Archives for October 22, 2015

Example: Viva Slides

To my students this is an example of how should you prepare for your viva slides.

Keep in brief and simple. Avoid too much text on your slides as the examiner can read the details from your thesis.

UTM eLPPT Bonus Marks

How to get this? Read this聽brochure webo edit 14.9.2015

A Quick Guide To Build Your Website

I have created this quick guide for my fellow colleague to build their official personal websites. Hope this somehow helps. Happy building my friends聽 馃槑




Design Automation Conference 2016

C A L L聽 F O R聽聽 P A R T I C I P A T I O N

**** Design Automation Conference 2016 ****

Austin Convention Center, Austin, Texas

June 5 – 9, 2016


The Automotive sessions at DAC provide a forum for people from automotive, embedded systems, security and EDA, to connect, engage, and exchange information. The sessions focused on automotive will highlight unique challenges, emerging solutions and explore the road ahead.

Automobiles today are complex electrical and electronic control systems. Nearly every aspect of the vehicle uses smart electronics and embedded software to make our transportation experience safer, more energy-efficient and enjoyable. Premium vehicles can have several million lines of embedded software running on hundreds of electronic control units connected not only with one another by in-vehicle networks but also to the cloud, other vehicles and infrastructure. As the trend towards automated driving and connectivity accelerates, the ability to deliver these innovations depends more than ever on the electronics and software development capabilities. Mastering the enormous functional complexity while satisfying safety, security as well as cost constraints requires powerful methods and tools for all development steps.

We actively seek high quality research manuscripts in the categories specified below as well as proposals for special sessions, panels, workshops, and tutorials.

Deadline for submissions:聽聽 November 17, 2015

Notification of acceptance:聽 February 16, 2016

AUTO1. Automotive Design Tools and Methodologies

聽聽聽聽聽聽 AUTO1.1 Model-based systems and software engineering

聽聽聽聽聽聽 AUTO1.2 Virtualized validation and XiL methodologies

聽聽聽聽聽聽 AUTO1.3 Formal design & verification methods

聽聽聽聽聽聽 AUTO1.4 Timing analysis and predictability

聽聽聽聽聽聽 AUTO1.5 Variability engineering and configuration management

聽聽聽聽聽聽 AUTO1.6 Design methodologies dealing with uncertainty and autonomy

AUTO2. Automotive Systems & Software Architectures

聽聽聽聽聽聽 AUTO2.1 Automotive E/E architecture design

聽聽聽聽聽聽 AUTO2.2 Parallel hardware: multi-core, many-core, GPUs

聽聽聽聽聽聽 AUTO2.3 Architectures for in-field software deployment

聽聽聽聽聽聽 AUTO2.4 Solutions for ECU consolidation

AUTO3. Safety, Security, and Reliability

聽聽聽聽聽聽 AUTO3.1 Safety requirements and their verification

聽聽聽聽聽聽 AUTO3.2 Security threat assessment and vulnerability detection

聽聽聽聽聽聽 AUTO3.3 Design for safety & security

聽聽聽聽聽聽 AUTO3.4 Mixed criticality systems

聽聽聽聽聽聽 AUTO3.5 Reliable systems based on unreliable components

AUTO4. Green & Autonomous Automotive Systems Solutions

聽聽聽聽聽聽 AUTO4.1 Driver assistance and highly automated driving

聽聽聽聽聽聽 AUTO4.2 Connected vehicles and cloud infrastructure

聽聽聽聽聽聽 AUTO4.3 Smart sensors and environment perception

聽聽聽聽聽聽 AUTO4.4 Electrified powertrain and e-mobility solutions

聽聽聽聽聽聽 AUTO4.5 Energy-aware vehicle design and optimization

DAC Automotive Track Chair:

Dirk Ziegenbein 鈥 Robert Bosch GmbH

For more information on DAC 2016 submissions please visit

DAC is recognized as the premier event for the design of electronic circuits and systems.聽 Close to 300 technical presentations and sessions are selected by a committee of electronic design experts offer information on recent developments and trends, management practices and new products, methodologies and technologies.聽 A highlight of DAC is its exhibition and suite area with approximately 200 of the leading and emerging EDA, silicon, intellectual property (IP), embedded systems and design services providers.

Cyber Security and Internet Safety

Cyber Security and Internet Safety
A Fears and Anxieties in the 21st Century Research Stream

Call for Participation 2016
Thursday 5th May 鈥 Saturday 7th May 2016
Prague, Czech Republic
As the ancient Chinese feared they would, we live in interesting times. Almost half of the global population is online and an estimated 3.2 billion people stay connected. How many of them will fall victim to cybercrimes and cyberbullying? How many will suffer from Internet Addiction and cyber-related disorders? How many will be cheated by other online users? How many will be haunted by their own past mistakes which have suddenly been posted online? On the Internet any information may become a permanent record, following the users who were not aware of the consequences of their 鈥榗lick鈥 when they shared a photo, posted a text, or filled in a form, not knowing who was on the other end. A friend of a cyber-friend may turn into a cyberbully, online love affairs may end in cyberstalking, sharing too much information may lead to cybercrimes, Internet frauds and identity thefts. Hackers, Cyberbullies, Online Predators, Catfish, and Trolls 鈥 they live offline and thrive online.

As in fairy tales of yore, World Wide Web is a space where good meets evil, where our Fears and Anxieties flourish, nurtured by real events, or rooted in imaginary phenomena, both of which can be found on the Internet which has become a mirror: reflecting the real world we live in, and changing the way we live off-line. Very often recklessness or unawareness of Internet user make them vulnerable to all sorts of cyber abuse. How can we protect ourselves and make cyberspace a safer place?

The Cyber Security and Internet Safety research stream will focus on the issues which lie at the interface of the Internet and modern challenges, anxieties and threats. This conference provides a platform for inter-, cross-, and multi-disciplinary dialogue involving participants from across the disciplinary spectrum. The event is an opportunity for knowledge and experience exchange between the researchers and individuals with an interest and expertise in the topic. We warmly welcome the victims of cyberbullying or cybercrimes and individuals who suffered from cyber-related disorders, whose testimonies will become invaluable contribution to understanding of the complex reality of cyber threats.

Internet in itself is not a danger, but Internet users can be a danger to themselves and to others. In order to recognize and understand cyber threats and perils, we invite academics and professionals, practitioners, business and NGOs, volunteers and activists, Foundations and Organizations, to share with us their insights, skills and experiences. Internet Safety can be approached from many perspectives: psychology, psychiatry, sociology, criminology, international relations, human rights, social marketing, media studies, literature, culture studies, medicine and law. The deep interdisciplinary engagement will foster greater understanding and awareness of the dangers of the internet.

Proposals are invited for presentations, case studies, workshops, panels, reports, readings, screenings, testimonies and discussions addressing issues might include (but are not limited to) any of the following themes:

1. Cyber LIFE
Mental Health Concerns. Internet Addiction Disorder and cyber-related disorders:
鈥 compulsive web surfing, information overload
鈥 online sex addiction and compulsive use of Internet pornography
鈥 online gambling, gaming, compulsive Internet shopping etc. and other net compulsions
鈥 cyber-relationship addiction, compulsive social networking, texting, sexting, messaging
鈥 consequences, treatment, therapy
鈥 Creating, crossing and understanding cyber boundaries

2. Cyber FRIENDS
鈥 Blending of online and offline lives
鈥 Human Relationships Online 鈥 changes and dangers
鈥 Cyber Friends vs. Real-life Friends
鈥 Reshaping the meaning of a 鈥榝riend鈥 and 鈥榝riendship鈥
鈥 A friend of a friend may be an enemy 鈥 dangers of 鈥榮haring鈥 personal information
鈥 鈥業 shared a photo鈥: dangers of sexting

3. Cyber SELF
鈥 Counting friends, counting 鈥榣ikes鈥 and 鈥榮hares鈥: Self-esteem in the Internet Age
鈥 Online performance and the Ideal Self on social networking sites
鈥 Digital Narcissism
鈥 Selfie Generation
鈥 Daily vlogging: selling the Self
鈥 Cyber leisure

4. Cyber HEALTH
鈥 Cyberchondria
鈥 Dangers of Self-diagnosing
鈥 鈥楧r Google鈥 and its patients
鈥 Online pharmacy: buying medicines over the Internet
鈥 Preventing medical risks generated online

5. Cyber 鈥楲OVE鈥
鈥 Cyber-dating, cyber-sex
鈥 Online relationships and love-affairs
鈥 Catfish, false identity and online romance
鈥 Stalking and Cyberstalking
鈥 Grooming and Sexual Abuse
鈥 Experiencing cyber 鈥榣ove鈥
鈥 Online relationships in literature, films, and the media

6. Cyber HATE
鈥 Hate speech, Flaming and Trolling
鈥 Traditional Bullying vs. Cyberbullying
鈥 Cyberbullied to Death: Teenagers鈥 Suicides
鈥 Cyber Predators, their Victims and Bystanders
鈥 Bystander Effect and online insensitivity
鈥 Prevention Programs and Campaigns
鈥 Social marketing and combating cyberbullying

7. Cyber CRIMES
鈥 Internet fraud, identity theft
鈥 Risky online behaviors
鈥 Child pornography online
鈥 Drug trafficking via Internet
鈥 Blackmail and extortion
鈥 Hackers and cyber-attacks
鈥 Victims of cyber crimes

8. Cyber POLITICS:
鈥 WikiLeaks, surveillance,
鈥 privacy, security
鈥 propaganda in the Internet Age
鈥 war online (Kosovo, Syria, Ukraine, War on Terrorism)
鈥 covering armed conflicts online, etc.
鈥 experiencing cyber politics

Further details and information can be found at the conference web site:

Call for Cross-Over Presentations
The Cyber Security and Internet Safety project will be meeting at the same time as a project on Domestic Violence and Abuse (The Violence Project) and another project on Growing Up, Growing Old. We welcome submissions which cross the divide between both project areas. If you would like to be considered for a cross project session, please mark your submission 鈥淐rossover Submission鈥.

What to Send
300 word abstracts, proposals and other forms of contribution should be submitted by Friday 27th November 2015. All submissions be minimally double reviewed, under anonymous (blind) conditions, by a global panel drawn from members of the Project Team and the Advisory Board. In practice our procedures usually entail that by the time a proposal is accepted, it will have been triple and quadruple reviewed.

You will be notified of the panel鈥檚 decision by Friday 11th December 2015.
If your submission is accepted for the conference, a full draft of your contribution should be submitted by Friday 15th January 2016.

Abstracts may be in Word, RTF or Notepad formats with the following information and in this order:

a) author(s), b) affiliation as you would like it to appear in programme, c) email address, d) title of proposal, e) body of proposal, f) up to 10 keywords.
E-mails should be entitled: Cyber Security and Internet Safety Abstract Submission

Where to Send
Abstracts should be submitted simultaneously to both Organising Chairs:

Organising Chairs:
Magdalena Hodalska and Catalin Ghita:
Rob Fisher:

This event is an inclusive interdisciplinary research and publishing project. It aims to bring together people from different areas and interests to share ideas and explore various discussions which are innovative and exciting.

A small number of eBooks and paperbacks have emerged or are in press from the work of the Fears and Anxieties project. All papers accepted for and presented at the conference must be in English and will be eligible for publication in an ISBN eBook. Selected papers may be developed for publication in a themed hard copy volume(s). All publications from the conference will require editors, to be chosen from interested delegates from the conference.

Inter-Disciplinary.Net believes it is a mark of personal courtesy and professional respect to your colleagues that all delegates should attend for the full duration of the meeting. If you are unable to make this commitment, please do not submit an abstract for presentation. Please note: Inter-Disciplinary.Net is a not-for-profit network and we are not in a position to be able to assist with conference travel or subsistence.



PGSS AIS would like to invite UTM AIS students to participate in this workshop:
Speaker : Associate Prof Dr Maryati Mohd Yusof (Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia)
Date: 30th October 2015 (Friday)
Time: 8.30 AM – 1.00 PM
Venue: General Lab, Level 4, Menara Razak, UTM KL
Fee: Free of charge (FOC)
This course will expose participants on systematic review specifically on:
* what is the establish research method that can be applied in conducting and writing a systematic literature review
* comprehensive manner using specific techniques and tools
Limit only for 30 participants, priority for AIS Postgraduate students only.
To register, please email your name, Matric No, Program, Faculty, Email & Contact No to
Best Regards,
PGSS AIS Committee
Advanced Informatics School
Level 5, Menara Razak,
Universiti Teknologi Malaysia,
Jalan Sultan Yahya Petra (Jalan Semarak),
54100 Kuala Lumpur, Malaysia.


Web Updating Session


Eating happily after web updating session, 21 Oct 2015, UTM AIS, Kuala Lumpur.

Post doctorate position, France

Post doctorate position

Reliability in Embedded Systems: Simulation and Modeling

LAMIH-CNRS UMR University of Valenciennes and CEA-LIST Paris Saclay, France

Complex embedded systems are more and more used to fulfill safety-critical functionalities in transportation tools such as automotive, trains and avionics.聽With the increasing usage for advanced technologies, traditional ways based on redundancy of hardware units to handle reliability in such systems are no more efficient. Next generation of embedded systems for automotive applications must offer a high level of reliability; all with low manufacturing cost, high system performance and low area overheads. This trend highlights the trend to incorporate more and more functionalities in the embedded system and therefore requires a higher level of performance and reliability.

This Post-doc will be done in the framework of the EQUITAS 鈥淓nhanced Quality Using Intensive Test & Analysis on Simulators鈥, a cooperation project between university of Valenciennes, CEA-LIST at Paris (Saclay), Continental, Sherpa and All4Tec. The goal of the project is to: reduce the cost of the validation phase while increasing the test coverage, taking into account the physical faults in the design flow of an embedded system in automotive. The questions we try to answer are: How to model hardware fault? How should the system detect transient errors? How to fix the faults and to continue executing the application properly without deteriorating the execution time and energy consumption for real-time and critical applications?

The contribution of our group in EQUITAS is the modeling and the analysis of hardware faults using the UNISIM-VP ( SystemC-based simulator.聽The duties also include collaboration with PhD students working on these topics and helping to write high-impact papers and funding applications.

Required degree and skills:

脴聽聽Ph.D in computer engineering/electrical engineering/automation with knowledge in Embedded systems and their architectures.

脴聽聽Experience in scientific journals / conference publication with good English (writing and speaking).

脴聽聽Knowledge/experience in one of the following matters would be an advantage:

o聽聽聽Processor architecture, simulation, modeling and SystemC.

o聽聽聽Reliability and fault detection/management/correction techniques.

o聽聽聽Automotive and transportation system applications

An application prepared in English or French should contain:

  1. CV with the list of publications.
  2. Contact information for 2 reference persons.

Contact:聽 Sma茂l NIAR (聽聽and Reda Nouacer (