Conferences related to NIST

Back to Top

2019 IEEE Milan PowerTech

PowerTech is the IEEE PES anchor conference in Europe and has been attended by hundreds of delegates from around the world. It will be an international forum with programme for individuals working in industry and academia, to network, exchange ideas, and discuss the results of their research and development work.

  • 2017 IEEE Manchester PowerTech

    this is IEEE PES anchor conference in Europe covering all areas of electrical power engineering

  • 2015 IEEE Eindhoven PowerTech

    This conference will continue the tradition of the PowerTech conferences held in odd years in Athens, Stockholm, Budapest, Porto, Bologna, St. Petersburg, Lausanne, Bucharest, Trondheim and Grenoble.PowerTech is the anchor conference of the IEEE Power Engineering Society in Europe. It is intended to provide a forum, in the European geographical area, for scientists and engineers interested in electric power engineering to exchange ideas, results of their scientific work, to learn from each other as well as to establish new friendships and rekindle existing ones. Student participation in Power Tech provides an important ingredient toward the event’s success: a special award, the Basil Papadias Award, is presented to the author of the best student paper at each edition. The Power Engineering Society of IEEE organized similar conferences in other parts of the world, such as PowerCon, in the Asia-Pacific region.

  • 2013 IEEE Grenoble PowerTech

    PowerTech is the anchor conference of the IEEE Power & Energy Society in Europe. It is intended to provide a forum for electric power engineering scientists and engineers to share ideas, results of their scientific work, to learn from each other as well as to establish new friendships and maintain existing ones.

  • 2011 IEEE Trondheim PowerTech

    PowerTech is the anchor conference of the IEEE Power & Energy Society in Europe. It is intended to provide a forum for electric power engineering scientists and engineers to share ideas, results of their scientific work and to learn from each other.

  • 2009 IEEE Bucharest Power Tech

    PowerTech is the anchor conference of the IEEE-PES in Europe. It is intended to provide a forum for scientists and engineers interested in electric power engineering to share ideas, results of their scientific work, to learn from each other as well as to establish new friendships and rekindle existing ones.

  • 2007 IEEE Power Tech

  • 2005 IEEE Russia Power Tech

  • 2003 Bologna Power Tech


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 24th International Conference on Pattern Recognition (ICPR)

ICPR will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields

  • 2016 23rd International Conference on Pattern Recognition (ICPR)

    ICPR'2016 will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields.

  • 2014 22nd International Conference on Pattern Recognition (ICPR)

    ICPR 2014 will be an international forum for discussions on recent advances in the fields of Pattern Recognition; Machine Learning and Computer Vision; and on applications of these technologies in various fields.

  • 2012 21st International Conference on Pattern Recognition (ICPR)

    ICPR is the largest international conference which covers pattern recognition, computer vision, signal processing, and machine learning and their applications. This has been organized every two years by main sponsorship of IAPR, and has recently been with the technical sponsorship of IEEE-CS. The related research fields are also covered by many societies of IEEE including IEEE-CS, therefore the technical sponsorship of IEEE-CS will provide huge benefit to a lot of members of IEEE. Archiving into IEEE Xplore will also provide significant benefit to the all members of IEEE.

  • 2010 20th International Conference on Pattern Recognition (ICPR)

    ICPR 2010 will be an international forum for discussions on recent advances in the fields of Computer Vision; Pattern Recognition and Machine Learning; Signal, Speech, Image and Video Processing; Biometrics and Human Computer Interaction; Multimedia and Document Analysis, Processing and Retrieval; Medical Imaging and Visualization.

  • 2008 19th International Conferences on Pattern Recognition (ICPR)

    The ICPR 2008 will be an international forum for discussions on recent advances in the fields of Computer vision, Pattern recognition (theory, methods and algorithms), Image, speech and signal analysis, Multimedia and video analysis, Biometrics, Document analysis, and Bioinformatics and biomedical applications.

  • 2002 16th International Conference on Pattern Recognition


2018 26th Signal Processing and Communications Applications Conference (SIU)

The general scope of the conference ranges from signal and image processing to telecommunication, and applications of signal processing methods in biomedical and communication problems.

  • 2017 25th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing and Communication Applications (SIU) conference is the most prominent scientific meeting on signal processing in Turkey bringing together researchers working in signal processing and communication fields. Topics include but are not limited to the areas of research listed in the keywords.

  • 2016 24th Signal Processing and Communication Application Conference (SIU)

    Signal Processing Theory, Statistical Signal Processing, Nonlinear Signal Processing, Adaptive Signal Processing, Array and Multichannel Signal Processing, Signal Processing for Sensor Networks, Time-Frequency Analysis, Speech / Voice Processing and Recognition, Computer Vision, Pattern Recognition, Machine Learning for Signal Processing, Human-Machine Interaction, Brain-Computer Interaction, Signal-Image Acquisition and Generation, image Processing, video Processing, Image Printing and Presentation, Image / Video / Audio browsing and retrieval, Image / Video / Audio Watermarking, Multimedia Signal Processing, Biomedical Signal Processing and Image Processing, Bioinformatics, Biometric Signal-Image Processing and Recognition, Signal Processing for Security and Defense, Signal and Image Processing for Remote Sensing, Signal Processing Hardware, Signal Processing Education, Radar Signal Processing, Communication Theory, Communication Networks, Wireless Communications

  • 2015 23th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing Theory Statistical Signal Processing Nonlinear Signal Processing Adaptive Signal Processing Array and Multichannel Signal Processing Signal Processing for Sensor Networks Time-Frequency Analysis Speech / Voice Processing and Recognition Computer Vision Pattern Recognition Machine Learning for Signal Processing Human-Machine Interaction Brain-Computer Interaction Signal-Image Acquisition and Generation image Processing video Processing Image Printing and Presentation Image / Video / Audio browsing and retrieval Image / Video / Audio Watermarking Multimedia Signal Processing Biomedical Signal Processing and Image Processing Bioinformatics Biometric Signal-Image Processing and Recognition Signal Processing for Security and Defense Signal and Image Processing for Remote Sensing Signal Processing Hardware Signal Processing Education Radar Signal Processing Communication Theory Communication Networks Wireless Communications

  • 2014 22nd Signal Processing and Communications Applications Conference (SIU)

    SIU will be held in Trabzon, Turkey at the Karadeniz Technical University Convention and Exhibition Centre on April 23, 2014. SIU is the largest and most comprehensive technical conference focused on signal processing and its applications in Turkey. Last year there were 500 hundred participants. The conference will feature renowned speakers, tutorials, and thematic workshops. Topics include but are not limited to: Signal Procesing, Image Processing, Communication, Computer Vision, Machine Learning, Biomedical Signal Processing,

  • 2013 21st Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2012 20th Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2011 19th Signal Processing and Communications Applications Conference (SIU)

    Conference will bring together academia and industry professionals as well as students and researchers to present and discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. The Conference will also include invited lectures, tutorials and special sessions.

  • 2010 IEEE 18th Signal Processing and Communications Applications Conference (SIU)

    S1.Theory of Signal-Processing S2.Statistical Signal-Processing S3.Multimedia Signal-Processing S4.Biomedical Signal-Processing S5.Sensor Networks S6.Multirate Signal-Processing S7.Pattern Recognition S8.Computer Vision S9.Adaptive Filters S10.Image/Video/Speech Browsing, Retrieval S11.Speech/Audio Coding S12.Speech Processing S13.Human-Machine Interfaces S14.Surveillance Signal Processing S15.Bioinformatics S16.Self-Learning S17.Signal-Processing Education S18.Signal-Processing Systems S1

  • 2009 IEEE 17th Signal Processing and Communications Applications Conference (SIU)

    The scope of the conference is to cover recent topics in theory and applications of Signal Processing and Communications.

  • 2008 IEEE 16th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing, Image Processing, Speech Processing, Pattern Recognition, Human Computer Interaction, Communication, Video and Speech indexing, Computer Vision, Biomedical Signal Processing

  • 2007 IEEE 15th Signal Processing and Communications Applications (SIU)

  • 2006 IEEE 14th Signal Processing and Communications Applications (SIU)

  • 2005 IEEE 13th Signal Processing and Communications Applications (SIU)

  • 2004 IEEE 12th Signal Processing and Communications Applications (SIU)


2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and postersessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE


More Conferences

Periodicals related to NIST

Back to Top

Antennas and Propagation, IEEE Transactions on

Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.


Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


More Periodicals


Xplore Articles related to NIST

Back to Top

Proposing Regulatory-Driven Automated Test Suites

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA', u'full_name': u'Patrick Morrison'}, {u'author_order': 2, u'affiliation': u'Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA', u'full_name': u'Casper Holmgreen'}, {u'author_order': 3, u'affiliation': u'Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA', u'full_name': u'Aaron Massey'}, {u'author_order': 4, u'affiliation': u'Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA', u'full_name': u'Laurie Williams'}] 2013 Agile Conference, None

In regulated domains such as finance and health care, failure to comply with regulation can lead to financial, civil and criminal penalties. While systems vary from organization to organization, the same regulations apply for all systems. As a result, efficiencies could be gained if the commonalities between systems could be captured in public, shared, test suites for regulations. We propose ...


A computer architecture for small-batch manufacturing: Industry will profit from a system that defines the functions of its component-manufacturing modules and standardizes their interfaces

[{u'author_order': 1, u'affiliation': u'HBS, Gaithersburg, MD, USA', u'full_name': u'Charles McLean'}, {u'author_order': 2, u'full_name': u'Mary Mitchell'}, {u'author_order': 3, u'full_name': u'Edward Barkmeyer'}] IEEE Spectrum, 1983

Discusses the need for a standard computer architecture for small batch manufacturing systems.


Optimal Generator Start-Up Strategy for Bulk Power System Restoration

[{u'author_order': 1, u'affiliation': u'Iowa State University, Ames, IA, USA', u'full_name': u'Wei Sun'}, {u'author_order': 2, u'affiliation': u'University College Dublin, Ireland', u'full_name': u'Chen-Ching Liu'}, {u'author_order': 3, u'affiliation': u'American Electric Power, Gahanna, OH, USA', u'full_name': u'Li Zhang'}] IEEE Transactions on Power Systems, 2011

During system restoration, it is critical to utilize the available black-start (BS) units to provide cranking power to non-black-start (NBS) units in such a way that the overall system generation capability will be maximized. The corresponding optimization problem is combinatorial with complex practical constraints that can vary with time. This paper provides a new formulation of generator start-up sequencing as ...


A new multiple ciphering scheme for improving randomness

[{u'author_order': 1, u'affiliation': u'Group of Electronic Design, Universidad de Zaragoza, Zaragoza, Spain', u'full_name': u'M. Garcia-Bosque'}, {u'author_order': 2, u'affiliation': u'Group of Electronic Design, Universidad de Zaragoza, Zaragoza, Spain', u'full_name': u'A. P\xe9rez'}, {u'author_order': 3, u'affiliation': u'Group of Electronic Design, Universidad de Zaragoza, Zaragoza, Spain', u'full_name': u'C. S\xe1nchez-Azqueta'}, {u'author_order': 4, u'affiliation': u'Group of Electronic Design, Universidad de Zaragoza, Zaragoza, Spain', u'full_name': u'S. Celma'}] 2017 European Conference on Circuit Theory and Design (ECCTD), None

In this paper, we propose a new multiple ciphering scheme based on a Deficit Weighted Round Robin (DWRR) algorithm to improve the randomness results in the keystream generated by a stream cipher. This scheme has been implemented and tested in a Xilinx Virtex 7 FPGA. The randomness test results of the resulting keystream have proved that this scheme can be ...


Locating methane leaks across large areas with frequency comb lasers

[{u'author_order': 1, u'affiliation': u'University of Colorado at Boulder, Boulder, Colorado, USA', u'full_name': u'G. B. Rieker'}, {u'author_order': 2, u'affiliation': u'University of Colorado at Boulder, Boulder, Colorado, USA', u'full_name': u'S. Coburn'}, {u'author_order': 3, u'affiliation': u'University of Colorado at Boulder, Boulder, Colorado, USA', u'full_name': u'C. Alden'}, {u'author_order': 4, u'affiliation': u'University of Colorado at Boulder, Boulder, Colorado, USA', u'full_name': u'R. Wright'}, {u'author_order': 5, u'affiliation': u'National Institute of Standards and Technology, Gaithersburg, Maryland, USA', u'full_name': u'K. Prasad'}, {u'author_order': 6, u'affiliation': u'National Institute of Standards and Technology, Gaithersburg, Maryland, USA', u'full_name': u'S. Ghosh'}, {u'author_order': 7, u'affiliation': u'National Institute of Standards and Technology, Boulder, Colorado, USA', u'full_name': u'G. Truong'}, {u'author_order': 8, u'affiliation': u'National Institute of Standards and Technology, Boulder, Colorado, USA', u'full_name': u'K. Cossel'}, {u'author_order': 9, u'affiliation': u'National Institute of Standards and Technology, Boulder, Colorado, USA', u'full_name': u'E. Baumann'}, {u'author_order': 10, u'affiliation': u'National Institute of Standards and Technology, Boulder, Colorado, USA', u'full_name': u'I. Coddington'}, {u'author_order': 11, u'affiliation': u'National Institute of Standards and Technology, Boulder, Colorado, USA', u'full_name': u'N. Newbury'}] 2017 Conference on Lasers and Electro-Optics (CLEO), None

Recent advancements in mobile frequency comb technology and inverse methods are enabling the location and sizing of small methane leaks across large regions.


More Xplore Articles

Educational Resources on NIST

Back to Top

eLearning

No eLearning Articles are currently tagged "NIST"

IEEE-USA E-Books

  • Symmetric Block Ciphers

    This chapter deals with some important symmetric block ciphers that have been developed in the past. They are International Data Encryption Algorithm (IDEA; 1992), RC5, RC6, Data Encryption Standard (DES), and Advanced Encryption Standard (AES). The AES, known as the Rijndael algorithm, specifies an FIPS‐approved symmetric block cipher, which will soon come to be used in lieu of Triple DES or RC6. The DES is now a basic security device employed by worldwide organizations. IDEA has a structure that can be used for both encryption and decryption, like DES. RSA Data Security, Inc. estimates that RC5 and its successor, RC6, are strong candidates for potential successors to DES.

  • Overview of Security and Privacy in Cyber‐Physical Systems

    Cyber‐physical systems (CPSs) are used across domains to enable process optimization and previously unachievable functionality. The combination of networked digital systems and analog physical processes creates unique characteristics that change how security theory is applied. Neither cyber‐ nor physical‐security concepts alone can protect CPSs because the crossover effects can introduce unexpected vulnerabilities. Physical attacks may allow access to critical assets, resulting in damage or compromise of information being processed by the device, while cyber‐attacks may cause physical malfunctions, resulting in real‐world consequences. Therefore, security and privacy are key concerns for CPS design, development, and operation. In this chapter, we discuss how CPS security and privacy differ from that of pure cyber or physical systems and what may be done to secure these systems. Our goal is to help designers of emerging CPSs to build more secure, privacy‐enhanced products in the future.

  • User‐Centred Evaluation of Information Retrieval Systems

    This chapter contains sections titled: Introduction The MEDLARS Test The Okapi Project The Interactive IR Evaluation Model Summary Exercises References

  • Basics

    This chapter reviews the following concepts: cloud computing fundamentals; roles in cloud computing; applications; demand, supply, capacity, and fungibility; and demand variability. Cloud computing is defined as a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand. Applications are composed of software components that execute on physical compute, networking, memory, and storage equipment. An application instance is an operational configuration of application software components on appropriate compute, networking, memory, and storage infrastructure elements that can offer service to users. The application instance is owned and operated by an application service provider. From an economics perspective, users offer demand and application service providers offer supply; consumption is the amount of service that users enjoy in an interval of time. User pays some price to enjoy service, and service providers must cover their costs of delivering that service.

  • Cloud Model

    Cloud computing is fundamentally a business model that enables organizations and individuals to outsource the ownership and operation of the compute, memory, storage, and networking of the hosts that support the organizations?> and individuals?> applications to cloud service providers. This chapter reviews the standard roles, service models, and essential characteristics of cloud computing. The chapter concludes with a brief description of cloud regions and availability zones. As this work focuses on cloud-based applications, it considers the IaaS/PaaS-to-application service boundary as the application's resource facing service boundary. To efficiently operate pools of virtual machine servers, specialized online critical operations support systems (OSSs) referred to as virtual machine server controllers are required. The following elasticity measurement concepts are used in this work: density; provisioning interval; release interval; scaling in and out; scaling up and down; agility; slew rate and linearity; and elasticity speedup.

  • Cloud Computing

    Cloud computing is a radical new IT delivery and business model. Users can use cloud services when and where they need them and in the amount they need them, and pay only for the resources used. It offers huge computing power, on-demand scalability, and utility-like availability at low cost. In this chapter, we present an overview of cloud computing concepts, cloud services, cloud-hosting models, and cloud applications. We also outline the benefits and limitations of cloud computing, identify potential risks and discuss the prospects for the cloud and what businesses and individuals can do to successfully embrace cloud computing. Finally, we discuss clouds?> prospects and implications for businesses and IT professionals.

  • Countering the Threats

    This chapter contains sections titled: Securing the Basis Head End (IPTV Service Provider) Aggregation and Transport Network Home End Secure IPTV a Reality References

  • Standards Overview

    Standards are a practical requirement for a successful implementation of the ?>smart grid.?> Many smart-grid-related standards are still in development and will continue to undergo considerable change. Each major standards organization developing smart-grid-related standards is reviewed, including NIST, the International Electrotechnical Commission, the International Council on Large Electric Systems, the Institute of Electrical and Electronics Engineers, the American National Standards Institute, the International Telecommunication Union, the Electric Power Research Institute, and the International Telecommunication Union. Many ad hoc industry groups have also created lasting standards that impact power systems and communication. Modbus is introduced as an early example. The Microsoft Power and Utilities Smart Energy Reference Architecture also provides an interesting holistic information technology perspective on the smart grid.

  • Human/Human Conversation Understanding

    Spoken language understanding (SLU) is an emerging field in between speech and language processing, investigating human/ machine and human/ human communication by leveraging technologies from signal processing, pattern recognition, machine learning and artificial intelligence. SLU systems are designed to extract the meaning from speech utterances and its applications are vast, from voice search in mobile devices to meeting summarization, attracting interest from both commercial and academic sectors. Both human/machine and human/human communications can benefit from the application of SLU, using differing tasks and approaches to better understand and utilize such communications. This book covers the state-of-the-art approaches for the most popular SLU tasks with chapters written by well-known researchers in the respective fields. **Key features include:** * Presents a fully integrated view of the two distinct disciplines of speech processing and language process ng for SLU tasks. * Defines what is possible today for SLU as an enabling technology for enterprise (e.g., customer care centers or company meetings), and consumer (e.g., entertainment, mobile, car, robot, or smart environments) applications and outlines the key research areas. * Provides a unique source of distilled information on methods for computer modeling of semantic information in human/machine and human/human conversations. This book can be successfully used for graduate courses in electronics engineering, computer science or computational linguistics. Moreover, technologists interested in processing spoken communications will find it a useful source of collated information of the topic drawn from the two distinct disciplines of speech processing and language processing under the new area of SLU.

  • Cloud Security

    The cloud has emerged as a successful computing paradigm, allowing users and organizations to rely on external providers to store and process their data and make it available to others. An increasingly important priority, if there is to be wide adoption and acceptance of cloud computing, is for data owners and users to have security guarantees. Guaranteeing security means ensuring confidentiality and integrity of data, access to it, and computations with it, and ensuring availability of data and services to legitimate users in compliance with agreements with the providers. In this chapter, we present an overview of the main security issues and concerns arising in the cloud scenario, in particular with respect to the storage, management, and processing of data.



Standards related to NIST

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...