Monthly Archives: September 2016

The 16th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2016): Fourth Call for Papers (***extended deadline***)

*** Fourth Call for Papers ***

The 16th IEEE International Symposium on Signal Processing and
Information Technology (ISSPIT 2016)

December 12-14, 2016, St. Raphael Resort, Limassol, Cyprus

http://cyprusconferences.org/isspit2016/

*** Extended deadline: Oct 6th, 2016 ***

IEEE ISSPIT 2016 is the sixteenth in a series of international symposia that
aims to cover a wide range of topics in the intersection of signal processing
and information technology and to become a fertile ground for discussions
between the two research and development communities. Apart from
sessions that will present new research results, tutorials and special sessions
will be offered as well. Papers describing original work are invited in the
general fields covered by ISSPIT, with an emphasis on the topics listed below.
Accepted papers will be published in the Proceedings of IEEE ISSPIT 2016 and
will be available via IEEE Xplore. Acceptance will be based on quality,
relevance, and originality. A contest for Best Paper Awards (senior and
student) will be held.

Papers are invited in the following (non exclusive) topics:

· Signal Processing Theory and Methods
· Signal Processing for Communications and Networking
· Design & Implementation of Signal Processing Systems
· Image, Video & Multidimensional Signal Processing
· Multimedia Signal Processing
· Biological Image and signal processing
· Audio and Acoustic signal Processing
· Health Informatics and e-Health
· Sensor Arrays
· Big Data Analytics in Signal Processing and IT
· Radar Signal Processing
· Internet Software Architectures
· Multimedia and Image Based Systems
· Mobile Information Systems
· E-Commerce
· Bioinformatics and Bioengineering
· Information Processing
· Geographical Information Systems
· Object Based Software Engineering
· Speech Processing
· Computer Networks
· Neural Networks
· Social Networks Analysis
· Internet of Things
· Engineering Systems of Systems

Prospective authors are invited to submit full-length, 6-page (max) papers in
two-column formats including diagrams and references. Authors can submit
their papers as PDF files through the online submission system to be found
on the ISSPIT 2016 website: http://cyprusconferences.org/isspit2016/. The
title page should include author(s) name(s), affiliation, mailing address,
telephone, fax, and e-mail address. The author should indicate one or two of
the above categories that best describe the topic of the paper.

IMPORTANT DATES

· Regular paper submission: October 6th, 2016 (extended)
· Notification of acceptance: October 27th, 2016
· Camera-ready version with registration: November 15th , 2016

GENERAL CHAIRS

· Christos Douligeris, University of Piraeus, Greece
· Andreas Pitsillides, University of Cyprus, Cyprus
· Andreas Spanias, Arizona State University, USA

TECHNICAL PROGRAM CHAIRS

· Ioannis Kyriakides, University of Nicosia, Cyprus
· Veselin Rakocevic, City University, UK
· Thanos Stouraitis, Khalifa University, UAE

REGISTRATION & FINANCE CHAIR

· Reda Ammar, University of Connecticut, USA

PUBLICATION CO-CHAIRS

· Josephine Antoniou, University of Central Lancanshire, Cyprus
· Christophoros Christophorou, University of Cyprus, Cyprus
· Angeliki Tsioliaridou, Foundation of Research and Technology, Greece

TUTORIALS CO-CHAIRS

· Marios Lestas, Frederick University, Cyprus (eng.lm@frederick.ac.cy)
· Vasos Vassiliou, University of Cyprus, Cyprus (vasosv@cs.ucy.ac.cy)

PLENARY & SPECIAL SESSIONS CO-CHAIRS

· Christos Liaskos, Foundation of Research and Technology, Greece (cliaskos@ics.forth.gr)
· Vicky Lesta Papadopoulou, European University Cyprus (V.Papadopoulou@euc.ac.cy)

PUBLICITY CO-CHAIRS

· Suvendi Rimer, University of Johannesburg, South Africa
· Cristiano Silva, Universidade Federal de Minas Gerais ñ UFMG, Brazil

LOCAL ARRANGEMENTS CHAIR

· George A. Papadopoulos, University of Cyprus, Cyprus

WEB MANAGER

· Kyriakos Georgiades, Easy Conferences, Cyprus

STEERING COMMITTEE

· E. Abdel-Raheem, Ain Shams University, Egypt
· R. Ammar, University of Connecticut, USA
· F. Elguibaly, University of Victoria, Canada
· A. Elmaghraby, University of Louisville, USA (Chair)
· A. Tantawy, IBM, Egypt, USA
· A. Tewfik, University of Minnesota, USA

PELANJUTAN TARIKH PERMOHONAN PROGRAM AKRAB CARE (RAKAN PEMBIMBING PERKHIDMATAN AWAM)

poster-akrab-lanjutan

borang-akrab-care

 

Assalamualaikum & Salam Sejahtera

 

  1. Bhg. Tan Sri / Datuk / Dato’/ Prof / Dr / Saudara,

 

 

Perkara di atas adalah dirujuk.

 

  1. Pihak Universiti Teknologi Malaysia melalui Bahagian Sumber Manusia, Pejabat Pendaftar sedang mencari CALON – CALON bagi menyertai AKRAB Care (Rakan Pembimbing Perkhidmatan Awam).  AKRAB Care berperanan sebagai rakan pembimbing yang akan membantu rakan sekerjadengan menggunakan kemahiran psikologi dan elemen kaunseling, menjadi sumber rujukan dan perkongsian berkaitan pembangunan kerjaya, memberi maklumat, sokongan sosial dan moral.

 

  1. Kriteria – kriteria yang diperlukan sebagai AKRAB Careadalah seperti berikut:

 

a) Markah Penilaian Prestasi 85% Bermula 2013 Hingga 2015
b) Terbuka kepada Staf Akademik & Staf Pengurusan Profesional dan Pelaksana (PPP)
c) Daripada Pelbagai Gred & Skim
d) Bersedia Membantu
e) Personaliti Menarik, Senang dan Selesa Didampingi
f) Mempunyai Nilai Empati
g) Pendengar yang Baik
h) Mudah Diajak Berbincang
i) Menunjukkan Teladan Yang Baik
j) Kualiti Peribadi Yang Baik, Berdisiplin, Berintergriti, Berkeupayaan Memimpin, Kemahiran Komunikasi dan Interpersonal serta Bersedia Melakukan Kerja – Kerja Sukarela

 

Tarikh tutup permohonan : 15 September 2016 22 September 2016 (KHAMIS)

 

* Staf UTM yang menyertai AKRAB Care akan diberi LATIHAN dan mendapat SIJIL daripada Jabatan Perkhidmatan Awam (JPA)

  1. Sehubungan dengan itu, kepada mana – mana warga UTM yang berminat untuk menyertai AKRAB Care, boleh mendapatkan borang permohonan seperti di LAMPIRANatau  di  http://registrar.utm.my/counseling/perkhidmatan/akrab-care/ dan  mengemukakan permohonan yang lengkap  kepada:

 

Timbalan Pendaftar,

Seksyen Perkhidmatan,

Bahagian Sumber Manusia,

Pejabat Pendaftar.

 

  1. Sebarang pertanyaan lanjut bolehlah berhubung dengan Siti Noraishah Mohammad Ramlan (07-5531223) atau Puan Suzanah binti Ibrahim (07-5531159).

 

 

 

Terima Kasih/ Thank You

innovative.entrepreneurial.global

 

SITI NORAISHAH BINTI MOHAMMAD RAMLAN

Pegawai Psikologi

Unit Kaunseling Staf

Seksyen Perkhidmatan

Bahagian Sumber Manusia

Pejabat Pendaftar

Universiti Teknologi Malaysia

81310, UTM Skudai, Malaysia

Tel: +607-5531223

JEMPUTAN KE SKKPU: MANAGEMENT INTERNATIONAL PARTNERSHIP & IMPACT OF UTM RANKING

Assalamualaikum w.b.t & greetings,

YBhg. Prof./Dr./Saudara,


JEMPUTAN KE SKKPU: MANAGEMENT INTERNATIONAL PARTNERSHIP & IMPACT OF UTM RANKING

Perkara di atas dirujuk dengan segala hormatnya.

Sukacita dimaklumkan bahawa pihak Universiti akan mengadakan program Siri Kuliah Pengurusan Pentadbiran Universiti (SKPPU). Butiran adalah seperti berikut:-

SIRI KULIAH PENGURUSAN PENTADBIRAN UNIVERSITI (SKPPU)

Tajuk : Management International Partnership & Impact of Ranking

Tarikh : 22 September 2016 (Khamis)

Masa : 10:00 pagi – 12:00 tengahari

Tempat : Dewan UTMLead, Blok F54, UTM Johor Bahru

Penceramah : YBhg Tn. Hj. Zainul Rashid bin Abu Bakar

Justeru itu, dijemput staf  UTM yang berkelapangan untuk menghadiri program tersebut. Kehadiran staf UTM akan diambil kira sebagai mata CPD di UTMSmile. Jika berminat hadir, sila klik kehadiran di pautan google form dibawah:
Sekian dimaklumkan. Terima kasih.

Amirul Ariff bin Zainal
Training Administrative Assistant
Career Unit
Development Section
Human Resource Division (HRD)
Registrar’s Office
Universiti Teknologi Malaysia
81310 UTM Johor Bahru, Johor.

ONLY 2 WEEKS LEFT TO REGISTER: Learn to Avoid Critical Mistakes in SDEs

unnamed

September 27, 2016 – Washington, DC Metro Area

Lunch and Cocktails Included.

Last chance: register by Friday, September 23rd to take advantage of the following special registration discount offer:

Look at some of the experts you’ll meet –

  • Steve Orrin, CTO, Federal Division, Intel Security – Taking On the Security Challenge in SoftwareDefined Data Centers
  • Ken Spangler, SVP Information Techinology & CIO, FedEx Ground & Freight Systems, Business and Enterprise Architecture in an Increasingly Connected World
  • Jim Aralis, CTO and VP of R&D, Microsemi – Software-Defined, Networking in Infrastructure
  • Constantine Polychronopoulos, PhD, VP and CTO, Citrix Systems – Delivering the Mobile Internet Through Fast & Smart Networking
  • Jamie Thomas, General Manager, Systems Strategy and Development, IBM Systems – Optimizing for Next-Generation Workloads
  • Matt Denesuk, Chief Data Science Officer, (formerly GE Software) Noodle.ai – Avoiding, Critical Mistakes in Software-DefinedMachines

Most important, the topic will be your requirements, your challenges, your questions, as you interact in this working environment with these experts. You’ll never have a better chance to get real answers – and only invest one day of your time. Click HERE to register at the special discount.

Sponsors:

unnamed-3 unnamed unnamed-1 unnamed-2

WORKSHOP on HOW TO SURVIVE PHD PROPOSAL DEFENCE

Limited to first 30 participants only!

Assalamu’alaikum and Good day,

Dear AIS students,
You are invited to attend the following academic workshop.

Workshop : How to Survive PhD Proposal Defence?
Date : 21st September 2016 (Wednesday)
Speaker : Prof Suhaimi Ibrahim
Time :9.00 am – 4.30 pm
Venue : General Lab, Level 4, Menara Razak, UTMKL

Those who are interested, pls email to pgss.ais@gmail.com :
Name :
No matric :
No IC /ID :
Email :

Best Regards,

PGSS AIS Committee
Advanced Informatics School

IoT Data and Context Discovery

This article is taken from:  here

Guest Editors’ Introduction • Arkady Zaslavsky and Prem Jayaraman • September 2016

discover-data-context-internet-of-things-200x200

One of the most valuable aspects of the emerging Internet of Things (IoT) is the data it produces. Businesses use that data to support their decisions, and — as IoT grows — they need better tools for relevant and timely discovery. These days, discovery systems can find the right data without even knowing its structure, semantics, sensor description, or location. These systems can also deduce context information such as annotations and metadata.

The term “IoT data and context discovery” refers to both activities that are specific to data providers (certain prepublication curation tasks, for example) and those that are specific to end publishers or brokers (such as integrating datasets to support data linking and context-driven search). The discovery process comprises two successive loops:

  • The foraging loop identifies, assesses, and validates data sources at the point of data acquisition, as well as extracts and formats the relevant data into a consumable form.
  • The sense-making loop processes, analyzes, and exploits the extracted data to generate relevant context, aiming to provide answers and insights.

The advent of IoT has fuelled a paradigm shift in data and context discovery. Datasets that were once confined to single applications are now discoverable and available for reuse and repurposing in multiple applications. This new paradigm provides vendors with incentive-based approaches to opening their IoT data repositories while still upholding their security and privacy policies. Despite this progress, the diversity of capabilities and standards among devices poses significant challenges. Computing Now’s September 2016 issue includes seven articles that examine opportunities and challenges in IoT data and context discovery.

A Common Consortium

Currently, different devices store data in separate “silos.” For example, Fitbit devices collect personal health data, and EarlySense devices monitor patient vital signs. Both companies produce zettabytes of data, but each keeps its data on its own servers. To fulfill the ambitious dream of a truly interconnected IoT, data would have to be stored in widely distributed, heterogeneous databases to ensure global availability. Retrieving the data would require a common, machine-readable data-representation framework.

Figure 1 depicts the guest editors’ vision of a common consortium of IoT service providers. In Figure 1a, the current vendor-specific approach creates IoT data silos by tightly coupling applications with specific sensors. In Figure 1b, a discovery-enabled system loosely couples applications and sensors to allow for interoperability and IoT data reuse and repurposing.

iot-data-and-content-discovery-figure-1

Figure 1. Vision of IoT discovery.  a) Vendor-specific IoT approaches currently create data silos. b) Our vision of a discovery-enabled system would leverage loose coupling between applications and sensors to enable interoperability, reuse, and repurposing of IoT data and context.

 

A discovery engine, supported by a context engine and an integration engine, would discover underlying IoT data sources that multiple vendors host and manage. The system would require common, well-described interfaces that utilize Internet standards such as the semantic web. The evolution of IoT and big data requires support for new data- and sensor-discovery techniques to overcome issues that prevent seamless data access and reuse.

In this Issue

This month’s Computing Now theme begins with “Physical-Cyber-Social Computing: Looking Back, Looking Forward,” by Payam Barnaghi and his colleagues. The authors introduce physical-cyber-social computing, explaining how systems interpret users’ social structures through IoT data and provide (near) real-time actionable information and services.

Dimitrios Georgakopoulos and his colleagues provide a vision of a future IoT system architecture driven by service discovery and real-time service integration in “Discovery-Driven Service Oriented IoT Architecture.” This vision includes on-demand discovery, IoT device integration, cloud storage, and computing resources.

In “Semantic Description, Discovery and Integration for the Internet of Things,” Sejin Chun and his colleagues provide a semantic, model-based IoT directory system to help manage metadata and relationships among devices. The proposed model enables shared conceptualization for efficient interaction between the devices and the online directory service.

Security is an important concern in IoT. In “Context-Sensitive Policy Based Security in Internet of Things,” Prajit Kumar Das and his colleagues propose a framework that lets IoT devices capture, represent, and enforce information-sharing policies. The authors use semantic web concepts to enable consistent policy representation and present use cases to demonstrate their design.

Matching Over Linked Data Streams in the Internet of Things,” by Yongrui Qin, Quan Z. Sheng, and Edward Curry, explores techniques for efficient dissemination of IoT data to consumers. The authors use linked open data to represent IoT data and its relationships, and then disseminate matched data based on system-registered queries. The paper presents a use case to validate the system’s applicability, speed, and efficiency.

In “Resource Discovery in Internet of Things: Current Trends and Future Standardization Aspects,” Soumya Kanti Datta, Rui Pedro Ferreira Da Costa, and Christian Bonnet discuss the current technology landscape for discovery in IoT, including advantages and limitations. They propose a centralized registry for storing resource configurations and parameters, as well as a search engine that ranks available resources and provides URIs for direct access to resources.

The final article, “The Web of Things: Challenges and Opportunities,” presents concerns arising from the increasing use of virtual representations for physical or abstract things that are accessible via web technologies. Author Dave Raggett argues that achieving a new phase of exponential growth will require open markets, open standards, and the vision to imagine the potential for this expanding network.

Industry Perspectives

This month’s Computing Now issue includes two video interviews with prominent industry experts on the importance and challenges of data and context discovery in IoT middleware, services, and applications. The first features Rodolfo Milito from Cisco in San Jose, California, who is reputed to be the father of fog computing. The second provides insight from Manfred Hauswirth, the director of Fraunhofer Institute for Open Communication Systems (FOKUS) in Berlin.

Conclusion

The articles in this Computing Now issue address various challenges that IoT data and context discovery raises, as well as propose solutions to make IoT practical, feasible, deployable, and usable. Of course, more research is necessary before IoT data and context discovery becomes a common feature of IoT applications, systems, and services. We encourage interested readers to dive into the research and join the large community of IoT champions, developers, architects, and users.

Guest Editors

Arkady Zaslavsky is senior principal research scientist at Data61 of the Commonwealth Scientific and Industrial Research Organisation (CSIRO), Australia. He is also an adjunct professor at the University of New South Wales, La Trobe University, and ITMO University. Zaslavsky has a PhD in computer science from the Institute of Control Sciences, USSR Academy of Sciences. His technical interests include the Internet of Things; pervasive, ubiquitous, and mobile computing; context-awareness; semantic data management; and mobile analytics. He is a member of the Computing Now editorial board. Contact him at arkady.zaslavsky@csiro.au.

Prem Prakash Jayaraman is a research fellow at the Swinburne University of Technology. His research interests include the Internet of Things, cloud computing, big-data analytics, and mobile computing. Jayaraman has a PhD in computer science from Monash University. Contact him at prem.jayaraman@gmail.com or www.premjayaraman.com.

 

SIRI MESEJ INTEGRITI 9 : PAKAILAH PAKAIAN YANG SESUAI KE PEJABAT

Salam dan Selamat Sejahtera kepada warga UTM sekalian,

Siri Mesej Integriti pada kali ini ingin berkongsikan berkenaan dengan pakaian yang sesuai ke pejabat. Nampak seperti perkara remeh, tetapi kadang – kala masih wujud golongan yang tersasar dalam memilih pakaian YANG BETUL untuk ke pejabat, yang membuatkan orang lain berasa sakit mata memandang.
Setiap hari kita akan berpakaian dengan gaya tersendiri ke pejabat. Tiada sesiapa dapat menafikan bahawa gaya pemakaian seseorang individu memainkan peranan yang amat besar di tempat kerja. Cara berpakaian atau penampilan seseorang pekerja biasanya menarik perhatian majikan mereka dan ada juga ada masanya dimana ia menjadi faktor penghalangseseorang itu tidak boleh pergi jauh dalam bidang kerjaya mereka.
Oleh itu, untuk membantu anda tampil sempurna dengan gaya yang sesuai ke pejabat, berikut merupakan 11 tips pemakaian yang boleh anda jadikan sebagai panduan:
1. Kenal pasti kod pemakaian di pejabat anda 
Melihat situasi kerja di UTM, tidak semua pegawai perlu memakai pakaian formal ketika bekerja, namun majoriti perlu begitu. Hal ini mengambil kira bidang kerja yang dijalani adalah berbeza – beza. Misalnya pemandu dengan kemeja biru, dan Pengawal Keselamatan dengan pelbagai uniformnya yang tersendiri.  Namun begitu, asas di UTM, kita dipandukan olehPeraturan 5, Bahagian II, Peraturan – Peraturan Tatatertib Badan – Badan Berkanun, Akta Badan – Badan Berkanun (Tatatertib dan Surcaj) 2000, dalam mematuhi etika berpakaian. Misalnya, pada hari Ahad kita ditetapkan untuk memakai baju batik, maka diperlukan untuk kita berbatik.Kita juga dipandukan dengan Pekeliling Perkhidmatan Bil.2 Tahun 1985 dan Pekeliling Pentadbiran UTM Bil. 5 Tahun 2006.   
2.  Pakai saiz pakaian yang betul 
Penting untuk anda memakai pakaian dengan saiz yang betul. Jangan pakai pakaian yang terlalu ketat atau terlalu longgar kerana keduanya mencacatkan penampilan anda.
3. Pastikan rambut anda kemas 
Elakkan daripada tidak menyikat rambut sebelum ke pejabat dan pastikan juga rambut anda kering,kemas dan rapi.Untuk lelaki, jangan memakai gel rambut terlalu banyak.
4. Pakai beg yang sesuai 
Perkara ini sering dianggap remeh oleh ramai orang. Tetapi sebenarnya pemilihan beg ke tempat kerja juga amat memainkan peranan yang penting. Oleh itu, pastikan beg tangan anda sentiasa kemas dan bersih.
5. Dan pilih kasut yang bersesuaian 
 
Sama seperti beg, soal pemilihan kasut juga amat penting dan oleh itu anda harus memakai koleksi kasut yang sesuai dipadankan dengan koleksi pakaian pejabat anda. Contohnya, jangan memakai sneakers bersama padanan seluar slack dan kemeja pejabat. Buat wanita, jangan memakai heels terlalu tinggi sehingga menyebabkan anda sukar untuk berjalan.Kasut terbaik adalah jenis kulit bertutup, selain melindungi kaki, anda akan kelihatan sentiasa kemas.
6. Elakkan memakai wangian yang berbau terlalu kuat 
Memang tidak dapat dinafikan, bau yang wangi boleh meningkatkan daya keyakinan seseorang individu. Namun perlu diingatkan bahawa bau yang terlalu wangi boleh menyebabkan orang disekeliling anda berasa kurang selesa.
7. Pemilihan aksesori 
Tampil ringkas dengan pemilihan aksesori yang bersesuaian dan aksesori yang paling ideal untuk dipakai oleh semua orang adalah jam tangan!
 
8. Elakkan memakai pakaian yang terlalu terang 
Lupakan warna yang terlalu terang seperti neon, oren, kuning dan seumpamanya ketika anda ingin melakukan urusan rasmi di pejabat, terutama apabila dijemput menghadiri mesyuarat dan persidangan. Warna – warna seperti itu boleh anda gayakan semasa bersantai bersama keluarga kelak.
9. Jangan bergaya terlalu seksi
Penting untuk anda membezakan koleksi pakaian yang seksi dan koleksi pakaian yang elegan. Bergaya terlalu seksi di pejabat boleh memberikan tanggapan bahawa anda kurang professional dan menyebabkan gangguan – gangguan lain yang tidak diingini.Buat wanita misalnya, baju paling ‘selamat’ adalah baju kurung. Namun tidak salah untuk kadang – kala menggayakan blouse dan skirt/seluar slack dengan corak yang sesuai.
10.Pilih jenis pakaian yang tidak bercorak terlalu ‘heavy’ dipandang mata 
Pastikan pakaian anda tidak kelihatan seperti ingin pergi ke pasar atau ke pusat membeli-belah. Sebaik-baiknya,pilih koleksi pakaian dengan rekaan dan corak yang minimal, namun masih tetap ‘smart’.Gayakan seadanya, anda akan tampak elegan dan berasa yakin.
11. Buat wanita, berhijablah dengan sempurna
Tips terakhir ini khas dikongsikan buat semua wanita yang berhijab di UTM, kerana majoriti warga UTM adalah wanita dan berhijab. Pilih hijab dengan warna yang padan dengan busana anda. Labuhkan ia seadanya menurut panduan menutup aurat yang sebenar (menutup belahan leher dan bahagian dada dengan sempurna,dilabuhkan dan tidak jarang). Gayakan hijab seadanya, selagi profesionalisme anda tidak dipersoalkan. In shaa Allah.
Sama – sama kita ambil yang positif berkenaan tips ini untuk kesejahteraan semua.
Sekian, yang baik itu dari Allah SWT, yang kurang baik daripada kelemahan kami sendiri. Terima kasih kerana meminjamkan masa anda.
RUJUKAN PERATURAN BERKAITAN :-
1.Peraturan 5, Bahagian II, Peraturan – Peraturan Tatatertib Badan – Badan Berkanun, Akta Badan – Badan Berkanun (Tatatertib dan Surcaj) 2000.
2.Pekeliling Perkhidmatan Bil.2 Tahun 1985. 
3.Pekeliling Pentadbiran UTM Bil. 5 Tahun 2006.   
4.Surat Pekeliling Pentadbiran Bil.1 Tahun 2014.
“Don’t be into trends. Don’t make fashion own you, but you decide what you are, what you want to express by the way you dress and the way to live.” –  Gianni Versace 

RAIHAN BINTI ABD KARIM 
Pegawai Integriti /Certified Integrity Officer (CeIO)
UTM Pejabat Penasihat Undang-Undang / UTM Chambers of The Legal Adviser
Sultan Ibrahim Chancellery Building
Universiti Teknologi Malaysia (UTM)
81310 UTM Skudai
Johor Darul Ta’zim
MALAYSIA.