posted by user: editor_IJENS2 || 9355 views || tracked by 12 users: [display]

IJVIPNS/IJENS 2010 : International Journal of Video & Image Processing and Network Security

FacebookTwitterLinkedInGoogle

Link: http://www.ijens.org
 
When N/A
Where N/A
Submission Deadline Mar 10, 2010
Notification Due Mar 25, 2010
Final Version Due Mar 30, 2010
Categories    image processing   video   computer networks   network security
 

Call For Papers

INTERNATIONAL JOURNAL OF VIDEO & IMAGE PROCESSING AND NETWORK SECURITY Volume 10 Issue 02 ISSN: 2077-1207 Call for Papers

The International Journal of Video and Image Processing and Network Security (IJVIPNS ) aims to be an effective forum for interchange of high quality theoretical and applied research in Video, Image and Network Security disciplines from basic research to application development.

AIM & SCOPE

International Journal of Video & Image Processing and Network Security ISSN: 2077-1207 Call for Papers

The scope of International Journal of Video & Image Processing and Network Security extends, but not limited to the following:

Digital signal processing

Image processing

Digital signal processing

Video coding techniques

Signals and systems

Medical signal processing

Artificial intelligence

Pattern recognition

Document processing

Natural language processing

Expert systems

Speech recognition

Detection and estimation theory

Information and coding theory

Wireless communications

Probability theory and stochastic processes

Ergodic theory

Large deviation theory

Detection theory- robust detection

DSP architectures

Application of ANN, Evolutionary algorithm, Fuzzy logic

Architecture of imaging and vision systems

Autonomous vehicles

Character and handwritten text recognition

Chemical and spectral sensitization

Chemistry of photosensitive materials

Coating technologiesPhysics and chemistry of AgX

Coding and transmission

Cognitive aspects of image understanding

Color imaging

Communication of visual data

Data fusion from multiple sensor inputs

Display and printing

Document image understanding

Generation and display

Holography

Image analysis and interpretation

Image capturing

Image databases

Image generation

Image manipulation

Image permanence

Image processing

Image processing applications

Image processing: coding analysis and recognition

Image representation

Image sensing

Imaging systems and image scanning

Implementation and architectures

Latent image

Materials for electro-photography

Monitoring and surveillance

Network architecture for real-time video transport

New visual services over ATM/packet network

Non-impact printing technologies

Object modeling and knowledge acquisition

Photoconductors

Photographic emulsions

Photopolymers

Prepress and printing technologies

Processing and analysis

Protocols for packet video

Remote image sensing

Retrieval and multimedia

Scene modeling

Signal-processing aspects of image processing

Storage and transmission

Video coding algorithms and technologies for ATM/p

Visual inspection

Active vision and robotic systems

Bioinformatics

Communications and data security

Anonymity

Anonymity and pseudonymity

Attacks, security mechanisms, and security service

Authentication

Authorisation

Biometrics

Cellular/wireless/mobile/satellite networks securi

Code security, including mobile code security

Computer forensics

Confidentiality, privacy, integrity, authenticatio

Cryptography and cryptanalysis

Data confidentiality issues

Data integrity issues

Data recovery

Database security

Denial of service

Denial of service attacks and countermeasures

Dependability and reliability

Design or analysis of security protocols

Distributed access control

Distributed and parallel systems security

Electronic commerce

Formal security analyses

Fraudulent usage

Information flow

Information hiding and watermarking

Intellectual property protection

Intrusion detection

Key management

Multicast security

Network and Internet security

Network forensics

Network security performance evaluation

Non-repudiation

Peer-to-peer security

Prevention of traffic analysis

Privacy protection

Public key cryptography and key management

Revocation of malicious parties

Risk assessment and management

Secure location determination

Secure PHY/MAC/routing protocols

Secure routing protocols

Security group communications

Security in ad hoc networks

Security in cellular networks (2G, 2.5G, 3G, B3G,

Security in communications

Security in content-delivery networks

Security in distributed systems

Security in domain name service

Security in e-mail

Security in high-speed networks

Security in integrated networks

Security in integrated wireless networks

Security in internet and WWW

Security in IP networks

Security in mobile IP

Security in optical systems and networks

Security in peer-to-peer networks

Security in satellite networks

Security in sensor networks

Security in VoIP

Security in wired and wireless integrated networks

Security in Wired Networks

Security in wireless communications

Security in wireless internet

Security in wireless LANs (IEEE 802.11 WLAN, WiFi,

Security in wireless MANs (IEEE 802.16 and WiMAX)

Security in wireless PANs (Bluetooth and IEEE 802.

Security policies

Security specification techniques

Security standards

Tradeoff analysis between performance and security

Trust establishment

Viruses worms and other malicious code

WLAN and Bluetooth security

Computer Networks

Access control and audit

Computer security

Ad-Hoc, Mobile, Wireless Networks and Mobile Computings

Quantum Computing, Coding, and Error Controls

Agent Computings & Multi-Agents Systems

Defining Spectrum Rights and Open Spectrum Solutions

Quality of Services and Communication Protocols

Satelite and Optical Communication System

OTHERS

Call for Papers (Due: March 10, 2010)

Publication Date: April 10, 2010

Publisher: IJENS Publishers

Submit: editor@ijens.org OR editor.ijens@gmail.com

Related Resources

CSITEC 2025   11th International Conference on Computer Science, Information Technology
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
LSIJ 2024   Life Sciences: an International Journal
ICCNT 2025   2025 9th International Conference on Communication and Network Technology (ICCNT 2025)
CMVIT-Maldives 2025   2025 9th International Conference on Machine Vision and Information Technology (CMVIT 2025)
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
VISAPP 2025   20th International Conference on Computer Vision Theory and Applications
ICICA 2025   2025 The 14th International Conference on Information Communication and Applications (ICICA 2025)
IJMIP 2024   International Journal of Multimedia and Image Processing