Conferences related to Automatic Identification

Back to Top

2012 5th International Congress on Image and Signal Processing (CISP)

CISP is a premier international forum for scientists and researchers to present the state of the art of image and signal processing. Specific topics include Image restoration, Pattern recognition, Remote sensing, filters, Signal modeling, etc.

  • 2011 4th International Congress on Image and Signal Processing (CISP)

    CISP 11 is a premier international forum for scientists and researchers to present the state of the art of image and signal processing. Specific topics include Image restoration, Feature extraction, Image and video databases, Pattern recognition, Remote sensing, Filter design & digital filters, Signal modeling, identification & prediction, etc.

  • 2010 3rd International Congress on Image and Signal Processing (CISP)

    CISP 10 is a premier international forum for scientists and researchers to present the state of the art of multimedia and signal processing. It is co-located with the 3rd International Conference on BioMedical Engineering and Informatics (BMEI 2010) to promote interactions biomedical research and signal processing.

  • 2009 2nd International Congress on Image and Signal Processing (CISP)

    biomedical engineering, biomedical informatics, multimedia, and signal processing


2012 IEEE Spoken Language Technology Workshop (SLT 2012)

The goal of the SLT workshop is to bring the speech and language communities together to discuss and present advances and challenges in the area of spoken language processing.


MILCOM 2012 - 2012 IEEE Military Communications Conference

MILCOM 2012 gives industry the opportunity to promote communications technologies and services to commanders from all branches of the armed forces, Department of Defense, federal government, and the heads of multi-national forces from around the globe.


2011 IEEE International Symposium on Technology and Society (ISTAS)

ISTAS is an annual international forum sponsored by the IEEE Society on Social Implications of Technology. ISTAS 2011 is co-sponsored by the ACM Special Interest Group on Computers and Society. ISTAS welcomes engineers; scientists; philosophers; researchers in social sciences, arts, law, and humanities; and policy experts in technology and society.

  • 2010 IEEE International Symposium on Technology and Society (ISTAS)

    Social Implications of Emerging Technologies

  • 2009 IEEE International Symposium on Technology and Society (ISTAS)

    The IEEE International Symposium on Technology and Society (ISTAS) is an annual international forum exploring the social implications of technology. ISTAS 09 will be held concurrently with the IEEE International Symposium on Sustainable Systems and Technology (ISSST), with joint sessions related to an overall conference theme of sustainability.


2007 IEEE Workshop on Automatic Identification Advanced Technologies (Auto ID)

This workshop brings together researchers, developers, and users of automatic identification technologies including: Biometrics Bar Code Systems and other Symbologies Radio Frequency Identification (RFID) and other visual identification technologies. These AutoID fields are at an exciting time in their evolution. Novel research developements are being made at a high rate and these are being implemented into commerical systems.



Periodicals related to Automatic Identification

Back to Top

Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Geoscience and Remote Sensing, IEEE Transactions on

Theory, concepts, and techniques of science and engineering as applied to sensing the earth, oceans, atmosphere, and space; and the processing, interpretation, and dissemination of this information.


Industrial Informatics, IEEE Transactions on

IEEE Transactions on Industrial Informatics focuses on knowledge-based factory automation as a means to enhance industrial fabrication and manufacturing processes. This embraces a collection of techniques that use information analysis, manipulation, and distribution to achieve higher efficiency, effectiveness, reliability, and/or security within the industrial environment. The scope of the Transaction includes reporting, defining, providing a forum for discourse, and informing ...


Sensors Journal, IEEE

The Field of Interest of the IEEE Sensors Journal is the science and applications of sensing phenomena, including theory, design, and application of devices for sensing and transducing physical, chemical, and biological phenomena. The emphasis is on the electronics, physics, biology, and intelligence aspects of sensors and integrated sensor-actuators. (IEEE Guide for Authors) (The fields of interest of the IEEE ...


Systems Journal, IEEE

This publication provides a systems-level, focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance.



Most published Xplore authors for Automatic Identification

Back to Top

Xplore Articles related to Automatic Identification

Back to Top

Transmission evaluation of Ship-borne Automatic Identification System (AIS) in congested waterways

Kazuhiko Hasegawa; Kojiro Hata; Kazuhisa Niwa; Junji Fukuto 2008 8th International Conference on ITS Telecommunications, 2008

AIS (ship-borne automatic identification system) is a system that enables a ship to get information about encountered ships, such as their position, course, speed, name etc. automatically by VHF radio transmission. The system is expected to contribute the improvement of marine traffic control and safety. In some congested waterways overloaded/conflicted transmission of AIS is a potential problem in the planning ...


Use of Sentinel-1 data for Maritime Domain Awareness: Preliminary results

E. Charou; E. Bratsolis; S. Gyftakis; T. Giannakopoulos; S. Perantonis 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA), 2015

In this work the utility of Synthetic Aperture Radar (SAR) data acquired from the SAR instrument on-board the recently launched ESA's Sentinel-1 to Maritime Domain Awareness (MDA) is studied. The limitations of the currently used Automatic Identification System (AIS) for ships is presented. The use of space based SAR sensors for MDA is discussed and the recently available ESA's Sentinel1 ...


Using E-Plate to Implement a Custom Dietary Management System

Pai Hsun Chen; Ying Hsin Liang; Tsung Chi Lin 2014 International Symposium on Computer, Consumer and Control, 2014

This study, through the establishment of a database of nutritional ingredients, and with electronic scales feature, provides chefs with conducting cooking, as long as the food category is selected and weighed by order, the nutritional content of the dish will be known. By RFID electronic scales and electronic plate function, the meal intake of nutrients and measurement of food nutrients ...


An Unsupervised Approach for Identifying Spammers in Social Networks

Mohamed Bouguessa 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

This paper proposes an unsupervised method for automatic identification of spammers in a social network. In our approach, we first investigate the link structure of the network in order to derive a legitimacy score for each node. Then we model these scores as a mixture of beta distributions. The number of components in the mixture is determined by the integrated ...


Auto-ID for automotive industry

Pavel Staša; Filip Beneš; Jiří Švub; Vladimír Kebo; Jakub Unucka Proceedings of the 2015 16th International Carpathian Control Conference (ICCC), 2015

Automatic identification technology is beginning to be applied more and more in various sectors and branches of industry; it is clearly illustrated e.g. in [1], [2], [3], [4], [5], [6], [7], [8], [9], [25]. The identification of products, goods, pallets, transported material forms an inherent foundation for technological process automation. The automatic identification tools not only allow for unique identification, ...


More Xplore Articles

Educational Resources on Automatic Identification

Back to Top

eLearning

Transmission evaluation of Ship-borne Automatic Identification System (AIS) in congested waterways

Kazuhiko Hasegawa; Kojiro Hata; Kazuhisa Niwa; Junji Fukuto 2008 8th International Conference on ITS Telecommunications, 2008

AIS (ship-borne automatic identification system) is a system that enables a ship to get information about encountered ships, such as their position, course, speed, name etc. automatically by VHF radio transmission. The system is expected to contribute the improvement of marine traffic control and safety. In some congested waterways overloaded/conflicted transmission of AIS is a potential problem in the planning ...


Use of Sentinel-1 data for Maritime Domain Awareness: Preliminary results

E. Charou; E. Bratsolis; S. Gyftakis; T. Giannakopoulos; S. Perantonis 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA), 2015

In this work the utility of Synthetic Aperture Radar (SAR) data acquired from the SAR instrument on-board the recently launched ESA's Sentinel-1 to Maritime Domain Awareness (MDA) is studied. The limitations of the currently used Automatic Identification System (AIS) for ships is presented. The use of space based SAR sensors for MDA is discussed and the recently available ESA's Sentinel1 ...


Using E-Plate to Implement a Custom Dietary Management System

Pai Hsun Chen; Ying Hsin Liang; Tsung Chi Lin 2014 International Symposium on Computer, Consumer and Control, 2014

This study, through the establishment of a database of nutritional ingredients, and with electronic scales feature, provides chefs with conducting cooking, as long as the food category is selected and weighed by order, the nutritional content of the dish will be known. By RFID electronic scales and electronic plate function, the meal intake of nutrients and measurement of food nutrients ...


An Unsupervised Approach for Identifying Spammers in Social Networks

Mohamed Bouguessa 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

This paper proposes an unsupervised method for automatic identification of spammers in a social network. In our approach, we first investigate the link structure of the network in order to derive a legitimacy score for each node. Then we model these scores as a mixture of beta distributions. The number of components in the mixture is determined by the integrated ...


Auto-ID for automotive industry

Pavel Staša; Filip Beneš; Jiří Švub; Vladimír Kebo; Jakub Unucka Proceedings of the 2015 16th International Carpathian Control Conference (ICCC), 2015

Automatic identification technology is beginning to be applied more and more in various sectors and branches of industry; it is clearly illustrated e.g. in [1], [2], [3], [4], [5], [6], [7], [8], [9], [25]. The identification of products, goods, pallets, transported material forms an inherent foundation for technological process automation. The automatic identification tools not only allow for unique identification, ...


More eLearning Resources

IEEE-USA E-Books

  • Analyzing Gene Expression Imaging Data in Developmental Biology

    This chapter describes the application of data-intensive methods to the automatic identification and annotation of gene expression patterns in the mouse embryo. The first section of the chapter introduces ideas behind modern computational and systems biology, how the explosion of data in the postgenomic world has led to new possibilities and even greater challenges. The second section talks about the particular computational biology problem and describes annotating images of gene expression with the right anatomical terms in depth. An automated solution based on data-intensive methods is discussed the third section. The final section looks ahead to the biological significance and systems biology application of these approaches and also describes a large-scale challenge and possible series of experiments with a novel data-intensive computational architecture.

  • No title

    This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive tags); the focus here is on passive tags. An overview of the principles of the technology divides passive tags into devices that use either near field or far field coupling to communicate with a tag reader. The strengths and weaknesses of the approaches are considered, along with the standards that have been put in place by ISO and EPCGlobal to promote interoperability and the ubiquitous adoption of the technology. A section of the lecture has been dedicated to the principles of reading co-located tags, as this represents a significant challenge for a technology that may one day be able to automatically identify all of the items in your shopping art in a just few seconds. In fact, RFID applications are already quite extensive and this lecture classifies the primary uses. Some variants of modern RFID can also be integrated with sensors enabling the technology to be extended to measure parameters in the local environment, such as temperature & pressure. The uses and applications of RFID sensors are further described and classified. Later we examine important lessons surrounding the deployment of RFID for the Wal-Mart and the Metro AG store experiences, along with deployments in some more exploratory settings. Extensions of RFID that make use of read/write memory integrated with the tag are also discussed, in particular looking at novel near term opportunities. Privacy and social implications surrounding the use of RFID inspire recurring debates whenever there is discussion of large scale deployment; we examine the pros and cons of the issues and approaches for mitigating the problems. Finally, the remaining challenges of R ID are considered and we look to the future possibilities for the technology. Table of Contents: Introduction / Principles of Radio Frequency Identification / RFID Industry Standards / Reading Collected RFID Tags / Applications of RFID Tagging / RFID Incorporating Sensing / Deployment and Experience with RFID Systems / Privacy, Kill Switches, and Blocker Tags / Opportunities for RFID Integrated with Memory / Challenges, Future Technology, and Conclusion

  • WinRFID: A Middleware for the Enablement of Radiofrequency Identification (RFID)Based Applications

    Radio Frequency Identification (RFID) middleware is a new class of software which facilitates data and information communication between automatic identification physical layer and enterprise applications. It provides a distributed environment to process the data from tags read by the readers, translates the data where necessary, and routes it to a variety of backend applications using suitable technologies such as Web, Remote and Windows Services. This paper reports different challenges and the corresponding research approach in developing a RFID middleware to provide a seamless environment from the edge of the enterprise network; moving data from the point of transaction to the enterprise systems. Key features of the RFID middleware architecture are encapsulation of communication details, large- scale network management, intelligent data processing and routing, hardware and software interoperability, system integration and system extendibility. To deal with high volume data, WinRFID middleware is supported by novel algorithms and data representation schemes capable of processing large amounts of data, rectifying errors in real-time, identifying patterns, correlating events, reorganizing and scrubbing data and recovering from faults and exceptions. Interoperability involves simultaneous distributed working of receivers/readers and transponders/tags at different frequencies using different protocols, with read/write capabilities, different read rates, and other characteristics as a layer transparent to the applications. Network management involves deployment, initialization and control of receivers and transponders, which can be organized into a hierarchical structure with operational syntax and semantics attached to each or a group of receivers, transponders and concentrators or even the edge computers.



Standards related to Automatic Identification

Back to Top

No standards are currently tagged "Automatic Identification"


Jobs related to Automatic Identification

Back to Top