Advertisment

EAIT 2012: Emerging Apps bring academicians and the industry together

author-image
DQI Bureau
New Update

The Kolkata chapter of the Computer Society of India (CSI) organized from November 29 to December 1, 2012 its third International Conference on Emerging Applications of Information Technology (EAIT). The conference, which had a number of tutorials on emerging epplications as well as papers, received a good support from both the academicians and the industry.

Advertisment

EAIT 2012 enjoyed had over 200 delegates in attendance and was deemed successful in achieving the aspiration to blend theory and practice, research and production, art and science. Hosted by the Indian Stastical Institute (ISI), the conference proved a platform where the participants deliberated on the technical as well as the business challenges involved.

In welcoming the delegates, Prof. D P Mukherjee, organizing chair, presented the need of the hour in encouraging cutting edge R&D. Prof. Bimal K Roy, director, ISI inaugurated the conference. While expressing profound contentment about the program of EAIT 2012, Prof. Roy offered his willingness to collaborate as well as co-host the future EAITs and CSI

events of this stature at the ISI premises. Prof. R Balasubramanian, director, IMSc, Chennai, expressed his views that CSI should encourage conferences in other places too. Satish Babu, president, CSI expressed his delight in joining EAIT 2012 team of CSIKC and talked about CSI. John W Walz, 2012 president, IEEE CS, who presided the program, released the proceedings and expressed his pleasure in attending the conference.

The conference also had plenary talks and keynote speech on Nov 30, 2012 on the National Year of Mathematics for Quasquicentennial (125 years) celebration of Ramanujan, talk titled Partition Function

by Prof. R Balasubramanian, director, IMSc, Chennai. Second plenary talk was on Birthday of Acharya Jagadish Chandra Bose, titled Modelling Proportionate growth with Abelian networks by Prof. Deepak

Dhar, TIFR, Mumbai. The keynote speech was on Cloud Computing: Research Opportunities and Challenges delivered by Prof. Rajkumar Buyya, University of Melbourne, Australia.

Advertisment

During the conference sessions on Nov 30-Dec 1, 2012, 91 papers were presented. In addition, four invited talks were held on emerging areas by eminent speakers, Prof. Bhabatosh Chanda (ISI), Prof. Sanjoy K Saha (Jadavpur Univ.), Prof. Subhash C Basak (U of Minnesota, USA), and Prof. Kaushik Dutta (NUS, Singapore).

The Pre-confernce tutorial sessions organzied at ISI on 29 Nov are briefly touched upon below:

Tutorial-1: Random Walk on Graphs in a Quantum Way

Speaker: Dr. Amlan Chakrabarti, University of Calcutta, India

Advertisment

Random walk is a simple but powerful tool. From economics to computer science it has several important applications. Quantum technology is considered as the future of modern VLSI technology. The model of quantum computation is somehow different from traditional computation. Starting from basics, Dr. Chakraborty has given us an exact feeling about so called mysterious quantum bit or qubit and the operators used in manipulating the qubits. He has also given some ideas about the technologies like iron trap, NMR which are used to realize qubit physically. After giving a short introduction about classical random walk, various types of random walks, their applications and algorithms were discussed. Some of the very well known quantum algorithms like element distinctness, boolean formula evaluation, which have shown a significant amount of speed up over classical algorithms have also been covered in the lecture. The lecture was very informative and well organized. Continuous interaction with the audience and their appreciation at the end of the talk has made this tutorial session very successful.

Tutorial-2: Information Security

Speaker: Arup Roy, Senior Consultant in Information Security Management, New Delhi, India

The tutorial was on Information Security Management Systems (ISMS). The tutorial broadly dealt with the topics: Information security concepts, Overview of ISO 27001 standard, Information security risk assessment and Implementation aspects for security management. The tutorial was quite informative. It should serve as a good starting point for professionals desirous of implementing ISMS in their organizations. The speaker, to his credit, made the session largely interactive for the audience, by incorporating several real-life examples of ISMS titbits. Overall, the talk was interesting, timely, and focused on the practical aspects of Enterprise Information Security.

Advertisment

Tutorial-3: Software Engineering: An Information Technology Approach

Speaker: Prof. Asesh Das, West Virginia University and Pennsylvania College of Technology, USA

The tutorial presented an overview of the different steps involved in the software engineering process along with appropriate case studies. The discussion was interesting, substantiated with proper use cases and coverage was quite comprehensive. It would have been even better if the coverage on a few items would have been in greater technical depth.

Tutorial-4: Cloud Computing

Speaker: Dr. Sourav Dutta, executive telecom consultant, IBM, India

The content of the tutorial covered a vast range from basic cloud computing to complex cloud deployment model. The demo of real cloud and business level example were very much appreciated. The presentation was highly interactive and lively for active audience participation. However it could be made more attractive by adding some research issues.

 

Advertisment