{"id":717,"date":"2020-06-29T02:00:12","date_gmt":"2020-06-29T02:00:12","guid":{"rendered":"http:\/\/ieee-cyber.org\/2020\/?page_id=717"},"modified":"2020-06-29T02:00:12","modified_gmt":"2020-06-29T02:00:12","slug":"conference-scope","status":"publish","type":"page","link":"https:\/\/ieee-cyber.org\/2020\/conference-scope\/","title":{"rendered":"Conference Scope"},"content":{"rendered":"<header class=\"entry-header\">\n<h1 class=\"entry-title\">Conference Scope<\/h1>\n<\/header>\n<div class=\"entry-content\">\n<div class=\"entry-content\">\n<p>Key Conference Topics (but are not limited to):<\/p>\n<ul>\n<li><strong>Robotics:<\/strong><br \/>\nCooperative robot; soft robot; industry robot; machining robot; parallel robot; tele-robotics; human-machine interaction; perception systems; neural-controlled machines and robots; micro\/nano\/bio manipulation and assembly; search, rescue and field robotics; robot sensing and data fusion; localization, navigation and mapping; medical robots and bio-robotics; human-centered systems; space and underwater robots.<\/li>\n<li><strong>Control\/Automation:<\/strong><br \/>\nAdaptive control; networked control; nonlinear control, multi-agent systems; co-operative control; control of energy systems; hybrid control; intelligent automation; intelligent control; factory modeling and simulation; home, laboratory and service automation; automation in energy systems; automation in life sciences and healthcare; planning, scheduling and coordination; biomedical applications.<\/li>\n<li><strong>Cyber Physical Systems:<\/strong><br \/>\nEmbedded systems; integrated sensing, communication, and computational systems; chemical, biological, physical diagnostic and implantable systems; complex systems; mobile intelligent systems; micro power grids; electric power networks and grids; sustainable and distributed energy systems; energy scavenging systems; cyber technology to protect critical infrastructure.<\/li>\n<li><strong>Internet of Things and Sensor Network:<\/strong><br \/>\nAdvanced \u201cInternet of Things\u201d technologies and applications; E-commerce; mobile commerce; logistics; transportation related issues; cyber security for energy and communication infrastructures; wireless, optical, and hybrid communications systems; internet security.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Conference Scope Key Conference Topics (but are not lim [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-717","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/ieee-cyber.org\/2020\/wp-json\/wp\/v2\/pages\/717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ieee-cyber.org\/2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ieee-cyber.org\/2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ieee-cyber.org\/2020\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ieee-cyber.org\/2020\/wp-json\/wp\/v2\/comments?post=717"}],"version-history":[{"count":1,"href":"https:\/\/ieee-cyber.org\/2020\/wp-json\/wp\/v2\/pages\/717\/revisions"}],"predecessor-version":[{"id":786,"href":"https:\/\/ieee-cyber.org\/2020\/wp-json\/wp\/v2\/pages\/717\/revisions\/786"}],"wp:attachment":[{"href":"https:\/\/ieee-cyber.org\/2020\/wp-json\/wp\/v2\/media?parent=717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}