IC3IoT 2018 | 15-17 February 2018

Tutorials

The conference program includes Tutorials, which will be conducted by leading experts in the field. Details will get updated in the conference website and available in subsequent mailings. As of now we have the following Tutorials confirmed:

Tutorial 1: IoT Security and Smart Cities : Research Challenges and Implementation

Tutorial 2: Visualizing Feature Extraction and Classifier Design: An Application to Face Recognition

Tutorial 3: Fuzzy Clustering Algorithms for Medical Image Segmentation

Tutorial 4: Basic VLC transceiver design


Date / Time

15 February 2018 / 2:00pm - 5:30pm

Tutorial 1

IoT Security and Smart Cities : Research Challenges and Implementation

Tutorial Speaker

Suman Sau,
Research Accociate, Nanyang Technological University, Singapore


Abstract
A smart city is developed, deployed and maintained with the help of Internet of Things (IoT). The smart cities have become an emerging phenomena with rapid urban growth and boost in the field of information technology. However, the function and operation of a smart city is subject to the pivotal development of security architectures. In order to identify the correct requirements, and limitations, the aspiring smart cities should also be studied to identify the achievements and flaws in information security. As smart cities are exposed to malicious attacks which can alter or damage the whole infrastructure and communication systems, so the security of a smart city regarding the information point of view is very crucial.
The purpose of this tutorial proposal is to provide an overview of security-related problems in the context of smart cities. The impressive heterogeneity, ubiquity, miniaturization, autonomous and unpredictable behavior of objects interconnected in Internet of Things, the real data deluges generated by them and, on the other side, the new hacking methods based on sensors and short-range communication technologies transform smart cities in complex environments in which the already-existing security analyses are not useful anymore. Specific security vulnerabilities, threats and solutions are approached from different areas of the smart cities’ infrastructure. As urban management should pay close attention to security and privacy protection, network protocols, identity management, standardization, trusted architecture, etc., this tutorials will brief them as a start point for better decisions in security design and management.
Keywords: Internet of Things, smart cities, Internet of Things security, attacks in Internet of Things, smart cities security

Motivation and rationale

Why is the topic timely and of particular interest to the participants? What is the relation of this tutorial to other similar tutorials presented at other events?

The smart city life will be equipped with microcontrollers, transceivers for digital communication, and suitable protocol stacks which will make them able to communicate with one another and with the users. The interaction between various IoT devices like home appliances, surveillance cameras, monitoring sensors, actuators, displays, vehicles etc will generate an immense variety of data which provides new services to public administrations, citizens and companies. The smart city approach is related to various applications like industrial automation, home automation, medical aids, mobile healthcare, energy management and smart grids, automotive, traffic management etc.
The communication between various Internet things in a smart city must be secured. If attackers get the access of the data of smart city the whole city system might be broken down. To secure the data of smart city few most important issues are must be considered. Trusted SDN Controller, Black Network, Unified Registry and Key Management System. These basic IoT-centric blocks enable a secure Smart City that mitigates cyber attacks beginning at the IoT nodes themselves. The communication and security issues in such heterogeneous platform make exploration more challenging. The objective of a smart city is to make a better use of the public resources, increasing the quality of the services offered to the citizens, while reducing the operational expenses of the public administrations. These objectives can be taken into care in this research exploration.
I) Internet of Things (IoT) and Cyber Physical Systems (CPS)
   - The Security Challenges in hyper-connected distributed architectures/systems
II) Smart City/Safe Nation is The “Systems of Systems”
   - This accelerating increase in connectivity is creating new opportunities and challenges
III) Necessity for New Standards and Considerations
   – Security Frameworks, Systems, and Architectures
   – New secure communication protocols designs
IV) Hardware As The Root Of Trust
   - Necessity for error resilient hardware devices
   – Design and implementations of security algorithms in hardware level in efficient manner
V) Applications and present research areas and challenges

Biography

Suman Sau Research Accociate, Nanyang Technological University, Singapore. Former Research Associate in CNRS-LIRMM, France and Research scholar of A.K. Choudhury School of Information Technology, University of Calcutta. Member of CBM-FAIR International Collaboration Group, Darmstadt, Germany (http://cbm.gsi.de/cbmcdb/reportgen.cgi?report=clist-html)and former Visiting Researcher, Dept. of Computer Science and Engineering, National University of Singapore.
Research Interest: Secure Processor Design, System reliability, Cryptographic hardware and embedded systems, Secure communication for Embedded Applications,Fault Detection and correction in Crypto-Devices, High speed fault tolerant data acquisition (DAQ) design.


Date / Time

16 February 2018 / 11:00am - 1:00pm

Tutorial 2

Visualizing Feature Extraction and Classifier Design: An Application to Face Recognition

Tutorial Speaker

Prof. Jamuna Kanta Sing,
Department of Computer Science and Engineering Jadavpur University, Kolkata


Abstract
Biometric technology has been used for recognizing a person based on a physiological or behavioural characteristic such as fingerprint, palmprint, face, handgeometry, iris, signature, etc. However, among them face is extensively used due to its easy availability and can also be obtained from a unsupportive person. The literature for face recognition methods is vast. Although, face recognition from still images has matured over the couple of decades, the growing number of security breaches day-by-day has compelled researchers to study in-depth in this field, especially when dealing with surveillance videos. The need for highly secured and reliable face recognition technologies are becoming apparent in government offices, banking sectors, law enforcement, health and social services. In this tutorial, different types of feature extraction techniques and design of suitable classifiers will be presented in details for development of reliable technology.

Motivation and rationale
  • Participants from Computer Science & Engineering, Information Technology and Electronics background may attend the tutorial. Young and mid-faculty members can also attend the tutorial.
  • The participants should have basic knowledge about image processing, vector operation and matrix manipulation.
  • The participants will be able learn different feature extraction techniques and how to design classifier for a recognition system. They also able to write codes for this purpose.

Biography

Dr. Jamuna Kanta Sing has received his B.E. (Computer Science & Engineering) degree from Jadavpur University in 1992, M.Tech. (Computer & Information Technology) degree from Indian Institute of Technology (IIT) Kharagpur in 1994 and Ph.D. (Engineering) degree from Jadavpur University in 2006. Dr. Sing has joined the Department of Computer Science & Engineering, Jadavpur University in March 1997 and presently serving as a Professor since 2010. He is a recipient of the BOYSCAST Fellow of the Department of Science & Technology, Govt. of India for doing advanced research at the University of Pennsylvania and the University of Iowa, USA in 2006 and the UGC Research Award in 2014. He is a senior member of the IEEE, USA. He has published more than 35 research papers in reputed refereed International Journals and more than 60 papers in international conferences. He has supervised 9 PhD scholars and handled (including on-going) 5 R&D projects from the AICTE, UGC and DST of worth around Rs. 65 Lakhs. His research interest includes face recognition and detection, video analytics, medical image processing, and pattern recognition.



Date / Time

16 February 2018 / 2:00pm - 5:30pm

Tutorial 3

Fuzzy Clustering Algorithms for Medical Image Segmentation

Tutorial Speaker

Prof. Jamuna Kanta Sing,
Department of Computer Science and Engineering Jadavpur University, Kolkata


Abstract
Segmentation of brain Magnetic Resonance (MR) image data has a significant impact on the computer guided medical image diagnosis and analysis. However, due to limitation of image acquisition devices and other related factors, MR images are severely affected by the noise and inhomogeneity artefacts which lead to blurry edges in the intersection of the intra-organ soft tissue regions, making the segmentation process more difficult and challenging. Among the different image segmentation techniques devised in the past for medical images, the fuzzy c-means (FCM) algorithm has proved its efficacy.
In this tutorial, FCM algorithm will be discussed in details for medial image segmentation, especially for brain MR images. Its limitations are also be highlighted. Different new variations of FCM algorithm will be discussed to address the limitations of FCM algorithm and also challenges in segmenting brain MR images.

Motivation and rationale
  • Participants from Computer Science & Engineering, Information Technology and Electronics background may attend the tutorial. Young and mid-faculty members can also attend the tutorial.
  • The participants should have basic knowledge about image processing, vector operation and matrix manipulation.
  • The participants will be able learn how to address the challenges in medical image segmentation using fuzzy algorithms. They also able to write codes for this purpose.

Biography

Dr. Jamuna Kanta Sing has received his B.E. (Computer Science & Engineering) degree from Jadavpur University in 1992, M.Tech. (Computer & Information Technology) degree from Indian Institute of Technology (IIT) Kharagpur in 1994 and Ph.D. (Engineering) degree from Jadavpur University in 2006. Dr. Sing has joined the Department of Computer Science & Engineering, Jadavpur University in March 1997 and presently serving as a Professor since 2010. He is a recipient of the BOYSCAST Fellow of the Department of Science & Technology, Govt. of India for doing advanced research at the University of Pennsylvania and the University of Iowa, USA in 2006 and the UGC Research Award in 2014. He is a senior member of the IEEE, USA. He has published more than 35 research papers in reputed refereed International Journals and more than 60 papers in international conferences. He has supervised 9 PhD scholars and handled (including on-going) 5 R&D projects from the AICTE, UGC and DST of worth around Rs. 65 Lakhs. His research interest includes face recognition and detection, video analytics, medical image processing, and pattern recognition.


Date / Time

15 February 2018 / 11:00am - 1:00pm

Tutorial 4

Basic VLC transceiver design

Tutorial Speaker

Dr. Karel L Sterckx,  Director, Bangkok University Center of Research in Optoelectronics, Communications and Control Systems (BU-CROCCS) Thailand

Abstract
Compared to their Radio Frequency (RF) counterparts, transceiver circuits for Visible Light Communication (VLC) are relatively easy to develop. However, there are several design issues that need careful consideration, and which are often overlooked, resulting in less effective designs. The tutorial provides for a thorough coverage of every design detail and pitfall. However, this is done in such a manner that attendees with a basic understanding of analogue electronics are able to grasp an effective design of a basic VLC transceiver, allowing them to build one to support their VLC projects.


Biography

Dr. Karel Sterckx, a Belgian national, received a Master of Applied Engineering in Electrical and Electronic Engineering from a college that is currently part of Catholic University Leuven (Belgium) in 1986. In 1997, he obtained a Master of Science in Optoelectronics and Communications Systems from Northumbria University (UK) and, in 2000, a PhD from Swansea University (UK) for work on infrared wireless communication links. He has experience as a practicing engineer in the Belgian audio-visual industry, and has been lecturing at colleges and universities in Thailand since 1993. He has been a resident of Thailand for 20 years and joined Bangkok University in 2010 as Research Scholar. Since 2012, he is the director of the Bangkok University Center of Research in Optoelectronics, Communications and Control Systems (BU-CROCCS). His research efforts concentrate on broadband indoor Optical Wireless Communication and Software Defined Communication Systems.



Go to top of page