IJVIPNS-IJENS 2011 - International Journal of Video and Image Processing & Network Security
View: 1832
Website www.ijens.org |
Edit Freely
Category computer engineering; video; image; computer; software; Physics; computer networks; electrical engineering; multimedia; communication; network security;
Deadline: July 10, 2011 | Date: July 10, 2011-July 19, 2011
Venue/Country: Rawalpindi, Pakistan
Updated: 2011-06-09 18:30:53 (GMT+9)
Call For Papers - CFP
The International Journal of Video & Image Processing and Network Security (IJVIPNS) aims to be an effective forum for interchange of high quality theoretical and applied research in all its disciplines from basic research to application development.AIM & SCOPEInternational Journal of Video & Image Processing and Network Security ISSN: 2077-1223 Call for Papers The scope of International Journal of Video & Image Processing and Network Security extends, but not limited to the following:Digital signal processingImage processingDigital signal processingVideo coding techniquesSignals and systemsMedical signal processingArtificial intelligencePattern recognitionDocument processingNatural language processingExpert systemsSpeech recognitionDetection and estimation theoryInformation and coding theoryWireless communicationsProbability theory and stochastic processesErgodic theoryLarge deviation theoryDetection theory- robust detectionDSP architecturesApplication of ANN, Evolutionary algorithm, Fuzzy logicArchitecture of imaging and vision systems Autonomous vehicles Character and handwritten text recognition Chemical and spectral sensitization Chemistry of photosensitive materials Coating technologiesPhysics and chemistry of AgX Coding and transmission Cognitive aspects of image understanding Color imaging Communication of visual data Data fusion from multiple sensor inputs Display and printing Document image understanding Generation and display Holography Image analysis and interpretation Image capturing Image databases Image generation Image manipulation Image permanence Image processing Image processing applications Image processing: coding analysis and recognition Image representation Image sensing Imaging systems and image scanning Implementation and architectures Latent image Materials for electro-photography Monitoring and surveillance Network architecture for real-time video transport New visual services over ATM/packet network Non-impact printing technologies Object modeling and knowledge acquisition Photoconductors Photographic emulsions Photopolymers Prepress and printing technologies Processing and analysis Protocols for packet video Remote image sensing Retrieval and multimedia Scene modeling Signal-processing aspects of image processing Storage and transmission Video coding algorithms and technologies for ATM/p Visual inspection Active vision and robotic systemsBioinformatics Communications and data securityAnonymity Anonymity and pseudonymity Attacks, security mechanisms, and security service Authentication Authorisation Biometrics Cellular/wireless/mobile/satellite networks securi Code security, including mobile code security Computer forensics Confidentiality, privacy, integrity, authenticatio Cryptography and cryptanalysis Data confidentiality issues Data integrity issues Data recovery Database security Denial of service Denial of service attacks and countermeasures Dependability and reliability Design or analysis of security protocols Distributed access control Distributed and parallel systems security Electronic commerce Formal security analyses Fraudulent usage Information flow Information hiding and watermarking Intellectual property protection Intrusion detection Key management Multicast security Network and Internet security Network forensics Network security performance evaluation Non-repudiation Peer-to-peer security Prevention of traffic analysis Privacy protection Public key cryptography and key management Revocation of malicious parties Risk assessment and management Secure location determination Secure PHY/MAC/routing protocols Secure routing protocols Security group communications Security in ad hoc networks Security in cellular networks (2G, 2.5G, 3G, B3G, Security in communications Security in content-delivery networks Security in distributed systems Security in domain name service Security in e-mail Security in high-speed networks Security in integrated networks Security in integrated wireless networks Security in internet and WWW Security in IP networks Security in mobile IP Security in optical systems and networks Security in peer-to-peer networks Security in satellite networks Security in sensor networks Security in VoIP Security in wired and wireless integrated networks Security in Wired Networks Security in wireless communications Security in wireless internet Security in wireless LANs (IEEE 802.11 WLAN, WiFi, Security in wireless MANs (IEEE 802.16 and WiMAX) Security in wireless PANs (Bluetooth and IEEE 802. Security policies Security specification techniques Security standards Tradeoff analysis between performance and security Trust establishment Viruses worms and other malicious code WLAN and Bluetooth securityComputer Networks Access control and audit Computer securityAd-Hoc, Mobile, Wireless Networks and Mobile ComputingsQuantum Computing, Coding, and Error ControlsAgent Computings & Multi-Agents SystemsDefining Spectrum Rights and Open Spectrum SolutionsQuality of Services and Communication ProtocolsSatelite and Optical Communication SystemOTHERSCall for Papers (Due: July 10, 2011) Publication Date: August 10, 2011Publisher: IJENS PublishersSubmit: editor
ijens.org OR editor.ijens
gmail.com
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.