Error
  • JUser: :_load: Unable to load user with ID: 948

Keynotes & Speakers

Keep your eyes peeled for all the latest news from our speakers, then pay them back for their efforts by following them on their social media channels or dropping in on their website or blog.

A Perso-Arabic to Indic Script Machine Transliteration Model--"Prof. Gurpreet Singh Lehal Department of Computer Science, Punjabi University, Patiala, India."

A Perso-Arabic to Indic Script Machine Transliteration Model"Prof. Gurpreet Singh Lehal Department of Computer Science, Punjabi University, Patiala, India."

Keynote:
Indian sub-continent is one of those unique parts of the world where single languages are written in different scripts. This is the case for example with Punjabi, spoken by tens of millions of people, but written in Indian East Punjab (20 million) in Gurmukhi script (a Left to Right script based on Devnagri) and in Pakistani West Punjab (80 million), it is written in Shahmukhi (a Right to Left script based on Perso-Arabic). Whilst in speech, Punjabi spoken in the Eastern and the Western parts is mutually comprehensible in the written form it is not. This is also the case with other languages like Urdu and Hindi (whilst having different names, they are the same language but written, as with Punjabi, in mutually incomprehensible forms). Hindi is written in the Devnagri script from left to right, Urdu is written in a script derived from a Persian modification of Arabic script written from right to left.  A similar problem resides with the Sindhi language, which is written in a Persio-Arabic script in Pakistan and both in Persio-Arabic and Devanagri in India. Similar is the case with Kashmiri language too.  Konkani is probably the only language in India which is written in five scripts Roman, Devnagri, Kannada, Persian-Arabic and Malayalam. The existence of multiple scripts has created communication barriers, as people can understand the spoken or verbal communication, however when it comes to scripts or written communication, the number diminishes, thus a need for transliteration tools which can convert text written in one language script to another script arises. A common feature of all these languages is that, one of the script is Perso-Arabic (Urdu, Sindhi, Shahmukhi etc.), while other script is Indic (Devnagri, Gurmukhi, Kannada, Malayalam). Perso-Arabic script is a right to left script, while Indic scripts are left to right scripts and both the scripts are mutually incomprehensible forms. Thus is a dire need for development of automatic machine transliteration tools for conversion between Perso-Arabic and Indic scripts.Machine Transliteration is an automatic method to generate characters or words in one alphabetical system for the corresponding characters in another alphabetical system. The transformation of text from one script to another is usually based on phonetic equivalencies. We present Sangam, a Perso-Arabic to Indic script machine transliteration system, which can convert with high accuracy text written in Perso-Arabic script to one of the Indic script sharing the same language. The system has been successfully tested on Punjabi(Shahmukhi-Gurmukhi) , Urdu (Urdu-Devnagri)  and Sindhi(Sindhi Perso Arabic - Sindhi Devnagri) languages and can be easily extended for other languages like Kashmiri and Konkani text.

Graphene Based On-chip Interconnects and TSVs: Prospects and Challenges--" Brajesh Kumar Kaushik Microelectronics and VLSI Group, Department of Electronics and Communication Engineering, I. I. T., Roorkee, Uttarakhand"

Graphene Based On-chip Interconnects and TSVs: Prospects and Challenges" Brajesh Kumar Kaushik Microelectronics and VLSI Group, Department of Electronics and Communication Engineering, I. I. T., Roorkee, Uttarakhand"

Keynote
The conventional on-chip interconnect copper material is unable to meet the requirements of future technology needs, since it demonstrates lower reliability with down scaling of interconnect dimensions. Therefore, researchers are forced to find an alternative solution for interconnects. Graphene nano interconnects have been proposed as promising interconnect materials due to their unique physical properties such as higher thermal conductivity, current carrying capability and mechanical strength. Graphene nano interconnects can be classified into carbon nanotubes (CNT) and graphene nanoribbons (GNR). CNTs are made by rolling up of graphene sheet in a cylindrical form and GNR is a strip of ultra-thin width graphene layer. Most of the physical and electrical properties of GNRs are similar to that of CNTs, however, the major advantage of GNRs over CNTs is that both transistor and interconnect can be fabricated on the same continuous graphene layer. Therefore, one of the manufacturing difficulties in formation of perfect metal-nanotube contact can be avoided. On other hand, the GNRs fabricated till-date, have displayed some level of edge roughness. The electron scattering at rough edges reduces the mean free path (MFP) that substantially lowers the conductance of the GNR. This fundamental challenge limits the performance of GNR interconnects. Presently, researchers and industrialists are standing at crossroads where they need to make subtle improvements to make CNTs and GNRs a workable solution for future.The conventional planar integrated circuit (2D) packaging technique has already hit the red brick wall and is almost on the verge of extinction due to limited number of I/O pins and lower bandwidth. The best way to move towards the “More-than-Moore” technologies is 3D IC packaging, where the dies are vertically stacked. The electrical connections between the dies are established by through silicon vias (TSVs). The idea of using CNTs and GNRs as filler material in TSVs has also rapidly gained research interests. Considering the above-mentioned issues, this talk will analyze and compare the performance of CNTs and GNRs for both on-chip interconnects and TSVs applications.

Current State of Cyber Crimes in the State of Jammu and Kashmir--"Sh. Muhammad Rayees Bhat, IPS, SP, Hazratbal, Srinagar."

Current State of Cyber Crimes in the State of Jammu and Kashmir"Sh. Muhammad Rayees Bhat, IPS, SP, Hazratbal, Srinagar."

 Expert Lecture
It has been often said that the basic nature of crime is theft... that all crime is theft. Only the dimensions of theft change, the paradigms keep shifting and the convoluted course of time shapes the contours. Every innovation in history has brought a flurry of change in human lifestyle and society. Law and crime being barometers of society have naturally witnessed similar changes. Proverbially crime has stayed one-step ahead of the law. In practice, law has always been a subject of supply-demand dynamics; and once in, it has anticipated a larger slew of likely demands and adapted accordingly. The initiation of technological daily life and the rapid movement along the information highway has led to a generational leap in the past decade. It was pretty rare to find a PC let alone one with an Internet connection then. Now it is a sine qua non. We not only have information literally at our fingertips but we can actually “use” that information in the real sense –buying tickets, comparing prices of that car we like, waiting for online sales to buy our favourite jeans – it’s all happening. And, yet it has brought on its attendant problems of that basic nature of crime – theft. Identity theft, password theft, credit card fraud, bank details phishing, spamming, online cheating, skimming, Nigerian scams, MMS “scandals”, Internet pornography, spy cams, misuse of communication devices, cyber terrorism, cyber wars and what not have become common knowledge nowadays. And, J&K has not been left untouched in this highly evolving scenario. All the above crimes have been perpetrated and are occurring here every day. The trends in cybercrimes show a disconcerting increase over the last few years. Not only cybercrime per se, but usual or traditional crimes unsupported by computer resources and communication devices are now almost unheard of! Emulation of modus operandi and learning criminal / anti-social tricks online has also become a trend. And, J&K Police has been using almost all the tools available at the global level to counter the threats posed by this nouveau aspect in crime. 

 

 

 

Test Image

Design Challenges for Low Power VLSI Circuits"Prof. Subir Kumar Sarkar, Department of Electronics and Telecommunication Engineering, Jadavpur University, Kolkata-700 032, India."

Keynote
Tremendous growth of the VLSI technology has been mainly due to progress of fabrication technology, which allowed systematic scale-down of device feature sizes and exponential growth of the integration level. Continuous device performance improvement is possible probably through a combination of device scaling, new device structure and material property improvement. Due to its small size, their potential integration level is significantly high and its low power operation solves some of the instability and reliability problems. The major challenges for design Engineers are to design new generation products, which consume minimum power, without compromising its performance or achieving minimum chip area. As we approach millennium, power dissipation has become the main design concern in many applications such as wristwatch, laptop, computers, and pace makers although early VLSI design did not consider it. The objective of such applications is minimum power for maximum battery life. Power dissipation is the greatest obstacle for Moore’s law. Modern chips consume power of which about 20% is wasted in leakage through the transistor gates. The traditional means of coping with increased power per generation has been to scale down the operating voltage of the chip but voltages are reaching limits due to thermal fluctuation effects. To save power, several tricks have been considered viz., minimize activity, glitches, effective capacitance, wire length of nodes and use of minimum possible supply voltage constrained by performance needed, design for high speed and then reduce voltage to get the desired speed.

Security Issues in IT Systems and their Management--"Prof. Abdul Quaiyum Ansari, Department of Electrical Engineering, Jamia Millia Islamia, New Delhi"

Security Issues in IT Systems and their Management"Prof. Abdul Quaiyum Ansari, Department of Electrical Engineering, Jamia Millia Islamia, New Delhi"

Keynote
IT security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction and IT Security management is a process of defining the security controls in order to protect the information assets. The issue of security related to IT systems is not only technical but is also a governance and organizational issue. Several agencies have been working simultaneously to resolve this issue both at the technical as well as at the organizational levels. Many standards have been developed to handle this complex problem. Every country has its own IT law. The Indian IT ACT 2000 aims to provide the legal infrastructure for e-commerce in India that is supposed to make a major impact for e-businesses and the new economy in India. This Key Note will focus on the generic issues of the security challenges and their management as also the various perspectives of the IT Act 2000 as related to the international IT security standards and challenges.

Deep Learning for Document Image Analysis--"Prof. Santanu Chaudhury, Dhananjay Chair Professor, FNAE, FNASc, FIAPR, Department of Electrical Enginering, I.I.T, Delhi"

Deep Learning for Document Image Analysis"Prof. Santanu Chaudhury, Dhananjay Chair Professor, FNAE, FNASc, FIAPR, Department of Electrical Enginering, I.I.T, Delhi"

Keynote
Deep networks provide a new paradigm for feature discovery and recognition.  We can approach problems of document image analysis in the framework of deep learning. We shall examine use of deep learning for scene text recognition. Next we shall present an architecture for text recognition using deep LSTM.  Text recognition involves some initial image processing steps like segmentation of lines and words which can induce error to the recognition system. Without segmentation, learning very long range context is difficult and becomes computationally intractable. Therefore, alternative soft decisions are needed at the pre-processing level. This paper proposes a hybrid text recognizer using a deep recurrent neural network with multiple layers of abstraction and long range context along with a language model to verify the performance of the deep neural network. In this paper we construct a multi-hypotheses tree architecture with candidate segments of line sequences from different segmentation algorithms at its different branches. The deep neural network is trained on perfectly segmented data and tests each of the candidate segments, generating unicode sequences. In the verification step, these unicode sequences are validated using a sub-string match with the language model and best first search is used to find the best possible combination of alternative hypothesis from the tree structure. Thus the verification framework using language models eliminates wrong segmentation outputs and filters recognition errors.

Spin Transfer Torque based Magneto-resistive Memories--"Brajesh Kumar Kaushik  Microelectronics and VLSI Group, Department of Electronics and Communication Engineering, I. I. T, Roorkee, Uttarakhand"

Spin Transfer Torque based Magneto-resistive Memories"Brajesh Kumar Kaushik Microelectronics and VLSI Group, Department of Electronics and Communication Engineering, I. I. T, Roorkee, Uttarakhand"

Keynote
Researchers believe spintronics to be one of the most promising technologies to replace the conventional CMOS technology that suffers from severe static leakage beyond 22nm technology node. Spintronics is an emerging technology that exploits an electron's spin orientation and its associated magnetic moment as state variable. It involves the storage of information in terms of non-volatile magnetization state instead of the charge. Thus, the new goal is to develop computing architecture that can normally be off when not in use to prevent static leakage. Moreover, such architecture can be turned on instantly with full performance when required. The primary requisite to achieve non-volatile architecture is non-volatile RAM (NVRAM). Most promising technology to achieve non-volatile RAMs is the emerging spintronics based magneto-resistive memories that switches by spin transfer torque (STT).Spintronics based magneto-resistive memories were revolutionized by the phenomenon of spin transfer torque (STT) effect, first demonstrated by J.C Slonczewski in 1996. After this monumental discovery, spintronics based magneto-resistive memories have evolved considerably in the last decade into their novel form known as spin transfer torque magneto-resistive random access memories (STT MRAMs). STT MRAMs store data as the resistance state of a magneto-resistive device known as magnetic tunnel junctions (MTJs). An STT MRAM cell is composed of two primary components: the "Magnetic tunnel junction," which is usually characterized by magneto-resistance and switching current density, and the "Access device," which allows a given memory cell to be addressed for read or write. This talk will target for a clear understanding of STT MRAMs in terms of architecture, operation and performance comparison with other volatile and non-volatile memory technologies. Moreover, the talk will also focus towards the recent developments and challenges ahead for STT MRAMs.

Information Theoretic Perspective on Cognitive Radio Networks --"Prof. A. K. Chaturvedi, IIT Kanpur."

Information Theoretic Perspective on Cognitive Radio Networks "Prof. A. K. Chaturvedi, IIT Kanpur."

Cognitive radios hold tremendous promise to increase the spectral efficiency of wireless systems. We will start with a brief introduction to information theory and cognitive radio networks and then discuss the fundamental capacity limits in such networks. We will characterize a cognitive radio as an intelligent device that can use side information about its environment to improve spectral utilization.

Detecting Forgery in Images: A Statistical Perspective--"Ajaz Hussain Mir,  Department of Electronics and Communication Engineering, National Institute of Technology (NIT), Srinagar, India."

Detecting Forgery in Images: A Statistical Perspective"Ajaz Hussain Mir, Department of Electronics and Communication Engineering, National Institute of Technology (NIT), Srinagar, India."

Keynote
Images have become inseparable part of our life. Almost in all fields ranging from media to evidence in courtrooms, images play an important role. Whereas digitization of images have opened new vistas in image, processing and analysis techniques that enable to extract concealed information from images that may even be beyond visual perception. However, because of the easy availability of photo editing software’s digitized images have, at the same time, become vulnerable to image tampering. Attacker may tamper the images to mislead the public, distort truth, and destroy someone's reputation without leaving any trace. This puts authenticity of any image in doubt. Although techniques like watermarking and stenography can be used to check authenticity of an image but these techniques are no longer viable for every generated image in view of cost in terms of time and complexity. This limitation is overcome by digital image forensics. We need a reliable forensic technique that is able to act as an evidence to image authenticity. A number of forensic image authenticity techniques have been proposed. These work with varying degree of reliability. In our approach, we base our solution on the hypothesis that tampering may change underlying statistics of an image; though traces left by tempering may not be perceptible. It may be pointed out that a number of image forgery techniques exist. However, to test the proposed technique we have used two most commonly used forgery techniques Copy-move and splicing on images taken from two standard databases CASIA and CoMoFoD. To test the proposed hypothesis, efficacy of Grey Level Run Length Method (GLRLM) based on second order statistics has been used to detect forgery in images. The features obtained based on GLRLM have demonstrated the potential of proposed method in detecting image forgeries. 

Technology Innovation and Diffusion Practical approach towards 'Make in India'--"Prof. G. Mohiuddin Bhat  Department of Electronics & Instrumentation Technology, University of Kashmir, Srinagar."

Technology Innovation and Diffusion Practical approach towards 'Make in India'"Prof. G. Mohiuddin Bhat Department of Electronics & Instrumentation Technology, University of Kashmir, Srinagar."

'Make in India', an international marketing strategy conceptualized by the Prime Minister of India, Shri Narendra Modi  in September, 2014, has been aimed to boost the industrial production and labour intensive manufacturing in India. The objective is to create a job market for a largely unemployed population of 1.2 Billion people in the country, needing about one Million additional jobs every month. The economy of Indian, presently based on agriculture, cannot be left on the mercy of the unpredictable south-west Monsoons. In order to sustain the rapid growth and alleviate poverty, India rightly needs to harness its potential of 'Make in India'. From the invention of Penicillin to the present day Mobile phone, history is witness to the fact that innovations and inventions have enabled societies to produce more. However, technology innovations can contribute towards productivity only through their application, adoption, and diffusion. Liberal support for technology innovation will enhance entrepreneurship development, which will in turn accelerate the economic growth. Technology innovation and its diffusion are, thus, very crucial towards boosting the manufacturing and service sectors. However, in spite of its large publicly funded science & technology infrastructure, India has not been able to realize its innovative potential. The decrease in the number of indigenous patent applications being filed in India in recent years has raised several questions on the promotion of innovation eco-system in the country. While China topped the global list by filing 5,26,412 Patent applications in the year 2011 (with USA having 5,03,582 patent applications, as runner up), only 42,291 patent applications were filed in India during this period. Realizing that innovation led entrepreneurship development shall promise an economic growth; the Govt. of India has recently taken several initiatives with an innovation agenda. Declaration of 2010-20 as the Decade of Innovation, establishment of National Innovation Council and formulating the Science, Technology & Innovation Policy-2013 (STIP-2013) are indicative of some positive developments in this regard. Further, national level Organizations and programmes like National Innovation Foundations (NIF), Promotion of Innovations among Individuals and MSMEs (PRISM), Grass-root Innovation and Augmentation Network (GIAN) are several other initiatives launched in this direction. Creation of a robust national innovation eco-system is one of the key elements listed in the Science Technology Innovation Policy-2013 of the Govt. of India. With a focus on the new initiative of 'Make in India', as conceived by the Prime Minister of India, this article summarizes the possibilities and challenges in the implementation of the initiative through innovation-led entrepreneurship development. The support available for promotion of innovations in the formal and non-formal sectors, as well as the process for protecting innovations through patenting, leading to the diffusion of innovative technologies have been discussed. The recommendations identified in the article shall ensure the flow of technology from academia to the industry, thereby transforming ideas into wealth, and creating a job market in the country. 

Moving Towards “Flawless Telepresence” Systems of the Future-- "Prof. M. Salim Beg Department of Electronics Engineering,Z. H. College of Engineering & Technology, A.M.U., Aligarh."

Moving Towards “Flawless Telepresence” Systems of the Future "Prof. M. Salim Beg Department of Electronics Engineering,Z. H. College of Engineering & Technology, A.M.U., Aligarh."

Keynote
To be able to communicate and compute anywhere and anytime has been one of the goals for last few decades. Due to the huge investments in R&D in the area of Wireless networks in general, and Mobile Communications and computing in particular, both in the academia and the industry, there has been tremendous outcome in terms of new technologies being developed, as well as resulting products and services.We have in fact now moved on from terms like ‘Ubiquitous Communications’ or ‘Ubiquitous computing’ to newer areas. The traditional mobile and wireless communication networks combined with multimedia communication gave rise to sending text, audio, image, and video to any person, any time, and at any place. In future, several new systems will be made available to us that will lead to something that may be referred to as “flawless telepresence”. The latter implies technologies dealing with not just traditional multimedia elements like text, audio, image, video but incorporating newer elements like smell, touch, and taste. All this will lead to newer frontiers and a paradigm shift in our concept of both computing and communication. Of course, the expectations of users in terms of Quality of Service is growing higher and higher. Thus, one would expect from the service providers to give networks in future that provide richer quality of service and experience by incorporating newer techniques, systems, and networks. While there will be a lot of contributing and enabling technologies for these ‘flawless telepresence’ systems of future, this talk would concentrate mainly on (i) mobile/wireless communication systems and networks (ii) coding and compression of multimedia information and new multimedia systems. Some of the trends and directions in research in these areas will be covered in the talk.