Submit a Paper

Propose a Workshop

Propose a Mini Symposium

The Twelfth International Conference on Internet
Monitoring and Protection

ICIMP 2017
June 25 - 29, 2017- Venice, Italy


Tutorials

T1. Empirical Modeling:  Current and Emerging Techniques
Prof. Dr. Ian Flood, University of Florida, USA

T2. P(Security)=1-P(Crime) – Is Security the Absence of Crime?
Prof. Dr. Dirk Labudde , Bioinformatics group Mittweida (bigM)/Forensic Science Investigation Lab (FoSIL), University of Applied Sciences Mittweida, Germany

T3. Photonic Integration for Access Networks
Prof. Dr. António Luis Jesus Teixeira, Instituto de Telecomunicações - Aveiro, Portugal

 

Detailed description

T1. Empirical Modeling:  Current and Emerging Techniques
Prof. Dr. Ian Flood, University of Florida, USA

The tutorial provides a review of empirical modeling and its potential for application to engineering and technology.  The scope of application and trends in use of this approach are first assessed, and the potential for its further development is identified.  This is followed by an examination of the key components of empirical modeling, namely: the structure and operation of the model, and the scheme used in its development. The tutorial then provides a rigorous methodology that must be followed to ensure the validity and value of the end model, covering the steps: strategizing; data collation and assessment; model development; model evaluation and final selection; final validation; and implementation.   The methodology is designed to cater for all forms of empirical modeling including the procedurally more demanding model development algorithms that have become available in recent years such as intelligent search. Overall, the tutorial is designed to provide researchers embarking on an empirical modeling study with an overview of when it is appropriate to use this approach, what type of system to adopt, and how to ensure development of a successful end-product.  The tutorial concludes with a brief review of emerging and future empirical modeling tools.

T2. P(Security)=1-P(Crime) – Is Security the Absence of Crime?
Prof. Dr. Dirk Labudde , Bioinformatics group Mittweida (bigM)/Forensic Science Investigation Lab (FoSIL), University of Applied Sciences Mittweida, Germany

In this tutorial, we shall have a look behind the scenes of security and explore the question of what security means from the point of view of the individual person and the society.  The overall goal shall be to find a formal definition which includes both perspectives. Starting with an overview of the different actors and facets of security, including the legal and technical aspect as well as the individual perception of security, different models to simulate security shall be presented and discussed critically. The question “Is Security the absence of Crime?” forms the center of the discussion. Exemplary, we shall examine and simulate the security of an urban system and use this example in order to simulate the expansion of crime with different models and methods. During this tutorial we shall zoom into the urban system up to the house and its components. Because of the usage of new media not only do the communication, yet also the crime shift to the virtual world. In the second part of the tutorial the digital communication shall be the center of interest and its impact on crime in the real world. We shall show that the analysis of social networks can form the basis of the prediction of crime and subsequently the impact on urban system and its actors. We shall use the following methods in the tutorial: cellular automata, graph automata, multi-agent systems, ontologies including topic maps, sentiment analysis, latent topic modeling, Hyperlink-Induced Topic Search, etc.


T3. Photonic Integration for Access Networks
Prof. Dr. António Luis Jesus Teixeira, Instituto de Telecomunicações - Aveiro, Portugal

Contributors:
Antonio Teixeira [1] , Francisco Rodrigues[1][2], Ana Tavares[1][2], Mário Lima[1]
[1] DETI, Universidade de Aveiro, Portugal
[2] PICadvanced SA, IEUA, Universidade de Aveiro, Portugal

The photonic integration is becoming a reality accessible to the community. The reasoning behind the latter is the coordination efforts which were triggered in central Europe in the field and co-sponsored by the EU research programs. The community organized around a set of photonic integration fabs which organized and tried to specify a set of design basic modules developed by the modeling and simulation software community, which virtualized the complexity of processing wafers in specific fabs. Meanwhile, a set of fabs made available a set of multi-process wafer run which drastically reduced the cost of entering this technology, specially at the prototyping price (a factor of 10x). This process was moved by consortia such as Jeppix[1], Epixfab[2].  This idea is now being replicated in several points of the globe namely in USA with the AIM platform[3].

With this, demonstrating a concept in PIC became feasible and accessible to all. This developed and trending to develop a series of achievements which are based in this capacity. Photonic integration became abler to serve the purpose and try to replace current bulk optics, since the number of function does not increase the complexity and process of production. Indeed, having the basic steps already in the process it becomes just a matter of design and optimization the whole performance.
5G and other trends like 10Gb/s to user are asking for step like function in the evolution of the current opto-eletronic interfaces. Growth in complexity is not any more sustainable with complex bulk optics approach since the number of processes and steps become too high for a good control and yield on the production.

For this purpose PIC seam promising and good candidates to provide the step wise advance required for technology to narrow down the gap between technology and bandwidth demand.
For the purpose of clarifying the role of PICs, we designed this tutorial where we will review the concepts of photonics as what regards electro-optic interfaces. Also, we will show the common building blocks and make a small tour around the existing bulk technology serving most of the purposes of todays networks. Finally, an application example of PICs for access networks, able to meet the NGPON2 standard, will be addressed and as a pointer to the potential, an image compression PIC will also be analysed.

Objectives:
-    Understand the basic of opto-electronic interfaces in access
-    Understand the basic technologies behind PIC’s
-    Understand the potential of PICs in access and other applications.
This tutorial acknowledges the Fundação para a Ciência e a Tecnologia (FCT) for the project “COMPRESS- All-optical data compression” – PTDC/EEI-TEL/7163/2014.
References
[1] Jeppix website, http://www.jeppix.eu/
[2] Epixfab website, http://epixfab.eu/
[3] AIMphotonics website, http://www.aimphotonics.com/

 
 

Copyright (c) 2006-2016, IARIA