Technology

View this topic in
Technology is the making, usage and knowledge of tools, techniques, crafts, systems or methods of organization in order to solve a problem or serve some purpose. The word technology comes Template:Ety; Template:Ety. (Wikipedia.org)






Conferences related to Technology

Back to Top

2013 15th International Conference on Advanced Communication Technology (ICACT)

Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.


2012 24th Chinese Control and Decision Conference (CCDC)

Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.


2012 3rd International Conference on E-Business and E-Government (ICEE)

ICEE 2012 aims to provide a high-level international forum for researchers and engineers to present and discuss recent advances and new techniques in E-Business,E-Commerce and E-Government.

  • 2011 International Conference on E-Business and E-Government (ICEE)

    E-Business and E-Commerce,E-Government, Engineering Management, Service Management & Knowledge Management

  • 2010 International Conference on E-Business and E-Government (ICEE)

    E-Business and E-Commerce,E-Government, E-education,Engineering Management, Service Management & Knowledge Management


2012 IEEE International Symposium on Radio-Frequency Integration Technology (RFIT)

RFIT is a small yet inter-disciplinary forum for microwave and microelectronics technologies. It is a platform to present the latest developments in integrated circuit design, technology and system integration. The theme for RFIT 2012 is Integration Technology for Reconfigurable and Programmable SOC/SIP: A Paradigm Shift.


2012 International Conference on Management and Service Science (MASS 2012)

Enterprise Management, Engineering Management, Service Science, Financial Management, Knowledge Management


More Conferences

Periodicals related to Technology

Back to Top

Proceedings of the IEEE

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics. This journal also holds the distinction of having the longest useful archival life of any EE or computer related journal in the world! Since 1913, the Proceedings of the IEEE has been the ...


Spectrum, IEEE

IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies. It anticipates trends in engineering, science, and technology, and provides a forum for understanding, discussion and leadership in these areas. IEEE Spectrum is the world's leading engineering and scientific magazine. Read by over 300,000 engineers worldwide, Spectrum provides international coverage of all ...



Most published Xplore authors for Technology

Back to Top

Xplore Articles related to Technology

Back to Top

Wireless Charging of a Metal-Body Device

Nathan Seongheon Jeong; Francesco Carobolante IEEE Transactions on Microwave Theory and Techniques, 2017

Conventional tightly coupled inductive charging has been popular in the mobile device market for years. However, tightly coupled solutions have been unable to efficiently charge a metal encased device due to substantial heat generation. In this paper, we demonstrate that loosely coupled inductive charging technology is a viable solution to charge a metal encased device. Ample power can be delivered ...


Switched Beam Antenna Array for UHF Band RFID System

Jan-Dong Tseng; Rong-Jie Ko; Wen-De Wang 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

A switched beam technique applied to UHF band RFID reader is proposed. The proposed switched beam circuit composed of power divider, phase shifter, and beam controlling logic circuit is implemented on a 1x2 array antenna, and resulted in a -30 to 30 degrees beam switching range in three discrete angles. This capability not only enhances the sensing range and distance ...


Variant Enhanced Dynamic Frame Slotted ALOHA Algorithm for Fast Object Identification in RFID System

Qingsong Peng; Ming Zhang; Weimin Wu 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

This paper analyses the practical faults existing in enhanced dynamic frame slotted ALOHA (EDFSA) algorithms, and discusses the strategy to improve the efficiency of anti-collision algorithm in RFID system. EDFSA algorithm divides the tags into a number of groups and allows only one group of tags to respond when the number of tags is much larger than optimal efficiency tags. ...


A parasitics extraction and network reduction algorithm for VLSI

T. -S. Pong; M. A. Brooke Proceedings of the 32nd Midwest Symposium on Circuits and Systems,, 1989

An algorithm for the extraction of circuit parasitics in integrated circuits using classic transmission line models are discussed. This gives a better account of the DC and AC characteristics of interconnects than models incorporating exclusively either the R or C components. A network reduction technique used to simplify the extracted RC network at user-specified accuracies to manageable complexities, especially for ...


Calculation of stray magnetic field effects on the operation of the ITER electron cyclotron system

F. Li; S. Alberti; J. -Ph. Hogge; I. Gr. Pagonakis 2011 IEEE/NPSS 24th Symposium on Fusion Engineering, 2011

In a multi-gyrotron system such as the one presently designed for the ITER ECH & ECCD system, stray magnetic fields can significantly alter the operational capabilities of the global system. A numerical study was carried out within the European Gyrotron Consortium (EGYC) to assess the importance of the different effects and their impact on the gyrotron operation. Using the Ariadne++ ...


More Xplore Articles

Educational Resources on Technology

Back to Top

eLearning

Wireless Charging of a Metal-Body Device

Nathan Seongheon Jeong; Francesco Carobolante IEEE Transactions on Microwave Theory and Techniques, 2017

Conventional tightly coupled inductive charging has been popular in the mobile device market for years. However, tightly coupled solutions have been unable to efficiently charge a metal encased device due to substantial heat generation. In this paper, we demonstrate that loosely coupled inductive charging technology is a viable solution to charge a metal encased device. Ample power can be delivered ...


Switched Beam Antenna Array for UHF Band RFID System

Jan-Dong Tseng; Rong-Jie Ko; Wen-De Wang 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

A switched beam technique applied to UHF band RFID reader is proposed. The proposed switched beam circuit composed of power divider, phase shifter, and beam controlling logic circuit is implemented on a 1x2 array antenna, and resulted in a -30 to 30 degrees beam switching range in three discrete angles. This capability not only enhances the sensing range and distance ...


Variant Enhanced Dynamic Frame Slotted ALOHA Algorithm for Fast Object Identification in RFID System

Qingsong Peng; Ming Zhang; Weimin Wu 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

This paper analyses the practical faults existing in enhanced dynamic frame slotted ALOHA (EDFSA) algorithms, and discusses the strategy to improve the efficiency of anti-collision algorithm in RFID system. EDFSA algorithm divides the tags into a number of groups and allows only one group of tags to respond when the number of tags is much larger than optimal efficiency tags. ...


A parasitics extraction and network reduction algorithm for VLSI

T. -S. Pong; M. A. Brooke Proceedings of the 32nd Midwest Symposium on Circuits and Systems,, 1989

An algorithm for the extraction of circuit parasitics in integrated circuits using classic transmission line models are discussed. This gives a better account of the DC and AC characteristics of interconnects than models incorporating exclusively either the R or C components. A network reduction technique used to simplify the extracted RC network at user-specified accuracies to manageable complexities, especially for ...


Calculation of stray magnetic field effects on the operation of the ITER electron cyclotron system

F. Li; S. Alberti; J. -Ph. Hogge; I. Gr. Pagonakis 2011 IEEE/NPSS 24th Symposium on Fusion Engineering, 2011

In a multi-gyrotron system such as the one presently designed for the ITER ECH & ECCD system, stray magnetic fields can significantly alter the operational capabilities of the global system. A numerical study was carried out within the European Gyrotron Consortium (EGYC) to assess the importance of the different effects and their impact on the gyrotron operation. Using the Ariadne++ ...


More eLearning Resources

IEEE-USA E-Books

  • The Music Faculty's Test of the System

    This chapter contains sections titled: 1 The System's Demo, 2 The Music Faculty's Responses, 3 Engaging the System as a Teaching Tool and as a Medium for Composition, 4 Making Music: Composition or Programming?, 5 Integrating the System into the Music Curriculum, 6 Music LOGO as a Reflective Tool

  • Exuberance

    This chapter contains sections titled: Making Money Pushing Technology Method of Rational Exuberance

  • The Aftermatb of the ARPANET

    Spanning the entire history of electrical communications, this book tells the story of the many events and breakthroughs that took place from the creation of the telegraph 150 years ago to the dynamic modern, world of the Internet and interactive TV. As a veritable case study in how advances in technology cause societal and industrial change, this story provides insight into the current turmoil in the information and entertainment industries. Its characters include the technologists, the entrepreneurs, the litigators, anti- trust lawyers, and regulators who influenced the course of progress. This book will be of interest to anyone who has a stake in the information age.

  • A Place to Learn, a Place to Play, a Place to Dream, a Place to Fall from Grace

    Shared public access to computers and the Internet in developing countries is often hailed as an effective, low-cost way to share the benefits of digital technology. Yet research on the economic and social effects of public access to computers is lacking. This volume offers the first systematic assessment of the impact of shared public access in the developing world, with findings from ten countries in South America, Asia, and Africa. It provides evidence that the benefits of diversified participation in digital society go beyond providing access to technology. Public access venues -- most often Internet caf??s in cities and state-run telecenters in rural areas -- are places for learning, sharing, working, empowerment and finding opportunities. The book documents the impact of public access on individuals, on society and networks, and on women. Chapters report findings and examine policy implications of research on such topics as users' perceptions of the benefits of Interne caf?? use in Jordan; ICT job training in Rwanda; understanding user motivations and risk factors for overuse and Internet addiction in China; the effect of technology use on social inclusion among low-income urban youth in Argentina; productive uses of technologies by grassroots organizations in Peru; use of technology by migrant ethnic minority Burmese women in Thailand to maintain ties with their culture and their family and friends; and women's limited access to the most ubiquitous type of venue, cybercaf??s, in practically all countries studied -- and quite severely in some places, e.g. Uttar Pradesh, India. **Contributing Editors **Erwin A. Alampay, Roxana Barrantes C??ceres, Hernan Galperin, Abiodun Jagun, George Sciadas, Ramata Molo Thioune, Kentaro Toyama **Chapter authors**Ali Farhan AbuSeileek, Carolina Aguerre, Oluwasefunmi 'Tale Arogundade, Nor Aziah Alias, Sebasti??n Ben??tez Larghi, Jorge Bossio, Juan Fernando Bossio, Marina Laura Calamari, Nikos Da anay, Jean Damasc??ne Mazimpaka, Laurent Aristide Eyinga Eyinga, Mary Luz Feranil, Ariel Fontecoba, Omar Fraihat, Martin S. Hagger, Jianbin Hao, Sulaiman Hashim, Izaham Shah Ismail, Haziah Jamaludin, Xuemei Jiang, Laura Le??n, Guoxin Li, Balwant Singh Mehta, Nidhi Mehta, Marina Moguillansky, Marhaini Mohd Noor, Avis Momeni, Th??odomir Mugiraneza, Jimena Orchuela, Patricia Pe??a Miranda, Alejandra Phillippi, Jimena Ponce de Le??n, Ghaleb Rabab'ah, Saif Addeen AlRababah, Wei Shang, Ryan V. Silverio, Sylvie Siyam Siwe, Efenita M. Taqueban, Olga Balbine Tsafack Nguekeng, Xiaoguang Yang

  • The World Outside and the Pictures in Our Networks

    In recent years, scholarship around media technologies has finally shed the assumption that these technologies are separate from and powerfully determining of social life, looking at them instead as produced by and embedded in distinct social, cultural, and political practices. Communication and media scholars have increasingly taken theoretical perspectives originating in science and technology studies (STS), while some STS scholars interested in information technologies have linked their research to media studies inquiries into the symbolic dimensions of these tools. In this volume, scholars from both fields come together to advance this view of media technologies as complex sociomaterial phenomena. The contributors first address the relationship between materiality and mediation, considering such topics as the lived realities of network infrastructure. The contributors then highlight media technologies as always in motion, held together through the minute, unobserved work of many, including efforts to keep these technologies alive.ContributorsPablo J. Boczkowski, Geoffrey C. Bowker, Finn Brunton, Gabriella Coleman, Gregory J. Downey, Kirsten A. Foot, Tarleton Gillespie, Steven J. Jackson, Christopher M. Kelty, Leah A. Lievrouw, Sonia Livingstone, Ignacio Siles, Jonathan Sterne, Lucy Suchman, Fred Turner

  • Revisitations: Shifting Stories

    This chapter contains sections titled: 1 The Backtalk and the Generation of Further Stories, 2 A Further Round of Backtalk: The Demo as Cooptation, 3 Accounting for the Shift: Toward a Second-Order Inquiry, 4 Nature and Consequences of the Reflective Move, 5 Evolving Understandings of the Design Process, 6 Concluding Remarks: Telling a Story of Shifting Stories

  • Civilizing the Network Society

    Information and computer technologies are used every day by real people with real needs. The authors contributing to Shaping the Network Society describe how technology can be used effectively by communities, activists, and citizens to meet society's challenges. In their vision, computer professionals are concerned less with bits, bytes, and algorithms and more with productive partnerships that engage both researchers and community activists. These collaborations are producing important sociotechnical work that will affect the future of the network society.Traditionally, academic research on real- world users of technology has been neglected or even discouraged. The authors contributing to this book are working to fill this gap; their theoretical and practical discussions illustrate a new orientation -- research that works with people in their natural social environments, uses common language rather than rarefied academic discourse, and takes a pragmatic perspective. The topics they consider are key to democratization and social change. They include human rights in the "global billboard society"; public computing in Toledo, Ohio; public digital culture in Amsterdam; "civil networking" in the former Yugoslavia; information technology and the international public sphere; "historical archaeologies" of community networks; "technobiographical" reflections on the future; libraries as information commons; and globalization and media democracy, as illustrated by Indymedia, a global collective of independent media organizations.

  • The Successful Technocrat

    "Technology is dominated by two types of people: those who understand what they do not manage, and those who manage what they do not understand." --Putt's Law Early Praise for Putt's Law and the Successful Technocrat: "This is management writing the way it ought to be. Think Dilbert, but with a very big brain. Read it and weep. Or laugh, depending on your current job situation." --Spectral Lines, IEEE Spectrum, April 2006 "It's a classic. It reads at first like humor, but one eventually realizes that it's all true. The first edition changed my life. I loaned my copy to a subordinate at IBM, and he didn't return it to me until he was my boss." --Dave Thompson, PhD, IBM Fellow (retired), Member National Academy of Engineering, and IEEE Fellow "Putt's humor ranges from sharp to whimsical and is always on target. Readers will be reminded of many personal experiences and of lessons in life they wish they ha learned earlier in their careers." --Eric Herz, former IEEE executive director and general manager "Anyone who thinks 'engineering management' is an oxymoron needs to read this terrific book -- then they will know." --Norman R. Augustine, author of Augustine's Laws and retired Chairman & CEO of Lockheed Martin Corporation Putt's Law is as true today as it was when techno-everyman Archibald Putt first stated it. Now, in Putt's Law and the Successful Technocrat: How to Win in the Information Age, Putt is back with the unvarnished truth about success in the modern, technology-driven organization. As you learn the real rules of the technology world, you'll meet such characters as the successful technocrat, Dr. I. M. Sharp. You'll find out how he wrangles career victories from corporate failures, nearly bankrupting the firm with his projects while somehow emerging the hero. You'll also meet such unfortu ates as Roger Proofsworthy, top-level perfectionist yet low in the hierarchy, and come to understand how he assiduously preserves his spot near the bottom of the totem pole. Whether you work in business, IT, or are a freelance technocrat, you'll want to study Putt's hard-won wisdom and laugh--all the way to the bank!

  • Speeding Up the Written Word

    Spanning the entire history of electrical communications, this book tells the story of the many events and breakthroughs that took place from the creation of the telegraph 150 years ago to the dynamic modern, world of the Internet and interactive TV. As a veritable case study in how advances in technology cause societal and industrial change, this story provides insight into the current turmoil in the information and entertainment industries. Its characters include the technologists, the entrepreneurs, the litigators, anti- trust lawyers, and regulators who influenced the course of progress. This book will be of interest to anyone who has a stake in the information age.

  • Public Access Impact and Policy Implications

    This chapter summarizes the findings of previous chapters and, for completeness, also draws on significant findings from prior studies in search of patterns of use and impact that apply across countries and inform public access policy. Three themes emerge. First, public access enables most users to achieve personal objectives such as learning, communicating with family and friends, enhancing work skills and job prospects (Rwanda), and entertaining themselves (China). Not all impacts are positive: overuse can adversely affect school performance (Cameroon) and personal life spheres (China). Second, public access enables users to expand their social networks and build up social capital (Malaysia, Jordan), facilitates social inclusion (Argentina), and makes it easier for rural grassroots organizations to develop specific capacities, such as interacting with external agents (Peru). Third, although women and underprivileged groups can benefit significantly, their access to the most ubiquitous type of venue, cybercafes, is frequently limited, in some countries severely. This major obstacle must be overcome if public access benefits are to be widespread and equitable. The chapter ends with a discussion of policy design considerations regarding mobiles and public access, information and communication technology (ICT) skills training, telecenter establishment, cybercafe regulation, and options for redressing cybercafe gender imbalance.



Standards related to Technology

Back to Top

No standards are currently tagged "Technology"


Jobs related to Technology

Back to Top