Computational Intelligence for Security and Defence Applications (CISDA), 2009

cis_home2
 
 
Ottawa as has a cool conference coming up IEEE Symposium: Computational Intelligence for Security and Defence Applications:Detecting and Adapting to Emerging Threats (CISDA), 2009. The Symposium runs 8-10 July 2009 here in Ottawa it look like a good line up of presentations.

* Applied Computational Intelligence in Biometrics
* Military Operational Logistics Modeling and Simulation
* Adaptive Network Security and Management
* Advanced Information Systems, Intelligence Exploration and Utilization, and Computer Architectures for Military and Security Applications
* Complex Systems Engineering: Defence and Security Applications
* Computational Intelligence Techniques for Complex Adaptive Systems in Defence and Security
* Computational Intelligence Systems in Unmanned Aerial Vehicles

I will be attend at least two days and maybe more. I look forward to this opportunity to hobnob with a bunch of super geeks. 🙂

EDIT NOTE (Wed. 17, June, 2009): It is confirmed. I will be attending the full 3 days of this conference. 🙂 Life is good.

The Ghost of Quantum Entanglement

I’m a bit of a quantum guy, but is an area that does not make the press that often.  So I was quite happy when I came across an article online as Scientific American about about the possibility of quantum entanglement last past the point of entanglement destruction. “Spooky action at a distance” is how Albert Einstein described quantum entanglement.

quantum physicist Seth Lloyd of the Massachusetts Institute of Technology suggests that memories of entanglement can survive its destruction. He compares the effect to Emily Brontë’s novel Wuthering Heights: “the spectral Catherine communicates with her quantum Heathcliff as a flash of light from beyond the grave.”

If proved out this would have implications for quantum cryptography and quantum computing. Two areas of intensiveness research. Lloyd was investigating entanglement for illumination. Entangled photos could improve photography where a flash is used by reducing the amount of noise in the returning signal.

The area that this research might benifit from are radar, x-ray, optical telecommunications and microscopy increase there sensitivity maybe millions of times.

Source: sciam.com

41st Annual IEEE International Carnahan Conference on Security Technology

Today I took a day off work to attend the 41st Annual IEEE International Conference on Security Technology here in Ottawa. All I could afford was one day out of the 3 and that was more than enough. It is going to take a week for my brain to shrink to its normal small size. I attended the following lectures;

Morning Session

Fake Fingerprint Detection Using Sample Quality Measures
Stephen J. Elliott , Hakil Kim, Matthew R. Young, Shimon Modi – Purdue University, USA

Increasing Security with Correlation-Based Fingerprint Matching
Almudena Lindoso, Luis Entrena, Judith Liu-Jimenez,
Enrique San Millán – University Carlos III of Madrid, Spain

Vascular Biometric Systems & Their Security Evaluation
Raul Sanchez-Reillo, Belen Fernandez-Saavedra, Judith Liu-Jimenez, Carmen Sanches-Avila – University Carlos III of Madrid, Spain

Low Cost Multimodal Biometric Identification System Based on Hand Geometry, Palm & Fingerprint Texture
Miguel A Ferrer, Carlos M. Travieso, JesĂşs B. Alonso –
Universidad de Las Palmas de Gran Canaria, Spain

Investigation on the Selection of Filtering
Parameters & Number Of Eigenvectors

Thirimachos Bourlai, Josef Kittler, Kieron Messer – University of Surrey, UK

Arbitrary Illumination Conditions for Facial Identification
Carlos M. Travieso, JesĂşs B Alonso, Miguel A. Ferrer –
Universidad de Las Palmas de Gran Canaria, Spain

Robust Biometric Identification Combining Face & Speech
Enric Monte-Moreno, Marcos Faundez-Zanuy – UniversitĂ ria Politècnica de MatarĂł (UPC), Spain

Afternoon Sessions

Bacterial Survivability & Transferability on Biometric Devices
Christy Blomeke, Stephen J. Elliott, Thomas Walter, Brandt M. Davis, James E. Tollefson – Purdue University, USA
Smart-Card-Based Face Verification System: Empirical

Spectroscopic Approach for Aliveness Detection in Biometrics Authentication
Davar Pishva – Carnegie Mellon CyLab, Japan

Quantum Wireless Secure Communication Protocol
Tien-Sheng Lin, Sy-Yen Kuo – National Taiwan University, Taiwan

(NO SHOW) Indirect Human Computer Interaction-Based Biometrics for
Intrusion Detection Systems
Roman V. Yampolskiy – University at Buffalo, USA

TacNet: Mobile Ad Hoc Secure Communications Network
Loren E. Riblett, James M. Wiseman – Sandia National Laboratories, USA

The most interesting of these were the Fake Fingerprint Detection.., Vascular Biometric Systems…, Bacterial Survivability…, and Smartcard-Based-Face…. It will probably take me a week or to to go through all the conference proceedings. Much of what they dealt with I understood, that is until they dropped into the math. I was probably the only non-PhD in the crowd and one of the few not wearing a suit. LOL. I was the also the only one without a company indicated on our big name tags. That became a bit of a topic of conversation among a few of my table mates during the lunch. The joke was that I belonged to one of those un-named organizations. LOL. And if they asked me too many questions I’d make them disappear. I guess they’d never believe that someone would willing pay out of their own pocket to go to one of these conferences, I guess they are right in this for most people, then again I’m not most people.

These conferences are by my income standards very expensive. But given the finances I’d go again next year. There is important information that can be gather at these conference even if you are not a PhD. It does not take a PhD to see the significance, relevance and interconnectedness of these papers and there broader implications both for business and national governments.