IEEE Policy and Procedures
177 resources related to IEEE Policy and Procedures
- Topics related to IEEE Policy and Procedures
- IEEE Organizations related to IEEE Policy and Procedures
- Conferences related to IEEE Policy and Procedures
- Periodicals related to IEEE Policy and Procedures
- Most published Xplore authors for IEEE Policy and Procedures
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.
2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting
The joint meeting is intended to provide an international forum for the exchange of information on state of the art research in the area of antennas and propagation, electromagnetic engineering and radio science
The CDC is the premier conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, automatic control, and related areas.
ISIE focuses on advancements in knowledge, new methods, and technologies relevant to industrial electronics, along with their applications and future developments.
All topics related to engineering and technology management, including applicable analytical methods and economical/social/human issues to be considered in making engineering decisions.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
The IEEE Transactions on Automation Sciences and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. We welcome results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, ...
Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.
Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 1994
This paper proposes heuristic procedures to remove noise from character patterns. Most noise removal procedures described in the literature, succeed in removing only small isolated pieces of noise, called preliminary noise. These algorithms determine whether a given pixel is salt or pepper noise based on the local distribution of the pixels. Our procedures can remove larger chunks of noise (called ...
2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763), 2004
For a multi-user-based watermarking system, a new scheme for providing the function of secret sharing is proposed. A user-key generating procedure is introduced to generate one master key and several normal keys. By using either of these normal keys, a secret watermark is obtained from the cover image. By referring to the original watermark and all the generated secret watermarks, ...
Proceedings Conference on Software Maintenance 1992, 1992
A formal procedure is given based on the use of regular expressions, to identify and eliminate nontraversable paths in a structured program. By reducing the use of control variables, the program is transformed into an unstructured variant and then restructured into a semantic equivalent of the original program with nontraversable paths eliminated. The authors demonstrate this procedure with an example ...
Proceedings of the 1988 IEEE International Conference on Systems, Man, and Cybernetics, 1988
The study of human properties in complex systems is a central problem in the development of 'Complex system theory'. Due to the complexity of this problem, there has been no a general theory to deal with it. In this paper, we develop a general framework to link all the complicated human properties in complex systems. The basic idea of this ...
 Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume I: Architecture Track, 1988
Several aspects of run-time support for Ada that contribute to the efficiency of the implementation are discussed. To fully support Ada, including efficient tasking, hardware support is needed. A simple method for identifying the parts of the run-time system that are good candidates for hardware support is described and used to identify three areas in which support is needed. Two ...
Introductions: Experts in Technology and Policy (ETAP) Forum on Internet Governance, Cybersecurity and Privacy - February 2016
Introductions - ETAP San Jose 2015
2020 Intro and Use Cases: IEEE Collabratec
Good Health Care, Good Engineering:
IEEE Standards Presents: Case Study 515-(English)
IEEE Standards Presents: Case Study 515 (Chinese)
How To Get Congress To Give You $240 Billion
Tech Super Stars Panelist - Karen Bartleson: 2016 Technology Time Machine
Summary and Next Steps - Internet Inclusion: Global Connect Stakeholders Advancing Solutions, Washington DC, 2016
A Conversation About the Social and Personal Impacts of AI: IEEE TechEthics Interview
Vehicle Electrification Technology Policy
The Social and Personal Impacts of AI: IEEE TechEthics Panel
IEEE Internet Initiative
EMBC 2011-Keynote Lectures and Panel Discussion-PT IV-Discussion
Article Posting Policy: IEEE Author Education
AuthorLab: Featuring the IEEE Author Posting Policy
ETAP Forum Wrap-Up: Maike Luiken - ETAP Forum Namibia, Africa 2017
IEEE Whitepaper Presented by Prasad Mantri at Internet Inclusion: Advancing Solutions, Delhi, 2016
IEEE Green Energy Summit 2015: Closing Remarks
This paper proposes heuristic procedures to remove noise from character patterns. Most noise removal procedures described in the literature, succeed in removing only small isolated pieces of noise, called preliminary noise. These algorithms determine whether a given pixel is salt or pepper noise based on the local distribution of the pixels. Our procedures can remove larger chunks of noise (called postliminary noise) such as holes and specks. For our procedures to be effective, we employed both black line adjacency graphs (LAGs) and white LAGs, where white LAGs are our extension of the well-known black LAGs. By doing so, we have experimentally observed that, the noise-free image of the pattern is of a far better quality.<<ETX>>
For a multi-user-based watermarking system, a new scheme for providing the function of secret sharing is proposed. A user-key generating procedure is introduced to generate one master key and several normal keys. By using either of these normal keys, a secret watermark is obtained from the cover image. By referring to the original watermark and all the generated secret watermarks, a public watermark is created and embedded into the cover image. The proposed scheme does not require the original image to be presented during extracting. To reveal the genuine watermark from the watermarked image, except for the super-user who can extract it directly by using the master key, the normal users who share the secret can only achieve it by presenting the shadow watermarks extracted by using their own keys
A formal procedure is given based on the use of regular expressions, to identify and eliminate nontraversable paths in a structured program. By reducing the use of control variables, the program is transformed into an unstructured variant and then restructured into a semantic equivalent of the original program with nontraversable paths eliminated. The authors demonstrate this procedure with an example and discuss its maintenance advantages.<<ETX>>
The study of human properties in complex systems is a central problem in the development of 'Complex system theory'. Due to the complexity of this problem, there has been no a general theory to deal with it. In this paper, we develop a general framework to link all the complicated human properties in complex systems. The basic idea of this approach is as follow, first, human properties in complex systems are classified according to the three-level theory of human behaviors then, the detailed theories for each level behaviors are developed finally, human properties in complex systems are studied by these detailed theories. In the first part of this paper, the three-level theory of human behaviors is reviewed briefly. Then human properties In a concrete complex system -- C system -- are analysed very briefly. In the second part, a new theory - an Information model for human activities in complex systems -- is developed in some details which can be used to study the rate-based and knowledge-based behaviors of human beings In complex systems. Finally, a practical system -- the Combat Planning Division In Tactical Air Control Center -- is represented in the framework of this information model.
Several aspects of run-time support for Ada that contribute to the efficiency of the implementation are discussed. To fully support Ada, including efficient tasking, hardware support is needed. A simple method for identifying the parts of the run-time system that are good candidates for hardware support is described and used to identify three areas in which support is needed. Two kinds of smart queue memory are proposed and shown to give substantial support for Ada implementation.<<ETX>>
Rule bases are commonly acquired, by an expert and/or knowledge engineer, in a form which is well-suited for acquisition purposes. When the knowledge base is executed, however, a different structure may be required. Moreover, since human experts normally do not provide the knowledge in compact chunks, rule bases often suffer from redundancy. This may considerably harm their efficiency. In this paper, a procedure is examined to transform rules that are specified in the knowledge acquisition process into an efficient rule base by way of decision tables. This transformation algorithm allows the generation of a minimal rule representation of the knowledge, and verification and optimization of rule bases and other specifications (e.g. legal texts, procedural descriptions). The proposed procedures are fully supported by the PROLOGA tool.
The significance of harmonics in power systems has increased substantially due to the use of solid state controlled loads and other high frequency producing devices. An important consideration when evaluating the impact of harmonics is their effect on power system components and loads. Transformers are major components in power systems. Supplying non-linear loads by transformer leads to higher losses, early fatigue of insulation, and reduction of the useful life of transformer. To prevent these problems rated capacity of transformer supplying non-linear loads must be reduced. This paper reviews the non linear loads effects on the transformers and the standard IEEE procedures for derating of the transformers which are under distorted currents. The equivalent losses and capacity of a typical 25 KVA single phase transformer is then evaluated using analysis and simulations in MATLAB/Simulink-based on useful model of transformer under harmonic condition- and results are compared.
This paper presents both theoretically and experimentally the advantages of using R-trees in content-based region query with spatial bounds. This advantage consists in the minimizing of the execution time. This process supposes that the user gives a rectangle by its coordinates in order to retrieve the images that are within these spatial bounds. The color regions of the images together with the information like color, area, the coordinates of the center of mass and the coordinates of the minimum bounding rectangle (MBR) have been already detected and stored in the database by using color set back- projection algorithm. There are presented a series of experiments in which the execution time of content-based region query with spatial bounds is measured in two cases: sequence query and the query using a R-tree that indexes the MBRs which frame the regions in the database.
A temporal event analysis approach to program understanding is described. Program understanding is viewed as a sequence of episodes in which the programmer concludes that an informal event occurs that corresponds to some part of the code. This can be viewed as accepting that the code is an adequate definition of the meaning of the informal event. Often, such a definition is contingent upon working hypotheses that describe other informal program properties that should be verified in order to confirm the validity of the understanding process. Verification of working hypotheses may depend on the formulation of additional definitions or working hypotheses. The understanding process can be assisted through the use of a documentation language for describing events and hypotheses, and a hypothesis verification tool. The paper describes a temporal event language in which hypotheses are formulated in terms of expected event sequences. A hypothesis verification tool was built, and experimentation was carried out on a set of programs. The tool was found to be very useful in understanding the detailed, control oriented aspects of a program. Program faults were discovered in every program that was analyzed, indicating that it facilitates a deep level of understanding.
A test sequence generation method is proposed for testing the conformance of a protocol implementation to its specification in a remote testing system, taking both external synchronization and input/output operation costs into consideration. The method consists of a set of transformation rules that constructs a duplexU digraph from a given finite state machine (FSM) representation of a protocol specification and a heuristic algorithm that finds a rural postman tour in the duplexU digraph to generate a synchronizable test sequence utilizing multiple UIO sequences. If the protocol satisfies a specific property, the heuristic algorithm yields a minimum-cost test sequence. The X.25 DTE and ISO Class 0 Transport protocols are proved to possess this specific property. otherwise, the heuristic algorithm yields a test sequence whose cost is within a bound from the cost of the minimum-cost test sequence. The bound for the test sequence generated from the Q.931 Network-side protocol is shown to be the cost sum of an input/output operation and an external synchronization operation.<<ETX>>
Standard for Information Technology -Telecommunications and information exchange between systems – Wireless Regional Area Networks (WRAN) - Specific requirements - Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands
This standard specifies the air interface, including the medium access control layer (MAC) and physical layer (PHY), of fixed point-to-multipoint wireless regional area networks operating in the VHF/UHF TV broadcast bands between 54 MHz and 862 MHz.