Conferences related to Biographies

Back to Top

2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops)


2012 IEEE International Conference on Industrial Technology (ICIT 2012)

The purpose of the conference is to provide a forum for presentation and discussion of emerging industrial technology. The conference was created by the IEEE Industrial Electronics Society in 1994.


2012 IEEE/ION Position, Location and Navigation Symposium - PLANS 2012

Position, location and navigation symposium covering all aspects of navigation with an emphasis on inertial navigation and technology.


2012 International Conference on Advanced Mechatronic Systems (ICAMechS)

It will provide an international forum for professionals, academics, and researchers to present latest developments from interdisciplinary theoretical studies, computational algorithm development and applications of mechatronic systems.


2012 International Conference on Advances in Engineering, Science and Management (ICAESM)

The objective of the conference is to provide platform for academicians and practitioners who are involved in research in the field of Computer Science and Engineering, Electrical Engineering, Electronics and Communication Engineering, Mechanical Engineering, Life Sciences and Technical Management to contribute and to disseminate the innovative and important new work. The Conference Provides a leading forum for sharing the original research contributions and practical development experiences among researchers and application developers.


More Conferences

Periodicals related to Biographies

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


More Periodicals


Xplore Articles related to Biographies

Back to Top

Contributors

IEEE Transactions on Sonics and Ultrasonics, 1967

Presents a biographical entry for each author and co-author included in this issue of the publication.


Information for authors

IEEE Transactions on Industry Applications, 1987

Provides instructions and guidelines to prospective authors who wish to submit manuscripts.


Nils Gustaf Dalén [Scanning Out Past]

Simón Reif-Acherman Proceedings of the IEEE, 2014

In 1912, the Swedish engineer Nils Gustaf Dalén was awarded the Nobel Prize in Physics for his invention of automatic regulators for use in conjunction with gas accumulators for illuminating lighthouses and buoys. The history of his inventiveness and scientific achievements has been unjustly ignored, historically speaking, being closely intertwined with that of AGA, the company that he helped establish, ...


Corrections: Confidence Bounds for the Percentiles of a Wearout Failure Distribution

F. Beichelt IEEE Transactions on Reliability, 1986

None


About the editor [Biography of Dr. Elif Kongar]

Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education, 2014

A brief biography of Dr. Elif Kongar is given highlighting her professional achievements.


More Xplore Articles

Educational Resources on Biographies

Back to Top

eLearning

Contributors

IEEE Transactions on Sonics and Ultrasonics, 1967

Presents a biographical entry for each author and co-author included in this issue of the publication.


Information for authors

IEEE Transactions on Industry Applications, 1987

Provides instructions and guidelines to prospective authors who wish to submit manuscripts.


Nils Gustaf Dalén [Scanning Out Past]

Simón Reif-Acherman Proceedings of the IEEE, 2014

In 1912, the Swedish engineer Nils Gustaf Dalén was awarded the Nobel Prize in Physics for his invention of automatic regulators for use in conjunction with gas accumulators for illuminating lighthouses and buoys. The history of his inventiveness and scientific achievements has been unjustly ignored, historically speaking, being closely intertwined with that of AGA, the company that he helped establish, ...


Corrections: Confidence Bounds for the Percentiles of a Wearout Failure Distribution

F. Beichelt IEEE Transactions on Reliability, 1986

None


About the editor [Biography of Dr. Elif Kongar]

Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education, 2014

A brief biography of Dr. Elif Kongar is given highlighting her professional achievements.


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Biographies"

IEEE-USA E-Books

  • No title

    Policy-based data management enables the creation of community-specific collections. Every collection is created for a purpose. The purpose defines the set of properties that will be associated with the collection. The properties are enforced by management policies that control the execution of procedures that are applied whenever data are ingested or accessed. The procedures generate state information that defines the outcome of enforcing the management policy. The state information can be queried to validate assessment criteria and verify that the required collection properties have been conserved. The integrated Rule-Oriented Data System implements the data management framework required to support policy-based data management. Policies are turned into computer actionable Rules. Procedures are composed from a Micro-service-oriented architecture. The result is a highly extensible and tunable system that can enforce management policies, automate administrative tasks, and periodically alidate assessment criteria. Table of Contents: Introduction / Integrated Rule-Oriented Data System / iRODS Architecture / Rule-Oriented Programming / The iRODS Rule System / iRODS Micro-services / Example Rules / Extending iRODS / Appendix A: iRODS Shell Commands / Appendix B: Rulegen Grammar / Appendix C: Exercises / Author Biographies

  • Front Matter

    The prelims comprise: Half-Title Page Title Page Copyright Page Table of Contents Foreword Preface Acknowledgments Author Biographies List of Symbols

  • No title

    In teaching an introduction to the finite element method at the undergraduate level, a prudent mix of theory and applications is often sought. In many cases, analysts use the finite element method to perform parametric studies on potential designs to size parts, weed out less desirable design scenarios, and predict system behavior under load. In this book, we discuss common pitfalls encountered by many finite element analysts, in particular, students encountering the method for the first time. We present a variety of simple problems in axial, bending, torsion, and shear loading that combine the students' knowledge of theoretical mechanics, numerical methods, and approximations particular to the finite element method itself. We also present case studies in which analyses are coupled with experiments to emphasize validation, illustrate where interpretations of numerical results can be misleading, and what can be done to allay such tendencies. Challenges in presenting the necessary mix f theory and applications in a typical undergraduate course are discussed. We also discuss a list of tips and rules of thumb for applying the method in practice. Table of Contents: Preface / Acknowledgments / Guilty Until Proven Innocent / Let's Get Started / Where We Begin to Go Wrong / It's Only a Model / Wisdom Is Doing It / Summary / Afterword / Bibliography / Authors' Biographies

  • No title

    User engagement refers to the quality of the user experience that emphasizes the positive aspects of interacting with an online application and, in particular, the desire to use that application longer and repeatedly. User engagement is a key concept in the design of online applications (whether for desktop, tablet or mobile), motivated by the observation that successful applications are not just used, but are engaged with. Users invest time, attention, and emotion in their use of technology, and seek to satisfy pragmatic and hedonic needs. Measurement is critical for evaluating whether online applications are able to successfully engage users, and may inform the design of and use of applications. User engagement is a multifaceted, complex phenomenon; this gives rise to a number of potential measurement approaches. Common ways to evaluate user engagement include using self-report measures, e.g., questionnaires; observational methods, e.g. facial expression analysis, speech analysis; n uro-physiological signal processing methods, e.g., respiratory and cardiovascular accelerations and decelerations, muscle spasms; and web analytics, e.g., number of site visits, click depth. These methods represent various trade-offs in terms of the setting (laboratory versus ``in the wild''), object of measurement (user behaviour, affect or cognition) and scale of data collected. For instance, small-scale user studies are deep and rich, but limited in terms of generalizability, whereas large-scale web analytic studies are powerful but negate users' motivation and context. The focus of this book is how user engagement is currently being measured and various considerations for its measurement. Our goal is to leave readers with an appreciation of the various ways in which to measure user engagement, and their associated strengths and weaknesses. We emphasize the multifaceted nature of user engagement and the unique contextual constraints that come to bear upon attempts to measure eng gement in different settings, and across different user groups and web domains. At the same time, this book advocates for the development of ``good'' measures and good measurement practices that will advance the study of user engagement and improve our understanding of this construct, which has become so vital in our wired world. Table of Contents: Preface / Acknowledgments / Introduction and Scope / Approaches Based on Self-Report Methods / Approaches Based on Physiological Measurements / Approaches Based on Web Analytics / Beyond Desktop, Single Site, and Single Task / Enhancing the Rigor of User Engagement Methods and Measures / Conclusions and Future Research Directions / Bibliography / Authors' Biographies / Index

  • Authors' Biographies

    The history of electrons and engineering from 1884-1984.

  • No title

    What is it like to be a researcher or a scientist? For young people, including graduate students and junior faculty members in universities, how can they identify good ideas for research? How do they conduct solid research to verify and realize their new ideas? How can they formulate their ideas and research results into high-quality articles, and publish them in highly competitive journals and conferences? What are effective ways to supervise graduate students so that they can establish themselves quickly in their research careers? In this book, Ling and Yang answer these questions in a step-by-step manner with specific and concrete examples from their first-hand research experience. Table of Contents: Acknowledgments / Preface / Basics of Research / Goals of Ph.D. Research / Getting Started: Finding New Ideas and Organizing Your Plans / Conducting Solid Research / Writing and Publishing Papers / Misconceptions and Tips for Paper Writing / Writing and Defending a Ph.D. Thesis / Life fter Ph.D. / Summary / References / Author Biographies

  • No title

    Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements. This book explores the des gn of trusted embedded systems based on PUFs. Specifically, it focuses on the integration of PUFs into secure and efficient cryptographic protocols that are suitable for a variety of embedded systems. It exemplarily discusses how PUFs can be integrated into lightweight device authentication and attestation schemes, which are popular and highly relevant applications of PUFs in practice. For the integration of PUFs into secure cryptographic systems, it is essential to have a clear view of their properties. This book gives an overview of different approaches to evaluate the properties of PUF implementations and presents the results of a large scale security analysis of different PUF types implemented in application- specific integrated circuits (ASICs). To analyze the security of PUF-based schemes as is common in modern cryptography, it is necessary to have a security framework for PUFs and PUF-based systems. In this book, we give a flavor of the formal modeling of PUFs that is in its beg nning and that is still undergoing further refinement in current research. The objective of this book is to provide a comprehensive overview of the current state of secure PUF-based cryptographic system design and the related challenges and limitations. Table of Contents: Preface / Introduction / Basics of Physically Unclonable Functions / Attacks on PUFs and PUF-based Systems / Advanced PUF Concepts / PUF Implementations and Evaluation / PUF-based Cryptographic Protocols / Security Model for PUF-based Systems / Conclusion / Terms and Abbreviations / Bibliography / Authors' Biographies

  • Editors' Biographies

    None

  • No title

    To date, the most common form of simulators of computer systems are software- based running on standard computers. One promising approach to improve simulation performance is to apply hardware, specifically reconfigurable hardware in the form of field programmable gate arrays (FPGAs). This manuscript describes various approaches of using FPGAs to accelerate software- implemented simulation of computer systems and selected simulators that incorporate those techniques. More precisely, we describe a simulation architecture taxonomy that incorporates a simulation architecture specifically designed for FPGA accelerated simulation, survey the state-of-the-art in FPGA- accelerated simulation, and describe in detail selected instances of the described techniques. Table of Contents: Preface / Acknowledgments / Introduction / Simulator Background / Accelerating Computer System Simulators with FPGAs / Simulation Virtualization / Categorizing FPGA-based Simulators / Conclusion / Bibliography / Autho s' Biographies

  • Editors' Biographies

    Electrical Engineering/Communications/Information Theory "The Berlekamp article alone will make this book worth having." --David Forney, Vice President, Motorola Codex Reed-Solomon Codes and Their Applications Edited by Stephen B. Wicker, Georgia Institute of Technology and Vijay K. Bhargava, University of Victoria On the Voyager spacecraft, they were responsible for sending clear pictures of the planets back to earth. They have also played a key role in the digital audio revolution. They are Reed-Solomon error codes: the extremely powerful codes that provide critical error control for many different types of digital communications systems. This outstanding collection of thirteen original articles written by leading researchers in the field provides a uniquely comprehensive overview of the history and practical applications--some never before published--of these important codes. Key features include: * Thirteen original articles from leading researchers in the field, with a historical overview by Reed and Solomon * An explanation of how Reed-Solomon codes were used in the Voyager spacecraft and how they are currently used in the compact disc player * Specific applications for digital audio, data transfer over mobile radio, satellite communications, spread spectrum systems, and more * New techniques for improving the performance of your own communications systems This book will be of interest to design and research engineers in the telecommunications field, particularly those in the aerospace/satellite and mobile radio industries. It is also well-suited for use as an advanced-level textbook on the subject of error control coding. Books of Related Interest from IEEE Press Clauide Elwood Shannon: Collected Papers Edited by N. J. A. Sloane and A. D. Wyner. AT&T; Bell Labs Th e first published collection of papers by Claude E. Shannon, including his seminal article "The Mathematical Theory of Communication." 1993 Hardcover 968 pp IEEE Order Number PC0331-9 ISBN 0-7803-0434-9 Multiple Access Communications: Foundations for Emerging Technologies Edited by Norman Abramson, University of Hawaii at Manoa The first book to explain the connection between spread spectrum and ALOHA channels, providing a collection of key developments in the theory and practice of multiple user communications channels. 1993 Hardcover 528pp IEEE Order Number PC0287-3 ISBN 0-87942-292-0



Standards related to Biographies

Back to Top

No standards are currently tagged "Biographies"


Jobs related to Biographies

Back to Top