications. The corresponding security model is given. The suggested scheme is based on an Elliptic Cur... 详细信息
来源: 评论
Multiple User Access and Testing for PreNotiS - a Fast mobile Event Reporting Solution
Multiple User Access and Testing for PreNotiS - a Fast Mobil...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Chan, Michael Kumar, Abhinav Akopian, David Agaian, Sos S. Univ Texas San Antonio San Antonio TX 78249 USA
The PreNotiS (preventive notification system) was proposed to address the current lack in consumer prevention and disaster informatics systems. The underscore of this letter is to propose PreNotiS as a provision of tr... 详细信息
来源: 评论
Generalized Phi Number System and its applications for image Decomposition and Enhancement
Generalized Phi Number System and its Applications for Image...
收藏 引用
conference on multimedia on mobile Devices and multimedia Content Access - Algorithms and Systems V
作者: Agaian, Sarkis Zhou, Yicong Stanford Univ Dept Elect Engn Stanford CA 94305 USA Interdisciplinary Solut LLC San Antonio 78215 TX USA
Technologies and applications of the field-programmable gate array (FPGAs) and digital signal processing (DSP) require both new customizable number systems and new data formats. This paper introduces a new class of pa... 详细信息
来源: 评论
A Fast, Efficiency-Preserving System for Simultaneous Compression & Encryption
A Fast, Efficiency-Preserving System for Simultaneous Compre...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Metzler, Richard E. L. Agaian, Sos S. Univ Texas San Antonio Dept Elect & Comp Engn San Antonio TX 78249 USA
Methods for embedment of stream cipher rules into compressive Elias-type entropy coders are presented. Such systems have the ability to simultaneously compress and encrypt input data;thereby providing a fast and secur... 详细信息
来源: 评论
Secure Wavelet-Based Isometric Projection for Face Recognition
Secure Wavelet-Based Isometric Projection for Face Recogniti...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Al-Assam, Hisham Sellahewa, Harin Jassim, Sabah Univ Buckingham Buckingham MK18 1EG England
Biometric systems such as face recognition must address four key challenges: efficiency, robustness, accuracy and security. Isometric projection has been proposed as a robust dimension reduction technique for a number... 详细信息
来源: 评论
Rapid Prototyping of an Automated Video Surveillance System: A Hardware-Software Co-Design Approach
Rapid Prototyping of an Automated Video Surveillance System:...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Ngo, Hau T. Rakvic, Ryan N. Broussard, Randy P. Ives, Robert W. US Naval Acad Dept Elect & Comp Engn Annapolis MD 21402 USA US Naval Acad Weapons & Syst Engn Dept Annapolis MD 21402 USA
FPGA devices with embedded DSP and memory blocks, and high-speed interfaces are ideal for real-time video processing applications. In this work, a hardware-software co-design approach is proposed to effectively utiliz... 详细信息
来源: 评论
Parallel design patterns for a low-power, software-defined compressed video encoder
Parallel design patterns for a low-power, software-defined c...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Bruns, Michael W. Hunt, Martin A. Prasad, Durga Gunupudi, Nageswara Rao Sonachalem, Sekar Coherent Logix Inc 1120 S Capitol TX Hwy Austin TX 78746 USA Parallel Prisms Duluth GA 30097 USA
Video compression algorithms such as H.264 offer much potential for parallel processing that is not always exploited by the technology of a particular implementation. Consumer mobile encoding devices often achieve rea... 详细信息
来源: 评论
Digital Information processing and Communications  2011
收藏 引用
丛书名: Communications in Computer and Information Science
2011年
作者: Vaclav Snasael Jan Platos Eyas El-Qawasmeh
This two-volume-set (CCIS 188 and CCIS 189) constitutes the refereed proceedings of the International conference on Digital Information processing and Communications, ICDIPC 2011, held in Ostrava, Czech Republic, in J...
来源: 评论