Conferences related to Open Protocol

Back to Top

2023 Annual International Conference of the IEEE Engineering in Medicine & Biology Conference (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.


2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )

ETFA focus is on the latest developments and new technologies in the field of industrial and factory automation. The conference aims to exchange ideas with both industry leaders and a variety of experienced researchers, developers, and practitioners from several industries, research institutes, and academia


ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 59th IEEE Conference on Decision and Control (CDC)

The CDC is the premier conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, automatic control, and related areas.


2020 IEEE 29th International Symposium on Industrial Electronics (ISIE)

ISIE focuses on advancements in knowledge, new methods, and technologies relevant to industrial electronics, along with their applications and future developments.


More Conferences

Periodicals related to Open Protocol

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


More Periodicals

Most published Xplore authors for Open Protocol

Back to Top

Xplore Articles related to Open Protocol

Back to Top

IEEE Standard for Biometric Open Protocol

P2410/D11, Feburary 2015, 2015

Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device (smartphone or mobile device), a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components functionality, accepting integration into current operating environments in ...


IEEE Draft Biometrics Open Protocol Standard

IEEE P2410/D4, September 2014, 2014

Biometric Open Protocol Standard (BOPS) provides Identity Assertion, Role Gathering, Multi-Level Access Control, Assurance, and Auditing. The BOPS includes software running on a client device (Android, iPhone, etc.), a trusted BOPS Server, and an Intrusion Detection(IDS) system. The BOPS allows pluggable components to replace existing components functionality accepting integration into current operating environments in a short period of time. The ...


The open protocol standard for computerized building systems: BACnet

Proceedings of the 1999 IEEE International Conference on Control Applications (Cat. No.99CH36328), 1999

BACnet spent nine years under development by a committee drawn from manufacturers, universities, government agencies and consulting firms in an effort to produce a truly open protocol whereby equipment from different manufacturers can interoperate in a complete, integrated building automation control system. The result is a standard that defines all the elements of communication between devices, from the abstract language ...


The implementation of SCADA open protocol PUR 2.4

2015 First International Conference on New Technologies of Information and Communication (NTIC), 2015

As the choice of the communications protocol for a given application represents one of the most significant tasks in the development of information technical solutions, this article focuses on the high level open protocol of SCADA systems: PUR 2.4, as well as its implementation and the design of a RTU TESTER and the conception of a RTU.


IEEE Standard for Biometric Open Protocol

IEEE Std 2410-2015, 2015

Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device (smartphone or mobile device), a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components functionality, accepting integration into current operating environments in ...


More Xplore Articles

Educational Resources on Open Protocol

Back to Top

IEEE-USA E-Books

  • IEEE Standard for Biometric Open Protocol

    Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device (smartphone or mobile device), a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components functionality, accepting integration into current operating environments in a short period of time. The BOPS implementation provides continuous protection to the resources and assurance of the placement and viability of adjudication and other key features. Accountability is the mechanism that proves a service- level guarantee of security. The BOPS implementation allows the systems to meet security needs by using the application programming interface. The BOPS implementation need not know whether the underlying system is a relational database management system or a search engine. The BOPS implementation functionality offers a point-and-cut mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is language neutral, allowing Representational State Transfer (REST), JavaScript Object Notation (JSON), and Secure Sockets Layer (SSL) or Transport Layer Security to provide the communication interface. The architecture is built on the servlet specification, open SSLs, Java, JSON, REST, and an open persistent store. All tools adhere to open standards, allowing maximum interoperability.

  • IEEE Draft Biometrics Open Protocol Standard

    Biometric Open Protocol Standard (BOPS) provides Identity Assertion, Role Gathering, Multi-Level Access Control, Assurance, and Auditing. The BOPS includes software running on a client device (Android, iPhone, etc.), a trusted BOPS Server, and an Intrusion Detection(IDS) system. The BOPS allows pluggable components to replace existing components functionality accepting integration into current operating environments in a short period of time. The BOPS provides continuous protection to the resources and assurance of the placement and viability of adjudication, and other key features. Accountability is the mechanism that proves a service level guarantee of security. The BOPS allows the systems to meet security needs by using the API.The BOPS need not know whether the underlying system is a Relational Database Management System (RDBMS) or a Search Engine. The BOPS functionality offers a point and cut mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is a language neutral allowing REST, JSON and Secure Socket Layers(SSL) to provide the communication interface. The architecture is built on the servlet specification, open secure socket layers, Java, JSON, REST and Apache Solr. Each and every tool adheres to the open standards allowing maximum interoperability.

  • The open protocol standard for computerized building systems: BACnet

    BACnet spent nine years under development by a committee drawn from manufacturers, universities, government agencies and consulting firms in an effort to produce a truly open protocol whereby equipment from different manufacturers can interoperate in a complete, integrated building automation control system. The result is a standard that defines all the elements of communication between devices, from the abstract language of objects and services right down to the physical LANs. With its adoption as an ANSI standard and the interest shown world-wide, it is safe to say that BACnet points the way to the future of communication within building automation controls.

  • The implementation of SCADA open protocol PUR 2.4

    As the choice of the communications protocol for a given application represents one of the most significant tasks in the development of information technical solutions, this article focuses on the high level open protocol of SCADA systems: PUR 2.4, as well as its implementation and the design of a RTU TESTER and the conception of a RTU.

  • IEEE Standard for Biometric Open Protocol

    Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device (smartphone or mobile device), a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components functionality, accepting integration into current operating environments in a short period of time. The BOPS implementation provides continuous protection to the resources and assurance of the placement and viability of adjudication and other key features. Accountability is the mechanism that proves a service- level guarantee of security. The BOPS implementation allows the systems to meet security needs by using the application programming interface. The BOPS implementation need not know whether the underlying system is a relational database management system or a search engine. The BOPS implementation functionality offers a point-and-cut mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is language neutral, allowing Representational State Transfer (REST), JavaScript Object Notation (JSON), and Secure Sockets Layer (SSL) or Transport Layer Security to provide the communication interface. The architecture is built on the servlet specification, open SSLs, Java, JSON, REST, and an open persistent store. All tools adhere to open standards, allowing maximum interoperability.

  • IEEE Standard for Biometric Open Protocol

    Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device, a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components functionality, accepting integration into current operating environments in a short period of time. The BOPS implementation provides continuous protection to the resources and assurance of the placement and viability of adjudication and other key features. Accountability is the mechanism that proves a service-level guarantee of security. The BOPS implementation allows the systems to meet security needs by using the application programming interface. The BOPS implementation need not know whether the underlying system is a relational database management system or a search engine. The BOPS implementation functionality offers a point-and-cut mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is language neutral, allowing Representational State Transfer (REST), JavaScript Object Notation (JSON), and Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to provide the communication interface. The architecture is built on the servlet specification, open SSLs, Java, JSON, REST, and an open persistent store. All tools adhere to open standards, allowing maximum interoperability.

  • Research on the implement of e-Business value chain based on the business process under the open protocol

    Like the method of connecting different kinds of computers by the network protocol in the world, this paper explores the mechanism of the structure value chain to implement collaborative commerce from the perspective of business process integration through integrating various application systems (such as e-business, ERP, supply chain, MIS etc.) by semantic-based standards and criterion.

  • An object-oriented real-time open protocol (EWIT)

    EWIT (electronic "wheel" information technology) is a non-programmable microprocessor-based digital datamation provided as a dedicated three control units (for resources, processes and feedback data in general protocol model) associated with individual metrological instruments in every production and service company with line stable recurrent technology which operates 24 hours a day, i.e., within behaviouristic control loop (BCL). It is based on the "stability and utility" concept (initial postulate and 11 axioms), which has been formulated after 3-D stochastic model of rational behavior (SMRB)-building. SMRB-based digital software disclosure is the macrobusiness standard frequency (MSF) within BCL. The final standard, flexible, feedback output can be used in a capable of macrobusiness activity, automation, management, budgeting, and standard data highway protocol, which meets ISO-OSI 7-layers protocol model. The classic control theory (vital control loop, VCL) is beyond EWIT statistical-economic world within BCL. The critical support is N. Wiener's (1948) prophetical requirements to nonprogrammable "taping machines". Some examples of practical solutions are presented (billing automation, etc.).

  • An open, NFC enabler independent Mobile payment and identification method: NFC feature box

    The use of Mobile Devices for electronic payment has increased significantly in the last decade. Near Field Communication (NFC) mobile payment is gaining popularity and it is widely considered to be the technology that will turn smartphones into m-wallets. While a typical wallet contains identification, loyalty, public transport and credit cards, m-wallet solutions currently have well-defined standards for credit card enrollment and usage only. In this thesis, we explore and present the main reason for this limitation. Then, we introduce a new method for using the Secure Element (SE) inside the NFC Phones which allows standard enrollment and usage for proprietary payment and identification schemes. We also explain the practical use our model by presenting well-known proprietary payment scenarios such as public transport payment. This study makes significant contributions to NFC technology by proposing a method for proprietary transaction flows that can be used in parallel with NFC credit card payment solutions. Furthermore, it provides an open protocol which can serve as an NFC payment and identification transaction execution standard.

  • IEEE Approved Draft Standard for Biometric Open Protocol

    Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device and software running on a BOPS server. The BOPS implementation allows pluggable components to replace existing components’ functionality, accepting integration into current operating environments in a short period of time. The BOPS implementation allows the systems to meet security needs by using the application programming interface. The BOPS implementation need not know whether the underlying system is a relational database management system or a search engine. The BOPS implementation functionality offers a “point-and-cut” mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is language neutral, allowing Representational State Transfer (REST), JavaScript Object Notation (JSON), and Secure Sockets Layer (SSL) or Transport Layer Security to provide the communication interface. BOPS III enhances BOPS to include homomorphic encryption and a tremendous simplification of the API. The biometric payload is always one-way encrypted with no need for key management. A plaintext biometric is never received by the BOPS server and therefore privacy is guaranteed. BOPS assumes a greater security framework, whether it is Single Sign On (SSO) protocol (Active Directory, Google, Facebook) and BOPS supports the given framework with a simple 3 API interface. This document describes the essential methodology to BOPS III



Standards related to Open Protocol

Back to Top

IEEE Standard for Data Delivery and Logical Channels for IEEE Std 1284 Interfaces

The packet protocol described by this standard allows a device to carry on multiple, concurrent exchanges of data and/or control information with another device across a single point-to-point link. the protocol is not a device control language. The protocol provides basic transportlevel flow control and multiplexing services. The multiplexed information exchanges are independent and blocking of one has no effect ...


IEEE Standard for Information Technology - POSIX Ada Language Interfaces - Part 1: Binding for System Application Program Interface (API)

This document is part of the POSIX series of standards for applications and user interfaces to open systems. It defines the Ada language bindings as package specifications and accompanying textual descriptions of the applications program interface (API). This standard supports application portability at the source code level through the binding between ISO 8652:1995 (Ada) and ISO/IEC 9945-1:1990 (IEEE Std 1003.1-1990 ...


IEEE Standard for Medical Device Communications - Physical Layer Interface - Cable Connected



Jobs related to Open Protocol

Back to Top