ATFECM 2013 - Asian Transactions on Fundamental of Electronics, Communication and Multimedia
Date2013-04-21 - 2013-04-25
Deadline2013-04-20
VenueOnline, Online
KeywordsSingal Processing; Networks; Communication
Topics/Call fo Papers
Asian Transactions on Fundamentals of Electronics, Communication & Multimedia (ATFECM)
The scope of Asian Transactions on Fundamentals of Electronics, Communication & Multimedia (ATFECM) extends, but not limited to the following:
Integrated Circuits
Digital signal processing
Image processing
Digital signal processing
Video coding techniques
Signals and systems
Medical signal processing
Artificial intelligence
Pattern recognition
Document processing
Natural language processing
Expert systems
Speech recognition
Semiconductor Materials and Devices
Quantum Electronics
Opto-Electronics
Superconductive Electronics
Electronic Displays
Microwave and Millimeter Wave Technologies
Vacuum and Beam Technologies
Recording and Memory Technologies
Electromagnetic Theory
Detection and estimation theory
Information and coding theory
Wireless communications
Probability theory and stochastic processes
Ergodic theory
Large deviation theory
Detection theory- robust detection
DSP architectures
Application of ANN, Evolutionary algorithm, Fuzzy logic
Architecture of imaging and vision systems
Optoelectronics
Lasers and quantum electronics
Ultrafast optics
Silicon photonics
Planar lightwave circuits
Autonomous vehicles
Character and handwritten text recognition
Chemical and spectral sensitization
Chemistry of photosensitive materials
Coating technologiesPhysics and chemistry of AgX
Coding and transmission
Cognitive aspects of image understanding
Color imaging
Communication of visual data
Data fusion from multiple sensor inputs
Fiber optics
Microwave photonics
Optical interconnection
Photonic signal processing
Photonic integration and systems
Display and printing
Document image understanding
Generation and display
Holography
Image analysis and interpretation
Image capturing
Image databases
Image generation
Image manipulation
Image permanence
Electromagnetic theory
Microwave and millimeter wave devices, circuits, and systems
Electron devices, circuits, and systems
Integrated circuits
Micro- or nano-electromechanical systems
Storage technology
Image processing
Image processing applications
Image processing: coding analysis and recognition
Image representation
Image sensing
Imaging systems and image scanning
Implementation and architectures
Latent image
Materials for electro-photography
Monitoring and surveillance
Network architecture for real-time video transport
New visual services over ATM / packet network
Non-impact printing technologies
Object modeling and knowledge acquisition
Superconducting electronics
Electronic materials
semiconductor materials
Electronic displays
Organic molecular electronics
Polymer optical circuits
Photoconductors
Photographic emulsions
Photopolymers
Prepress and printing technologies
Processing and analysis
Protocols for packet video
Remote image sensing
Retrieval and multimedia
Scene modeling
Storage and transmission
Visual inspection
Video coding algorithms and technologies for ATM/p
Active vision and robotic systems
Bioinformatics
Communications and data security
Anonymity
Ultrasonic electronics
Electron tubes, vacuum and beam technology
Electronic instrumentation and control
Wireless circuits and devices
Electromagnetic compatibility (EMC)
Fiber-optic communication
Optical fiberAnonymity and pseudonymity
Signal-processing aspects of image processing
Attacks, security mechanisms, and security service
Authentication
Authorisation
Biometrics
Cellular/wireless/mobile/satellite networks security
Code security, including mobile code security
Computer forensics
Confidentiality, privacy, integrity, authentication
Cryptography and cryptanalysis
Data confidentiality issues
Data integrity issues
Data recovery
Database security
Denial of service
Denial of service attacks and countermeasures
Dependability and reliability
Design or analysis of security protocols
Distributed access control
Distributed and parallel systems security
Electronic commerce
Formal security analyses
Fraudulent usage
Information flow
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management
Multicast security
Network and Internet security
Network forensics
Network security performance evaluation
Non-repudiation
Peer-to-peer security
Prevention of traffic analysis
Privacy protection
Public key cryptography and key management
Revocation of malicious parties
Risk assessment and management
Secure location determination
Secure PHY/MAC/routing protocols
Secure routing protocols
Security group communications
Security in ad hoc networks
Security in cellular networks
Security in communications
Security in content-delivery networks
Security in distributed systems
Security in domain name service
Security in e-mail
Security in high-speed networks
Security in integrated networks
Security in integrated wireless networks
Security in internet and WWW
Security in IP networks
Security in mobile IP
Security in optical systems and networks
Security in peer-to-peer networks
Security in satellite networks
Security in sensor networks
Security in VoIP
Security in wired and wireless integrated networks
Security in Wired Networks
Security in wireless communications
Security in wireless internet
Security in wireless LANs
Security in wireless MANs
Security in wireless PANs
Security policies
Security specification techniques
Security standards
Tradeoff analysis between performance and security
Trust establishment
Viruses worms and other malicious code
WLAN and Bluetooth security
Computer Networks
Access control and audit
Computer security
Ad-Hoc, Mobile, Wireless Networks and Mobile Computings
Science and engineering for electronics
Quantum Computing, Coding, and Error Controls
Agent Computings & Multi-Agents Systems
Defining Spectrum Rights and Open Spectrum Solutions
Quality of Services and Communication Protocols
Satelite and Optical Communication System
And many others…
Send your paper to
editor-AT-asian-transactions.org or
chiefeditor.at-AT-gmail.com
The scope of Asian Transactions on Fundamentals of Electronics, Communication & Multimedia (ATFECM) extends, but not limited to the following:
Integrated Circuits
Digital signal processing
Image processing
Digital signal processing
Video coding techniques
Signals and systems
Medical signal processing
Artificial intelligence
Pattern recognition
Document processing
Natural language processing
Expert systems
Speech recognition
Semiconductor Materials and Devices
Quantum Electronics
Opto-Electronics
Superconductive Electronics
Electronic Displays
Microwave and Millimeter Wave Technologies
Vacuum and Beam Technologies
Recording and Memory Technologies
Electromagnetic Theory
Detection and estimation theory
Information and coding theory
Wireless communications
Probability theory and stochastic processes
Ergodic theory
Large deviation theory
Detection theory- robust detection
DSP architectures
Application of ANN, Evolutionary algorithm, Fuzzy logic
Architecture of imaging and vision systems
Optoelectronics
Lasers and quantum electronics
Ultrafast optics
Silicon photonics
Planar lightwave circuits
Autonomous vehicles
Character and handwritten text recognition
Chemical and spectral sensitization
Chemistry of photosensitive materials
Coating technologiesPhysics and chemistry of AgX
Coding and transmission
Cognitive aspects of image understanding
Color imaging
Communication of visual data
Data fusion from multiple sensor inputs
Fiber optics
Microwave photonics
Optical interconnection
Photonic signal processing
Photonic integration and systems
Display and printing
Document image understanding
Generation and display
Holography
Image analysis and interpretation
Image capturing
Image databases
Image generation
Image manipulation
Image permanence
Electromagnetic theory
Microwave and millimeter wave devices, circuits, and systems
Electron devices, circuits, and systems
Integrated circuits
Micro- or nano-electromechanical systems
Storage technology
Image processing
Image processing applications
Image processing: coding analysis and recognition
Image representation
Image sensing
Imaging systems and image scanning
Implementation and architectures
Latent image
Materials for electro-photography
Monitoring and surveillance
Network architecture for real-time video transport
New visual services over ATM / packet network
Non-impact printing technologies
Object modeling and knowledge acquisition
Superconducting electronics
Electronic materials
semiconductor materials
Electronic displays
Organic molecular electronics
Polymer optical circuits
Photoconductors
Photographic emulsions
Photopolymers
Prepress and printing technologies
Processing and analysis
Protocols for packet video
Remote image sensing
Retrieval and multimedia
Scene modeling
Storage and transmission
Visual inspection
Video coding algorithms and technologies for ATM/p
Active vision and robotic systems
Bioinformatics
Communications and data security
Anonymity
Ultrasonic electronics
Electron tubes, vacuum and beam technology
Electronic instrumentation and control
Wireless circuits and devices
Electromagnetic compatibility (EMC)
Fiber-optic communication
Optical fiberAnonymity and pseudonymity
Signal-processing aspects of image processing
Attacks, security mechanisms, and security service
Authentication
Authorisation
Biometrics
Cellular/wireless/mobile/satellite networks security
Code security, including mobile code security
Computer forensics
Confidentiality, privacy, integrity, authentication
Cryptography and cryptanalysis
Data confidentiality issues
Data integrity issues
Data recovery
Database security
Denial of service
Denial of service attacks and countermeasures
Dependability and reliability
Design or analysis of security protocols
Distributed access control
Distributed and parallel systems security
Electronic commerce
Formal security analyses
Fraudulent usage
Information flow
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management
Multicast security
Network and Internet security
Network forensics
Network security performance evaluation
Non-repudiation
Peer-to-peer security
Prevention of traffic analysis
Privacy protection
Public key cryptography and key management
Revocation of malicious parties
Risk assessment and management
Secure location determination
Secure PHY/MAC/routing protocols
Secure routing protocols
Security group communications
Security in ad hoc networks
Security in cellular networks
Security in communications
Security in content-delivery networks
Security in distributed systems
Security in domain name service
Security in e-mail
Security in high-speed networks
Security in integrated networks
Security in integrated wireless networks
Security in internet and WWW
Security in IP networks
Security in mobile IP
Security in optical systems and networks
Security in peer-to-peer networks
Security in satellite networks
Security in sensor networks
Security in VoIP
Security in wired and wireless integrated networks
Security in Wired Networks
Security in wireless communications
Security in wireless internet
Security in wireless LANs
Security in wireless MANs
Security in wireless PANs
Security policies
Security specification techniques
Security standards
Tradeoff analysis between performance and security
Trust establishment
Viruses worms and other malicious code
WLAN and Bluetooth security
Computer Networks
Access control and audit
Computer security
Ad-Hoc, Mobile, Wireless Networks and Mobile Computings
Science and engineering for electronics
Quantum Computing, Coding, and Error Controls
Agent Computings & Multi-Agents Systems
Defining Spectrum Rights and Open Spectrum Solutions
Quality of Services and Communication Protocols
Satelite and Optical Communication System
And many others…
Send your paper to
editor-AT-asian-transactions.org or
chiefeditor.at-AT-gmail.com
Other CFPs
Last modified: 2013-04-17 04:57:18