Archives for October 2015

Real-time divisible load theory: Incorporating computation costs

Real-time divisible load theory: Incorporating computation costs

Suriayati Chuprat; Sanjoy Baruah

(Profiled Author: Suriayati Chuprat)

Proceedings – 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2011. 2011;1:33-37:[6029827].


We extend the current state of the art in real-time divisible load theory (RT-DLT), by considering the problems of scheduling a real-time divisible job on computing clusters in which different processing nodes have different computing capabilities, as well as different costs associated with executing on them. We seek to minimize the cost of executing a job while also meeting its deadline. © 2011 IEEE.





Newton-Ungku Omar Fund (NUOF) is a collaboration programme between the Government of the United Kingdom (UK) and Malaysia to develop collaboration on research and innovation. Jointly established to address socio-economic issues in Malaysia, NUOF is expected to deliver outcomes through the Science to Action (S2A) Initiative, an initiative undertaken by the Malaysian Government to enable sustainable growth beyond 2020.


Kindly be informed that a joint programme between the Academy of Sciences Malaysia (ASM) and the Royal Academy of Engineering (RAE) named as Newton Research Collaboration Programme is currently open for application as follows:

  1. a) Aims to support international exchanges between engineering researchers in the UK and Malaysia.
  2. b) Provides funding up to £24,000 for 12 months exchange programme in the area of engineering.


In relation to this, ASM wishes to invite relevant researchers to apply for the above mentioned programme. The application is open online at the RAE’s website: until 23 November 2015

Enclosed herewith is the guidance note of the programme for reference.


For any further enquiries, you may contact Ms Norazwa Musiran, Programme Manager (Science Excellence), ASM or Ms Liew Pei Shi, Programme Executive (Science Excellence), ASM (Tel: 03-6203 0633; Email: /


You may also contact UTM RMC Officer Mr Khairilanuar Mohd Hanim at Office:07-5537870 | Mobile: 0137028814 | Email: for any enquiries.

CFP: SynCoP 2016

Call for papers

SynCoP 2016
3rd International Workshop on the SYNthesis of COmplex Parameters

(ETAPS satellite event)

SynCoP aims at bringing together researchers working on verification and
parameter synthesis for systems with discrete or continuous parameters, in
which the parameters influence the behavior of the system in ways that are
complex and difficult to predict. Such problems may arise for real-time,
hybrid or probabilistic systems in a large variety of application domains. The
parameters can be continuous (e.g., timing, probabilities, costs) or discrete
(e.g., number of processes). The goal can be to identify suitable parameters
to achieve desired behavior, or to verify the behavior for a given range of
parameter values.

The workshop will take place on Sunday, April 3, 2016, in Eindhoven, The Netherlands, as a
satellite event of ETAPS.

The workshop may be able to (at least partially) support the travel and the
ETAPS workshop registration fees for one or two PhD or Master student(s).

Abstract:                      January 10, 2016 (AoE)
Full papers:                   January 17, 2016 (AoE)
Informal presentations:        February 15, 2016
Notification:                  February 22, 2016
Pre-Proceedings camera ready:  March, 7, 2016
Workshop:                      April 3, 2016
Camera ready:                  May 15, 2016


The scientific subject of the workshop covers (but is not limited to) the
following areas:
* parameter synthesis
* parametric model checking
* regular model checking
* robustness analysis
* parametric logics, decidability and complexity issues
* formalisms such as parametric timed and hybrid automata, parametric
time(d) Petri nets, parametric probabilistic (timed) automata, parametric
Markov Decision Processes, networks of identical processes
* interactions between discrete and continuous parameters
* tools and applications to major areas of computer science, biology and control


SynCoP seeks both regular papers and tool papers.

The content of papers should be original and not submitted elsewhere. All
papers will be assigned to at least three reviews.

The page limit is 12 pages in EPTCS LaTeX format
( for regular papers and 4 pages for tool papers.
All accepted papers will be published in the Electronic Proceedings in Theoretical Computer Science (EPTCS), an international refereed open access, using the Creative Commons CC-BY license. Hereby, the
authors retain their copyright. All accepted papers will be referenced using
a DOI in all major databases (such as DBLP).”

Accepted tool papers will be required to do a demo during the workshop.

Submission will be made in English in PDF format through Easychair:

* Gregory Batt, INRIA, France
* Giorgio Delzanno, Universita degli studi di Genova, Italy (tentative)

* Benoit Delahaye (Universite de Nantes, Nantes, France)
* Jiri Srba (Aalborg University, Aalborg, Denmark)


* Nikola Benes, Brno, Czech Republic
* Nathalie Bertrand, Rennes, France
* Goran Frehse, Grenoble, France
* Peter Habermehl, Paris, France
* Holger Hermanns, Saarland, Germany
* Joost-Pieter Katoen, Aachen, Germany
* Marta Kwiatkowska, Oxford, UK
* Radu Mardare, Aalborg, Denmark
* Wojciech Penczek, Warszawa, Poland
* Karin Quaas, Leipzig, Germany
* Olivier H. Roux, Nantes, France
* Ocan Sankur, France
* Tayssir Touili, Villetaneuse, France
* Lijun Zhang, China

* Parosh Abdulla, Uppsala, Sweden
* Étienne André, Villetaneuse, France
* Kim Larsen, Aalborg, Denmark
* Didier Lime, Nantes, France
* Wojciech Penczek, Warszawa, Poland
* Laure Petrucci, Villetaneuse, France

* Loig Jezequel (Universite de Nantes, Nantes, France)

SynCoP 2016 is partially supported by French project ANR PACS (Parametric analyses of concurrent systems).

Benoît Delahaye
Maître de Conférences
Responsable du M1 MIAGE
Université de Nantes/LINA
+33 (0)2 51 12 58 45

Big Data Talk

A talk on Big Data by Prof Dr Naomie.

Click for details… BIG DATA

Example: Viva Slides

To my students this is an example of how should you prepare for your viva slides.

Keep in brief and simple. Avoid too much text on your slides as the examiner can read the details from your thesis.

UTM eLPPT Bonus Marks

How to get this? Read this brochure webo edit 14.9.2015

A Quick Guide To Build Your Website

I have created this quick guide for my fellow colleague to build their official personal websites. Hope this somehow helps. Happy building my friends  😎




Design Automation Conference 2016

C A L L  F O R   P A R T I C I P A T I O N

**** Design Automation Conference 2016 ****

Austin Convention Center, Austin, Texas

June 5 – 9, 2016


The Automotive sessions at DAC provide a forum for people from automotive, embedded systems, security and EDA, to connect, engage, and exchange information. The sessions focused on automotive will highlight unique challenges, emerging solutions and explore the road ahead.

Automobiles today are complex electrical and electronic control systems. Nearly every aspect of the vehicle uses smart electronics and embedded software to make our transportation experience safer, more energy-efficient and enjoyable. Premium vehicles can have several million lines of embedded software running on hundreds of electronic control units connected not only with one another by in-vehicle networks but also to the cloud, other vehicles and infrastructure. As the trend towards automated driving and connectivity accelerates, the ability to deliver these innovations depends more than ever on the electronics and software development capabilities. Mastering the enormous functional complexity while satisfying safety, security as well as cost constraints requires powerful methods and tools for all development steps.

We actively seek high quality research manuscripts in the categories specified below as well as proposals for special sessions, panels, workshops, and tutorials.

Deadline for submissions:   November 17, 2015

Notification of acceptance:  February 16, 2016

AUTO1. Automotive Design Tools and Methodologies

·       AUTO1.1 Model-based systems and software engineering

·       AUTO1.2 Virtualized validation and XiL methodologies

·       AUTO1.3 Formal design & verification methods

·       AUTO1.4 Timing analysis and predictability

·       AUTO1.5 Variability engineering and configuration management

·       AUTO1.6 Design methodologies dealing with uncertainty and autonomy

AUTO2. Automotive Systems & Software Architectures

·       AUTO2.1 Automotive E/E architecture design

·       AUTO2.2 Parallel hardware: multi-core, many-core, GPUs

·       AUTO2.3 Architectures for in-field software deployment

·       AUTO2.4 Solutions for ECU consolidation

AUTO3. Safety, Security, and Reliability

·       AUTO3.1 Safety requirements and their verification

·       AUTO3.2 Security threat assessment and vulnerability detection

·       AUTO3.3 Design for safety & security

·       AUTO3.4 Mixed criticality systems

·       AUTO3.5 Reliable systems based on unreliable components

AUTO4. Green & Autonomous Automotive Systems Solutions

·       AUTO4.1 Driver assistance and highly automated driving

·       AUTO4.2 Connected vehicles and cloud infrastructure

·       AUTO4.3 Smart sensors and environment perception

·       AUTO4.4 Electrified powertrain and e-mobility solutions

·       AUTO4.5 Energy-aware vehicle design and optimization

DAC Automotive Track Chair:

Dirk Ziegenbein – Robert Bosch GmbH

For more information on DAC 2016 submissions please visit

DAC is recognized as the premier event for the design of electronic circuits and systems.  Close to 300 technical presentations and sessions are selected by a committee of electronic design experts offer information on recent developments and trends, management practices and new products, methodologies and technologies.  A highlight of DAC is its exhibition and suite area with approximately 200 of the leading and emerging EDA, silicon, intellectual property (IP), embedded systems and design services providers.

Cyber Security and Internet Safety

Cyber Security and Internet Safety
A Fears and Anxieties in the 21st Century Research Stream

Call for Participation 2016
Thursday 5th May – Saturday 7th May 2016
Prague, Czech Republic
As the ancient Chinese feared they would, we live in interesting times. Almost half of the global population is online and an estimated 3.2 billion people stay connected. How many of them will fall victim to cybercrimes and cyberbullying? How many will suffer from Internet Addiction and cyber-related disorders? How many will be cheated by other online users? How many will be haunted by their own past mistakes which have suddenly been posted online? On the Internet any information may become a permanent record, following the users who were not aware of the consequences of their ‘click’ when they shared a photo, posted a text, or filled in a form, not knowing who was on the other end. A friend of a cyber-friend may turn into a cyberbully, online love affairs may end in cyberstalking, sharing too much information may lead to cybercrimes, Internet frauds and identity thefts. Hackers, Cyberbullies, Online Predators, Catfish, and Trolls – they live offline and thrive online.

As in fairy tales of yore, World Wide Web is a space where good meets evil, where our Fears and Anxieties flourish, nurtured by real events, or rooted in imaginary phenomena, both of which can be found on the Internet which has become a mirror: reflecting the real world we live in, and changing the way we live off-line. Very often recklessness or unawareness of Internet user make them vulnerable to all sorts of cyber abuse. How can we protect ourselves and make cyberspace a safer place?

The Cyber Security and Internet Safety research stream will focus on the issues which lie at the interface of the Internet and modern challenges, anxieties and threats. This conference provides a platform for inter-, cross-, and multi-disciplinary dialogue involving participants from across the disciplinary spectrum. The event is an opportunity for knowledge and experience exchange between the researchers and individuals with an interest and expertise in the topic. We warmly welcome the victims of cyberbullying or cybercrimes and individuals who suffered from cyber-related disorders, whose testimonies will become invaluable contribution to understanding of the complex reality of cyber threats.

Internet in itself is not a danger, but Internet users can be a danger to themselves and to others. In order to recognize and understand cyber threats and perils, we invite academics and professionals, practitioners, business and NGOs, volunteers and activists, Foundations and Organizations, to share with us their insights, skills and experiences. Internet Safety can be approached from many perspectives: psychology, psychiatry, sociology, criminology, international relations, human rights, social marketing, media studies, literature, culture studies, medicine and law. The deep interdisciplinary engagement will foster greater understanding and awareness of the dangers of the internet.

Proposals are invited for presentations, case studies, workshops, panels, reports, readings, screenings, testimonies and discussions addressing issues might include (but are not limited to) any of the following themes:

1. Cyber LIFE
Mental Health Concerns. Internet Addiction Disorder and cyber-related disorders:
– compulsive web surfing, information overload
– online sex addiction and compulsive use of Internet pornography
– online gambling, gaming, compulsive Internet shopping etc. and other net compulsions
– cyber-relationship addiction, compulsive social networking, texting, sexting, messaging
– consequences, treatment, therapy
– Creating, crossing and understanding cyber boundaries

2. Cyber FRIENDS
– Blending of online and offline lives
– Human Relationships Online – changes and dangers
– Cyber Friends vs. Real-life Friends
– Reshaping the meaning of a ‘friend’ and ‘friendship’
– A friend of a friend may be an enemy – dangers of ‘sharing’ personal information
– ‘I shared a photo’: dangers of sexting

3. Cyber SELF
– Counting friends, counting ‘likes’ and ‘shares’: Self-esteem in the Internet Age
– Online performance and the Ideal Self on social networking sites
– Digital Narcissism
– Selfie Generation
– Daily vlogging: selling the Self
– Cyber leisure

4. Cyber HEALTH
– Cyberchondria
– Dangers of Self-diagnosing
– ‘Dr Google’ and its patients
– Online pharmacy: buying medicines over the Internet
– Preventing medical risks generated online

5. Cyber ‘LOVE’
– Cyber-dating, cyber-sex
– Online relationships and love-affairs
– Catfish, false identity and online romance
– Stalking and Cyberstalking
– Grooming and Sexual Abuse
– Experiencing cyber ‘love’
– Online relationships in literature, films, and the media

6. Cyber HATE
– Hate speech, Flaming and Trolling
– Traditional Bullying vs. Cyberbullying
– Cyberbullied to Death: Teenagers’ Suicides
– Cyber Predators, their Victims and Bystanders
– Bystander Effect and online insensitivity
– Prevention Programs and Campaigns
– Social marketing and combating cyberbullying

7. Cyber CRIMES
– Internet fraud, identity theft
– Risky online behaviors
– Child pornography online
– Drug trafficking via Internet
– Blackmail and extortion
– Hackers and cyber-attacks
– Victims of cyber crimes

8. Cyber POLITICS:
– WikiLeaks, surveillance,
– privacy, security
– propaganda in the Internet Age
– war online (Kosovo, Syria, Ukraine, War on Terrorism)
– covering armed conflicts online, etc.
– experiencing cyber politics

Further details and information can be found at the conference web site:

Call for Cross-Over Presentations
The Cyber Security and Internet Safety project will be meeting at the same time as a project on Domestic Violence and Abuse (The Violence Project) and another project on Growing Up, Growing Old. We welcome submissions which cross the divide between both project areas. If you would like to be considered for a cross project session, please mark your submission “Crossover Submission”.

What to Send
300 word abstracts, proposals and other forms of contribution should be submitted by Friday 27th November 2015. All submissions be minimally double reviewed, under anonymous (blind) conditions, by a global panel drawn from members of the Project Team and the Advisory Board. In practice our procedures usually entail that by the time a proposal is accepted, it will have been triple and quadruple reviewed.

You will be notified of the panel’s decision by Friday 11th December 2015.
If your submission is accepted for the conference, a full draft of your contribution should be submitted by Friday 15th January 2016.

Abstracts may be in Word, RTF or Notepad formats with the following information and in this order:

a) author(s), b) affiliation as you would like it to appear in programme, c) email address, d) title of proposal, e) body of proposal, f) up to 10 keywords.
E-mails should be entitled: Cyber Security and Internet Safety Abstract Submission

Where to Send
Abstracts should be submitted simultaneously to both Organising Chairs:

Organising Chairs:
Magdalena Hodalska and Catalin Ghita:
Rob Fisher:

This event is an inclusive interdisciplinary research and publishing project. It aims to bring together people from different areas and interests to share ideas and explore various discussions which are innovative and exciting.

A small number of eBooks and paperbacks have emerged or are in press from the work of the Fears and Anxieties project. All papers accepted for and presented at the conference must be in English and will be eligible for publication in an ISBN eBook. Selected papers may be developed for publication in a themed hard copy volume(s). All publications from the conference will require editors, to be chosen from interested delegates from the conference.

Inter-Disciplinary.Net believes it is a mark of personal courtesy and professional respect to your colleagues that all delegates should attend for the full duration of the meeting. If you are unable to make this commitment, please do not submit an abstract for presentation. Please note: Inter-Disciplinary.Net is a not-for-profit network and we are not in a position to be able to assist with conference travel or subsistence.



PGSS AIS would like to invite UTM AIS students to participate in this workshop:
Speaker : Associate Prof Dr Maryati Mohd Yusof (Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia)
Date: 30th October 2015 (Friday)
Time: 8.30 AM – 1.00 PM
Venue: General Lab, Level 4, Menara Razak, UTM KL
Fee: Free of charge (FOC)
This course will expose participants on systematic review specifically on:
* what is the establish research method that can be applied in conducting and writing a systematic literature review
* comprehensive manner using specific techniques and tools
Limit only for 30 participants, priority for AIS Postgraduate students only.
To register, please email your name, Matric No, Program, Faculty, Email & Contact No to
Best Regards,
PGSS AIS Committee
Advanced Informatics School
Level 5, Menara Razak,
Universiti Teknologi Malaysia,
Jalan Sultan Yahya Petra (Jalan Semarak),
54100 Kuala Lumpur, Malaysia.