Conferences related to Pipeline

Back to Top

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


2018 14th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA)

The goal of the 14th ASME/IEEE MESA2018 is to bring together experts from the fields of mechatronic and embedded systems, disseminate the recent advances in the area, discuss future research directions, and exchange application experience. The main achievement of MESA2018 is to bring out and highlight the latest research results and developments in the IoT (Internet of Things) era in the field of mechatronics and embedded systems.


2018 24th International Conference on Pattern Recognition (ICPR)

ICPR will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields

  • 2016 23rd International Conference on Pattern Recognition (ICPR)

    ICPR'2016 will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields.

  • 2014 22nd International Conference on Pattern Recognition (ICPR)

    ICPR 2014 will be an international forum for discussions on recent advances in the fields of Pattern Recognition; Machine Learning and Computer Vision; and on applications of these technologies in various fields.

  • 2012 21st International Conference on Pattern Recognition (ICPR)

    ICPR is the largest international conference which covers pattern recognition, computer vision, signal processing, and machine learning and their applications. This has been organized every two years by main sponsorship of IAPR, and has recently been with the technical sponsorship of IEEE-CS. The related research fields are also covered by many societies of IEEE including IEEE-CS, therefore the technical sponsorship of IEEE-CS will provide huge benefit to a lot of members of IEEE. Archiving into IEEE Xplore will also provide significant benefit to the all members of IEEE.

  • 2010 20th International Conference on Pattern Recognition (ICPR)

    ICPR 2010 will be an international forum for discussions on recent advances in the fields of Computer Vision; Pattern Recognition and Machine Learning; Signal, Speech, Image and Video Processing; Biometrics and Human Computer Interaction; Multimedia and Document Analysis, Processing and Retrieval; Medical Imaging and Visualization.

  • 2008 19th International Conferences on Pattern Recognition (ICPR)

    The ICPR 2008 will be an international forum for discussions on recent advances in the fields of Computer vision, Pattern recognition (theory, methods and algorithms), Image, speech and signal analysis, Multimedia and video analysis, Biometrics, Document analysis, and Bioinformatics and biomedical applications.

  • 2002 16th International Conference on Pattern Recognition


2018 28th International Conference Radioelektronika (RADIOELEKTRONIKA)

The purpose of the conference is to create a discussion forum for researchers, academics, people in industry, and students who are interested in the latest development in the area of electronics, signal processing and applications, information technologies, and related disciplines.


2018 31st IEEE International System-on-Chip Conference (SOCC)

System on Chip


More Conferences

Periodicals related to Pipeline

Back to Top

Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Circuits and Systems Magazine, IEEE


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


More Periodicals

Most published Xplore authors for Pipeline

Back to Top

Xplore Articles related to Pipeline

Back to Top

Pipeline inclination measurements based on a spherical detector with magnetic proximity switches

[{u'author_order': 1, u'affiliation': u'State Key Laboratory of Precision Measuring Technology and Instruments, Tianjin University, Tianjin, China.', u'full_name': u'Zhang Yu'}, {u'author_order': 2, u'affiliation': u'State Key Laboratory of Precision Measuring Technology and Instruments, Tianjin University, Tianjin, China.', u'full_name': u'Xue Yameng'}, {u'author_order': 3, u'affiliation': u'State Key Laboratory of Precision Measuring Technology and Instruments, Tianjin University, Tianjin, China.', u'full_name': u'Huang Xinjing'}, {u'author_order': 4, u'affiliation': u'State Key Laboratory of Precision Measuring Technology and Instruments, Tianjin University, Tianjin, China.', u'full_name': u'Li Jian'}, {u'author_order': 5, u'affiliation': u'State Key Laboratory of Precision Measuring Technology and Instruments, Tianjin University, Tianjin, China.', u'full_name': u'Chen Shili'}] IEEE Access, None

Spherical detector (SD) is a novel and promising magnetic shielding-based approach for long subsea pipeline orientation and localization with low risk of blockage. As not all the shielding factors can be accurately obtained, large errors of inclination measurements can be caused. This paper proposes a new inclination measurement method without utilizing the magnetic shielding model of the pipeline. A tiny ...


State and Parameter Estimation for Natural Gas Pipeline Networks Using Transient State Data

[{u'author_order': 1, u'affiliation': u'Center for Nonlinear Studies, Los Alamos National Laboratory, Los Alamos, NM 87545 USA (e-mail: kaarthik01sundar@gmail.com).', u'full_name': u'Kaarthik Sundar'}, {u'author_order': 2, u'affiliation': u'Applied Mathematics and Plasma Physics Division, Los Alamos National Laboratory, Los Alamos, NM 87545 USA.', u'full_name': u'Anatoly Zlotnik'}] IEEE Transactions on Control Systems Technology, None

We formulate two estimation problems for pipeline systems in which measurements of the compressible gas flowing through a network of pipes are affected by time-varying injections, withdrawals, and compression. We consider a state estimation problem that is then extended to a joint state and parameter estimation problem that can be used for data assimilation. In both formulations, the flow dynamics ...


Subsea Pipeline Corrosion Estimation by Restoring and Enhancing Degraded Underwater Images

[{u'author_order': 1, u'affiliation': u'Center for Intelligent Signal & Imaging Research, Electrical & Electronic Engineering Department, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia.', u'full_name': u'Amjad Khan'}, {u'author_order': 2, u'affiliation': u'Center for Intelligent Signal & Imaging Research, Electrical & Electronic Engineering Department, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia.', u'full_name': u'Syed Saad Azhar Ali'}, {u'author_order': 3, u'affiliation': u'Center for Intelligent Signal & Imaging Research, Electrical & Electronic Engineering Department, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia.', u'full_name': u'Atif Anwer'}, {u'author_order': 4, u'affiliation': u'Software Engineering Department, Iqra University, 75260 Karachi, Pakistan.', u'full_name': u'Syed Hasan Adil'}, {u'author_order': 5, u'affiliation': u'Center for Intelligent Signal & Imaging Research, Electrical & Electronic Engineering Department, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia.', u'full_name': u'Fabrice M\xe9riaudeau'}] IEEE Access, None

Subsea pipeline corrosion is considered as a severe problem in offshore oil and gas industry. It directly affects the integrity of the pipeline which further leads to cracks and leakages. At present, subsea visual inspection and monitoring is performed by trained human divers; however, offshore infrastructures are moving from shallow to deep waters due to exhaustion of fossil fuels. Therefore, ...


DIPS: Dual-interface Dual-pipeline Scheduling for Energy-efficient Multi-hop Communications in IoT

[{u'author_order': 1, u'affiliation': u'College of Information and Electronic Engineering, Hunan City University, Yiyang, Hunan, China.', u'full_name': u'Hua Qin'}, {u'author_order': 2, u'affiliation': u'College of Information and Electronic Engineering, Hunan City University, Yiyang, Hunan, China.', u'full_name': u'Weihong Chen'}, {u'author_order': 3, u'affiliation': u'College of Information and Electronic Engineering, Hunan City University, Yiyang, Hunan, China.', u'full_name': u'Buwen Cao'}, {u'author_order': 4, u'affiliation': u'College of Information and Electronic Engineering, Hunan City University, Yiyang, Hunan, China.', u'full_name': u'Min Zeng'}, {u'author_order': 5, u'affiliation': u'Division of Computing and Software Systems, University of Washington Bothell, Bothell, WA, USA.', u'full_name': u'Jessica Li'}, {u'author_order': 6, u'affiliation': u'Division of Computing and Software Systems, University of Washington Bothell, Bothell, WA, USA.', u'full_name': u'Yang Peng'}] IEEE Internet of Things Journal, None

The future Internet of Things (IoT) will enable Internet connectivity for a vast amount of battery-powered devices, which usually need to communicate with each other or to some remote gateways through multi-hop communications. Although ZigBee has become a widely-used communication technology in IoT, Wi- Fi, on the other hand, has its unique advantages such as high throughput and native IP ...


Towards a distributed monitoring system for gas pipeline cathodic protection

[{u'author_order': 1, u'affiliation': u'Department of Industrial Engineering (DIIn), University of Salerno, via Giovanni Paolo II, 132, Fisciano (SA), Italy', u'full_name': u'Francesco Abate'}, {u'author_order': 2, u'affiliation': u'Department of Industrial Engineering (DIIn), University of Salerno, via Giovanni Paolo II, 132, Fisciano (SA), Italy', u'full_name': u'Domenico Di Caro'}, {u'author_order': 3, u'affiliation': u'Department of Industrial Engineering (DIIn), University of Salerno, via Giovanni Paolo II, 132, Fisciano (SA), Italy', u'full_name': u'Giuseppe Di Leo'}, {u'author_order': 4, u'affiliation': u'Department of Industrial Engineering (DIIn), University of Salerno, via Giovanni Paolo II, 132, Fisciano (SA), Italy', u'full_name': u'Antonio Pietrosanto'}] 2018 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), None

Cathodic protection (CP) is the most suitable technique to limit metal corrosion in pipeline networks. To preserve the effectiveness of the CP system it is essential the monitoring of the potential distribution along the net. In distribution networks, the pipeline potential is affected by environmental time variant phenomena, which make it difficult to estimate the potential away from the measurement ...


More Xplore Articles

Educational Resources on Pipeline

Back to Top

eLearning

No eLearning Articles are currently tagged "Pipeline"

IEEE-USA E-Books

  • Industrial Case: Acquiring Software for Pipeline Operations

    The goal of this chapter is to discuss developing software requirements for a safety critical system using multidisciplinary team approaches. Such specifications are systems oriented in that they address functional, performance, and hardware/software interface requirements. The chapter also identifies some of the best practices for use in specifying requirements. There is a wealth of resources available on the topic of requirements because of its importance and due to the challenges associated with specifying them and getting them right. The chapter touches on just a few of the important issues and identifies a few of the readily available resources.

  • The Poverty of the Pipeline Metaphor: The AAAS/CPST Study of Nontraditional Pathways into IT/CS Education and the Workforce

    This chapter contains sections titled: The Nontraditional Student in IT/CS, The AAAS/CPST Study of Nontraditional Pathways into the IT/CS Workforce, Student Demographics, Educational Backgrounds, Reasons for Choosing IT/CS, Reasons for Choosing Institutions, Educational Experiences, Satisfaction, Financing, Postgraduation Educational Plans and Experiences, Teaching the Nontraditional Student, Perceptions of the Field, Perceptions about Students, Weed-Out Courses, Recruitment Efforts, Awareness of Nontraditional Students, Characteristics and Needs of Nontraditional Students, Conclusions, Notes

  • Power Transmission Pipeline

  • Appendix A: Pipeline Stages for AES Encryption

    No abstract.

  • Data Processing on FPGAs

    Roughly a decade ago, power consumption and heat dissipation concerns forced the semiconductor industry to radically change its course, shifting from sequential to parallel computing. Unfortunately, improving performance of applications has now become much more difficult than in the good old days of frequency scaling. This is also affecting databases and data processing applications in general, and has led to the popularity of so-called data appliances--specialized data processing engines, where software and hardware are sold together in a closed box. Field-programmable gate arrays (FPGAs) increasingly play an important role in such systems. FPGAs are attractive because the performance gains of specialized hardware can be significant, while power consumption is much less than that of commodity processors. On the other hand, FPGAs are way more flexible than hard-wired circuits (ASICs) and can be integrated into complex systems in many different ways, e.g., directly in the network for a high-frequency trading application. This book gives an introduction to FPGA technology targeted at a database audience. In the first few chapters, we explain in detail the inner workings of FPGAs. Then we discuss techniques and design patterns that help mapping algorithms to FPGA hardware so that the inherent parallelism of these devices can be leveraged in an optimal way. Finally, the book will illustrate a number of concrete examples that exploit different advantages of FPGAs for data processing. Table of Contents: Preface / Introduction / A Primer in Hardware Design / FPGAs / FPGA Programming Models / Data Stream Processing / Accelerated DB Operators / Secure Data Processing / Conclusions / Bibliography / Authors' Biographies / Index

  • Architectures With Bus‐Based Switch Fabrics: Case Study—Cisco Catalyst 6000 Series Switches

    The Cisco Catalyst 6000 family of switch/routers consists of the Catalyst 6000 and 6500 Series that are designed to deliver high‐speed Layer 2 and 3 forwarding solutions for service provider and enterprise networks. This chapter describes the different Catalyst 6000 series switch/router architectures. It highlights the main architectural features of the Catalyst 6000 series of switch/routers. The Catalyst 6000 Series supports two versions of the Supervisor Engine ‐ Supervisor Engine 1A and Supervisor Engine 2. The Catalyst 6000 and 6500 employ two types of port ASICs for network connectivity: PINNACLE ASIC and COIL ASIC. These port ASICs provide connectivity from a network to the 32 Gb/s main shared switching bus or the 16 Gb/s local bus supported on the fabric‐enabled and fabriconly line cards. The chapter describes the flow of packets through the Catalyst 6000 and a centralized flow cache maintained by the Supervisor Engine 1A.

  • Design, Representations, and Processing for Additive Manufacturing

    The wide diffusion of 3D printing technologies continuously calls for effective solutions for designing and fabricating objects of increasing complexity. The so called "computational fabrication" pipeline comprises all the steps necessary to turn a design idea into a physical object, and this book describes the most recent advancements in the two fundamental phases along this pipeline: design and process planning. We examine recent systems in the computer graphics community that allow us to take a design idea from conception to a digital model, and classify algorithms that are necessary to turn such a digital model into an appropriate sequence of machining instructions.

  • Information Extraction

    Information Extraction deals with the automatic extraction of information from unstructured sources. This field has opened up new avenues for querying, organizing, and analyzing data by drawing upon the clean semantics of structured databases and the abundance of unstructured data. The text surveys over two decades of information extraction research from various communities such as computational linguistics, machine learning, databases and information retrieval. Information Extraction provides a taxonomy of the field along various dimensions derived from the nature of the extraction task, the techniques used for extraction, the variety of input resources exploited, and the type of output produced. It elaborates on rule-based and statistical methods for entity and relationship extraction. In each case it highlights the different kinds of models for capturing the diversity of clues driving the recognition process and the algorithms for training and efficiently deploying the models. It s rveys techniques for optimizing the various steps in an information extraction pipeline, adapting to dynamic data, integrating with existing entities and handling uncertainty in the extraction process. Information Extraction is an ideal reference for anyone with an interest in the fundamental concepts of this technology. It is also an invaluable resource for those researching, designing or deploying models for extraction.

  • CORDIC Circuits

    This chapter discusses the principles of COordinate Rotation DIgital Computer (CORDIC) operation, covering the elementary ideas from coordinate transformation to rotation mode and vectoring mode operations followed by design of the basic CORDIC cell and multidimensional CORDIC. The key concept of CORDIC arithmetic is based on the simple and ancient principles of two‐dimensional geometry. Not only a wide variety of applications of CORDIC have emerged over the years but also a lot of progress has been made in the area of algorithm design and development of architectures for high‐performance and low‐cost hardware solutions of those applications. The chapter also discusses the key developments in CORDIC algorithms and architectures, which covers the algorithms and architectures pertaining to high‐radix CORDIC, angle recording, coarse‐fine hybrid microrotations, redundant number representation, differential CORDIC, and pipeline implementation. It further discusses the scaling and accuracy aspects including the scaling techniques, scaling‐free CORDIC, quantization, and area‐delay‐accuracy trade‐off.

  • MATHEMATICAL BACKGROUND AND ANALYSIS TECHNIQUES

    This chapter provides the foundation for modeling and finding practical design solutions to communication system performance specifications. It describes the commonly used waveform modulations characterized as amplitude modulation (AM), phase modulation (PM), and frequency modulation (FM) waveforms. The chapter discusses the discrete Fourier transform (DFT), the fast Fourier transform (FFT), the pipeline implementation of the FFT, and applications involving waveform detection, interpolation, and power spectrum estimation. It introduces the concept of random variables and various probability density functions (pdf) and cumulative distribution functions (cdf) for continuous and discrete random variables. It focuses on characterization of several window functions that are used to improve the performance the FFT, decimation filtering, and signal parameter estimation. The chapter focuses on the subject of autocorrelation and crosscorrelation of real and complex deterministic functions and concludes with a list of frequently used mathematical formulas.



Standards related to Pipeline

Back to Top

No standards are currently tagged "Pipeline"