Conferences related to IEEE Policy and Procedures

Back to Top

2023 Annual International Conference of the IEEE Engineering in Medicine & Biology Conference (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.


2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting

The joint meeting is intended to provide an international forum for the exchange of information on state of the art research in the area of antennas and propagation, electromagnetic engineering and radio science


2020 59th IEEE Conference on Decision and Control (CDC)

The CDC is the premier conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, automatic control, and related areas.


2020 IEEE 29th International Symposium on Industrial Electronics (ISIE)

ISIE focuses on advancements in knowledge, new methods, and technologies relevant to industrial electronics, along with their applications and future developments.


2020 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)

All topics related to engineering and technology management, including applicable analytical methods and economical/social/human issues to be considered in making engineering decisions.


More Conferences

Periodicals related to IEEE Policy and Procedures

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Automation Science and Engineering, IEEE Transactions on

The IEEE Transactions on Automation Sciences and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. We welcome results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, ...


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


More Periodicals

Most published Xplore authors for IEEE Policy and Procedures

Back to Top

No authors for "IEEE Policy and Procedures"


Xplore Articles related to IEEE Policy and Procedures

Back to Top

Noise removal from binary patterns by using line adjacency graphs

Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 1994

This paper proposes heuristic procedures to remove noise from character patterns. Most noise removal procedures described in the literature, succeed in removing only small isolated pieces of noise, called preliminary noise. These algorithms determine whether a given pixel is salt or pepper noise based on the local distribution of the pixels. Our procedures can remove larger chunks of noise (called ...


Design of hierarchical keys for a multi-user-based watermarking system

2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763), 2004

For a multi-user-based watermarking system, a new scheme for providing the function of secret sharing is proposed. A user-key generating procedure is introduced to generate one master key and several normal keys. By using either of these normal keys, a secret watermark is obtained from the cover image. By referring to the original watermark and all the generated secret watermarks, ...


Eliminating non-traversable paths from structured programs

Proceedings Conference on Software Maintenance 1992, 1992

A formal procedure is given based on the use of regular expressions, to identify and eliminate nontraversable paths in a structured program. By reducing the use of control variables, the program is transformed into an unstructured variant and then restructured into a semantic equivalent of the original program with nontraversable paths eliminated. The authors demonstrate this procedure with an example ...


A Systematized Approach to Human Properties in Complex Systems

Proceedings of the 1988 IEEE International Conference on Systems, Man, and Cybernetics, 1988

The study of human properties in complex systems is a central problem in the development of 'Complex system theory'. Due to the complexity of this problem, there has been no a general theory to deal with it. In this paper, we develop a general framework to link all the complicated human properties in complex systems. The basic idea of this ...


Hardware support for efficient execution of Ada tasking

[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume I: Architecture Track, 1988

Several aspects of run-time support for Ada that contribute to the efficiency of the implementation are discussed. To fully support Ada, including efficient tasking, hardware support is needed. A simple method for identifying the parts of the run-time system that are good candidates for hardware support is described and used to identify three areas in which support is needed. Two ...


More Xplore Articles

Educational Resources on IEEE Policy and Procedures

Back to Top

IEEE-USA E-Books

  • Noise removal from binary patterns by using line adjacency graphs

    This paper proposes heuristic procedures to remove noise from character patterns. Most noise removal procedures described in the literature, succeed in removing only small isolated pieces of noise, called preliminary noise. These algorithms determine whether a given pixel is salt or pepper noise based on the local distribution of the pixels. Our procedures can remove larger chunks of noise (called postliminary noise) such as holes and specks. For our procedures to be effective, we employed both black line adjacency graphs (LAGs) and white LAGs, where white LAGs are our extension of the well-known black LAGs. By doing so, we have experimentally observed that, the noise-free image of the pattern is of a far better quality.<<ETX>>

  • Design of hierarchical keys for a multi-user-based watermarking system

    For a multi-user-based watermarking system, a new scheme for providing the function of secret sharing is proposed. A user-key generating procedure is introduced to generate one master key and several normal keys. By using either of these normal keys, a secret watermark is obtained from the cover image. By referring to the original watermark and all the generated secret watermarks, a public watermark is created and embedded into the cover image. The proposed scheme does not require the original image to be presented during extracting. To reveal the genuine watermark from the watermarked image, except for the super-user who can extract it directly by using the master key, the normal users who share the secret can only achieve it by presenting the shadow watermarks extracted by using their own keys

  • Eliminating non-traversable paths from structured programs

    A formal procedure is given based on the use of regular expressions, to identify and eliminate nontraversable paths in a structured program. By reducing the use of control variables, the program is transformed into an unstructured variant and then restructured into a semantic equivalent of the original program with nontraversable paths eliminated. The authors demonstrate this procedure with an example and discuss its maintenance advantages.<<ETX>>

  • A Systematized Approach to Human Properties in Complex Systems

    The study of human properties in complex systems is a central problem in the development of 'Complex system theory'. Due to the complexity of this problem, there has been no a general theory to deal with it. In this paper, we develop a general framework to link all the complicated human properties in complex systems. The basic idea of this approach is as follow, first, human properties in complex systems are classified according to the three-level theory of human behaviors then, the detailed theories for each level behaviors are developed finally, human properties in complex systems are studied by these detailed theories. In the first part of this paper, the three-level theory of human behaviors is reviewed briefly. Then human properties In a concrete complex system -- C system -- are analysed very briefly. In the second part, a new theory - an Information model for human activities in complex systems -- is developed in some details which can be used to study the rate-based and knowledge-based behaviors of human beings In complex systems. Finally, a practical system -- the Combat Planning Division In Tactical Air Control Center -- is represented in the framework of this information model.

  • Hardware support for efficient execution of Ada tasking

    Several aspects of run-time support for Ada that contribute to the efficiency of the implementation are discussed. To fully support Ada, including efficient tasking, hardware support is needed. A simple method for identifying the parts of the run-time system that are good candidates for hardware support is described and used to identify three areas in which support is needed. Two kinds of smart queue memory are proposed and shown to give substantial support for Ada implementation.<<ETX>>

  • Restructuring and simplifying rule bases

    Rule bases are commonly acquired, by an expert and/or knowledge engineer, in a form which is well-suited for acquisition purposes. When the knowledge base is executed, however, a different structure may be required. Moreover, since human experts normally do not provide the knowledge in compact chunks, rule bases often suffer from redundancy. This may considerably harm their efficiency. In this paper, a procedure is examined to transform rules that are specified in the knowledge acquisition process into an efficient rule base by way of decision tables. This transformation algorithm allows the generation of a minimal rule representation of the knowledge, and verification and optimization of rule bases and other specifications (e.g. legal texts, procedural descriptions). The proposed procedures are fully supported by the PROLOGA tool.

  • Comparison of distribution transformer losses and capacity under linear and harmonic loads

    The significance of harmonics in power systems has increased substantially due to the use of solid state controlled loads and other high frequency producing devices. An important consideration when evaluating the impact of harmonics is their effect on power system components and loads. Transformers are major components in power systems. Supplying non-linear loads by transformer leads to higher losses, early fatigue of insulation, and reduction of the useful life of transformer. To prevent these problems rated capacity of transformer supplying non-linear loads must be reduced. This paper reviews the non linear loads effects on the transformers and the standard IEEE procedures for derating of the transformers which are under distorted currents. The equivalent losses and capacity of a typical 25 KVA single phase transformer is then evaluated using analysis and simulations in MATLAB/Simulink-based on useful model of transformer under harmonic condition- and results are compared.

  • Using R-trees in content-based region query with spatial bounds

    This paper presents both theoretically and experimentally the advantages of using R-trees in content-based region query with spatial bounds. This advantage consists in the minimizing of the execution time. This process supposes that the user gives a rectangle by its coordinates in order to retrieve the images that are within these spatial bounds. The color regions of the images together with the information like color, area, the coordinates of the center of mass and the coordinates of the minimum bounding rectangle (MBR) have been already detected and stored in the database by using color set back- projection algorithm. There are presented a series of experiments in which the execution time of content-based region query with spatial bounds is measured in two cases: sequence query and the query using a R-tree that indexes the MBRs which frame the regions in the database.

  • Temporal event analysis and program understanding

    A temporal event analysis approach to program understanding is described. Program understanding is viewed as a sequence of episodes in which the programmer concludes that an informal event occurs that corresponds to some part of the code. This can be viewed as accepting that the code is an adequate definition of the meaning of the informal event. Often, such a definition is contingent upon working hypotheses that describe other informal program properties that should be verified in order to confirm the validity of the understanding process. Verification of working hypotheses may depend on the formulation of additional definitions or working hypotheses. The understanding process can be assisted through the use of a documentation language for describing events and hypotheses, and a hypothesis verification tool. The paper describes a temporal event language in which hypotheses are formulated in terms of expected event sequences. A hypothesis verification tool was built, and experimentation was carried out on a set of programs. The tool was found to be very useful in understanding the detailed, control oriented aspects of a program. Program faults were discovered in every program that was analyzed, indicating that it facilitates a deep level of understanding.

  • Minimum-cost synchronizable test sequence generation via the duplexU digraph

    A test sequence generation method is proposed for testing the conformance of a protocol implementation to its specification in a remote testing system, taking both external synchronization and input/output operation costs into consideration. The method consists of a set of transformation rules that constructs a duplexU digraph from a given finite state machine (FSM) representation of a protocol specification and a heuristic algorithm that finds a rural postman tour in the duplexU digraph to generate a synchronizable test sequence utilizing multiple UIO sequences. If the protocol satisfies a specific property, the heuristic algorithm yields a minimum-cost test sequence. The X.25 DTE and ISO Class 0 Transport protocols are proved to possess this specific property. otherwise, the heuristic algorithm yields a test sequence whose cost is within a bound from the cost of the minimum-cost test sequence. The bound for the test sequence generated from the Q.931 Network-side protocol is shown to be the cost sum of an input/output operation and an external synchronization operation.<<ETX>>



Standards related to IEEE Policy and Procedures

Back to Top

Standard for Information Technology -Telecommunications and information exchange between systems – Wireless Regional Area Networks (WRAN) - Specific requirements - Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands

This standard specifies the air interface, including the medium access control layer (MAC) and physical layer (PHY), of fixed point-to-multipoint wireless regional area networks operating in the VHF/UHF TV broadcast bands between 54 MHz and 862 MHz.



Jobs related to IEEE Policy and Procedures

Back to Top