Uniform resource locators
3,433 resources related to Uniform resource locators
- Topics related to Uniform resource locators
- IEEE Organizations related to Uniform resource locators
- Conferences related to Uniform resource locators
- Periodicals related to Uniform resource locators
- Most published Xplore authors for Uniform resource locators
Energy conversion and conditioning technologies, power electronics, adjustable speed drives and their applications, power electronics for smarter grid, energy efficiency,technologies for sustainable energy systems, converters and power supplies
All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation
To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.
ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU
IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions
IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.
Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Internet of Things and Data Analytics Handbook, None
The history of beacons starts a long time ago as a way to signal over long distances using fire or later light houses. Beacons, as pertains to the Internet of Things (IoT), started with bluetooth and accelerated with advancement to bluetooth low energy (BLE), now referred to as bluetooth smart. The bluetooth protocol has been around for many years enabling ...
Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), 2007
This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and ...
Proceedings. Thirteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat. No.98CB36247), 1998
We investigate the frequency of complete sets for various complexity classes within EXP under several polynomial-time reductions in the sense of resource bounded measure. We show that these sets are scarce: The sets that are complete under /spl les/(n/sup /spl alpha//-tt/sup -/)/sup P/ reductions for NP, the levels of the polynomial-time hierarchy, and PSPACE have p/sub 2/-measure zero for any ...
2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 2014
We have proposed a water disaster prevention mesh network - Rainwater Grid (RGS) . It utilizes the water storage function of tanks to temporarily store rain water during heavy rainfalls. This will reduce the amount of water flowing into the rivers and the ground and suppress the flood damage. In this paper, we explain our design and development of the ...
2016 International Conference on Electronics, Information, and Communications (ICEIC), 2016
Application layer attacks pose an ever serious threat to network security for years since it always comes after a technically legitimate connection has been established. In recent years, cyber criminals turn to fully exploit web as a medium of communication environment to lurk a variety of forbidden or illicit activities through spreading malicious automated software(auto-ware) such as adware, spyware or ...
IEEE Xplore's Resources for Entrepreneurs
REACH (Raising Engineering Awareness through the Conduit of History)
Achieving Balance Between Convergence and Diversity in Evolutionary Multi-Objective Optimization - Ke Li
Tech News on IEEE.tv June 2012 Edition
Towards Higher Scalability of Quantum Hardware Emulation - Naveed Mahmud - ICRC 2018
IEEE Academic: Bridging the Educational Divide - Rui Costa - Brief Sessions: Sections Congress 2017
Q&A with Dr. K. J. Ray Liu: IEEE Big Data Podcast, Episode 11
GHTC 2012 - Improving Access to Quality Care Panel
The Proceedings of the IEEE: A Valuable Resource
Keynote on Machine Learning: Andrea Goldsmith - B5GS 2019
ICASSP 2010 - Radar Imaging of Building Interiors
Highlights from the Global Humanitarian Technology Conference (GHTC) 2017
IEEE Xplore: Search vs. Research
APEC Speaker Highlights - Doug Hopkins, University of Buffalo, Power Electronics/Smart-Grid
Wireless Networks for Humanitarian Use - GHTC 2012 Session - Dale Smith
Closing Remarks with Vint Cerf from Internet Inclusion Advancing Solutions
DIY: Replacing the Water Grid With Rainwater
Algorithmic Decision Making: Impacts and Implications - IEEE Internet Initiative Webinar
Electrifying the 1.2 Billion Without Access: An Internet Inclusion Panel Discussion
The history of beacons starts a long time ago as a way to signal over long distances using fire or later light houses. Beacons, as pertains to the Internet of Things (IoT), started with bluetooth and accelerated with advancement to bluetooth low energy (BLE), now referred to as bluetooth smart. The bluetooth protocol has been around for many years enabling wireless transfer of data including both audio and video by the creation of a sharable wireless personal network. The data attained from a person's corporate ID can be combined with information about their movement, who they are meeting with, and cross referenced against other members of their team. Big data is about using large data sets to predict and reveal patterns in human behavior. This is where indoor location and positioning can help everything from Marketers to UN peace keepers understand situations better and react accordingly.
This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and using the calculated fuzzy memberships as class weights when calculating the fuzzy averaged Q values that map hyperlinks to future discounted rewards. The candidate hyperlinks are ranked according to their corresponding fuzzy averaged Q values, and the hyperlink with the optimal Q value is the best one to be crawled in the next step. Experiments of topic crawling tasks have shown FOA collects high harvest rate.
We investigate the frequency of complete sets for various complexity classes within EXP under several polynomial-time reductions in the sense of resource bounded measure. We show that these sets are scarce: The sets that are complete under /spl les/(n/sup /spl alpha//-tt/sup -/)/sup P/ reductions for NP, the levels of the polynomial-time hierarchy, and PSPACE have p/sub 2/-measure zero for any constant /spl alpha/<1. The /spl les/(n/sup c/-T)/sup P/-complete sets for EXP have p/sub 2/-measure zero for any constant c. Assuming MA/spl ne/EXP, the /spl les//sub tt//sup P/-complete sets for EXP have p-measure zero. A key ingredient is the Small Span Theorem, which states that for any set A in EXP at least one of its lower span (i.e., the sets that reduce to A) or its upper span (i.e., the sets that A reduces to) has p/sub 2/-measure zero. Previous to our work, the theorem was only known to hold for /spl les//sub btt//sup p/-reductions. We establish it for /spl les/(n/sup 0/(1)-tt)/sup p/-reductions.
We have proposed a water disaster prevention mesh network - Rainwater Grid (RGS) . It utilizes the water storage function of tanks to temporarily store rain water during heavy rainfalls. This will reduce the amount of water flowing into the rivers and the ground and suppress the flood damage. In this paper, we explain our design and development of the Smart Rainwater Tank System (SRT). We have confirmed that the system continuously monitors the water level of the tank, stores data and visualizes it as a webpage. It will be pre-discharge when heavy rainfall is predicted. This prediction will be made by pattern recognition of weather data by Self Organized Map (SOM). Live Demo shows to sensing and control of the multiple model tanks as Rainwater Grid System. This concept is recently proposed as Distributed Multi- purpose Civil Dam and is advanced.
Application layer attacks pose an ever serious threat to network security for years since it always comes after a technically legitimate connection has been established. In recent years, cyber criminals turn to fully exploit web as a medium of communication environment to lurk a variety of forbidden or illicit activities through spreading malicious automated software(auto-ware) such as adware, spyware or bot. When these malicious auto-ware infect into a user network, they will act like robot and mimic normal behaviour web access to bypass network firewall or IDS. Besides that, in a private and large network, with huge HTTP traffic generated each day, communication behaviour identification and also classification of auto-ware is really a great challenge. In this paper, based on the previous study and analysis of the auto-ware communication behaviour and addition new features, a method classification of HTTP autoware communication is proposed. In that, a NoSql database is applied to handle with large volume unstructured HTTP requests captured every day. The method is experimented with real HTTP traffic data collected through a proxy server of a private network, from which good results are archived in classification and detection of suspicious auto-ware web access.
The World Wide Web (WWW) is based on the simple assumption that all documents are represented in a standard format using copymarks that denote structure as defined by HyperText Markup Language. They use a standard document identification scheme, a URL (uniform resource locator) and a standard retrieval form, HTTP (hypertext transfer protocol). The HTML, URL, and HTTP standards are simplifications of the more comprehensive standards on which they are based. Even with this simplicity, WWW document interchange standards have dramatically improved the exchange of electronic information. These developments are encouraging, but they indicate that we must pay even more attention to data interchange standards in general and to document interchange standards specifically. The author discusses the need for more formal data interchange standardization.
There is growing interest in using rank-ordered gene lists to avoid excessive dependence on measured gene expression levels, which can vary strongly across experiments, platforms, or analysis methods. As a useful tool for working with these lists, this paper describes two extensions of an ordered list comparison measure, recently proposed for comparing Internet search engines: the use of random permutations to assess the significance of differences between ordered lists, and a graphical extension that highlights the items responsible for the main differences between two lists. The method is illustrated for a prostate cancer example from the genomics literature.
PDF (Portable Document Format) documents have become popular in recent times. PDF documents have named destinations that have reference to info like page number, zoom level, scale factor etc. These named destinations should be resolved when user loads URL with named destination or select link in the PDF. Resolving named destinations in PDF is taking more time that affects response time in PDF after user selection or resolving named destination at the URL load time for rendering PDF in Chrome Browser. In this paper, we present a new dictionary based novel solution for improving time to resolve named destinations. Dictionary is the map of named destinations and corresponding page number in the PDF document. We then present the results of some tests on the purposed approach with the already existing approach to show that the purposed approach performs better compared to existing approach while creation of named destinations dictionary does not take significant time. We conclude that our algorithm can perform better as asynchronous message passing is avoided and we have access to page number corresponding to the named destination in constant time and in synchronous manner.
The well-know binary method is a generally acceptable method for modular exponentiation in public-key cryptosystems. In this paper, we propose a new binary exponentiation algorithm, which is based on common-multiplicand method, Montgomery modular reduction algorithm, signed-digit recoding technique, and binary exponentiation algorithm. The common-multiplicand technique is developed to solve the problem common-multiplicand multiplications, i.e., the same common part in two modular multiplications can be computed once rather twice. The ldquosigned-digit recodingrdquo has less occurrence probability of the nonzero digit than binary representation. Due to this advantage, we can efficiently lower down the amount of modular multiplications and we can therefore decrease the computational complexity of modular exponentiation. By using the proposed algorithm, the total number of multiplications can be reduced by about 66.7% as compared with the original Montgomery modular reduction algorithm.
We propose a modified Elman neural network (MENN)-based trajectory control scheme. Our approach consists of two stages: a MENN is first employed to identify the nonlinear plant to be controlled, and acts as the dynamical simulator of the plant after identification. The second MENN is then used to control the plant within the desired trajectory by backpropagating the control error through the simulator to update its weights. The application of this proposed method in the trajectory control of the inverted pendulum is illustrated. A simulation experiment demonstrates that our MENN-based trajectory control scheme can perform successful tracking without knowing prior knowledge of the plant.
No standards are currently tagged "Uniform resource locators"