IEEE Organizations related to Magnetic Anomaly Detection

Back to Top

No organizations are currently tagged "Magnetic Anomaly Detection"



Conferences related to Magnetic Anomaly Detection

Back to Top

2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

FUZZ-IEEE 2021 will represent a unique meeting point for scientists and engineers, both from academia and industry, to interact and discuss the latest enhancements and innovations in the field. The topics of the conference will cover all the aspects of theory and applications of fuzzy sets, fuzzy logic and associated approaches (e.g. aggregation operators such as the Fuzzy Integral), as well as their hybridizations with other artificial and computational intelligence techniques.


2020 IEEE 29th International Symposium on Industrial Electronics (ISIE)

ISIE focuses on advancements in knowledge, new methods, and technologies relevant to industrial electronics, along with their applications and future developments.


2020 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)

The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.


2020 International Symposium on Information Theory and Its Applications (ISITA)

The scope of the symposium includes all aspects of information theory and its applications. Itcovers a wide range of topics such as Shannon Theory, Coding Theory, and InformationSecurity as well as novel applications of information theory.

  • 2018 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.

  • 2016 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.

  • 2014 International Symposium on Information Theory and its Applications (ISITA)

    The ISITA symposium features world-class speakers, plenary talks and technical sessions on a diverse range of topics within the field of information theory Interested authors are invited to submit papers describing novel and previously unpublished results on topics in information theory and its applications, including, but not limited to: Error Control Coding, Coded Modulation, Communication Systems, Detection and EstimationSpread Spectrum Systems, Signal Processing, Rate-Distortion Theory, Stochastic Processes, Network Coding, Shannon Theory, Coding Theory and Practice, Data Compression and Source Coding, Data Storage, Mobile Communications, Pattern Recognition and Learning, Speech/Image Coding, Multi-Terminal Information Theory, Cryptography and Data Security, Applications of Information Theory, and Quantum Information Theory.

  • 2012 International Symposium on Information Theory and its Applications (ISITA)

    The scope of this symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Cryptology as well as novel applications of Information Theory.

  • 2010 International Symposium On Information Theory & Its Applications (Isita2010)

    The topics of interest include Error Control Coding, Coding Theory and Practice, Coded Modulation, Data Compression and Source Coding, Pattern Recognition and Learning, Speech/Image Coding, Rate-Distortion Theory, Shannon Theory, Stochastic Processes, Cryptology and Data Security, Data Networks, Multi-User Information Theory, Quantum Information Processing

  • 2008 International Symposium on Information Theory and its Applications (ISITA)

    The scope is Information theory and its Applications, e.g., error control coding, Coded Modulation, Cummunication systems, Detection and estimation, Spread spectrum systems, Signal processing, Rate-distortion theory, Stochastic processes, Data networks, Multi-user information theory, Coding theory and Practice, Data compression and Source coding, Optical communications, Mobile communications, Pattern recognition and learning, Speech/Image Coding, Shannon Theory, Cryptograph and Data Securi


IGARSS 2020 - 2020 IEEE International Geoscience and Remote Sensing Symposium

All fields of satellite, airborne and ground remote sensing.


More Conferences

Periodicals related to Magnetic Anomaly Detection

Back to Top

No periodicals are currently tagged "Magnetic Anomaly Detection"


Most published Xplore authors for Magnetic Anomaly Detection

Back to Top

Xplore Articles related to Magnetic Anomaly Detection

Back to Top

Spatial Signature Analysis of Submarine Magnetic Anomaly at Low Altitude

IEEE Transactions on Magnetics, 2017

To study the magnetic signature of submarines and improve the performance of magnetic anomaly detectors in the antisubmarine warfare, the generation mechanism of the submarine magnetic field (SMF) is first introduced. Magnetic fields produced by submarines are classified into five major types by the cause and state of submarines. Besides, the prediction model of the SMF at low altitude is ...



Educational Resources on Magnetic Anomaly Detection

Back to Top

IEEE.tv Videos

Analytics for Anomaly detection & Classification | DSBC 2020
ISEC 2013 Special Gordon Donaldson Session: Remembering Gordon Donaldson - 5 of 7 - SQUID Instrumentation for Early Cancer Diagnostics
ASC-2014 SQUIDs 50th Anniversary: 4 of 6 - Keiji Enpuku
IEEE Magnetics 2014 Distinguished Lectures - Tim St Pierre
"What is Big Data Analytics and Why Should I Care?" - Big Data Analytics Tutorial Part 1
International Workshop on NFV, SDN, & LPWAN: HPSR 2020 Virtual Conference
ISEC 2013 Special Gordon Donaldson Session: Remembering Gordon Donaldson - 4 of 7 - MRI at 130 Microtesla
ISEC 2013 Special Gordon Donaldson Session: Remembering Gordon Donaldson - 7 of 7 - SQUID-based noise thermometers for sub-Kelvin thermometry
The Josephson Effect: SQUIDs Then and Now: From SLUGS to Axions
ASC-2014 SQUIDs 50th Anniversary: 2 of 6 - John Clarke - The Ubiquitous SQUID
Applications of Superconductivity in the Detection of Axions - Applied Superconductivity Conference 2018
IEEE Magnetics Distinguished Lecture - Mitsuteru Inoue
ASC-2014 SQUIDs 50th Anniversary: 6 of 6 - Kent Irwin - SQUIDs as detectors for cosmology
2011 IEEE Dennis J. Picard Medal for Radar Technologies and Applications - James M. Headrick
Perpendicular magnetic anisotropy: From ultralow power spintronics to cancer therapy
A Discussion on Hard Drives
An FPGA-Quantum Annealer Hybrid System for Wide-Band RF Detection - IEEE Rebooting Computing 2017
Multi-Function VCO Chip for Materials Sensing and More - Jens Reinstaedt - RFIC Showcase 2018
Magnetic Nanowires: Revolutionizing Hard Drives, RAM, and Cancer Treatment
HYUNSOO YANG - IEEE Magnetics Distinguished Lecture

IEEE-USA E-Books

  • Spatial Signature Analysis of Submarine Magnetic Anomaly at Low Altitude

    To study the magnetic signature of submarines and improve the performance of magnetic anomaly detectors in the antisubmarine warfare, the generation mechanism of the submarine magnetic field (SMF) is first introduced. Magnetic fields produced by submarines are classified into five major types by the cause and state of submarines. Besides, the prediction model of the SMF at low altitude is proposed. Based on the surface integral method, the continuation formula of the magnetic field is derived from the vector potential. According to the magnetic field of a real mockup, the distribution of the SMF is obtained by the continuation formula, and the data of the magnetic anomaly caused by submarines are produced at different heights. Then, the spatial signature of the magnetic anomaly is analyzed. The result of analysis shows that the magnetic anomaly of ferromagnetic submarines has evident characteristics. The distribution of the magnetic anomaly is spatially symmetrical, and the peak values of its components and total field occur in special positions. Furthermore, the signal strength of the magnetic anomaly is sufficiently large to be detected. So the identification of underwater magnetic target can be realized by the special magnetic signature.



Standards related to Magnetic Anomaly Detection

Back to Top

No standards are currently tagged "Magnetic Anomaly Detection"


Jobs related to Magnetic Anomaly Detection

Back to Top