Conferences related to NIST

Back to Top

ICASSP 2017 - 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.

  • ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

    The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.

  • ICASSP 2014 - 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

    ICASSP 2014 will be the world s largest and most comprehensive technical conference focused on the many facets of signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and oral/poster sessions on the most up-to-date topics in signal processing research.

  • ICASSP 2013 - 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

    The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.

  • ICASSP 2012 - 2012 IEEE International Conference on Acoustics, Speech and Signal Processing

    The latest research results on both theories and applications on signal processing will be presented and discussed among participants from all over the world. Video/Speech Signal processing used in human interface between Robots and Personal users will be highlighted.

  • ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

    The ICASSP meeting is the world s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions on: Audio and electroacoustics Bio imaging and signal processing Design and implementation of signal processing systems Image and multidimensional signal processing Industry technology tracks Information forensics and security.

  • ICASSP 2010 - 2010 IEEE International Conference on Acoustics, Speech and Signal Processing

    TBA

  • ICASSP 2009 - 2009 IEEE International Conference on Acoustics, Speech and Signal Processing

    The 34th ICASSP will be held in Taiwan April 19-24, 2009. The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


2012 19th Biennial University/Government/Industry Micro/Nano Symposium (UGIM)

The goal of this symposium is to bring together educators and researchers around the world involved in academic laboratory development and management, and to provide a forum for exchanging information and presenting new research and educational concepts.


1998 NIST Workshop on Microwave Technology: Directions and Measurement Requirements for the 21st Century



Periodicals related to NIST

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Instrumentation and Measurement, IEEE Transactions on

Measurements and instrumentation utilizing electrical and electronic techniques.


IT Professional

This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...


Nuclear Science, IEEE Transactions on

All aspects of the theory and applications of nuclear science and engineering, including instrumentation for the detection and measurement of ionizing radiation; particle accelerators and their controls; nuclear medicine and its application; effects of radiation on materials, components, and systems; reactor instrumentation and controls; and measurement of radiation in space.




Xplore Articles related to NIST

Back to Top

Characteristics of the Ionosphere at Washington, D.C., May, 1939

T. R. Gilliland; S. S. Kirby; N. Smith Proceedings of the IRE, 1939

Data on the ordinary-wave critical frequencies and virtual heights of the ionospheric layers are presented for the period indicated in the title. The monthly average values of the maximum usable frequencies for undisturbed days, for radio transmission by way of the regular layers is also provided.


Design and execution of data acquisition systems for inelastic neutron spectrometers

P. Klosowski; N. Maliszewskyj; H. Layer; J. Raebiger; P. D. Gallagher; M. Kirsch 1999 IEEE Conference on Real-Time Computer Applications in Nuclear Particle and Plasma Physics. 11th IEEE NPSS Real Time Conference. Conference Record (Cat. No.99EX295), 1999

We present the design and implementation of the data acquisition and instrument control for two new state-of-the-art inelastic neutron scattering spectrometers at the NIST Center for Neutron Research. The data acquisition system for the High Flux Backscattering Spectrometer (HFBS) is a multi- processing setup of several COTS digital and analog VME modules and a Motorola 96000 digital signal processor to ...


On Developing Policies to Improve Technological Innovation and Productivity in the United States

R. W. House; C. H. Kimzey; T. Nash IEEE Transactions on Systems, Man, and Cybernetics, 1979

Technological innovation and productivity are important for a number of reasons and especially for their influence on inflation and on the competitiveness of a nation's goods in world markets. Technological innovation is a complex process dependent on a large number of essential elements. Public policies aimed at improving technological innovation and productivity should include consideration of these elements individually and ...


Minutiae extraction scheme for fingerprint recognition systems

D. Simon-Zorita; J. Ortega-Garcia; S. Cruz-Llanas; J. Gonzalez-Rodriguez Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), 2001

A complete minutiae extraction scheme for automatic fingerprint recognition systems is presented. The proposed method uses improving alternatives for the image enhancement process, leading consequently to an increase in the reliability in the minutiae extraction task. In the first stages, image normalization and the orientation field of the fingerprint are calculated. The local orientation of the ridges serve as parameter ...


Statistical evaluation of cryptographic algorithms

Mircea Andraşiu; Adrian Popescu; Gheorghe Simion 2010 8th International Conference on Communications, 2010

This paper is intended to present software for testing and evaluating cryptographic algorithms. The proposed software is an improvement of NIST -Statistical Test Suite, designed after NIST SP 800-22. The upgrade is reflected in implementing on the interface the fife finalists of AES selection process, different implementation rules and introducing and implementing a new statistical test based on Walsh-Hadamard transform.


More Xplore Articles

Educational Resources on NIST

Back to Top

eLearning

Characteristics of the Ionosphere at Washington, D.C., May, 1939

T. R. Gilliland; S. S. Kirby; N. Smith Proceedings of the IRE, 1939

Data on the ordinary-wave critical frequencies and virtual heights of the ionospheric layers are presented for the period indicated in the title. The monthly average values of the maximum usable frequencies for undisturbed days, for radio transmission by way of the regular layers is also provided.


Design and execution of data acquisition systems for inelastic neutron spectrometers

P. Klosowski; N. Maliszewskyj; H. Layer; J. Raebiger; P. D. Gallagher; M. Kirsch 1999 IEEE Conference on Real-Time Computer Applications in Nuclear Particle and Plasma Physics. 11th IEEE NPSS Real Time Conference. Conference Record (Cat. No.99EX295), 1999

We present the design and implementation of the data acquisition and instrument control for two new state-of-the-art inelastic neutron scattering spectrometers at the NIST Center for Neutron Research. The data acquisition system for the High Flux Backscattering Spectrometer (HFBS) is a multi- processing setup of several COTS digital and analog VME modules and a Motorola 96000 digital signal processor to ...


On Developing Policies to Improve Technological Innovation and Productivity in the United States

R. W. House; C. H. Kimzey; T. Nash IEEE Transactions on Systems, Man, and Cybernetics, 1979

Technological innovation and productivity are important for a number of reasons and especially for their influence on inflation and on the competitiveness of a nation's goods in world markets. Technological innovation is a complex process dependent on a large number of essential elements. Public policies aimed at improving technological innovation and productivity should include consideration of these elements individually and ...


Minutiae extraction scheme for fingerprint recognition systems

D. Simon-Zorita; J. Ortega-Garcia; S. Cruz-Llanas; J. Gonzalez-Rodriguez Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), 2001

A complete minutiae extraction scheme for automatic fingerprint recognition systems is presented. The proposed method uses improving alternatives for the image enhancement process, leading consequently to an increase in the reliability in the minutiae extraction task. In the first stages, image normalization and the orientation field of the fingerprint are calculated. The local orientation of the ridges serve as parameter ...


Statistical evaluation of cryptographic algorithms

Mircea Andraşiu; Adrian Popescu; Gheorghe Simion 2010 8th International Conference on Communications, 2010

This paper is intended to present software for testing and evaluating cryptographic algorithms. The proposed software is an improvement of NIST -Statistical Test Suite, designed after NIST SP 800-22. The upgrade is reflected in implementing on the interface the fife finalists of AES selection process, different implementation rules and introducing and implementing a new statistical test based on Walsh-Hadamard transform.


More eLearning Resources

IEEE-USA E-Books

  • Introduction

    This introductory chapter of Service Quality of Cloud-Based Applications presents an overview of the contents in the subsequent chapters of the book. The book methodically analyzes the impacts of cloud infrastructure impairments on application service delivered to end users, as well as the opportunities for improvement afforded by cloud. It considers both the new impairments and opportunities of virtualized resources offered to applications deployed on cloud and how user service quality experienced by end users can be maximized. It approaches application service quality from the end users perspective while considering standards and recommendations from NIST, TM Forum, QuEST Forum, ODCA, ISO, ITIL, and so on. The book provides application architects, developers, and testers guidance on architecting and engineering applications that meet their customers and end users service reliability, availability, quality, and latency expectations. The work is organized into three parts: context, analysis, and recommendations.

  • Standards Overview

    Standards are a practical requirement for a successful implementation of the smart grid. Many smart-grid-related standards are still in development and will continue to undergo considerable change. Each major standards organization developing smart-grid-related standards is reviewed, including NIST, the International Electrotechnical Commission, the International Council on Large Electric Systems, the Institute of Electrical and Electronics Engineers, the American National Standards Institute, the International Telecommunication Union, the Electric Power Research Institute, and the International Telecommunication Union. Many ad hoc industry groups have also created lasting standards that impact power systems and communication. Modbus is introduced as an early example. The Microsoft Power and Utilities Smart Energy Reference Architecture also provides an interesting holistic information technology perspective on the smart grid.

  • DNS Trust Sectors

    This chapter focuses on the identification of trust sectors within the domain name system (DNS) infrastructure to enable resolution of the users' queries for internal or external destinations, and to enable resolution of the external namespace by global Internet users. Implementing trust sectors implies deploying DNS servers within each sector to perform particular functions. Deploying DNS servers in such a manner helps contain security breaches to the given sector, minimizing impacts on other sectors. The chapter also describes deployment strategies that effectively partition DNS information and communications in order to contain vulnerabilities and attacks within these respective trust sectors. It then discusses basic firewall policy settings that serve as a starting point to partition these trust sectors from a networking perspective and DNS filtering tactics at the DNS protocol level that are provided by various DNS server software products. Finally, the chapter summarizes the NIST cybersecurity framework categories and applies these to DNS trust sectors.

  • Government Activities

    This chapter contains sections titled: Introduction Worker Safety and Health Hazard Communication Standard OSHA Regional Offices Environmental Protection Agency (EPA) Toxic Substances Control Act (TSCA) Federal Air Pollution Program Federal Water Pollution Program EPA Regional Offices National Institute of Standards and Technology (NIST) National Center for Standards and Certification Information (NCSCI) Rural Electrification Administration (REA) U.S. Government Specifications U.S. Government Printing Office General Services Administration (GSA) The Naval Publications and Forms Center Polyamide-Imide Military Specification MIL-P-46179

  • Après le Déluge

    This chapter contains sections titled: NSA in 2000, Censorship and Surveillance, Cryptologie Apres le Deluge, Expansion of Intelligence, The USA PATRIOT Act, NIST's Computer Security Division, CSD Stays at NIST, Data Retention and Data Mining, CALEA Revisited, The National Security Agency, Changing US Role in the World, Yet What Exactly Is the Terrorist Threat?

  • Security Foundation

    This chapter focuses primarily on securing the host hardware on which the domain name system (DNS) components run. It introduces core security activities, including risk assessment, data security, threat detection, and event recovery. These functions is used to address specific DNS threats and vulnerabilities. DNS server protection includes physical security, host security, and data security. The chapter introduces key DNS security outcomes as related to the NIST Cybersecurity Framework Core and discusses security controls for protecting the hardware, kernel, operating system, and DNS application from vulnerabilities and attacks. Implementing host access controls provides a foundational layer of defense against attempts to attack a given hardware system, disrupt services running on the hardware, or to manipulate data or applications operating on the system. Additional security controls should be enforced to assure the availability and integrity of each physical or virtual server.

  • Introduction

    This introduction presents an overview of the key concepts discussed in the subsequent chapters of this book. The book is intended to provide details regarding the criticality of domain name system (DNS), its vulnerabilities, and strategies to secure the DNS infrastructure, which will in turn better secure the overall network. National Institute of Standards and Technologies (NIST) has published a DNS???specific guide for secure DNS deployment. This guide provides thorough procedures for securing a BIND DNS server, including configuration and management of DNS security extensions (DNSSEC). The book refers this guide where appropriate. To add some structure to the process of assessing risk on a per system level, NIST published Federal Information Processing Standards (FIPS) Publication 199. This publication defines standards for categorizing information and information systems based on the potential impact on the organization should certain threat events occur for use in assessing risk to an organization.

  • DNS Security Evolution

    The focus of network security traditionally lies with in???band technologies such as firewalls, network access control, intrusion detection/ prevention systems, and the like. But domain name system (DNS) is a foundational protocol freely operating across the network. DNS is used before in???band communications commence and may be instrumental in early attack detection. This chapter illustrates the view of a DNS maturity model based on the NIST Cybersecurity Framework tiers. These tiers reflect an increasingly security savvy organization in general. The chapter applies DNS???specific attributes to these tiers, focusing primarily on the "protect" and "detect" security categories. The importance of detection of malware???infested Internet devices and related security measures within the Internet of Things (IoT) recently glared for attention with massive distributed denial of service (DDoS) attacks in October 2016. As connectivity proliferates, so do security vulnerabilities so security must become a built???in requirement.



Standards related to NIST

Back to Top

No standards are currently tagged "NIST"


Jobs related to NIST

Back to Top