Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    IJVIPNS-IJENS 2011 - International Journal of Video and Image Processing & Network Security

    View: 1832

    Website www.ijens.org | Want to Edit it Edit Freely

    Category computer engineering; video; image; computer; software; Physics; computer networks; electrical engineering; multimedia; communication; network security;

    Deadline: July 10, 2011 | Date: July 10, 2011-July 19, 2011

    Venue/Country: Rawalpindi, Pakistan

    Updated: 2011-06-09 18:30:53 (GMT+9)

    Call For Papers - CFP

    The International Journal of Video & Image Processing and Network Security (IJVIPNS) aims to be an effective forum for interchange of high quality theoretical and applied research in all its disciplines from basic research to application development.

    AIM & SCOPE

    International Journal of Video & Image Processing and Network Security ISSN: 2077-1223 Call for Papers

    The scope of International Journal of Video & Image Processing and Network Security extends, but not limited to the following:

    Digital signal processing

    Image processing

    Digital signal processing

    Video coding techniques

    Signals and systems

    Medical signal processing

    Artificial intelligence

    Pattern recognition

    Document processing

    Natural language processing

    Expert systems

    Speech recognition

    Detection and estimation theory

    Information and coding theory

    Wireless communications

    Probability theory and stochastic processes

    Ergodic theory

    Large deviation theory

    Detection theory- robust detection

    DSP architectures

    Application of ANN, Evolutionary algorithm, Fuzzy logic

    Architecture of imaging and vision systems

    Autonomous vehicles

    Character and handwritten text recognition

    Chemical and spectral sensitization

    Chemistry of photosensitive materials

    Coating technologiesPhysics and chemistry of AgX

    Coding and transmission

    Cognitive aspects of image understanding

    Color imaging

    Communication of visual data

    Data fusion from multiple sensor inputs

    Display and printing

    Document image understanding

    Generation and display

    Holography

    Image analysis and interpretation

    Image capturing

    Image databases

    Image generation

    Image manipulation

    Image permanence

    Image processing

    Image processing applications

    Image processing: coding analysis and recognition

    Image representation

    Image sensing

    Imaging systems and image scanning

    Implementation and architectures

    Latent image

    Materials for electro-photography

    Monitoring and surveillance

    Network architecture for real-time video transport

    New visual services over ATM/packet network

    Non-impact printing technologies

    Object modeling and knowledge acquisition

    Photoconductors

    Photographic emulsions

    Photopolymers

    Prepress and printing technologies

    Processing and analysis

    Protocols for packet video

    Remote image sensing

    Retrieval and multimedia

    Scene modeling

    Signal-processing aspects of image processing

    Storage and transmission

    Video coding algorithms and technologies for ATM/p

    Visual inspection

    Active vision and robotic systems

    Bioinformatics

    Communications and data security

    Anonymity

    Anonymity and pseudonymity

    Attacks, security mechanisms, and security service

    Authentication

    Authorisation

    Biometrics

    Cellular/wireless/mobile/satellite networks securi

    Code security, including mobile code security

    Computer forensics

    Confidentiality, privacy, integrity, authenticatio

    Cryptography and cryptanalysis

    Data confidentiality issues

    Data integrity issues

    Data recovery

    Database security

    Denial of service

    Denial of service attacks and countermeasures

    Dependability and reliability

    Design or analysis of security protocols

    Distributed access control

    Distributed and parallel systems security

    Electronic commerce

    Formal security analyses

    Fraudulent usage

    Information flow

    Information hiding and watermarking

    Intellectual property protection

    Intrusion detection

    Key management

    Multicast security

    Network and Internet security

    Network forensics

    Network security performance evaluation

    Non-repudiation

    Peer-to-peer security

    Prevention of traffic analysis

    Privacy protection

    Public key cryptography and key management

    Revocation of malicious parties

    Risk assessment and management

    Secure location determination

    Secure PHY/MAC/routing protocols

    Secure routing protocols

    Security group communications

    Security in ad hoc networks

    Security in cellular networks (2G, 2.5G, 3G, B3G,

    Security in communications

    Security in content-delivery networks

    Security in distributed systems

    Security in domain name service

    Security in e-mail

    Security in high-speed networks

    Security in integrated networks

    Security in integrated wireless networks

    Security in internet and WWW

    Security in IP networks

    Security in mobile IP

    Security in optical systems and networks

    Security in peer-to-peer networks

    Security in satellite networks

    Security in sensor networks

    Security in VoIP

    Security in wired and wireless integrated networks

    Security in Wired Networks

    Security in wireless communications

    Security in wireless internet

    Security in wireless LANs (IEEE 802.11 WLAN, WiFi,

    Security in wireless MANs (IEEE 802.16 and WiMAX)

    Security in wireless PANs (Bluetooth and IEEE 802.

    Security policies

    Security specification techniques

    Security standards

    Tradeoff analysis between performance and security

    Trust establishment

    Viruses worms and other malicious code

    WLAN and Bluetooth security

    Computer Networks

    Access control and audit

    Computer security

    Ad-Hoc, Mobile, Wireless Networks and Mobile Computings

    Quantum Computing, Coding, and Error Controls

    Agent Computings & Multi-Agents Systems

    Defining Spectrum Rights and Open Spectrum Solutions

    Quality of Services and Communication Protocols

    Satelite and Optical Communication System

    OTHERS

    Call for Papers (Due: July 10, 2011)

    Publication Date: August 10, 2011

    Publisher: IJENS Publishers

    Submit: editoratijens.org OR editor.ijensatgmail.com


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.