Keynote Speakers

     

Rebecca Fox


Keynote Speaker: Professor, Academic Program Coordinator,
George Mason University, Advanced Studies in Teaching and Learning
Coordinator, Teaching and Teacher Education
English as a Second Language PK-12
Foreign Language and Latin (PK-12)
PhD in Education and Human Development

 

International and Inter-disciplinary Professional Learning for Innovation for the Twenty-First Century

Abstract: Higher education institutions “serve as key change agents in transforming education and society” (UNESCO, 2005, p. 12). Universities today are more vital than ever and must respond to an increasingly urgent call to prepare world citizens for the upcoming decades of the 21 st century. Global engagement calls for professionals who are not only capable of working and living in a rapidly changing and globalized world, but who must also possess critical reflective capacity to promote content knowledge application in relevant, innovative, and entrepreneurial ways. To accomplish this goal, knowledge must extend beyond discipline-specific classroom application to knowledge activation in authentic settings; the importance of partnerships and inter-disciplinary work cannot be under-estimated. Coursework, of course, needs to begin with providing strong base skills, but it must include expanded understandings of a discipline in broader contexts and incorporate intercultural competence and international mindedness. Professional learning should then also include building inter- and cross-cultural capacity; research-based practices and scholarly work; hands-on, authentic learning; and relevant, contextual application of knowledge so that new global understanding, skills and concepts might be actively incorporated for the betterment of our world. If global engagement is one of the pillars supporting strategic educational opportunities for the future, we must create avenues for collaboration, expanded research, and innovative practices for university students and their faculties. This is where partnerships play a key role. The challenge is for universities to provide viable networking pathways between and among stakeholders so that the interface of program coursework, research skills and outcomes, and impact are clearly connected. How might this best happen? A research collaborative currently underway, established through funding by the U.S. Department of State, Islamabad, the Collaboration for Faculty Excellence in Teaching and Research (CFETR) (2015-17), is providing a case study of such an endeavor. This two year project involves the university faculties from two universities and is helping us understand the role that colleges of education can play as integral partners in international and inter-disciplinary work. Through strategic connections to the broader research and business communities at George Mason University, Fairfax, VA and the University of Management and Technology (UMT), Lahore, Mason and UMT faculty have committed themselves to collaborative work designed to promote students with equitable access to relevant coursework and promote critical thinking skills that include world perspectives. Multiple forms of research, including course-based inquiry and accompanying action plans, play a critical role in expanding faculty members’ deeper understanding of the complexity of the teaching and learning process and research capacity. This address will share essential aspects of the process and journey of the CFETR, including year one results and highlights. Critical questions that have emerged from a project that seeks to foster collaboration and strengthen our collective understandings of effective pedagogical practices and expand the research competencies of our university faculties include: How might we increase faculty effectiveness and positively impact student learning? How do we empower faculty to actively engage in inquiry at all levels of work, from program development to course learning outcomes? How might the two faculties draw from one another’s educational contexts and inquiries to lead education to new successes?


     

Dr. Omar Muhammad Omar Barukab


Keynote Speaker: Professor & Dean Faculty of Computing and IT
King Abdul Aziz University
Rabigh – Saudi Arabia

 

Becoming the World Class University: The Case of King Abdul Aziz University

Abstract:This study is essentially a description of one phase of the fascinating expedition of exploration that has been undertaken by King Abdul Aziz University (KAU) as it enthusiastically seeks to achieve the standards of educational and academic excellence that will consequently facilitate the realization of its ambition to become one of the world’s leading universities. This presentation will describe the manner in which the university went about seeking, identifying and locating internationally recognized authoritative educational and academic experts. In our journey to become one of the top University, the KAU worked on the following parameters: International Advisory Boards, Excellence in Research, Excellence as Duty, Excellence in Education, Excellence in Serving Society and Mankind, Excellence in Strategic Planning, Excellence in Innovation and Knowledge Economy and Excellence in International Cooperation.


     

Mr. Charles Wang


Keynote Speaker:
Name: Charles Wang
Nationality: Chinese
Title: Director IT Solutions
Company: Huawei Pakistan

 

Specialization:

  • VDI, Server SAN, IaaS Cloud and Big Data solutions
  • Data Center IT Infrastructure Setup/Consolidation Solutions
  • Server, Storage, Disaster Recovery and Backup Solutions

Education Background:

  • Sun Yat-sen University (Top 10 in China)
  • Master of Computer Science

Work Experiences:

  • Huawei , IT Solution Manager, 2015 Feb -Now
  • China Mobile (Guangdong Branch), IT Planning Manager, 2012-2015
  • Accenture (China), Cloud Computing Assist Consultant, 2011-2012

Personal brief introduction:

  • Full experience in IT Planning & vendor evaluation, familiar with customer thinking
  • Computer science master background & expert in cloud data center solutions

Project experience (recently):

  • ZTBL Bank IT Consolidation, Islamabad
  • Islamabad New Airport Active-Active DC, Islamabad
  • First High Performance Computing project in PAK – LUMS HPC, Lahore
  • China Mobile (Guangdong Branch), IaaS Cloud setup, China


     

Dr. Muhammad Mustafa Kamal


Keynote Speaker: Associate Professor
Brunel University, Brunel Business School
Middlesex, Uxbridge, UB8 3PH, UK

 

Digitizing Pakistan: (A Myth, Reality in the Making or Reality in Practice)

Abstract:Civic insurgence with its related political situation is escalating rapidly as most of today’s developing countries have become endemic with nepotism, prejudice, tyranny, gross negligence and predominantly; corruption, whilst concurrently civil constitutional rights appear to be non-existent at large. This seemingly unruly environment has prompted tumbled ethics and lack of resolve and commitment among most bureaucrats and office-bearers to restore the plight of the underprivileged in several developing countries. Moreover, the misuse of tax payers’ money is a fundamental menace to civil rights and the existence of democracy. Such non-technological but equally highly significant issues remain a matter of deep disquiet as it rescinds the social bond between those who are governing and those being ruled. Pakistan, over the past decades, has experienced similar maladministration and its political culture has been riddled to the core with discrimination, exploitation, and poor governance. The latter inhibitors are at all levels the hallmarks of almost every government setup in the last few decades and current political system in Pakistan – resulting in depriving genuine democracy and rule of law. A leader, who commits to restructure a just order and empowers the side-lined and exploited middle classes and offers hope for sanity and a united Pakistan, is essentially looked-for. Nevertheless the latter may not be possible without strategic use of information and communication technologies (ICT) – ICT need to go hand in hand with leadership in order to improve government efficiency, making decision-making process transparent, interacting with their citizenry and most importantly, and developing trust between government and citizens. This research therefore is seeking to make a contribution to the body of knowledge through exploring how electronic government (e-Government) phenomenon can or has “Digitized Pakistan” in restoring the very essence of country’s constitution, justice and rule of law, and quality of government. Some recent yet few federal and mainly provincial government initiatives in Pakistan exemplify the commitment towards transforming and providing evermore relevant, responsive and end-to-end services, and exploring ways to transcend their current limitations. Regardless of the technological advancements, the question remains – can e-Government or a digitized Pakistan be free from the core issues stated earlier? OR does the state (governing body) initially need to set their priorities right and focus on equal education provision, improved healthcare facilities and timely justice – all at large?


     

Dr. Abdullah Ghani


Keynote Speaker: Professor
Academy of Sciences Malaysia, 2016, (National)

 

Big Data on National Sovereigty: Technological Challenges

Abstract:In this talk, I will be discussing the concept of National Sovereignty and its challenges to uphold it. Recently, many countries are facing internal and external threats to their sovereignty due to economy booming. Influx of illegal immigration, people smuggling are example which attracts ‘fortune seekers’ to cross the border without concern of the risk to their life. The number is getting bigger ever and it worries the government agencies. Big data is contemplated to be able to solve some issues related to national sovereignty by using non-intervene approach. Non-intervene is an approach of collecting data from social media and known as Social Network Analytics. Obviously, the illegal immigrants need to find job when they reached in the new country in order to survive. Many of them send back some money to their home countries through non-banking institutions or even backdoor mechanisms. This has caused the problem for the government agencies to monitor their activities. Big Data can be used to create profiling of the targeted people from social media or any source of data generated medium. However, this possesses challenges from legislation as well as technological constraints. In this talk, I will elaborate challenges and propose the solutions.


     

Dr. SÜMER ŞAHİN


Keynote Speaker: Professor of Mechanical and Nuclear Engineering
Dean, Faculty of Engineering, Near East University,
Turkish Republic of Northern Cyprus

 

NUCLEAR CODES and DATA PACKAGES

Abstract:At present, fossil fuels are the main source of energy. Their share in world’s primary energy production is ~88 %, whereas nuclear energy and renewables provide ~7 % and ~5 % of total energy, respectively. Nuclear energy is entirely used for electricity production, providing ~16 % of world’s electrical energy. The energy is release through a neutron capture by the fission fuel. In fact, all reactions in a nuclear reactor occur with the interaction of neutrons with matter, which depends strongly on the neutron velocity and neutron energy. Elastic and inelastic scattering (n,n) and (n,n’), neutron multiplication (n,2n), (n,3n), neutron capture accompanied with a -ray emission (n,), proton production (n,p), helium production (n,), nuclear fission (n,f), etc. The neutron will be lost after the (n,p), (n,) and (n,f) reactions. Hence, space and energy dependent neutrons must be determined precisely in order to understand and control of the reactions in a nuclear reactor, such as heat and energy production, depletion and Production of the nuclear fuel, induced neutron activations in the structures, etc. As neutrons are in continuous movement, their position in the matter can be determined with the help of a balance equation, called Boltzmann transport equation (BTE). BTE allows to calculate the temporal variation of the neutron density n = /v as a function of space, energy and direction with a high precision. The neutron spectrum is calculated as a function of space vector r ⃗(x;y;z), neutron velocity vector v ⃗(vx;vy;vz) and time variable t. It is more convenient to describe the neutron velocity vector v ⃗ in energy E and the solid space angle Ω ⃗ [73,74]. In the BTE, the vector space of the neutron flux  has 7 dimensions. The BTE evaluates the variation of the neutron density in form of a balance equation containing the scattering source, neutron source, leakage loss and neutron-matter reaction loss terms. BTE has a very complex structure and so an analytical solution for real conditions is not possible. For that reason, a great number nuclear code packages have been developed, which can be classified in two groups:

  • Deterministic codes
  • Stochastical codes
The most important deterministic methods are:
  • SN method
  • PLmethod
  • Collision probability methods

SN is the most developed tested and worldwide used deterministic method. The formulation of the algorithms is also a good tool for a better comprehension of the subject.

In recent years, Monte Carlo neutron transport methods have been broadly adopted due to the advantages of high simulation accuracy and flexible geometry representation. Typical Monte Carlo codes include MCNP, Geant4, Serpent, Open MC, Super MC, etc.

A general view of the code systems and data packages will be outlined in the course of presentation


     

Dr. Orkun Hasekioğlu


Keynote Speaker: TUBITAK
Executive Vice President
Turkey, Aviation & Aerospace

 

Developing the IT Culture in Corporate Environment

Abstract:Millions of dollars are spent on compliance training every year. Though necessary and crucial to organizational success, many organizations are struggling to keep up with new trends due to budget constraints. Moreover, lack of knowledge regarding the potential of IT infrastructure is another obstacle. Executives lack the realization that introduction of IT processes will reduce human effort, save time and in many cases also save money. Some workers and even executives also resist the change that IT brings in their organization. This study main depicts the ways in which organizations can benefit from IT processes. Also includes study of certain test cases that show that how an organizational increased their productivity by use of such processes. Moreover, it also shows the ways by which resistance against change can be managed.




     

Assoc. Prof. Dr. Mohd Shafry Mohd Rahim


Keynote Speaker: Research Fellow
Media and Games Innovation Centre of Excellence (MaGIC-X)
UTM-IRDA Digital Media Centre, Institute of Human Centred
T03, Level 1, University Industry Research Laboratory (UIRL)
Universiti Teknologi Malaysia
81310 UTM Skudai, Johor, Malaysia

 

Computer Vision and Augmented Reality Inspire Digital Media Application

Abstract:Computer Vision and Augmented Reality is a field used to transform the digital media industries with several innovation. Currently, this area is very important and become a focus in many research group over the world. The research is aim to increase capabilities of the machine as tools for human in decision making accurately with visual context. Augmented Reality employs computer vision capabilities in order to properly integrate the real and the virtual. Therefore, many human applications can gain the benefits from thus technologies. Several applications has been explored by Media and Games Innovation Centre of Excellence (MaGICX), such as education; business; architecture; medical and health; tourism; and others to improved usabilities to the humans. Besides, the development of the technology is also in line with the Fourth Industrial Revolution (4IR) based on Internet Of Things (IOT), Big Data and Digital Economy. As a research institution, our research focus is based on innovation towards Digital Media in various applications. Computer Vision and Augmented Reality are the fundamental research area to develop suitable product for the comercialization. In this keynote, the experiences of exploring the research area will be presented. Several research issues in software, hardware, method, algorithm and framework will be discussed to give direction of future research.


     

Dr. Malrey Lee


Keynote Speaker: Professor
Deptartment of Computer Science & Engineering
ChonBuk National University, JeonJu, Korea Head School of Electrical Engineering and Computer Science

 

An Intelligent Healthcare Data Management System

Abstract:In a healthcare environment, we usually get the patient’s health information in an idle state. The collected data is then managed and analyzed in the healthcare server, so that a care giver can study the patient’s physiological state. In order to get the patient’s health information while performing his daily tasks, we need a ubiquitous device. The goal of this thesis is to design an “Intelligent HealthCare Data Management System” for mobile environments that will handle the healthcare data of the patient and also converts it into a globally used standard for exchange of healthcare data and information. Intelligent healthcare data management system (IHDMS) has an intelligent algorithm similar to genetic algorithm that can find an optimal solution within an acceptable time, and is faster and more dynamic than greedy algorithms in assigning tasks. It processes and transmits sensor data in a way such that it minimizes the system end to-end delay, while guaranteeing required system battery lifetime and availability of the mobile device. This system also converts raw data of the user from sensors to HL7 (Health Level Seven) format and transmits the encrypted HL7 data to a remote healthcare server. The device battery lifetime is potentially increased by more than 200%, the memory usage is less than 100 KB and it processes all data by utilizing very few resources. Apart from this, the system also reduces the time latency in transferring the data and also server load on the healthcare center side by transferring data in HL7 format through a secured channel. The IHDMS on a ubiquitous device is dynamic, efficient, fast, secure and reduces load on end systems compared to other system. It addresses most needs of the modern day ubiquitous devices in managing the patient’s healthcare data.


     

Dr. Asif Ullah Khan


Keynote Speaker: Professor
PIEAS, Islamabad, Pakistan

 

An Analysis of the Recent Architectures of Deep Convolutional Neural Networks

Abstract:Convolution Neural Network is a type of Artificial Neural Networks. Based on concepts of Deep Learning, it is the amalgam of biological, mathematical and computing concepts. Their deep architectures are able to learn complex mathematical functions and possess good representation capacity. These networks has taken part in most leading innovations in the field of computer vision. Before 2012 learning algorithms have sole purpose of classification but deep Convolutional Neural Networks (CNN) shifted the trends towards extracting features automatically from raw data in general and raw image in particular. In 2012, Alex Krizhev sky used CNN and won the Image Net competition by reducing the error rate from 26% to 15 %. Ever since, research trend is shifted from features engineering to network engineering. In this talk I will give an overview of some of the recent deep CNN architectures.


     

Dr. Syed Asad Hussain


Keynote Speaker: Professor
COMSATS Institute of Information Technology Lahore

 

Internet of Things: Issues and Challenges

Abstract:Internet of Things (IoT) is a concept that considers pervasive environment of a variety of things/objects, those through wireless and wired networks and unique addressing schemes can interact with each other and cooperate with other things/objects to create new applications. In IoT communication system sensor nodes collect and monitor the data in an intelligent style. These sensor nodes need to be energy-efficient, that is to achieve energy efficiency, and transmission power must be adjusted wisely. Hence energy harvesting is one of the best-available options for achieving self-dependency in IoT devices. Energy harvesting devices capture, store, and control the collected energy in an efficient way to create a sensor node–based IoT network according to the required performance. Energy harvesting, however, still requires added methods for the conservation of energy in IoT devices. This can be achieved by utilizing energy-efficient routing protocols specifically for routing data toward the base station (BS). The combination of energy-efficient routing protocols and ambient energy harvesting from environment will allow devices to save energy. But there are major challenges in designing of these routing protocols for ambient energy harvesting devices.


     

Dr. Adnan Noor Mian


Keynote Speaker: Associate Professor & Chairperson
Department of Computer Science Information Technology University (ITU)

 

Internet of Things: Experiences and Challenges

Abstract:Internet of things (IoT) aims to monitor and control different devices without human intervention. The IoT devices are expected to perform multiple operations like sensing, processing, actuating, and communicating with other devices. For each of these tasks multiple technologies exist. Each technology has its own pros and cons depending on the application scenarios. Though IoTs lead to new possibilities for networked devices but face issues such as low-power processing, lightweight communication, lossy links networks, and battery constraints.
In this talk, after exploring different IoT technologies I will talk about how these technologies can be used in exciting new ways for a particular IoT application scenario. Often IoT scenarios require low-power and low-data rate devices connected wirelessly through lossy links. For such cases different IoT architectures have been proposed. Each layer of such an architecture has a corresponding equivalent for a conventional network architecture but also have many differences. These differences result in specific research and technology challenges in building IoT based applications. In the end I will give a brief overview of the work we are doing in the IoT Lab in the Information Technology University, Lahore.


     

Dr. Usama Ejaz


Keynote Speaker: Assistant Professor / Associate Head
Department of Computer Science, COMSATS.

 

Classification of normal and abnormal brain MRI

Abstract:The talk will be about Classification of normal and abnormal brain MRI slices which is the outcome of our recent study. In computational and clinical environments, auto classification of brain magnetic resonance image (MRI) slices as normal and abnormal is challenging. The purpose of the study was to investigate the computer vision and machine learning methods for classification of brain magnetic resonance (MR) slices. In routine health-care units, MR scanners are being used to generate a massive number of brain slices, underlying the anatomical details. Pathological assessment from this medical data is being carried out manually by the radiologists or neuro-oncologists. It is almost impossible to analyze each slice manually due to the large amount of data produced by MRI devices at each moment. Irrefutably, if an automated protocol performing this task is executed, not only the radiologist will be assisted, but a better pathological assessment process can also be expected. Numerous schemes have been reported to address the issue of auto classification of brain MRI slices as normal and abnormal, but accuracy, robustness and optimization are still an open issue.


     

Dr. Farooq Ahmed


Keynote Speaker: Associate Professor
Department of Computer Science, COMSATS.

 

Petri net based Formal modelling and analysis of business processes in Information Systems

Abstract:An information system usually controls and support s business processes while information systems and business processes interact with each other. Models play an important role in the life cycle models and they provide a comprehensive understanding of a process. There are many business process modeling techniques given in the literature, e.g., flow charts, DFD, role activity diagram etc which were found as the most frequently used and therefore they are considered as the main techniques. However, literature reflects several issues which include non-availability of standard notations and they are not supportive for the formal analysis. To alleviate these shortcomings, formal techniques can be used to model business processes for information system. Formal modelling can add several advantages to configure the information systems.


     

Dr. Nazir Ahmad Zafar


Keynote Speaker: Professor
, Khawaja Fareed University of Engineering & Information Technology
Rahim Yar Khan, Pakistan

 

Model Checking Techniques for Formal Verification of Complex Systems

Abstract:Formal verification is a process of checking whether a design satisfies the required properties of computer systems. Formal verification is done using mathematical techniques based on discrete mathematics such as logic set theory, graph theory and automata to verify the correctness of systems. These approaches are required because testing or simulation-based techniques do not provide any guarantee of complete correctness of complex systems. Formal verification techniques are particularly useful for safety and security critical systems where complex behavior cannot be simulated completely. Model checking is a system verification technique based on mathematical models describing the possible state space of a system in a precise and unambiguous manner. In this talk, various model checking techniques such as linear temporal logic, computation tree logic and timed automata will be discussed with examples to show its importance and proving correctness of systems. Pros and cons of the model checking will be analyzed for further development and improvement in verification techniques.


     

Dr. Ayyaz Hussain


Keynote Speaker:Associate Professor/Chairman
Department of Computer Science & Software
International University Islamabad, Pakistan.

 

Image Restoration using soft computing

Abstract:Restoration of degraded images with noise and/or blur during acquisition, digitization, transmission processes are considered as hard problem with the basic aim of reconstructing the image as close as possible to its original form. Problem is gaining focus of the researchers due to its various applications including satellite, medical and astronomical imaging. Restoration of images is also useful for the law enforcement agencies and forensic sciences. Reconstruction of images is a multi-objective problem which includes noise removal and edge preservation. Beside their contradictory nature, these objectives are equally important for the reconstruction process. Various soft computing techniques including fuzzy logic, neural network, and evolutionary computation have been presented by the researchers to deal with restoration problem. Keynote presentation will present some of the state of the art techniques proposed recently by the researchers using variety of soft computing techniques. Furthermore, key concepts related to image restoration along with issues and challenges will be explored in the keynote speech.


     

Dr. Imdad Ali Ismaili


Keynote Speaker: Professor (Director IICT)
Institute of Information Technology
University of Sindh Jamshoro

 

Password Based Rotational Multistory Car Parking System

Abstract:Parking is a big issue in thickly populated areas and in larger cities due to heavy traffic. This intended application of rotational multistory parking system effectively minimizes this issue. It results in less space and more secure parking. ATMEL microcontroller is used as main processor while LCD and motors are as complimentary components for display and rotation. The model is based on circular mechanism giving low cost, less space and optimum performance. Password locking system is used to verify the object and detects number of free spaces available in the parking lot. The world has become a global market and numbers of vehicles are also increased to an uncontrollable situation. Keeping this problem the intended model is designed. Password locking system embedded in the work has made the parking of vehicles very much secure.


     

Dr. Muhammad Sajid


Keynote Speaker: Professor
Department of Mathematics and Statistics Faculty of Basic and Applied Sciences
International Islamic University, Islamabad.

 

Applications of non-Newtonian fluid: A historical perspective

Abstract:In this talk the basics of non-Newtonian fluids are discussed in detail in the historical perspective. The applications in polymer industry and physiology is also the part of the presentation. Some flow problems in polymer processing and physiology are discussed in detail. Some recent studies and inconsistencies in them are also part of the presentation.


     

Dr. Wajahat Qazi


Keynote Speaker: Assistant Professor
COMSATS Institute of Information Technology, Lahore

 

In silico modulation of apoptotic Bcl‐2 proteins by mistletoe lectin‐1: Functional consequences of protein modifications

Abstract:The mistletoe lectin-1 (ML-1) modulates tumor cell apoptosis by triggering signaling cascades through the complex interplay of phosphorylation and O-linked N- acetyl glucosamine (O-GlcNAc) modification in pro-and anti-apoptotic proteins. In particular, ML-1 is predicted to induce dephosphorylating of Bcl-2-family proteins and their alternative O-GlcNAc modification at specific, conserved Ser/Thr residues. The sites for phosphorylation and glycosylation were predicted and analyzed using Netphos 2.0 and YinOYang 1.2. The involvement of modified Ser/Thr, and among them the potential Yin Yang sites that may undergo both types of posttranslational modification, is proposed to mediate apoptosis modulation by ML-1. J. Cell. Biochem. 103: 479–491, 2008.© 2007 Wiley-Liss, Inc.

© Copyright UMT, 2015. All Rights reserved.

Website Credits: ICIC-Team Back to Top