Conferences related to Redundancy

Back to Top

2017 Annual Reliability and Maintainability Symposium (RAMS)

Tutorials and original papers on reliability, maintainability, safety, risk management, and logistics


2014 IEEE 14th International Conference on Nanotechnology (IEEE-NANO)

NANO is the flagship IEEE conference in Nanotechnology, which makes it a must for students, educators, researchers, scientists and engineers alike, working at the interface of nanotechnology and the many fields of electronic materials, photonics, bio-and medical devices, alternative energy, environmental protection, and multiple areas of current and future electrical and electronic applications. In each of these areas, NANO is the conference where practitioners will see nanotechnologies at work in both their own and related fields, from basic research and theory to industrial applications.

  • 2012 IEEE 12th International Conference on Nanotechnology (IEEE-NANO)

    The conference scope covers a wide range in nanoscience and technology. In particular, it covers nanofabrication, nanomanufacturing, nanomaerials, nanobiomedicine, nanoenergy, nanoplasmonics, nanoelectronics, nanosensors and nanoactuators, characterisation and modelling of nano structures and devices. Research in both experiments and simulation is reported. Industry is encouraged to present its research projects.

  • 2011 10th Conference on Nanotechnology (IEEE-NANO)

    1. Nanomaterials and Nanostructures 2. Nanoelectronics and Nanodevices 3. Nanophotonics 4. Nano biotechnology and Nanomedicine 5. Nanorobotics and NEMS

  • 2011 IEEE 11th International Conference on Nanotechnology (IEEE-NANO)

    All areas of nanotechnology within the areas of IEEE interest, as covered by the member societies of the Nanotechnology Council.

  • 2010 IEEE 10th Conference on Nanotechnology (IEEE-NANO)

    - More Moore, More than Moore and Beyond-CMOS - Nano-optics, Nano-Photonics, Plasmonics, Nano-optoelectronics - Nanofabrication, Nanolithography, Nano Manipulation, Nanotools - Nanomaterials and Nanostructures - Nanocarbon, Nanodiamond, Graphene and CNT Based Technologies - Nano-sensors and Nano Membranes - Modeling and Simulation - System Integration (Nano/Micro/Macro), NEMS, and Actuators - Molecular Electronics, Inorganic Nanowires, Nanocrystals, Quantum Dots

  • 2009 9th IEEE Conference on Nanotechnology (IEEE-NANO)

    THE CONFERENCE FOCUSES ON THE APPLICATION OF NANOSCIENCE AND NANOTECHNOLOGY. SPECIFICALLY, BOTH ENGINEERING ISSUE RELATED TO NANOFABBRICATION , NANOELECTRONICS, SENSOR SYSTEMS WILL BE COVERED IN ADDITION FOUNDAMENTAL ISSUES SUCH AS MODELLING, SYNTHESIS, CARACTARIZATION ETC.

  • 2008 8th IEEE Conference on Nanotechnology (IEEE-NANO)

    This conference is the sequel to meetings held in Maui (2001), Washington (2002), San Francisco (2003), Munich (2004), Nagoya (2005), Cinncinati (2006), and Hong Kong (2007). The conference focus will be on engineering and business issues related to nanoelectronics, circuits, architectures, sensor systems, integration, reliability and manufacturing in addition to fundamental issues such as modeling, growth/synthesis, and characterization. The conference will feature plenary, invited, and contributed papers


2014 IEEE International Symposium on Information Theory (ISIT)

Annual international symposium on processing, transmission, storage, and use of information, as well as theoretical and applied aspects of coding, communications, and communications networks.


2012 International Conference on Information and Automation (ICIA)

Information, automation, and related areas.

  • 2011 International Conference on Information and Automation (ICIA)

    Information and automation science and engineering

  • 2010 International Conference on Information and Automation (ICIA)

    The objective of ICIA 2010 is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of informtion, robotics, automation and sensors to disseminate their latest research results and exchange views on the future research directions.

  • 2009 International Conference on Information and Automation (ICIA)

    information acquisition, sensors and sensor networks, bio-sensors, computer vision, pattern recognition, signal processing, information theory, speech recognition, information technologies for automation, human-machines interactions/interfaces, and virtual reality; Bio-robotics, medical robotics, network robots, tele-robotics, service robotics, micro and nano systems, machine intelligence, intelligent systems, mechatronics, control theory, automation process, and industrial automation.

  • 2008 International Conference on Information and Automation (ICIA)

    All related areas of information acquisition, especially sensors, wireless sensor networks, RFID, information acquisition/processing, sensor based robotics and control, and bioinformatics.


2009 International Workshop on Local and Non-Local Approximation in Image Processing (LNLA 2009)

Adaptive local and non-local approximations emerged as surprisingly powerful tools for image analysis, restoration, compression, and enhancement. The state-of-the-art exhibits many diverse techniques related through concepts such as sparsity, redundancy, compressibility, and self-similarity. LNLA will gather leading specialists to discuss about the latest and most important issues in these fields.


More Conferences

Periodicals related to Redundancy

Back to Top

Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Instrumentation and Measurement, IEEE Transactions on

Measurements and instrumentation utilizing electrical and electronic techniques.



Most published Xplore authors for Redundancy

Back to Top

Xplore Articles related to Redundancy

Back to Top

Iterative Source-Channel Decoding Using Short Block Codes

T. Clevorn; P. Vary; M. Adrat 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, 2006

Iterative source-channel decoding (ISCD) exploits the residual redundancy of the source, e.g., codec parameters, for quality improvements. In contrast to the well-known convolutional coded ISCD systems, we propose in this paper an ISCD scheme which features a superior performance but is based solely on two short block codes. The block codes serve as highly redundant index assignment and rate-1 inner ...


Dependability differentiation in optical packet switched networks

H. Overby; N. Stol; S. Bjornstad Proceedings of 2005 7th International Conference Transparent Optical Networks, 2005., 2005

Dependability is a crucial issue in future optical packet switched (OPS) networks. In this paper, we present the rationale for a dependability differentiated OPS network. A general model that supports orthogonal differentiation of performance related and dependability related quality-of- service parameters as well as an example of how to differentiate dependability is presented.


The CRC-NTMAC for noisy message authentication

Y. Liu; C. Boncelet MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005

The paper introduces a novel message authentication code based on the recently proposed NTMAC structure, called CRC-NTMAC, for noisy message authentication. As with the NTMAC, the CRC-NTMAC can tolerate a small number of errors, which might be caused by a noisy communication channel. The CRC-NTMAC replaces the truncated conventional MACs by cyclic redundancy check (CRC) codes in its constructions as ...


Fault equivalence identification using redundancy information and static and dynamic extraction

M. E. Amyeen; W. K. Fuchs; I. Pomeranz; V. Boppana Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 2001

A procedure for identifying functionally equivalent faults and improving the performance of diagnostic test pattern generation is described in this paper. The procedure is based on evaluation of faulty functions in cones of dominator gates of fault pairs. This is enhanced by utilizing circuit redundancy information. Equivalence is proved without the previously required circuit transformations. Stem-branch equivalences for reconvergent stems ...


A clustering algorithm based on best-first search strategy

Dongmei Yao; Jian Jiang; Jingui Pan 2010 International Conference on Audio, Language and Image Processing, 2010

This paper studies and analyses the problems and deficiencies that are faced by clustering algorithm which is based on hierarchical scene tree, and proposes a clustering algorithm that is based on the best-first search strategy. The algorithm reduces the false-matching rate, and also alleviates the problem of network congestion to some extent, by designing a novel cost function. Both theoretical ...


More Xplore Articles

Educational Resources on Redundancy

Back to Top

eLearning

Iterative Source-Channel Decoding Using Short Block Codes

T. Clevorn; P. Vary; M. Adrat 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, 2006

Iterative source-channel decoding (ISCD) exploits the residual redundancy of the source, e.g., codec parameters, for quality improvements. In contrast to the well-known convolutional coded ISCD systems, we propose in this paper an ISCD scheme which features a superior performance but is based solely on two short block codes. The block codes serve as highly redundant index assignment and rate-1 inner ...


Dependability differentiation in optical packet switched networks

H. Overby; N. Stol; S. Bjornstad Proceedings of 2005 7th International Conference Transparent Optical Networks, 2005., 2005

Dependability is a crucial issue in future optical packet switched (OPS) networks. In this paper, we present the rationale for a dependability differentiated OPS network. A general model that supports orthogonal differentiation of performance related and dependability related quality-of- service parameters as well as an example of how to differentiate dependability is presented.


The CRC-NTMAC for noisy message authentication

Y. Liu; C. Boncelet MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005

The paper introduces a novel message authentication code based on the recently proposed NTMAC structure, called CRC-NTMAC, for noisy message authentication. As with the NTMAC, the CRC-NTMAC can tolerate a small number of errors, which might be caused by a noisy communication channel. The CRC-NTMAC replaces the truncated conventional MACs by cyclic redundancy check (CRC) codes in its constructions as ...


Fault equivalence identification using redundancy information and static and dynamic extraction

M. E. Amyeen; W. K. Fuchs; I. Pomeranz; V. Boppana Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 2001

A procedure for identifying functionally equivalent faults and improving the performance of diagnostic test pattern generation is described in this paper. The procedure is based on evaluation of faulty functions in cones of dominator gates of fault pairs. This is enhanced by utilizing circuit redundancy information. Equivalence is proved without the previously required circuit transformations. Stem-branch equivalences for reconvergent stems ...


A clustering algorithm based on best-first search strategy

Dongmei Yao; Jian Jiang; Jingui Pan 2010 International Conference on Audio, Language and Image Processing, 2010

This paper studies and analyses the problems and deficiencies that are faced by clustering algorithm which is based on hierarchical scene tree, and proposes a clustering algorithm that is based on the best-first search strategy. The algorithm reduces the false-matching rate, and also alleviates the problem of network congestion to some extent, by designing a novel cost function. Both theoretical ...


More eLearning Resources

IEEE-USA E-Books

  • System Quantification for Dependent Events

    This chapter contains sections titled: Dependent Failures Markov Model for Standby Redundancy Common-Cause Failure Analysis This chapter contains sections titled: References Problems

  • Automatic Frequency Assignment for Cellular Telephones Using Constraint Satisfaction Techniques

    We study the problem of automatic frequency assignment for cellular telephone systems. The frequency assignment problem is viewed as the problem to minimize the unsatisfied soft constraints in a constraint satisfaction problem (CSP) over a finite domain of frequencies involving co-channel, adjacent channel, and co-site constraints. The soft constraints are automatically derived from signal strength prediction data. The CSP is solved using a generalized graph coloring algorithm. Graph-theoretical results play a crucial role in making the problem tractable. Performance results from a real-world frequency assignment problem are presented. We develop the generalized graph coloring algorithm by stepwise refinement, starting from DSATUR and augmenting it with local propagation, constraint lifting, intelligent backtracking, redundancy avoidance, and iterative deepening.

  • Information Trade-Offs and the Evolution of Sensory Layouts

    In nature, sensors evolve to capture relevant information needed for organisms of a particular species to survive and reproduce. In this paper we study how sensor layouts may evolve in different environments and under pressure of different informational constraints. To do this we evolve sensor layouts for different environments and constraints using a fitness measure with weighted terms for redundancy and novelty, using, respectively, mutual information and Crutchfield's information metric. The results show how different sensor layouts evolve depending on the structure and complexity of the environment but also how selective pressure for redundancy or novelty might affect the design.

  • Connecting the Dots

    Part I of this book considered the resource facing service impairments introduced by virtualization and cloud that risk degrading the customer facing service offered by cloud-based applications. Part II analyzed those risks, and Part III offered recommendations to mitigate the end user service impact of those risks. This chapter summarizes the key points from these three parts. It discusses application service quality challenge, four redundancy models, and designs for scalability, extensibility, and failure. The chapter elucidates the actions recommended to assure the feasibility and likelihood of cloud- based applications consistently achieving their service quality expectations. A section considers the challenge of taking an existing or traditional application that is successfully deployed on native hardware configurations to cloud while continuing to deliver at least comparable service quality to end users. This book methodically delineates and analyzes the risks, and offers concrete recommendations to enable applications deployed to cloud to deliver service quality.

  • Maintenance Strategies

    This chapter discusses results of visual inspections, can be applied to maintenance strategies to assess the insulation condition in any particular rotating machine. It first provides a review of the maintenance strategies possible. The chapter then presents guidelines on procedures to assess the insulation and indicate the relative condition of any particular machine. The extent of an inspection and maintenance program should be geared to a machine's application, consequences of failure, redundancy, complexity, and value. The inspection and maintenance options are as follows, and, in practice, a cost-effective strategy for an entire plant would contain a mixture of these options: breakdown or corrective maintenance, time-based or preventative maintenance and condition-based maintenance. The chapter also discusses turbogenerators, salient pole generators and motors and squirrel cage and wound-rotor induction motors.

  • Register Files and Caches

    This chapter contains sections titled: Basic Architecture Basic SRAM Cell Design and Operation Address Path Design Read Path Design Write Path Design Redundancy Reliability Issues This chapter contains sections titled: References

  • No title

    Every year lives and properties are lost in road accidents. About one-fourth of these accidents are due to low vision in foggy weather. At present, there is no algorithm that is specifically designed for the removal of fog from videos. Application of a single-image fog removal algorithm over each video frame is a time-consuming and costly affair. It is demonstrated that with the intelligent use of temporal redundancy, fog removal algorithms designed for a single image can be extended to the real-time video application. Results confirm that the presented framework used for the extension of the fog removal algorithms for images to videos can reduce the complexity to a great extent with no loss of perceptual quality. This paves the way for the real-life application of the video fog removal algorithm. In order to remove fog, an efficient fog removal algorithm using anisotropic diffusion is developed. The presented fog removal algorithm uses new dark channel assumption and anisotropic diff sion for the initialization and refinement of the airlight map, respectively. Use of anisotropic diffusion helps to estimate the better airlight map estimation. The said fog removal algorithm requires a single image captured by uncalibrated camera system. The anisotropic diffusion-based fog removal algorithm can be applied in both RGB and HSI color space. This book shows that the use of HSI color space reduces the complexity further. The said fog removal algorithm requires pre- and post-processing steps for the better restoration of the foggy image. These pre- and post-processing steps have either data-driven or constant parameters that avoid the user intervention. Presented fog removal algorithm is independent of the intensity of the fog, thus even in the case of the heavy fog presented algorithm performs well. Qualitative and quantitative results confirm that the presented fog removal algorithm outperformed previous algorithms in terms of perceptual quality, color fidelity and execu ion time. The work presented in this book can find wide application in entertainment industries, transportation, tracking and consumer electronics. Table of Contents: Acknowledgments / Introduction / Analysis of Fog / Dataset and Performance Metrics / Important Fog Removal Algorithms / Single-Image Fog Removal Using an Anisotropic Diffusion / Video Fog Removal Framework Using an Uncalibrated Single Camera System / Conclusions and Future Directions / Bibliography / Authors' Biographies

  • Correlative Digital Communication Techniques

    A new method for the transmission of intelligence by means of a signal having certain correlation properties has been evolved. The theoretical and practical aspects of this concept are presented. An important advantage of these techniques is that for a fixed performance criteria, considerably higher speeds are possible compared to the presently known methods. In addition, the implementation is simple and straightforward. An unusual property of these techniques is the capability of error detection without the introduction of redundancy into the original data. Finally, expressions for spectral distributions and error performance as well as methods for practical implementation, including the errordetection process, are presented.

  • No title

    Improvements in network bandwidth along with dramatic drops in digital storage and processing costs have resulted in the explosive growth of multimedia (combinations of text, image, audio, and video) resources on the Internet and in digital repositories. A suite of computer technologies delivering speech, image, and natural language understanding can automatically derive descriptive metadata for such resources. Difficulties for end users ensue, however, with the tremendous volume and varying quality of automated metadata for multimedia information systems. This lecture surveys automatic metadata creation methods for dealing with multimedia information resources, using broadcast news, documentaries, and oral histories as examples. Strategies for improving the utility of such metadata are discussed, including computationally intensive approaches, leveraging multimodal redundancy, folding in context, and leaving precision-recall tradeoffs under user control. Interfaces building from auto atically generated metadata are presented, illustrating the use of video surrogates in multimedia information systems. Traditional information retrieval evaluation is discussed through the annual National Institute of Standards and Technology TRECVID forum, with experiments on exploratory search extending the discussion beyond fact-finding to broader, longer term search activities of learning, analysis, synthesis, and discovery. Table of Contents: Evolution of Multimedia Information Systems: 1990-2008 / Survey of Automatic Metadata Creation Methods / Refinement of Automatic Metadata / Multimedia Surrogates / End-User Utility for Metadata and Surrogates: Effectiveness, Efficiency, and Satisfaction

  • Summary

    No abstract.



Standards related to Redundancy

Back to Top

No standards are currently tagged "Redundancy"