Future ICT 2021: The Second International Symposium on Future Information and Communication Technology Fushin Hotel Taichung Taichung City, Taiwan, February 1-5, 2021 |
Conference website | https://sites.google.com/view/futureict2021/ |
Submission link | https://easychair.org/conferences/?conf=futureict2021 |
Abstract registration deadline | January 18, 2021 |
Submission deadline | January 22, 2021 |
Camera Ready Version Due | January 25, 2021 |
Registration Due | January 25, 2021 |
Extra Keynote Speeches I and Special Sessions I and Activities I | February 4, 2021 |
Extra Keynote Speeches II and Special Sessions II and Activities II | February 5, 2021 |
*****New Information*****
Future ICT 2021 Program Time Table: Please download the file via this link (Updated), https://drive.google.com/file/d/1MFi4Z33VIARkEckd-Hyw502tu-otAF83/view?usp=sharing
Future ICT 2021 Authors Presentation Information: Please download the file via this link (Updated),https://drive.google.com/file/d/1Z9jtzAT-P-NWaJW_oaWAGeLDhtQgWXDD/view?usp=sharing
************************
****************************
Link for uploading poster/prerecord video(MP4)/ppt: https://forms.gle/SEeAyTQgXHR2mUpz7
****************************
If you want to attend the virtual conference, please download the Meeting tools via visiting https://sites.google.com/view/futureict2021/
****************************
This is the second International Symposium on Future Information and Communication Technology (Future ICT 2021). The Symposium will be held by using face to face meeting together with virtual online meeting plus poster sessions. The advance smart applications based on future Information and Communication Technology would utilize all of continuously evolving and converging information and communication technologies, including Artificial Intelligent (AI), Cognitive Technologies and Applications, Transformative Computing, Blockchain Technology, Big Data, Data Ming, Digital Content Convergence, Multimedia Convergence, Smart Applications, Expert Systems, Embedded Systems, Mobile and Wireless Communications, Broadband Networks, Software Defined Networks (SDN), Bio-Inspired Computing, Grid and Cloud Computing, Semantic Web, User Experience and Human-Computer Interaction (HCI), Soft Computing, Smart Computing, Toy Computing, Security and Trust computing and so on, for satisfying our ever-changing needs.
In the future world, ICT will play a highly important role in convergence of fast computing together with high-speed communications, and all other smart computational sciences and application and ICT also will influence the future world's various areas, including science, engineering, industry, business, law, politics, culture, medicine, and so on. However, there still exits lots of challenges in future ICT. The advance smart applications based on future ICT and fast computing together with high-speed communication. Our symposium is intended to bring up the dissemination of state-of-the-art research in all future ICT areas, including their models, services, and novel smart applications associated with their utilization.
The symposium will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of the advance smart applications based on future ICT and the relative Security. The symposium will publish high quality papers, which are closely related to the various theories and practical applications in the area of the advance smart applications based on future ICT and the relative communications and networks. In addition, we expect that the symposium and its publications will be a trigger for further related research and technology improvements in this important subject.
Topics (included, but are not limited to)
-
AIoT (Artificial Intelligence of Things) and its Advance or Future Applications
-
Artificial Intelligence Applications
-
Information Security Regarding to Novel Scenarios for Future Applications
-
Expert Systems and their Advance or Future Applications
-
Knowledge-Based Systems and their Advance or Future Applications
-
Smart Computing and its advance or Future Applications
-
Smart Manufacturing and its Advance or Future Applications
-
Smart E-Business and its Advance or Future Applications
-
Smart Healthcare and its Advance or Future Applications
-
Smart Living and its Advance or Future Applications
-
Smart Campus and its Advance or Future Applications
-
Smart City and its Advance or Future Applications
-
Smart Agriculture and its Advance or Future Applications
-
Smart Home and its Advance or Future Applications
-
Smart Education Systems and their Advance or Future Applications
-
Cognitive and Biologically Inspired Solutions for Security and Cryptography Big Data and their Advance or Future Applications
-
Cognitive Technologies or Applications
-
Transformative Computing Technologies or Applications
-
Context-Aware Scheme and its Advance or Future Applications
-
Smart Spaces and Intelligent Environments and their Advance or Future Applications
-
Embedded Systems and Wearable Computing and their Advance or Future Applications
-
Middleware and Agent Technologies and their Advance or Future Applications
-
Pervasive and Ubiquitous Computing and their Advance or Future Applications
-
Mobile Communications and Wireless Communications and their Advance or Future Technologies
-
Wireless Ad-Hoc Networks and Wireless Sensor Networks and their Advance or Future Technologies
-
Mobile Internet, Mobility Management and their Advance or Future Applications
-
Wireless Sensors, Ad-Hoc, Mesh Networks and their Advance or Future Applications
-
Networks and Interconnection Networks for Green Computing
-
Parallel Computing, Distributed Computing Reliability and Fault Tolerance
-
Ubiquitous Computing Applications and their Advance or Future Applications
-
Security Threats, Security Policies and Secure Managements, Security Schemes, Secure Protocols, Cryptography and their Advance or Future Applications, e.g. AI applications, Big Data, Blockchain-based Technologies and Applications
-
Digital Forensic, Privacy and Trust and their Advance or future Applications, e.g. AI applications, Big Data, Blockchain-based Technologies and their Applications
-
Advanced Technologies in Semiconductor Device based on GaN and other Materials
-
Quantum Cryptography and Future Applications
-
Fluid Mechanics and Future Applications
-
Instrumentation Automatic Control and Future Applications
-
Physical Layer Security for Vehicle to Everything (V2X) and Future Applications
-
Reconfigurable Intelligence Surfaces and Future Applications
-
Others in the Advance or future ICT Area.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Full Papers Submission Guidelines:
-
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. An accepted paper must be registered before the registration deadline and presented at the symposium. Failure to register before the deadline will result in automatic withdrawal of the paper from the symposium proceedings and the program.
The submission of contributions to Future ICT 2021 must occur through the symposium submission system:
Paper submission Online: (To use Internet Explorer is better than Google Chrome !!!!!)
Paper style(s): -
1. The submission file is in PDF format produced via the Easychair Latex Class file (US letter size). [Available at http://jowua.yolasite.com/resources/easychair.zip]
-
2. Microsoft Word (If you use Microsoft Word to produce your article, you will need to submit two documents: a .docx file and a PDF file derived from it. You can use "Save As" menu item and choose Word Document (.docx) and PDF as the formats. Click here to download the latest Microsoft Word template - EasyChair : https://easychair.org/publications/easychair.docx
-
Page size: Each paper should be at least 4 pages long based on the Easychair style.
- Duty of registration and presentation: Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper at the symposium.
- Posters Submission Guidelines:
- Pending
Registration for Future ICT2021
Registration for Future ICT2021
1. REGISTRATIONS (Before 14:00 pm Jan. 28 on Taiwan Time Zone)1. Each author should be required to register the Future ICT 2021, individually. For example, there are three authors for one accepted paper, then each author of them should register herself or himself via the web-link by using Google below.
https://forms.gle/kLMyQwsCy2hN9jeV6
2. This Symposium has received the funding full support form Ministry of Education, R.O.C. Thus, the registration fee is waived for the accepted papers.
3. Dear authors, those who want to attend virtual and want to present a poster, please upload your Poster or PreRecord video or Powerpoint File to this given link by 30th January 2021,17:00 PM, Taiwan Time. The uploading weblink is https://forms.gle/jnk1NBbG8MpABtxx7
Committees
Program Committee
- Francesco, Palmieri, Full Professor University of Salerno, Italy)
- Marek R. Ogiela, Full Professor, AGH University of Science and Technology and Pedagogical University, Poland
- Lidia Ogiela, Full Professor, Pedagogical University of Krakow, Poland
- Shiuh-Jeng Wang, Full Professor, Central Police University, Taiwan
- Baojiang Cui, Professor, Beijing University of Posts and Telecommunications, China) (inviting)
- Jayh (Hyunhee) Park, Associate Professor, Korean Bible University
- Honghao(Ethan) Gao, Full Professor, Shanghai University, China
- Hongyan Li , Associate Professor, Hubei University of Economics, Wuhan, China
- Yeong-Sheng Chen, Full Professor, National Taipei University of Education, Taiwan
- Chin-Ling Chen, Distinguished Full Professor, ChaoYang University of Technology, Taiwan
- Chuan-Yu Chang, Full Professor, National Yunlin University of Science and Technology, Taiwan
- Daniel Chi-Sheng Shih, Full Professor, Taiwan University, Taiwan (inviting)
- Shih-Hao Hung, Full Professor, National Taiwan University, Taiwan (inviting)
- Whai-En Chen, Full Professor, National I-lan University (inviting)
- Chung-Wen Hung, Full Professor, National Yunlin University of Science and Technology, Taiwan
- Jerry Chun-Wei Lin, Full Professor, Western Norway University of Applied Sciences, Bergen, Norway
- Tzu-Liang Kung (Asia University, Taiwan)
- Jeng-Wei Lin (ThungHai University, Taiwan)
- Chia-Yin Ko (ThungHai University, Taiwan)
- Jung-Chun Liu (ThungHai University, Taiwan)
- Yi-Fung Huang (ThungHai University, Taiwan)
- Yung-Fa Huang, Full Professor, Chaoyang University of Technology, Taiwan
- Chia-Hsin Cheng, Full Professor, National Formosa University, Taiwan
- Shyi-Shiun Kuo, Assistant Professor, Nan Kai University of Technology, Taiwan)
- Gu-Hsin Lai, Full Professor, Taiwan Police College, Taiwan)
- Yi-Ting Mai (National Taiwan University of Sport)
- Urszula Ogiela, Associate Professor, Pedagogical University of Krakow, Poland
- Dinh-Thuan Do, Assistant Professor, Asia University, Taiwan
- Ching-Chun Chang, Research Fellow, Tsinghua University, Beijing, China
- Eko Prasetyo, Assistant Professor, Universitas Muhammadiyah Yogyakarta, Indonesia
- Sunardi, Assistant Professor, Universitas Muhammadiyah Yogyakarta, Indonesia
- Karisma Trinanda Putra, Assistant Professor, Universitas Muhammadiyah Yogyakarta, Indonesia
- Andika Wisnujati, Assistant Professor, Universitas Muhammadiyah Yogyakarta, Indonesia
- Cahya Damarjati, Assistant Professor, Universitas Muhammadiyah Yogyakarta, Indonesia
- Bambang Irawan, Associate Professor, Universitas Esa Unggul Jakarta, Indonesia
- Agung Mulyo Widodo, Assistant Professor, Universitas Esa Unggul Jakarta, Indonesia
- Gerry Firmansyah, Executive Director, ICT Council of Indonesia
- Aristophane Nshimiyimana, Asia University, Taiwan
- Mosiur Rahaman, Assistant Professor, Jawaharlal Nehru Technological University Hyderabad, India
- P R Viswanath, Associate Professor, Osmania University, India
- Faruk Azam, Post Doctorate, University of Tokyo, Japan
- Abu Salhe, Assistant Professor, Calcutta University, India
- Abdul Matin, Assistant Professor, Jadavpur University, India
[More PC members are being invited]
Organizing committee
- Honorary Chairs
- Shian-Shyong Tseng, Vice President, Asia University, Taiwan
- Mao-Jiun Wang, President, Tunghai University, Taiwan
- General Chairs
- Hsing-Chung Chen, Distinguished Full Professor, Asia University, Taiwan
- kangbin Yim, Full Professor of Soonchunhyang University, Asan, Korea
- Fang-Yie Leu, Distinguished Full Professor, Tunghai University, Taiwan
- Vice General Chairs
- Shiuh-Jeng Wang, Full Professor, Central Police University, Taiwan
- Chao-Tung Yang, Distinguished Full Professor, Tunghai University, Taiwan
- Marek R. Ogiela, Full Professor, AGH University of Science and Technology and Pedagogical University, Poland
- Yeong-Sheng Chen, Full Professor, National Taipei University of Education, Taiwan
- Program Chairs
- Choi Chang, Assistant Professor, Department of Computer Engineering, Gachon University, South Korea
- Yung-Fa Huang, Full Professor, Chaoyang University of Technology, Taiwan
- Jayh (Hyunhee) Park, Assistant Professor, Korean Bible University, Korea
- Lidia Ogiela, Professor, Pedagogical University of Krakow, Poland
- Vice Program Chairs
- Chin-Ling Chen, Full Professor, ChaoYang University of Technology, Taiwan
- Jerry Chun-Wei Lin, Full Professor, Western Norway University of Applied Sciences, Bergen, Norway
- Tianhan Gao, Full Professor, Northeastern University, China
- Hongyan Li, Associate Professor,Hubei University of Economics, Wuhan, China Lidia Ogiela, Associate Professor, Pedagogical University of Krakow, Poland
- Local Arrangement Chairs
- Tzu-Liang Kung, Associate Professor, Asia University, Taiwan
- Jeng-Wei Lin, Associate Professor, ThungHai University, Taiwan
- Shyi-Shiun Kuo, Assistant Professor, Nan Kai University of Technology, Taiwan
- Hsueh-Ting Chu, Associate Professor, Asia University
- Jing-Doo Wang, Associate Professor, Asia University
- Tsai, Chia-Wei, Assistant Professor, National Taitung University
- International Advisory Chairs
- Francesco, Palmieri, Full Professor, University of Salerno, Italy
- Ji-Hwei Horng, Full Professor, Department of Electronic Engineering, National Quemoy University, Taiwan
- Mario Collotta, Full Professor, Kore University of Enna, Italy
- Cheng-Ying Yang, Full Professor, University of Taipei
- Nan Guo, Professor, Northeastern University, China
- Publicity Chairs
- Hsuan-Yu Lin, Deputy Chief Executive, Telecom Technology Center, Taiwan
- Urszula Ogiela, Associate Professor, Pedagogical University of Krakow, Poland
- Dinh-Thuan Do, Assistant Professor, Asia University, Taiwan
- Ching-Chun Chang, Research Fellow, Tsinghua University, Beijing, China
- Publication Chairs
- Marek R. Ogiela (AGH University of Science and Technology and Pedagogical University, Poland)
- Lidia Ogiela, Professor, Pedagogical University of Krakow, Poland
- Giovanni Pau, Full Professor, Kore University of Enna, Italy
- Honghao(Ethan) Gao, Full Professor, Shanghai University, China/Central Michigan University, the U.S.
- Web Chairs
- Shyi-Shiun Kuo, Assistant Professor, Nan Kai University of Technology, Taiwan
Keynote Speakers
-
Chin-Chen Chang(張真誠講座教授), Chair Profsessor, Feng Chia University, Taiwan
- Chair Professor Chang has worked on many different topics in information security, cryptography, multimedia image processing and published several hundreds of papers in international conferences and journals and over 30 books. He was cited over 35,600 times and has an h-factor of 86 according to Google Scholar. Several well-known concepts and algorithms were adopted in textbooks. He also worked with the National Science Council, Ministry of Technology, Ministry of Education, Ministry of Transportation, Ministry of Economic Affairs and other Government agencies on more than 100 projects and holds 17 patents, including one in US and two in China. He served as Honorary Professor, Consulting Professor, Distinguished Professor, and Guest Professor at over 50 academic institutions and received Distinguished Alumni Award's from his Alma Master's. He also served as Editor or Chair of several international journals and conferences and had given almost a thousand invited talks at institutions including Chinese Academy of Sciences, Academia Sinica, Tokyo University, Kyoto University, National University of Singapore, Nanyang Technological University, The University of Hong Kong, National Taiwan University and Peking University. Professor Chang has mentored 58 PhD students and 184 master students, most of whom hold academic positions at major national or international universities. He has been the Editor-in-Chief of Information Education, a magazine that aims at providing educational materials for middle-school teachers in computer science. He is a leader in the field of information security of Taiwan. He founded the Chinese Cryptography and Information Security Association, accelerating information security the application and development and consulting on the government policy. He is also the recipient of several awards, including the Top Citation Award from Pattern Recognition Letters, Outstanding Scholar Award from Journal of Systems and Software, and Ten Outstanding Young Men Award of Taiwan. He was elected as a Fellow of IEEE and lET in 1998, and a Fellow of CS in 2020 for his contribution in the area of information security.
- Keynote title: Information Hiding Schemes Based on Magic Matrices
-
Abstract
Steganography is the science of secret message delivery using cover media. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. In this talk, I will introduce some novel steganographic methods based on different magic matrices. Among them, one method that uses a turtle shell magic matrix to guide cover pixels’ modification in order to imply secret data is the newest and the most interesting one. Experimental results demonstrated that this method, in comparison with previous related works, outperforms in both visual quality of the stego image and embedding capacity. In addition, I will introduce some future research issues that derived from the steganographic method based on the magic matrix. -
Han-Chieh Chao(趙涵捷校長), President, National Dong Hwa University, Taiwan
- President Han-Chieh Chao received his M.S. and Ph.D. degrees in Electrical Engineering from Purdue University, West Lafayette, Indiana, in 1989 and 1993, respectively. He is currently a professor with the Department of Electrical Engineering, National Dong Hwa University, where he also serves as president. He is also with the Department of Computer Science and Information Engineering, National Ilan University, Taiwan. He was the Director of the Computer Center for Ministry of Education Taiwan from September 2008 to July 2010. His research interests include IPv6, Cross-Layer Design, Cloud Computing, IoT, and 5G Mobile Networks. He has authored or co-authored 4 books and has published about 400 refereed professional research papers. He has completed more than 150 MSEE thesis students and 11 Ph.D. students. He serves as the Editor-in-Chief for the Institution of Engineering and Technology Networks, the Journal of Internet Technology, the International Journal of Internet Protocol Technology, and the International Journal of Ad Hoc and Ubiquitous Computing. He is a Fellow of IET (IEE) and a Chartered Fellow of the British Computer Society. Dr. Chao has been ranked as the top 10 Computer Scientists in Taiwan for 2020 by Guide2Research. Due to Dr. Chao’s contribution of suburban ICT education, he has been awarded the US President's Lifetime Achievement Award and International Albert Schweitzer Foundation Human Contribution Award in 2016.
-
Keynote title: Deep Learning Platform for B5G Mobile Network
Abstract
The 3G and 4G mobile communications had been developed for many years. The 5G mobile communication is scheduled to be launched in 2020. In the future, a wireless network is of various size of cells and different type of communication technologies, forming a special architecture of Heterogeneous Networks (HetNet). Under the complex network architecture, interference and handover problems are critical challenges in access network. How to efficiently manage small cells and to choose an adequate access mechanism for the better quality of service is a vital research issue. Traditional network architecture can no longer support existing network requirements. It is necessary to develop a novel network architecture. Therefore, this keynote speech will share a solution of deep learning-based B5G mobile network which can enhance and improve communication performance through combing some specific technologies. e.g., deep learning, fog computing, cloud computing, cloud radio access network (C-RAN) and fog radio access network (F-RAN). -
Shian-Shyong Tseng(曾憲雄副校長), Vice President, ASIA University, Taiwan
- Shian-Shyong Tseng received the Ph.D. degree in computer engineering from National Chiao Tung University in 1984. From 1991 to 1992 and 1996 to 1998, he acted as the Chairman of Department of Computer and Information Science at the same university. From 1992 to 1996, he was the Director of the Computer Center at Ministry of Education. He was the Dean of the College of Computer Science, Asia University from 2005 to 2008. He now acts as a Vice President of ASIA University, and is a Chair Professor there. In Dec. 1999, he founded Taiwan Network Information Center (TWNIC), and was the Chairman of the board of directors of TWNIC over 12 years. He was also a science and technology consultant of Ministry of Education from 2001 to 2005. He received TANET Lifetime Achievement Award in 2018. Dr. Tseng is an Editor-in-Chief of International Journal of Digital Learning Technology. His current research interests include artificial intelligence, data mining, computer-assisted learning, and Internet-based applications.
-
Keynote title: Resource Sharing for Context-Aware Ubiquitous Learning
Abstract
-
As advances in mobile technologies, IoT, and artificial intelligence, educators have emphasized the importance of situating students to learn in an authentic environment. By using such ubiquitous-learning approach, teachers can encourage students to perform explorative learning or self-regulated learning by browsing content resources and relevant online multimedia resources with digital support from mobile devices and cloud services. This talk is going to introduce how to locate appropriate or relevant multimedia resources to support situated learning based on user context. Furthermore, two types of resource sharing will be discussed to facilitate the ubiquitous learning.
-
Gerry Firmansyah, Executive Director of Indonesian ICT council, Indonesian
- Dr. Gerry Firmansyah, ST, M.Kom. is the Executive Director of Indonesian ICT council as well as the Head of the Master Program of Computer Science in Esa Unggul University, Indonesia. With the Doctorate degree and research focusing on Government Enterprise Architecture He was involved in several key Indonesian government Information Technology projects.
-
Keynote title: An Asessment Method for Busines Architecture using Longitudinal Comparative Studies
Abstract
-
The core components of Government Enterprise Architecture Framework (GEAF) comprise of business, information/data, application, and infrastructure. The architecture itself is imperative in aligning business and ICT by integrating organization and the government system. According to the study, business architecture is one of the key factor in determining the government policy’s direction. Therefore, a method was proposed to compare the structure of business architecture with the governmental policy direction with the attained result. Longitudinal comparative studies was performed in this study to generate a comprehensive analysis pertaining the development of GEAF. The method was derived based on two Government Enterprise Architectures, New Zealand and The United States, in which it would be used to assessment the GEAF proposed by the Indonesian Government.
-
Shiuh-Jeng Wang (王旭正), Professor, Central Police University, Taiwan
- Shiuh-Jeng Wang received the MS degree in applied mathematics from National Chung-Hsing University, Taichung, Taiwan, in 1991. He received the PhD degree in electrical engineering from National Taiwan University, Taipei, Taiwan, Republic of China, in 1996. He is currently with the Department of Information Management at Central Police University, Taoyuan, Taiwan, where he directs the Information Cryptology and Construction Laboratory (http://hera.im.cpu.edu.tw/). He was a recipient of the fifth Acer LongTung Master Thesis Award and the 10th Acer Long-Tung PhD Dissertation Award in 1991 and 1996, respectively. He was a visiting scholar in the Computer Science Department at Florida State University from January to June 2002. He also serves the director of the Chinese Cryptology and Information Security Association (CCISA). He is the editor-in-chief of the Communications of the CCISA and the editor of the Journal of Information Technology and Society. He now works a columnist for a domestic magazine: CONNECTIMES and is the author of two books: Information Security and Cryptography and Network Security, published in 2003 and 2004, respectively. He is a member of the IEEE, IEEE Computer Society, ACM, and IACR. His current interests include cryptography, digital investigation and computer forensics, steganography, data construction, and engineering
-
Chun-I Fan(范俊逸), Dean, College of Engineering, National Sun Yat-sen University, Taiwan
- Chun-I Fan received the M.S. degree in Computer Science and Information Engineering from National Chiao Tung University, Hsinchu, Taiwan, in 1993, and the Ph.D. degree in Electrical Engineering from National Taiwan University, Taipei, Taiwan, in 1998. From 1999 to 2003, he was an Associate Researcher and a Project Leader with Telecommunication Laboratories, Chunghwa Telecom Company, Ltd., Taoyuan, Taiwan. In 2003, he joined as a faculty in the Department of Computer Science and Engineering, National Sun Yat-sen University (NSYSU), Kaohsiung, Taiwan. He has been a Full Professor since 2010 and a Distinguished Professor since 2019. His current research interests include applied cryptology, information and communication security. Prof. Fan is the Chairman of Chinese Cryptology and Information Security Association, and was the Chief Executive Officer (CEO) of Telecom Technology Center in Taiwan. He also is the Dean of College of Engineering and the Director of Information Security Research Center at NSYSU, and he was the CEO of “Aim for the Top University Plan” Office at NSYSU. He received the Best Student Paper Awards from the National Conference on Information Security in 1998, the Dragon Ph.D. Thesis Award from Acer Foundation, the Best Ph.D. Thesis Award from the Institute of Information and Computing Machinery in 1999, and Y. Z. Hsu Science Paper Award (Information and Communication Science & Technology Category) in 2020. He won the Engineering Professors Award from Chinese Institute of Engineers - Kaohsiung Chapter in 2016 and the Outstanding Technical Achievement Award from IEEE Tainan Section in 2020. And he is now an Outstanding Faculty in Academic Research in NSYSU.
-
Keynote title: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
Abstract
-
According to related research, energy consumption can be effectively reduced by using energy management information of smart grids. In smart grid architecture, electricity suppliers can monitor, predicate, and control energy generation/consumption in real time. Users can know the current price of electrical energy and obtain energy management information from smart meters. It helps users reduce home’s energy use. However, electricity consumptions of users may divulge the privacy information of users. Therefore, privacy of users and communication security of the smart grid become crucial security issues. This research aims to design a secure power-usage data aggregation scheme for smart grid. Electricity suppliers can learn about the current power usage of each neighborhood to arrange energy supply and distribution without knowing the individual electricity consumption of each user. This is the first scheme against internal attackers, and it provides secure batch verification. Additionally, the security of the proposed scheme is demonstrated by formal proofs.
-
Jayh (Hyunhee) Park, Professor, Myongji University, Seoul, South Korea
- Prof. Jayh (Hyunhee) Park received the Ph.D. degrees in electronics and computer engineering from Korea University, Seoul, South Korea, in 2011. She joined the Faculty of Myongji University, Seoul, in 2020, where she is currently an assistant professor with the department of Information and Communication Engineering. She is currently a supervisor of DAN Lab (Data Analysis and Networking). From March 2017 to February 2020, she has been working the department of computer software from Korean bible university, Seoul, South Korea. From November 2014, she has been working in LG Electronics as a Senior Researcher for Wi-Fi standardization (IEEE 802.11ax, Wake Up Radio, Wi-Fi Alliance, etc.). From January 2013 to October 2014, she joined INRIA Research Center as a Postdoctoral Researcher where she works in DIONYSOS Research Group and in Telecom Bretagne as a Postdoctoral researcher where she undertakes the system implementation for QoE on wireless networks. From September 2011 to February 2013, she joined Korea University as a Research Professor. She served as the Program Co-Chair for the IMIS 2020, the Organizing Committee for the ICTC2020, and the Workshop organizer for FINGNet 2019 and 2020. She is a Guest Editor of the Electronics and Journal of Advanced Transportation. Her research interests include wireless networks, mobile edge/cloud computing, and big data analysis.
-
Keynote title: Explainable AI – What Are We Trying To Do?
Abstract
Dramatic success in machine learning has led to an explosion of AI applications. Researchers have developed new AI capabilities for a wide variety of tasks. Continued advances promise to produce autonomous systems that will perceive, learn, decide, and act on their own. However, the effectiveness of these systems will be limited by the machine’s inability to explain its thoughts and actions to human users. Explainable AI will be essential, if users are to understand, trust, and effectively manage this emerging generation of artificially intelligent partners. -
Dr. Satyendra Nath Mandal, India
- Dr. Satyendra Nath Mandal received B.Tech, M.Tech and P.hd in computer Science and Engineering. He has published more than 100 research papers in different International/ National Journals and conferences. He has applied for three patents and received two copyrights for his two developed software’s. He received “Career Award For youngTeachers(CAYT)” from All Indian Council For Technical Teachers(AICTE), Govt. of India,2010. He received best paper Award in COMSYS2020, 2020. His fields of research Image Processing, Image based Animal Identification, Bio-cryptography, Soft computing and Image Plant Diseaee Identification.
-
- Keynote title: Image Based Individual Animal Identification-goats (Capra circus) and pigs (Sus scrofa domesticus) as reference animal species
-
Abstract
Human recognition system has played a dominant role in the evolution of modern society. Any person can be identified by their bio-metric traits like fingerprint, iris, retina, ear etc. They can be also identified by their behavioral status like keystroke, hand writing, voice etc. Over a span of time, methods such as finger printing, picture of iris or fundus have been developed for precise and definitive positive identification of one human being. However, no definite research work has been done on the very question of existence of unique trait(s) in the individual animals. As a result, no unique morphological trait(s) in livestock species is discovered for individual identity to date. The inter-class similarity for the same traits and difference for the inter-class animals is currently unknown.
An attempt has been made to identify the presence of unique morphological trait(s) in goats (Capra circus) and pigs (Sus scrofa domesticus) as reference animal species. The logic of ideas is based on the technology applied for Human recognition system which has been used to crack the problem of finding unique morphological trait(s) in livestock species. The morphological trait(s) have been analyzed using the developed software to identify the unique pattern present in the animals. The captured images have been analyzed in laboratory and a database has been developed for storing and quick retrieval of the images. Initially, the human recognition system i.e. existing algorithms have been applied to examine their suitability for caprine and porcine species. New algorithms have been developed for better recognition of unique trait. The breeds have been identified based on individual identification. Some stakeholders have been identified for this technology as
- The whole country will be benefited on conservation point of view and bio-diversity right
- The farmers will be able to make identification of individual of animal on management point of view.
- The farmer will be able to get information about the health status, disease occurance and remedies
- The animal breeders will get the required breed of animal species.
- The insurance sector will be benefitted identifying the individual insured animal
-
Fang-Yie Leu(呂芳嶧), Distinguished Full Professor, Tunghai University, Taiwan
- FANG-YIE LEU (M’87) received the B.S., M.S., and Ph.D. degrees from the National Taiwan University of Science and Technology, Taiwan, in 1983, 1986 and 1991, respectively, and the M.S. degree from the Knowledge Systems Institute, USA, in 1990. He is currently a Workshop Organizer of CWECS and MCNCS workshops, a Professor with Tunghai University, Taiwan, the Director with the Database and Network Security Laboratory, and the Chairperson with the Department of Information Management, Tunghai University. His research interests include wireless communication, network security, grid applications and Chinese natural language processing. He is also a member of the IEEE Computer Society and one of the editorial board members of at least six international journals.
-
Chao-Tung Yang(楊朝棟), Distinguished Full Professor, Tunghai University, Taiwan
- Chao-Tung Yang (Member, IEEE) received the B.Sc. degree in computer science from Tunghai University, Taichung, Taiwan, in 1990, and the M.Sc. and Ph.D. degrees in computer science from National Chiao Tung University, Hsinchu, Taiwan, in July 1992 and 1996, respectively. He is a Lifetime Distinguished Professor of computer science with Tunghai University, where he joined the Faculty of the Department of Computer Science as an Associate Professor in August 2001. He is a Full Professor in August 2007 and as a Distinguished Professor in August 2015. He has published more than 100 journal papers. His present research interests are in cloud computing and big data, parallel and multicore computing, and Web-based applications. Prof. Yang is serving in a number of journal editorial boards, including Future Generation Computer Systems, the International Journal of Communication Systems, the KSII Transactions on Internet and Information Systems, the Journal of Cloud Computing, the International Journal of Cloud Computing and Services Science, and the International Journal of NextGeneration Computing. He is a member of the IEEE Computer Society, and IICM and TACC in Taiwan.
-
Hsing-Chung Chen(陳興忠), Distinguished Full Professor, Asia University, Taiwan
- Hsing-Chung Chen received the Ph.D. degree in Electronic Engineering from National Chung Cheng University, Taiwan, in 2007. From February 2008 to July 2018, he had successively been the Assistant Professor and Associate Professor in the Department of Computer Science and Information Engineering at Asia University, Taiwan. From Aug. 01 2018–Jul. 31 2019, he has been Full Professor with the Department of Computer Science and Information Engineering, Asia University, Taiwan. Since August 2019–present, he is currently Distinguished Full Professor with the Department of Computer Science and Information Engineering, Asia University, Taiwan. From August 2019–July 2020, he was Chairman with the Department of Computer Science and Information Engineering, Asia University, Taiwan. Since May 2014–present, he has also been the Research Consultant of Dept. of Medical Research, China Medical University Hospital, China Medical University, Taichung, Taiwan. In addition, since Feb 2017–present, he has also been the Permanent Council Member of Taiwan Domain Names Association (Taiwan DNA), Taiwan. He had also served the Program Committee Chair of APNIC44 (Sept. 2017) organized by Asia-Pacific Network Information Centre (APNIC). He is the IEEE Senior member. He is also the member of TFSA, ICCIT, CCISA , E-SAM and IET. He had been awarded the Best Paper Presentation Awards by ACM ICFET 2020 and TANET 2018, individually. He had been awarded the Best Paper Awards by BWCCA2018, MobiSec2017 and BWCCA2016, individually. He was awarded the Best Journal Paper Award by Association Algorithm & Computation Theory (AACT). Currently, his research interests include Information and Communication Security, Cyberspace Security, Blockchain Network Security, Internet of Things Application Engineering and Security, Mobile and Wireless Networks Protocols, Medical and Bio-information Signal Image Processing, Artificial Intelligence and Soft Computing, and Applied Cryptography.
-
- Keynote title: Cognitive authentication and trust evaluation application programming interface for cognitive security gateway based on massive IoTs networks
-
Abstract
-
As the number of Internet of massive Things (IoT) applications grows in vehicles, factory machinery, smart buildings, and city infrastructure, a secure and automated solution of enabling a mesh network for transactional processes is a significant demand. However, the trust evaluation among those unknown IoT devices which communicate to each other are still the high demand in distributed massive IoT network. In this paper, an online cognitive authentication and trust evaluation decision application programming interface (API) for Cognitive Security Gateway (CSG) based on distributed massive IoT network is proposed. The online cognitive security APIs consisting of cognitive authentication sub-API, cognitive trust evaluation sub-API and cognitive authorization sub-API are designed for distributed massive IoT applications. The modified electronic product code (EPC) Class1Gen2 tags generated by CSG server is and proposed to be the online identity for the system used. Moreover, both the security analyses and trust evaluations for the CSG are discussed. Finally, the proposed system is shown that it is an appropriate solution for solving the online authentication problem in distributed cognitive IoT network.
-
Yeong-Sheng Chen(陳永昇), Full Professor, National Taipei University of Education, Taiwan
- YEONG-SHENG CHEN (Member, IEEE) received the B.E. and M.E. degrees in computer engineering from National Chiao Tung University, Taiwan, in 1988 and 1990, respectively, and the Ph.D. degree in electrical engineering from National Taiwan University, in 1996. From 2000 to 2002, he was the Chairman of the Department of Information Management, Hwa Hsia Institute of Technology. He joined the Department of Mathematics Education, National Taipei University of Education, as a Faculty Member, in 2002. From 2002 to 2007, he was the Director of the Computer Center, National Taipei University of Education. He is currently a Professor with the Department of Computer Science, National Taipei University of Education. From July to September 2014, he was a Visiting Scholar with the Department of Electrical Engineering, University of Washington, Seattle. His current research interests include wireless sensor networks, wireless communications, software-defined networks, network security, and context aware computing. He is a permanent member of the Institute of Information and Computing Machinery of Taiwan and a founding member of the Information Service Association of Chinese Colleges. He also served or is serving on several technical program committees for the IEEE and other international conferences.
Publication
Future ICT 2021 proceedings will be published in ...(Pending)
Excellent papers selected from Future ICT2021 will be directly recommended to be published on suitable journal(s) after an additional review process and may need extra publication charge.
-Special Issues on Intelligent Security Sensors in Cloud Computing (ISSCC 2020) in Sensors. More information about this SI you can find Sensors | Special Issue : Intelligent Security Sensors in Cloud Computing (mdpi.com), Leader Guest Editor: Lidia Ogiela, The web link of the call for paper at: https://www.mdpi.com/journal/sensors/special_issues/ISSC (JCR SCI Index, IF=3.275, Ranking=Q1)
-Special Issue of Journal of Internet Technology on "Selected papers from Future ICT 2021", Leader Guest Editor: Fang-Yie Leu. (SCI Index, Impact Factor : 0.786)
Venue
The conference will be held in FUSHIN Hotel Taichung (http://www.fushin-hotel.com.tw/taichung/en/).
Contact
All questions about submissions should be emailed to Future ICT 2019 chair via cdma2000@asia.edu.tw, shin8409@ms6.hinet.net