research in the computing industry

81
Khan M Nafee M Sadh Software Engineer, Samsung Bangladesh R&D Center Ltd. Research in the Computing Industry what industry is dreaming and how we can march

Post on 18-Oct-2014

569 views

Category:

Technology


1 download

DESCRIPTION

This presentation was used in a Talk that I gave in First CSE Festival at KUET in 2012 This talk covered "Research in the Computing Industry" to inspire students of the undergrad program and to familiarize them with research in the industry.

TRANSCRIPT

Khan M Nafee M Sadh Software Engineer, Samsung Bangladesh R&D Center Ltd.

Research in the Computing Industry

what industry is dreaming and how we can march

About the Presenter

Research in the Computing Industry nafSadh

SAMSUNG

Research in the Computing Industry nafSadh

Doing things in the smart way

Research in the Computing Industry nafSadh

Why do research?

Research in the Computing Industry nafSadh

Create Ideas

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

To find a new way

Research in the Computing Industry nafSadh

For a better world

Research in the Computing Industry nafSadh

Research on what?

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

Cloud for masses demands

Research in the Computing Industry nafSadh

Data protection as a service, in the cloud

Research in the Computing Industry nafSadh

Mobile cloud computing

Research in the Computing Industry nafSadh

Standardization issue of Cloud computing

Too many standardization approaches!

Establishes a

transport

mechanism for

moving virtual

machines from

one hosted

platform to

another

CPIP: Met standard with

profiles for existing and in

progress cloud

computing standards in

areas such

as applications, portability,

and management.

SIIF: Establishes the

characteristics necessary

to

create cloud

interoperability and

federation

Provides

standardization for

client interactions with

cloud-based storage,

cloud data

management, and

cloud-to-cloud

storage interactions.

Develop APIs for

cloud management

tasks. APIs

enable interfacing

between IaaS cloud

implementations.

iD Cloud focuses on

security issues such as

identity

management and

vulnerability mitigation.

Symptoms Automation

Framework establishes

communications so that

cloud providers

understand

consumer requirements.

Open

Virtualization

Format (OVF)

CPIP

SIIF

Cloud Data

Management

Interface

(CDMI)

Open Cloud

Computing

Interface

(OCCI)

IDCCloud Technical

Committee

Symptoms

Automation

Framework Technical

Committee

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

The big data ecosystem

Research in the Computing Industry nafSadh

Natural language processing

Research in the Computing Industry nafSadh

Big data analysis

Watson (IBM)

Social trend Language aided

services robots

analysis

human talks to machine

Natural language processing

Research in the Computing Industry nafSadh

Trust and Security

/Eligibility /Uniqueness /Accuracy

/Soundness /Privacy /Fairness

/Transparency /Robustness

/Uncoercibility /Receipt-freeness

/Verifiability

Research in the Computing Industry nafSadh

Trust and Security

Researchers have proposed multiple solutions to cross-

site scripting, but vulnerabilities continue to exist in

many Web applications due to developers’ lack of

understanding of the problem and their unfamiliarity

with current defenses’ strengths and limitations.

Research in the Computing Industry nafSadh

Trust and Security

Voting codes, risk analysis, and election forensics can

help the public build and maintain trust in an Internet

voting system by assuring that it meets important

security and privacy requirements.

Research in the Computing Industry nafSadh

Trust and Security

Context-aware security systems identify the

circumstances under which users are trying to access a

network and what they want to do with the data they

want to obtain. The system then handles the

transaction in accordance with the host organization’s

security policies.

Research in the Computing Industry nafSadh

Trust and Security

/Traditional security techniques often don’t work well

Research in the Computing Industry nafSadh

Trust and Security

/The attacks on CAs are now serving as a catalyst for

rethinking Internet security.

Research in the Computing Industry nafSadh

Trust and Security

/Security, data protection, trust management,

authentication, and authorization are crucial assets in

the Internet of Services. Online testing enhances

trustworthiness among federated services that are

often independently developed, deployed, and

maintained.

Research in the Computing Industry nafSadh

going green

Research in the Computing Industry nafSadh

Energy management in computers

Research in the Computing Industry nafSadh

Energy harvesting

Research in the Computing Industry nafSadh

Human – Machine Interaction Going beyond keyboards

Research in the Computing Industry nafSadh

//Keyboard

Research in the Computing Industry nafSadh

/In-car interactive system. The system uses a depth camera to detect complex gestures, making it

possible for the driver to execute multiple tasks simultaneously with one gesture.

Research in the Computing Industry nafSadh

HMI In the wall-sized

interaction with large datasets)

Research in the Computing Industry nafSadh

HMI In the wall-sized interaction with large datasets)

Research in the Computing Industry nafSadh

Brain Computer interface

electrocorticography (ECoG), intracortical electrodes (ICE), functional near-infrared spectroscopy (fNIRS), functional magnetic resonance imaging (fMRI), magnetoencephalography (MEG), electroencephalography (EEG)

Research in the Computing Industry nafSadh

//APPLICATIONS

//CHALLENGES

Brain Computer interface

Research in the Computing Industry nafSadh

/HCI system of using computer-generated electrical stimulation to control muscles /Can be used to

teach and train

Research in the Computing Industry nafSadh

Biomedical

Research in the Computing Industry nafSadh

Handwriting recognition

Research in the Computing Industry nafSadh

Emot

ion

dete

ctio

n an

d fa

cial

exp

ress

ions

Research in the Computing Industry nafSadh

Facial recognition

biometric

Research in the Computing Industry nafSadh

Human Ear Recognition biometric

//morphological components of ear

helix rim, lobule, antihelix, concha, tragus, antitragus, crus of helix, triangular fossa, and incisure intertragica

Research in the Computing Industry nafSadh

Augmented reality

Research in the Computing Industry nafSadh

Augmented reality

Research in the Computing Industry nafSadh

Automotive infotainment

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

Financial engineering

Research in the Computing Industry nafSadh

Computational insight for business and organizations

/Traders increasingly use automated

systems for one or more stages of the

trading process, yet the secrecy and

complexity of the algorithms prompt

providing an overview of how these

systems work.

Research in the Computing Industry nafSadh

Computational insight for business and organizations

/HCI system of using computer-generated electrical stimulation to control muscles /Can be used to

teach and train

Research in the Computing Industry nafSadh

Computational insight for business and organizations

Process mining techniques enable process-

centric analytics through automated process

discovery, conformance checking, and model

enhancement.

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

Social advertising

Research in the Computing Industry nafSadh

Knowledge engineering

Research in the Computing Industry nafSadh

Software

#online test for services //Authentication in Service Federations /* Security, data protection, trust management, authentication, and authorization are crucial assets in the Internet of Services. Online testing enhances trustworthiness among federated services that are often independently developed, deployed, and maintained */

Research in the Computing Industry nafSadh

Software

#Buffer-Overflow Vulnerabilities //exploits /* Buffer-overflow exploits */ /* function activation record exploits*/ /* Pointer subterfuge exploits*/ /* Heap-based exploits*/ //defending against it /* defensive coding */ /* runtime instrumentation */ /* Static code analysis */ /* Combined static and dynamic code analysis */

Research in the Computing Industry nafSadh

Software

#S/W for infrastructure /* Infrastructure software needs more stringent correctness, reliability, efficiency, and maintainability requirements than nonessential applications. This implies greater emphasis on up-front design, static structure enforced by a type system, compact data structures, simplified code structure, and improved tool support.*/

//programming techniques /* compute less */ /* access memory less */ /* practice type rich programming */ /* use libraries */ /* prefer highly structured code */

Research in the Computing Industry nafSadh

#Runtime Variability //The Promise and Challenge /* Runtime variability offers a good choice for many systems that experience dynamic changes in their quality and context */

Software

Research in the Computing Industry nafSadh

Software Engineering

//theory for practitioners /* Applying scientific theories to create, analyze, and

justify methods and techniques is essential to move

something from craft to engineering */

/* As long as theoreticians do not take into account issues from practice, their work will not be very helpful from a pragmatic viewpoint and will not find an immediate road into practice. */

Research in the Computing Industry nafSadh

Software Engineering

//for embedded systems /* designing for change */

/* fault tolerance */

/* autonomy */

Research in the Computing Industry nafSadh

Software Engineering

//for Services and Cloud /* Service-oriented software engineering incorporates

the best features of both the services and cloud

computing paradigms, offering many advantages for

software development and applications, but also

exacerbating old concerns.*/

/* Because users’ businesses rely heavily on third-party service providers, there are serious concerns about how threats to service reliability and availability could affect a service and consequently a cloud user’s business.*/

Research in the Computing Industry nafSadh

Geo-location

Research in the Computing Industry nafSadh

STM’s geo-location chip

Research in the Computing Industry nafSadh

Visible Light Communication

In search for better ways to Tx data, researchers turned to long discussed: visible light communications

under the hood

advantages

/security /energy efficiency /wider spectrum

more capacity

Research in the Computing Industry nafSadh

Digital signage

Research in the Computing Industry nafSadh

Accessibility and support for the disabled

Research in the Computing Industry nafSadh

Long-Distance Wireless Recharging

Research in the Computing Industry nafSadh

Surveillance

Research in the Computing Industry nafSadh

Research in the Computing Industry nafSadh

Remember the names

Research in the Computing Industry nafSadh

Remember the names

Research in the Computing Industry nafSadh

Remember the names

Research in the Computing Industry nafSadh

Remember the names

Research in the Computing Industry nafSadh

Remember the names

Research in the Computing Industry nafSadh

How to research?

Research in the Computing Industry nafSadh

Research: /Search /Innovate /Read /Write /Implement

Research in the Computing Industry nafSadh

nafSadh

Research in the Computing Industry Khan M Nafee M Sadh

thank you