Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Keynote Lectures

Enterprise Systems Architecture - Essentials
Henderik A. Proper, Luxembourg Institute of Science and Technology, Luxembourg

eHealth Monitoring Using Wireless Communication Protocols and Intelligent Systems
Jaime Lloret Mauri, Universidad Politecnica de Valencia, Spain

Industry 4.0: Challenges from a Data Science Perspective
Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), United States

Secure Computation Protocol: A Technology for Our Time
Moti Yung, Columbia University, United States

Analysing Digital Footprints to Infer the Health of Populations and Individuals
Ingemar Johansson Cox, University of Copenhagen, United Kingdom

 

Enterprise Systems Architecture - Essentials

Henderik A. Proper
Luxembourg Institute of Science and Technology
Luxembourg
 

Brief Bio
Prof.dr. Henderik A. Proper, Erik for friends, is an FNR PEARL Laureate, and is a senior research manager within the Computer Science (ITIS) department of the Luxembourg Institute of Science and Technology (LIST). He is also Adjunct Professor in Data & Knowledge Engineering at the University of Luxembourg. He regularly provides guest lectures within different MSc programmes offered by the University of Luxembourg (LU), the University of Lorraine (FR), TU Wien (AT), the University of Namur (BE), Antwerp University (BE), and TIAS (NL). Erik has a mixed background, covering a variety of roles in both academia and industry. His core research drive is the development of theories that work. In other words, Erik focuses on research that leads to results that have both theoretical rigour and practical relevance. His general research interest concerns the foundations and applications of domain modelling. Over the past 20 years, he has applied this research drive and general research interest towards the further development of the field of enterprise engineering, and enterprise modelling in particular. His long experience in teaching and coaching a wide variety of people enables him to involve and engage others in this development. He has co-authored several journal papers, conference publications and books. Erik received his Master's degree from the University of Nijmegen, The Netherlands in May 1990, and received his PhD (with distinction) from the same University in April 1994. In his Doctoral thesis he developed a theory for conceptual modelling of evolving application domains, yielding a formal specification of evolving information systems. After receiving his PhD, Erik became a senior research fellow at the Computer Science Department of the University of Queensland, Brisbane, Australia. During that period he also conducted research in the Asymetrix Research Lab at that University for Asymetrix Corp, Seattle, Washington. In 1995 he became a lecturer at the School of Information Systems from the Queensland University of Technology, Brisbane, Australia. During this period he was also seconded as a senior researcher to the Distributed Systems Technology Centre (DSTC), a Cooperative Research Centre funded by the Australian government. From 1997 to 2001, Erik worked in industry. First as a consultant at Origin, Amsterdam, The Netherlands, and later as a research consultant and principal scientist at the Ordina Institute for Research and Innovation, Gouda, The Netherlands. In June 2001, Erik returned to academia, where he became an adjunct Professor at the Radboud University Nijmegen. In September 2002, Erik obtained a full-time Professorship position at the Radboud University Nijmegen. In January of 2008, he went back to combining industry and academia, by combining his Professorship with consulting and innovation at Capgemini, with the aim of more tightly combining his theoretical and practical work. Finally, in May 2010 Erik moved to the Luxembourg Institute of Science and Technology as a PEARL chair, while initially also continuing his chair at the Radboud University Nijmegen in the Netherlands. As of June 2017, Erik also holds a chair in Data & Knowledge Engineering at the University of Luxembourg. As of January 2022, Erik is vice-chair of the IFIP 8.1 working group, while also being the representative for the Netherlands in IFIP's TC8 technical committee. He is also the Stellvertretender Sprecher (vice chair) of the EMISA working group of the German Computer Science Society (Gesellschaft für Informatik), as well as a member of the management team of the Enterprise Engineering Network.


Abstract
The concept of "system" is probably known to most of us. It may trigger some of us may think about software, and some of us about phenomena in nature. Yet others may be prompted to think about smart cities, mobility networks, and logistic chains.

In this keynote we will look at systems as complex webs of actors and resources, where there is a need for these "webs" to function as a whole. This may sound abstract. Nevertheless, as soon as we start talking about topics such as the circular economy, privacy, cyber security, regulatory compliance, sustainability, usability, risk management, and indeed management of virus outbreaks, we have started to scratch the surface of the world (complex) systems engineering.  And as soon as we realise that these topics are quite often inter-connected, and delving into the underlying mechanisms, we have immersed ourselves fully in the world of complex systems.

Modern technologies, in particular IT-enabled technologies, further increase our ambition in creating such complex systems involving a mix of human and IT-enabled actors, while also increasing our dependence on the well functioning of such systems. This puts a lot of stress on the need to design such systems. This is where the field of systems architecting & engineering comes into play.

A specific domain of systems architecting & engineering, where a lot of experience has already been gained, is the domain of enterprises. In other words, systems with a clear driving purpose, such as companies, government agencies, etc. We will discuss some of the key instruments (i.e. design technologies) used to architect and engineer such systems, while ensuring alignment between the human, organisational, and technical components.



 

 

eHealth Monitoring Using Wireless Communication Protocols and Intelligent Systems

Jaime Lloret Mauri
Universidad Politecnica de Valencia
Spain
 

Brief Bio
Jaime Lloret received his B.Sc. and M.Sc. in Physics in 1997, his B.Sc. and M.Sc. in electronic Engineering in 2003 and his Ph.D. in telecommunication engineering (Dr. Ing.) in 2006. He is a Cisco Certified Network Professional Instructor and he has 7 Cisco Networking Academy Certifications. He also has the Hewlett-Packard IT Architect Certification. He worked as a network designer and administrator in several enterprises. He is Full Professor at the Polytechnic University of Valencia. He is the Chair of the Integrated Management Coastal Research Institute (IGIC) since January 2017. He was the founder of the “Communications and Networks” research group of the IGIC and he is the head (and founder) of the "Active and collaborative techniques and use of technologic resources in the education (EITACURTE)" Innovation Group. He is the director of the University Diploma “Redes y Comunicaciones de Ordenadores” and he has been the director of the University Master "Digital Post Production" for the term 2012-2016.


Abstract
Wireless Sensor Networks and IoT technologies are becoming the key systems to monitor remotely patients with diseases and also follow the evolution of elderly and disabled people. These systems use physical sensors or probes connected to an electronic device, which is able to process the data gathered by the input port and send them to a central data server in order to create a big database and apply artificial intelligence techniques. In this talk we are going to detail some sensors developed and some wireless sensor devices used in our published works. Moreover, we will describe our last contributions to improve Wireless Body Area Sensor Networks. Finally we will show some projects performed by our team in order to bring to the audience some real cases.



 

 

Industry 4.0: Challenges from a Data Science Perspective

Ajith Abraham
Machine Intelligence Research Labs (MIR Labs)
United States
 

Brief Bio
Dr. Abraham is the Director of Machine Intelligence Research Labs (MIR Labs), a Not-for-Profit Scientific Network for Innovation and Research Excellence connecting Industry and Academia. The Network with Head quarters in Seattle, USA has currently more than 1,000 scientific members from over 100 countries. As an Investigator / Co-Investigator, he has won research grants worth over 100+ Million US$ from Australia, USA, EU, Italy, Czech Republic, France, Malaysia and China.Dr. Abraham works in a multi-disciplinary environment involving machine intelligence, cyber-physical systems, Internet of things, network security, sensor networks, Web intelligence, Web services, data mining and applied to various real world problems. In these areas he has authored / coauthored more than 1,300+ research publications out of which there are 100+ books covering various aspects of Computer Science. One of his books was translated to Japanese and few other articles were translated to Russian and Chinese. About 1000+ publications are indexed by Scopus and over 800 are indexed by Thomson ISI Web of Science. Some of the articles are available in the ScienceDirect Top 25 hottest articles. He has 700+ co-authors originating from 40+ countries. Dr. Abraham has more than 36,000+ academic citations (h-index of 89 as per google scholar). He has given more than 100 plenary lectures and conference tutorials (in 20+ countries). For his research, he has won seven best paper awards at prestigious International conferences held in Belgium, Canada Bahrain, Czech Republic, China and India.Since 2008, Dr. Abraham is the Chair of IEEE Systems Man and Cybernetics Society Technical Committee on Soft Computing (which has over 200+ members) and served as a Distinguished Lecturer of IEEE Computer Society representing Europe (2011-2013). Currently Dr. Abraham is the editor-in-chief of Engineering Applications of Artificial Intelligence (EAAI) and serves/served the editorial board of over 15 International Journals indexed by Thomson ISI. He is actively involved in the organization of several academic conferences, and some of them are now annual events. Dr. Abraham received Ph.D. degree in Computer Science from Monash University, Melbourne, Australia (2001) and a Master of Science Degree from Nanyang Technological University, Singapore (1998). More information at: http://www.softcomputing.net/


Abstract
We are blessed with the sophisticated technological artifacts that are enriching our daily lives and the society. Industry 4.0 is the current trend of automation and data exchange in manufacturing technologies, which also includes a close integration of cyber-physical systems, the Internet of things and cloud computing. In this talk, the concept of Industry 4.0 and Society 5.0 will be presented and then various research challenges from several applications perspective will be illustrated. Some real world applications involving the analysis of complex data / applications would be the key focus.



 

 

Secure Computation Protocol: A Technology for Our Time

Moti Yung
Columbia University
United States
 

Brief Bio
Moti Yung is a Security and Privacy Research Scientist with Google. He got his PhD from Columbia University in 1988. Previously, he was with IBM Research, Certco, RSA Laboratories, and Snap. He has also been an adjunct senior research faculty at Columbia, where he has co-advised and worked with numerous PhD students. Yung is a fellow of the IEEE, the Association for Computing Machinery (ACM), the International Association for Cryptologic Research (IACR), and the European Association for Theoretical Computer Science (EATCS). In 2010 he gave the IACR Distinguished Lecture. He is the recipient of the 2014 ACM’s SIGSAC Outstanding Innovation award, the 2014 ESORICS (European Symposium on Research in Computer Security) Outstanding Research award, an IBM Outstanding Innovation award, a Google OC award, and a Google founders’ award. Yung’s main professional interests are in Security, Privacy, and Cryptography. His contributions to research and development treat science and technology holistically: from the theoretical mathematical foundations, via conceptual mechanisms which typify computer science, to participation in design and development of industrial products. His published work (articles, patents, a book, and edited books) includes collaborations with more than 300 highly appreciated co-authors. Yung’s work has been predicting future needs of secure systems, and analyzing coming threats. These led to basic theoretical and applied notions, like: ransomware attacks, cryptosystems subversion, concurrent sessions in authentication protocols, strong secure encryption, and digital signatures from simplified cryptography. His industrial work gave rise to new diversified mechanisms, some of which are in extensive use. These include: public-key based second factor authentication device; new factors for user identification; distributed signing methods; numerous very large scale (web and mobile) encryption schemes; anonymization of historical user data; transparency and control for web users; secure data collection; secure large scale distributed computation protocol for privacy preserving data analytics; and secure cloud storage.


Abstract
For the last 40 years, Secure Multiparty Computation protocols, where data is protected in computation and not just in communication, has been developed as a major field in Cryptographic research. The area has been a major part of theoretical research where techniques, and paradigms have been developed. The talk will argue and demonstrate that such protocols are needed and become useful under certain conditions, where business needs arise while privacy constraints exist. As the computing paradigms nowadays include cloud computing, and require collaborative efforts over the Internet, the technique of secure computing protocols become an important enabling building block to implementing certain tasks which are otherwise hard to do or impossible under privacy constraints. We will discuss feasibility of performing such tasks and will demonstrate some basic tasks which have been useful. The talk will explain why it has taken many years to need this techniques in actual business operations, and how to use it and where given its nature.



 

 

Analysing Digital Footprints to Infer the Health of Populations and Individuals

Ingemar Johansson Cox
University of Copenhagen
United Kingdom
 

Brief Bio
Ingemar J. Cox is currently a Professor in the Department of Computer Science at University College London (UCL). He is also a Professor in the Department of Computer Science at the University of Copenhagen. He is Head of the Future Media Group at UCL. Between 2003 and 2008, he was  Director of UCL's Adastral Park Campus. His current research interests involve information retrieval and data analytics of online social media, Twitter and query logs, for healthcare purposes. He is currently a deputy director of an £11M EPSRC IRC on "Early Warning Sensor Systems for Infectious Diseases".He received his B.Sc. from University College London and Ph.D. from Oxford University. He was a member of the Technical Staff at AT&T Bell Labs at Murray Hill from 1984 until 1989 where his research interests werefocused on mobile robots. In 1989 he joined NEC Research Institute in Princeton, NJ as a senior research scientist in computer science. At NEC, his research shifted to problems in computer vision and he was responsible for creating the computer vision group at NECI. He has worked on problems to do with stereo and motion correspondence and multimedia issues of image database retrieval and watermarking. From 1997-1999, heserved as Chief Technology Officer of Signafy, Inc, a subsidiary of NEC responsible for the commercialization of digital watermarking.  Between 1996 and 1999, he led the design of NEC's watermarking proposal for DVD video disks and later colloborated with IBM in developing the  technology behind the joint "Galaxy" proposal supported by Hitachi, IBM, NEC, Pioneer and Sony.  In 1999, he returned to NEC ResearchInstitute as a Research Fellow.In 1999, he was awarded the IEEE Signal Processing Society Best Paper Award (Image and Multidimensional Signal Processing Area) for a paper he co-authored on digital watermarking. The paper subsequently received the IEEE Signal Processing Society Sustained Impact Award in 2015.  He is a recipient of a Royal Society Wolfson Fellowship (2002-2007).  In 2019 he was awarded the Tony Kent Strix Award "in recognition of hismajor and sustained contributions to the field of information retrieval".  He is a Fellow of the ACM, IEEE, the IET (formerly IEE), and the British Computer Society. He is a member of the UK Computing Research Committee.


Abstract
A person’s digital footprint is a sequence of data that is generated as a consequence of a person’s daily interaction with the electronic world. A digital footprint may be passive, i.e. a person is unaware of the data being generated, as for example, when location data is collected when using a mobile phone. A digital footprint may also be active, i.e. a person is explicitly creating digital data, as for example, when using a web search engine, Twitter or other social media platforms. A considerable body of research has demonstrated that such data can be analysed to infer properties of a group of people (population) or of an individual. Examples of such properties include demographic characteristics, and purchasing preferences. In this talk, we focus on health characteristics of both populations and individuals. At the population level, we discuss methods to estimate prevalence and virulence of a disease, and effectiveness of national public health interventions (vaccines and changes to law). At an individual level, we discuss methods to stratify users into disease risk groups, and to predict the likelihood of specific diseases, including some forms of cancer. These methods have a variety of advantages for public health surveillance and individual health. However these same methods raise significant privacy and ethical concerns. We discuss technical solutions to address privacy at a population level and highlight concerns at an individual level.



footer