|
||||
T1.
Empirical Modeling: Current and Emerging Techniques T2. P(Security)=1-P(Crime) – Is Security the Absence of Crime? T3. Photonic Integration for Access Networks
Detailed description T1.
Empirical Modeling: Current and Emerging Techniques The tutorial provides a review of empirical modeling and its potential for application to engineering and technology. The scope of application and trends in use of this approach are first assessed, and the potential for its further development is identified. This is followed by an examination of the key components of empirical modeling, namely: the structure and operation of the model, and the scheme used in its development. The tutorial then provides a rigorous methodology that must be followed to ensure the validity and value of the end model, covering the steps: strategizing; data collation and assessment; model development; model evaluation and final selection; final validation; and implementation. The methodology is designed to cater for all forms of empirical modeling including the procedurally more demanding model development algorithms that have become available in recent years such as intelligent search. Overall, the tutorial is designed to provide researchers embarking on an empirical modeling study with an overview of when it is appropriate to use this approach, what type of system to adopt, and how to ensure development of a successful end-product. The tutorial concludes with a brief review of emerging and future empirical modeling tools. T2. P(Security)=1-P(Crime) – Is Security the Absence of Crime? In this tutorial, we shall have a look behind the scenes of security and explore the question of what security means from the point of view of the individual person and the society. The overall goal shall be to find a formal definition which includes both perspectives. Starting with an overview of the different actors and facets of security, including the legal and technical aspect as well as the individual perception of security, different models to simulate security shall be presented and discussed critically. The question “Is Security the absence of Crime?” forms the center of the discussion. Exemplary, we shall examine and simulate the security of an urban system and use this example in order to simulate the expansion of crime with different models and methods. During this tutorial we shall zoom into the urban system up to the house and its components. Because of the usage of new media not only do the communication, yet also the crime shift to the virtual world. In the second part of the tutorial the digital communication shall be the center of interest and its impact on crime in the real world. We shall show that the analysis of social networks can form the basis of the prediction of crime and subsequently the impact on urban system and its actors. We shall use the following methods in the tutorial: cellular automata, graph automata, multi-agent systems, ontologies including topic maps, sentiment analysis, latent topic modeling, Hyperlink-Induced Topic Search, etc. Contributors: The photonic integration is becoming a reality accessible to the community. The reasoning behind the latter is the coordination efforts which were triggered in central Europe in the field and co-sponsored by the EU research programs. The community organized around a set of photonic integration fabs which organized and tried to specify a set of design basic modules developed by the modeling and simulation software community, which virtualized the complexity of processing wafers in specific fabs. Meanwhile, a set of fabs made available a set of multi-process wafer run which drastically reduced the cost of entering this technology, specially at the prototyping price (a factor of 10x). This process was moved by consortia such as Jeppix[1], Epixfab[2]. This idea is now being replicated in several points of the globe namely in USA with the AIM platform[3]. With this, demonstrating a concept in PIC became feasible and accessible to all. This developed and trending to develop a series of achievements which are based in this capacity. Photonic integration became abler to serve the purpose and try to replace current bulk optics, since the number of function does not increase the complexity and process of production. Indeed, having the basic steps already in the process it becomes just a matter of design and optimization the whole performance. For this purpose PIC seam promising and good candidates to provide the step wise advance required for technology to narrow down the gap between technology and bandwidth demand. Objectives: |
||||
Copyright (c) 2006-2016, IARIA