WP 2.1.2: Advanced, Intelligent, Analytics Driven Apps for Software Defined and Functionally Virtualized Networks

Networks are moving towards being adaptive. This means that automation will be used to replace processes which are today highly manual. This project proposes a development of knowledge in the area of algorithms required to enable adaptive networks. The project will train two PhD students to understand optical networks and devise optimization algorithms in the areas of interest. In particular, the algorithms will be devised to be fast and near-optimal to enable their implementation in the network in accordance with operator’s goals of making the network near-optimal and adaptive.

Characterization of a new ion source for mass spectrometry

Characterization of the energy distribution of ions generated by the plasma in an Inductively Coupled Plasma Mass Spectrometer (ICP-MS) instrument is necessary for a new ion source in that it influences the ion sampling process, transmission efficiency, focusing, and mass analysis in ICP-MS. These energy distribution phenomena are also analogous to the ion beam that has been generated from an electron impact ionization (EI) source. Similarly, better understanding of the ion beam profile results in a better optimization of the EI source for superior performance.

Device-free healthcare approaches for human activity monitoring and positioning by using Wi-Fi signals

As the world aging process quickened, the need for healthcare solutions to support seniors living on their own is recognized as a serious medical and social problem. Though an extensive amount of research has been carried out to investigate human activity based on a range of device-oriented (e.g., wearable) and device-free (e.g., vision based) sensing technologies. Monitoring activities of clinical relevance for senior well-being (e.g., eating, sleeping and falls) is still very challenging.

Employing Data Mining Strategies for Intelligent Project Management

Typical accounting systems are built for accountants, and they are great for filing a year-end. However, they are a burden at running day-to-day consulting companies where every hour has value. The GroupThinq accounting application tackles this problem by providing a framework to control, in real-time, every aspect of a company, helping teams to run projects, connecting teams across organizational silos, and making visible the value of time for every team member.

Blockchain based Software Validation

For a software application to be released, it may need a number of standard certifications, which should be issued from different associations and for a wide range of software features (e.g., security, perfor-mance, scalability). We call these associations trusted third parties. The main problem with these trust-ed third parties is that they are single points of failures. For example, if one of these parties gets hacked many software source codes could be stolen.

Advanced Security and Privacy Schemes for Smart, Connected, and Autonomous Vehicles

Smart, connected, and autonomous vehicles enable crash prevention, enhanced safety, mobility and environmental benefits. Despite the potential benefits of smart, connected, and autonomous vehicles, significant security and privacy challenges remain to be addressed before widespread deployment for intelligent transportation systems may begin. In this project, we identify and analyze the risks and vulnerabilities associated with cyber-attacks related to smart, connected, and autonomous vehicles.

Chain Certs: Development of a platform for organizational authenticity certificates creation

Blockchain is a decentralized and immutable data structure. The information stored on blockchain is tamper-resistant, immutable and transparent. Blockchain is an interesting platform for managing digital certificates without a central authority. Because paper certificates can be easily faked or tampered with modern computer skills. Additionally, using a central authority for issuing distributing certificates is inefficient.

In this project, we will analyze the security and scalability of different approaches to certificate management solutions using blockchain.

Privacy Preserving Federated Learning - Year two

By virtualizing all the various appliances in the network, Network Function Virtualization (NFV) became a key enabler for the coming 5G infrastructure and nowadays a major shift is under way bringing an evolution to cloud-native NFV. In the latter operational model, applications are decomposed into microservices running inside containers to enable automated installation, configuration and scaling with the dynamic network requirements beside self-healing and automated upgrading and updating of the VNFs.

Measured and perceived differences between writing on digital and analog surfaces

Digital devices have the potential to play a positive role in the classroom.  For example, longhand note-taking has been shown help learners better remember what they’ve learned than typing notes on a keyboard.  With younger generations more accustomed to using digital devices in their everyday lives, it is important that the educational system finds a way to move digital devices into the classroom in a way that these devices can support learning.  In this study, we hope to gain a better understanding of how students are able to take notes on different digital devices, and what properties m