Conferences related to NIST

Back to Top

2020 IEEE International Conference on Plasma Science (ICOPS)

IEEE International Conference on Plasma Science (ICOPS) is an annual conference coordinated by the Plasma Science and Application Committee (PSAC) of the IEEE Nuclear & Plasma Sciences Society.


2020 IEEE International Magnetic Conference (INTERMAG)

INTERMAG is the premier conference on all aspects of applied magnetism and provides a range of oral and poster presentations, invited talks and symposia, a tutorial session, and exhibits reviewing the latest developments in magnetism.


2019 41st Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops andinvitedsessions of the latest significant findings and developments in all the major fields ofbiomedical engineering.Submitted papers will be peer reviewed. Accepted high quality paperswill be presented in oral and postersessions, will appear in the Conference Proceedings and willbe indexed in PubMed/MEDLINE & IEEE Xplore


2019 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)

International Geosicence and Remote Sensing Symposium (IGARSS) is the annual conference sponsored by the IEEE Geoscience and Remote Sensing Society (IEEE GRSS), which is also the flagship event of the society. The topics of IGARSS cover a wide variety of the research on the theory, techniques, and applications of remote sensing in geoscience, which includes: the fundamentals of the interactions electromagnetic waves with environment and target to be observed; the techniques and implementation of remote sensing for imaging and sounding; the analysis, processing and information technology of remote sensing data; the applications of remote sensing in different aspects of earth science; the missions and projects of earth observation satellites and airborne and ground based campaigns. The theme of IGARSS 2019 is “Enviroment and Disasters”, and some emphases will be given on related special topics.


2019 IEEE International Symposium on Electromagnetic Compatibility - EMC 2019

The IEEE Electromagnetic Compatibility Society is the world's largest organization dedicated to the development and distribution of information, tools and techniques for reducing electromagnetic interference. The society's field of interest includes standards, measurement techniques and test procedures, instrumentation, equipment and systems characteristics, interference control techniques and components, education, computational analysis, and spectrum management, along with scientific, technical, industrial, professional or other activities that contribute to this field


More Conferences

Periodicals related to NIST

Back to Top

Antennas and Propagation, IEEE Transactions on

Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.


Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


More Periodicals


Xplore Articles related to NIST

Back to Top

Thin film and sensors

[] 71st Device Research Conference, 2013

None


67th DRC late news papers

[] 2009 Device Research Conference, 2009

None


Discussion on “the National Bureau of Standards,” and “a testing laboratory in practical operation,” at New York, November 24, 1905

[] Proceedings of the American Institute of Electrical Engineers, 1906

F. B. Crocker: The INSTITUTE has done much commendable work in encouraging standardization, but it has remained for the Government to do something even more important by giving to the public the standards of weights and measures needed in the industries.


Articles to be published in upcoming issues of the transactions on engineering management

[] IEEE Transactions on Engineering Management, 1986

None


Oblique sweep-frequency experiments over a 2000-km North-South subauroral path

[{u'author_order': 1, u'affiliation': u'Max-Planck-Institut f\xfcr Aeronomie, Lindau/Harz, Germany', u'full_name': u'Hans G. M\xf6ller'}] Radio Science, 1967

The high-frequency limits for radio transmission are calculated from the data of vertical sounding stations. For distances < 2000 km, only the vertical data of the station at the midpoint of the path are used. To check this rule, oblique and vertical sweep-frequency records which were observed under normal and anomalous conditions were compared. If the distribution of ionization is ...


More Xplore Articles

Educational Resources on NIST

Back to Top

eLearning

No eLearning Articles are currently tagged "NIST"

IEEE-USA E-Books

  • Index

    None

  • 2 TWENTIETH-CENTURY NAVIGATING

    A series of advances in the 1920s led to the introduction of the quartz oscillator to replace the mechanisms of traditional chronometers.1 Pendulum clocks typically had one beat every two seconds. Traditional mechanical chronometers used so-called “escapement” wheels that oscillated at two to five beats per second. Quartz oscillators operated in the kilohertz range: thousands of beats per second. When properly calibrated, they offered orders- of-magnitude increases of accuracy.2 It had been long known that supplying energy to a quartz crystal caused it to oscillate at a frequency determined mainly by the crystal's thickness. Other factors caused the frequency to drift, including variations in temperature, contamination of the crystal, and mechanical shock. One by one, these problems were addressed. By the late 1930s, the US National Bureau of Standards (in 1988 renamed the National Institute of Standards and Technology) was providing time services to the nation with quartz clocks that neither gained nor lost 0.004 seconds a day.

  • Museum Pieces

    No abstract.

  • Cloud Computing: An Exploration of Factors Impacting Adoption

    The rapid emergence, prevalence, and potential impact of cloud computing has sparked a significant amount of interest among IS and IT research and industry. While it is widely acknowledged that cloud computing has the potential to transform the IT industry, issues surrounding cloud computing adoption have received relatively little attention. What research has been conducted has tended to focus on technical issues and often lacks empirical foundation. Drawing on a field study of 10 organizations, this study contributes to the existing cloud literature by addressing the complex and multifaceted nature of adoption. Second, it provides an insight into cloud adoption by focusing on the benefits and challenges associated with implementation in organizations. The findings are analyzed using the technology–organization–environment (TOE) framework as a lens to reveal how certain factors impact cloud adoption.

  • Cloud Security

    The cloud has emerged as a successful computing paradigm, allowing users and organizations to rely on external providers to store and process their data and make it available to others. An increasingly important priority, if there is to be wide adoption and acceptance of cloud computing, is for data owners and users to have security guarantees. Guaranteeing security means ensuring confidentiality and integrity of data, access to it, and computations with it, and ensuring availability of data and services to legitimate users in compliance with agreements with the providers. In this chapter, we present an overview of the main security issues and concerns arising in the cloud scenario, in particular with respect to the storage, management, and processing of data.

  • Overview of Security and Privacy in Cyber‐Physical Systems

    Cyber‐physical systems (CPSs) are used across domains to enable process optimization and previously unachievable functionality. The combination of networked digital systems and analog physical processes creates unique characteristics that change how security theory is applied. Neither cyber‐ nor physical‐security concepts alone can protect CPSs because the crossover effects can introduce unexpected vulnerabilities. Physical attacks may allow access to critical assets, resulting in damage or compromise of information being processed by the device, while cyber‐attacks may cause physical malfunctions, resulting in real‐world consequences. Therefore, security and privacy are key concerns for CPS design, development, and operation. In this chapter, we discuss how CPS security and privacy differ from that of pure cyber or physical systems and what may be done to secure these systems. Our goal is to help designers of emerging CPSs to build more secure, privacy‐enhanced products in the future.

  • Cloud Model

    Cloud computing is fundamentally a business model that enables organizations and individuals to outsource the ownership and operation of the compute, memory, storage, and networking of the hosts that support the organizations?> and individuals?> applications to cloud service providers. This chapter reviews the standard roles, service models, and essential characteristics of cloud computing. The chapter concludes with a brief description of cloud regions and availability zones. As this work focuses on cloud-based applications, it considers the IaaS/PaaS-to-application service boundary as the application's resource facing service boundary. To efficiently operate pools of virtual machine servers, specialized online critical operations support systems (OSSs) referred to as virtual machine server controllers are required. The following elasticity measurement concepts are used in this work: density; provisioning interval; release interval; scaling in and out; scaling up and down; agility; slew rate and linearity; and elasticity speedup.

  • Basics

    This chapter reviews the following concepts: cloud computing fundamentals; roles in cloud computing; applications; demand, supply, capacity, and fungibility; and demand variability. Cloud computing is defined as a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand. Applications are composed of software components that execute on physical compute, networking, memory, and storage equipment. An application instance is an operational configuration of application software components on appropriate compute, networking, memory, and storage infrastructure elements that can offer service to users. The application instance is owned and operated by an application service provider. From an economics perspective, users offer demand and application service providers offer supply; consumption is the amount of service that users enjoy in an interval of time. User pays some price to enjoy service, and service providers must cover their costs of delivering that service.

  • Symmetric Block Ciphers

    This chapter deals with some important symmetric block ciphers that have been developed in the past. They are International Data Encryption Algorithm (IDEA; 1992), RC5, RC6, Data Encryption Standard (DES), and Advanced Encryption Standard (AES). The AES, known as the Rijndael algorithm, specifies an FIPS‐approved symmetric block cipher, which will soon come to be used in lieu of Triple DES or RC6. The DES is now a basic security device employed by worldwide organizations. IDEA has a structure that can be used for both encryption and decryption, like DES. RSA Data Security, Inc. estimates that RC5 and its successor, RC6, are strong candidates for potential successors to DES.

  • Cloud Computing

    Cloud computing is a radical new IT delivery and business model. Users can use cloud services when and where they need them and in the amount they need them, and pay only for the resources used. It offers huge computing power, on-demand scalability, and utility-like availability at low cost. In this chapter, we present an overview of cloud computing concepts, cloud services, cloud-hosting models, and cloud applications. We also outline the benefits and limitations of cloud computing, identify potential risks and discuss the prospects for the cloud and what businesses and individuals can do to successfully embrace cloud computing. Finally, we discuss clouds?> prospects and implications for businesses and IT professionals.



Standards related to NIST

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...



Jobs related to NIST

Back to Top