第一篇:IEEE會議文章投稿格式
Author Guidelines for 8.5x11-inch Proceedings Manuscripts
Author(s)Name(s)Author Affiliation(s)
Abstract
The abstract is to be in fully-justified italicized text, at the top of the left-hand column as it is here, below the author information.Use the word “Abstract” as the title, in 12-point Times, boldface type, centered relative to the column, initially capitalized.The abstract is to be in 10-point, single-spaced type, and may be up to 3 in.(7.62 cm)long.Leave two blank lines after the abstract, then begin the main text.All manuscripts must be in English.Note that an “electronic” copy of your Abstract— including the conference name, paper title, keywords, author names, addresses, and affiliations—must be sent to the IEEE Computer Society Press Abstracts Department.The electronic copy is to be an ASCII text file submitted via e-mail to the Abstracts Internet address indicated in the proceedings instruction letter you receive from your production editor.1.Introduction
These guidelines include complete descriptions of the fonts, spacing, and related information for producing your proceedings manuscripts.Please follow them and if you have any questions, direct them to the production editor in charge of your proceedings at the IEEE Computer Society Press: Phone(714)821-8380 or Fax(714)761-1784.2.Formatting your paper
All printed material, including text, illustrations, and charts, must be kept within a print area of 6-7/8 inches(17.5 cm)wide by 8-7/8 inches(22.54 cm)high.Do not write or print anything outside the print area.All text must be in a two-column format.Columns are to be 3-1/4 inches(8.25 cm)wide, with a 5/16 inch(0.8 cm)space between them.Text must be fully justified.A format sheet with the margins and placement guides is available in both Word and PDF files as
The main title(on the first page)should begin 1-3/8 inches(3.49 cm)from the top edge of the page, centered, and in Times 14-point, boldface type.Capitalize the first letter of nouns, pronouns, verbs, adjectives, and adverbs;do not capitalize articles, coordinate conjunctions, or prepositions(unless the title begins with such a word).Leave two blank lines after the title.4.Author name(s)and affiliation(s)
Author names and affiliations are to be centered beneath the title and printed in Times 12-point, non-boldface type.Multiple authos may be shown in a two-or three-column format, with their affiliations below their respective names.Affiliations are centered below each author name, italicized, not bold.Include e-mail addresses if possible.Follow the author information by two blank lines before main text.5.Second and following pages
The second and following pages should begin 1.0 inch(2.54 cm)from the top edge.On all pages, the bottom margin should be 1-1/8 inches(2.86 cm)from the bottom edge of the page for 8.5 x 11-inch paper;for A4 paper, approximately 1-5/8 inches(4.13 cm)from the bottom edge of the page.6.Type-style and fonts
Wherever Times is specified, Times Roman, or New Times Roman may be used.If neither is available on your word processor, please use the font closest in appearance to Times that you have access to.Please avoid using bit-mapped fonts if possible.True-Type 1 fonts are preferred.7.Main text
Type your main text in 10-point Times, single-spaced.Do not use double-spacing.All paragraphs should be indented 1 pica(approximately 1/6-or 0.17-inch or 0.422 cm).Be sure your text is fully justified—that is, flush left
and flush right.Please do not place any additional blank lines between paragraphs.Figure and table captions should be 10-point Helvetica(or a similar sans-serif font), boldface.Callouts should be 9-point Helvetica, non-boldface.Initially capitalize only the first word of each figure caption and table title.Figures and tables must be numbered separately.For example: “Figure 1.Database contexts”, “Table 1.Input data”.Figure captions are to be below the figures.Table titles are to be centered above the tables.8.First-order headings
For example, “1.Introduction”, should be Times 12-point boldface, initially capitalized, flush left, with one blank line before, and one blank line after.Use a period(“.”)after the heading number, not a colon.8.1.Second-order headings
As in this heading, they should be Times 11-point boldface, initially capitalized, flush left, with one blank line before, and one after.8.1.1.Third-order headings.Third-order headings, as in this paragraph, are discouraged.However, if you must use them, use 10-point Times, boldface, initially capitalized, flush left, preceded by one blank line, followed by a period and your text on the same line.9.Footnotes
Use footnotes sparingly(or not at all!)and place them at the bottom of the column on the page on which they are referenced.Use Times 8-point type, single-spaced.To help your readers, avoid using footnotes altogether and include necessary peripheral observations in the text(within parentheses, if you prefer, as in this sentence).10.References
List and number all bibliographical references in 9-point Times, single-spaced, at the end of your paper.When referenced in the text, enclose the citation number in square brackets, for example [1].Where appropriate, include the name(s)of editors of referenced books.[1] A.B.Smith, C.D.Jones, and E.F.Roberts, “Article Title”, Journal, Publisher, Location, Date, pp.1-10.[2] Jones, C.D., A.B.Smith, and E.F.Roberts, Book Title, Publisher, Location, Date.11.Copyright forms and reprint orders
You must include your fully-completed, signed IEEE copyright release form when you submit your paper.We must have this form before your paper can be published in the proceedings.The copyright form is available either as a Word file,
第二篇:IEEE 旗艦會議文章分類總結(jié) 2012-2014
Topics classification
1.Data 1)Storage
1)“MAC finite buffer impact on the performance of cluster-tree based WSNs”
ICC 2013 2)“In-network storage for virtual broker-based publish/subscribe in WSNs” PIMRC 2012 3)“An energy-efficient data storage scheme in wireless sensor networks”
NOMS 2012
4)“Energy-Efficient Distributed Data Storage for Wireless Sensor Networks Based on Compressed Sensing and Network Coding”
TWC 2013
2)Data Collection 1)“The design and implementation of a general WSN gateway for data collection” WCNC 2013 2)”Energy-efficient data collection in WSN: A sink-oriented dynamic backbone“
ICC 2012 3)”Distributed data collection and its capacity in asynchronous wireless sensor networks“
INFOCOM 2012 4)”Application-aware data collection in wireless sensor networks“
INFOCOM 2013 5)”O(jiān)verall cost minimization for data aggregation in energy-constrained wireless sensor networks“
ICC 2013 6)”O(jiān)WER-MDG: A novel energy replenishment and data gathering mechanism in wireless rechargeable sensor networks“
GLOBECOM 2012 7)”Low-latency SINR-based data gathering in wireless sensor networks“
INFOCOM 2013 8)”Compressed Data Aggregation: Energy-Efficient and High-Fidelity Data Collection“
TON 2013 9)”Mobile data gathering with wireless energy replenishment in rechargeable sensor networks“
INFOCOM 2013 10)”Snapshot/continuous data collection capacity for large-scale probabilistic wireless sensor networks“
INFOCOM 2012 11)”Information Theoretical Optimization Gains in Energy Adaptive Data Gathering and Relaying in Cognitive Radio Sensor Networks“
TWC 2012 12)”Minimizing data collection latency in wireless sensor network with multiple mobile elements“
INFOCOM 2012 13)”Capacity and Delay Analysis for Data Gathering with Compressive Sensing in Wireless Sensor Networks“
TWC 2013 14)”Distributed Data Collection in Large-Scale Asynchronous Wireless Sensor Networks Under the Generalized Physical Interference Model“
TON 2013 15)”A cross-layer approach for context-aware data gathering in wireless sensor networks“
GLOBECOM 2012 16)”Semi-structured and unstructured data aggregation scheduling in wireless sensor networks“
INFOCOM 2012 17)”Controlled data collection of mini-sinks for maximizing packet delivery ratio and throughput using multiple paths in wireless sensor networks“
PIMRC 2012 18)”Delay minimum data collection in the low-duty-cycle wireless sensor networks“
GLOBECOM 2012 19)”A Slepian-Wolf coding based energy-efficient clustering algorithm for data aggregation in wireless sensor networks“
ICC 2012 20)”A distributed optimal framework for mobile data gathering with concurrent data uploading in wireless sensor networks“
INFOCOM 2012 21)”Applying the Chinese Remainder Theorem to Data Aggregation in Wireless Sensor Networks“ CL 2013 22)”Maximizing Quality of Aggregation in Delay-Constrained Wireless Sensor Networks“
CL 2013 3)Communication 1)”Modeling and estimation of partially observed WLAN activity for cognitive WSNs“ WCNC 2012 2)”Cognitive transmission based on data priority classification in WSNs for smart grid“
GLOBECOM 2012 3)”Cooperative closed-loop techniques for optimized transmission applied to a WSN in a power substation“ ICSGC 2012 4)”SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and hash chains“
ICC 2013 5)”Dynamic flooding time synchronisation protocol for WSNs“
GLOBECOM 2012 6)”Algorithm Design for Data Communications in Duty-Cycled Wireless Sensor Networks: A Survey“
ICM 2013 7)”Energy-efficient packet forwarding through network partitioning in wireless sensor networks“
PIMRC 2012 8)”Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks“
TWC 2013 9)”Data delivery scheme for wireless sensor network powered by RF energy harvesting“ WCNC 2013
10)”A privacy-aware communication scheme in advanced metering infrastructure(AMI)systems“
WCNC 2013 4)Data processing 1)”Data-centric programming environment for cooperative applications in WSN“ IM 2013
2)”PARED: A testbed with parallel reprogramming and multi-channel debugging for WSNs“ WCNC 2013 3)”Power-efficient hierarchical data aggregation using compressive sensing in WSNs“ ICC 2013 4)”Sensing, Compression, and Recovery for WSNs: Sparse Signal Modeling and Monitoring Framework“ TWC 2012 5)”Adaptive buffering scheme to reduce packet loss on densely connected WSN with mobile sink“
CCNC 2012 6)”Phenomena discovery in WSNs: A compressive sensing based approach“
ICC 2013 7)”RAID the WSN: Packet-based reliable cooperative diversity“ ICC 2012 8)”EasiPLED: Discriminating the causes of packet losses and errors in indoor WSNs“
GLOBECOM 2012 9)”O(jiān)n the benefit of using tight frames for robust data transmission and compressive data gathering in wireless sensor networks“
ICC 2012 10)”Harmonic quorum systems: Data management in 2D/3D wireless sensor networks with holes“
SECON 2012
11)”Compressive sensing based on local regional data in wireless sensor networks“
WCNC 2012
12)”An efficient data acquisition model for urban sensor networks“ NOMS 2012
13)”A Frechet Mean Approach for Compressive Sensing Date Acquisition and Reconstruction in Wireless Sensor Networks“
TWC 2012
14)”A novel reliable data dissemination protocol for real-time data in wireless sensor networks“
WCNC 2012
2.MAC 1)”A low energy consumption MAC protocol for WSN“ ICC 2012 2)”Performance evaluation of receiver based MAC using configurable framework in WSNs“
WCNC 2013 3)”E-MAC: An event-driven data aggregation MAC protocol for wireless sensor networks“
CCNC 2012 3.Service ”Aggregating user rating and service context for WSN service ranking“ GLOBECOM 2012
4.Routing 1)”Fast and power-efficient hardware implementation of a routing scheme for WSNs“ WCNC 2012 2)”HYMN: A Novel Hybrid Multi-Hop Routing Algorithm to Improve the Longevity of WSNs“
TWC 2012 3)”CEEC: Centralized energy efficient clustering a new routing protocol for WSNs“
SECON 2012
5.Energy 1)”Using hardware-based forward error correction to reduce the overall energy consumption of WSNs“ WCNC 2012 2)”Lifetime evaluation of cooperative OFDM WSNs“
WCNC 2012 3)”Extending the lifetime of a WSN by partial covers“
ICC 2013 4)”Energy-harvesting WSNs for structural health monitoring of underground train tunnels“
INFOCOM 2013 6.Security 1)”Improving reliability and efficiency of communications in WSNs under high traffic demand“
WCNC 2013
2)”Performance evaluation of security routing strategies to avoid DoS attacks in WSN“
GLOBECOM 2012
3)”Intruder tracking in WSNs using binary detection sensors and mobile sinks“
WCNC 2012
4)”Detecting DoS attacks in WSN based on clustering technique“ WCNC 2013 5)”PKC Based Broadcast Authentication using Signature Amortization for WSNs“ TWC 2012
7.Others 1)”System and application knowledge based scheduling of multiple applications in a WSN“ ICC 2012
2)”Cooperative task assignment for distributed deployment of applications in WSNs“ ICC 2013
3)”Towards a wireless sensor network platform for the internet of things sprouts WSN platform“
ICC 2012
4)”Fault tolerant target localization and tracking in binary WSNs using sensor health state estimation“
ICC 2013
5)”EDR2: A sink failure resilient approach for WSNs“
ICC 2012
6)”A high quality event capture scheme for WSN-based structural health monitoring“
GLOBECOM 2012
7)”Particle swarm optimization based approach to solve the multiple sink placement problem in WSNs“
ICC 2012
8)”ERCD: An energy-efficient clone detection protocol in WSNs“ INFOCOM 2013
9)”Fault tolerant complex event detection in WSNs: A case study in structural health monitoring“
INFOCOM 2013
10)”Impact of a sleep schedule on the AODV convergence time in WSNs“
INFOCOM 2013 11)”Reducing the observation error in a WSN through a consensus-based subspace projection" WCNC 2013
第三篇:安全檢修投稿文章
安全檢修投稿
2013的檢修工作即將開始,檢修期間的檢修安全如何保證,如何避免安全事故的發(fā)生,真正做到“安全檢修”,需要我們每位檢修參與員工認(rèn)真去思考。
落實好本職崗位的安全生產(chǎn)責(zé)任制。各部門、車間、班組是否將上級下達(dá)的安全文件、規(guī)章制度傳達(dá)給了車間員工;檢修前是否組織好了車間員工、外委施工作業(yè)人員的安全教育,真正提高檢維修人員的安全檢修及防護(hù)技能;每天對檢修項目安全措施落實情況是否做到心中有數(shù),檢修作業(yè)期間是否親自進(jìn)行督促檢查,保證施工現(xiàn)場的安全可靠。我們只有樹立“安全檢修、以人為本”的安全理念,才能真正俯下身子做事,把各自崗位的安全職責(zé)落實下去。
做好檢修期間的安全培訓(xùn)。加大培訓(xùn)力度,提高培訓(xùn)質(zhì)量,加大考核力度,特別要加強(qiáng)“特種作業(yè)人員”、“外委施工人員”以及班組長的安全檢修培訓(xùn)工作,保證素質(zhì)過關(guān)、技術(shù)過硬、持證上崗;對操作崗位員工要由有經(jīng)驗的維修人員帶領(lǐng),以師帶徒、切實起到傳幫帶的作用,提高檢維修人員的安全檢修操作技能;檢修前還應(yīng)組織學(xué)習(xí)、反思相關(guān)事故案例,增強(qiáng)全體員工的事故防范意識,提高安全防范素質(zhì)和自我防護(hù)意識。
檢修期間還應(yīng)做好各種隱患的排查工作。防患于未然,嚴(yán)把現(xiàn)場檢修安全關(guān),要把無事當(dāng)有事,無中找有,小事當(dāng)大事,小題大做。排查隱患很重要的是要細(xì)致,一定要有細(xì)之又細(xì)、慎之又慎。通過采取細(xì)致、全面的方法和手段及時發(fā)現(xiàn)檢修現(xiàn)場的安全隱患,并采取有效的安全措施對隱患進(jìn)行治理,才能避免檢修過程中安全事故的發(fā)生。
關(guān)鍵檢修過程、關(guān)鍵檢修人員應(yīng)關(guān)鍵抓。哪些是關(guān)鍵的檢修過程、哪些是關(guān)鍵檢修作業(yè)人員,我們現(xiàn)場安全管理人員,一定要頭腦清醒,做到心里有數(shù)。在檢修作業(yè)實施前做好安全及技術(shù)交底工作,告知檢修作業(yè)人員什么可以做,什么不可以做,決不能違章指揮、杜絕違章作業(yè);再就是我們的新工人、老工人、操作工、檢修工,新員工、操作工在檢修過程中安全防護(hù)意識和安全檢修操作技能低,存在冒險主義;老工人、檢修工憑著老經(jīng)驗、***慣會出現(xiàn)違章指揮和習(xí)慣性違章作業(yè),所以,要對特殊性的人群給予特殊性的指導(dǎo)和教育。
總之,在檢修期間我們應(yīng)實實在在的把安全放在第一位。在檢修作業(yè)過程中我們每一位員工不能圖僥幸、怕麻煩,要嚴(yán)格按照標(biāo)準(zhǔn)、規(guī)范去做,切切實實地抓好自己的安全。安全就是生命,我們要將“安全檢修”理念滲透進(jìn)我們每一名員工心里,使大家真正認(rèn)識到,抓安全是為了自己,是為了自己家庭幸福。明確為什么要這么做,怎么做才是安全的,促使員工發(fā)自內(nèi)心地提高安全檢修、自我防護(hù)意識。
“安全檢修”并不只是一句口號,更是指導(dǎo)我們檢修工作的標(biāo)準(zhǔn),是我們檢修期間要落在實處的工作,我們每一位檢修參與員工應(yīng)做到認(rèn)知高、工作細(xì)、落實嚴(yán),確保公司2013年檢修工作圓滿結(jié)束。
第四篇:會議投稿
一種新型的超聲聯(lián)合微泡治療肝創(chuàng)傷的止血方法
趙曉晨 李露 李陶 吳盛正 趙陽 劉青 鐘渝 劉政
第三軍醫(yī)大學(xué)第二附屬醫(yī)院超聲科
目的:探索肝臟創(chuàng)傷后出血,用一種新型超聲聯(lián)合微泡產(chǎn)生空化作用止血的實驗研究。
方法:止血治療使用脈沖式超聲空化治療儀,治療頭頻率831 kHz,峰值負(fù)壓4.3 MPa,平均聲強(qiáng)0.4 W/cm2。20只新西蘭大白兔開腹后建立肝臟創(chuàng)傷模型,實驗兔隨機(jī)分為3組:治療組(n=8)、單純超聲組(n=6)、假照組(n=6)。治療組治療同時聯(lián)合靜脈注射微泡,單純超聲組及假照組作為對照組,只進(jìn)行單純超聲和假照治療。肝創(chuàng)傷模型建立后收集初始出血速度,出血視覺評分和10分鐘出血量作為止血療效的評價,超聲造影評價肝臟血流灌注情況。三組9只新西蘭大白兔實驗完后立即取治療區(qū)域肝組織進(jìn)行組織學(xué)檢查。
結(jié)果:統(tǒng)計結(jié)果顯示三組初始出血速度基本一致,治療組(0.10±0.08ML/s)、單純超聲組(0.12±0.04 ML/s)、假照組(0.12±0.06 ML/s)。治療組兔肝創(chuàng)傷切口治療2分鐘后出血立即停止,但在單純超聲組或假照組治療后切口繼續(xù)出血。視覺評分和10分鐘出血量統(tǒng)計結(jié)果(P* <0.01)顯示治療組相比對照組明顯下降,治療組兩組數(shù)據(jù)為(0.38±0.52*、1.83±1.43*ML);單純超聲組(3.67±0.52*、12.21±5.13*ML);假照組(3.83±0.41*、11.02±3.56*ML)。組織學(xué)檢查光鏡下可見肝細(xì)胞彌漫性混濁腫脹,擠壓肝竇及竇狀間隙;門靜脈周圍出血、血腫形成,從而到達(dá)止血效果。
結(jié)論:超聲聯(lián)合微泡為肝臟創(chuàng)傷提供一種簡單、新型的止血方法。
Objectives: To explore the haemostatic effects of microbubble-enhanced ultrasound(MEUS)at a very low acoustic intensity on the bleeding liver of rabbits.Methods: Liver incisions made on 20 rabbits were treated with a pulsed therapeutic ultrasound transducer.The transducer was operated at 831 KHz with an acoustic intensity of 0.4 W/cm2.The treatment was coordinated with intravenous injection of microbubbles.Ultrasound only and sham treatment served as the controls.Visual bleeding score and 10-min bleeding volume were evaluated for haemostatic efficacy.Contrast-enhanced ultrasound(CEUS)was performed to assess the liver perfusion.Nine treated livers were harvested f or acute histological examination.Results: Regarding the bleeding incisions made on rabbit livers, the haemorrhage stopped immediately after 2 min of MEUS treatment but bleeding continued in the controls treated by ultrasound or microbubble injection alone.The bleeding scores and the 10-min haemorrhagic volumes dropped significantly in the MEUS group compared with those of the controls(p < 0.01).The mechanism of MEUS haemostasis appears to involve the extensive swelling of hepatocytes and the haemorrhage of the portal area, which formed a joint compression on the regional liver circulation.Conclusions: Low acoustic intensity MEUS might provide a novel method for liver haemostasis.
第五篇:IEEE參考文獻(xiàn)格式
IEEE參考文獻(xiàn)格式
由于國外期刊參考文獻(xiàn)與國內(nèi)參考文獻(xiàn)的格式有很大區(qū)別,其中最常用的參考文獻(xiàn)為會議論文、書籍、期刊文獻(xiàn),所以特別在此記錄說明,方便以后使用。
會議論文(Published Conference Proceedings style)
[1] 作者,“文章名字,”會議名稱,地點,年份,頁碼
[1] S.P.Bingulac, “On the compatibility of adaptive controllers ,” in Proc.4th Annu.Allerton Conf.Circuits and Systems Theory, New York, 1994, pp.8–16.書籍(Book style).[2] 作者,書籍名稱,出版地,年份,頁碼
[2] W.-K.Chen, Linear Networks and Systems Belmont, CA: Wadsworth, 1993, pp.123-135.期刊雜志(Periodical style)
[3] 作者,“文章名字,”期刊名,卷數(shù),頁碼,月份,年份
[3] J.U.Duncombe, “Infrared navigation-Part I: An assessment of feasibility ,” IEEE Trans.Electron Devices, vol.ED-11, pp.34-39, Jan.1959.