QuestionsAnswered.net
What's Your Question?

How to Write a Research Paper
Writing a research paper is a bit more difficult that a standard high school essay. You need to site sources, use academic data and show scientific examples. Before beginning, you’ll need guidelines for how to write a research paper.
Start the Research Process
Before you begin writing the research paper, you must do your research. It is important that you understand the subject matter, formulate the ideas of your paper, create your thesis statement and learn how to speak about your given topic in an authoritative manner. You’ll be looking through online databases, encyclopedias, almanacs, periodicals, books, newspapers, government publications, reports, guides and scholarly resources. Take notes as you discover new information about your given topic. Also keep track of the references you use so you can build your bibliography later and cite your resources.
Develop Your Thesis Statement
When organizing your research paper, the thesis statement is where you explain to your readers what they can expect, present your claims, answer any questions that you were asked or explain your interpretation of the subject matter you’re researching. Therefore, the thesis statement must be strong and easy to understand. Your thesis statement must also be precise. It should answer the question you were assigned, and there should be an opportunity for your position to be opposed or disputed. The body of your manuscript should support your thesis, and it should be more than a generic fact.
Create an Outline
Many professors require outlines during the research paper writing process. You’ll find that they want outlines set up with a title page, abstract, introduction, research paper body and reference section. The title page is typically made up of the student’s name, the name of the college, the name of the class and the date of the paper. The abstract is a summary of the paper. An introduction typically consists of one or two pages and comments on the subject matter of the research paper. In the body of the research paper, you’ll be breaking it down into materials and methods, results and discussions. Your references are in your bibliography. Use a research paper example to help you with your outline if necessary.
Organize Your Notes
When writing your first draft, you’re going to have to work on organizing your notes first. During this process, you’ll be deciding which references you’ll be putting in your bibliography and which will work best as in-text citations. You’ll be working on this more as you develop your working drafts and look at more white paper examples to help guide you through the process.
Write Your Final Draft
After you’ve written a first and second draft and received corrections from your professor, it’s time to write your final copy. By now, you should have seen an example of a research paper layout and know how to put your paper together. You’ll have your title page, abstract, introduction, thesis statement, in-text citations, footnotes and bibliography complete. Be sure to check with your professor to ensure if you’re writing in APA style, or if you’re using another style guide.
MORE FROM QUESTIONSANSWERED.NET

IEEE PAPER 2021, ENGINEERING RESEARCH FREE DOWNLOAD
Cse 2021 ieee paper, electronics-ece 2021, eee-electrical-electronics-engineering 2021, medical 2020, mechanical engineering 2020 most popular civil engineering basic science.
Wireless networks use radio waves to connect devices such as laptops to the Internet, the business network and applications. When laptops are connected to Wi-Fi hot spots in public places, the connection is established to that business’s wireless network. three different types of wireless networks – WAN, LAN and PAN: Wireless Wide Area Networks (WWAN): […]
An online voting system is a software platform that allows groups to securely conduct votes and elections. High-quality online voting systems balance ballot security, accessibility, and the overall requirements of an organization’s voting event. Online voting tools and online election voting systems help you make important decisions by gathering the input of your group in […]
Big Data is a collection of data that is huge in volume, yet growing exponentially with time. It is a data with so large size and complexity that none of traditional data management tools can store it or process it efficiently. Big data is also a data but with huge size. Big Data helps the […]
A 3D hologram displays products, objects, and animated sequences three-dimensionally and enables seemingly real objects or animations to appear to float completely freely in space.This method of using 3D holograms opens up a completely new, revolutionary way of presenting products Holograms are photographic recordings of 3D scenes. Unlike a camera, which captures one view through […]
Human-computer interaction studies the design and use of computer technology, focused on the interfaces between people and computers. Researchers in the field of HCI observe the ways in which humans interact with computers and they design technologies that let humans interact with computers in novel ways Human-computer interaction (HCI) is a multidisciplinary subject that focuses […]
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet Cloud computing is the delivery of different services through the Internet. These resources include tools and […]
an attack is any attempt to expose, alter, disable, destroy, steal or gain information through unauthorized access to or make unauthorized use of an asset. Common types of cyber attacks Malware. Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Phishing. Man-in-the-middle attack. Denial-of-service attack. SQL injection. Zero-day exploit. […]
One of the main ways cloud providers can cut down on energy consumption is through saving energy from their data centers. Data centers play a significant role in the reduction of energy consumption as they are also the leading powerhouse for cloud resources Cloud computing is the well-known technology for scaling of extensive data and […]
Arduino is an open-source hardware and software company, project and user community that designs and manufactures single-board microcontrollers and microcontroller kits for building digital devices and interactive objects that can sense and control both physically and digitally. AUTOMATIC IRRIGATION SYSTEM USING ARDUINO free downloadNowadays, the increase in population has led to water scarcity in most […]
Very large-scale integration is the process of creating an integrated circuit by combining millions of MOS transistors onto a single chip. VLSI began in the 1970s when MOS integrated circuit chips were widely adopted, enabling complex semiconductor and telecommunication technologies to be developed. VLSI circuits are used everywhere, real applications include microprocessors in a personal […]
Wireless Sensor Networks (WSNs) can be defined as a self-configured and infrastructure-less wireless networks to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location or sink where Applications of WSN Internet of Things (IOT) Surveillance and Monitoring […]
Renewable energy is useful energy that is collected from renewable resources, which are naturally replenished on a human timescale, including carbon neutral sources like sunlight, wind, rain, tides, waves, and geothermal heat Solar. Wind Energy. Hydroelectric. Ocean Energy. Geothermal Energy. Biomass. Hydrogen. A renewable energy source means energy that is sustainable – something that can’t […]
hybrid electric scooter model developed and simulated using Matlab/Simulink. This hybrid scooter modeled has a parallel hybrid structure. The main propulsion units consist of a two stroke internal combustion engine and a hub motor attached to the front wheel of the scooter. The methodology used to optimize the energy and fuel consumption of the hybrid […]
The main task of a circuit breaker is to interrupt fault currents and to isolate faulted parts of the system. A circuit breaker must also be able to interrupt a wide variety of other currents at system voltage such as capacitive currents, small inductive currents, and load currents. Air circuit breakers are commonly used in […]
After collection and transportation to recycling facilities, materials in the e-waste stream must be processed and separated into clean commodities that can be used to make new products. Efficient separation of materials is the foundation of electronics recycling. E-waste recyclers use processes such as open incineration and acid-leeching. This situation could be improved by creating […]
The automatic detection of cold steel weapons handled by one or multiple persons in surveillance videos can help reducing crimes. However, the detection of these metallic objects in videos faces an important problem: their surface reflectance under medium to high illumination conditions blurs their shapes in the image and hence makes their detection impossible. The […]
AutoX makes retail-based autonomous vehicles. The company’s vehicles combine AI software, sensors, real-time cameras and thousands of test miles, both virtual and real, to ensure safe decisions on the road Artificial Intelligence has the power to completely reform automotive manufacturing and make processes quicker and more efficient. The rising intelligence of robots may soon lead […]
CSE-2021-COMPUTER SCIENCE ENGINEERING
Free ieee paper, ieee projects 2022, seminar reports, free ieee projects ieee papers.
Positioning and Navigation in Challenging Environments
Share this page:
Submission Deadline: 31 July 2022
IEEE Access invites manuscript submissions in the area of Positioning and Navigation in Challenging Environments.
In recent years, positioning and navigation has become a vital part of modern life especially with the continuous performance enhancement and modernization of the four global navigation satellite systems. Positioning and navigation industry has been growing quickly and has played a significant role in the industrial chain. Although great progress and many achievements have been made over the past few decades, there are a range of significant issues to be dealt with, especially in challenging environments.
In complex (e.g. large, multi-floor) indoor environments, it is a challenge to generate a valid positioning and navigation solution by a remote cloud platform with both offline and online data (e.g. WiFi and magnetic fingerprint data) recorded with smartphones The problem may become more complex if a pedestrian goes through different scenarios, such as from one floor to another floor of the same building, or from one building to another connected or neighboring building. There is a preference to avoid any interruption in the provision of valid position information. Thus, in the design of next-generation (beyond 5G) communication systems, the positioning functions need to be enabled and standardization of positioning technology such as in 3GPP should be taken into account.
As natural resources of the earth’s surface and shallow sea are becoming scarce, it is inevitable to acquire resources from deep underground, deep underwater and outer space. Regarding deep underground mining, there are currently a good number of deep mines in the world, including Mponeng Gold Mine and Tau Tona Mine, both located in South Africa with a depth of about 3.9km, and Kidd Creek Copper and Zinc Mine located in Ontario, Canada with a depth of about 2.9km. Deep underground mining is a challenging scenario which usually has high humidity and irregular space distribution, requiring stricter restrictions on the design and building of positioning and navigation systems.
Deep sea mining is promising because of abundant minerals on and under the deep seabed. For instance, a large amount of polymetallic nodules, containing rich concentrations of manganese, nickel, copper, and cobalt, are found in the Clarion-Clipperton Zone, a great abyssal plain as wide as the continental United States that lies 4 to 6 km below the surface of the eastern Pacific Ocean. Abundant naturel gas and oil also exist deep under the sea. Positioning and navigation is important for vehicles and robots to pick up the seabed surface minerals and to perform drilling and extraction of minerals under the seabed.
Space mining is currently a hot topic and should become a reality in the next few decades. , It is crucial to provide accurate and reliable positioning and navigation information for spacecraft and/or space robots which will approach and then usually land on the target planet (e.g. moon) or asteroid, followed by exploration, mining and so on; or simply catch and hold a rather small asteroid and move it back to Earth. For instance, a small Japanese space capsule carrying pristine pieces of the near-Earth asteroid Ryugu touched down on 5 December 2020, northwest of the South Australian capital of Adelaide. This was a successful initial step towards space mining on asteroids.
Positioning and navigation is vital for safe, reliable and effective operations in the scenarios of the frontier applications mentioned above. This Special Section aims to report the recent advances on positioning and navigation in such challenging scenarios. Researchers and engineers are also encouraged to perform more research and development to make advances in this area.
The topics of interest include, but are not limited to:
- Positioning and navigation in complex indoor environments
- Deep underground positioning and navigation
- Positioning and navigation for deep ocean operations and mining
- Positioning and navigation for space exploration and mining
- Cloud computing for positioning and navigation
- High sensitivity GNSS receivers
- Suppression of GNSS jamming and spoofing
- Positioning for communication systems beyond 5G
- Standardization of positioning technology
We also highly recommend the submission of multimedia with each article as it significantly increases the visibility and downloads of articles.
Associate Editor: Kegen Yu, China University of Mining and Technology, Mainland of China
Guest Editors:
- Andrew Dempster, University of New South Wales, Australia
- Pau Closas, Northeastern University, USA
- Shih-Hau Fang, Yuan Ze University, Taiwan
- Guenther Retscher, Vienna University of Technology, Austria
- Ali Broumandan, Hexagon Autonomy and Positioning, Canada
Relevant IEEE Access Special Sections:
- GNSS, Localization, and Navigation Technologies
- Intelligent Systems for the Internet of Things
- Convergence of Sensor Networks, Cloud Computing, and Big Data in Industrial Internet of Things
IEEE Access Editor-in-Chief: Prof. Derek Abbott, University of Adelaide
Article submission: Contact Associate Editor and submit manuscript to: http://ieee.atyponrex.com/journal/ieee-access
For inquiries regarding this Special Section, please contact: [email protected] .
Internet of Space: Networking Architectures and Protocols to Support Space-Based Internet Services
Submission Deadline: 31 January 2022
IEEE Access invites manuscript submissions in the area of Internet of Space: Networking Architectures and Protocols to Support Space-Based Internet Services.
This Special Section is focused on the most recent scientific research and insights on the evolution of communication architectures and protocols for an Internet of Space, able to boost the creation of a truly global Internet by means of the integration of the current Internet with a new Internet of Space . Such evolution is expected to have a significant impact on several markets such as IoT/Industrial IoT, Mobile services, Industry 4.0, Government enterprise, and Connected mobility.
The section shall cover work focused on aspects such as how to support the operation of Tier-1, Tier-2 or even Tier-3 airborne/spaceborne networks; how to address interoperability, within and across different protocol layers in the network architecture, leveraging cross-layer design; and finally how to design a more unified next generation Internet architecture able to transparently include spaceborne and airborne platforms in a way that allows for user-centric services, and a smooth operation of transient networks.
However, an original and competent Internet of Space , calls for the definition of a networking framework able to accommodate specific properties of dynamic systems, including heterogeneous physical layers, frequent changes in network topology, high propagation delays, and intermittent connectivity. The dominant success factor for such a networking framework is low-cost bandwidth, although its capability to support low latency and high-throughput services plays an important role.
Secondly, a global Internet is only possible with a transparent integration of an Internet of Space with the current Internet, while supporting multi-tenants, multi-systems in different orbits and altitudes, as well as multiple markets. Such an integration requires rethinking the Internet architecture in order to extend its operation to all systems above the Earth’s surface, which requires the integration of heterogeneous communication devices and protocols. Such a unifying networking framework will have a truly global reach, allowing the connection between information producers and consumers in any corner of Earth and Space. Last but not least, the seamless integration of an Internet of Space with the current Internet will lead to a global empowerment, providing information access to everyone who may need it to sustain enriched human life, while mitigating some of the major limitations of a network infrastructure that is built on Earth’s surface, which is subjected not only to geographic limits but also to political limits.
From a technical perspective this Special Section is focused on the design and performance evaluation of networking architectures and protocols for the Internet of Space, as well as on a more unified design that best deals with the networking challenges to be faced.
- Network architectures , able to support multi-tenants, multi-systems in different orbits and altitudes, as well as multiple markets, while being transparently integrated in the current Internet architecture. Such new, unifying, network architecture may require the exploitation of paradigms such as Delay Tolerant Networking (DTN) , and Information Centric Networking (ICN).
- Network virtualization , leveraging well-known technologies such as Software Defined Networking (SDN) and Network Function Virtualization (NFV), as well as their integration with the emerging concept of Multi-Access Edge Computing (MEC) , allowing the virtualization of networking, storage and computing fabrics at the edge, required for the offloading of tasks that have latency constraints from the core to the edge.
- Decentralized Internet Infrastructure , allowing a scalable Internetworking between computing processes and service hosted at the network edge (including flying platforms and spaceborne platforms, such as smart satellite constellations), leading to an end-to-end latency reduction due to user proximity, as well as a reduction of network traffic through traffic localization and device-to-device communications.
- Network management, such as support for the global orchestration of network functions on board spaceborne platforms (e.g., satellites) to best support data processing and aggregation; seamless interoperation of mobile Edge infrastructure and devices; resilience and seamless adaptation based on the capability to anticipate the behavior of services on a global scale.
- Cognitive networking , in which programmable spaceborne networks allow networked devices to perform customized computation, including the usage of Artificial Intelligence. Such cognitive functions will be exploited to develop more intelligent, adaptive networks, able to perceive network conditions, decide upon those conditions, and learn from the consequences of its actions.
- Networking protocols , including support for inter-satellite communications, and satellite to ground communications, Quality of Service (QoS) and Quality of Experience (QoE) , integrated security, and mobility, and their integration with existing protocols such as IP routing (e.g. segment routing), transport protocols from the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) to Quick UDP Internet Connections ( QUIC ), and application protocols such as Domain Name Service (DNS) .
- Wireless technologies , including not only the usage of radio frequency systems but also free space optical systems, and a combination of both.
- Network measurement & performance , to assist in understanding and exposing the performance of spaceborne networking resources, infrastructure, and available communication protocols in a variety of ground-to-space, inter-satellite communication scenarios.
- Privacy, security and trustworthiness , assuming end-to-end scenarios involving satellites with computational and storage capabilities, and covering aspects such as data security, decentralized trust architectures.
- Impact on Internet services , such as advanced IoT services (e.g., Augmented Reality/Virtual Reality in manufacturing or farming) served by spaceborne platforms and spaceborne communications; real-time IoT applications (e.g., critical monitoring of public infrastructures); awareness services (e.g., public safety services).
- Impact on data management aspects, including the support of the next generation of Edge computing in space, as well as a fast cooperation between a large set of Edge-based producers of data.
Associate Editor: Rute C. Sofia, fortiss GmbH, Germany
- Paulo Mendes, Airbus, Germany
- Vassilis Tsaoussidis, Democritus University of Thrace, Greece
- Tomaso de Cola, DLR, Germany
- Scott Burleigh, California Institute of Technology, USA
- Mianxiong Dong, Muroran Institute of Technology, Japan
- Eduardo Cerqueira, University Federal of Pará, Brazil
- Networks of Unmanned Aerial Vehicles: Wireless Communications, Applications, Control and Modelling
- Communications in Harsh Environments
- Edge Intelligence for Internet of Things
For inquiries regarding this Special Section, please contact: [email protected] .
Deep Learning for Internet of Things
Submission Deadline: 20 September 2021
IEEE Access invites manuscript submissions in the area of Deep Learning for Internet of Things.
In recent years, the techniques of Internet of Things (IoT) and mobile communications have been developed to detect and collect human and environment information (e.g. geo-information, weather information, bio-information, human behaviors, etc.) for a variety of intelligent services and applications. The three layers in IoT are the sensor, networking, and application layers; several techniques and standards (e.g. oneM2M, Open Connectivity Foundation, etc.) have been proposed and established for these three layers. For the sensor and networking layers, the rise of mobile technology advancements (e.g. wireless sensor networks, LoRaWAN, Sigfox, narrow band-IoT, etc.) has led to a new wave of machine-to-machine (M2M), machine-to-human (M2H), human-to-human (H2H), and human-to-machine (H2M) communications. For the application layer, the IoT techniques in several applications, including energy, enterprise, healthcare, public services, residency, retail, and transportation, have been designed and implemented to detect environmental changes and send instant updates to a cloud computing server farm via mobile communications and middleware for big data analyses. One of the perfect examples is that the vehicle on-board units can instantly detect and share information about the vehicle geolocation, speed, following distance, as well as gaps with other neighboring vehicles. Big data can be collected by IoT techniques and then analyzed by deep learning techniques for a variety of applications and services.
Deep learning techniques, e.g. neural network (NN), convolutional neural network (CNN), recurrent neural network (RNN), long short-term memory (LSTM), etc ., have been popularly applied into image recognition and time-series inference for IoT applications. Advanced driver assistance systems and autonomous cars, for instance, have been developed based on machine learning and deep learning techniques, which perform forward collision warning, blind spot monitoring, lane departure warning, traffic sign recognition, traffic safety, infrastructure management and congestion, and so on. Autonomous cars can share their detected information, such as traffic signs, collision events, etc., with other cars via vehicular communication systems, e.g., dedicated short range communications (DSRC), vehicular ad hoc networks (VANETs), long term evolution (LTE), and 5th generation mobile networks for cooperation. However, how to enhance the performance and efficiency of these deep learning techniques is one of the big challenges for implementing these real-time applications.
Furthermore, several optimization techniques, such as stochastic gradient descent algorithm (SGD), adaptive moment estimation algorithm (Adam), and Nesterov-accelerated Adaptive Moment Estimation (Nadam), have been proposed to support deep learning algorithms for faster solution searching; for example, the gradient descent method is a popular optimization technique to quickly seek the optimized weight sets and filters of CNN for image recognition. The IoT applications based on these image recognition techniques (autonomous cars, augmented reality navigation systems, etc.) have gained considerable attention, and the hybrid approaches typical of mathematics for engineering and computer science (deep learning and optimization techniques) can be investigated and developed to support a variety of IoT applications.
- Deep learning for massive IoT
- Deep learning for critical IoT
- Deep learning for enhancing IoT security
- Deep learning for enhancing IoT privacy
- Preprocessing of IoT data for AI modeling
- Deep learning for IoT applications (smart home, smart agriculture, interactive art, etc.)
Associate Editor: Chi-Hua Chen, Fuzhou University, China
- Yi-Bing Lin, National Yang Ming Chiao Tung University , Taiwan
- Kuo-Ming Chao, Coventry University, UK
- Intelligent Logistics Based on Big Data
- Real-Time Machine Learning Applications In Mobile Robotics
- Advances in Machine Learning and Cognitive Computing for Industry Applications
For inquiries regarding this Special Section, please contact: [email protected] .
Metal Additive Manufacturing
Submission Deadline: 15 December 2021
IEEE Access invites manuscript submissions in the area of Metal Additive Manufacturing.
Additive manufacturing (AM) is a main driver of the Industry 4.0 paradigm. While the additive manufacturing of plastics is common, metal additive manufacturing processes still face several research challenges. The high cost and unpredictable defects in final parts and products are preventing complete deployment and adoption of additive manufacturing in the metalworking industries. Several aspects need improvement, including robustness, stability, repeatability, speed and right-first-time manufacturing. Nevertheless, its potential to the production of structural parts is significant, from the medical to the aeronautics industry.
The industrialization of additive manufacturing requires holistic data management and integrated automation. End-to-end digital manufacturing solutions have been developed in the last few years, enabling a cybersecure bidirectional dataflow for a seamless integration across the entire AM chain. Novel manufacturing methodologies need to be developed to ensure the manufacturability, reliability and quality of a target metal component from initial product design, implementing a zero-defect manufacturing approach ensuring robustness, stability and repeatability of the process.
This Special Section in IEEE Access will bring together academia and industry to discuss technical challenges and recent results related to additive manufacturing. Theoretical, numerical and experimental development in this domain are welcome. The articles are expected to report original findings or innovative concepts featuring different topics related to metal additive manufacturing. Industry-related studies are welcome, especially the ones demonstrating advanced applications of metal additive manufacturing in challenging scenarios.
- Data interoperability
- Data analytics
- Digitalization and data security
- Topologic optimization
- Additive manufacturing building strategy
- Multi-physics process simulation and modeling
- Product engineering optimization
- Testing and characterization
- Zero defect manufacturing and process control
- Quality assurance
- From CAD design to real part production
- Advanced industry applications
Associate Editor: Pedro Neto, University of Coimbra, Portugal
- Mustafa Megahed, ESI Group, Germany
- Matthew Gilbert, The University of Sheffield, UK
- Kaixiang Peng, University of Science and Technology Beijing, China
- Felix Vidal, AIMEN Technology Centre, Spain
- Leroy Gardner, Imperial College London, UK
- Xuemin Chen, Texas Southern University, USA
- Stasha Lauria, Brunel University London, UK
- Advanced Artificial Intelligence Technologies for Smart Manufacturing
- Key Technologies for Smart Factory of Industry 4.0
For inquiries regarding this Special Section, please contact: [email protected] .
Collaborative Intelligence for Internet of Vehicles
Submission Deadline: 01 September 2021
IEEE Access invites manuscript submissions in the area of Collaborative Intelligence for Internet of Vehicles.
Internet of vehicles (IoV) technology is one of the most important breakthroughs that can significantly support mobility systems toward achieving smart and sustainable societies. For example, cooperative driving features enabled by IoV can significantly decrease the risk of traffic accidents and reduce CO2 emissions, thus facilitating smarter transportation. Aerial vehicles, also known as drones, are useful for many applications, including environment and traffic monitoring, crowd mobility and gathering surveillance in pandemics, disaster recovery, and so on. Internet of underwater vehicles could enable many innovative maritime applications such as autonomous shipping, target detection, navigation, localization, and environmental pollution control. However, the development of IoV systems is dependent on overcoming the following two main challenges.
First, due to the heterogeneity of networking entities, strict application and data processing requirements, and limited resources in IoV environments, more advanced networking and computing technologies are required. Future IoV systems feature a larger number of devices and multi-access environments where different types of wireless spectrums should be efficiently utilized. At the same time, novel services, such as cooperative autonomous driving, IoV-based safety and traffic efficiency applications are emerging, and demand unprecedented high accuracy and reliability, ultra-low latency, and large bandwidth. This poses crucial challenges to the efficient use of the limited networking and computing resources.
Recently, to further explore the value of big data from IoV systems, artificial intelligence (AI)-based approaches have been attracting great interest in empowering computer systems. Some collaborative learning approaches, such as federated learning and multi-agent systems, have been used to reduce network traffic and improve the learning efficiency of some smartphone applications. For IoV systems, collaborative intelligence can be achieved via an efficient collaboration among heterogeneous entities, including vehicles, edge servers, and the cloud.
Second, in order to enable a smarter society, more research should be conducted on developing collaborative IoV frameworks and systems to expedite the applications of emerging IoV technologies. An efficient use of cross-domain big data should be discussed, and academic-industrial collaborations should be promoted to solve the existing problems toward a smarter society.
This Special Section focuses on the technical challenges for enabling collaborative IoV systems, and the applications of IoV technologies for a smarter society.
- Collaboration among Space, Air, Ground, and Sea mobile networks
- Collaborative intelligence based on cross-domain big data for IoV
- Collaborative networking for IoV
- Collaborative computing for IoV
- Collaborative IoV for smart cities
- Collaborative IoV for intelligent transportation systems
- Collaborative IoV for energy-efficient sustainable cities
- Collaborative electric vehicles
- Collaborative unmanned aerial vehicles
- Collaborative heterogeneous unmanned ground and aerial vehicles
- Collaborative underwater vehicle technologies for smart ocean
- Collaborative IoV for smarter society
- Collaborative learning for IoV
- Data driven collaborative intelligence for IoV
- End-edge-cloud collaboration for IoV
- New networking and computing architectures for Collaborative IoV
- Security & privacy for IoV
Associate Editor: Celimuge Wu, The University of Electro-Communications, Japan
- Soufiene Djahel, Manchester Metropolitan University, UK
- Damla Turgut, University of Central Florida, USA
- Sidi-Mohammed Senouci, University of Bourgogne, France
- Lei Zhong, Toyota Motor Corporation, Japan
- Artificial Intelligence (AI)-Empowered Intelligent Transportation SystemsBeyond 5G Communications
- Edge Intelligence for Internet of ThingsMillimeter-Wave Communications: New Research Trends and Challenges
- Information Centric Wireless Networking with Edge Computing for 5G and IoT
For inquiries regarding this Special Section, please contact: [email protected] .
Reconfigurable Intelligent Surface Aided Communications for 6G and Beyond
Submission Deadline: 31 August 2021
IEEE Access invites manuscript submissions in the area of Reconfigurable Intelligent Surface Aided Communications for 6G and Beyond.
Reconfigurable Intelligent Surface (RIS) aided wireless communications is a hot research topic in academic and industry communities since it can enhance both the spectrum and energy efficiency of wireless systems by artificially reconfiguring the wireless propagation environment. RIS can configure tiny antenna elements or scatterers, which can be judiciously tuned to enhance signal power at desired users, such as primary users in cognitive radio networks, or suppress signal power at undesired users, such as eavesdroppers in physical layer security networks. The RIS also finds promising applications in dense urban areas or indoor scenarios, where electromagnetic waves are prone to be blocked by obstacles such as buildings and walls. There are numerous advantages associated with RIS. For instance, since RIS needs no analog-to-digital converters or radio frequency chains, it saves energy consumption to improve its sustainability, and reduces system cost. RIS can be fabricated in small size and light weight, which can be easily deployed on a building’s facade, walls, ceilings, street lamps, etc. Furthermore, since RIS is a complementary device, it can be readily integrated into current wireless networks (both cellular network and WIFI) without many standardization modifications. Due to these appealing advantages, RIS-aided wireless communications is envisioned to be a revolutionary technique, and one of the key technologies for the sixth-generation (6G) wireless networks.
To reap the full potential offered by RIS, a number of emerging challenges for the transceiver design of RIS-aided wireless communications needs to be tackled. The transceiver beamforming design requires advanced low complexity signal processing algorithms, the incorporation of RIS in wireless communications will consume more pilot resources for the RIS-related channel estimation, and the time slots left for data transmission will be reduced. It is imperative to justify the benefits of introducing RIS when taking into account additional pilot overhead. Furthermore, most of the existing contributions on transceiver design are based on perfect channel state information (CSI), which is challenging to achieve in RIS-aided communications. Hence, robust transmission design needs to be investigated. Finally, in practice, the RIS elements are designed with discrete shifts, which further pose new challenges for evaluating its performance.
This Special Section aims to summarize recent advancements in RIS-aided wireless communications and spur more efforts in this area to make it a reality. The scope of this Special Section covers a wide range of disciplines such as wireless communications, metamaterials, signal processing, and artificial intelligence. In this Special Section, we invite high-quality, original, technical and survey articles, which have not been published previously on RIS-related techniques and their applications in wireless communications.
- Integration of RIS in emerging wireless applications (e.g., RIS-aided wireless power transfer, RIS-aided mobile edge computing, RIS-aided physical layer security, IRS-aided UAV communications, etc)
- Pilot overhead reduction schemes for channel estimation in RIS-aided wireless communications (e.g. compressed-sensing method by exploiting the sparsity of the channels)
- Robust transceiver design based on imperfect channel state information or/and imperfect phase shift models
- Transceiver design based on statistical channel state information
- Joint active and beamforming for RIS-aided wireless communications
- Information theoretical results of the capacity of RIS
- The impact and design of using practical hardware, e.g. discrete phase shifts
- Energy supply of RIS
- Mobility and handover management for RIS-aided wireless communications
- Association and coordination among RIS, base stations and users
- Resource allocation and interference management in RIS-aided wireless communications
- Fundamental limits, scaling laws analysis, performance analysis, and information-theoretic analysis
- Channel and propagation models
- Control information exchange protocols design
- Energy efficient system design
- Machine learning based design
- RIS-aided mmWave/Terahertz communications
- Measurement studies and real-world prototypes and test-beds
- Integration of RIS-enabled networks into the standard
Associate Editor: Cunhua Pan, Queen Mary University of London, UK
- Ying-Chang Liang, University of Electronic Science and Technology of China (UESTC), China
- Marco Di Renzo, Paris-Saclay University, France
- Lee Swindlehurst, University of California Irvine, USA
- Vincenzo Sciancalepore, NEC Laboratories Europe GmbH, Germany
- Beyond 5G Communications
- Millimeter-Wave Communications: New Research Trends and Challenges
- Millimeter-wave and Terahertz Propagation, Channel Modeling and Applications
For inquiries regarding this Special Section, please contact: [email protected]
Optimal Operation of Active Buildings as an Energy System
Submission Deadline: 31 August 2021
IEEE Access invites manuscript submissions in the area of Optimal Operation of Active Buildings as an Energy System.
The increasing share of buildings in the consumption of energy and carbon emission indicates that any solutions provided in this regard would have to consider the energy efficiency of the buildings, to obtain promising results. Active Buildings are viable solutions to this issue, in which intelligent integration of renewable-based energy technologies, heating, cooling, and transport systems would be able to make a multi-vector energy system.
Active Buildings can work in an isolated way as a self-sufficient energy system, or can interact with the other ABs in a district area and trade energy via the network. They have the potential of interacting with local as well as national level energy grids and, by behaving as zero or positive energy buildings, they are able to deliver various energy services to reduce the pressure on the upstream energy networks, and defer new investment requirements. As a result, the operation of Active Buildings is being developed as fundamental research and part of the future smart energy systems that call for a (re)thinking on the definition of the control, operation and optimization of the Active Buildings as an energy system.
This Special Section in IEEE Access will target numerous prospects in the operation of active buildings as an energy system. Both review and research articles are welcome. Real-world use cases discussing new application areas and resulting new developments are especially welcome.
- A holistic approach in modeling of the energy systems of Active Buildings (ABs)
- The role of ABs in energy systems
- Building physics-based modeling of ABs
- Zero energy and net-zero energy buildings
- Coordinated operation and control of ABs at the district/city level
- Application of model predictive control in ABs operation
- IoT-based operation and control of ABs
- Energy management systems of ABs
- AC, DC, or Hybrid model of ABs
- AB as a service provider in the electricity networks
- Resilience-based operation of ABs
- Reliability-based modeling of ABs
- Uncertainty aware energy management of ABs
- Artificial intelligence for the operation of ABs
- Market-based operation of ABs including Building-to-Building (B2B), Building-to-Grid (B2G), Building-to-Vehicle (B2V), and Vehicle-to-Building (V2B) energy transactions as well as peer-to-peer (P2P) energy transactions
Associate Editor: Behnam Mohammadi-Ivatloo, University of Tabriz, Iran
- Vahid Vahidinasab, Newcastle University, UK
- Somayeh Asadi, Pennsylvania State University, USA
- Fei Wang, North China Electric Power University, China
- Key Enabling Technologies for Prosumer Energy Management
- Evolving Technologies in Energy Storage Systems for Energy Systems Applications
- Advanced Internet of Things for Smart Cyber-Physical Infrastructure Systems
For inquiries regarding this Special Section, please contact: [email protected] .
AI and IoT Convergence for Smart Health
Submission Deadline: 31 May 2021
IEEE Access invites manuscript submissions in the area of AI and IoT Convergence for Smart Health.
With the development of smart sensorial media, things, and cloud technologies, “Smart healthcare” is getting remarkable attention from academia, government, industry, and healthcare communities. Recently, the Internet of Things (IoT) has brought the vision of a smarter world into reality with a massive amount of data and numerous services. With the outbreak of COVID-19, Artificial Intelligence (AI) has gained significant attention by utilizing its machine learning algorithms for quality patient care. However, the convergence of IoT and AI can provide new opportunities for both technologies. AI-driven IoT can play a significant role in smart healthcare by offering better insight of healthcare data to support affordable personalized care. It can also support powerful processing and storage facilities of huge IoT data streams (big data) beyond the capability of individual “things,” as well as to provide automated decision making in real-time. While researchers have been making advances in the study of AI-and IoT for health services individually, very little attention has been given to developing cost-effective and affordable smart healthcare services. The AI-driven IoT (AIIoT) for smart healthcare has the potential to revolutionize many aspects of our healthcare industry; however, many technical challenges need to be addressed before this potential can be realized.
This Special Section is intended to report high-quality research on recent advances toward AI- and IoT convergence for smart healthcare, more specifically to the state-of-the-art approaches, methodologies, and systems for the design, development, deployment and innovative use of those convergence technologies to provide insight into smart healthcare service demands. Authors are solicited to submit complete articles, not previously published elsewhere, in the following topics.
- AI-empowered innovative classification techniques and testbeds for healthcare in IoT-cloud platform
- AI- empowered big data analytics and cognitive computing for smart health monitoring
- Advanced AIIoT convergent services, systems, infrastructure and techniques for healthcare
- AI-supported IoT data analytics for smart healthcare
- Machine learning-based smart homecare for mobile-enabled fall detection of disabled or elderly people
- AIIoT-empowered data analysis for COVID-19
- AI-enabled contact tracing for preventing the spread of the COVID-19
- AI and IoT convergence for pandemic management and monitoring
- Intelligent IoT-driven diagnosis and prognosis mechanisms for infectious diseases
- IoT cloud-based predictive analysis for personalized healthcare
- AI- supported healthcare in IoT-cloud platform
- AIIoT- supported approaches and testbeds for social distance monitoring in pandemic prevention
- Security, privacy, and trust of AI-IoT convergent smart healthcare system
Associate Editor: M. Shamim Hossain, King Saud University, Saudi Arabia
- Stefan Goebel, Technical University Darmstadt, Germany
- Abdulsalam Yassine, Lakehead University, Canada
- Diana P. Tobón, Universidad de Medellín, Colombia
- Fakhri Karray, University of Waterloo, Canada
- Deep Learning Algorithms for Internet of Medical Things
- Behavioral Biometrics for eHealth and Well-Being
- Emerging Deep Learning Theories and Methods for Biomedical Engineering
For inquiries regarding this Special Section, please contact: [email protected] .
Intelligent Big Data Analytics for Internet of Things, Services and People
Submission Deadline: 30 June 2021
IEEE Access invites manuscript submissions in the area of Intelligent Big Data Analytics for Internet of Things, Services and People.
In the envisaged future internet, which consists of billions of digital devices, people, services and other physical objects, people will utilize these digital devices and physical objects to exchange data about themselves and their perceived surrounding environments over a web-based service infrastructure, in what we refer to as the Internet of Things. Because of its openness, multi-source heterogeneity, and ubiquity, interconnecting things, services and people via the internet improves data analysis, boosts productivity, enhances reliability, saves energy and costs, and generates new revenue opportunities through innovative business models. However, the increasing number of IoT users and services leads to fast-growing IoT data, while the quality of service of IoT should also be maintained regardless of the number of IoT users and services. Therefore, the data transmission and processing in IoT should be performed in a more intelligent manner. A large number of computational intelligent technologies such as artificial neural networks, machine learning and data mining can be applied in IoT to improve the IoT data transmission and processing. The adoption of intelligence technologies and big data in handling IoT could offer a number of advantages as big data technology could handle various data effectively, while artificial intelligence technology could further facilitate capturing and structuring the big data.
This Special Section in IEEE Access will focus on intelligent big data analytics for advancing IoT. Novel applications by the integration of big data and artificial intelligence for IoT are particularly welcome.
- Big-data analytics in IoT
- Machine learning algorithms in IoT
- Scalable/parallel/distributed algorithms in IoT
- Privacy preserving and security approaches for large scale analytics in IoT
- Big data technology for intelligent system
- Artificial intelligence technology for data integration in IoT
- Artificial intelligence technology for data mining in IoT
- Artificial intelligence technology for data prediction in IoT
- Artificial intelligence technology for data storage in IoT
- Artificial intelligence technology for multimedia data processing
- Intelligent optimization algorithms in IoT
- Advances in artificial learning and their applications for information security
- Intelligent big data analytics for prediction and applications in IoT
- Novel applications of intelligent big data analytics for IoT
- Big data technology for intelligent monitoring in IoT
Associate Editor: Zhaoqing Pan, Nanjing University of Information Science and Technology, China
Guest Editors:
- Yang Xiao, University of Alabama, USA
- Muhammad Khurram Khan, King Saud University, Saudi Arabia
- Markku Oivo, University of Oulu, Finland
- Vidyasagar Potdar, Curtin University, Australia
- Yuan Tian, Nanjing Institute of Technology, China
- Scalable Deep Learning for Big Data
- Human-Centered Smart Systems and Technologies
For inquiries regarding this Special Section, please contact: [email protected] .
Deep Learning Technologies for Internet of Video Things
Submission Deadline: 31 March 2021
IEEE Access invites manuscript submissions in the area of Deep Learning Technologies for Internet of Video Things.
The past decade has witnessed tremendous advances in Internet of Things (IoT) technologies, protocols, and applications. The goal of IoT is to connect every physical device/sensor (with video, audio, texting capabilities) in a seamless network to allow communication and perform intelligent decisions. Among these, video data devices (things) in IoT are increasingly becoming important since video communications are an essential part of everyone’s experiences and everything that is happening around the world. The technologies of Internet of Video Things (IoVT) are widely expected to bring exciting services and applications for security, healthcare, education, transportation, and so on.
Due to the huge amount of video data that is being generated and consumed nowadays, there are many challenges and problems that are yet to be solved to have practical real-world applications of IoVT, from sensing/capturing to displaying the data. First, efficient video sensing technologies are required to capture high quality videos with low-power. Second, video coding and communication technologies are essential for compressing and transmitting enormous volumes of data. Third, since not all transmitted data are useful for (or targets) human consumption, there are huge challenges in the areas of data learning/understanding to filter and extract high-level information. Finally, video quality enhancement and assessment algorithms are indispensable for improving and evaluating the video quality, respectively.
Recently, data-driven algorithms such as deep neural networks have attracted a lot of attention and have become a popular area of research and development. This interest is driven by several factors, such as recent advances in processing power (cheap and powerful hardware), the availability of large data sets (big data) and several small but important algorithmic advances (e.g., convolutional layers). Nowadays, deep neural networks are the state-of-the-art for several computer vision tasks, such as the ones that require high level understanding of image semantics, e.g. image classification, object segmentation, saliency detection, but also in low level image processing tasks, such as image denoising, inpainting, super-resolution, among others. Deep learning can handle large volumes of video data by making use of its powerful non-linear mapping, and extracting high-level features with very deep networks. Incorporating deep learning into IoVT can provide radical innovations in video sensing, coding, enhancing, understanding, and evaluation areas, to better handle the enormous growth in video data compared to traditional methods. On the other hand, incorporating deep learning into IoVT also brings a lot of challenges such as the long training latency of data training and huge computational cost.
This Special Section in IEEE Access provides a perfect platform for researchers from academia and industry to discuss the prospective developments and innovative ideas in applying deep learning technologies for IoVT.
- Deep learning technologies in video sensing/capturing systems
- Deep learning technologies in visual communications
- Deep learning algorithms, architectures, and databases for image and video compression/coding
- Deep learning for enhancement and quality assessment of visual data
- Deep learning-based visual attention and saliency detection
- Deep learning-based real-time and low-power video coding technologies
- Deep learning-based algorithms, architectures, and databases for video analysis and understanding
- Deep learning-based 3D visual coding and processing (from 360º degrees to light-fields)
- Technologies for reducing the complexity of deep learning-based IoVT
- Technologies for reducing training latency of deep learning-based IoVT
Associate Editor: Jinjia Zhou, Hosei University, Japan
- Joao Ascenso, University of Lisbon, Portugal
- Victor Sanchez, University of Warwick, UK
- Lu Zhang, INSA Rennes, France
- Jianquan Liu, NEC Corporation, Japan
- Jiu Xu, Apple, USA
- Mobile Multimedia: Methodology and Applications
- Innovation and Application of Internet of Things and Emerging Technologies in Smart Sensing
IEEE Access Editor-in-Chief: Prof. Derek Abbott, University of Adelaide
Article submission: Contact Associate Editor and submit manuscript to: http://ieee.atyponrex.com/journal/ieee-access
For inquiries regarding this Special Section, please contact: [email protected] .
At a Glance
- Journal: IEEE Access
- Format: Open Access
- Frequency: Continuous
- Submission to Publication: 4-6 weeks (typical)
- Topics: All topics in IEEE
- Average Acceptance Rate: 30%
- Model: Binary Peer Review
- Article Processing Charge: US $1,950
Featured Articles

On Online Adaptive Direct Data Driven Control
View in IEEE Xplore

Machine Learning Based Transient Stability Emulation and Dynamic System Equivalencing of Large-Scale AC-DC Grids for Faster-Than-Real-Time Digital Twin

How Practical Are Fault Injection Attacks, Really?
Submission guidelines.
© 2023 IEEE - All rights reserved. Use of this website signifies your agreement to the IEEE TERMS AND CONDITIONS.
A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.
AWARD RULES:
NO PURCHASE NECESSARY TO ENTER OR WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING.
These rules apply to the “2023 IEEE Access Best Video Award Part 1″ (the “Award”).
- Sponsor: The Sponsor of the Award is The Institute of Electrical and Electronics Engineers, Incorporated (“IEEE”) on behalf of IEEE Access , 445 Hoes Lane, Piscataway, NJ 08854-4141 USA (“Sponsor”).
- Eligibility: Award is open to residents of the United States of America and other countries, where permitted by local law, who are the age of eighteen (18) and older. Employees of Sponsor, its agents, affiliates and their immediate families are not eligible to enter Award. The Award is subject to all applicable state, local, federal and national laws and regulations. Entrants may be subject to rules imposed by their institution or employer relative to their participation in Awards and should check with their institution or employer for any relevant policies. Void in locations and countries where prohibited by law.
- Agreement to Official Rules : By participating in this Award, entrants agree to abide by the terms and conditions thereof as established by Sponsor. Sponsor reserves the right to alter any of these Official Rules at any time and for any reason. All decisions made by Sponsor concerning the Award including, but not limited to the cancellation of the Award, shall be final and at its sole discretion.
- How to Enter: This Award opens on January 1, 2023 at 12:00 AM ET and all entries must be received by 11:59 PM ET on June 30, 2023 (“Promotional Period”).
Entrant must submit a video with an article submission to IEEE Access . The video submission must clearly be relevant to the submitted manuscript. Only videos that accompany an article that is accepted for publication in IEEE Access will qualify. The video may be simulations, demonstrations, or interviews with other experts, for example. Your video file should not exceed 100 MB.
Entrants can enter the Award during Promotional Period through the following method:
- The IEEE Author Portal : Entrants can upload their video entries while submitting their article through the IEEE Author Portal submission site .
- Review and Complete the Terms and Conditions: After submitting your manuscript and video through the IEEE Author Portal, entrants should then review and sign the Terms and Conditions .
Entrants who have already submitted a manuscript to IEEE Access without a video can still submit a video for inclusion in this Award so long as the video is submitted within 7 days of the article submission date. The video can be submitted via email to the article administrator. All videos must undergo peer review and be accepted along with the article submission. Videos may not be submitted after an article has already been accepted for publication.
The criteria for an article to be accepted for publication in IEEE Access are:
- The article must be original writing that enhances the existing body of knowledge in the given subject area. Original review articles and surveys are acceptable even if new data/concepts are not presented.
- Results reported must not have been submitted or published elsewhere (although expanded versions of conference publications are eligible for submission).
- Experiments, statistics, and other analyses must be performed to a high technical standard and are described in sufficient detail.
- Conclusions must be presented in an appropriate fashion and are supported by the data.
- The article must be written in standard English with correct grammar.
- Appropriate references to related prior published works must be included.
- The article must fall within the scope of IEEE Access
- Must be in compliance with the IEEE PSPB Operations Manual.
- Completion of the required IEEE intellectual property documents for publication.
- At the discretion of the IEEE Access Editor-in-Chief.
- Disqualification: The following items will disqualify a video from being considered a valid submission:
- The video is not original work.
- A video that is not accompanied with an article submission.
- The article and/or video is rejected during the peer review process.
- The article and/or video topic does not fit into the scope of IEEE Access .
- The article and/or do not follow the criteria for publication in IEEE Access .
- Videos posted in a comment on IEEE Xplore .
- Content is off-topic, offensive, obscene, indecent, abusive or threatening to others.
- Infringes the copyright, trademark or other right of any third party.
- Uploads viruses or other contaminating or destructive features.
- Is in violation of any applicable laws or regulations.
- Is not in English.
- Is not provided within the designated submission time.
- Entrant does not agree and sign the Terms and Conditions document.
Entries must be original. Entries that copy other entries, or the intellectual property of anyone other than the Entrant, may be removed by Sponsor and the Entrant may be disqualified. Sponsor reserves the right to remove any entry and disqualify any Entrant if the entry is deemed, in Sponsor’s sole discretion, to be inappropriate.
- Entrant’s Warranty and Authorization to Sponsor: By entering the Award, entrants warrant and represent that the Award Entry has been created and submitted by the Entrant. Entrant certifies that they have the ability to use any image, text, video, or other intellectual property they may upload and that Entrant has obtained all necessary permissions. IEEE shall not indemnify Entrant for any infringement, violation of publicity rights, or other civil or criminal violations. Entrant agrees to hold IEEE harmless for all actions related to the submission of an Entry. Entrants further represent and warrant, if they reside outside of the United States of America, that their participation in this Award and acceptance of a prize will not violate their local laws.
- Intellectual Property Rights: Entrant grants Sponsor an irrevocable, worldwide, royalty free license to use, reproduce, distribute, and display the Entry for any lawful purpose in all media whether now known or hereinafter created. This may include, but is not limited to, the IEEE A ccess website, the IEEE Access YouTube channel, the IEEE Access IEEE TV channel, IEEE Access social media sites (LinkedIn, Facebook, Twitter, IEEE Access Collabratec Community), and the IEEE Access Xplore page. Facebook/Twitter/Microsite usernames will not be used in any promotional and advertising materials without the Entrants’ expressed approval.
- Number of Prizes Available, Prizes, Approximate Retail Value and Odds of winning Prizes: Two (2) promotional prizes of $350 USD Amazon gift cards. One (1) grand prize of a $500 USD Amazon gift card. Prizes will be distributed to the winners after the selection of winners is announced. Odds of winning a prize depend on the number of eligible entries received during the Promotional Period. Only the corresponding author of the submitted manuscript will receive the prize.
The grand prize winner may, at Sponsor’ discretion, have his/her article and video highlighted in media such as the IEEE Access Xplore page and the IEEE Access social media sites.
The prize(s) for the Award are being sponsored by IEEE. No cash in lieu of prize or substitution of prize permitted, except that Sponsor reserves the right to substitute a prize or prize component of equal or greater value in its sole discretion for any reason at time of award. Sponsor shall not be responsible for service obligations or warranty (if any) in relation to the prize(s). Prize may not be transferred prior to award. All other expenses associated with use of the prize, including, but not limited to local, state, or federal taxes on the Prize, are the sole responsibility of the winner. Winner(s) understand that delivery of a prize may be void where prohibited by law and agrees that Sponsor shall have no obligation to substitute an alternate prize when so prohibited. Amazon is not a sponsor or affiliated with this Award.
- Selection of Winners: Promotional prize winners will be selected based on entries received during the Promotional Period. The sponsor will utilize an Editorial Panel to vote on the best video submissions. Editorial Panel members are not eligible to participate in the Award. Entries will be ranked based on three (3) criteria:
- Presentation of Technical Content
- Quality of Video
Upon selecting a winner, the Sponsor will notify the winner via email. All potential winners will be notified via their email provided to the sponsor. Potential winners will have five (5) business days to respond after receiving initial prize notification or the prize may be forfeited and awarded to an alternate winner. Potential winners may be required to sign an affidavit of eligibility, a liability release, and a publicity release. If requested, these documents must be completed, signed, and returned within ten (10) business days from the date of issuance or the prize will be forfeited and may be awarded to an alternate winner. If prize or prize notification is returned as undeliverable or in the event of noncompliance with these Official Rules, prize will be forfeited and may be awarded to an alternate winner.
- General Prize Restrictions: No prize substitutions or transfer of prize permitted, except by the Sponsor. Import/Export taxes, VAT and country taxes on prizes are the sole responsibility of winners. Acceptance of a prize constitutes permission for the Sponsor and its designees to use winner’s name and likeness for advertising, promotional and other purposes in any and all media now and hereafter known without additional compensation unless prohibited by law. Winner acknowledges that neither Sponsor, Award Entities nor their directors, employees, or agents, have made nor are in any manner responsible or liable for any warranty, representation, or guarantee, express or implied, in fact or in law, relative to any prize, including but not limited to its quality, mechanical condition or fitness for a particular purpose. Any and all warranties and/or guarantees on a prize (if any) are subject to the respective manufacturers’ terms therefor, and winners agree to look solely to such manufacturers for any such warranty and/or guarantee.
11.Release, Publicity, and Privacy : By receipt of the Prize and/or, if requested, by signing an affidavit of eligibility and liability/publicity release, the Prize Winner consents to the use of his or her name, likeness, business name and address by Sponsor for advertising and promotional purposes, including but not limited to on Sponsor’s social media pages, without any additional compensation, except where prohibited. No entries will be returned. All entries become the property of Sponsor. The Prize Winner agrees to release and hold harmless Sponsor and its officers, directors, employees, affiliated companies, agents, successors and assigns from and against any claim or cause of action arising out of participation in the Award.
Sponsor assumes no responsibility for computer system, hardware, software or program malfunctions or other errors, failures, delayed computer transactions or network connections that are human or technical in nature, or for damaged, lost, late, illegible or misdirected entries; technical, hardware, software, electronic or telephone failures of any kind; lost or unavailable network connections; fraudulent, incomplete, garbled or delayed computer transmissions whether caused by Sponsor, the users, or by any of the equipment or programming associated with or utilized in this Award; or by any technical or human error that may occur in the processing of submissions or downloading, that may limit, delay or prevent an entrant’s ability to participate in the Award.
Sponsor reserves the right, in its sole discretion, to cancel or suspend this Award and award a prize from entries received up to the time of termination or suspension should virus, bugs or other causes beyond Sponsor’s control, unauthorized human intervention, malfunction, computer problems, phone line or network hardware or software malfunction, which, in the sole opinion of Sponsor, corrupt, compromise or materially affect the administration, fairness, security or proper play of the Award or proper submission of entries. Sponsor is not liable for any loss, injury or damage caused, whether directly or indirectly, in whole or in part, from downloading data or otherwise participating in this Award.
Representations and Warranties Regarding Entries: By submitting an Entry, you represent and warrant that your Entry does not and shall not comprise, contain, or describe, as determined in Sponsor’s sole discretion: (A) false statements or any misrepresentations of your affiliation with a person or entity; (B) personally identifying information about you or any other person; (C) statements or other content that is false, deceptive, misleading, scandalous, indecent, obscene, unlawful, defamatory, libelous, fraudulent, tortious, threatening, harassing, hateful, degrading, intimidating, or racially or ethnically offensive; (D) conduct that could be considered a criminal offense, could give rise to criminal or civil liability, or could violate any law; (E) any advertising, promotion or other solicitation, or any third party brand name or trademark; or (F) any virus, worm, Trojan horse, or other harmful code or component. By submitting an Entry, you represent and warrant that you own the full rights to the Entry and have obtained any and all necessary consents, permissions, approvals and licenses to submit the Entry and comply with all of these Official Rules, and that the submitted Entry is your sole original work, has not been previously published, released or distributed, and does not infringe any third-party rights or violate any laws or regulations.
12.Disputes: EACH ENTRANT AGREES THAT: (1) ANY AND ALL DISPUTES, CLAIMS, AND CAUSES OF ACTION ARISING OUT OF OR IN CONNECTION WITH THIS AWARD, OR ANY PRIZES AWARDED, SHALL BE RESOLVED INDIVIDUALLY, WITHOUT RESORTING TO ANY FORM OF CLASS ACTION, PURSUANT TO ARBITRATION CONDUCTED UNDER THE COMMERCIAL ARBITRATION RULES OF THE AMERICAN ARBITRATION ASSOCIATION THEN IN EFFECT, (2) ANY AND ALL CLAIMS, JUDGMENTS AND AWARDS SHALL BE LIMITED TO ACTUAL OUT-OF-POCKET COSTS INCURRED, INCLUDING COSTS ASSOCIATED WITH ENTERING THIS AWARD, BUT IN NO EVENT ATTORNEYS’ FEES; AND (3) UNDER NO CIRCUMSTANCES WILL ANY ENTRANT BE PERMITTED TO OBTAIN AWARDS FOR, AND ENTRANT HEREBY WAIVES ALL RIGHTS TO CLAIM, PUNITIVE, INCIDENTAL, AND CONSEQUENTIAL DAMAGES, AND ANY OTHER DAMAGES, OTHER THAN FOR ACTUAL OUT-OF-POCKET EXPENSES, AND ANY AND ALL RIGHTS TO HAVE DAMAGES MULTIPLIED OR OTHERWISE INCREASED. ALL ISSUES AND QUESTIONS CONCERNING THE CONSTRUCTION, VALIDITY, INTERPRETATION AND ENFORCEABILITY OF THESE OFFICIAL RULES, OR THE RIGHTS AND OBLIGATIONS OF ENTRANT AND SPONSOR IN CONNECTION WITH THE AWARD, SHALL BE GOVERNED BY, AND CONSTRUED IN ACCORDANCE WITH, THE LAWS OF THE STATE OF NEW JERSEY, WITHOUT GIVING EFFECT TO ANY CHOICE OF LAW OR CONFLICT OF LAW, RULES OR PROVISIONS (WHETHER OF THE STATE OF NEW JERSEY OR ANY OTHER JURISDICTION) THAT WOULD CAUSE THE APPLICATION OF THE LAWS OF ANY JURISDICTION OTHER THAN THE STATE OF NEW JERSEY. SPONSOR IS NOT RESPONSIBLE FOR ANY TYPOGRAPHICAL OR OTHER ERROR IN THE PRINTING OF THE OFFER OR ADMINISTRATION OF THE AWARD OR IN THE ANNOUNCEMENT OF THE PRIZES.
- Limitation of Liability: The Sponsor, Award Entities and their respective parents, affiliates, divisions, licensees, subsidiaries, and advertising and promotion agencies, and each of the foregoing entities’ respective employees, officers, directors, shareholders and agents (the “Released Parties”) are not responsible for incorrect or inaccurate transfer of entry information, human error, technical malfunction, lost/delayed data transmissions, omission, interruption, deletion, defect, line failures of any telephone network, computer equipment, software or any combination thereof, inability to access web sites, damage to a user’s computer system (hardware and/or software) due to participation in this Award or any other problem or error that may occur. By entering, participants agree to release and hold harmless the Released Parties from and against any and all claims, actions and/or liability for injuries, loss or damage of any kind arising from or in connection with participation in and/or liability for injuries, loss or damage of any kind, to person or property, arising from or in connection with participation in and/or entry into this Award, participation is any Award-related activity or use of any prize won. Entry materials that have been tampered with or altered are void. If for any reason this Award is not capable of running as planned, or if this Award or any website associated therewith (or any portion thereof) becomes corrupted or does not allow the proper playing of this Award and processing of entries per these rules, or if infection by computer virus, bugs, tampering, unauthorized intervention, affect the administration, security, fairness, integrity, or proper conduct of this Award, Sponsor reserves the right, at its sole discretion, to disqualify any individual implicated in such action, and/or to cancel, terminate, modify or suspend this Award or any portion thereof, or to amend these rules without notice. In the event of a dispute as to who submitted an online entry, the entry will be deemed submitted by the authorized account holder the email address submitted at the time of entry. “Authorized Account Holder” is defined as the person assigned to an email address by an Internet access provider, online service provider or other organization responsible for assigning email addresses for the domain associated with the email address in question. Any attempt by an entrant or any other individual to deliberately damage any web site or undermine the legitimate operation of the Award is a violation of criminal and civil laws and should such an attempt be made, the Sponsor reserves the right to seek damages and other remedies from any such person to the fullest extent permitted by law. This Award is governed by the laws of the State of New Jersey and all entrants hereby submit to the exclusive jurisdiction of federal or state courts located in the State of New Jersey for the resolution of all claims and disputes. Facebook, LinkedIn, Twitter, G+, YouTube, IEEE Xplore , and IEEE TV are not sponsors nor affiliated with this Award.
- Award Results and Official Rules: To obtain the identity of the prize winner and/or a copy of these Official Rules, send a self-addressed stamped envelope to Kimberly Rybczynski, IEEE, 445 Hoes Lane, Piscataway, NJ 08854-4141 USA.
Skip to Main Content
IEEE Account
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2023 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
IEEE BigData 2016
IEEE BigData 2021 Now Taking Place Virtually
IEEE Big Data 2021 Accepted Papers
Main conference, regular papers, short papers, industrial track regular papers, industrial track short papers.
- Home
- Program (Compact)
Accepted Papers
- Short Talks
- Symposium Presenter Information
- Virtual Socials
- Registration
- Student Travel Grants
- Attendee Code of Conduct
- General Info
- Past Conferences
- Conference Organizers
- Technical Committee
MAY 24-27, 2021
42nd IEEE Symposium on Security and Privacy
Sponsored by the IEEE Computer Society Technical Committee on Security and Privacy in cooperation with the International Association for Cryptologic Research
Registration and Access
Conference Paper Abstracts due Friday November 4!
Only papers with an abstract submitted by the deadline will be reviewed.
- Venue: Virtual
- Registration
- Instructions for Authors
- Complete Program
- Your Program
- Requirements Engineering 2021
- Ceremonies & Panels
- Research Papers
- Student Volunteers
- Industrial Innovation Papers
- [email protected]! Papers
- Journal-First
- Posters and Tool Demos
- Doctoral Symposium
Submission Instructions
- Requirements Engineering 2021 Committees
- Organizing Committee
- Track Committees
- Track Co-Chairs
- Program Committee
- Workshop Co-Chairs
- Workshop Committee
- Contributors
- People Index
- Requirements Engineering 2023
- Requirements Engineering 2022
Research Papers Requirements Engineering 2021
Accepted papers, formatting instructions, call for papers, program display configuration, wed 22 sep displayed time zone: eastern time (us & canada) change, thu 23 sep displayed time zone: eastern time (us & canada) change, fri 24 sep displayed time zone: eastern time (us & canada) change, categories for research papers:.
The RE’21 Research Track invites original submissions of research papers in three categories: Technical Solution, Scientific Evaluation, Perspective.
The authors of accepted papers will have the opportunity to increase the visibility of their artifacts (software and data) and to obtain an artifact badge. Upon acceptance, the authors can submit their artifacts, which will be evaluated by a committee that determines their sustained availability and reusability.
Instructions for the Double-Blind Review Process
Important policy announcements.
Papers submitted to RE 2021 must be original, and will be reviewed under the assumption that they do not contain plagiarized material, have not been published nor submitted for review elsewhere while under consideration for RE 2021.
RE 2021 follows the IEEE policies for cases of double submission and plagiarism
The format of your paper must strictly adhere to the IEEEtran Proceedings Format.
LaTeX users: please use the LaTeX class file IEEEtran v1.8 and the following configuration (without option ‘compsoc’ or ‘compsocconf’):
\documentclass[conference]{IEEEtran}
Please make sure that your submission

Ana Moreira
Nova university of lisbon and nova lincs.

Kurt Schneider
Leibniz universität hannover, software engineering group.

Dalal Alrajeh
Imperial college london, united kingdom.

Daniel Amyot
University of ottawa.

University of Waterloo

Kelly Blincoe
University of auckland, new zealand.

Travis Breaux
Carnegie mellon university, united states.

Lionel Briand
University of luxembourg; university of ottawa.


Betty H.C. Cheng
Michigan state university.

Benoit Combemale
University of rennes 1, france.

Maya Daneva
University of twente, netherlands.

Joerg Doerr
Fraunhofer iese.

Michael Felderer
University of innsbruck.

Alessio Ferrari

Xavier Franch
Universitat politècnica de catalunya.

Samuel Fricker
Fhnw & bth, switzerland.

Vincenzo Gervasi
University of pisa.

Martin Glinz
University of zurich.

Miguel Goulao
Nova-lincs, fct/unl.

Alicia M. Grubb
Smith college.

John Grundy
Monash university.

University of Kentucky

Jennifer Horkoff
Chalmers and the university of gothenburg.

Emilio Insfran
Universitat politècnica de valència, spain.

Peking University

Marjo Kauppinen
Aalto university.

Fitsum Kifetew
Fondazione bruno kessler.

Eric Knauss
Chalmers | university of gothenburg.

Seok-Won Lee
Ajou university, south korea.

Julio Cesar Leite

Emmanuel Letier
University college london.

Daniel Mendez
Blekinge institute of technology.

Pradeep K. Murukannaiah

Gunter Mussbacher
Mcgill university, canada.
John Mylopoulos

Barbara Paech
University of heidelberg, germany.

Birgit Penzenstadler

Peter Sawyer
Aston university.

Norbert Seyff
Fhnw & university of zurich.

Isabel Sofia Sousa Brito
Instituto politécnico de beja.

Paola Spoletini
Kennesaw state university.

Colin C. Venter
University of huddersfield.

Andreas Vogelsang
University of cologne.

Stefan Wagner
University of stuttgart.

Jon Whittle
Csiro's data61 and monash university.

The Open University, UK
VIS 2021 is going virtual!
the premier forum for advances in visualization and visual analytics
The Best Paper awards for full papers and short papers have been announced.
The Test of Time awards for Infovis, VAST, and SciVis have been announced.
The tentative schedule for paper presentations has been released.
Due to the ongoing COVID-19 pandemic, VIS 2022 will be held in Oklahoma City, OK, and the Melbourne, Australia event will be postponed until 2023.
Register by Sep. 10 to vote in the VIS 2021 elections! Eligible voters are active members of the VIS community, who have participated in 3 out of the 5 most recent VIS conferences (upcoming 2021 included).
Join us by participating in one of our worldwide, in-person satellite events.
Welcome to IEEE VIS 2021!
VIS 2021 will be the year’s premier forum for advances in theory, methods, and applications of visualization and visual analytics. The conference will convene an international community of researchers and practitioners from universities, government, and industry to exchange recent findings on the design and use of visualization tools.
We invite you to share your research, insights, and enthusiasm at IEEE VIS. The 2021 program will also feature a diverse range of symposia and co-located events, including Visualization in Practice, Visualization in Data Science, the VIS Arts Program, and data analysis Challenge competitions, as well as an Application Spotlights track.
VIS 2021 General Chairs Brian Summa, Tulane University Luis Gustavo Nonato, Universidade de Sao Paulo
Follow @ieeevis on Twitter , the IEEE VIS page on Facebook , or sign up to our mailing list to keep up with conference activities and announcements.
Questions? E-mail info(at)ieeevis.org
Registration
Full week, one day, two day, and keynote + capstone registrations are still available.
VIS 2020 is taking place in Salt Lake City. Find out how to get here.
This year's full program is now available as an app and here on this website.
Data Visualization Practitioners
Learn which sessions may be particularly interesting to visualization practitioners
IEEE VIS is made possible by our supporters.
Our generous supporters help to fund our diversity and inclusion scholarship, childcare grants and more. Participate in IEEE VIS by supporting and exhibiting at the conference.
Diversity/Inclusivity Scholarships
Explore the most recent advances in visualization
Get hands on with tutorials and workshops
Join our creative, capable visualization community
Share your work and research findings

IMAGES
VIDEO
COMMENTS
To make an acknowledgement in a research paper, a writer should express thanks by using the full or professional names of the people being thanked and should specify exactly how the people being acknowledged helped.
Writing a research paper is a bit more difficult that a standard high school essay. You need to site sources, use academic data and show scientific examples. Before beginning, you’ll need guidelines for how to write a research paper.
The title of a research paper should outline the purpose of the research, the methods used and the overall tone of the paper. The title is important because it is the first thing that is read. It is important that the title is focused, but ...
IEEE PAPER 2021, IEEE PROJECT 2021 FREE DOWNLOAD ENGINEERING RESEARCH PAPERS, REQUEST NEW PAPERS FREE , ALL ENGINEERING BRANCH CS, ECE, EEE, IEEE PROJECTS.
Abstract: Presents an index of the authors whose articles are published in the conference proceedings record. Published in: 2021 IEEE International
IEEE Xplore, delivering full text access to the world's highest quality technical literature in engineering and technology. | IEEE Xplore.
Submission Deadline: 15 December 2021 ... Both review and research articles are welcome.
Read all the papers in 2021 IEEE International Conference on Image Processing (ICIP) | IEEE Conference | IEEE Xplore.
Read all the papers in 2021 Moratuwa Engineering Research Conference (MERCon) | IEEE Conference | IEEE Xplore.
IEEE Transactions on Pattern Analysis and Machine Intelligence. The articles in this journal are peer reviewed in accordance with the requirements set fo.
Resource Allocation for Scalable Scientific Workflows in Heterogeneous Clusters.
Ziyang Li (University of Pennsylvania), Aravind Machiry (Purdue University), Binghong Chen (Georgia Institute of Technology), Ke Wang (Visa Research)
The IEEE International Requirements Engineering Conference (RE) is the premier requirements engineering conference where researchers, practitioners
We invite you to share your research, insights, and enthusiasm at IEEE VIS. The 2021 program will also feature a diverse range of symposia and co-located