Conferences related to Uniform resource locators

Back to Top

2020 22nd European Conference on Power Electronics and Applications (EPE'20 ECCE Europe)

Energy conversion and conditioning technologies, power electronics, adjustable speed drives and their applications, power electronics for smarter grid, energy efficiency,technologies for sustainable energy systems, converters and power supplies


2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC)

All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation


Oceans 2020 MTS/IEEE GULF COAST

To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.

  • OCEANS 2018 MTS/IEEE Charleston

    Ocean, coastal, and atmospheric science and technology advances and applications

  • OCEANS 2017 - Anchorage

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorials on ocean technology, workshops and town meetings on policy and governmental process.

  • OCEANS 2016

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 500 technical papers and 150 -200 exhibits.

  • OCEANS 2015

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2014

    The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2013

    Three days of 8-10 tracks of technical sessions (400-450 papers) and concurent exhibition (150-250 exhibitors)

  • OCEANS 2012

    Ocean related technology. Tutorials and three days of technical sessions and exhibits. 8-12 parallel technical tracks.

  • OCEANS 2011

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2010

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2009

  • OCEANS 2008

    The Marine Technology Society (MTS) and the Oceanic Engineering Society (OES) of the Institute of Electrical and Electronic Engineers (IEEE) cosponsor a joint conference and exposition on ocean science, engineering, education, and policy. Held annually in the fall, it has become a focal point for the ocean and marine community to meet, learn, and exhibit products and services. The conference includes technical sessions, workshops, student poster sessions, job fairs, tutorials and a large exhibit.

  • OCEANS 2007

  • OCEANS 2006

  • OCEANS 2005

  • OCEANS 2004

  • OCEANS 2003

  • OCEANS 2002

  • OCEANS 2001

  • OCEANS 2000

  • OCEANS '99

  • OCEANS '98

  • OCEANS '97

  • OCEANS '96


2018 14th IEEE International Conference on Signal Processing (ICSP)

ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


More Conferences

Periodicals related to Uniform resource locators

Back to Top

Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Uniform resource locators

Back to Top

No authors for "Uniform resource locators"


Xplore Articles related to Uniform resource locators

Back to Top

BEACON TECHNOLOGY WITH IoT AND BIG DATA

Internet of Things and Data Analytics Handbook, None

The history of beacons starts a long time ago as a way to signal over long distances using fire or later light houses. Beacons, as pertains to the Internet of Things (IoT), started with bluetooth and accelerated with advancement to bluetooth low energy (BLE), now referred to as bluetooth smart. The bluetooth protocol has been around for many years enabling ...


A Fuzzy Approach to Ranking Hyperlinks

Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), 2007

This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and ...


Hard sets are hard to find

Proceedings. Thirteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat. No.98CB36247), 1998

We investigate the frequency of complete sets for various complexity classes within EXP under several polynomial-time reductions in the sense of resource bounded measure. We show that these sets are scarce: The sets that are complete under /spl les/(n/sup /spl alpha//-tt/sup -/)/sup P/ reductions for NP, the levels of the polynomial-time hierarchy, and PSPACE have p/sub 2/-measure zero for any ...


Live Demo: Sensor network system for rainwater grid: APCCAS track selection: System and networks for safe and secure life

2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 2014

We have proposed a water disaster prevention mesh network - Rainwater Grid (RGS) [1]. It utilizes the water storage function of tanks to temporarily store rain water during heavy rainfalls. This will reduce the amount of water flowing into the rivers and the ground and suppress the flood damage. In this paper, we explain our design and development of the ...


Classification of HTTP automated software communication behaviour using NoSql database

2016 International Conference on Electronics, Information, and Communications (ICEIC), 2016

Application layer attacks pose an ever serious threat to network security for years since it always comes after a technically legitimate connection has been established. In recent years, cyber criminals turn to fully exploit web as a medium of communication environment to lurk a variety of forbidden or illicit activities through spreading malicious automated software(auto-ware) such as adware, spyware or ...


More Xplore Articles

Educational Resources on Uniform resource locators

Back to Top

IEEE-USA E-Books

  • BEACON TECHNOLOGY WITH IoT AND BIG DATA

    The history of beacons starts a long time ago as a way to signal over long distances using fire or later light houses. Beacons, as pertains to the Internet of Things (IoT), started with bluetooth and accelerated with advancement to bluetooth low energy (BLE), now referred to as bluetooth smart. The bluetooth protocol has been around for many years enabling wireless transfer of data including both audio and video by the creation of a sharable wireless personal network. The data attained from a person's corporate ID can be combined with information about their movement, who they are meeting with, and cross referenced against other members of their team. Big data is about using large data sets to predict and reveal patterns in human behavior. This is where indoor location and positioning can help everything from Marketers to UN peace keepers understand situations better and react accordingly.

  • A Fuzzy Approach to Ranking Hyperlinks

    This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and using the calculated fuzzy memberships as class weights when calculating the fuzzy averaged Q values that map hyperlinks to future discounted rewards. The candidate hyperlinks are ranked according to their corresponding fuzzy averaged Q values, and the hyperlink with the optimal Q value is the best one to be crawled in the next step. Experiments of topic crawling tasks have shown FOA collects high harvest rate.

  • Hard sets are hard to find

    We investigate the frequency of complete sets for various complexity classes within EXP under several polynomial-time reductions in the sense of resource bounded measure. We show that these sets are scarce: The sets that are complete under /spl les/(n/sup /spl alpha//-tt/sup -/)/sup P/ reductions for NP, the levels of the polynomial-time hierarchy, and PSPACE have p/sub 2/-measure zero for any constant /spl alpha/<1. The /spl les/(n/sup c/-T)/sup P/-complete sets for EXP have p/sub 2/-measure zero for any constant c. Assuming MA/spl ne/EXP, the /spl les//sub tt//sup P/-complete sets for EXP have p-measure zero. A key ingredient is the Small Span Theorem, which states that for any set A in EXP at least one of its lower span (i.e., the sets that reduce to A) or its upper span (i.e., the sets that A reduces to) has p/sub 2/-measure zero. Previous to our work, the theorem was only known to hold for /spl les//sub btt//sup p/-reductions. We establish it for /spl les/(n/sup 0/(1)-tt)/sup p/-reductions.

  • Live Demo: Sensor network system for rainwater grid: APCCAS track selection: System and networks for safe and secure life

    We have proposed a water disaster prevention mesh network - Rainwater Grid (RGS) [1]. It utilizes the water storage function of tanks to temporarily store rain water during heavy rainfalls. This will reduce the amount of water flowing into the rivers and the ground and suppress the flood damage. In this paper, we explain our design and development of the Smart Rainwater Tank System (SRT). We have confirmed that the system continuously monitors the water level of the tank, stores data and visualizes it as a webpage[2]. It will be pre-discharge when heavy rainfall is predicted. This prediction will be made by pattern recognition of weather data by Self Organized Map (SOM). Live Demo shows to sensing and control of the multiple model tanks as Rainwater Grid System. This concept is recently proposed as Distributed Multi- purpose Civil Dam and is advanced.

  • Classification of HTTP automated software communication behaviour using NoSql database

    Application layer attacks pose an ever serious threat to network security for years since it always comes after a technically legitimate connection has been established. In recent years, cyber criminals turn to fully exploit web as a medium of communication environment to lurk a variety of forbidden or illicit activities through spreading malicious automated software(auto-ware) such as adware, spyware or bot. When these malicious auto-ware infect into a user network, they will act like robot and mimic normal behaviour web access to bypass network firewall or IDS. Besides that, in a private and large network, with huge HTTP traffic generated each day, communication behaviour identification and also classification of auto-ware is really a great challenge. In this paper, based on the previous study and analysis of the auto-ware communication behaviour and addition new features, a method classification of HTTP autoware communication is proposed. In that, a NoSql database is applied to handle with large volume unstructured HTTP requests captured every day. The method is experimented with real HTTP traffic data collected through a proxy server of a private network, from which good results are archived in classification and detection of suspicious auto-ware web access.

  • Reference model for data interchange standards

    The World Wide Web (WWW) is based on the simple assumption that all documents are represented in a standard format using copymarks that denote structure as defined by HyperText Markup Language. They use a standard document identification scheme, a URL (uniform resource locator) and a standard retrieval form, HTTP (hypertext transfer protocol). The HTML, URL, and HTTP standards are simplifications of the more comprehensive standards on which they are based. Even with this simplicity, WWW document interchange standards have dramatically improved the exchange of electronic information. These developments are encouraging, but they indicate that we must pay even more attention to data interchange standards in general and to document interchange standards specifically. The author discusses the need for more formal data interchange standardization.

  • Reciprocal Rank-Based Comparison of Ordered Gene Lists

    There is growing interest in using rank-ordered gene lists to avoid excessive dependence on measured gene expression levels, which can vary strongly across experiments, platforms, or analysis methods. As a useful tool for working with these lists, this paper describes two extensions of an ordered list comparison measure, recently proposed for comparing Internet search engines: the use of random permutations to assess the significance of differences between ordered lists, and a graphical extension that highlights the items responsible for the main differences between two lists. The method is illustrated for a prostate cancer example from the genomics literature.

  • Performance improvement for navigating named destinations in PDF documents

    PDF (Portable Document Format) documents have become popular in recent times. PDF documents have named destinations that have reference to info like page number, zoom level, scale factor etc. These named destinations should be resolved when user loads URL with named destination or select link in the PDF. Resolving named destinations in PDF is taking more time that affects response time in PDF after user selection or resolving named destination at the URL load time for rendering PDF in Chrome Browser. In this paper, we present a new dictionary based novel solution for improving time to resolve named destinations. Dictionary is the map of named destinations and corresponding page number in the PDF document. We then present the results of some tests on the purposed approach with the already existing approach to show that the purposed approach performs better compared to existing approach while creation of named destinations dictionary does not take significant time. We conclude that our algorithm can perform better as asynchronous message passing is avoided and we have access to page number corresponding to the named destination in constant time and in synchronous manner.

  • An efficient Montgomery exponentiation algorithm for public-key cryptosystems

    The well-know binary method is a generally acceptable method for modular exponentiation in public-key cryptosystems. In this paper, we propose a new binary exponentiation algorithm, which is based on common-multiplicand method, Montgomery modular reduction algorithm, signed-digit recoding technique, and binary exponentiation algorithm. The common-multiplicand technique is developed to solve the problem common-multiplicand multiplications, i.e., the same common part in two modular multiplications can be computed once rather twice. The ldquosigned-digit recodingrdquo has less occurrence probability of the nonzero digit than binary representation. Due to this advantage, we can efficiently lower down the amount of modular multiplications and we can therefore decrease the computational complexity of modular exponentiation. By using the proposed algorithm, the total number of multiplications can be reduced by about 66.7% as compared with the original Montgomery modular reduction algorithm.

  • Trajectory control based on a modified Elman neural network

    We propose a modified Elman neural network (MENN)-based trajectory control scheme. Our approach consists of two stages: a MENN is first employed to identify the nonlinear plant to be controlled, and acts as the dynamical simulator of the plant after identification. The second MENN is then used to control the plant within the desired trajectory by backpropagating the control error through the simulator to update its weights. The application of this proposed method in the trajectory control of the inverted pendulum is illustrated. A simulation experiment demonstrates that our MENN-based trajectory control scheme can perform successful tracking without knowing prior knowledge of the plant.



Standards related to Uniform resource locators

Back to Top

No standards are currently tagged "Uniform resource locators"


Jobs related to Uniform resource locators

Back to Top