IC3IoT 2018 | 15-17 February 2018

Call for Tutorial Proposals

The conference program includes Tutorials, which will be conducted by leading experts in the field. Details will get updated in the conference website and available in subsequent mailings. As of now we have the following Tutorials confirmed:

Tutorial 1: IoT Security and Smart Cities : Research Challenges and Implementation

Tutorial 2: Visualizing Feature Extraction and Classifier Design: An Application to Face Recognition

Tutorial 3: Data Analytics with R and Python

Tutorial 4: Fuzzy Clustering Algorithms for Medical Image Segmentation

Proposals for short courses can be submitted to chair@ic3iot-conference.org


Date / Time

TBA

Tutorial 1

IoT Security and Smart Cities : Research Challenges and Implementation

Tutorial Speaker

Suman Sau,
Research Accociate, Nanyang Technological University, Singapore


Abstract
A smart city is developed, deployed and maintained with the help of Internet of Things (IoT). The smart cities have become an emerging phenomena with rapid urban growth and boost in the field of information technology. However, the function and operation of a smart city is subject to the pivotal development of security architectures. In order to identify the correct requirements, and limitations, the aspiring smart cities should also be studied to identify the achievements and flaws in information security. As smart cities are exposed to malicious attacks which can alter or damage the whole infrastructure and communication systems, so the security of a smart city regarding the information point of view is very crucial.
The purpose of this tutorial proposal is to provide an overview of security-related problems in the context of smart cities. The impressive heterogeneity, ubiquity, miniaturization, autonomous and unpredictable behavior of objects interconnected in Internet of Things, the real data deluges generated by them and, on the other side, the new hacking methods based on sensors and short-range communication technologies transform smart cities in complex environments in which the already-existing security analyses are not useful anymore. Specific security vulnerabilities, threats and solutions are approached from different areas of the smart cities’ infrastructure. As urban management should pay close attention to security and privacy protection, network protocols, identity management, standardization, trusted architecture, etc., this tutorials will brief them as a start point for better decisions in security design and management.
Keywords: Internet of Things, smart cities, Internet of Things security, attacks in Internet of Things, smart cities security

Motivation and rationale

Why is the topic timely and of particular interest to the participants? What is the relation of this tutorial to other similar tutorials presented at other events?

The smart city life will be equipped with microcontrollers, transceivers for digital communication, and suitable protocol stacks which will make them able to communicate with one another and with the users. The interaction between various IoT devices like home appliances, surveillance cameras, monitoring sensors, actuators, displays, vehicles etc will generate an immense variety of data which provides new services to public administrations, citizens and companies. The smart city approach is related to various applications like industrial automation, home automation, medical aids, mobile healthcare, energy management and smart grids, automotive, traffic management etc.
The communication between various Internet things in a smart city must be secured. If attackers get the access of the data of smart city the whole city system might be broken down. To secure the data of smart city few most important issues are must be considered. Trusted SDN Controller, Black Network, Unified Registry and Key Management System. These basic IoT-centric blocks enable a secure Smart City that mitigates cyber attacks beginning at the IoT nodes themselves. The communication and security issues in such heterogeneous platform make exploration more challenging. The objective of a smart city is to make a better use of the public resources, increasing the quality of the services offered to the citizens, while reducing the operational expenses of the public administrations. These objectives can be taken into care in this research exploration.
I) Internet of Things (IoT) and Cyber Physical Systems (CPS)
   - The Security Challenges in hyper-connected distributed architectures/systems
II) Smart City/Safe Nation is The “Systems of Systems”
   - This accelerating increase in connectivity is creating new opportunities and challenges
III) Necessity for New Standards and Considerations
   – Security Frameworks, Systems, and Architectures
   – New secure communication protocols designs
IV) Hardware As The Root Of Trust
   - Necessity for error resilient hardware devices
   – Design and implementations of security algorithms in hardware level in efficient manner
V) Applications and present research areas and challenges

Biography

Suman Sau Research Accociate, Nanyang Technological University, Singapore. Former Research Associate in CNRS-LIRMM, France and Research scholar of A.K. Choudhury School of Information Technology, University of Calcutta. Member of CBM-FAIR International Collaboration Group, Darmstadt, Germany (http://cbm.gsi.de/cbmcdb/reportgen.cgi?report=clist-html)and former Visiting Researcher, Dept. of Computer Science and Engineering, National University of Singapore.
Research Interest: Secure Processor Design, System reliability, Cryptographic hardware and embedded systems, Secure communication for Embedded Applications,Fault Detection and correction in Crypto-Devices, High speed fault tolerant data acquisition (DAQ) design.


Date / Time

TBA

Tutorial 2

Visualizing Feature Extraction and Classifier Design: An Application to Face Recognition

Tutorial Speaker

Prof. Jamuna Kanta Sing,
Department of Computer Science and Engineering Jadavpur University, Kolkata


Abstract
Biometric technology has been used for recognizing a person based on a physiological or behavioural characteristic such as fingerprint, palmprint, face, handgeometry, iris, signature, etc. However, among them face is extensively used due to its easy availability and can also be obtained from a unsupportive person. The literature for face recognition methods is vast. Although, face recognition from still images has matured over the couple of decades, the growing number of security breaches day-by-day has compelled researchers to study in-depth in this field, especially when dealing with surveillance videos. The need for highly secured and reliable face recognition technologies are becoming apparent in government offices, banking sectors, law enforcement, health and social services. In this tutorial, different types of feature extraction techniques and design of suitable classifiers will be presented in details for development of reliable technology.

Motivation and rationale
  • Participants from Computer Science & Engineering, Information Technology and Electronics background may attend the tutorial. Young and mid-faculty members can also attend the tutorial.
  • The participants should have basic knowledge about image processing, vector operation and matrix manipulation.
  • The participants will be able learn different feature extraction techniques and how to design classifier for a recognition system. They also able to write codes for this purpose.

Biography

Dr. Jamuna Kanta Sing has received his B.E. (Computer Science & Engineering) degree from Jadavpur University in 1992, M.Tech. (Computer & Information Technology) degree from Indian Institute of Technology (IIT) Kharagpur in 1994 and Ph.D. (Engineering) degree from Jadavpur University in 2006. Dr. Sing has joined the Department of Computer Science & Engineering, Jadavpur University in March 1997 and presently serving as a Professor since 2010. He is a recipient of the BOYSCAST Fellow of the Department of Science & Technology, Govt. of India for doing advanced research at the University of Pennsylvania and the University of Iowa, USA in 2006 and the UGC Research Award in 2014. He is a senior member of the IEEE, USA. He has published more than 35 research papers in reputed refereed International Journals and more than 60 papers in international conferences. He has supervised 9 PhD scholars and handled (including on-going) 5 R&D projects from the AICTE, UGC and DST of worth around Rs. 65 Lakhs. His research interest includes face recognition and detection, video analytics, medical image processing, and pattern recognition.


Date / Time

TBA

Tutorial 3

Data Analytics with R and Python

Tutorial Speaker

Parkavi.A
Assistant Professor , CSE dept, Ramaiah Institute of Technology, Bangalore

Dr.Lakshmi.K
Dean & Professor, School of Computer Science and Engineering, Periyar Manimmai University, Thanjavur,Tamilnadu


Abstract
To introduce researchers and faculty to real-world applications involving data mining and predictive analytics
Motivation and rationale

The workshop will introduce statistics and data mining techniques required to validate and accurately report results of data in different domain. Topics will cover how different domain data are being used to transform world. Specifically, we will demonstrate how exploratory data analysis, data mining, predictive analytics, machine learning, and visualization techniques are being applied to different domain data to improve businesses and scale insights driven from business data.

Biography

Presently Parkavi.A is pursuing her research in Educational Data Mining. She is working on data mining models to analyze Educational data to improve outcome based education using R tool and Python programming.She has published many research papers in conferences and journals based on the study carried out in Educational technology and EDM. She has Organized FDPs and workshops.

Dr.Lakshmi.K is presently working as Professor & Dean of School of computing science and engineering. Her are of interest in research are Text Categorization, Machine Learning, Information Retrieval, Natural Language processing. She has published many research papers in International Conferences and Journals.


Date / Time

TBA

Tutorial 4

Fuzzy Clustering Algorithms for Medical Image Segmentation

Tutorial Speaker

Prof. Jamuna Kanta Sing,
Department of Computer Science and Engineering Jadavpur University, Kolkata


Abstract
Segmentation of brain Magnetic Resonance (MR) image data has a significant impact on the computer guided medical image diagnosis and analysis. However, due to limitation of image acquisition devices and other related factors, MR images are severely affected by the noise and inhomogeneity artefacts which lead to blurry edges in the intersection of the intra-organ soft tissue regions, making the segmentation process more difficult and challenging. Among the different image segmentation techniques devised in the past for medical images, the fuzzy c-means (FCM) algorithm has proved its efficacy.
In this tutorial, FCM algorithm will be discussed in details for medial image segmentation, especially for brain MR images. Its limitations are also be highlighted. Different new variations of FCM algorithm will be discussed to address the limitations of FCM algorithm and also challenges in segmenting brain MR images.

Motivation and rationale
  • Participants from Computer Science & Engineering, Information Technology and Electronics background may attend the tutorial. Young and mid-faculty members can also attend the tutorial.
  • The participants should have basic knowledge about image processing, vector operation and matrix manipulation.
  • The participants will be able learn how to address the challenges in medical image segmentation using fuzzy algorithms. They also able to write codes for this purpose.

Biography

Dr. Jamuna Kanta Sing has received his B.E. (Computer Science & Engineering) degree from Jadavpur University in 1992, M.Tech. (Computer & Information Technology) degree from Indian Institute of Technology (IIT) Kharagpur in 1994 and Ph.D. (Engineering) degree from Jadavpur University in 2006. Dr. Sing has joined the Department of Computer Science & Engineering, Jadavpur University in March 1997 and presently serving as a Professor since 2010. He is a recipient of the BOYSCAST Fellow of the Department of Science & Technology, Govt. of India for doing advanced research at the University of Pennsylvania and the University of Iowa, USA in 2006 and the UGC Research Award in 2014. He is a senior member of the IEEE, USA. He has published more than 35 research papers in reputed refereed International Journals and more than 60 papers in international conferences. He has supervised 9 PhD scholars and handled (including on-going) 5 R&D projects from the AICTE, UGC and DST of worth around Rs. 65 Lakhs. His research interest includes face recognition and detection, video analytics, medical image processing, and pattern recognition.



Go to top of page