Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Section
bordertrue

Focus: Presentation skills,  public speaking skills

The Future Talent Programme's Lightning Talk Challenge (FTP23) offers students and young professionals an opportunity to present their project or idea to an international audience at GÉANT's annual TNC conference.  Nominated by GÉANT project partners, participants are given training to help them master presentation skills and prepare for an impactful presentation.

FTP23 challenges participants to present their research or idea as a 5-minute "Lightning Talk" at the TNC Conference which will be held from 5-9 June 2023 in Tirana, Albania. Participants whose proposals are selected by the TNC Programme Committee ('finalists') will be invited to participate in the TNC conference and their travel fees paid*.  


* Participation in the TNC Lightning Talk Programme will be in accordance with TNC's rules and formats. 

 

Column

What's included

Students and young professionals will learn how to pitch their proposal and deliver a powerful presentation. The virtual workshops offer a safe environment where participants can learn and practise together, and is often a good place to build a network of peers. In addition, all participants are invited to showcase the end result of their learning in a self-recorded video which may be published through GÉANT media channels. 

  • Practical and interactive workshops under the guidance of a professional public speaking coach for all participants
  • Video presentation support
  • 1:1 coaching for 'finalists'
  • *Travel fees + full conference pass for finalists (see the above statement*) The hosting NREN is asked to pre-pay the flights for the students and claim the cost back from GN4-4-WP5-T1 through its regular monthly cost claims.

Requirements 

What is required of the NREN  

If you are a NREN, this programme gives you great exposure in the R&E community and may help to strengthen relations with your institutional partners and users. To participate the NREN must:

What is the role of GLAD

GLAD is committed to:


How to Apply (NRENs)

Step 1 Register your candidate online with a brief description of the candidate's topic.

Step 2 All accepted candidates will become participants of the Future Talent Programme and will receive the training. Your participant takes part in the virtual training workshops in April and May. Dates and Programme will be confirmed.  

Step 3 Participants submit their Lightning Talk proposal to TNC Programme Committee by 10 March 2023, midnight CET. 

Step 4 Participants will be notified by the TNC Programme Committee  of the acceptance or rejection of the proposal 

Step 5 Selected participants ('finalists') take further training and take part at TNC22


FAQ STUDENTS








Section
bordertrue

Media & Downloads

do we have more media/photos?

FTP News and articles:

Promotion video FTP  

Future Talent Programme 2020 Finalists 


Submit Registration

https://events.geant.org/event/1375/


Registration deadline

28 February 2023 12:00 PM CET

TNC23 conference 5-9 June in Tirana


HTML
<h2><a target="_blank" rel="noopener noreferrer" href="https://tnc23.geant.org/">TNC23 conference 5 - 9 June in Tirana, Albania


Section

Schedule   

28 February 2023 12:00PM CET
Deadline for NRENs to register candidates for the programme
 


https://


HTML
<a target="_blank" rel="noopener noreferrer" href="https://events.geant.org/event/1375/">Submit Registration</a>


10 March 2023   
Submission deadline for candidates to send Lightning Talk proposal to TNC23

HTML
<a target="_blank" rel="noopener noreferrer" href="https://tnc23.geant.org/submit/">https://tnc23.geant.org/submit/</a>


Mid
mid-March 2023 
Acceptance/rejection Lightning Talk proposals by TNC23 Programme Committee

end End of March  - May 2023   
Public speaking workshops  

5-9 June 2023  
TNC23, Tirana, Albania



Section

FAQ (NRENs)

Expand
titleWho can participate in this programme?

Any early career candidate nominated by a GÉANT Project NREN partner studying at a university or college in a GÉANT partner country, or working at a GÉANT NREN.


Expand
titleHow many candidates can you nominate for the programme?

Depending on the number of  candidates in the programme, a maximum of 3 candidates per NREN.


Expand
titleWhat kind of candidates should NRENs look for?

Ideal candidates: (under) graduate, master and PhD students (possibly interns at the NREN), who want to commit time and energy to learn and develop beyond the basic university programme.


Expand
titleWhat kind of topic can be submitted for a lightning talk

The subject matter of each presentation could be any idea, project or research or innovation the candidates have been working on which addresses a technical, economic, legal, security or environmental aspect in any IT and networks field. (see former topics below)


Expand
titleHow does selection and recruitment take place? done

We expect NRENs to select and nominate a maximum of 3 candidates. All nominated candidates who comply with the programme requirements (see Requirements) will be admitted to the Future Talent Programme. The acceptance of the participant's proposal for the Lightning Talk programme at TNC will be the exclusive decision of the TNC Programme Committee without any interference of the Future Talent Programme. The Future Talent candidate competes with all the other proposals submitted for the conference. Winning proposals are selected based on originality and clarity. 


Expand
titleWhat do you need to send to Future Talent Programme to nominate a candidate?

A complete application includes the online registration at https://events.geant.org/event/1375/ including the mentor's contact details, the candidate’s contact details,  university and a short description of the topic the candidate wants to submit as a Lightning Talk. The application must be submitted by 10 March 2023


Expand
titleWhat will be your role as a host and mentor?

Your role as a mentor is to engage with your candidate on a regular basis during the programme, provide encouragement and advice throughout the programme and attend related events. If your candidate is selected to present at TNC, we encourage you to support him or her during the conference. All candidates' costs are funded by the programme and can be reclaimed from ???GN4.3-WP1-T5 ???following the normal GÉANT project claimant rules and procedures.


Expand
titleWhat is the duration of the programme?

The programme runs from March to June, and includes 3 workshops for all participants. Depending on the number of participants the workshops will be organised in groups of max 5 and will run in March and April. TNC 'finalists' can expect further coaching from a professional trainer coach prior to the conference. 


Have a different question? 
Email: glad@geant.org  

FTP22

FTP23 Lightning Talks

Artificial Intelligence for the early diagnosis of cardiac comorbidities associated to COVID-19 - Chiara Leonie (GARR)  

Expand

Section

THE ALGORITHMIC DESIGN SKETCHBOOK - Renata Castelo-Branco | INESC-ID/Instituto Superior Técnico, University of Lisbon. Supported by FCT|FCCN

Expand

When you picture an architect at work, how do you see them? Holding a pencil over a drawing board, maybe? How about the architects that designed the Morpheus Hotel in Macau; the Gherkin in London, or the Louvre in Abu Dhabi? Still imagining pencils?

Architecture, like many other art forms, frequently mirrors the technological advancements of its time, and these are just some examples of the multitude of projects that have been reflecting the increasing integration of computer science in the architectural domain. Today, architects have at their disposal tools that allow them to design, and manage, large-scale and non-conventional design solutions that would have been nearly impossible to conceive using traditional design methods. However, designing with algorithms requires programming, a concept with which practitioners often struggle. For architecture to benefit from computation at large, we still need to close the existing comprehension gap between algorithmic design programs and their behaviour, making this representation method more akin to the traditional architectural practice. The Algorithmic Design Sketchbook proposal addresses this problem by coupling algorithmic design with complementary representation methods that are adequate for designing complex architectural projects, and supporting their synchronisation with a design tool that architects feel comfortable using.

https://youtu.be/g_EwyEwf_nc

IT'S PEOPLE - OR WHY WE NEED AN INTERDISCIPLINARY APPROACH TO CYBERSECURITY - Fabio Greiner | University of Zurich. Supported by SWITCH

Expand

In recent years we have come to realise that cyber security not only requires technical measures, but also cooperation on the part of the users in order to make organisations more resilient against cyber-attacks. Changing user behaviour requires more than just one-time training, it demands a different skill set to what most experts in cyber security have. That's why the field is undergoing a transformation through inviting professionals from other disciplines to support security measures.

In my master’s thesis I studied the collaboration of security awareness specialists with internal communications. The results from the interviews provided insight into how practiced interdisciplinarity can support security professionals in their daily work, and thus make organisations more secure

COVID-19 is an infectious disease, caused by SARS-CoV-2, that mainly affects the respiratory system. Unfortunately, it can also have serious impact on cardiovascular system, triggering the occurrence of cardiac diseases that must be timely identified. Thus, this project aims to contribute to the diagnosis of cardiac comorbidities associated to COVID-19, with the development of an artificial intelligence (AI)-based tool.

https://youtu.be/Czxr-sV5oQY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

 

Embedding a culture of internationalisation into the curriculum through "Internationalisation at Home"- Preparation for the changing context of Higher Education in Ireland - Nidhi Piplani Kapur, Waterford Institute of Technology, HEANET

My proposed research seeks to address the ‘gap’ in the Irish National Strategy for Internationalisation, by delving deep in how ‘Internationalisation of Curriculum (IoC)’ can provide internationalisation experiences to the 98% of students in Ireland who currently do not travel abroad. My research will investigate ways to provide an international experience ‘at home’ to all students, mainly using technology-based interventions. It will seek to inform a strategy that will drive the development and embedding of a culture of ‘Internationalisation at Home (IaH)’ in the curriculum. This will bridge skill deficits in Irish graduates and build multicultural competencies required by industry.

A presentation that focuses on finding solutions that use AI to catalogue and categorize archival collections. Firstly, the difficulties that archivists have in the transition to digital followed by the various problems when one tries to implement AI. Finally, the necessary steps to carry out a project in partnership with a heritage space and a potential workflow.

https://youtu.be/IkNUbj4nvpE?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

Expand
Section

Why we need a collaborative DDoS protection architecture in Europe - Marion Dübendorfer (SWITCH)

Expand

Distributed Denial of Service (DDoS) attacks have the potential to disrupt access to critical infrastructure for population groups across the world – yet their mitigation capabilities lie largely in the hands of private tech companies based in the US. This lightning talk explores the opportunities and benefits of an open, federated DDoS protection architecture in Europe.

https://youtu.be/nqRtm2jZbww?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

Fake News Detection Models — Introducing GAN Generated Synthetic Samples to Improve Performance - Bruno Gonçalves Vaz (Universidade do Porto) FCT/FCCN

Expand
News datasets are extremely imbalanced, with the fake news not being as well represented as the real news. Thus, machine learning models for fake news detection do not perform as good as expected. Hence, Generative Adversarial Networks can be used to produce high-quality synthetic samples to better represent the fake news data, improving the models’ performances

.

https://youtu.be/2748eoymHqY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

AI for Heritage ─ SOS digital collections: classifying and characterizing - Ana Carneiro (School of Arts | Universidade Católica Portuguesa - Porto) FCT/FCCN

Expand

d3TDiQHaA8I


WHY YOUR INTERNET IS BAD! - Félix Gaudin | UC Louvain. Supported by Belnet

Expand

During the Covid crisis I followed my course using Microsoft Teams. In many cases the video/audio quality was really bad, and yet none of the speed tests I ran showed any abnormality. What happened? At that time, speed test websites only measured throughput. Latency is measured as well, but as idle latency (without load on it). However, when you attend a class/meeting there are always other apps/people using your network.

We need a way to measure working latency. The IETF has started to develop a new measurement technique called RPM to measure latency under working conditions. Our goal is to implement it in a browser so that every user will know why their connection is poor. Moreover, all current tests work with TCP connections. With TCP it is possible to send a large amount of data, but it's very hard to accurately measure latency or packet losses. Meanwhile, many cloud providers are moving towards HTTP/3 with the QUIC protocol. Therefore, we are developing our measurement tool with QUIC.

https://youtu.be/IySU1TIualE


APK FALCON: EMPOWERING USER’S PRIVACY - Javier Crespo Guerrero | Universidad de Valladolid. Supported by REDIRIS

Expand

APK Falcon is a tool to assist users in assessing the impact of mobile apps on privacy, to improve knowledge and empower decision making in accordance with the values of the EU Next Generation Internet. APK Falcon will help users understand the permission system, leading to improved management - such as revoking highly intrusive permissions or being more cautious when asked to grant permission. This tool will be made in a user-centric way, so the impact on privacy can be understood by everyone.

Users will be able to access a web service where they can search for the name of an application and obtain a privacy score, as well as information to understand this score. APK Falcon can assist users in making more informed decisions about granting permissions and managing their privacy. By shedding light on the permission system, APK Falcon can empower users to take control of their privacy in a simple, open and transparent fashion.

https://youtu.be/yfmBsHfokRc


POWERING THE FUTURE: THE VALUE OF RENEWABLE ENERGY COMMUNITIES IN A DECARBONIZED WORLD - João Daniel Correia Brandão | Universidade do Porto - Faculdade de Engenharia. Supported by FCT|FCCN

Expand

The transition to renewable energy is critical to mitigate the effects of climate change and achieve a sustainable future. One promising approach to advance this transition is through the development of Renewable Energy Communities (RECs). These communities are formed by groups of people or organisations that come together to produce, consume and share renewable energy locally. They are designed to promote local ownership, collaboration and innovation in the deployment of renewable energy technologies.

To fully realise the potential of these communities, assessing their value and impact is essential. This assessment will provide insights into the benefits and challenges associated with RECs, and help identify best practices for their development and implementation. It will also evaluate the economic benefits of these communities, including the potential for job creation, increased economic activity and cost savings for participants.

https://youtu.be/oFkGKTDpGqQ


BREAKING DOWN AI TO GET EXPLANATIONS - Karel Hynek | FIT CTU- Czech Technical University, Prague. Supported by CESNET.

Expand

Research shows that Artificial Intelligence (AI) can be an effective tool for automated cyber threat hunting. However, the lack of explainability still prevents its mass deployment into commercial-grade tools. Due to AI complexity it's hard to get reasons behind its output, which are crucial for cyber security incident handling and response. We thus bring new design principles of AI by dividing complex monolithic models into small components with defined functionality. By observing the outputs and interaction of these components, we can get an insight into their internal behaviour and provide explanations and reasoning behind their output. The lack of explainability originates from AI's enormous complexity, which people cannot comprehend. We thus divide the complex AI into a component-based system, each component designed separately, like in the human brain. In the brain, there are parts responsible for vision and other parts for hearing for example. We know which part is responsible for what, dramatically increasing our understanding of such a complex system.

Component-based models are solutions for AI model deployment in cyber security and other high-stakes areas where explanations are necessary. The division into components provides better control over the predictions and explains them. The improved explainability also reduces the chance of design errors, can improve model quality control and increases the overall trust of its users. Moreover, we can use reasoning to filter out obvious mistakes and increase AI reliability.

https://youtu.be/Cbov_mjxyqE


DATA FUSION: THE KEY TO RELIABLE THREAT DETECTION - Richard Plný | Czech Technical University, Prague. Supported by CESNET.

Expand

Secure computer networks rely on monitoring, threat detection and security operators who respond to automatically created alerts. Performance of current anomaly and threat detection methods is dependent on the network telemetry data they are developed on. However, in some cases network telemetry does not contain truthful information. An error can occur during transmission, or an attacker can spoof information to confuse threat detectors. As a result, many attacks may remain undetected and false alerts might overwhelm security personnel. We are currently exploring an approach that utilises a combination of several data sources to overcome imperfections.

Many state-of-the-art detectors are based on Machine Learning (ML) technology, which can be easily confused. Attackers can alter traffic shape by sending additional data which is unnecessary for communication. Malicious traffic can be completely hidden by this technique and missed by the ML - an outgoing attack might not be detected at all. Data incompleteness is another problem. For example, no blocklist can ever contain every malicious IP address. Moreover, these IP addresses can change over time. Therefore the output of some detectors might not reflect reality. Current techniques, when used separately, are suffering from many pitfalls.

https://youtu.be/z2_Gre0wNdA

Expand

In recent years there has been a major development in the field of cluster computing. These solutions often require many dedicated resources to communicate with each other, and bind their abilities in a collaborative manner. There is also a requirement to allow multiple users to use a single cluster without affecting each others' computations. Nowadays, the FPGAs provide an excellent scalability and programmability for this purpose, with the advantage of parallelism and achieved throughput.

This talk introduces the design of a generalised streaming library for the PCI Express interface called JetStream 2.0. It is an enhancement of the previous generation, able to run at the data rates of PCI Express Gen3 x16, that means reaching the transfer speeds of up to 100Gbps. The architecture also supports sending data between two FPGA cards using a zero-copy mechanism - which bypasses the classical buffering of data in RAM and sends them directly to the addressed device. This solution is proposed as vendor independent, thus FPGA cards both from Intel and AMD/Xilinx can be used and also mixed on the host.

https://youtu.be/DMPzoBAnln0

AI PREMIE - A risk stratification tool for preeclampsia - Ana Le Chevillier | University College Dublin. Supported by HEAnet

Expand

https://youtu.be/PRd_tAF1QRU


Artificial Intelligence for rheumatic heart disease detection - Belen Fernandez de Toro Espejel | Universidad Nacional de Educación a Distancia. Supported by RedIRIS.

Expand

https://youtu.be/y7v71zk9FIg


COMBATTING ISOLATION IN RESEARCH, USING AN ONLINE COMMUNITY - Jenna Barry| Technical University of the Shannon. Supported HEAnet.

Expand

A Community of Practice (CoP) is a group of people who share a concern or a passion for something they do, learning how to do it better as they interact regularly. vCoP is an online CoP connected through technology and, in this instance, on an Enterprise Social Network (ESN). An ESN is a social network used in enterprise settings to bring together people who share the same interests - using the platform to engage and improve knowledge collectively. It is regarded as Enterprise 2.0. Coming together as a community and working as a unit may help encourage and strengthen the knowledge economy - decreasing isolation and increasing connection, communication and collaboration.

https://youtu.be/9s4FXIE5vEM


WHAT CAN WE DO TO PROMOTE BUILT HERITAGE? - Margherita Soldaini | Università degli Studi di Firenze Dip.to di Architettura. Supported by GARR.

Expand

Research has highlighted that although learning about cultural heritage still relies on text and pictures, physical objects are more effective, extending beyond conceptual experiences. Virtual representations of 3D objects cannot often support the attributes of physicality that may be valuable, for instance, in the reconstruction processes of a monument.

Margherita's research proposes the creation of accessible digital archives and their dissemination and valorisation. The main case study will examine the Church of St. Augustine and the Oratory of Blessed Becchetti in Fabriano, Italy, abandoned after an earthquake in 2016. The church has undergone numerous restorations, but historical evidence allows insight in to its original forms. The digital archive will give easy access to the models of the reconstructive hypotheses, using innovations in research and development in the practice of cultural heritage to ensure high-resolution images, metadata and 3D models. These tools enable us to learn more about abandoned places through the dissemination of content and information, promoting the preservation of the architectural and artistic heritage.

Models will be available for download, editing, and 3D printing for interdisciplinary uses, dedicated to visually impaired people, useful for the process of study and comprehensive tactile perception for students, curious people and scholars.

https://youtu.be/xYr8Mjb7Di4


CRYPTOGRAPHY FOR CLOUD SECURITY - Martina Palmucci | Università degli Studi di Perugia. Supported by GARR.

Expand

Nowadays, the amount of data stored on digital devices is huge and this trend is rising. Because of data protection regulation, and to deter attacks, sensitive data must be protected proactively.

Furthermore, recent legislation, among which the General Data Protection Regulation (EU GDPR) and the Consumer Data Right (CDR), has started to mandate technical measures for data protection. In particular, the principle of “data minimisation” states that a data controller should limit the collection of personal information to what is directly relevant and necessary to accomplish a specified purpose. The principle of minimisation can be implemented by limiting access to certain categories of data according to the experts that have to use the data.

This research project identified a technological gap related to the data minimisation principle. Although the GDPR legislation provides guidelines, it does not explicitly specify the required techno- logical tools to implement them. The project aims to fill that gap by developing a cryptographic scheme as a service integrated within a cloud system.

An encrypted database offers intrinsic data security. Data is transformed into ciphertext (unreadable text) using a cryptographic procedure. Even when an attack on the database would be successful, the encryption techniques prevent hackers to analyze or decrypt your data to use it to their ad- vantage. Specifically, the cryptographic technique that is chosen is Attribute-Based Encryption (ABE). ABE encrypts a resource against attributes instead of concrete users. Only users that possess a correct combination of attributes will be able to decrypt the resource. ABE eases the implementation of access control rules to comply with the GDPR principles.

Finally, the last part of the project consists of implementing the cryptographic scheme as a cloud service. Because the cloud is one of the most popular methods for storing data among large communities, we want to integrate the ABE system with cloud storage and other potential cloud services. The envisioned system will integrate the existing Role-Based Access Control (RBAC) system of a cloud system with ABE, allowing data to be encrypted using pre-existing privileges.

https://youtu.be/GbnUsx65dVU




Section

Archived FTP Lightning Talks


Expand

FTP22

Section

Why we need a collaborative DDoS protection architecture in Europe - Marion Dübendorfer (SWITCH)

Expand

Distributed Denial of Service (DDoS) attacks have the potential to disrupt access to critical infrastructure for population groups across the world – yet their mitigation capabilities lie largely in the hands of private tech companies based in the US. This lightning talk explores the opportunities and benefits of an open, federated DDoS protection architecture in Europe.

https://youtu.be/nqRtm2jZbww?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw


Fake News Detection Models — Introducing GAN Generated Synthetic Samples to Improve Performance - Bruno Gonçalves Vaz (Universidade do Porto) FCT/FCCN

Expand

News datasets are extremely imbalanced, with the fake news not being as well represented as the real news. Thus, machine learning models for fake news detection do not perform as good as expected. Hence, Generative Adversarial Networks can be used to produce high-quality synthetic samples to better represent the fake news data, improving the models’ performances.

https://youtu.be/2748eoymHqY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw



AI for Heritage ─ SOS digital collections: classifying and characterizing - Ana Carneiro (School of Arts | Universidade Católica Portuguesa - Porto) FCT/FCCN

Expand

A presentation that focuses on finding solutions that use AI to catalogue and categorize archival collections. Firstly, the difficulties that archivists have in the transition to digital followed by the various problems when one tries to implement AI. Finally, the necessary steps to carry out a project in partnership with a heritage space and a potential workflow.

https://youtu.be/IkNUbj4nvpE?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw



Traffic analysis of communication and collaboration apps bloomed with Covid-19 via advanced Deep Learning approaches -  Idio Guarino (University of Naples Federico II) GARR

Expand

The COVID-19 pandemic and the resulting increase in interactions via digital tools has deeply changed network traffic. To manage these changes, network operators need advanced tools for classification and the prediction of internet traffic. To face these tasks, the idea is to design advanced deep-learning based techniques with a special focus on traffic generated by social communication and collaboration apps.

https://youtu.be/hWXjB23EYs8?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw



Roman Emperors and Facial Recognition - Karel van Klink (GÉANT)

Expand

Facial recognition and Roman emperors: a unique application that will allow for the preservation of culture for generations to come.

https://youtu.be/Qujjm5upGKU?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw



Self-Sovereign Identity (SSI) for Future-Proof Digital Wallets - Frederic Gerber (SWITCH)

Expand

When the Internet was introduced at the end of the last century, it was not clear what use it would have. Today, we are at a similar crossroads with SSI, which consists of a set of principles for digital identities that users directly control. While it is not certain that SSI will change our society as groundbreakingly as the Internet did, it seems to be establishing itself as a paradigm that will endure for some time. From the user's perspective, it is important to understand the power of digital wallets, which is why this presentation will go through the main principles of SSI and convince everyone that a digital wallet is just as vulnerable as a physical one

Traffic analysis of communication and collaboration apps bloomed with Covid-19 via advanced Deep Learning approaches -  Idio Guarino (University of Naples Federico II) GARR

Expand
The COVID-19 pandemic and the resulting increase in interactions via digital tools has deeply changed network traffic. To manage these changes, network operators need advanced tools for classification and the prediction of internet traffic. To face these tasks, the idea is to design advanced deep-learning based techniques with a special focus on traffic generated by social communication and collaboration apps

.

https://youtu.be/

hWXjB23EYs8

Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

Roman Emperors and Facial Recognition - Karel van Klink (GÉANT)



Multi-factor authentication support between eduGAIN federations - Hilco de Lathouder (SURF)

Expand

Lightning Talk proposal featuring the results of a 1 month research project conducted as part of the University of Amsterdam's Security and Network engineering Master Program. The results are a start for improving support for (standardized) multi-factor authentication methods between eduGAIN federations

Expand
Facial recognition and Roman emperors: a unique application that will allow for the preservation of culture for generations to come

.

https://youtu.be/

Qujjm5upGKU

Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

Self-Sovereign Identity (SSI) for Future-Proof Digital Wallets - Frederic Gerber (SWITCH)


Guessing PINs, One Partial PIN at a Time - Ashley Sheil (Maynooth University)HEANET

Expand

We created different methods of guessing a person's PIN, by attempting to guess their partial PIN incrementally in an in-the-wild scenario. We look at the different patterns that result, as well as lengths of guessing time. We wanted to see how secure, in comparison, a full PIN is compared to using partial PINs as means of authentication

Expand
When the Internet was introduced at the end of the last century, it was not clear what use it would have. Today, we are at a similar crossroads with SSI, which consists of a set of principles for digital identities that users directly control. While it is not certain that SSI will change our society as groundbreakingly as the Internet did, it seems to be establishing itself as a paradigm that will endure for some time. From the user's perspective, it is important to understand the power of digital wallets, which is why this presentation will go through the main principles of SSI and convince everyone that a digital wallet is just as vulnerable as a physical one

.

https://youtu.be/

Q3bRLITeX6E

sjuFlIzDxLI?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

Multi-factor authentication support between eduGAIN federations - Hilco de Lathouder (SURF)


Challenges in processing and knowledge discovery in specifications of scientific resources - Witold Taisner (Poznan Supercomputing and Networking Center)PSNC

Expand

The talk will focus on major challenges present in both processing and further utilization of the data, such as specifications of certain scientific resources: articles, computational resources or datasets. Our goal is to create a recommender system for the aforementioned data
utilizing linguistic and natural language processing techniques, with a special focus on deep learning

Expand
Lightning Talk proposal featuring the results of a 1 month research project conducted as part of the University of Amsterdam's Security and Network engineering Master Program. The results are a start for improving support for (standardized) multi-factor authentication methods between eduGAIN federations

.

https://youtu.be/

Q3bRLITeX6E

6wdwCE1eMPk?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

Guessing PINs, One Partial PIN at a Time - Ashley Sheil (Maynooth University)HEANET


Artificial Intelligence for the early diagnosis of cardiac comorbidities associated to COVID-19 - Chiara Leoni (GARR)  

Expand

COVID-19 is an infectious disease, caused by SARS-CoV-2, that mainly affects the respiratory system. Unfortunately, it can also have serious impact on cardiovascular system, triggering the occurrence of cardiac diseases that must be timely identified. Thus, this project aims to contribute to the diagnosis of cardiac comorbidities associated to COVID-19, with the development of an artificial intelligence (AI)-based tool

Expand
We created different methods of guessing a person's PIN, by attempting to guess their partial PIN incrementally in an in-the-wild scenario. We look at the different patterns that result, as well as lengths of guessing time. We wanted to see how secure, in comparison, a full PIN is compared to using partial PINs as means of authentication

.

https://youtu.be/

sjuFlIzDxLI

Czxr-sV5oQY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

Challenges in processing and knowledge discovery in specifications of scientific resources - Witold Taisner (Poznan Supercomputing and Networking Center)PSNC

expand


 

Embedding a culture of internationalisation into the curriculum through "Internationalisation at Home"- Preparation for the changing context of Higher Education in Ireland - Nidhi Piplani Kapur, Waterford Institute of Technology, HEANET

Expand

My proposed research seeks to address the ‘gap’ in the Irish National Strategy for Internationalisation, by delving deep in how ‘Internationalisation of Curriculum (IoC)’ can provide internationalisation experiences to the 98% of students in Ireland who currently do not travel abroad. My research will investigate ways to provide an international experience ‘at home’ to all students, mainly using technology-based interventions. It will seek to inform a strategy that will drive the development and embedding of a culture of ‘Internationalisation at Home (IaH)’ in the curriculum. This will bridge skill deficits in Irish graduates and build multicultural competencies required by industry

Expand
The talk will focus on major challenges present in both processing and further utilization of the data, such as specifications of certain scientific resources: articles, computational resources or datasets. Our goal is to create a recommender system for the aforementioned data
utilizing linguistic and natural language processing techniques, with a special focus on deep learning

.

https://youtu.be/

6wdwCE1eMPk?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw

Archived FTP Lightning Talks

4-uXP4oBxHo




FTP21

Section

A testbed to bridge the cybersecurity skills gap in industrial control systems - conrad-ekisa/HEANET

Expand

ICS cybersecurity is of increasing concern and this is evidenced by the mounting reports of cyber threats and attacks on ICS infrastructure that are referenced both within the technical community and the public media.

 https://learning.geant.org/conrad-ekisa/

Telomerase – eternal life or a panacea for all cancers ?! - hanna-karpenko/BASNET

Expand

Telomerase is considered the key to cellular immortality, the “fountain of youth.” This enzyme allows cells to multiply rapidly without aging. At the same time, telomerase allows cancer cells to divide indefinitely, which is the reason for the formation of tumors. Scientists from all over the world have been trying to solve this problem for a very long time. But today there is no exact model of the structure of human telomerase, due to the complexity of the structure and the high cost of this study. Computer modeling methods make it possible to quickly and cost-effectively reconstruct the spatial structure of human telomerase by homology based on the structural data of related templates. The work is done with the help of the State Supercomputer Multi-access Center of the UIIP NASB and the NREN BASNET network infrastructure. Computer methods of molecular dynamics optimize the model and make it accurate enough for rational design drugs and will help to understand that telomerase is eternal life or a panacea for oncology.

https://learning.geant.org/hanna-karpenko/

A Hierarchical Learning Approach to Enable Network Slicing in Future Telecommunication Systems federico-mason/GARR

Expand

In this work, we designed a hierarchical learning architecture, where multiple agents cooperate to orchestrate network slices under different working conditions. Our hierarchical architecture will support PSC in a much more efficient way than conventional approaches, allowing the current telecommunication networks to assist emergency operators (e.g., firefighters, policemen, healthcare professionals) without the need for a dedicated infrastructure.

 https://learning.geant.org/federico-mason/

Indoor Localization Service based on Beacons: A System to Save Your Life! - sara-raggiunto/GARR

Expand

Navigation systems help users find their way around the world. But what if we wanted to reach the exact platform of our departing train and it’s a matter of minutes? Or what if in the earthquake/fire event we wanted the shortest path to the escape route? The skill is to move from a problem to an extremely innovative solution. Indoor localization allows users to access unknown environments. The main challenges of the proposed system are the safety, the access control, and the activity monitoring. In fact, knowing instantly the exact position of the people to be assisted is extremely important in an indoor environment. 

https://learning.geant.org/sara-raggiunto/

Biometrics-based scheme for public key agreement protocol in wireless body area networks - anna-valeria-guglielm / GARR

Expand

Wireless body area networks (WBANs) are becoming increasingly popular as they allow individuals to continuously monitor their vitals and physiological parameters remotely from the hospital. With the spread of the SARS-CoV-2 pandemic, the availability of portable pulse-oximeters and wearable heart rate detectors has boomed in the market. At the same time, in recent years we assisted to an unprecedented increase of healthcare breaches, revealing the extreme vulnerability of the current generation of WBANs. Therefore, the development of new security protocols to ensure data protection, authentication, integrity and privacy within WBANs are highly needed. In this context, we target a WBAN collecting ECG signals from different locations on the individual’s body, and we propose a new information theoretic key agreement protocol that exploits the inherent randomness of ECG signals to ensure authentication between the nodes within the WBAN.

 https://learning.geant.org/anna-valeria-guglielmi/


FTP20

What if we don’t have to type anymore? Luis Sampaio, FCT/FCCN

Expand

This presentation outlines a new approach on human-machine interaction that is inclusive to people with hand/arm movement impediments and vocal impairments through the use of an electroencephalography headset and electromyography surface electrodes respectively, all on a decentralized application that is developed to guarantee privacy on communication between users. 

https://learning.geant.org/luis-sampaio/

Internet of Things - Alvise Baggio, GARR

Expand

FaaSt (Forecast as a Service) is a project created on occasion of the hackathon organized by GARR (Hack The Cloud) on November 2019 whose main theme was environmental sustainability. The idea behind Faast is to use cloud communication infrastructure to improve the electric grid and provide end-users with real-time information on the sources of energy used in the grid and to opt for the renewable options.

https://learning.geant.org/alvise-baggio/

Postquantum secure cryptographic schemes - Panayiota Smyrli, CYNET

Expand

Recent advancements in quantum computing have brought about fundamental challenges to cryptography. The security of many classical cryptographic schemes, such as the digital signature algorithm (DSA), the Diffie-Hellman (DH) key exchange protocol, and their elliptic curve variants, relies on the hardness of the well-known discrete logarithm problem over cyclic groups in elliptic curves over finite fields. 

https://learning.geant.org/panayiota-smyrli/

Computer Discovery of Novel Drugs, Hanna Karpenka, BASNET

Expand

Computer molecular modeling techniques play an important role in research into the development of new drugs. The use of neural networks for these methods in the rational design of potential drugs can minimize the time and cost of searching for various targets and potential drugs! Such a computer model can, with high probability, predict the vulnerability in the structure of the infectious agent and indicate which chemical compound should be synthesized.

https://learning.geant.org/hanna-karpenka/

Challenges and Opportunities of Crowdfunding in Ireland - Kelly Wang, HEAnet

Expand

Digital connectivity is transforming all aspects of our lives. Today information, ideas and financial flows are exchanged rapidly online and worldwide.  A case in point is Crowdfunding.  Enabling investors and entrepreneurs to connect worldwide online, to access much needed finance, this new model has emerged as a powerful disruptive force, reshaping traditional funding models and undermining traditional market dynamics.

https://learning.geant.org/kelly-wang/

Information-Centric Networking (ICN) - Paul Duggan, HEAnet

Expand

Information-Centric Networking (ICN) is an alternative approach to the Internet networking architecture. The main idea behind this approach is that information is identified by name, rather than by IP address. Due to this capability, this information can be cached on some or all hops on the delivery path between a source and an end-user, depending on a caching policy. For example, if an end-user requests a video, a copy of this video may be cached at every hop along the path between the source and end-user. When an adjacent user requests the same video, the request may be serviced from a node closer to the user instead of from the source. This can lead to significant savings in quality, costs and latency

https://learning.geant.org/paul-duggan/

FTP19

Expand

Democratizing Smart Farming with AI on LoRa Sensor Networks – Luca Coviello, Fondazione Bruno Kessler, Italy (GARR)
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 54:28 Luca 

Building Community Machine Learning Tool for Agriculture and Forest Species Identification – António Ferreira, University of Trás-os-Montes e Alto Douro (UTAD), Portugal (FCT/FCCN).]
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 54:28 Antonio 

Sport-Related Sudden Cardiac Death: A New In- Cloud System for Athletes Prevention – Agnese Sbrollini, Università Politecnica delle Marche, Italy (GARR).
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 49:40  Agnese

Content-Interaction-Powered Distance Learning – Contact, pointing, immersion and feeling of presence – Enrico Pietrocola, Conservatorio G.Verdi, Milano, Italy (GARR). 
https://tnc19.geant.org/video-archive/#s39

6A Lightning Talks: Second Strike
Minute: 35:20 Enrico

Project Fox, a Quest for a Statically Typed Embeddable Programming Language – Pierre van Houtryve, HEPH Condorcet, Mons, Belgium (BELNET).
https://tnc19.geant.org/video-archive/#s39
6A Lightning Talks: Second Strike
25:34 Pierre

FOG Computing as a Lifeline for E Health Users – Era Ajdaraga Krluku, Ss. Cyril and Methodius University, Macedonia (MARNET)
https://tnc19.geant.org/video-archive/#s39
Minute: 29:45 Era


FTP18

Hey network, what's going on? -- Virtual assistants for networks - Rüdiger Birkner, ETH Zurich/ SWITCH, Switzerland
https://tnc18.geant.org/web/media/archive/2A
Minute: 48:45 Rudiger

Back to the future: let’s bring schools to XXI century! - Ilaria Bortolotti, Università di Roma La Sapienza/GARR, Italy
https://tnc18.geant.org/web/media/archive/2A
Minute: 37:45 Llaria

Efficiency is the way to go: get to know EnkiJosé Pedro Guerra Brito, UTAD, Universidade de Tás os Montes e Alto Douro / FCT/FCCN, Portugal
ttps://tnc18.geant.org/web/media/archive/2A
Minute: 43:29 José

Empowering student involvement in campus network deployment - Antonio Angel Cruzado Castillo, University of Málaga / RedIRIS, Spain
https://tnc18.geant.org/web/media/archive/6AMinute: 32:25 Antonio

mySense - AI and Big Data for agroforestry applications Jorge Mendes, UTAD, Universidade de Trás os Montes e Alto Douro / FCT/FCCN, Portugal
https://tnc18.geant.org/web/media/archive/6A
Minute: 27.09 Jorge

V-Labs: autonomous provisioning of virtual environments using PaaS approach Simone Feretti, INFN Sezione di Roma Tor Vergata / GARR, Italy
Poster Presentation

SCOReS: A dynamic cache system for e-Science applications Davide Michelino, Università di Napoli Federico II - INFN Sezione di Napoli/ GARR, Italy
Poster Presentation

Network installation upgrade, done with students? Melchor Alejo Garau Madrigal, University of Málaga / RedIRIS, Spain
Poster Presentation

Privacy-Friendly Threat Detection Using DNS Gijs Rijnders, Eindhoven University of Technology / SURFnet, Netherlands
Poster Presentation


FTP17

Beyond Touch, Swipe and Tap for Smart Clothing! Retro brings Nostalgia Adwait Sharma, University of Applied Sciences Upper Austria, Hagenberg/ACONET, Austria Security risks and ethical
https://tnc17.geant.org/web/media/archive/2A
Minute: 23:40 Adwait

implications of sensitive data on the Internet of Things Ernesta Grigaityte, The University of Central Lancashire, Cyprus (UCLan Cyprus)/CYNET, Cyprus
https://tnc17.geant.org/web/media/archive/2A
Minute: 38.49 Ernesta

“SmartWindow”- Pablo Picasso meets Graham Bell Rafay Iqbal Ansari, Frederick University/CYNET, Cyprus Distributed
https://tnc17.geant.org/web/media/archive/2A
Minute: 17:58 Rafay

learning based on free open educational resources Tiago José Castro, ESMAD - Politecnico Porto/FCT/FCCN, Portugal
https://tnc17.geant.org/web/media/archive/2A
Minute 50:24 Tiago

Switches - routers in disguise. Software router acceleration using OpenFlow hardware Norbertas Kremeris, Kaunas University of Technology/LITNET, Lithuania
https://tnc17.geant.org/web/media/archive/6A
Minute 1.00:26 Norbertas

Using Raspberry Pis for cheap Wi-Fi monitoring Fredrik Strupe, Norwegian University of Science and Technology/UNINETT, Norway
https://tnc17.geant.org/web/media/archive/6A
Minute: 55:30 Fredrik