|  |  |  |  | |
|      |  |  |  | |
| 
 
 T1. 
       Empirical Modeling:  Current and Emerging Techniques T2. P(Security)=1-P(Crime) – Is Security the Absence of Crime? T3. Photonic Integration for Access Networks 
 Detailed description T1. 
       Empirical Modeling:  Current and Emerging Techniques The tutorial provides a review of empirical modeling and its potential for application to engineering and technology. The scope of application and trends in use of this approach are first assessed, and the potential for its further development is identified. This is followed by an examination of the key components of empirical modeling, namely: the structure and operation of the model, and the scheme used in its development. The tutorial then provides a rigorous methodology that must be followed to ensure the validity and value of the end model, covering the steps: strategizing; data collation and assessment; model development; model evaluation and final selection; final validation; and implementation. The methodology is designed to cater for all forms of empirical modeling including the procedurally more demanding model development algorithms that have become available in recent years such as intelligent search. Overall, the tutorial is designed to provide researchers embarking on an empirical modeling study with an overview of when it is appropriate to use this approach, what type of system to adopt, and how to ensure development of a successful end-product. The tutorial concludes with a brief review of emerging and future empirical modeling tools. T2. P(Security)=1-P(Crime) – Is Security the Absence of Crime? In this tutorial, we shall have a look behind the scenes of security and   explore the question of what security means from the point of view of   the individual person and the society.  The overall goal shall be to   find a formal definition which includes both perspectives. Starting with   an overview of the different actors and facets of security, including   the legal and technical aspect as well as the individual perception of   security, different models to simulate security shall be presented and   discussed critically. The question “Is Security the absence of Crime?”   forms the center of the discussion. Exemplary, we shall examine and   simulate the security of an urban system and use this example in order   to simulate the expansion of crime with different models and methods.   During this tutorial we shall zoom into the urban system up to the house   and its components. Because of the usage of new media not only do the   communication, yet also the crime shift to the virtual world. In the   second part of the tutorial the digital communication shall be the   center of interest and its impact on crime in the real world. We shall   show that the analysis of social networks can form the basis of the   prediction of crime and subsequently the impact on urban system and its   actors. We shall use the following methods in the tutorial: cellular   automata, graph automata, multi-agent systems, ontologies including   topic maps, sentiment analysis, latent topic modeling, Hyperlink-Induced   Topic Search, etc.  Contributors: The photonic integration is becoming a reality accessible to the community. The reasoning behind the latter is the coordination efforts which were triggered in central Europe in the field and co-sponsored by the EU research programs. The community organized around a set of photonic integration fabs which organized and tried to specify a set of design basic modules developed by the modeling and simulation software community, which virtualized the complexity of processing wafers in specific fabs. Meanwhile, a set of fabs made available a set of multi-process wafer run which drastically reduced the cost of entering this technology, specially at the prototyping price (a factor of 10x). This process was moved by consortia such as Jeppix[1], Epixfab[2]. This idea is now being replicated in several points of the globe namely in USA with the AIM platform[3]. With this, demonstrating a concept in PIC became feasible and accessible   to all. This developed and trending to develop a series of achievements   which are based in this capacity. Photonic integration became abler to   serve the purpose and try to replace current bulk optics, since the   number of function does not increase the complexity and process of   production. Indeed, having the basic steps already in the process it   becomes just a matter of design and optimization the whole performance.  For this purpose PIC seam promising and good candidates to provide the   step wise advance required for technology to narrow down the gap between   technology and bandwidth demand.  Objectives: |  | |||
|  | ||||
|  | ||||
|  | ||||
|  |  | |||
|  | ||||
|  | ||||
|  |  | |||
|  |  | 
Copyright (c) 2006-2016, IARIA