Conferences related to Automatic Identification

Back to Top

2012 5th International Congress on Image and Signal Processing (CISP)

CISP is a premier international forum for scientists and researchers to present the state of the art of image and signal processing. Specific topics include Image restoration, Pattern recognition, Remote sensing, filters, Signal modeling, etc.

  • 2011 4th International Congress on Image and Signal Processing (CISP)

    CISP 11 is a premier international forum for scientists and researchers to present the state of the art of image and signal processing. Specific topics include Image restoration, Feature extraction, Image and video databases, Pattern recognition, Remote sensing, Filter design & digital filters, Signal modeling, identification & prediction, etc.

  • 2010 3rd International Congress on Image and Signal Processing (CISP)

    CISP 10 is a premier international forum for scientists and researchers to present the state of the art of multimedia and signal processing. It is co-located with the 3rd International Conference on BioMedical Engineering and Informatics (BMEI 2010) to promote interactions biomedical research and signal processing.

  • 2009 2nd International Congress on Image and Signal Processing (CISP)

    biomedical engineering, biomedical informatics, multimedia, and signal processing


2012 IEEE Spoken Language Technology Workshop (SLT 2012)

The goal of the SLT workshop is to bring the speech and language communities together to discuss and present advances and challenges in the area of spoken language processing.


MILCOM 2012 - 2012 IEEE Military Communications Conference

MILCOM 2012 gives industry the opportunity to promote communications technologies and services to commanders from all branches of the armed forces, Department of Defense, federal government, and the heads of multi-national forces from around the globe.


2011 IEEE International Symposium on Technology and Society (ISTAS)

ISTAS is an annual international forum sponsored by the IEEE Society on Social Implications of Technology. ISTAS 2011 is co-sponsored by the ACM Special Interest Group on Computers and Society. ISTAS welcomes engineers; scientists; philosophers; researchers in social sciences, arts, law, and humanities; and policy experts in technology and society.

  • 2010 IEEE International Symposium on Technology and Society (ISTAS)

    Social Implications of Emerging Technologies

  • 2009 IEEE International Symposium on Technology and Society (ISTAS)

    The IEEE International Symposium on Technology and Society (ISTAS) is an annual international forum exploring the social implications of technology. ISTAS 09 will be held concurrently with the IEEE International Symposium on Sustainable Systems and Technology (ISSST), with joint sessions related to an overall conference theme of sustainability.


2007 IEEE Workshop on Automatic Identification Advanced Technologies (Auto ID)

This workshop brings together researchers, developers, and users of automatic identification technologies including: Biometrics Bar Code Systems and other Symbologies Radio Frequency Identification (RFID) and other visual identification technologies. These AutoID fields are at an exciting time in their evolution. Novel research developements are being made at a high rate and these are being implemented into commerical systems.



Periodicals related to Automatic Identification

Back to Top

Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Geoscience and Remote Sensing, IEEE Transactions on

Theory, concepts, and techniques of science and engineering as applied to sensing the earth, oceans, atmosphere, and space; and the processing, interpretation, and dissemination of this information.


Industrial Informatics, IEEE Transactions on

IEEE Transactions on Industrial Informatics focuses on knowledge-based factory automation as a means to enhance industrial fabrication and manufacturing processes. This embraces a collection of techniques that use information analysis, manipulation, and distribution to achieve higher efficiency, effectiveness, reliability, and/or security within the industrial environment. The scope of the Transaction includes reporting, defining, providing a forum for discourse, and informing ...


Sensors Journal, IEEE

The Field of Interest of the IEEE Sensors Journal is the science and applications of sensing phenomena, including theory, design, and application of devices for sensing and transducing physical, chemical, and biological phenomena. The emphasis is on the electronics, physics, biology, and intelligence aspects of sensors and integrated sensor-actuators. (IEEE Guide for Authors) (The fields of interest of the IEEE ...


Systems Journal, IEEE

This publication provides a systems-level, focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance.



Most published Xplore authors for Automatic Identification

Back to Top

Xplore Articles related to Automatic Identification

Back to Top

Automatic Identification of Faults in Power Systems Using Neural Network Technique

Valmir Ziolkowski; Ivan N. da Silva; Rogerio A. Flauzino 2007 IEEE International Conference on Control Applications, 2007

The main objective involved with this paper consists of presenting the results obtained from the application of artificial neural networks and statistical tools in the automatic identification and classification process of faults in electric power distribution systems. The developed techniques to treat the proposed problem have used, in an integrated way, several approaches that can contribute to the successful detection ...


An experimental electronic data processing system for air traffic control

J. S. MacMullan; H. S. Bray; J. A. Llewellyn Proceedings of the IEE - Part B: Electronic and Communication Engineering, 1960

The paper reviews the principal elements and functions of an experimental electronic data processing system for the Oceanic Area Control Centre, and indicates their relation to existing methods of control at the Centre, which are briefly outlined. A stored-programme transistor computer maintains an electronic file of flight progress data on up to 100 aircraft, and is connected to a number ...


Automatic identification of service phase for electric utility customers

B. K. Seal; M. F. McGranaghan 2011 IEEE Power and Energy Society General Meeting, 2011

Utility distribution systems are becoming increasingly intelligent, with continued advancements in sensors, monitoring, and controls. In some cases, these improvements make it possible for the utility to isolate faults and reenergize sections of line from alternative points of feed. Under normal circumstances, utilities may dynamically reconfigure their system to optimize overall operating efficiency. With these capabilities comes increased need for ...


Smart RFID care [SRC] for pervasive health care system

B. Venkatalakshmi; A. Pravin Renold; R. S. Lysa Packiam Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011

RFID (Radio Frequency Identification) is applied widely in many domains. RFID technology has been dramatically improving so much in recent years, which in turn results in inexpensive tags and higher, read reliability. RFID middleware is a new breed of software system which facilitates data communication between automatic identification equipments like RFID readers and enterprise applications. It provides a distributed environment ...


Exploring Reliability for Automatic Identity Verification with Statistical Shape Models

Federico M. Sukno; Alejandro F. Frangi Automatic Identification Advanced Technologies, 2007 IEEE Workshop on, 2007

One of the drawbacks of statistical shape models is their occasional failure to converge. Although visually this fact is usually easy to assess there is not, in general, an automatic way to detect the failure. In this work we introduce a generic reliability measure for statistical shape models. It is based on a probabilistic framework and uses information extracted by ...


More Xplore Articles

Educational Resources on Automatic Identification

Back to Top

eLearning

Automatic Identification of Faults in Power Systems Using Neural Network Technique

Valmir Ziolkowski; Ivan N. da Silva; Rogerio A. Flauzino 2007 IEEE International Conference on Control Applications, 2007

The main objective involved with this paper consists of presenting the results obtained from the application of artificial neural networks and statistical tools in the automatic identification and classification process of faults in electric power distribution systems. The developed techniques to treat the proposed problem have used, in an integrated way, several approaches that can contribute to the successful detection ...


An experimental electronic data processing system for air traffic control

J. S. MacMullan; H. S. Bray; J. A. Llewellyn Proceedings of the IEE - Part B: Electronic and Communication Engineering, 1960

The paper reviews the principal elements and functions of an experimental electronic data processing system for the Oceanic Area Control Centre, and indicates their relation to existing methods of control at the Centre, which are briefly outlined. A stored-programme transistor computer maintains an electronic file of flight progress data on up to 100 aircraft, and is connected to a number ...


Automatic identification of service phase for electric utility customers

B. K. Seal; M. F. McGranaghan 2011 IEEE Power and Energy Society General Meeting, 2011

Utility distribution systems are becoming increasingly intelligent, with continued advancements in sensors, monitoring, and controls. In some cases, these improvements make it possible for the utility to isolate faults and reenergize sections of line from alternative points of feed. Under normal circumstances, utilities may dynamically reconfigure their system to optimize overall operating efficiency. With these capabilities comes increased need for ...


Smart RFID care [SRC] for pervasive health care system

B. Venkatalakshmi; A. Pravin Renold; R. S. Lysa Packiam Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011

RFID (Radio Frequency Identification) is applied widely in many domains. RFID technology has been dramatically improving so much in recent years, which in turn results in inexpensive tags and higher, read reliability. RFID middleware is a new breed of software system which facilitates data communication between automatic identification equipments like RFID readers and enterprise applications. It provides a distributed environment ...


Exploring Reliability for Automatic Identity Verification with Statistical Shape Models

Federico M. Sukno; Alejandro F. Frangi Automatic Identification Advanced Technologies, 2007 IEEE Workshop on, 2007

One of the drawbacks of statistical shape models is their occasional failure to converge. Although visually this fact is usually easy to assess there is not, in general, an automatic way to detect the failure. In this work we introduce a generic reliability measure for statistical shape models. It is based on a probabilistic framework and uses information extracted by ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Automatic Identification"

IEEE-USA E-Books

  • WinRFID: A Middleware for the Enablement of Radiofrequency Identification (RFID)Based Applications

    Radio Frequency Identification (RFID) middleware is a new class of software which facilitates data and information communication between automatic identification physical layer and enterprise applications. It provides a distributed environment to process the data from tags read by the readers, translates the data where necessary, and routes it to a variety of backend applications using suitable technologies such as Web, Remote and Windows Services. This paper reports different challenges and the corresponding research approach in developing a RFID middleware to provide a seamless environment from the edge of the enterprise network; moving data from the point of transaction to the enterprise systems. Key features of the RFID middleware architecture are encapsulation of communication details, large- scale network management, intelligent data processing and routing, hardware and software interoperability, system integration and system extendibility. To deal with high volume data, WinRFID middleware is supported by novel algorithms and data representation schemes capable of processing large amounts of data, rectifying errors in real-time, identifying patterns, correlating events, reorganizing and scrubbing data and recovering from faults and exceptions. Interoperability involves simultaneous distributed working of receivers/readers and transponders/tags at different frequencies using different protocols, with read/write capabilities, different read rates, and other characteristics as a layer transparent to the applications. Network management involves deployment, initialization and control of receivers and transponders, which can be organized into a hierarchical structure with operational syntax and semantics attached to each or a group of receivers, transponders and concentrators or even the edge computers.

  • Analyzing Gene Expression Imaging Data in Developmental Biology

    This chapter describes the application of data-intensive methods to the automatic identification and annotation of gene expression patterns in the mouse embryo. The first section of the chapter introduces ideas behind modern computational and systems biology, how the explosion of data in the postgenomic world has led to new possibilities and even greater challenges. The second section talks about the particular computational biology problem and describes annotating images of gene expression with the right anatomical terms in depth. An automated solution based on data-intensive methods is discussed the third section. The final section looks ahead to the biological significance and systems biology application of these approaches and also describes a large-scale challenge and possible series of experiments with a novel data-intensive computational architecture.

  • No title

    This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive tags); the focus here is on passive tags. An overview of the principles of the technology divides passive tags into devices that use either near field or far field coupling to communicate with a tag reader. The strengths and weaknesses of the approaches are considered, along with the standards that have been put in place by ISO and EPCGlobal to promote interoperability and the ubiquitous adoption of the technology. A section of the lecture has been dedicated to the principles of reading co-located tags, as this represents a significant challenge for a technology that may one day be able to automatically identify all of the items in your shopping art in a just few seconds. In fact, RFID applications are already quite extensive and this lecture classifies the primary uses. Some variants of modern RFID can also be integrated with sensors enabling the technology to be extended to measure parameters in the local environment, such as temperature & pressure. The uses and applications of RFID sensors are further described and classified. Later we examine important lessons surrounding the deployment of RFID for the Wal-Mart and the Metro AG store experiences, along with deployments in some more exploratory settings. Extensions of RFID that make use of read/write memory integrated with the tag are also discussed, in particular looking at novel near term opportunities. Privacy and social implications surrounding the use of RFID inspire recurring debates whenever there is discussion of large scale deployment; we examine the pros and cons of the issues and approaches for mitigating the problems. Finally, the remaining challenges of R ID are considered and we look to the future possibilities for the technology. Table of Contents: Introduction / Principles of Radio Frequency Identification / RFID Industry Standards / Reading Collected RFID Tags / Applications of RFID Tagging / RFID Incorporating Sensing / Deployment and Experience with RFID Systems / Privacy, Kill Switches, and Blocker Tags / Opportunities for RFID Integrated with Memory / Challenges, Future Technology, and Conclusion



Standards related to Automatic Identification

Back to Top

No standards are currently tagged "Automatic Identification"


Jobs related to Automatic Identification

Back to Top