- Created by Lisa Melrose, last modified on Dec 04, 2023
You are viewing an old version of this page. View the current version.
Compare with Current View Page History
« Previous Version 3 Current »
Focus: Presentation skills, public speaking skills
The Future Talent Programme's Lightning Talk Challenge (FTP24) offers students and young professionals a fantastic opportunity to present their project or idea to an international audience at GÉANT's annual TNC conference. Nominated by GÉANT project partners, participants will receive professional training to help them master presentation skills and deliver an impactful presentation.
FTP24 challenges participants to present their research or idea as a 5-minute "Lightning Talk" at the TNC Conference which will be held from 10 - 14 June 2024 in Rennes, France. Participants whose proposals are selected by the TNC Programme Committee ('FTP finalists') will be invited to participate in the TNC conference and their travel fees paid*.
* Participation in the TNC Lightning Talk Programme will be in accordance with TNC's rules and formats.
What's included
Students and young professionals will learn how to pitch their proposals and deliver a powerful presentation. The virtual workshops offer a safe environment where participants can learn and practise together, and are an excellent opportunity to build a network of peers. In addition, all participants are invited to showcase the end result of their learning in a self-recorded video which may be published through GÉANT media channels.
- Practical and interactive workshops under the guidance of a professional public speaking coach for all participants
- Video presentation support
- 1:1 coaching for the selected 'FTP finalists'
- *Travel fees + full conference pass for finalists (see the above statement*) The hosting NREN is asked to pre-pay the flights for the students and claim the cost back from GN5 - WP5-T1 through its regular monthly cost claims.
Requirements
- This challenge is open to i) students who are registered on any IT & networking-related course at a university or learning provider and ii) young professionals working in IT & networking-related areas.
- All participants must be nominated by a GÉANT member NREN. If in doubt, applicants should select the NREN in the country where they study or work from this list of GEANT members. Unfortunately, the Programme is not currently available to Partner Members.
- The lightning talk idea must be associated with computer networking or other technology-related areas.
- Lightning talk proposals must be submitted by 10th March 2024. They must include: title, participant name, educational institution, short biography, five keywords, and a short introduction of the idea (max. 500 words). The abstract must be marked [Topic title + FTP]
- Participants commit themselves to attend the full training programme (3 virtual workshops in April - May 2024)
- Selected finalists commit to present their proposal at TNC 2024
- Excellent command of the English language, both spoken and written
What is required of the NREN?
If you are an NREN, this programme gives you great exposure in the R&E community and may help to strengthen relations with your institutional partners and users. To participate the NREN must:
- Be a member of the GÉANT GN5.1 Project
- Be willing to recruit, select and administer the registration of up to 3 candidates
- Offer students a local contact (mentor) to support, encourage or promote participants locally
What is the role of GLAD?
GLAD is committed to:
- Providing training workshops designed to improve participants' public speaking skills.
- Liaising with NRENs and their candidate(s).
- Paying FTP finalist's travel and conference fees for attendance at the TNC conference.
How to Apply (NRENs)
Step 1 Register your candidate online with a brief description of the candidate's topic.
Step 2 All accepted candidates will become participants of the Future Talent Programme and will receive the training. Your participant takes part in the virtual training workshops from April - May 2024. Dates and Programme will be confirmed.
Step 3 Participants submit their Lightning Talk proposal to TNC Programme Committee by 10 March 2024, midnight CET.
Step 4 Participants will be notified by the TNC Programme Committee of the acceptance or rejection of the proposal
Step 5 Selected participants ('finalists') take further training and take part at TNC24
Media & Resources
FTP News and articles:
- Future Talent Programme 2023: A new generation of talents to lead the R&E community into the future | GÉANT CONNECT Online and CONNECT Magazine, May 2023
- Calling all students and young professionals: nominations are open for the 2023 GÉANT Future Talent Programme | GÉANT CONNECT Online, January 2023
Record number of GÉANT Future Talent students in spotlight at TNC22 | GÉANT CONNECT Online and CONNECT Magazine, May 2022
Bright students and young professionals wanted – GÉANT’s Future Talent Programme is back on stage | GÉANT CONNECT Online, February 2022
- The Future Talent Programme challenges students to take part in TNC21 | GÉANT CONNECT Online
GLAD Future Talents inspire the R&E Community with new ideas | GÉANT CONNECT Online, July 2022
Submit registration
Registration deadline
1st February 2024 (12:00 PM GMT)
TNC24 conference 10 - 14 June in Rennes, France
Important Dates:
1 February 2024 12:00 PM GMT |
10 March 2024 |
April 2024 |
April - May 2024 |
10-14 June 2024 |
FAQ (NRENs)
Any early career candidate nominated by a GÉANT Project NREN partner studying at a university or college in a GÉANT partner country, or working at a GÉANT NREN. Unfortunately the Programme is not currently available to Partner Members.
A maximum of 3 candidates per NREN, (subject to number of candidates on the programme).
Ideal candidates: Undergraduate, Master and PhD students (possibly interns at the NREN).
The Lightning talk submissions can be any project or research or innovation which addresses a technical, economic, legal, security or environmental aspect in computer networking or other technology-related areas. For more information see former topics linked below.
We expect NRENs to select and nominate a maximum of 3 candidates. All nominated candidates who comply with the programme requirements (see Requirements) will be admitted to the Future Talent Programme. The acceptance of the participant's proposal for the Lightning Talk programme at TNC will be the exclusive decision of the TNC Programme Committee without any interference of the Future Talent Programme. The Future Talent candidate competes with all the other proposals submitted for the conference. Sucessful proposals are selected based on originality and clarity.
Applications must include the online registration, with the mentor's and candidate’s full contact details, University details and a short description of the topic the candidate wishes to submit for their Lightning Talk. The application must be submitted in full by 1st February 2024, 12pm GMT
Your role as a mentor is to engage with your candidate on a regular basis during the programme, provide encouragement and advice throughout the programme and attend related events. If your candidate is selected to present at TNC, we encourage you to support him or her during the conference. All candidates' costs are funded by the programme and can be reclaimed from GN5.1 Project following the usual GÉANT project claimant rules and procedures.
The programme runs from March to June 2024, and includes 3 professional presentation workshops for all participants. Depending on the number of participants the workshops will be organised in groups of up to 5 from April to May 2024. TNC24 'finalists' will receive further coaching from a professional trainer coach prior to the conference.
FAQ (Students)
GÉANT is the pan-European network that delivers a high-performance connectivity and advanced services to more than 50 million research and education users across 40 European countries.
A national research and education network (NREN) is a dedicated internet infrastructure and service provider to the research and educational communities within a country.
To participate, you must be nominated by a GÉANT Project Partner / NREN. To be considered for nomination, contact your local NREN direct ly or ask your university or college teacher. Unfortunately the Programme is not currently available to Partner Members.
NREN details can be found on the GÉANT member page. You can also send a message to glad@geant.org.
The programme offers an excellent opportunity to develop expert presentation skills, share your research with an international audience and network with subject matter experts in the field. You will also build great relationships with other young professionals on the programme.
- Available to commit to the timelines (see above).
- Contactable throughout the programme
- Attend all presentation coaching sessions and prepare ahead of each session (April - May 24)
- Develop and rehearse your presentations between sessions.
- Record a 5 minute presentation (Using laptop or phone)
- If selected as an FTP finalist, sign a Volunteer Agreement with GÉANT.
The FTP Lightning Talk Challenge offers students and young professionals a fantastic opportunity to present their project or idea to an international audience at GÉANT's annual TNC conference. Lightning Talks focus on one key point and are delivered against the clock, within a maximum of 5 minutes!
All FTP candidates submit a proposal for an idea, project or research to be shared. Submissions are reviewed by the TNC Programme Committee and successful applicants are advised by early April 2024. If successful you will travel to TNC24 in Rennes France to take centre stage and share your idea!
Lightning talk submissions can be any project or research or innovation which addresses a technical, economic, legal, security or environmental aspect in computer networking or other technology-related areas.
For more information see former topics linked below.
Congratulations! Your local NREN will cover the costs of your travel to TNC and claim those costs from GÉANT’s GN5-1 Project. Ask your NREN contact whether you should make the booking yourself or whether they will book for you directly.
GÉANT will book and pay for your hotel and conference attendance fees.
Keep all receipts for food and travel expenses during TNC and claim the cost back from your local NREN.
Need to know more?
Email: glad@geant.org
FTP23 Lightning Talks
THE ALGORITHMIC DESIGN SKETCHBOOK - Renata Castelo-Branco | INESC-ID/Instituto Superior Técnico, University of Lisbon. Supported by FCT|FCCN
When you picture an architect at work, how do you see them? Holding a pencil over a drawing board, maybe? How about the architects that designed the Morpheus Hotel in Macau; the Gherkin in London, or the Louvre in Abu Dhabi? Still imagining pencils?
Architecture, like many other art forms, frequently mirrors the technological advancements of its time, and these are just some examples of the multitude of projects that have been reflecting the increasing integration of computer science in the architectural domain. Today, architects have at their disposal tools that allow them to design, and manage, large-scale and non-conventional design solutions that would have been nearly impossible to conceive using traditional design methods. However, designing with algorithms requires programming, a concept with which practitioners often struggle. For architecture to benefit from computation at large, we still need to close the existing comprehension gap between algorithmic design programs and their behaviour, making this representation method more akin to the traditional architectural practice. The Algorithmic Design Sketchbook proposal addresses this problem by coupling algorithmic design with complementary representation methods that are adequate for designing complex architectural projects, and supporting their synchronisation with a design tool that architects feel comfortable using.
IT'S PEOPLE - OR WHY WE NEED AN INTERDISCIPLINARY APPROACH TO CYBERSECURITY - Fabio Greiner | University of Zurich. Supported by SWITCH
In recent years we have come to realise that cyber security not only requires technical measures, but also cooperation on the part of the users in order to make organisations more resilient against cyber-attacks. Changing user behaviour requires more than just one-time training, it demands a different skill set to what most experts in cyber security have. That's why the field is undergoing a transformation through inviting professionals from other disciplines to support security measures.
In my master’s thesis I studied the collaboration of security awareness specialists with internal communications. The results from the interviews provided insight into how practiced interdisciplinarity can support security professionals in their daily work, and thus make organisations more secure.
WHY YOUR INTERNET IS BAD! - Félix Gaudin | UC Louvain. Supported by Belnet
During the Covid crisis I followed my course using Microsoft Teams. In many cases the video/audio quality was really bad, and yet none of the speed tests I ran showed any abnormality. What happened? At that time, speed test websites only measured throughput. Latency is measured as well, but as idle latency (without load on it). However, when you attend a class/meeting there are always other apps/people using your network.
We need a way to measure working latency. The IETF has started to develop a new measurement technique called RPM to measure latency under working conditions. Our goal is to implement it in a browser so that every user will know why their connection is poor. Moreover, all current tests work with TCP connections. With TCP it is possible to send a large amount of data, but it's very hard to accurately measure latency or packet losses. Meanwhile, many cloud providers are moving towards HTTP/3 with the QUIC protocol. Therefore, we are developing our measurement tool with QUIC.
APK FALCON: EMPOWERING USER’S PRIVACY - Javier Crespo Guerrero | Universidad de Valladolid. Supported by REDIRIS
APK Falcon is a tool to assist users in assessing the impact of mobile apps on privacy, to improve knowledge and empower decision making in accordance with the values of the EU Next Generation Internet. APK Falcon will help users understand the permission system, leading to improved management - such as revoking highly intrusive permissions or being more cautious when asked to grant permission. This tool will be made in a user-centric way, so the impact on privacy can be understood by everyone.
Users will be able to access a web service where they can search for the name of an application and obtain a privacy score, as well as information to understand this score. APK Falcon can assist users in making more informed decisions about granting permissions and managing their privacy. By shedding light on the permission system, APK Falcon can empower users to take control of their privacy in a simple, open and transparent fashion.
POWERING THE FUTURE: THE VALUE OF RENEWABLE ENERGY COMMUNITIES IN A DECARBONIZED WORLD - João Daniel Correia Brandão | Universidade do Porto - Faculdade de Engenharia. Supported by FCT|FCCN
The transition to renewable energy is critical to mitigate the effects of climate change and achieve a sustainable future. One promising approach to advance this transition is through the development of Renewable Energy Communities (RECs). These communities are formed by groups of people or organisations that come together to produce, consume and share renewable energy locally. They are designed to promote local ownership, collaboration and innovation in the deployment of renewable energy technologies.
To fully realise the potential of these communities, assessing their value and impact is essential. This assessment will provide insights into the benefits and challenges associated with RECs, and help identify best practices for their development and implementation. It will also evaluate the economic benefits of these communities, including the potential for job creation, increased economic activity and cost savings for participants.
BREAKING DOWN AI TO GET EXPLANATIONS - Karel Hynek | FIT CTU- Czech Technical University, Prague. Supported by CESNET.
Research shows that Artificial Intelligence (AI) can be an effective tool for automated cyber threat hunting. However, the lack of explainability still prevents its mass deployment into commercial-grade tools. Due to AI complexity it's hard to get reasons behind its output, which are crucial for cyber security incident handling and response. We thus bring new design principles of AI by dividing complex monolithic models into small components with defined functionality. By observing the outputs and interaction of these components, we can get an insight into their internal behaviour and provide explanations and reasoning behind their output. The lack of explainability originates from AI's enormous complexity, which people cannot comprehend. We thus divide the complex AI into a component-based system, each component designed separately, like in the human brain. In the brain, there are parts responsible for vision and other parts for hearing for example. We know which part is responsible for what, dramatically increasing our understanding of such a complex system.
Component-based models are solutions for AI model deployment in cyber security and other high-stakes areas where explanations are necessary. The division into components provides better control over the predictions and explains them. The improved explainability also reduces the chance of design errors, can improve model quality control and increases the overall trust of its users. Moreover, we can use reasoning to filter out obvious mistakes and increase AI reliability.
DATA FUSION: THE KEY TO RELIABLE THREAT DETECTION - Richard Plný | Czech Technical University, Prague. Supported by CESNET.
Secure computer networks rely on monitoring, threat detection and security operators who respond to automatically created alerts. Performance of current anomaly and threat detection methods is dependent on the network telemetry data they are developed on. However, in some cases network telemetry does not contain truthful information. An error can occur during transmission, or an attacker can spoof information to confuse threat detectors. As a result, many attacks may remain undetected and false alerts might overwhelm security personnel. We are currently exploring an approach that utilises a combination of several data sources to overcome imperfections.
Many state-of-the-art detectors are based on Machine Learning (ML) technology, which can be easily confused. Attackers can alter traffic shape by sending additional data which is unnecessary for communication. Malicious traffic can be completely hidden by this technique and missed by the ML - an outgoing attack might not be detected at all. Data incompleteness is another problem. For example, no blocklist can ever contain every malicious IP address. Moreover, these IP addresses can change over time. Therefore the output of some detectors might not reflect reality. Current techniques, when used separately, are suffering from many pitfalls.
JETSTREAM 2.0: A MULTI-FPGA PCIE INFRASTRUCTURE SUPPORTING FPGA-TO-FPGA LINKS - Vladislav Válek | Brno University of Technology. Supported by CESNET
In recent years there has been a major development in the field of cluster computing. These solutions often require many dedicated resources to communicate with each other, and bind their abilities in a collaborative manner. There is also a requirement to allow multiple users to use a single cluster without affecting each others' computations. Nowadays, the FPGAs provide an excellent scalability and programmability for this purpose, with the advantage of parallelism and achieved throughput.
This talk introduces the design of a generalised streaming library for the PCI Express interface called JetStream 2.0. It is an enhancement of the previous generation, able to run at the data rates of PCI Express Gen3 x16, that means reaching the transfer speeds of up to 100Gbps. The architecture also supports sending data between two FPGA cards using a zero-copy mechanism - which bypasses the classical buffering of data in RAM and sends them directly to the addressed device. This solution is proposed as vendor independent, thus FPGA cards both from Intel and AMD/Xilinx can be used and also mixed on the host.
AI PREMIE - A risk stratification tool for preeclampsia - Ana Le Chevillier | University College Dublin. Supported by HEAnet.
Artificial Intelligence for rheumatic heart disease detection - Belen Fernandez de Toro Espejel | Universidad Nacional de Educación a Distancia. Supported by RedIRIS.
COMBATTING ISOLATION IN RESEARCH, USING AN ONLINE COMMUNITY - Jenna Barry | Technical University of the Shannon. Supported HEAnet.
A Community of Practice (CoP) is a group of people who share a concern or a passion for something they do, learning how to do it better as they interact regularly. vCoP is an online CoP connected through technology and, in this instance, on an Enterprise Social Network (ESN). An ESN is a social network used in enterprise settings to bring together people who share the same interests - using the platform to engage and improve knowledge collectively. It is regarded as Enterprise 2.0. Coming together as a community and working as a unit may help encourage and strengthen the knowledge economy - decreasing isolation and increasing connection, communication and collaboration.
WHAT CAN WE DO TO PROMOTE BUILT HERITAGE? - Margherita Soldaini | Università degli Studi di Firenze Dip.to di Architettura. Supported by GARR.
Research has highlighted that although learning about cultural heritage still relies on text and pictures, physical objects are more effective, extending beyond conceptual experiences. Virtual representations of 3D objects cannot often support the attributes of physicality that may be valuable, for instance, in the reconstruction processes of a monument.
Margherita's research proposes the creation of accessible digital archives and their dissemination and valorisation. The main case study will examine the Church of St. Augustine and the Oratory of Blessed Becchetti in Fabriano, Italy, abandoned after an earthquake in 2016. The church has undergone numerous restorations, but historical evidence allows insight in to its original forms. The digital archive will give easy access to the models of the reconstructive hypotheses, using innovations in research and development in the practice of cultural heritage to ensure high-resolution images, metadata and 3D models. These tools enable us to learn more about abandoned places through the dissemination of content and information, promoting the preservation of the architectural and artistic heritage.
Models will be available for download, editing, and 3D printing for interdisciplinary uses, dedicated to visually impaired people, useful for the process of study and comprehensive tactile perception for students, curious people and scholars.
CRYPTOGRAPHY FOR CLOUD SECURITY - Martina Palmucci | Università degli Studi di Perugia. Supported by GARR.
Nowadays, the amount of data stored on digital devices is huge and this trend is rising. Because of data protection regulation, and to deter attacks, sensitive data must be protected proactively.
Furthermore, recent legislation, among which the General Data Protection Regulation (EU GDPR) and the Consumer Data Right (CDR), has started to mandate technical measures for data protection. In particular, the principle of “data minimisation” states that a data controller should limit the collection of personal information to what is directly relevant and necessary to accomplish a specified purpose. The principle of minimisation can be implemented by limiting access to certain categories of data according to the experts that have to use the data.
This research project identified a technological gap related to the data minimisation principle. Although the GDPR legislation provides guidelines, it does not explicitly specify the required techno- logical tools to implement them. The project aims to fill that gap by developing a cryptographic scheme as a service integrated within a cloud system.
An encrypted database offers intrinsic data security. Data is transformed into ciphertext (unreadable text) using a cryptographic procedure. Even when an attack on the database would be successful, the encryption techniques prevent hackers to analyze or decrypt your data to use it to their ad- vantage. Specifically, the cryptographic technique that is chosen is Attribute-Based Encryption (ABE). ABE encrypts a resource against attributes instead of concrete users. Only users that possess a correct combination of attributes will be able to decrypt the resource. ABE eases the implementation of access control rules to comply with the GDPR principles.
Finally, the last part of the project consists of implementing the cryptographic scheme as a cloud service. Because the cloud is one of the most popular methods for storing data among large communities, we want to integrate the ABE system with cloud storage and other potential cloud services. The envisioned system will integrate the existing Role-Based Access Control (RBAC) system of a cloud system with ABE, allowing data to be encrypted using pre-existing privileges.
Archived FTP Lightning Talks
FTP22
Why we need a collaborative DDoS protection architecture in Europe - Marion Dübendorfer (SWITCH)
Distributed Denial of Service (DDoS) attacks have the potential to disrupt access to critical infrastructure for population groups across the world – yet their mitigation capabilities lie largely in the hands of private tech companies based in the US. This lightning talk explores the opportunities and benefits of an open, federated DDoS protection architecture in Europe.
https://youtu.be/nqRtm2jZbww?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Fake News Detection Models — Introducing GAN Generated Synthetic Samples to Improve Performance - Bruno Gonçalves Vaz (Universidade do Porto) FCT/FCCN
News datasets are extremely imbalanced, with the fake news not being as well represented as the real news. Thus, machine learning models for fake news detection do not perform as good as expected. Hence, Generative Adversarial Networks can be used to produce high-quality synthetic samples to better represent the fake news data, improving the models’ performances.
https://youtu.be/2748eoymHqY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
AI for Heritage ─ SOS digital collections: classifying and characterizing - Ana Carneiro (School of Arts | Universidade Católica Portuguesa - Porto) FCT/FCCN
A presentation that focuses on finding solutions that use AI to catalogue and categorize archival collections. Firstly, the difficulties that archivists have in the transition to digital followed by the various problems when one tries to implement AI. Finally, the necessary steps to carry out a project in partnership with a heritage space and a potential workflow.
https://youtu.be/IkNUbj4nvpE?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Traffic analysis of communication and collaboration apps bloomed with Covid-19 via advanced Deep Learning approaches - Idio Guarino (University of Naples Federico II) GARR
The COVID-19 pandemic and the resulting increase in interactions via digital tools has deeply changed network traffic. To manage these changes, network operators need advanced tools for classification and the prediction of internet traffic. To face these tasks, the idea is to design advanced deep-learning based techniques with a special focus on traffic generated by social communication and collaboration apps.
https://youtu.be/hWXjB23EYs8?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Roman Emperors and Facial Recognition - Karel van Klink (GÉANT)
Facial recognition and Roman emperors: a unique application that will allow for the preservation of culture for generations to come.
https://youtu.be/Qujjm5upGKU?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Self-Sovereign Identity (SSI) for Future-Proof Digital Wallets - Frederic Gerber (SWITCH)
When the Internet was introduced at the end of the last century, it was not clear what use it would have. Today, we are at a similar crossroads with SSI, which consists of a set of principles for digital identities that users directly control. While it is not certain that SSI will change our society as groundbreakingly as the Internet did, it seems to be establishing itself as a paradigm that will endure for some time. From the user's perspective, it is important to understand the power of digital wallets, which is why this presentation will go through the main principles of SSI and convince everyone that a digital wallet is just as vulnerable as a physical one.
https://youtu.be/Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Multi-factor authentication support between eduGAIN federations - Hilco de Lathouder (SURF)
Lightning Talk proposal featuring the results of a 1 month research project conducted as part of the University of Amsterdam's Security and Network engineering Master Program. The results are a start for improving support for (standardized) multi-factor authentication methods between eduGAIN federations.
https://youtu.be/Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Guessing PINs, One Partial PIN at a Time - Ashley Sheil (Maynooth University)HEANET
We created different methods of guessing a person's PIN, by attempting to guess their partial PIN incrementally in an in-the-wild scenario. We look at the different patterns that result, as well as lengths of guessing time. We wanted to see how secure, in comparison, a full PIN is compared to using partial PINs as means of authentication.
https://youtu.be/sjuFlIzDxLI?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Challenges in processing and knowledge discovery in specifications of scientific resources - Witold Taisner (Poznan Supercomputing and Networking Center)PSNC
The talk will focus on major challenges present in both processing and further utilization of the data, such as specifications of certain scientific resources: articles, computational resources or datasets. Our goal is to create a recommender system for the aforementioned data
utilizing linguistic and natural language processing techniques, with a special focus on deep learning.
https://youtu.be/6wdwCE1eMPk?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Artificial Intelligence for the early diagnosis of cardiac comorbidities associated to COVID-19 - Chiara Leoni (GARR)
COVID-19 is an infectious disease, caused by SARS-CoV-2, that mainly affects the respiratory system. Unfortunately, it can also have serious impact on cardiovascular system, triggering the occurrence of cardiac diseases that must be timely identified. Thus, this project aims to contribute to the diagnosis of cardiac comorbidities associated to COVID-19, with the development of an artificial intelligence (AI)-based tool.
https://youtu.be/Czxr-sV5oQY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw
Embedding a culture of internationalisation into the curriculum through "Internationalisation at Home"- Preparation for the changing context of Higher Education in Ireland - Nidhi Piplani Kapur, Waterford Institute of Technology, HEANET
My proposed research seeks to address the ‘gap’ in the Irish National Strategy for Internationalisation, by delving deep in how ‘Internationalisation of Curriculum (IoC)’ can provide internationalisation experiences to the 98% of students in Ireland who currently do not travel abroad. My research will investigate ways to provide an international experience ‘at home’ to all students, mainly using technology-based interventions. It will seek to inform a strategy that will drive the development and embedding of a culture of ‘Internationalisation at Home (IaH)’ in the curriculum. This will bridge skill deficits in Irish graduates and build multicultural competencies required by industry.
FTP21
A testbed to bridge the cybersecurity skills gap in industrial control systems - conrad-ekisa/HEANET
ICS cybersecurity is of increasing concern and this is evidenced by the mounting reports of cyber threats and attacks on ICS infrastructure that are referenced both within the technical community and the public media.
Telomerase – eternal life or a panacea for all cancers ?! - hanna-karpenko/BASNET
Telomerase is considered the key to cellular immortality, the “fountain of youth.” This enzyme allows cells to multiply rapidly without aging. At the same time, telomerase allows cancer cells to divide indefinitely, which is the reason for the formation of tumors. Scientists from all over the world have been trying to solve this problem for a very long time. But today there is no exact model of the structure of human telomerase, due to the complexity of the structure and the high cost of this study. Computer modeling methods make it possible to quickly and cost-effectively reconstruct the spatial structure of human telomerase by homology based on the structural data of related templates. The work is done with the help of the State Supercomputer Multi-access Center of the UIIP NASB and the NREN BASNET network infrastructure. Computer methods of molecular dynamics optimize the model and make it accurate enough for rational design drugs and will help to understand that telomerase is eternal life or a panacea for oncology.
A Hierarchical Learning Approach to Enable Network Slicing in Future Telecommunication Systems federico-mason/GARR
In this work, we designed a hierarchical learning architecture, where multiple agents cooperate to orchestrate network slices under different working conditions. Our hierarchical architecture will support PSC in a much more efficient way than conventional approaches, allowing the current telecommunication networks to assist emergency operators (e.g., firefighters, policemen, healthcare professionals) without the need for a dedicated infrastructure.
Indoor Localization Service based on Beacons: A System to Save Your Life! - sara-raggiunto/GARR
Navigation systems help users find their way around the world. But what if we wanted to reach the exact platform of our departing train and it’s a matter of minutes? Or what if in the earthquake/fire event we wanted the shortest path to the escape route? The skill is to move from a problem to an extremely innovative solution. Indoor localization allows users to access unknown environments. The main challenges of the proposed system are the safety, the access control, and the activity monitoring. In fact, knowing instantly the exact position of the people to be assisted is extremely important in an indoor environment.
Biometrics-based scheme for public key agreement protocol in wireless body area networks - anna-valeria-guglielm / GARR
Wireless body area networks (WBANs) are becoming increasingly popular as they allow individuals to continuously monitor their vitals and physiological parameters remotely from the hospital. With the spread of the SARS-CoV-2 pandemic, the availability of portable pulse-oximeters and wearable heart rate detectors has boomed in the market. At the same time, in recent years we assisted to an unprecedented increase of healthcare breaches, revealing the extreme vulnerability of the current generation of WBANs. Therefore, the development of new security protocols to ensure data protection, authentication, integrity and privacy within WBANs are highly needed. In this context, we target a WBAN collecting ECG signals from different locations on the individual’s body, and we propose a new information theoretic key agreement protocol that exploits the inherent randomness of ECG signals to ensure authentication between the nodes within the WBAN.
FTP20
What if we don’t have to type anymore? Luis Sampaio, FCT/FCCN
This presentation outlines a new approach on human-machine interaction that is inclusive to people with hand/arm movement impediments and vocal impairments through the use of an electroencephalography headset and electromyography surface electrodes respectively, all on a decentralized application that is developed to guarantee privacy on communication between users.
Internet of Things - Alvise Baggio, GARR
FaaSt (Forecast as a Service) is a project created on occasion of the hackathon organized by GARR (Hack The Cloud) on November 2019 whose main theme was environmental sustainability. The idea behind Faast is to use cloud communication infrastructure to improve the electric grid and provide end-users with real-time information on the sources of energy used in the grid and to opt for the renewable options.
Post–quantum secure cryptographic schemes - Panayiota Smyrli, CYNET
Recent advancements in quantum computing have brought about fundamental challenges to cryptography. The security of many classical cryptographic schemes, such as the digital signature algorithm (DSA), the Diffie-Hellman (DH) key exchange protocol, and their elliptic curve variants, relies on the hardness of the well-known discrete logarithm problem over cyclic groups in elliptic curves over finite fields.
Computer Discovery of Novel Drugs, Hanna Karpenka, BASNET
Computer molecular modeling techniques play an important role in research into the development of new drugs. The use of neural networks for these methods in the rational design of potential drugs can minimize the time and cost of searching for various targets and potential drugs! Such a computer model can, with high probability, predict the vulnerability in the structure of the infectious agent and indicate which chemical compound should be synthesized.
Challenges and Opportunities of Crowdfunding in Ireland - Kelly Wang, HEAnet
Digital connectivity is transforming all aspects of our lives. Today information, ideas and financial flows are exchanged rapidly online and worldwide. A case in point is Crowdfunding. Enabling investors and entrepreneurs to connect worldwide online, to access much needed finance, this new model has emerged as a powerful disruptive force, reshaping traditional funding models and undermining traditional market dynamics.
Information-Centric Networking (ICN) - Paul Duggan, HEAnet
Information-Centric Networking (ICN) is an alternative approach to the Internet networking architecture. The main idea behind this approach is that information is identified by name, rather than by IP address. Due to this capability, this information can be cached on some or all hops on the delivery path between a source and an end-user, depending on a caching policy. For example, if an end-user requests a video, a copy of this video may be cached at every hop along the path between the source and end-user. When an adjacent user requests the same video, the request may be serviced from a node closer to the user instead of from the source. This can lead to significant savings in quality, costs and latency
- No labels