{"id":37,"date":"2015-06-04T17:44:19","date_gmt":"2015-06-04T09:44:19","guid":{"rendered":"http:\/\/www.ieee-cyber.org\/2016\/?page_id=37"},"modified":"2016-04-15T21:19:24","modified_gmt":"2016-04-15T13:19:24","slug":"scope","status":"publish","type":"page","link":"https:\/\/www.ieee-cyber.org\/2016\/scope\/","title":{"rendered":"Conference Scope"},"content":{"rendered":"<h4><span style=\"color: #751712;\"><strong>Key Conference Topics (but are not limited to):<\/strong><\/span><\/h4>\n<ul>\n<li>Cyber Physical Systems: embedded systems; integrated sensing, including chemical, biological, physical diagnostic and implantable systems; mobile intelligent systems; sustainable and distributed energy systems; CPS for disaster monitoring and rescue.<\/li>\n<li>Cloud Robotics: tele-robotics; human-machine interaction; perception systems; neural-controlled machines and robots; networked search, rescue and field robotics; robot localization, navigation and mapping; space and underwater robots.<\/li>\n<li>Internet of Things: Advanced &#8220;Internet of Things&#8221; technologies and applications; mobile commerce, logistics, transportation related issues; Cyber\/lnternet security.<\/li>\n<li>Networked Sensors: Wireless\/LAN networked sensors; energy scavenging systems for self-powered sensor networks; wearable sensors and devices; wireless body area networks; body sensor networks; reconfigurable wireless networks; low-power sensors.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Key Conference Topics (but are not limited to): Cyber Physical Systems: embedded systems; integrated sensing, including chemical, biological, physical diagnostic and implantable systems; mobile intelligent systems; sustainable and distributed energy systems; CPS for disaster monitoring and rescue. Cloud Robotics: tele-robotics;&hellip;<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"https:\/\/www.ieee-cyber.org\/2016\/scope\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","footnotes":""},"class_list":["post-37","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.ieee-cyber.org\/2016\/wp-json\/wp\/v2\/pages\/37","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ieee-cyber.org\/2016\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ieee-cyber.org\/2016\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ieee-cyber.org\/2016\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ieee-cyber.org\/2016\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":8,"href":"https:\/\/www.ieee-cyber.org\/2016\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":185,"href":"https:\/\/www.ieee-cyber.org\/2016\/wp-json\/wp\/v2\/pages\/37\/revisions\/185"}],"wp:attachment":[{"href":"https:\/\/www.ieee-cyber.org\/2016\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}