Accessibility

View this topic in
Accessibility is a general term used to describe the degree to which a product, device, service, or environment is available to as many people as possible. Accessibility can be viewed as the "ability to access" and benefit from some system or entity. (Wikipedia.org)






Conferences related to Accessibility

Back to Top

2014 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2014)

  • 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2013)

    Papers are solicited in all related areas in robotics and intelligent systems. Proposals for tutorials and workshops, as well as organized/special sessions are also welcome to address the emerging areas and innovative applications of new technologies.

  • 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2012)

    The 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2012) will be held in Vilamoura-Algarve, Portugal, during October 7-11, 2012. The theme of the conference will be Robotics for Quality of Life and Sustainable Development. Papers are solicited in all related areas in robotics and intelligent systems. Proposals for tutorials and workshops, as well as organized/special sessions are also welcome to address the emerging areas and innovative applications of new technologies.

  • 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2011)

    The 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2011) will be held in San Francisco, California, USA, during September 25-30, 2011. The theme of the conference will be Human- Centered Robotics, and its format will feature innovations in the form of interactive multimedia presentations and special-topic symposia celebrating 50 years of robotics.

  • 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2010)

    Papers are solicited in all related areas in robotics and intelligent systems. Proposals and tutorials and workshops, as well as organized/special sessions are also welcome to address the emerging areas and innovative applications of new technologies.

  • 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2009)

    Papers are solicited in all related areas in robotics and intelligent systems. Proposals for tutorials and workshops, as well as organized/special sessions are also welcome to address the emerging areas and innovative applications of new technologies.

  • 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2008)

    IROS 2008 serves as an international forum for robotics researchers to discuss and exchange their ideas on technical problems and their solutions. Conference includes technical presentations, tutorials and workshops, exhibits, posters, competitions, plenary session, and panel discussions.

  • 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2007)

  • 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2006)

  • 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2005)


2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII)

This conference provides an idea-exchange and discussion platform for researchers and practitioners interested in information management, innovation management and industrial engineering. The topics will arrange from the technology management theories to the management practice methods and technology.


2013 IEEE International Professional Communication Conference (IPCC 2013)

The theme of the conference is "Beyond Borders: Communicating Globally." Sessons will include empirical studies, workshops, tutorials, and industry applications.


2013 International Conference on Computing, Management and Telecommunications (ComManTel)

ComManTel 2013 will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to computing technologies, management information systems, and telecommunications and networking.


2013 International Conference on Management Science and Engineering (ICMSE)

Management science and engineering, including operations research, organizational systems and behavior, economics and finance, and public administration.


More Conferences

Periodicals related to Accessibility

Back to Top

Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


More Periodicals

Most published Xplore authors for Accessibility

Back to Top

Xplore Articles related to Accessibility

Back to Top

Survey of web service composition

Wala Ben Messaoud; Khaled Ghedira; Youssef Ben Halima; Henda Ben Ghezala 2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA), 2015

A Web service (WS) is called compound or composite when its execution involves interactions with other WS to use their features. The composition of WS specifies which services need to be invoked, in what order and how to handle exception conditions. This paper gives an overview of research efforts of WS composition. The approaches proposed in the literature are diverse, ...


Local accessibility and stabilization of an underactuated crawling robot with changing constraints

F. Matsuno; K. Ito; R. Takahashi Proceedings 2001 ICRA. IEEE International Conference on Robotics and Automation (Cat. No.01CH37164), 2001

Underactuated systems are those processing fewer actuators than degrees of freedom, but generally they are difficult to control. In this paper we realize the crawling motion by an underactuated robot. By changing the location of the fixed point of the robot to the environment, the constraint of the system is changed. Local accessibility of the system with changing the constraints ...


Standardized modeling learners ontology «SLMonto» to support interactive learning environment

Mohammed Aitdaoud; Fatima Zahra Guerss; Imane Lmati; Abdelouahed Namir; Mohammed Talbi; Habib Benlahmar; Naceur Achtaich; Khadija Douzi 2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA), 2015

One of the most important element for adapting and personalizing Technology- Enhanced Learning (TEL) is the learner model because it contains a lot of useful information about an individual such as learning preferences, academic performance and learning styles. These latter, which are increasingly being incorporated into TEL, and seems to be a promising concept for making learning easier for students. ...


Hidden Markov models & principal component analysis for multispectral palmprint identification

Abdallah Meraoumia; Maarouf Korichi; Salim Chitroub; Ahmed Bouridane 2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA), 2015

Automatic personal identification from their physical and behavioral traits, called biometrics technologies, is now needed in many fields such as: surveillance systems, access control systems, physical buildings and many more applications. In this paper, we propose an efficient online personal identification system based on Multi-Spectral Palmprint images (MSP) using Hidden Markov Model (HMM) and Principal Components Analysis (PCA). In this ...


A multimedia course for the design of microsystem packages

Z. Illyefalvi-Vitez; M. Ruszinko; N. -D. Codreanu; L. Hertel; P. Bojta 52nd Electronic Components and Technology Conference 2002. (Cat. No.02CH37345), 2002

Teaching the design of microsystem packages is one of the most important topics in the BSc and MSc level university education of electronic engineering. Special emphasis should be laid on teaching design, according to the general opinion that industrial companies are suffering from a shortage of design engineering staff. In addition to providing courses on CAD design in regular university ...


More Xplore Articles

Educational Resources on Accessibility

Back to Top

eLearning

Survey of web service composition

Wala Ben Messaoud; Khaled Ghedira; Youssef Ben Halima; Henda Ben Ghezala 2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA), 2015

A Web service (WS) is called compound or composite when its execution involves interactions with other WS to use their features. The composition of WS specifies which services need to be invoked, in what order and how to handle exception conditions. This paper gives an overview of research efforts of WS composition. The approaches proposed in the literature are diverse, ...


Local accessibility and stabilization of an underactuated crawling robot with changing constraints

F. Matsuno; K. Ito; R. Takahashi Proceedings 2001 ICRA. IEEE International Conference on Robotics and Automation (Cat. No.01CH37164), 2001

Underactuated systems are those processing fewer actuators than degrees of freedom, but generally they are difficult to control. In this paper we realize the crawling motion by an underactuated robot. By changing the location of the fixed point of the robot to the environment, the constraint of the system is changed. Local accessibility of the system with changing the constraints ...


Standardized modeling learners ontology «SLMonto» to support interactive learning environment

Mohammed Aitdaoud; Fatima Zahra Guerss; Imane Lmati; Abdelouahed Namir; Mohammed Talbi; Habib Benlahmar; Naceur Achtaich; Khadija Douzi 2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA), 2015

One of the most important element for adapting and personalizing Technology- Enhanced Learning (TEL) is the learner model because it contains a lot of useful information about an individual such as learning preferences, academic performance and learning styles. These latter, which are increasingly being incorporated into TEL, and seems to be a promising concept for making learning easier for students. ...


Hidden Markov models & principal component analysis for multispectral palmprint identification

Abdallah Meraoumia; Maarouf Korichi; Salim Chitroub; Ahmed Bouridane 2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA), 2015

Automatic personal identification from their physical and behavioral traits, called biometrics technologies, is now needed in many fields such as: surveillance systems, access control systems, physical buildings and many more applications. In this paper, we propose an efficient online personal identification system based on Multi-Spectral Palmprint images (MSP) using Hidden Markov Model (HMM) and Principal Components Analysis (PCA). In this ...


A multimedia course for the design of microsystem packages

Z. Illyefalvi-Vitez; M. Ruszinko; N. -D. Codreanu; L. Hertel; P. Bojta 52nd Electronic Components and Technology Conference 2002. (Cat. No.02CH37345), 2002

Teaching the design of microsystem packages is one of the most important topics in the BSc and MSc level university education of electronic engineering. Special emphasis should be laid on teaching design, according to the general opinion that industrial companies are suffering from a shortage of design engineering staff. In addition to providing courses on CAD design in regular university ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Accessibility"

IEEE-USA E-Books

  • Could You Be Clearer? An Examination of the Multiple Perspectives of Clarity

    Despite the unanimity of opinion on clarity, few experts recognize the important, complex factors that affect readers and writers' perceptions of clarity. This chapter examines three of the most important such factors: precision, document accessibility, and corporate language context. Each factor is defined and examined in terms of its influence on clarity. The result is a better understanding of the multiple factors we need to consider before we pass judgment on a document's clarity. Accessibility involves making information available to a broad array of readers-technical elite, and administrative, managerial, and bureaucratic masses. Writers who understand corporate language context know that in order to function they must use accepted corporate language patterns in their day-to-day activities.

  • Universal Service in Times of Reform: Affordability and Accessibility of Telecommunication Services in Latin America

    This chapter contains sections titled: Introduction, Theoretical Framework, Methodology, Countries Overview, Comparative Analysis of Trends, Policy Implications, Acknowledgments, Notes, References

  • Application Service Quality Requirements

    The key application service quality requirements for a target application should be specified with clear definitions for unambiguous measurement and quantified minimum expectations. This chapter considers the fundamental application service quality performance requirements for application instances. Service availability is the most fundamental quality requirement because if the application is not available to serve users then little else matters. End users typically experience an application one transaction at a time, and the latency between the user's action and the application service's response is a critical service quality characteristic. Service reliability requirements are most conveniently specified as defective (or failed) operations per million attempts, or DPM. Service accessibility metrics consider the probability than any individual user can successfully acquire service on demand. Service retainability is an application specific metric for session-oriented applications. The chapter also discusses timestamp accuracy, elasticity, release management, and disaster recovery requirements.

  • Application Service Quality

    This chapter considers the service offered by applications to end users and the metrics used to characterize the quality of that service. A handful of common service quality metrics that characterize application service quality are detailed. These user service key quality indicators (KQIs) are considered in depth. A simple cloud-based application with a pool of frontend components distributing work across a pool of backend components is illustrated. The chapter then focuses on two high-level application service boundaries: Application's customer facing service (CFS) boundary and Application's resource facing service (RFS) boundary. While different applications offer different functionality to end users, the primary service KQIs across the application's customer facing service boundary for end users of applications generally include one or more of the following: service availability; service latency; service reliability; service accessibility; service retainability; service throughput; service timestamp accuracy and application specific service quality measurements.

  • No title

    Citation analysis--the exploration of reference patterns in the scholarly and scientific literature--has long been applied in a number of social sciences to study research impact, knowledge flows, and knowledge networks. It has important information science applications as well, particularly in knowledge representation and in information retrieval. Recent years have seen a burgeoning interest in citation analysis to help address research, management, or information service issues such as university rankings, research evaluation, or knowledge domain visualization. This renewed and growing interest stems from significant improvements in the availability and accessibility of digital bibliographic data (both citation and full text) and of relevant computer technologies. The former provides large amounts of data and the latter the necessary tools for researchers to conduct new types of large-scale citation analysis, even without special access to special data collections. Excit ng new developments are emerging this way in many aspects of citation analysis. This book critically examines both theory and practical techniques of citation network analysis and visualization, one of the two main types of citation analysis (the other being evaluative citation analysis). To set the context for its main theme, the book begins with a discussion of the foundations of citation analysis in general, including an overview of what can and what cannot be done with citation analysis (Chapter 1). An in-depth examination of the generally accepted steps and procedures for citation network analysis follows, including the concepts and techniques that are associated with each step (Chapter 2). Individual issues that are particularly important in citation network analysis are then scrutinized, namely: field delineation and data sources for citation analysis (Chapter 3); disambiguation of names and references (Chapter 4); and visualization of citation networks (Chapter 5). Sufficient echnical detail is provided in each chapter so the book can serve as a practical how-to guide to conducting citation network analysis and visualization studies. While the discussion of most of the topics in this book applies to all types of citation analysis, the structure of the text and the details of procedures, examples, and tools covered here are geared to citation network analysis rather than evaluative citation analysis. This conscious choice was based on the authors' observation that, compared to evaluative citation analysis, citation network analysis has not been covered nearly as well by dedicated books, despite the fact that it has not been subject to nearly as much severe criticism and has been substantially enriched in recent years with new theory and techniques from research areas such as network science, social network analysis, or information visualization.

  • Accessibility of Broadband Telecommunication Services by Various Segments of the American Population

    This chapter contains sections titled: Introduction, Prior Studies That Addressed Access to the Internet, Objectives, Data, Basic Estimation Model, Testable Hypotheses, Results, Policy Implications, Appendix: Sample Selection --Stratified Sampling, Notes

  • No title

    This is the second book based on the 5S (Societies, Scenarios, Spaces, Structures, Streams) approach to digital libraries (DLs). Leveraging the first volume, on Theoretical Foundations, we focus on the key issues of evaluation and integration. These cross-cutting issues serve as a bridge for those interested in DLs, connecting the introduction and formal discussion in the first book, with the coverage of key technologies in the third book, and of illustrative applications in the fourth book. These two topics have central importance in the DL field, allowing it to be treated scientifically as well as practically. In the scholarly world, we only really understand something if we know how to measure and evaluate it. In the Internet era of distributed information systems, we only can be practical at scale if we integrate across both systems and their associated content. Evaluation of DLs must take place atmultiple levels,so we can address the different entities and their associated measur s. Thus, for digital objects, we assess accessibility, pertinence, preservability, relevance, significance, similarity, and timeliness. Other measures are specific to higher-level constructs like metadata, collections, catalogs, repositories, and services.We tie these together through a case study of the 5SQual tool, which we designed and implemented to perform an automatic quantitative evaluation of DLs. Thus, across the Information Life Cycle, we describe metrics and software useful to assess the quality of DLs, and demonstrate utility with regard to representative application areas: archaeology and education. Though integration has been a challenge since the earliest work on DLs, we provide the first comprehensive 5S-based formal description of the DL integration problem, cast in the context of related work. Since archaeology is a fundamentally distributed enterprise, we describe ETANADL, for integrating Near Eastern Archeology sites and information. Thus, we show how 5S-based mode ing can lead to integrated services and content. While the first book adopts a minimalist and formal approach to DLs, and provides a systematic and functional method to design and implement DL exploring services, here we broaden to practical DLs with richer metamodels, demonstrating the power of 5S for integration and evaluation.

  • When They Are Your Big Data: Participatory Data Practices as a Lens on Big Data

    The September 2014 post details a tension between the practice of self- quantification or self-tracking, and inaccessible, corporate-owned data streams. This tension, long present in debates about privacy and accessibility (Shilton 2012), is drawing a critical mass of attention as two (related) phenomena converge: more consumers are using personal fitness devices and self-tracking applications, and personalized health data are gaining prominence as a topic of scientific investigation.

  • General Requirements

    This chapter contains sections titled: Referenced Sections (Not used in the current edition.) Induced Voltages Accessibility Inspection and Tests of Lines and Equipment Grounding of Circuits, Supporting Structures, and Equipment Arrangement of Switches General Vegetation Management

  • General Requirements

    This chapter contains sections titled: Referenced Sections (Not used in the current edition.) Induced Voltages Accessibility Inspection and Tests of Lines and Equipment Grounding of Circuits, Supporting Structures, and Equipment Arrangement of Switches General Vegetation Management



Standards related to Accessibility

Back to Top

No standards are currently tagged "Accessibility"