Conferences related to Automatic Identification

Back to Top

2012 5th International Congress on Image and Signal Processing (CISP)

CISP is a premier international forum for scientists and researchers to present the state of the art of image and signal processing. Specific topics include Image restoration, Pattern recognition, Remote sensing, filters, Signal modeling, etc.

  • 2011 4th International Congress on Image and Signal Processing (CISP)

    CISP 11 is a premier international forum for scientists and researchers to present the state of the art of image and signal processing. Specific topics include Image restoration, Feature extraction, Image and video databases, Pattern recognition, Remote sensing, Filter design & digital filters, Signal modeling, identification & prediction, etc.

  • 2010 3rd International Congress on Image and Signal Processing (CISP)

    CISP 10 is a premier international forum for scientists and researchers to present the state of the art of multimedia and signal processing. It is co-located with the 3rd International Conference on BioMedical Engineering and Informatics (BMEI 2010) to promote interactions biomedical research and signal processing.

  • 2009 2nd International Congress on Image and Signal Processing (CISP)

    biomedical engineering, biomedical informatics, multimedia, and signal processing


2012 IEEE Spoken Language Technology Workshop (SLT 2012)

The goal of the SLT workshop is to bring the speech and language communities together to discuss and present advances and challenges in the area of spoken language processing.


MILCOM 2012 - 2012 IEEE Military Communications Conference

MILCOM 2012 gives industry the opportunity to promote communications technologies and services to commanders from all branches of the armed forces, Department of Defense, federal government, and the heads of multi-national forces from around the globe.


2011 IEEE International Symposium on Technology and Society (ISTAS)

ISTAS is an annual international forum sponsored by the IEEE Society on Social Implications of Technology. ISTAS 2011 is co-sponsored by the ACM Special Interest Group on Computers and Society. ISTAS welcomes engineers; scientists; philosophers; researchers in social sciences, arts, law, and humanities; and policy experts in technology and society.

  • 2010 IEEE International Symposium on Technology and Society (ISTAS)

    Social Implications of Emerging Technologies

  • 2009 IEEE International Symposium on Technology and Society (ISTAS)

    The IEEE International Symposium on Technology and Society (ISTAS) is an annual international forum exploring the social implications of technology. ISTAS 09 will be held concurrently with the IEEE International Symposium on Sustainable Systems and Technology (ISSST), with joint sessions related to an overall conference theme of sustainability.


2007 IEEE Workshop on Automatic Identification Advanced Technologies (Auto ID)

This workshop brings together researchers, developers, and users of automatic identification technologies including: Biometrics Bar Code Systems and other Symbologies Radio Frequency Identification (RFID) and other visual identification technologies. These AutoID fields are at an exciting time in their evolution. Novel research developements are being made at a high rate and these are being implemented into commerical systems.



Periodicals related to Automatic Identification

Back to Top

Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Geoscience and Remote Sensing, IEEE Transactions on

Theory, concepts, and techniques of science and engineering as applied to sensing the earth, oceans, atmosphere, and space; and the processing, interpretation, and dissemination of this information.


Industrial Informatics, IEEE Transactions on

IEEE Transactions on Industrial Informatics focuses on knowledge-based factory automation as a means to enhance industrial fabrication and manufacturing processes. This embraces a collection of techniques that use information analysis, manipulation, and distribution to achieve higher efficiency, effectiveness, reliability, and/or security within the industrial environment. The scope of the Transaction includes reporting, defining, providing a forum for discourse, and informing ...


Sensors Journal, IEEE

The Field of Interest of the IEEE Sensors Journal is the science and applications of sensing phenomena, including theory, design, and application of devices for sensing and transducing physical, chemical, and biological phenomena. The emphasis is on the electronics, physics, biology, and intelligence aspects of sensors and integrated sensor-actuators. (IEEE Guide for Authors) (The fields of interest of the IEEE ...


Systems Journal, IEEE

This publication provides a systems-level, focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance.



Most published Xplore authors for Automatic Identification

Back to Top

Xplore Articles related to Automatic Identification

Back to Top

QR Codes as a time management tool in m-learning

I. Č ulumović Ž upanović ; E. Tijan MIPRO, 2012 Proceedings of the 35th International Convention, 2012

The constant development and increased usage of ICT, especially mobile communications and Web technologies, has enabled users to use specific ICT solutions such as automatic identification and data capture techniques using QR Codes in order to improve learning processes. This paper researches the benefits of using QR Codes in m-learning, and presents examples of how QR Codes can be used ...


Clustering Based Automatic Refactorings Identification

Istvan Gergely Czibula; Gabriela Czibula Symbolic and Numeric Algorithms for Scientific Computing, 2008. SYNASC '08. 10th International Symposium on, 2008

The aim of this paper is to approach the problem of improving the design of an object oriented software system, by identifying the appropriate refactorings. It is well known that improving the quality of software systems design is an important issue during the evolution of object oriented software systems. This improvement can be achieved by refactoring the software system in ...


A closed-loop system for artifact mitigation in ambulatory electrocardiogram monitoring

Mohammed Shoaib; Gene Marsh; Harinath Garudadri; Somdeb Majumdar 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2012

Motion artifacts interfere with electrocardiogram (ECG) detection and information processing. In this paper, we present an independent component analysis based technique to mitigate these signal artifacts. We propose a new statistical measure to enable an automatic identification and removal of independent components, which correspond to the sources of noise. For the first time, we also present a signal-dependent closed-loop system ...


A pipelined synchronization approach for satellite-based automatic identification system

Weitao Lan; Taosheng Zhang; Moran Guo; Wei Huang; Lianghui Ding; Feng Yang; Liang Qian 2016 IEEE International Conference on Communications (ICC), 2016

Because of the wide field of view (FOV) to monitor vessel movements, satellite-based automatic identification system (S-AIS) has been promoted in recent years. However, synchronization is a tough work in S-AIS receiver because of the large Doppler shift and serious signal collision resulting from simultaneous transmission in the FOV of a satellite. In this paper, we propose a pipelined synchronization ...


RFID Technology Applied in Highway Traffic Management

Wang Hongjian; Tang Yuelin; Li Zhi Optoelectronics and Image Processing (ICOIP), 2010 International Conference on, 2010

RFID is non-contact automatic identification technology which could be applied to various industries extensively. Accessing the vehicle speed range in freeway, we could use RFID technology to manage vehicles. Then we could determine whether the vehicles are overspeed. Therefore, the use of RFID technology can effectively reduce speeding violations and enhance traffic safety. Its toll is paid by credit card ...


More Xplore Articles

Educational Resources on Automatic Identification

Back to Top

eLearning

QR Codes as a time management tool in m-learning

I. Č ulumović Ž upanović ; E. Tijan MIPRO, 2012 Proceedings of the 35th International Convention, 2012

The constant development and increased usage of ICT, especially mobile communications and Web technologies, has enabled users to use specific ICT solutions such as automatic identification and data capture techniques using QR Codes in order to improve learning processes. This paper researches the benefits of using QR Codes in m-learning, and presents examples of how QR Codes can be used ...


Clustering Based Automatic Refactorings Identification

Istvan Gergely Czibula; Gabriela Czibula Symbolic and Numeric Algorithms for Scientific Computing, 2008. SYNASC '08. 10th International Symposium on, 2008

The aim of this paper is to approach the problem of improving the design of an object oriented software system, by identifying the appropriate refactorings. It is well known that improving the quality of software systems design is an important issue during the evolution of object oriented software systems. This improvement can be achieved by refactoring the software system in ...


A closed-loop system for artifact mitigation in ambulatory electrocardiogram monitoring

Mohammed Shoaib; Gene Marsh; Harinath Garudadri; Somdeb Majumdar 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2012

Motion artifacts interfere with electrocardiogram (ECG) detection and information processing. In this paper, we present an independent component analysis based technique to mitigate these signal artifacts. We propose a new statistical measure to enable an automatic identification and removal of independent components, which correspond to the sources of noise. For the first time, we also present a signal-dependent closed-loop system ...


A pipelined synchronization approach for satellite-based automatic identification system

Weitao Lan; Taosheng Zhang; Moran Guo; Wei Huang; Lianghui Ding; Feng Yang; Liang Qian 2016 IEEE International Conference on Communications (ICC), 2016

Because of the wide field of view (FOV) to monitor vessel movements, satellite-based automatic identification system (S-AIS) has been promoted in recent years. However, synchronization is a tough work in S-AIS receiver because of the large Doppler shift and serious signal collision resulting from simultaneous transmission in the FOV of a satellite. In this paper, we propose a pipelined synchronization ...


RFID Technology Applied in Highway Traffic Management

Wang Hongjian; Tang Yuelin; Li Zhi Optoelectronics and Image Processing (ICOIP), 2010 International Conference on, 2010

RFID is non-contact automatic identification technology which could be applied to various industries extensively. Accessing the vehicle speed range in freeway, we could use RFID technology to manage vehicles. Then we could determine whether the vehicles are overspeed. Therefore, the use of RFID technology can effectively reduce speeding violations and enhance traffic safety. Its toll is paid by credit card ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Automatic Identification"

IEEE-USA E-Books

  • Analyzing Gene Expression Imaging Data in Developmental Biology

    This chapter describes the application of data-intensive methods to the automatic identification and annotation of gene expression patterns in the mouse embryo. The first section of the chapter introduces ideas behind modern computational and systems biology, how the explosion of data in the postgenomic world has led to new possibilities and even greater challenges. The second section talks about the particular computational biology problem and describes annotating images of gene expression with the right anatomical terms in depth. An automated solution based on data-intensive methods is discussed the third section. The final section looks ahead to the biological significance and systems biology application of these approaches and also describes a large-scale challenge and possible series of experiments with a novel data-intensive computational architecture.

  • No title

    This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive tags); the focus here is on passive tags. An overview of the principles of the technology divides passive tags into devices that use either near field or far field coupling to communicate with a tag reader. The strengths and weaknesses of the approaches are considered, along with the standards that have been put in place by ISO and EPCGlobal to promote interoperability and the ubiquitous adoption of the technology. A section of the lecture has been dedicated to the principles of reading co-located tags, as this represents a significant challenge for a technology that may one day be able to automatically identify all of the items in your shopping art in a just few seconds. In fact, RFID applications are already quite extensive and this lecture classifies the primary uses. Some variants of modern RFID can also be integrated with sensors enabling the technology to be extended to measure parameters in the local environment, such as temperature & pressure. The uses and applications of RFID sensors are further described and classified. Later we examine important lessons surrounding the deployment of RFID for the Wal-Mart and the Metro AG store experiences, along with deployments in some more exploratory settings. Extensions of RFID that make use of read/write memory integrated with the tag are also discussed, in particular looking at novel near term opportunities. Privacy and social implications surrounding the use of RFID inspire recurring debates whenever there is discussion of large scale deployment; we examine the pros and cons of the issues and approaches for mitigating the problems. Finally, the remaining challenges of R ID are considered and we look to the future possibilities for the technology. Table of Contents: Introduction / Principles of Radio Frequency Identification / RFID Industry Standards / Reading Collected RFID Tags / Applications of RFID Tagging / RFID Incorporating Sensing / Deployment and Experience with RFID Systems / Privacy, Kill Switches, and Blocker Tags / Opportunities for RFID Integrated with Memory / Challenges, Future Technology, and Conclusion

  • WinRFID: A Middleware for the Enablement of Radiofrequency Identification (RFID)Based Applications

    Radio Frequency Identification (RFID) middleware is a new class of software which facilitates data and information communication between automatic identification physical layer and enterprise applications. It provides a distributed environment to process the data from tags read by the readers, translates the data where necessary, and routes it to a variety of backend applications using suitable technologies such as Web, Remote and Windows Services. This paper reports different challenges and the corresponding research approach in developing a RFID middleware to provide a seamless environment from the edge of the enterprise network; moving data from the point of transaction to the enterprise systems. Key features of the RFID middleware architecture are encapsulation of communication details, large- scale network management, intelligent data processing and routing, hardware and software interoperability, system integration and system extendibility. To deal with high volume data, WinRFID middleware is supported by novel algorithms and data representation schemes capable of processing large amounts of data, rectifying errors in real-time, identifying patterns, correlating events, reorganizing and scrubbing data and recovering from faults and exceptions. Interoperability involves simultaneous distributed working of receivers/readers and transponders/tags at different frequencies using different protocols, with read/write capabilities, different read rates, and other characteristics as a layer transparent to the applications. Network management involves deployment, initialization and control of receivers and transponders, which can be organized into a hierarchical structure with operational syntax and semantics attached to each or a group of receivers, transponders and concentrators or even the edge computers.



Standards related to Automatic Identification

Back to Top

No standards are currently tagged "Automatic Identification"


Jobs related to Automatic Identification

Back to Top