| |||||||||||||||
IJVIPNS/IJENS 2010 : International Journal of Video & Image Processing and Network Security | |||||||||||||||
Link: http://www.ijens.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The International Journal of Video & Image Processing and Network Security (IJVIPNS) aims to be an effective forum for interchange of high quality theoretical and applied research in all its disciplines from basic research to application development.
AIM & SCOPE International Journal of Video & Image Processing and Network Security ISSN: 2077-1223 Call for Papers The scope of International Journal of Video & Image Processing and Network Security extends, but not limited to the following: Digital signal processing Image processing Digital signal processing Video coding techniques Signals and systems Medical signal processing Artificial intelligence Pattern recognition Document processing Natural language processing Expert systems Speech recognition Detection and estimation theory Information and coding theory Wireless communications Probability theory and stochastic processes Ergodic theory Large deviation theory Detection theory- robust detection DSP architectures Application of ANN, Evolutionary algorithm, Fuzzy logic Architecture of imaging and vision systems Autonomous vehicles Character and handwritten text recognition Chemical and spectral sensitization Chemistry of photosensitive materials Coating technologiesPhysics and chemistry of AgX Coding and transmission Cognitive aspects of image understanding Color imaging Communication of visual data Data fusion from multiple sensor inputs Display and printing Document image understanding Generation and display Holography Image analysis and interpretation Image capturing Image databases Image generation Image manipulation Image permanence Image processing Image processing applications Image processing: coding analysis and recognition Image representation Image sensing Imaging systems and image scanning Implementation and architectures Latent image Materials for electro-photography Monitoring and surveillance Network architecture for real-time video transport New visual services over ATM/packet network Non-impact printing technologies Object modeling and knowledge acquisition Photoconductors Photographic emulsions Photopolymers Prepress and printing technologies Processing and analysis Protocols for packet video Remote image sensing Retrieval and multimedia Scene modeling Signal-processing aspects of image processing Storage and transmission Video coding algorithms and technologies for ATM/p Visual inspection Active vision and robotic systems Bioinformatics Communications and data security Anonymity Anonymity and pseudonymity Attacks, security mechanisms, and security service Authentication Authorisation Biometrics Cellular/wireless/mobile/satellite networks securi Code security, including mobile code security Computer forensics Confidentiality, privacy, integrity, authenticatio Cryptography and cryptanalysis Data confidentiality issues Data integrity issues Data recovery Database security Denial of service Denial of service attacks and countermeasures Dependability and reliability Design or analysis of security protocols Distributed access control Distributed and parallel systems security Electronic commerce Formal security analyses Fraudulent usage Information flow Information hiding and watermarking Intellectual property protection Intrusion detection Key management Multicast security Network and Internet security Network forensics Network security performance evaluation Non-repudiation Peer-to-peer security Prevention of traffic analysis Privacy protection Public key cryptography and key management Revocation of malicious parties Risk assessment and management Secure location determination Secure PHY/MAC/routing protocols Secure routing protocols Security group communications Security in ad hoc networks Security in cellular networks (2G, 2.5G, 3G, B3G, Security in communications Security in content-delivery networks Security in distributed systems Security in domain name service Security in e-mail Security in high-speed networks Security in integrated networks Security in integrated wireless networks Security in internet and WWW Security in IP networks Security in mobile IP Security in optical systems and networks Security in peer-to-peer networks Security in satellite networks Security in sensor networks Security in VoIP Security in wired and wireless integrated networks Security in Wired Networks Security in wireless communications Security in wireless internet Security in wireless LANs (IEEE 802.11 WLAN, WiFi, Security in wireless MANs (IEEE 802.16 and WiMAX) Security in wireless PANs (Bluetooth and IEEE 802. Security policies Security specification techniques Security standards Tradeoff analysis between performance and security Trust establishment Viruses worms and other malicious code WLAN and Bluetooth security Computer Networks Access control and audit Computer security Ad-Hoc, Mobile, Wireless Networks and Mobile Computings Quantum Computing, Coding, and Error Controls Agent Computings & Multi-Agents Systems Defining Spectrum Rights and Open Spectrum Solutions Quality of Services and Communication Protocols Satelite and Optical Communication System OTHERS Call for Papers (Due: July 10, 2010) Publication Date: August 10, 2010 Publisher: IJENS Publishers Submit: editor@ijens.org OR editor.ijens@gmail.com |
|