- Created by Magda Haver, last modified by Lisa Melrose on Nov 29, 2023
Focus: Presentation skills, public speaking skills
The Future Talent Programme's Lightning Talk Challenge (FTP23) offers students and young professionals an opportunity to present their project or idea to an international audience at GÉANT's annual TNC conference. Nominated by GÉANT project partners, participants are given training to help them master presentation skills and prepare for an impactful presentation.
FTP23 challenges participants to present their research or idea as a 5-minute "Lightning Talk" at the TNC Conference which will be held from 5-9 June 2023 in Tirana, Albania. Participants whose proposals are selected by the TNC Programme Committee ('finalists') will be invited to participate in the TNC conference and their travel fees paid*.
What's included
Students and young professionals will learn how to pitch their proposal and deliver a powerful presentation. The virtual workshops offer a safe environment where participants can learn and practise together, and is often a good place to build a network of peers. In addition, all participants are invited to showcase the end result of their learning in a self-recorded video which may be published through GÉANT media channels.
- Practical and interactive workshops under the guidance of a professional public speaking coach for all participants
- Video presentation support
- 1:1 coaching for 'finalists'
- *Travel fees + full conference pass for finalists (see the above statement*) The hosting NREN is asked to pre-pay the flights for the students and claim the cost back from GN4-4-WP5-T1 through its regular monthly cost claims.
Requirements
- This challenge is open to i) students who are registered on any IT & networking-related course at a university or learning provider and ii) young professionals working in IT & networking-related areas.
- All participants must be nominated by a GÉANT member NREN. If in doubt, applicants should select the NREN in the country where they study or work from this list of GEANT members.
- The lightning talk idea must be associated with computer networking or other technology-related areas.
- Lightning talk proposals must include: title, participant name, educational institution, short biography, five keywords, and short introduction of the idea (max. 500 words). Abstract must be marked [Topic title + FTP]
- Participants commit themselves to attend the full training programme (3 virtual workshops in April-May)
- Finalists commit to present their proposal at TNC 2023 if selected
- Excellent command of the English language, both spoken and written
What is required of the NREN
If you are a NREN, this programme gives you great exposure in the R&E community and may help to strengthen relations with your institutional partners and users. To participate the NREN must:
- Be a member of the GÉANT GN5 Project
- Be willing to recruit, select and administer the registration of up to 3 candidates
- Offer students a local contact (mentor) to support, encourage or promote participants locally.
What is the role of GLAD
GLAD is committed to:
- Providing training workshops designed to improve participants' public speaking skills.
- Liaising with NRENs and their candidate(s).
- Paying successful participants' travel and conference fees for attendance at the TNC conference.
How to Apply (NRENs)
Step 1 Register your candidate online with a brief description of the candidate's topic.
Step 2 All accepted candidates will become participants of the Future Talent Programme and will receive the training. Your participant takes part in the virtual training workshops in April and May. Dates and Programme will be confirmed.
Step 3 Participants submit their Lightning Talk proposal to TNC Programme Committee by 10 March 2023, midnight CET.
Step 4 Participants will be notified by the TNC Programme Committee of the acceptance or rejection of the proposal
Step 5 Selected participants ('finalists') take further training and take part at TNC22
FAQ STUDENTS
Media & Downloads
FTP News and articles:
Record number of GÉANT Future Talent students in spotlight at TNC22 | GÉANT CONNECT Online and CONNECT Magazine, May 2022
Bright students and young professionals wanted – GÉANT’s Future Talent Programme is back on stage | GÉANT CONNECT Online, February 2022
- The Future Talent Programme challenges students to take part in TNC21 | GÉANT CONNECT Online
GLAD Future Talents inspire the R&E Community with new ideas | GÉANT CONNECT Online, July 2020
- Future Talent Programme 2019 Conquering the TNC Stage
30/07/2019, CONNECT magazine
- Amazing TNC19 experience for Future Talents
July 2, 2019 Learning.org
- Future Talents are ready for TNC19 Lightning Talks
14/06/2019, Learning.org
Submit Registration
Registration deadline
28 February 2023 12:00 PM CET
TNC23 conference 5 - 9 June in Tirana, Albania
Schedule
28 February 2023 12:00PM CET
Deadline for NRENs to register candidates for the programme
Submit Registration10 March 2023
Submission deadline for candidates to send Lightning Talk proposal to TNC23
https://tnc23.geant.org/submit/Mid-March 2023
Acceptance/rejection Lightning Talk proposals by TNC23 Programme Committee
End of March - May 2023
Public speaking workshops
5-9 June 2023
TNC23, Tirana, Albania
FAQ (NRENs)
Who can participate in this programme?Any early career candidate nominated by a GÉANT Project NREN partner studying at a university or college in a GÉANT partner country, or working at a GÉANT NREN.
How many candidates can you nominate for the programme?Depending on the number of candidates in the programme, a maximum of 3 candidates per NREN.
What kind of candidates should NRENs look for?Ideal candidates: (under) graduate, master and PhD students (possibly interns at the NREN), who want to commit time and energy to learn and develop beyond the basic university programme.
What kind of topic can be submitted for a lightning talkThe subject matter of each presentation could be any idea, project or research or innovation the candidates have been working on which addresses a technical, economic, legal, security or environmental aspect in any IT and networks field. (see former topics below)
How does selection and recruitment take place? doneWe expect NRENs to select and nominate a maximum of 3 candidates. All nominated candidates who comply with the programme requirements (see Requirements) will be admitted to the Future Talent Programme. The acceptance of the participant's proposal for the Lightning Talk programme at TNC will be the exclusive decision of the TNC Programme Committee without any interference of the Future Talent Programme. The Future Talent candidate competes with all the other proposals submitted for the conference. Winning proposals are selected based on originality and clarity.
What do you need to send to Future Talent Programme to nominate a candidate?A complete application includes the online registration at https://events.geant.org/event/1375/ including the mentor's contact details, the candidate’s contact details, university and a short description of the topic the candidate wants to submit as a Lightning Talk. The application must be submitted by 10 March 2023
What will be your role as a host and mentor?Your role as a mentor is to engage with your candidate on a regular basis during the programme, provide encouragement and advice throughout the programme and attend related events. If your candidate is selected to present at TNC, we encourage you to support him or her during the conference. All candidates' costs are funded by the programme and can be reclaimed from ???GN4.3-WP1-T5 ???following the normal GÉANT project claimant rules and procedures.
What is the duration of the programme?The programme runs from March to June, and includes 3 workshops for all participants. Depending on the number of participants the workshops will be organised in groups of max 5 and will run in March and April. TNC 'finalists' can expect further coaching from a professional trainer coach prior to the conference.
Have a different question?
Email: glad@geant.org
FTP23 Lightning Talks
THE ALGORITHMIC DESIGN SKETCHBOOK - Renata Castelo-Branco | INESC-ID/Instituto Superior Técnico, University of Lisbon. Supported by FCT|FCCN
Click here to expand...When you picture an architect at work, how do you see them? Holding a pencil over a drawing board, maybe? How about the architects that designed the Morpheus Hotel in Macau; the Gherkin in London, or the Louvre in Abu Dhabi? Still imagining pencils?
Architecture, like many other art forms, frequently mirrors the technological advancements of its time, and these are just some examples of the multitude of projects that have been reflecting the increasing integration of computer science in the architectural domain. Today, architects have at their disposal tools that allow them to design, and manage, large-scale and non-conventional design solutions that would have been nearly impossible to conceive using traditional design methods. However, designing with algorithms requires programming, a concept with which practitioners often struggle. For architecture to benefit from computation at large, we still need to close the existing comprehension gap between algorithmic design programs and their behaviour, making this representation method more akin to the traditional architectural practice. The Algorithmic Design Sketchbook proposal addresses this problem by coupling algorithmic design with complementary representation methods that are adequate for designing complex architectural projects, and supporting their synchronisation with a design tool that architects feel comfortable using.
IT'S PEOPLE - OR WHY WE NEED AN INTERDISCIPLINARY APPROACH TO CYBERSECURITY - Fabio Greiner | University of Zurich. Supported by SWITCH
Click here to expand...In recent years we have come to realise that cyber security not only requires technical measures, but also cooperation on the part of the users in order to make organisations more resilient against cyber-attacks. Changing user behaviour requires more than just one-time training, it demands a different skill set to what most experts in cyber security have. That's why the field is undergoing a transformation through inviting professionals from other disciplines to support security measures.
In my master’s thesis I studied the collaboration of security awareness specialists with internal communications. The results from the interviews provided insight into how practiced interdisciplinarity can support security professionals in their daily work, and thus make organisations more secure.
WHY YOUR INTERNET IS BAD! - Félix Gaudin | UC Louvain. Supported by Belnet
Click here to expand...During the Covid crisis I followed my course using Microsoft Teams. In many cases the video/audio quality was really bad, and yet none of the speed tests I ran showed any abnormality. What happened? At that time, speed test websites only measured throughput. Latency is measured as well, but as idle latency (without load on it). However, when you attend a class/meeting there are always other apps/people using your network.
We need a way to measure working latency. The IETF has started to develop a new measurement technique called RPM to measure latency under working conditions. Our goal is to implement it in a browser so that every user will know why their connection is poor. Moreover, all current tests work with TCP connections. With TCP it is possible to send a large amount of data, but it's very hard to accurately measure latency or packet losses. Meanwhile, many cloud providers are moving towards HTTP/3 with the QUIC protocol. Therefore, we are developing our measurement tool with QUIC.
APK FALCON: EMPOWERING USER’S PRIVACY - Javier Crespo Guerrero | Universidad de Valladolid. Supported by REDIRIS
Click here to expand...APK Falcon is a tool to assist users in assessing the impact of mobile apps on privacy, to improve knowledge and empower decision making in accordance with the values of the EU Next Generation Internet. APK Falcon will help users understand the permission system, leading to improved management - such as revoking highly intrusive permissions or being more cautious when asked to grant permission. This tool will be made in a user-centric way, so the impact on privacy can be understood by everyone.
Users will be able to access a web service where they can search for the name of an application and obtain a privacy score, as well as information to understand this score. APK Falcon can assist users in making more informed decisions about granting permissions and managing their privacy. By shedding light on the permission system, APK Falcon can empower users to take control of their privacy in a simple, open and transparent fashion.
POWERING THE FUTURE: THE VALUE OF RENEWABLE ENERGY COMMUNITIES IN A DECARBONIZED WORLD - João Daniel Correia Brandão | Universidade do Porto - Faculdade de Engenharia. Supported by FCT|FCCN
Click here to expand...The transition to renewable energy is critical to mitigate the effects of climate change and achieve a sustainable future. One promising approach to advance this transition is through the development of Renewable Energy Communities (RECs). These communities are formed by groups of people or organisations that come together to produce, consume and share renewable energy locally. They are designed to promote local ownership, collaboration and innovation in the deployment of renewable energy technologies.
To fully realise the potential of these communities, assessing their value and impact is essential. This assessment will provide insights into the benefits and challenges associated with RECs, and help identify best practices for their development and implementation. It will also evaluate the economic benefits of these communities, including the potential for job creation, increased economic activity and cost savings for participants.
BREAKING DOWN AI TO GET EXPLANATIONS - Karel Hynek | FIT CTU- Czech Technical University, Prague. Supported by CESNET.
Click here to expand...Research shows that Artificial Intelligence (AI) can be an effective tool for automated cyber threat hunting. However, the lack of explainability still prevents its mass deployment into commercial-grade tools. Due to AI complexity it's hard to get reasons behind its output, which are crucial for cyber security incident handling and response. We thus bring new design principles of AI by dividing complex monolithic models into small components with defined functionality. By observing the outputs and interaction of these components, we can get an insight into their internal behaviour and provide explanations and reasoning behind their output. The lack of explainability originates from AI's enormous complexity, which people cannot comprehend. We thus divide the complex AI into a component-based system, each component designed separately, like in the human brain. In the brain, there are parts responsible for vision and other parts for hearing for example. We know which part is responsible for what, dramatically increasing our understanding of such a complex system.
Component-based models are solutions for AI model deployment in cyber security and other high-stakes areas where explanations are necessary. The division into components provides better control over the predictions and explains them. The improved explainability also reduces the chance of design errors, can improve model quality control and increases the overall trust of its users. Moreover, we can use reasoning to filter out obvious mistakes and increase AI reliability.
DATA FUSION: THE KEY TO RELIABLE THREAT DETECTION - Richard Plný | Czech Technical University, Prague. Supported by CESNET.
Click here to expand...Secure computer networks rely on monitoring, threat detection and security operators who respond to automatically created alerts. Performance of current anomaly and threat detection methods is dependent on the network telemetry data they are developed on. However, in some cases network telemetry does not contain truthful information. An error can occur during transmission, or an attacker can spoof information to confuse threat detectors. As a result, many attacks may remain undetected and false alerts might overwhelm security personnel. We are currently exploring an approach that utilises a combination of several data sources to overcome imperfections.
Many state-of-the-art detectors are based on Machine Learning (ML) technology, which can be easily confused. Attackers can alter traffic shape by sending additional data which is unnecessary for communication. Malicious traffic can be completely hidden by this technique and missed by the ML - an outgoing attack might not be detected at all. Data incompleteness is another problem. For example, no blocklist can ever contain every malicious IP address. Moreover, these IP addresses can change over time. Therefore the output of some detectors might not reflect reality. Current techniques, when used separately, are suffering from many pitfalls.
JETSTREAM 2.0: A MULTI-FPGA PCIE INFRASTRUCTURE SUPPORTING FPGA-TO-FPGA LINKS - Vladislav Válek | Brno University of Technology. Supported by CESNET
Click here to expand...In recent years there has been a major development in the field of cluster computing. These solutions often require many dedicated resources to communicate with each other, and bind their abilities in a collaborative manner. There is also a requirement to allow multiple users to use a single cluster without affecting each others' computations. Nowadays, the FPGAs provide an excellent scalability and programmability for this purpose, with the advantage of parallelism and achieved throughput.
This talk introduces the design of a generalised streaming library for the PCI Express interface called JetStream 2.0. It is an enhancement of the previous generation, able to run at the data rates of PCI Express Gen3 x16, that means reaching the transfer speeds of up to 100Gbps. The architecture also supports sending data between two FPGA cards using a zero-copy mechanism - which bypasses the classical buffering of data in RAM and sends them directly to the addressed device. This solution is proposed as vendor independent, thus FPGA cards both from Intel and AMD/Xilinx can be used and also mixed on the host.
AI PREMIE - A risk stratification tool for preeclampsia - Ana Le Chevillier | University College Dublin. Supported by HEAnet.
Click here to expand...Artificial Intelligence for rheumatic heart disease detection - Belen Fernandez de Toro Espejel | Universidad Nacional de Educación a Distancia. Supported by RedIRIS.
Click here to expand...COMBATTING ISOLATION IN RESEARCH, USING AN ONLINE COMMUNITY - Jenna Barry | Technical University of the Shannon. Supported HEAnet.
Click here to expand...A Community of Practice (CoP) is a group of people who share a concern or a passion for something they do, learning how to do it better as they interact regularly. vCoP is an online CoP connected through technology and, in this instance, on an Enterprise Social Network (ESN). An ESN is a social network used in enterprise settings to bring together people who share the same interests - using the platform to engage and improve knowledge collectively. It is regarded as Enterprise 2.0. Coming together as a community and working as a unit may help encourage and strengthen the knowledge economy - decreasing isolation and increasing connection, communication and collaboration.
WHAT CAN WE DO TO PROMOTE BUILT HERITAGE? - Margherita Soldaini | Università degli Studi di Firenze Dip.to di Architettura. Supported by GARR.
Click here to expand...Research has highlighted that although learning about cultural heritage still relies on text and pictures, physical objects are more effective, extending beyond conceptual experiences. Virtual representations of 3D objects cannot often support the attributes of physicality that may be valuable, for instance, in the reconstruction processes of a monument.
Margherita's research proposes the creation of accessible digital archives and their dissemination and valorisation. The main case study will examine the Church of St. Augustine and the Oratory of Blessed Becchetti in Fabriano, Italy, abandoned after an earthquake in 2016. The church has undergone numerous restorations, but historical evidence allows insight in to its original forms. The digital archive will give easy access to the models of the reconstructive hypotheses, using innovations in research and development in the practice of cultural heritage to ensure high-resolution images, metadata and 3D models. These tools enable us to learn more about abandoned places through the dissemination of content and information, promoting the preservation of the architectural and artistic heritage.
Models will be available for download, editing, and 3D printing for interdisciplinary uses, dedicated to visually impaired people, useful for the process of study and comprehensive tactile perception for students, curious people and scholars.
CRYPTOGRAPHY FOR CLOUD SECURITY - Martina Palmucci | Università degli Studi di Perugia. Supported by GARR.
Click here to expand...Nowadays, the amount of data stored on digital devices is huge and this trend is rising. Because of data protection regulation, and to deter attacks, sensitive data must be protected proactively.
Furthermore, recent legislation, among which the General Data Protection Regulation (EU GDPR) and the Consumer Data Right (CDR), has started to mandate technical measures for data protection. In particular, the principle of “data minimisation” states that a data controller should limit the collection of personal information to what is directly relevant and necessary to accomplish a specified purpose. The principle of minimisation can be implemented by limiting access to certain categories of data according to the experts that have to use the data.
This research project identified a technological gap related to the data minimisation principle. Although the GDPR legislation provides guidelines, it does not explicitly specify the required techno- logical tools to implement them. The project aims to fill that gap by developing a cryptographic scheme as a service integrated within a cloud system.
An encrypted database offers intrinsic data security. Data is transformed into ciphertext (unreadable text) using a cryptographic procedure. Even when an attack on the database would be successful, the encryption techniques prevent hackers to analyze or decrypt your data to use it to their ad- vantage. Specifically, the cryptographic technique that is chosen is Attribute-Based Encryption (ABE). ABE encrypts a resource against attributes instead of concrete users. Only users that possess a correct combination of attributes will be able to decrypt the resource. ABE eases the implementation of access control rules to comply with the GDPR principles.
Finally, the last part of the project consists of implementing the cryptographic scheme as a cloud service. Because the cloud is one of the most popular methods for storing data among large communities, we want to integrate the ABE system with cloud storage and other potential cloud services. The envisioned system will integrate the existing Role-Based Access Control (RBAC) system of a cloud system with ABE, allowing data to be encrypted using pre-existing privileges.
Archived FTP Lightning Talks
Click here to expand...FTP22
Why we need a collaborative DDoS protection architecture in Europe - Marion Dübendorfer (SWITCH)
Click here to expand...Distributed Denial of Service (DDoS) attacks have the potential to disrupt access to critical infrastructure for population groups across the world – yet their mitigation capabilities lie largely in the hands of private tech companies based in the US. This lightning talk explores the opportunities and benefits of an open, federated DDoS protection architecture in Europe.
https://youtu.be/nqRtm2jZbww?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Fake News Detection Models — Introducing GAN Generated Synthetic Samples to Improve Performance - Bruno Gonçalves Vaz (Universidade do Porto) FCT/FCCN
Click here to expand...News datasets are extremely imbalanced, with the fake news not being as well represented as the real news. Thus, machine learning models for fake news detection do not perform as good as expected. Hence, Generative Adversarial Networks can be used to produce high-quality synthetic samples to better represent the fake news data, improving the models’ performances.
https://youtu.be/2748eoymHqY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
AI for Heritage ─ SOS digital collections: classifying and characterizing - Ana Carneiro (School of Arts | Universidade Católica Portuguesa - Porto) FCT/FCCN
Click here to expand...A presentation that focuses on finding solutions that use AI to catalogue and categorize archival collections. Firstly, the difficulties that archivists have in the transition to digital followed by the various problems when one tries to implement AI. Finally, the necessary steps to carry out a project in partnership with a heritage space and a potential workflow.
https://youtu.be/IkNUbj4nvpE?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Traffic analysis of communication and collaboration apps bloomed with Covid-19 via advanced Deep Learning approaches - Idio Guarino (University of Naples Federico II) GARR
Click here to expand...The COVID-19 pandemic and the resulting increase in interactions via digital tools has deeply changed network traffic. To manage these changes, network operators need advanced tools for classification and the prediction of internet traffic. To face these tasks, the idea is to design advanced deep-learning based techniques with a special focus on traffic generated by social communication and collaboration apps.
https://youtu.be/hWXjB23EYs8?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Roman Emperors and Facial Recognition - Karel van Klink (GÉANT)
Click here to expand...Facial recognition and Roman emperors: a unique application that will allow for the preservation of culture for generations to come.
https://youtu.be/Qujjm5upGKU?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Self-Sovereign Identity (SSI) for Future-Proof Digital Wallets - Frederic Gerber (SWITCH)
Click here to expand...When the Internet was introduced at the end of the last century, it was not clear what use it would have. Today, we are at a similar crossroads with SSI, which consists of a set of principles for digital identities that users directly control. While it is not certain that SSI will change our society as groundbreakingly as the Internet did, it seems to be establishing itself as a paradigm that will endure for some time. From the user's perspective, it is important to understand the power of digital wallets, which is why this presentation will go through the main principles of SSI and convince everyone that a digital wallet is just as vulnerable as a physical one.
https://youtu.be/Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Multi-factor authentication support between eduGAIN federations - Hilco de Lathouder (SURF)
Click here to expand...Lightning Talk proposal featuring the results of a 1 month research project conducted as part of the University of Amsterdam's Security and Network engineering Master Program. The results are a start for improving support for (standardized) multi-factor authentication methods between eduGAIN federations.
https://youtu.be/Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Guessing PINs, One Partial PIN at a Time - Ashley Sheil (Maynooth University)HEANET
Click here to expand...We created different methods of guessing a person's PIN, by attempting to guess their partial PIN incrementally in an in-the-wild scenario. We look at the different patterns that result, as well as lengths of guessing time. We wanted to see how secure, in comparison, a full PIN is compared to using partial PINs as means of authentication.
https://youtu.be/sjuFlIzDxLI?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Challenges in processing and knowledge discovery in specifications of scientific resources - Witold Taisner (Poznan Supercomputing and Networking Center)PSNC
Click here to expand...The talk will focus on major challenges present in both processing and further utilization of the data, such as specifications of certain scientific resources: articles, computational resources or datasets. Our goal is to create a recommender system for the aforementioned data
utilizing linguistic and natural language processing techniques, with a special focus on deep learning.
https://youtu.be/6wdwCE1eMPk?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Artificial Intelligence for the early diagnosis of cardiac comorbidities associated to COVID-19 - Chiara Leoni (GARR)
Click here to expand...COVID-19 is an infectious disease, caused by SARS-CoV-2, that mainly affects the respiratory system. Unfortunately, it can also have serious impact on cardiovascular system, triggering the occurrence of cardiac diseases that must be timely identified. Thus, this project aims to contribute to the diagnosis of cardiac comorbidities associated to COVID-19, with the development of an artificial intelligence (AI)-based tool.
https://youtu.be/Czxr-sV5oQY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Embedding a culture of internationalisation into the curriculum through "Internationalisation at Home"- Preparation for the changing context of Higher Education in Ireland - Nidhi Piplani Kapur, Waterford Institute of Technology, HEANET
Click here to expand...My proposed research seeks to address the ‘gap’ in the Irish National Strategy for Internationalisation, by delving deep in how ‘Internationalisation of Curriculum (IoC)’ can provide internationalisation experiences to the 98% of students in Ireland who currently do not travel abroad. My research will investigate ways to provide an international experience ‘at home’ to all students, mainly using technology-based interventions. It will seek to inform a strategy that will drive the development and embedding of a culture of ‘Internationalisation at Home (IaH)’ in the curriculum. This will bridge skill deficits in Irish graduates and build multicultural competencies required by industry.
FTP21
A testbed to bridge the cybersecurity skills gap in industrial control systems - conrad-ekisa/HEANET
Click here to expand...ICS cybersecurity is of increasing concern and this is evidenced by the mounting reports of cyber threats and attacks on ICS infrastructure that are referenced both within the technical community and the public media.
Telomerase – eternal life or a panacea for all cancers ?! - hanna-karpenko/BASNET
Click here to expand...Telomerase is considered the key to cellular immortality, the “fountain of youth.” This enzyme allows cells to multiply rapidly without aging. At the same time, telomerase allows cancer cells to divide indefinitely, which is the reason for the formation of tumors. Scientists from all over the world have been trying to solve this problem for a very long time. But today there is no exact model of the structure of human telomerase, due to the complexity of the structure and the high cost of this study. Computer modeling methods make it possible to quickly and cost-effectively reconstruct the spatial structure of human telomerase by homology based on the structural data of related templates. The work is done with the help of the State Supercomputer Multi-access Center of the UIIP NASB and the NREN BASNET network infrastructure. Computer methods of molecular dynamics optimize the model and make it accurate enough for rational design drugs and will help to understand that telomerase is eternal life or a panacea for oncology.
A Hierarchical Learning Approach to Enable Network Slicing in Future Telecommunication Systems federico-mason/GARR
Click here to expand...In this work, we designed a hierarchical learning architecture, where multiple agents cooperate to orchestrate network slices under different working conditions. Our hierarchical architecture will support PSC in a much more efficient way than conventional approaches, allowing the current telecommunication networks to assist emergency operators (e.g., firefighters, policemen, healthcare professionals) without the need for a dedicated infrastructure.
Indoor Localization Service based on Beacons: A System to Save Your Life! - sara-raggiunto/GARR
Click here to expand...Navigation systems help users find their way around the world. But what if we wanted to reach the exact platform of our departing train and it’s a matter of minutes? Or what if in the earthquake/fire event we wanted the shortest path to the escape route? The skill is to move from a problem to an extremely innovative solution. Indoor localization allows users to access unknown environments. The main challenges of the proposed system are the safety, the access control, and the activity monitoring. In fact, knowing instantly the exact position of the people to be assisted is extremely important in an indoor environment.
Biometrics-based scheme for public key agreement protocol in wireless body area networks - anna-valeria-guglielm / GARR
Click here to expand...Wireless body area networks (WBANs) are becoming increasingly popular as they allow individuals to continuously monitor their vitals and physiological parameters remotely from the hospital. With the spread of the SARS-CoV-2 pandemic, the availability of portable pulse-oximeters and wearable heart rate detectors has boomed in the market. At the same time, in recent years we assisted to an unprecedented increase of healthcare breaches, revealing the extreme vulnerability of the current generation of WBANs. Therefore, the development of new security protocols to ensure data protection, authentication, integrity and privacy within WBANs are highly needed. In this context, we target a WBAN collecting ECG signals from different locations on the individual’s body, and we propose a new information theoretic key agreement protocol that exploits the inherent randomness of ECG signals to ensure authentication between the nodes within the WBAN.
FTP20
What if we don’t have to type anymore? Luis Sampaio, FCT/FCCN
Click here to expand...This presentation outlines a new approach on human-machine interaction that is inclusive to people with hand/arm movement impediments and vocal impairments through the use of an electroencephalography headset and electromyography surface electrodes respectively, all on a decentralized application that is developed to guarantee privacy on communication between users.
Internet of Things - Alvise Baggio, GARR
Click here to expand...FaaSt (Forecast as a Service) is a project created on occasion of the hackathon organized by GARR (Hack The Cloud) on November 2019 whose main theme was environmental sustainability. The idea behind Faast is to use cloud communication infrastructure to improve the electric grid and provide end-users with real-time information on the sources of energy used in the grid and to opt for the renewable options.
Post–quantum secure cryptographic schemes - Panayiota Smyrli, CYNET
Click here to expand...Recent advancements in quantum computing have brought about fundamental challenges to cryptography. The security of many classical cryptographic schemes, such as the digital signature algorithm (DSA), the Diffie-Hellman (DH) key exchange protocol, and their elliptic curve variants, relies on the hardness of the well-known discrete logarithm problem over cyclic groups in elliptic curves over finite fields.
Computer Discovery of Novel Drugs, Hanna Karpenka, BASNET
Click here to expand...Computer molecular modeling techniques play an important role in research into the development of new drugs. The use of neural networks for these methods in the rational design of potential drugs can minimize the time and cost of searching for various targets and potential drugs! Such a computer model can, with high probability, predict the vulnerability in the structure of the infectious agent and indicate which chemical compound should be synthesized.
Challenges and Opportunities of Crowdfunding in Ireland - Kelly Wang, HEAnet
Click here to expand...Digital connectivity is transforming all aspects of our lives. Today information, ideas and financial flows are exchanged rapidly online and worldwide. A case in point is Crowdfunding. Enabling investors and entrepreneurs to connect worldwide online, to access much needed finance, this new model has emerged as a powerful disruptive force, reshaping traditional funding models and undermining traditional market dynamics.
Information-Centric Networking (ICN) - Paul Duggan, HEAnet
Click here to expand...Information-Centric Networking (ICN) is an alternative approach to the Internet networking architecture. The main idea behind this approach is that information is identified by name, rather than by IP address. Due to this capability, this information can be cached on some or all hops on the delivery path between a source and an end-user, depending on a caching policy. For example, if an end-user requests a video, a copy of this video may be cached at every hop along the path between the source and end-user. When an adjacent user requests the same video, the request may be serviced from a node closer to the user instead of from the source. This can lead to significant savings in quality, costs and latency
FTP19
Click here to expand...Democratizing Smart Farming with AI on LoRa Sensor Networks – Luca Coviello, Fondazione Bruno Kessler, Italy (GARR)
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 54:28 Luca
Building Community Machine Learning Tool for Agriculture and Forest Species Identification – António Ferreira, University of Trás-os-Montes e Alto Douro (UTAD), Portugal (FCT/FCCN).]
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 54:28 Antonio
Sport-Related Sudden Cardiac Death: A New In- Cloud System for Athletes Prevention – Agnese Sbrollini, Università Politecnica delle Marche, Italy (GARR).
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 49:40 Agnese
Content-Interaction-Powered Distance Learning – Contact, pointing, immersion and feeling of presence – Enrico Pietrocola, Conservatorio G.Verdi, Milano, Italy (GARR).
https://tnc19.geant.org/video-archive/#s39
6A Lightning Talks: Second Strike
Minute: 35:20 Enrico
Project Fox, a Quest for a Statically Typed Embeddable Programming Language – Pierre van Houtryve, HEPH Condorcet, Mons, Belgium (BELNET).
https://tnc19.geant.org/video-archive/#s39
6A Lightning Talks: Second Strike
25:34 Pierre
FOG Computing as a Lifeline for E Health Users – Era Ajdaraga Krluku, Ss. Cyril and Methodius University, Macedonia (MARNET)
https://tnc19.geant.org/video-archive/#s39
Minute: 29:45 Era
FTP18
Hey network, what's going on? -- Virtual assistants for networks - Rüdiger Birkner, ETH Zurich/ SWITCH, Switzerland
https://tnc18.geant.org/web/media/archive/2A
Minute: 48:45 Rudiger
Back to the future: let’s bring schools to XXI century! - Ilaria Bortolotti, Università di Roma La Sapienza/GARR, Italy
https://tnc18.geant.org/web/media/archive/2A
Minute: 37:45 Llaria
Efficiency is the way to go: get to know Enki - José Pedro Guerra Brito, UTAD, Universidade de Tás os Montes e Alto Douro / FCT/FCCN, Portugal
ttps://tnc18.geant.org/web/media/archive/2A
Minute: 43:29 José
Empowering student involvement in campus network deployment - Antonio Angel Cruzado Castillo, University of Málaga / RedIRIS, Spain
https://tnc18.geant.org/web/media/archive/6AMinute: 32:25 Antonio
mySense - AI and Big Data for agroforestry applications Jorge Mendes, UTAD, Universidade de Trás os Montes e Alto Douro / FCT/FCCN, Portugal
https://tnc18.geant.org/web/media/archive/6A
Minute: 27.09 Jorge
V-Labs: autonomous provisioning of virtual environments using PaaS approach Simone Feretti, INFN Sezione di Roma Tor Vergata / GARR, Italy
Poster Presentation
SCOReS: A dynamic cache system for e-Science applications Davide Michelino, Università di Napoli Federico II - INFN Sezione di Napoli/ GARR, Italy
Poster Presentation
Network installation upgrade, done with students? Melchor Alejo Garau Madrigal, University of Málaga / RedIRIS, Spain
Poster Presentation
Privacy-Friendly Threat Detection Using DNS Gijs Rijnders, Eindhoven University of Technology / SURFnet, Netherlands
Poster Presentation
FTP17
Beyond Touch, Swipe and Tap for Smart Clothing! Retro brings Nostalgia Adwait Sharma, University of Applied Sciences Upper Austria, Hagenberg/ACONET, Austria Security risks and ethical
https://tnc17.geant.org/web/media/archive/2A
Minute: 23:40 Adwait
implications of sensitive data on the Internet of Things Ernesta Grigaityte, The University of Central Lancashire, Cyprus (UCLan Cyprus)/CYNET, Cyprus
https://tnc17.geant.org/web/media/archive/2A
Minute: 38.49 Ernesta
“SmartWindow”- Pablo Picasso meets Graham Bell Rafay Iqbal Ansari, Frederick University/CYNET, Cyprus Distributed
https://tnc17.geant.org/web/media/archive/2A
Minute: 17:58 Rafay
learning based on free open educational resources Tiago José Castro, ESMAD - Politecnico Porto/FCT/FCCN, Portugal
https://tnc17.geant.org/web/media/archive/2A
Minute 50:24 Tiago
Switches - routers in disguise. Software router acceleration using OpenFlow hardware Norbertas Kremeris, Kaunas University of Technology/LITNET, Lithuania
https://tnc17.geant.org/web/media/archive/6A
Minute 1.00:26 Norbertas
Using Raspberry Pis for cheap Wi-Fi monitoring Fredrik Strupe, Norwegian University of Science and Technology/UNINETT, Norway
https://tnc17.geant.org/web/media/archive/6A
Minute: 55:30 Fredrik
Schedule
28 February 2023 12:00PM CET |
10 March 2023 |
Mid-March 2023 |
End of March - May 2023 |
5-9 June 2023 |
FAQ (NRENs)
Any early career candidate nominated by a GÉANT Project NREN partner studying at a university or college in a GÉANT partner country, or working at a GÉANT NREN.
Depending on the number of candidates in the programme, a maximum of 3 candidates per NREN.
Ideal candidates: (under) graduate, master and PhD students (possibly interns at the NREN), who want to commit time and energy to learn and develop beyond the basic university programme.
The subject matter of each presentation could be any idea, project or research or innovation the candidates have been working on which addresses a technical, economic, legal, security or environmental aspect in any IT and networks field. (see former topics below)
We expect NRENs to select and nominate a maximum of 3 candidates. All nominated candidates who comply with the programme requirements (see Requirements) will be admitted to the Future Talent Programme. The acceptance of the participant's proposal for the Lightning Talk programme at TNC will be the exclusive decision of the TNC Programme Committee without any interference of the Future Talent Programme. The Future Talent candidate competes with all the other proposals submitted for the conference. Winning proposals are selected based on originality and clarity.
A complete application includes the online registration at https://events.geant.org/event/1375/ including the mentor's contact details, the candidate’s contact details, university and a short description of the topic the candidate wants to submit as a Lightning Talk. The application must be submitted by 10 March 2023
Your role as a mentor is to engage with your candidate on a regular basis during the programme, provide encouragement and advice throughout the programme and attend related events. If your candidate is selected to present at TNC, we encourage you to support him or her during the conference. All candidates' costs are funded by the programme and can be reclaimed from ???GN4.3-WP1-T5 ???following the normal GÉANT project claimant rules and procedures.
The programme runs from March to June, and includes 3 workshops for all participants. Depending on the number of participants the workshops will be organised in groups of max 5 and will run in March and April. TNC 'finalists' can expect further coaching from a professional trainer coach prior to the conference.
Have a different question?
Email: glad@geant.org
THE ALGORITHMIC DESIGN SKETCHBOOK - Renata Castelo-Branco | INESC-ID/Instituto Superior Técnico, University of Lisbon. Supported by FCT|FCCN
When you picture an architect at work, how do you see them? Holding a pencil over a drawing board, maybe? How about the architects that designed the Morpheus Hotel in Macau; the Gherkin in London, or the Louvre in Abu Dhabi? Still imagining pencils?
Architecture, like many other art forms, frequently mirrors the technological advancements of its time, and these are just some examples of the multitude of projects that have been reflecting the increasing integration of computer science in the architectural domain. Today, architects have at their disposal tools that allow them to design, and manage, large-scale and non-conventional design solutions that would have been nearly impossible to conceive using traditional design methods. However, designing with algorithms requires programming, a concept with which practitioners often struggle. For architecture to benefit from computation at large, we still need to close the existing comprehension gap between algorithmic design programs and their behaviour, making this representation method more akin to the traditional architectural practice. The Algorithmic Design Sketchbook proposal addresses this problem by coupling algorithmic design with complementary representation methods that are adequate for designing complex architectural projects, and supporting their synchronisation with a design tool that architects feel comfortable using.
IT'S PEOPLE - OR WHY WE NEED AN INTERDISCIPLINARY APPROACH TO CYBERSECURITY - Fabio Greiner | University of Zurich. Supported by SWITCH
In recent years we have come to realise that cyber security not only requires technical measures, but also cooperation on the part of the users in order to make organisations more resilient against cyber-attacks. Changing user behaviour requires more than just one-time training, it demands a different skill set to what most experts in cyber security have. That's why the field is undergoing a transformation through inviting professionals from other disciplines to support security measures.
In my master’s thesis I studied the collaboration of security awareness specialists with internal communications. The results from the interviews provided insight into how practiced interdisciplinarity can support security professionals in their daily work, and thus make organisations more secure.
WHY YOUR INTERNET IS BAD! - Félix Gaudin | UC Louvain. Supported by Belnet
During the Covid crisis I followed my course using Microsoft Teams. In many cases the video/audio quality was really bad, and yet none of the speed tests I ran showed any abnormality. What happened? At that time, speed test websites only measured throughput. Latency is measured as well, but as idle latency (without load on it). However, when you attend a class/meeting there are always other apps/people using your network.
We need a way to measure working latency. The IETF has started to develop a new measurement technique called RPM to measure latency under working conditions. Our goal is to implement it in a browser so that every user will know why their connection is poor. Moreover, all current tests work with TCP connections. With TCP it is possible to send a large amount of data, but it's very hard to accurately measure latency or packet losses. Meanwhile, many cloud providers are moving towards HTTP/3 with the QUIC protocol. Therefore, we are developing our measurement tool with QUIC.
APK FALCON: EMPOWERING USER’S PRIVACY - Javier Crespo Guerrero | Universidad de Valladolid. Supported by REDIRIS
APK Falcon is a tool to assist users in assessing the impact of mobile apps on privacy, to improve knowledge and empower decision making in accordance with the values of the EU Next Generation Internet. APK Falcon will help users understand the permission system, leading to improved management - such as revoking highly intrusive permissions or being more cautious when asked to grant permission. This tool will be made in a user-centric way, so the impact on privacy can be understood by everyone.
Users will be able to access a web service where they can search for the name of an application and obtain a privacy score, as well as information to understand this score. APK Falcon can assist users in making more informed decisions about granting permissions and managing their privacy. By shedding light on the permission system, APK Falcon can empower users to take control of their privacy in a simple, open and transparent fashion.
POWERING THE FUTURE: THE VALUE OF RENEWABLE ENERGY COMMUNITIES IN A DECARBONIZED WORLD - João Daniel Correia Brandão | Universidade do Porto - Faculdade de Engenharia. Supported by FCT|FCCN
The transition to renewable energy is critical to mitigate the effects of climate change and achieve a sustainable future. One promising approach to advance this transition is through the development of Renewable Energy Communities (RECs). These communities are formed by groups of people or organisations that come together to produce, consume and share renewable energy locally. They are designed to promote local ownership, collaboration and innovation in the deployment of renewable energy technologies.
To fully realise the potential of these communities, assessing their value and impact is essential. This assessment will provide insights into the benefits and challenges associated with RECs, and help identify best practices for their development and implementation. It will also evaluate the economic benefits of these communities, including the potential for job creation, increased economic activity and cost savings for participants.
BREAKING DOWN AI TO GET EXPLANATIONS - Karel Hynek | FIT CTU- Czech Technical University, Prague. Supported by CESNET.
Research shows that Artificial Intelligence (AI) can be an effective tool for automated cyber threat hunting. However, the lack of explainability still prevents its mass deployment into commercial-grade tools. Due to AI complexity it's hard to get reasons behind its output, which are crucial for cyber security incident handling and response. We thus bring new design principles of AI by dividing complex monolithic models into small components with defined functionality. By observing the outputs and interaction of these components, we can get an insight into their internal behaviour and provide explanations and reasoning behind their output. The lack of explainability originates from AI's enormous complexity, which people cannot comprehend. We thus divide the complex AI into a component-based system, each component designed separately, like in the human brain. In the brain, there are parts responsible for vision and other parts for hearing for example. We know which part is responsible for what, dramatically increasing our understanding of such a complex system.
Component-based models are solutions for AI model deployment in cyber security and other high-stakes areas where explanations are necessary. The division into components provides better control over the predictions and explains them. The improved explainability also reduces the chance of design errors, can improve model quality control and increases the overall trust of its users. Moreover, we can use reasoning to filter out obvious mistakes and increase AI reliability.
DATA FUSION: THE KEY TO RELIABLE THREAT DETECTION - Richard Plný | Czech Technical University, Prague. Supported by CESNET.
Secure computer networks rely on monitoring, threat detection and security operators who respond to automatically created alerts. Performance of current anomaly and threat detection methods is dependent on the network telemetry data they are developed on. However, in some cases network telemetry does not contain truthful information. An error can occur during transmission, or an attacker can spoof information to confuse threat detectors. As a result, many attacks may remain undetected and false alerts might overwhelm security personnel. We are currently exploring an approach that utilises a combination of several data sources to overcome imperfections.
Many state-of-the-art detectors are based on Machine Learning (ML) technology, which can be easily confused. Attackers can alter traffic shape by sending additional data which is unnecessary for communication. Malicious traffic can be completely hidden by this technique and missed by the ML - an outgoing attack might not be detected at all. Data incompleteness is another problem. For example, no blocklist can ever contain every malicious IP address. Moreover, these IP addresses can change over time. Therefore the output of some detectors might not reflect reality. Current techniques, when used separately, are suffering from many pitfalls.
JETSTREAM 2.0: A MULTI-FPGA PCIE INFRASTRUCTURE SUPPORTING FPGA-TO-FPGA LINKS - Vladislav Válek | Brno University of Technology. Supported by CESNET
In recent years there has been a major development in the field of cluster computing. These solutions often require many dedicated resources to communicate with each other, and bind their abilities in a collaborative manner. There is also a requirement to allow multiple users to use a single cluster without affecting each others' computations. Nowadays, the FPGAs provide an excellent scalability and programmability for this purpose, with the advantage of parallelism and achieved throughput.
This talk introduces the design of a generalised streaming library for the PCI Express interface called JetStream 2.0. It is an enhancement of the previous generation, able to run at the data rates of PCI Express Gen3 x16, that means reaching the transfer speeds of up to 100Gbps. The architecture also supports sending data between two FPGA cards using a zero-copy mechanism - which bypasses the classical buffering of data in RAM and sends them directly to the addressed device. This solution is proposed as vendor independent, thus FPGA cards both from Intel and AMD/Xilinx can be used and also mixed on the host.
AI PREMIE - A risk stratification tool for preeclampsia - Ana Le Chevillier | University College Dublin. Supported by HEAnet.
Artificial Intelligence for rheumatic heart disease detection - Belen Fernandez de Toro Espejel | Universidad Nacional de Educación a Distancia. Supported by RedIRIS.
COMBATTING ISOLATION IN RESEARCH, USING AN ONLINE COMMUNITY - Jenna Barry | Technical University of the Shannon. Supported HEAnet.
A Community of Practice (CoP) is a group of people who share a concern or a passion for something they do, learning how to do it better as they interact regularly. vCoP is an online CoP connected through technology and, in this instance, on an Enterprise Social Network (ESN). An ESN is a social network used in enterprise settings to bring together people who share the same interests - using the platform to engage and improve knowledge collectively. It is regarded as Enterprise 2.0. Coming together as a community and working as a unit may help encourage and strengthen the knowledge economy - decreasing isolation and increasing connection, communication and collaboration.
WHAT CAN WE DO TO PROMOTE BUILT HERITAGE? - Margherita Soldaini | Università degli Studi di Firenze Dip.to di Architettura. Supported by GARR.
Research has highlighted that although learning about cultural heritage still relies on text and pictures, physical objects are more effective, extending beyond conceptual experiences. Virtual representations of 3D objects cannot often support the attributes of physicality that may be valuable, for instance, in the reconstruction processes of a monument.
Margherita's research proposes the creation of accessible digital archives and their dissemination and valorisation. The main case study will examine the Church of St. Augustine and the Oratory of Blessed Becchetti in Fabriano, Italy, abandoned after an earthquake in 2016. The church has undergone numerous restorations, but historical evidence allows insight in to its original forms. The digital archive will give easy access to the models of the reconstructive hypotheses, using innovations in research and development in the practice of cultural heritage to ensure high-resolution images, metadata and 3D models. These tools enable us to learn more about abandoned places through the dissemination of content and information, promoting the preservation of the architectural and artistic heritage.
Models will be available for download, editing, and 3D printing for interdisciplinary uses, dedicated to visually impaired people, useful for the process of study and comprehensive tactile perception for students, curious people and scholars.
CRYPTOGRAPHY FOR CLOUD SECURITY - Martina Palmucci | Università degli Studi di Perugia. Supported by GARR.
Nowadays, the amount of data stored on digital devices is huge and this trend is rising. Because of data protection regulation, and to deter attacks, sensitive data must be protected proactively.
Furthermore, recent legislation, among which the General Data Protection Regulation (EU GDPR) and the Consumer Data Right (CDR), has started to mandate technical measures for data protection. In particular, the principle of “data minimisation” states that a data controller should limit the collection of personal information to what is directly relevant and necessary to accomplish a specified purpose. The principle of minimisation can be implemented by limiting access to certain categories of data according to the experts that have to use the data.
This research project identified a technological gap related to the data minimisation principle. Although the GDPR legislation provides guidelines, it does not explicitly specify the required techno- logical tools to implement them. The project aims to fill that gap by developing a cryptographic scheme as a service integrated within a cloud system.
An encrypted database offers intrinsic data security. Data is transformed into ciphertext (unreadable text) using a cryptographic procedure. Even when an attack on the database would be successful, the encryption techniques prevent hackers to analyze or decrypt your data to use it to their ad- vantage. Specifically, the cryptographic technique that is chosen is Attribute-Based Encryption (ABE). ABE encrypts a resource against attributes instead of concrete users. Only users that possess a correct combination of attributes will be able to decrypt the resource. ABE eases the implementation of access control rules to comply with the GDPR principles.
Finally, the last part of the project consists of implementing the cryptographic scheme as a cloud service. Because the cloud is one of the most popular methods for storing data among large communities, we want to integrate the ABE system with cloud storage and other potential cloud services. The envisioned system will integrate the existing Role-Based Access Control (RBAC) system of a cloud system with ABE, allowing data to be encrypted using pre-existing privileges.
Archived FTP Lightning Talks
FTP22
Why we need a collaborative DDoS protection architecture in Europe - Marion Dübendorfer (SWITCH)
Distributed Denial of Service (DDoS) attacks have the potential to disrupt access to critical infrastructure for population groups across the world – yet their mitigation capabilities lie largely in the hands of private tech companies based in the US. This lightning talk explores the opportunities and benefits of an open, federated DDoS protection architecture in Europe.
https://youtu.be/nqRtm2jZbww?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Fake News Detection Models — Introducing GAN Generated Synthetic Samples to Improve Performance - Bruno Gonçalves Vaz (Universidade do Porto) FCT/FCCN
News datasets are extremely imbalanced, with the fake news not being as well represented as the real news. Thus, machine learning models for fake news detection do not perform as good as expected. Hence, Generative Adversarial Networks can be used to produce high-quality synthetic samples to better represent the fake news data, improving the models’ performances.
https://youtu.be/2748eoymHqY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
AI for Heritage ─ SOS digital collections: classifying and characterizing - Ana Carneiro (School of Arts | Universidade Católica Portuguesa - Porto) FCT/FCCN
A presentation that focuses on finding solutions that use AI to catalogue and categorize archival collections. Firstly, the difficulties that archivists have in the transition to digital followed by the various problems when one tries to implement AI. Finally, the necessary steps to carry out a project in partnership with a heritage space and a potential workflow.
https://youtu.be/IkNUbj4nvpE?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Traffic analysis of communication and collaboration apps bloomed with Covid-19 via advanced Deep Learning approaches - Idio Guarino (University of Naples Federico II) GARR
The COVID-19 pandemic and the resulting increase in interactions via digital tools has deeply changed network traffic. To manage these changes, network operators need advanced tools for classification and the prediction of internet traffic. To face these tasks, the idea is to design advanced deep-learning based techniques with a special focus on traffic generated by social communication and collaboration apps.
https://youtu.be/hWXjB23EYs8?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Roman Emperors and Facial Recognition - Karel van Klink (GÉANT)
Facial recognition and Roman emperors: a unique application that will allow for the preservation of culture for generations to come.
https://youtu.be/Qujjm5upGKU?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Self-Sovereign Identity (SSI) for Future-Proof Digital Wallets - Frederic Gerber (SWITCH)
When the Internet was introduced at the end of the last century, it was not clear what use it would have. Today, we are at a similar crossroads with SSI, which consists of a set of principles for digital identities that users directly control. While it is not certain that SSI will change our society as groundbreakingly as the Internet did, it seems to be establishing itself as a paradigm that will endure for some time. From the user's perspective, it is important to understand the power of digital wallets, which is why this presentation will go through the main principles of SSI and convince everyone that a digital wallet is just as vulnerable as a physical one.
https://youtu.be/Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Multi-factor authentication support between eduGAIN federations - Hilco de Lathouder (SURF)
Lightning Talk proposal featuring the results of a 1 month research project conducted as part of the University of Amsterdam's Security and Network engineering Master Program. The results are a start for improving support for (standardized) multi-factor authentication methods between eduGAIN federations.
https://youtu.be/Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Guessing PINs, One Partial PIN at a Time - Ashley Sheil (Maynooth University)HEANET
We created different methods of guessing a person's PIN, by attempting to guess their partial PIN incrementally in an in-the-wild scenario. We look at the different patterns that result, as well as lengths of guessing time. We wanted to see how secure, in comparison, a full PIN is compared to using partial PINs as means of authentication.
https://youtu.be/sjuFlIzDxLI?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Challenges in processing and knowledge discovery in specifications of scientific resources - Witold Taisner (Poznan Supercomputing and Networking Center)PSNC
The talk will focus on major challenges present in both processing and further utilization of the data, such as specifications of certain scientific resources: articles, computational resources or datasets. Our goal is to create a recommender system for the aforementioned data
utilizing linguistic and natural language processing techniques, with a special focus on deep learning.
https://youtu.be/6wdwCE1eMPk?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Artificial Intelligence for the early diagnosis of cardiac comorbidities associated to COVID-19 - Chiara Leoni (GARR)
COVID-19 is an infectious disease, caused by SARS-CoV-2, that mainly affects the respiratory system. Unfortunately, it can also have serious impact on cardiovascular system, triggering the occurrence of cardiac diseases that must be timely identified. Thus, this project aims to contribute to the diagnosis of cardiac comorbidities associated to COVID-19, with the development of an artificial intelligence (AI)-based tool.
https://youtu.be/Czxr-sV5oQY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Embedding a culture of internationalisation into the curriculum through "Internationalisation at Home"- Preparation for the changing context of Higher Education in Ireland - Nidhi Piplani Kapur, Waterford Institute of Technology, HEANET
My proposed research seeks to address the ‘gap’ in the Irish National Strategy for Internationalisation, by delving deep in how ‘Internationalisation of Curriculum (IoC)’ can provide internationalisation experiences to the 98% of students in Ireland who currently do not travel abroad. My research will investigate ways to provide an international experience ‘at home’ to all students, mainly using technology-based interventions. It will seek to inform a strategy that will drive the development and embedding of a culture of ‘Internationalisation at Home (IaH)’ in the curriculum. This will bridge skill deficits in Irish graduates and build multicultural competencies required by industry.
FTP21
A testbed to bridge the cybersecurity skills gap in industrial control systems - conrad-ekisa/HEANET
ICS cybersecurity is of increasing concern and this is evidenced by the mounting reports of cyber threats and attacks on ICS infrastructure that are referenced both within the technical community and the public media.
Telomerase – eternal life or a panacea for all cancers ?! - hanna-karpenko/BASNET
Telomerase is considered the key to cellular immortality, the “fountain of youth.” This enzyme allows cells to multiply rapidly without aging. At the same time, telomerase allows cancer cells to divide indefinitely, which is the reason for the formation of tumors. Scientists from all over the world have been trying to solve this problem for a very long time. But today there is no exact model of the structure of human telomerase, due to the complexity of the structure and the high cost of this study. Computer modeling methods make it possible to quickly and cost-effectively reconstruct the spatial structure of human telomerase by homology based on the structural data of related templates. The work is done with the help of the State Supercomputer Multi-access Center of the UIIP NASB and the NREN BASNET network infrastructure. Computer methods of molecular dynamics optimize the model and make it accurate enough for rational design drugs and will help to understand that telomerase is eternal life or a panacea for oncology.
A Hierarchical Learning Approach to Enable Network Slicing in Future Telecommunication Systems federico-mason/GARR
In this work, we designed a hierarchical learning architecture, where multiple agents cooperate to orchestrate network slices under different working conditions. Our hierarchical architecture will support PSC in a much more efficient way than conventional approaches, allowing the current telecommunication networks to assist emergency operators (e.g., firefighters, policemen, healthcare professionals) without the need for a dedicated infrastructure.
Indoor Localization Service based on Beacons: A System to Save Your Life! - sara-raggiunto/GARR
Navigation systems help users find their way around the world. But what if we wanted to reach the exact platform of our departing train and it’s a matter of minutes? Or what if in the earthquake/fire event we wanted the shortest path to the escape route? The skill is to move from a problem to an extremely innovative solution. Indoor localization allows users to access unknown environments. The main challenges of the proposed system are the safety, the access control, and the activity monitoring. In fact, knowing instantly the exact position of the people to be assisted is extremely important in an indoor environment.
Biometrics-based scheme for public key agreement protocol in wireless body area networks - anna-valeria-guglielm / GARR
Wireless body area networks (WBANs) are becoming increasingly popular as they allow individuals to continuously monitor their vitals and physiological parameters remotely from the hospital. With the spread of the SARS-CoV-2 pandemic, the availability of portable pulse-oximeters and wearable heart rate detectors has boomed in the market. At the same time, in recent years we assisted to an unprecedented increase of healthcare breaches, revealing the extreme vulnerability of the current generation of WBANs. Therefore, the development of new security protocols to ensure data protection, authentication, integrity and privacy within WBANs are highly needed. In this context, we target a WBAN collecting ECG signals from different locations on the individual’s body, and we propose a new information theoretic key agreement protocol that exploits the inherent randomness of ECG signals to ensure authentication between the nodes within the WBAN.
FTP20
What if we don’t have to type anymore? Luis Sampaio, FCT/FCCN
This presentation outlines a new approach on human-machine interaction that is inclusive to people with hand/arm movement impediments and vocal impairments through the use of an electroencephalography headset and electromyography surface electrodes respectively, all on a decentralized application that is developed to guarantee privacy on communication between users.
Internet of Things - Alvise Baggio, GARR
FaaSt (Forecast as a Service) is a project created on occasion of the hackathon organized by GARR (Hack The Cloud) on November 2019 whose main theme was environmental sustainability. The idea behind Faast is to use cloud communication infrastructure to improve the electric grid and provide end-users with real-time information on the sources of energy used in the grid and to opt for the renewable options.
Post–quantum secure cryptographic schemes - Panayiota Smyrli, CYNET
Recent advancements in quantum computing have brought about fundamental challenges to cryptography. The security of many classical cryptographic schemes, such as the digital signature algorithm (DSA), the Diffie-Hellman (DH) key exchange protocol, and their elliptic curve variants, relies on the hardness of the well-known discrete logarithm problem over cyclic groups in elliptic curves over finite fields.
Computer Discovery of Novel Drugs, Hanna Karpenka, BASNET
Computer molecular modeling techniques play an important role in research into the development of new drugs. The use of neural networks for these methods in the rational design of potential drugs can minimize the time and cost of searching for various targets and potential drugs! Such a computer model can, with high probability, predict the vulnerability in the structure of the infectious agent and indicate which chemical compound should be synthesized.
Challenges and Opportunities of Crowdfunding in Ireland - Kelly Wang, HEAnet
Digital connectivity is transforming all aspects of our lives. Today information, ideas and financial flows are exchanged rapidly online and worldwide. A case in point is Crowdfunding. Enabling investors and entrepreneurs to connect worldwide online, to access much needed finance, this new model has emerged as a powerful disruptive force, reshaping traditional funding models and undermining traditional market dynamics.
Information-Centric Networking (ICN) - Paul Duggan, HEAnet
Information-Centric Networking (ICN) is an alternative approach to the Internet networking architecture. The main idea behind this approach is that information is identified by name, rather than by IP address. Due to this capability, this information can be cached on some or all hops on the delivery path between a source and an end-user, depending on a caching policy. For example, if an end-user requests a video, a copy of this video may be cached at every hop along the path between the source and end-user. When an adjacent user requests the same video, the request may be serviced from a node closer to the user instead of from the source. This can lead to significant savings in quality, costs and latency
FTP19
Democratizing Smart Farming with AI on LoRa Sensor Networks – Luca Coviello, Fondazione Bruno Kessler, Italy (GARR)
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 54:28 Luca
Building Community Machine Learning Tool for Agriculture and Forest Species Identification – António Ferreira, University of Trás-os-Montes e Alto Douro (UTAD), Portugal (FCT/FCCN).]
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 54:28 Antonio
Sport-Related Sudden Cardiac Death: A New In- Cloud System for Athletes Prevention – Agnese Sbrollini, Università Politecnica delle Marche, Italy (GARR).
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 49:40 Agnese
Content-Interaction-Powered Distance Learning – Contact, pointing, immersion and feeling of presence – Enrico Pietrocola, Conservatorio G.Verdi, Milano, Italy (GARR).
https://tnc19.geant.org/video-archive/#s39
6A Lightning Talks: Second Strike
Minute: 35:20 Enrico
Project Fox, a Quest for a Statically Typed Embeddable Programming Language – Pierre van Houtryve, HEPH Condorcet, Mons, Belgium (BELNET).
https://tnc19.geant.org/video-archive/#s39
6A Lightning Talks: Second Strike
25:34 Pierre
FOG Computing as a Lifeline for E Health Users – Era Ajdaraga Krluku, Ss. Cyril and Methodius University, Macedonia (MARNET)
https://tnc19.geant.org/video-archive/#s39
Minute: 29:45 Era
FTP18
Hey network, what's going on? -- Virtual assistants for networks - Rüdiger Birkner, ETH Zurich/ SWITCH, Switzerland
https://tnc18.geant.org/web/media/archive/2A
Minute: 48:45 Rudiger
Back to the future: let’s bring schools to XXI century! - Ilaria Bortolotti, Università di Roma La Sapienza/GARR, Italy
https://tnc18.geant.org/web/media/archive/2A
Minute: 37:45 Llaria
Efficiency is the way to go: get to know Enki - José Pedro Guerra Brito, UTAD, Universidade de Tás os Montes e Alto Douro / FCT/FCCN, Portugal
ttps://tnc18.geant.org/web/media/archive/2A
Minute: 43:29 José
Empowering student involvement in campus network deployment - Antonio Angel Cruzado Castillo, University of Málaga / RedIRIS, Spain
https://tnc18.geant.org/web/media/archive/6AMinute: 32:25 Antonio
mySense - AI and Big Data for agroforestry applications Jorge Mendes, UTAD, Universidade de Trás os Montes e Alto Douro / FCT/FCCN, Portugal
https://tnc18.geant.org/web/media/archive/6A
Minute: 27.09 Jorge
V-Labs: autonomous provisioning of virtual environments using PaaS approach Simone Feretti, INFN Sezione di Roma Tor Vergata / GARR, Italy
Poster Presentation
SCOReS: A dynamic cache system for e-Science applications Davide Michelino, Università di Napoli Federico II - INFN Sezione di Napoli/ GARR, Italy
Poster Presentation
Network installation upgrade, done with students? Melchor Alejo Garau Madrigal, University of Málaga / RedIRIS, Spain
Poster Presentation
Privacy-Friendly Threat Detection Using DNS Gijs Rijnders, Eindhoven University of Technology / SURFnet, Netherlands
Poster Presentation
FTP17
Beyond Touch, Swipe and Tap for Smart Clothing! Retro brings Nostalgia Adwait Sharma, University of Applied Sciences Upper Austria, Hagenberg/ACONET, Austria Security risks and ethical
https://tnc17.geant.org/web/media/archive/2A
Minute: 23:40 Adwait
implications of sensitive data on the Internet of Things Ernesta Grigaityte, The University of Central Lancashire, Cyprus (UCLan Cyprus)/CYNET, Cyprus
https://tnc17.geant.org/web/media/archive/2A
Minute: 38.49 Ernesta
“SmartWindow”- Pablo Picasso meets Graham Bell Rafay Iqbal Ansari, Frederick University/CYNET, Cyprus Distributed
https://tnc17.geant.org/web/media/archive/2A
Minute: 17:58 Rafay
learning based on free open educational resources Tiago José Castro, ESMAD - Politecnico Porto/FCT/FCCN, Portugal
https://tnc17.geant.org/web/media/archive/2A
Minute 50:24 Tiago
Switches - routers in disguise. Software router acceleration using OpenFlow hardware Norbertas Kremeris, Kaunas University of Technology/LITNET, Lithuania
https://tnc17.geant.org/web/media/archive/6A
Minute 1.00:26 Norbertas
Using Raspberry Pis for cheap Wi-Fi monitoring Fredrik Strupe, Norwegian University of Science and Technology/UNINETT, Norway
https://tnc17.geant.org/web/media/archive/6A
Minute: 55:30 Fredrik
- No labels