Conferences related to NIST

Back to Top

2018 24th International Conference on Pattern Recognition (ICPR)

ICPR will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields

  • 2016 23rd International Conference on Pattern Recognition (ICPR)

    ICPR'2016 will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields.

  • 2014 22nd International Conference on Pattern Recognition (ICPR)

    ICPR 2014 will be an international forum for discussions on recent advances in the fields of Pattern Recognition; Machine Learning and Computer Vision; and on applications of these technologies in various fields.

  • 2012 21st International Conference on Pattern Recognition (ICPR)

    ICPR is the largest international conference which covers pattern recognition, computer vision, signal processing, and machine learning and their applications. This has been organized every two years by main sponsorship of IAPR, and has recently been with the technical sponsorship of IEEE-CS. The related research fields are also covered by many societies of IEEE including IEEE-CS, therefore the technical sponsorship of IEEE-CS will provide huge benefit to a lot of members of IEEE. Archiving into IEEE Xplore will also provide significant benefit to the all members of IEEE.

  • 2010 20th International Conference on Pattern Recognition (ICPR)

    ICPR 2010 will be an international forum for discussions on recent advances in the fields of Computer Vision; Pattern Recognition and Machine Learning; Signal, Speech, Image and Video Processing; Biometrics and Human Computer Interaction; Multimedia and Document Analysis, Processing and Retrieval; Medical Imaging and Visualization.

  • 2008 19th International Conferences on Pattern Recognition (ICPR)

    The ICPR 2008 will be an international forum for discussions on recent advances in the fields of Computer vision, Pattern recognition (theory, methods and algorithms), Image, speech and signal analysis, Multimedia and video analysis, Biometrics, Document analysis, and Bioinformatics and biomedical applications.

  • 2002 16th International Conference on Pattern Recognition


2018 Conference on Precision Electromagnetic Measurements (CPEM 2018)

CPEM is the most important scientific and technological conference in the domain of electromagnetic measurements at the highest accuracy levels. This conference covers the frequency range from DC to the optical region.2018 is expected to be a watershed year in the history of the international system of units (SI), with the adoption of the new definitions for the kilogram, the ampere, the kelvin and the mole. All the SI units will then be based on a set of seven defining constants. CPEM 2018 will provide a privileged opportunity to mark this milestone of the SI through a natural focus on quantum devices that relate electrical measurement standards to fundamental constants of physics. CPEM 2018 will also be the place to share knowledge on research in electromagnetic metrology focused on present and future challenges regarding industry and society in sectors such as Energy, ICT, quantum engineering, Industry 4.0, etc.


2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)

The ICITST is an international refereed conference dedicated to the advancement of theory andpractical implementation of secured Internet transactions and to fostering discussions on information technology evolution.


2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2017 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2017 22nd International Conference on Digital Signal Processing (DSP)

This is to bring together research scholars in signal processing, working in various applications, together and mark the 50th anniversary of this event in London, UK, where this event started 50 years ago.


More Conferences

Periodicals related to NIST

Back to Top

Antennas and Propagation, IEEE Transactions on

Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.


Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


More Periodicals


Xplore Articles related to NIST

Back to Top

Analysis of enhanced SDEx method

Piotr Milczarski; Artur Hłobaż; Krzysztof Podlaski 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017

In the paper, the communication security is discussed. Nowadays applications mainly do not support end-to-end security. The enhanced SDEx cryptographic method and analysis of its security and the analysis of its robustness are presented. The analysis is focused on statistical randomness tests proposed by NIST. These tests are derived in order to check the randomness of the ciphertext and are ...


E-voting security: The electoral dialectic gets hot

G. Goth IEEE Security & Privacy, 2004

Peter Neumann, principal scientist at the SRI International Computer Science Laboratory, has been warning about electronic voting systems' insecurity for several years. Neumann is still at it, and still alarmed. "I've been fighting this battle for 20 years. What's new?" he asks. The question is now rhetorical, for this past December has seen an explosion of public activity around the ...


Verification of NBS Class 4 Transport Protocol

D. Sidhu; T. Blumer IEEE Transactions on Communications, 1986

This paper discusses the verification of the connection management aspects of a transport layer protocol available from the National Bureau of Standards. An automated protocol development technique is used to verify a subset of the protocol with respect to the protocol properties of completeness, deadlock freeness, boundedness, and termination. The analysis points out several error situations in which the completeness ...


Design and workspace analysis of a 6-6 cable-suspended parallel robot

J. Pusey; A. Fattah; S. Agrawal; E. Messina; A. Jacoff Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2003) (Cat. No.03CH37453), 2003

In this paper, we study the design and workspace of a 6-6 cable-suspended parallel robot. The workspace volume is characterized as the set of points where the centroid of the MP (MP) can reach with tensions in all suspension cables at a constant orientation. This paper attempts to tackle some aspects of optimal design of a 6DOF cable robot by ...


Calibration of antenna factor of a tuned dipole using two antenna method, NIST method and a proposed reference antenna

S. K. Das; P. H. Rao; M. Kanda 1995 International Conference on Electromagnetic Interference and Compatibility (INCEMIC), 1995

The paper describes the calibration technique of a horizontally polarised tuned dipole antenna for its antenna factor and compares the results obtained using three different methods. These are the two antenna method, the NIST dipole method and a proposed reference antenna method


More Xplore Articles

Educational Resources on NIST

Back to Top

eLearning

Analysis of enhanced SDEx method

Piotr Milczarski; Artur Hłobaż; Krzysztof Podlaski 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017

In the paper, the communication security is discussed. Nowadays applications mainly do not support end-to-end security. The enhanced SDEx cryptographic method and analysis of its security and the analysis of its robustness are presented. The analysis is focused on statistical randomness tests proposed by NIST. These tests are derived in order to check the randomness of the ciphertext and are ...


E-voting security: The electoral dialectic gets hot

G. Goth IEEE Security & Privacy, 2004

Peter Neumann, principal scientist at the SRI International Computer Science Laboratory, has been warning about electronic voting systems' insecurity for several years. Neumann is still at it, and still alarmed. "I've been fighting this battle for 20 years. What's new?" he asks. The question is now rhetorical, for this past December has seen an explosion of public activity around the ...


Verification of NBS Class 4 Transport Protocol

D. Sidhu; T. Blumer IEEE Transactions on Communications, 1986

This paper discusses the verification of the connection management aspects of a transport layer protocol available from the National Bureau of Standards. An automated protocol development technique is used to verify a subset of the protocol with respect to the protocol properties of completeness, deadlock freeness, boundedness, and termination. The analysis points out several error situations in which the completeness ...


Design and workspace analysis of a 6-6 cable-suspended parallel robot

J. Pusey; A. Fattah; S. Agrawal; E. Messina; A. Jacoff Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2003) (Cat. No.03CH37453), 2003

In this paper, we study the design and workspace of a 6-6 cable-suspended parallel robot. The workspace volume is characterized as the set of points where the centroid of the MP (MP) can reach with tensions in all suspension cables at a constant orientation. This paper attempts to tackle some aspects of optimal design of a 6DOF cable robot by ...


Calibration of antenna factor of a tuned dipole using two antenna method, NIST method and a proposed reference antenna

S. K. Das; P. H. Rao; M. Kanda 1995 International Conference on Electromagnetic Interference and Compatibility (INCEMIC), 1995

The paper describes the calibration technique of a horizontally polarised tuned dipole antenna for its antenna factor and compares the results obtained using three different methods. These are the two antenna method, the NIST dipole method and a proposed reference antenna method


More eLearning Resources

IEEE-USA E-Books

  • Symmetric Block Ciphers

    This chapter deals with some important symmetric block ciphers that have been developed in the past. They are International Data Encryption Algorithm (IDEA; 1992), RC5, RC6, Data Encryption Standard (DES), and Advanced Encryption Standard (AES). The AES, known as the Rijndael algorithm, specifies an FIPS‐approved symmetric block cipher, which will soon come to be used in lieu of Triple DES or RC6. The DES is now a basic security device employed by worldwide organizations. IDEA has a structure that can be used for both encryption and decryption, like DES. RSA Data Security, Inc. estimates that RC5 and its successor, RC6, are strong candidates for potential successors to DES.

  • Museum Pieces

    No abstract.

  • Overview of Security and Privacy in Cyber‐Physical Systems

    Cyber‐physical systems (CPSs) are used across domains to enable process optimization and previously unachievable functionality. The combination of networked digital systems and analog physical processes creates unique characteristics that change how security theory is applied. Neither cyber‐ nor physical‐security concepts alone can protect CPSs because the crossover effects can introduce unexpected vulnerabilities. Physical attacks may allow access to critical assets, resulting in damage or compromise of information being processed by the device, while cyber‐attacks may cause physical malfunctions, resulting in real‐world consequences. Therefore, security and privacy are key concerns for CPS design, development, and operation. In this chapter, we discuss how CPS security and privacy differ from that of pure cyber or physical systems and what may be done to secure these systems. Our goal is to help designers of emerging CPSs to build more secure, privacy‐enhanced products in the future.

  • Countering the Threats

    This chapter contains sections titled: Securing the Basis Head End (IPTV Service Provider) Aggregation and Transport Network Home End Secure IPTV a Reality References

  • Standards Overview

    Standards are a practical requirement for a successful implementation of the ?>smart grid.?> Many smart-grid-related standards are still in development and will continue to undergo considerable change. Each major standards organization developing smart-grid-related standards is reviewed, including NIST, the International Electrotechnical Commission, the International Council on Large Electric Systems, the Institute of Electrical and Electronics Engineers, the American National Standards Institute, the International Telecommunication Union, the Electric Power Research Institute, and the International Telecommunication Union. Many ad hoc industry groups have also created lasting standards that impact power systems and communication. Modbus is introduced as an early example. The Microsoft Power and Utilities Smart Energy Reference Architecture also provides an interesting holistic information technology perspective on the smart grid.

  • User‐Centred Evaluation of Information Retrieval Systems

    This chapter contains sections titled: Introduction The MEDLARS Test The Okapi Project The Interactive IR Evaluation Model Summary Exercises References

  • Human/Human Conversation Understanding

    Spoken language understanding (SLU) is an emerging field in between speech and language processing, investigating human/ machine and human/ human communication by leveraging technologies from signal processing, pattern recognition, machine learning and artificial intelligence. SLU systems are designed to extract the meaning from speech utterances and its applications are vast, from voice search in mobile devices to meeting summarization, attracting interest from both commercial and academic sectors. Both human/machine and human/human communications can benefit from the application of SLU, using differing tasks and approaches to better understand and utilize such communications. This book covers the state-of-the-art approaches for the most popular SLU tasks with chapters written by well-known researchers in the respective fields. **Key features include:** * Presents a fully integrated view of the two distinct disciplines of speech processing and language process ng for SLU tasks. * Defines what is possible today for SLU as an enabling technology for enterprise (e.g., customer care centers or company meetings), and consumer (e.g., entertainment, mobile, car, robot, or smart environments) applications and outlines the key research areas. * Provides a unique source of distilled information on methods for computer modeling of semantic information in human/machine and human/human conversations. This book can be successfully used for graduate courses in electronics engineering, computer science or computational linguistics. Moreover, technologists interested in processing spoken communications will find it a useful source of collated information of the topic drawn from the two distinct disciplines of speech processing and language processing under the new area of SLU.

  • Cloud Model

    Cloud computing is fundamentally a business model that enables organizations and individuals to outsource the ownership and operation of the compute, memory, storage, and networking of the hosts that support the organizations?> and individuals?> applications to cloud service providers. This chapter reviews the standard roles, service models, and essential characteristics of cloud computing. The chapter concludes with a brief description of cloud regions and availability zones. As this work focuses on cloud-based applications, it considers the IaaS/PaaS-to-application service boundary as the application's resource facing service boundary. To efficiently operate pools of virtual machine servers, specialized online critical operations support systems (OSSs) referred to as virtual machine server controllers are required. The following elasticity measurement concepts are used in this work: density; provisioning interval; release interval; scaling in and out; scaling up and down; agility; slew rate and linearity; and elasticity speedup.



Standards related to NIST

Back to Top

No standards are currently tagged "NIST"


Jobs related to NIST

Back to Top