Integrity

View this topic in
Integrity is a concept of consistency of actions, values, methods, measures, principles, expectations, and outcomes. (Wikipedia.org)






Conferences related to Integrity

Back to Top

2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and postersessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE International Electron Devices Meeting (IEDM)

the IEEE/IEDM has been the world's main forum for reporting breakthroughs in technology, design, manufacturing, physics and the modeling of semiconductors and other electronic devices. Topics range from deep submicron CMOS transistors and memories to novel displays and imagers, from compound semiconductor materials to nanotechnology devices and architectures, from micromachined devices to smart -power technologies, etc.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


OCEANS 2020 - SINGAPORE

An OCEANS conference is a major forum for scientists, engineers, and end-users throughout the world to present and discuss the latest research results, ideas, developments, and applications in all areas of oceanic science and engineering. Each conference has a specific theme chosen by the conference technical program committee. All papers presented at the conference are subsequently archived in the IEEE Xplore online database. The OCEANS conference comprises a scientific program with oral and poster presentations, and a state of the art exhibition in the field of ocean engineering and marine technology. In addition, each conference can have tutorials, workshops, panel discussions, technical tours, awards ceremonies, receptions, and other professional and social activities.

  • OCEANS 2019 - Marseille

    Research, Development, and Operations pertaining to the Oceans

  • 2018 OCEANS - MTS/IEEE Kobe Techno-Ocean (OTO)

    The conference scope is to provide a thematic umbrella for researchers working in OCEAN engineering and related fields across the world to discuss the problems and potential long term solutions that concernnot only the oceans in Asian pacific region, but the world ocean in general.

  • OCEANS 2017 - Aberdeen

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorials on ocean technology, workshops and town hall meetings on policy and governmental process.

  • OCEANS 2016 - Shanghai

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorial on ocean technology, workshops and town hall meetings on policy and governmental process.

  • OCEANS 2015 - Genova

    The Marine Technology Society and the Oceanic Engineering Society of IEEE cosponsor a joint annual conference and exposition on ocean science, engineering and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 50-200 exhibits.

  • OCEANS 2014 - TAIPEI

    The OCEANS conference covers all aspects of ocean engineering from physics aspects through development and operation of undersea vehicles and equipment.

  • OCEANS 2013 - NORWAY

    Ocean related technologies. Program includes tutorials, three days of technical papers and a concurrent exhibition. Student poster competition.

  • OCEANS 2012 - YEOSU

    The OCEANS conferences covers four days with tutorials, exhibits and three days of parallel tracks that address all aspects of oceanic engineering.

  • OCEANS 2011 - SPAIN

    All Oceans related technologies.

  • OCEANS 2010 IEEE - Sydney

  • OCEANS 2009 - EUROPE

  • OCEANS 2008 - MTS/IEEE Kobe Techno-Ocean

  • OCEANS 2007 - EUROPE

    The theme 'Marine Challenges: Coastline to Deep Sea' focuses on the significant challenges, from the shallowest waters around our coasts to the deepest subsea trenches, that face marine, subsea and oceanic engineers in their drive to understand the complexities of the world's oceans.

  • OCEANS 2006 - ASIA PACIFIC

  • OCEANS 2005 - EUROPE


More Conferences

Periodicals related to Integrity

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Integrity

Back to Top

Xplore Articles related to Integrity

Back to Top

Power and Signal Integrity Analysis of High-speed Mixed-signal Backplanes Based on VPX

2018 IEEE Symposium on Electromagnetic Compatibility, Signal Integrity and Power Integrity (EMC, SI & PI), 2018

In this paper, the problem of simultaneous switching noise (SSN) in the design of high-speed mixed-signal backplane is analyzed from the aspect of power integrity. How to suppress SSN of high-speed mixed-signal backplane becomes an important research direction at present. Based on the analysis of the traditional decoupling capacitor noise reduction method and the latest noise reduction principle of the ...


From data integrity to inference integrity

2017 2nd International Conference on Telecommunication and Networks (TEL-NET), 2017

Data integrity was recognized as crucial for databases since in banking and accounting, the earliest important application domains, errors were intolerable owing to legal ramifications; the painfully labor intensive process of the error recovery was another disincentive. Semantic Integrity constraints, which were articulated by the designer through a study of the domain, provided rules; they prevented a great deal of ...


Non-Target DRAM Termination in High Speed LPDDR System for Improved Signal Integrity

2018 IEEE Symposium on Electromagnetic Compatibility, Signal Integrity and Power Integrity (EMC, SI & PI), 2018

Impact of non-target ODT (On-Die Termination) in dual-rank DRAM is investigated on SoC-DRAM SI (signal integrity). Analysis at data rate of 4266Mbps was performed. It shows that terminating non-target DRAM improves SI of the target DRAM by ~3-5% of unit interval due to mitigation of reflections. This added timing margin is significant at high data rates.


Optimization of Multipath Routing for Delay and Data Integrity Using Clustering in Wireless Sensor Network

2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), 2017

Applications required a high integrity routing mechanism to regulate a large amount of traffic to inject within the network to assurance reliable packet delivery and avoid packet in Wireless Sensor Network (WSN). The different application has different Quality of Services (QoS) requirement when running on the same WSN. Mainly two basic requirements consider in WSN and they are high data ...


Audit Cloud: Ensuring Data Integrity for Mobile Devices in Cloud Storage

2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2018

One of the promising field sectors of service provision turns out to be Cloud Computing. It involves storing the user's data to be able to use the applications and services that the cloud introduces. One of these risks that can attack the cloud computing is the integrity of the data stored in the cloud. Data Integrity Verification is one of ...


More Xplore Articles

Educational Resources on Integrity

Back to Top

IEEE-USA E-Books

  • Power and Signal Integrity Analysis of High-speed Mixed-signal Backplanes Based on VPX

    In this paper, the problem of simultaneous switching noise (SSN) in the design of high-speed mixed-signal backplane is analyzed from the aspect of power integrity. How to suppress SSN of high-speed mixed-signal backplane becomes an important research direction at present. Based on the analysis of the traditional decoupling capacitor noise reduction method and the latest noise reduction principle of the electromagnetic band gap (EBG) structures, a novel type of EBG structures is proposed to suppress the noise on the printed circuit board (PCB). The simulation and measurement results show that the noise isolation depth reaches -40dB in the frequency band from 0.4 to 20GHz, which achieves the effect of ultra-wideband high isolation and meets the power and signal integrity requirements of high-speed mixed-signal backplane based on VPX(VITA 46). It provides an experimental reference for the application of the EBG structure on other high-speed mixed-signal backplane and other projects.

  • From data integrity to inference integrity

    Data integrity was recognized as crucial for databases since in banking and accounting, the earliest important application domains, errors were intolerable owing to legal ramifications; the painfully labor intensive process of the error recovery was another disincentive. Semantic Integrity constraints, which were articulated by the designer through a study of the domain, provided rules; they prevented a great deal of errors. The advent of data mining led to a reversal: data was used for the inference of rules: `interesting' association patterns. The users, who were analysts, were warned that these were merely correlations and not causations. More recently, we have begun to witness how, relying on data science, unreliable data is being subjected to largely opaque inference algorithms, typically based on machine learning, with tremendous consequences for human lives. Our challenge is to enhance the integrity of the inference process.

  • Non-Target DRAM Termination in High Speed LPDDR System for Improved Signal Integrity

    Impact of non-target ODT (On-Die Termination) in dual-rank DRAM is investigated on SoC-DRAM SI (signal integrity). Analysis at data rate of 4266Mbps was performed. It shows that terminating non-target DRAM improves SI of the target DRAM by ~3-5% of unit interval due to mitigation of reflections. This added timing margin is significant at high data rates.

  • Optimization of Multipath Routing for Delay and Data Integrity Using Clustering in Wireless Sensor Network

    Applications required a high integrity routing mechanism to regulate a large amount of traffic to inject within the network to assurance reliable packet delivery and avoid packet in Wireless Sensor Network (WSN). The different application has different Quality of Services (QoS) requirement when running on the same WSN. Mainly two basic requirements consider in WSN and they are high data integrity and low delay. Integrity and Delay Differentiation Routing (IDDR) protocol achieves both QoS requirements high data integrity and low delay. In proposed system to improve the performance of the network delay and energy consumption, we implement clustering and scheduling algorithm with IDDR. If the hotspot is generated at sensor node while transmitting the data, then node create a cluster and find the Cluster Head (CH) with high energy and minimum depth value. Data in the queue within the hotspot will redirect through different route using CH. This will reduce the percentage of packet drop and delay in the network.

  • Audit Cloud: Ensuring Data Integrity for Mobile Devices in Cloud Storage

    One of the promising field sectors of service provision turns out to be Cloud Computing. It involves storing the user's data to be able to use the applications and services that the cloud introduces. One of these risks that can attack the cloud computing is the integrity of the data stored in the cloud. Data Integrity Verification is one of the massive responsibilities of cloud data to reduce the participation in activities which manipulates the data of cloud users and providers. There are many ways to address this problem. Using Encryption and Decryption process for the data can solve the problem but it requires huge computing time and functional overheads. Applying data auditing can solve this problem. The main approach of this system is variant Paillier Homomorphic Cryptography (PHC) system with Homomorphic tag and combinatorial batch codes. Data Auditing consists of Provable Data Possession (PDP) and Proof of Retrievability (POR) techniques but these techniques have the limitations of queries. The Integrity Verification using the Third Party Auditor in the Proposed Scheme states the solution for the manipulation of data. The experimental results show the effectiveness and efficiency of the proposed system.

  • Power and Signal Integrity Findings in a FPGA Layout for an Aerospace Application

    Design principles concerning the use of FPGA are of particular importance in aerospace applications since the neglect of such design principles can cause catastrophic effects in aerospace system, as it will be explainedin this paper. FPGA design rules such as power conditioning and signal integrity for properly interfacing high speed FPGA with its interface circuits are discussed in this paper as it relates to aerospace systems. Signal integrity to avoid crosstalk within a FPGA has not been a great concern because most of the attention over the years had been on signal integrity at the PCB level. However, this paper shows a real example of crosstalk within a FPGA in an aerospace application.

  • Transmission Lines and Basic Signal Integrity

    This article discusse the signal integrity is increasingly challenging as data rate increases the form factor and the cost. some critical aspects of signal integrity are discussed and mitigation strategies presented the loss, impedance matching, crosstalk, etc. non-ideal effects of interconnect need to be taken into account in high speed interconnect design. equalization, jitter, eye-diagram are critical signal integrity fundamental concepts.

  • An Approach to Verifying Data Integrity for Cloud Storage

    The developments of cloud computing technology and reliable modern network have been motivating users to store data in cloud servers and rendering security of cloud computing a focus of attention. While data security can be ensured by data encryption technology, data integrity is secured by certain checking algorithm. A verification method of data integrity which can be performed repeatedly is proposed after the comprehensive analysis of the feature of static data stored in a cloud server and its security requirements. The client preprocesses the data file according to the times that the data is required checking, and then upload the data file with check metadata to cloud server, so that the client can spot check the data within limited times and judge the data integrity. Through the analysis of security and performance, we show that this scheme can efficiently verify the data integrity and resist the replay attack and MitM (Man-in-the-middle attack).

  • Design and implementation of an efficient tool to verify integrity of files uploaded to cloud storage

    Cloud storage system (CSS) provides storage service through which users can upload their files for getting several benefits like ease of access, less cost and robustness. The uploaded files must be encrypted to achieve confidentiality. These files are replicated across multiple nodes distributed over various geographical boundaries by the CSS provider to ensure robust- ness. But these files may get corrupted unintentionally during transmission or intentionally by malicious users. To ensure the integrity of the uploaded file, an efficient integrity verifier tool is essential. In this paper, the design and implementation of an integrity verifier tool for files uploaded to cloud has been presented. Merkle Hash Tree (MHT) and digital signatures have been used to verify the integrity. The tool has been integrated with Dropbox Cloud Storage Provider and its performance results have been presented.

  • A Survey on Data Integrity Checking in Cloud

    Cloud storage which provides efficiency and convenience has been paid more and more attention by not only users but also researchers. Users can save their local costs by outsourcing the data to the cloud. While enjoying the benefits of cloud storage, the users are also worried about whether their data remain intact in the cloud or whether their private information has been leaked. This makes them hesitate to outsource their data and cannot fully trust the cloud servers. Because of the concern of users, data integrity becomes an essential security factor of cloud storage. Many scholars have dedicated themselves to the research of data integrity checking for users' security requirements. In this paper, we survey the latest protocols about data integrity checking in cloud and analyze some important requirements and issues of this kind of protocols. The merits and demerits of the protocols are discussed, and the performance is compared with each other as well.



Standards related to Integrity

Back to Top

IEEE Application Guide for Distributed Digital Control and Monitoring for Power Plants


IEEE Standard for Information Technology - POSIX Ada Language Interfaces - Part 1: Binding for System Application Program Interface (API)

This document is part of the POSIX series of standards for applications and user interfaces to open systems. It defines the Ada language bindings as package specifications and accompanying textual descriptions of the applications program interface (API). This standard supports application portability at the source code level through the binding between ISO 8652:1995 (Ada) and ISO/IEC 9945-1:1990 (IEEE Std 1003.1-1990 ...