South China University of Technology
Han Huang is a professor and doctoral supervisor of the School of Software Engineering at South China University of Technology. He holds a PhD in computer science from South China University of Technology. He is currently serving as an associate editor of IEEE Transaction on Evolutionary Computation (IF: 16.497) and Complex & Intelligent Systems (IF: 6.700), associate director of Intelligent Simulation Optimization and Scheduling Special Committee, associate director of the Key Laboratory of Big Data and Intelligent Robots of the Ministry of Education, director of Teaching Steering Committee for Software Engineering of Undergraduate Colleges and Universities in Guangdong Province. He is also a CCF Distinguished Member and IEEE Senior Member. Prof. Huang has hosted more than ten national and provincial projects and published more than 60 papers in IEEE TCYB, IEEE TETC, IEEE TSE, IEEE TEVC, IEEE TIP, IEEE TFS, and Science China, including ESI highly cited papers. He has 36 invention patents granted in China and six invention patents granted in the United States. He won first prize in the Guangdong Scientific and Technological Progress Awards, second prize in the Guangdong Natural Science Awards, Excellent Paper Award of China Simulation Federation, and second prize of Science and Technology Progress of China Society of Image and Graphics. Prof. Huang has been committed to the research on the theories, applications and industrial ecology of intelligent algorithms. He has been in charge of the development and release of five public software systems such as Algorithm Complexity Analysis System www.eatimecomplexity.net, Automated Structural Equation Modeling System www.autosem.net, and Energy Storage Optimization System http://energystorage.autosem.net. He has also completed more than 70 cases of algorithm applications.
Large Scale Clinical Trial Text Processing and Mining
Micro-scale searching algorithm and its application
Intelligent optimization algorithm is an important artificial intelligence method, which is often used to solve complex black-box optimization problems. From the perspective of the nature of algorithm performance, this report will describe the fundamental reasons and key points of algorithm performance improvement. It will introduce the idea of micro-scale searching algorithm: By determining the effective decision subset of optimization problems, adjust the reasonable allocation of computational resources and achieve effective search in a small space, thus obtaining the optimal solution or high-quality feasible solution of the problem. Based on this algorithmic idea, The report will analyze the micro-scale searching assumptions and performance nature of intelligent optimization algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), differential evolution (DE), ant colony optimization (ACO). It will also summarize and discuss the pitfalls of analyzing performance of evolutionary computing methods. Finally, this report will introduce the applications of micro-scale searching algorithm ideas in industrial software, software engineering, computer vision, digital logistics, etc.
Bingo Wing-Kuen Ling
Guangdong University of Technology
Prof Bingo Wing-Kuen Ling received the B.Eng. (Hons) and M.Phil. degrees from the department of Electronic and Computer Engineering, the Hong Kong University of Science and Technology, in 1997 and 2000, respectively, and the Ph.D. degree in the department of Electronic and Information Engineering from the Hong Kong Polytechnic University in 2003. In 2004, he joined the King’s College London as a Lecturer. In 2010, he joined the University of Lincoln as a Principal Lecturer and promoted to a Reader in 2011. In 2012, he joined the Guangdong University of Technology as a Hundred-People-Plan Distinguished Professor. He is a Fellow of the IET, a senior member of the IEEE, a China National Young Thousand-People-Plan Distinguished Professor and a Guangdong Province Pearl Scholar. He serves in the nonlinear circuits and systems technical committee, the digital signal processing technical committee and the power and energy for circuits and systems technical committee of the IEEE Circuits and Systems Community, as well as the cloud and wireless systems for industrial applications technical committee, the industrial informatics technical committee and the industrial building automation, control and management technical committee of the IEEE Industrial Electronics Society. He has also served as the guest editor-in-chief of several special issues of highly rated international journals, such as the IEEE Transactions on Consumer Electronics, the IET Signal Processing, the Circuits, Systems and Signal Processing, the HKIE Transactions, the Sensors, the Sensor and Actuator Networks, and the American Journal of Engineering and Applied Sciences. He is currently an associate editor of the IEEE Transactions on Consumer Electronics, the IET Signal Processing, the Circuits, Systems and Signal Processing, the Journal of Franklin Institute, the Franklin Open, the Measurement, the Measurement: Sensors, the Journal of Industrial Management Optimization, the Frontiers in Signal Processing, and the Signal and Information Processing. He was also an associate editor of the International Journal of Bifurcation and Chaos. He has organized various family IEEE conferences such as the ICASSP 2019, ICCE US 2016, ICCE China 2014, 2015, 2016, IET Fellow Symposium China 2016, APSIP 2015, CSNDSP 2018, 2020, 2022, ICOCA 2015, ICOTA 2016, ISCCC 2016, CODE 2017, etc. He was awarded the best reviewer prizes from the IEEE Instrumentation and Measurement Society in 2008 and 2012. He has published an undergraduate textbook, a research monograph, five book chapters, 250+ internationally leading journal papers and 150+ highly rated international conference papers as well as owned 70+ China patents. His research interests include the time frequency analysis, the optimization theory, the symbolic dynamics, the biomedical signal processing and the multimedia signal processing.
Intelligent non-invasive wearable health systems: theory and applications
An intelligent non-invasive wearable health monitoring system is convenient for the consumers to perform the 24 hour continuous health monitoring. In particular, it provides the non-invasive blood glucose estimation, the continuous blood pressure estimation, the blood lipid estimation, the blood oxygen estimation, the heart rate estimation, the respiratory rate estimation, the attention index estimation, the relaxation index estimation and the emotional index estimation, etc. To perform the above tasks, it is required to acquire various types of signals such as the ECG, the PPG, the EEG, the image sequences and the motion data. Then, the denoising, the signal fusion, as well as the classification and the regression are performed. The traditional denoising methods are based on the filtering approaches. In this seminar, some new denoising techniques such as the quaternion valued filtering based denoising methods, the singular spectrum analysis based denoising methods and the empirical mode decomposition based denoising methods are discussed. Besides, the traditional classification and regression methods are based on the neural networks. In this seminar, the new designs of the neural networks are presented.
Sun Yat-sen University
Zibin Zheng is a Professor at School of Software Engineering, Sun Yat-sen University. He awarded the National Science Fund for Excellent Young Scholars. He also served as Associate Director of National Research Center of Digital Home, Director of Research Center of Blockchain and Intelligent Finance. He has published 2 Springer book and over 100 research papers in international conferences and journals, including 9 ESI highly cited paper, 2 Best Papers and 2 Best Paper nominations in CCF A/B conferences. His citation has been over 24000 with the H-index of 72. He has been awarded the Young Pearl River Scholar, Guangzhou Rising Star Award and the ACM China Rising Star Nomination Award. He received ACM SIGSOFT Distinguished Paper Award at the International Conference of Software Engineering (ICSE), Best Student Paper Award at International Conference of Web Service (ICWS).
Research on Blockchain Reliability Engineering
As an emerging computer technique, blockchain has attracted wide attentions from both industry and academia. The blockchain technology has the key characteristics, such as decentralization, persistency, anonymity and auditability. This report will introduce recent research results on blockchain reliability engineering.
Product Safety Consulting Inc.
Helping people obtain worldwide product safety Certifications (UL, CSA, ETL, CE, CCC and more). Active member of IEEE, PSES, NFPA, ANSI, UL STPs, ACIL. Specialties: Proficient in many Standards - UL/IEC60950, UL/IEC61010, UL/IEC60601, IEC60335, UL1598, IEC60598, UL153, UL1786, UL508, UL508C, UL1017, UL499, UL1449, and more. Proficient in many product categories - Small Electrics, Large Electrics, Lighting, Medical/Dental, Industrial Controls, Machinery, Audio/Video, new and innovative products.
Common certification requirements and testing for any product
The goal of most companies is not to only design products to be safe, perform according to customer demands, and to meet regulatory requirements, it is to sell those products globally. While your product must comply with the EMC and SIPI requirements, there are a myriad of other technical requirement that must also be considered to facilitate the sale of the product. The plan for this tutorial is to delve into some of the “other technical requirements” that products must comply with, including product safety requirements (ie, concepts such as fire, shock, mechanical, temperature, and radiation); and then once your products are compliant, we will discuss the commercialization of the product through obtaining the many country approvals that are needed in order to legally sell the product around the world. This tutorial should be attended by product realization managers, design engineers, test technicians, product regulatory personnel, project managers, marketing personnel, and others interested in learning more about product safety and global market access requirements.
Guilin University of Electronic Science and Technology
Yong Ding, Male, Professor, PhD supervisor. He is the leader of cyberspace security discipline of School of Computer and Information Security, Guilin University of Electronic Science and Technology; director of Guangxi Key Laboratory of Cryptography and Information Security; Guangxi high-level talent (E-level talent), Fujian "Minjiang Scholar Chair Professor";Deputy Leader of the Standard Group of the China Communications Standards Association TC8 "Cyberspace Security Simulation Task Force"; and double-employment researcher at the Pengcheng Laboratory.
An Integrated Protection Method of Moving Target Defense and Access Control Based on IPv6 Network
With the rising 5G technology, many industrial Internet devices are deployed in 5G networks. However, there are many network attacks on the current Internet, which causes a large number of industrial Internet devices to face huge security threats. Therefore, industrial Internet devices urgently need newer security technologies to secure them. In this paper, an access-control-supported moving target defense method based on the IP version 6 (IPv6) network is proposed. First, we propose three mechanisms to assist random IP address generation, including random address generation mechanism, time difference redundancy mechanism, and the multithread supported lockless random IP address selection mechanism. The combined use of the above three mechanisms can effectively improve the performance and stability of the moving target processor. Then, we propose a method of replacing the original packet with a random address by a moving target processor, which can realize the transmission of random addresses on the Internet. Here, we use access control technology in moving target processors, which can enhance protection for industrial Internet devices. Finally, experiments show that the moving target defense with the access control technology has little impact on the original network and is extremely secure. Hence, the method proposed in this paper can satisfy the prerequisites for practical application.