Keynote and Tutorial Speakers
Safe Nuclear Power Generation Supported by Simulation and Simulators
Janos Sebestyen Janosy
MTA KFKI Atomic Energy Research Institute
Head of Simulator Development Department
P. O. Box 49, H-1525 Budapest Hungary
There are several risk-sensitive industries - like air traffic, nuclear power generation, dangerous chemical processes, etc. The technical solutions used are usually well approved and widely known; the occasional problems usually originate from the not-careful-enough design, the insufficient risk assessment, the unsatisfactory training and mismanagement. With proper operation and waste management the nuclear fission power is one of the clearest and cheapest energy sources: no gases are emitted during the energy generation and other related preparatory etc. processes. The upcoming nuclear-fusion-based power plants are even more promising; all contamination in these plants will be decayed practically in less than 100 years. Renewable energy sources can play an important, but only a supplementary role, at least for the foreseeable future.
Due to historical reasons, the public approval of the fission-based nuclear power is rather low in many countries. On the other hand, we still have to wait for the appearance of significant fusion power at least several decades; and closing this gap the construction of a new generation of NPPs (nuclear power plants) seems to be unavoidable. Construction on the large scale of carbon dioxide emitting conventional power plants operating on fossil fuel - especially on coal -seems to be the worst solution, anyway.
Even ignoring the CO2-related problems, the growing energy needs of the developing Asian countries cannot be satisfied alone with the oil or gas available on the markets. Therefore there are several NPPs already under construction and more contracts are to come. Meanwhile, all over in the USA and Europe the operation of old NPPs are going to be prolonged for another 20-30 years. Slowly, even in Europe the construction of new nuclear power plants are considered, too. The first such "Generation 3+" NPP is already under construction in Finland. In all cases, simulation studies and the use of simulators is essential. It is a well known fact and it is widely approved by many scientists and engineers that direct evaluation of different technical designs above a certain complexity level is unthinkable. Careful modelling, model integration, verification and validation is necessary to build the simulation tools and computer codes for the design and real-time simulators are even better for testing and validation of complex industrial processes.
The average lifetime of a big nuclear or other power plant exceeds that of its instrumentation and control (I&C) systems several times. Computer based such systems are prone to even faster "moral" exhaustion. Without extensive simulation the replacement of such systems would cause long-lasting outages resulting in great financial losses. Improving the economy of nuclear energy generation it is essential to keep the fuel costs low - not giving way to anything what can endanger the operational safety, of course.
Fuel assemblies are very expensive parts of the nuclear reactor. Initially they were used in Hungary for 3 years, now for 4 years and soon they will stay in the core for 5 years. This is based on our experience that the fuel assemblies used in our NPP are not prone to leaking. Keeping them one year longer in the core implies that their uranium content - that means enrichment in U235- should be increased. On the other hand, each year only 1/3rd, 1/4th later 1/5th of them is replaced; therefore the change of the fuel type is a lengthy process, with mixed cores used in between. The authorities require that the staff should be trained to each particular core before they start to operate it. For this reason the simulator should be upgraded to simulate the exact behaviour of each core foreseen for the next 5 years. Practically this means that the correct 3D simulation of these mixed cores became unavoidable.
The RETINA code (Reactor Thermo-hydraulics Interactive) is a 3D offline code, developed in our department. KIKO3D - Neutron Kinetics 3D - has been developed in our Institute, too, but in the Reactor Analysis Department. Both of them should be re-organized in order to be able to run in real-time, after they should be integrated with each other and finally nested into our full-scope replica simulator, coupled with other models and stressed to operate parallel in real-time, running on four hi-power processors.
In the presentation first I would like to give a survey on the present state of energy production and consumption in the world and after that I would like to summarize the results and practice we used at Paks NPP in Hungary: first in the evaluation of safety studies, then in the working-out of new state-of-art operational procedures, during reconstruction of the Reactor Safety System and other I&C Systems, the replacement of which - thanks to the extensive testing and tuning performed using the full-scope replica simulator - was completed during the regular re-fuelling outage of the NPP units. Finally, some details of the coupled 3D neutron kinetics and thermo-hydraulics simulation of the reactor of our nuclear power plant - running in real time - will be shown, and the methodological problems of this kind of modelling and simulation will be discussed.
Dr Janos Sebestyen JANOSY has been head of the Simulator Development Department in the Atomic Energy Research Institute of the Central Research Institute for Physics at the Hungarian Academy of Sciences (MTA KFKI AEKI) since 1994. He was born in March, 1949 in Budapest, Hungary. He obtained his MSME in Nuclear Engineering from the Moscow Engineering Power Institute, USSR, in 1973 and his MSEE in Process Control Computers from Budapest Technical University, Hungary in 1976. He was employed by Secretariat of the Ministry of Heavy Industry on Nuclear Power Plant Construction from 1973 to 1975. He has been Senior Researcher since 1977 and Senior Adviser since 2004.
Dr Janosy has published over 60 scientific publications in international journals and conferences on
His main scientific interests:
He speaks and writes fluently on English and Russian, less fluently on German. He has been working in Finland for three years, in France and Germany for half-half years. He completed the following major projects:
J.S. Janosy is married having two grown-up married daughters, and three grandchildren. He has a hobby of Ham Radio (radio amateur) since 1965, active on short-wave bands with call sign HA5GN.
*††††††††††††††††††††††††††††††††††††††††††††† *††††††††††††††††††††††††††††††††††††††††††††† *
Sensing Instrumentation for Micro-environment Data Management
Director Geoinformatics Research Centre
Auckland University of Technology
Sensors; monitoring telemetry; modelling; agronomy; meteorology
This presentation describes an international research collaboration relating to micro-environment data monitoring and modelling for applications in agriculture.†† The particular area of agriculture in focus at this time is grape crop production.† In viticulture, timely and accurate environment impact information is critical for decision-making precision.† Climate in particular, plays a significant role in determining crop yield and quality.
A fit-for-purpose wireless sensor network (WSN) terrestrial telemetry architecture is described together with a description of its implementation from concept, through design and development, to deployment in the field.† Details of the sensors, their calibration and testing will also be provided.† The sensor arrays are housed in a framework with their own (solar) power supplies, GPS, Wi-Fi† transmitter and micro-computer for in situ signal processing and data communications protocol processing.†† Data is passed from individual sensor arrays at parameterised intervals through a coordinating node (a gateway) to an Internet enabled upload process to a central server.† This server acquires data from all the international locations.† Monitoring software on the server provides immediate real-time reporting to each location while also populating a Ďpublicí website, which illustrates analysed data in terms of actual and trend information.† This information system and its use is outlined.
Processing the monitored data for a variety of purposes requires geo-statistical analyses and mathematical modelling.†† Some data is interpolated (using inverse distance weighting, kriging, etc) for use with GIS applications (some examples will be given) and in the case of estimation or prediction of single data values or events, models with more sophistication such as the ensemble Kalman filter (EnKF) are used.
The real-time monitoring system and web-based information system are designed for use by decision-makers.† Some examples of this information being used by crop managers will be described, as will some research† projects underway by members of the international scientific team.
Brief curriculum vitae - Philip J. Sallis PhD
Philip completed a PhD in the area of meta- information process modelling at City University London in 1979. Since then he has held academic position in England, Australia and New Zealand, with past and current research professorships in the USA, Hong Kong and Chile.† He was appointed to the Foundation Chair in Information Science at The University of Otago, New Zealand in 1987, a position he held for 13 years.† In 1999 he became Deputy Vice Chancellor at the Auckland University of Technology (AUT) where he led the academic, research innovation and enterprise activities of the university.†† Choosing to leave that role after a decade, he returned to full-time research and is now Director of the Geoinformatics Research Centre at AUT, while also retaining the position of Pro Vice Chancellor, assisting the Vice Chancellor with a range of strategic planning and ambassadorial tasks.
Philipís return to full-time research was for the most part because he wanted to pursue some ideas he had for environment monitoring and modelling related to agronomy.† His keynote lecture describes how this idea took hold and how it has provided him with an opportunity for leadership of an innovative international collaboration of academics, scientists and practitioners, especially in the wine industry.† He will outline the overall concept for the research programme, the wireless sensor Network (WSN) he and his colleagues have designed, built and deployed across eight countries together with the real-time environment monitoring software and web-base information system designed for use by managers and decision-makers in the field.† He will also describe the data modelling approaches being used for estimation/prediction of event information and the range of projects being worked on by members of his international research group.
Since completing his doctoral studies Philip has been at the forefront of tertiary computing education for 35 years and held senior academic and research development positions.†† He has been a regular conference speaker, publisher of journal articles and books, designer of curriculum and member of numerous review committees including ACM, IEEE, SEARCC, the BCS and other international computing groups.† He was for 3 years President of the NZCS during which time he was a chair of three NZ government commissions relating to computing in schools, science curriculum and information technology with industry.† His awards include an IBM doctoral research scholarship, a Davidson Trust Research Fellowship, a United States Library of Congress (National Digital Mapping Archive) research award, two Australian and two New Zealand research awards, two professional fellowships and several research funding grants in the UK, USA, Australia, New Zealand and Chile.
With his wife Dr Kathy garden, he spends several months each year in Chile where from his position as Adjunct Research Professor at the Catholic University in Maule (Geospatial information Processing Laboratory) he coordinates the work of the GRC throughout South America.† He also works closely with the Environmental Research Laboratory at Ritsumeiken Asia-Pacific University to which he makes frequent visits.
Philip is a Fellow of the NZ Computer Society, Member of the Association For Computer Machinery, Lifetime Member of the International Association for Mathematical Geosciences, Member of the Royal Society of NZ, a Senior member of the IEEE, Hon Chair of the IEEE Instrumentation and Measurement Society (NZ Chapter) and Associate Editor for the International Journal of Sensing and Intelligent Systems.†
*†††††††††††††††††††††††††† *†††††††††††††††††††††††††† *
CERTs, ICT &Cyber Security
Professor of Computing Science and Information Systems
First Director of Japan Pacific ICT Centre
First Chair of the Interim Board of Pacific Computer Emergency Response Team (PacCERT)
Registered Consultant-Expert EU CORDIS
Keywords: Future Cyberspace, ICT Technologies, cyber security.
Having hundreds of millions of people all over the planet, connecting to Internet via his/her PC, laptop, or portable mobile device, etc., create opportunities to communicate of kind of information and content which may or may not be always contributing to the betterment of mankind. The current and future dynamic development and innovation in the field of Global Information Communications Technologies (ICT)create a platform for the ubiquitous connectivity via Cyberspace anywhere at any time for anyone worldwide.
Among thousands of different interest groups and social networks in countries worldwide, there are groups that may create, distribute or promote the information that may put state security, national economy and society in danger. Given current complexity of the global Internet infrastructure, in conjunction with the human factor, creates foundation for categories that may trigger local Internet malfunction and ultimately a Cyberspace worldwide.
In light of recent earthquakes in Japan, Australia and South China, it is important to prepare for the Cyberspace malfunction triggered by the natural disaster(s) worldwide. These categories are:
1)†††††††† Natural disasters:
a. Flooding; Earthquake(s); Volcanic explosion(s), etc.;
2)†††††††† Human factor:
a. Terrorist driven attack(s); Politically and Economically driven attack(s); War(s), etc.;
3)†††††††† Hardware& Software:
a. Power supply, Connectivity; Reliability;
b. Malware and spams; Configuration; Interoperability;
All across the globe, there are many professional groups of experts working together to make sure that the Future Networks and Cyberspace function properly. There number of the Computer Emergency Response Teams (CERTs) that operate and cover a specific region on the planet, such as Australian CERT , Japanese CERT , US CERT , APCERT  and PacCERT . The regional CERTs coordinate and monitor the Internet in collaboration with the regional network service providers, security vendors, government agencies, as well as the industry associations.
The author will discuss the technological trends in CERTs, ICT, and Cyber-security. Many people worldwide do not have access to Internet and proper ICT infrastructures with necessary strategic tools to prevent the ICT possible malfunction(s).
Keywords: Computer Emergency Response Team (CERT), ICT, Cyber Security, globalization.
 AusCERT: http://www.auscert.org.au/accessed February 7th 2011;
 JPCERT:http://www.jpcert.or.jp/english/about/accessed February 7th 2011;
 USCERT: http://www.us-cert.gov/accessed February 7th 2011;
 APCERT: http://www.apcert.org/accessed February 7th 2011;
 APCERT membership: http://www.apcert.org/about/structure/members.htmllast visited on February 7th 2011.
Professor Eduard Babulak is accomplished international scholar, researcher, consultant, educator, professional engineer and polyglot.
Professor Babulak is Fellow of the Royal Society for the encouragement of Arts, Manufactures and Commerce (FRSA), Chartered Fellow of British Computer Society (FBCS), Senior Member of ACM, Mentor and Senior Member of IEEE, served as a Chair of the IEEE Vancouver Ethics, Professional and Conference Committee.
His academic and engineering work was recognized internationally by the Engineering Council in UK, European Federation of Engineers and credited by the British Columbia and Ontario Society of Professional Engineers in Canada.
Keynote Speaker at the UKSim2011 Symposium, University of Cambridge, March 2011 and March 2010; Plenary Keynote Speaker at the International Conference on Advances in Computing and Communications 2011 (ACC-2011), in Kochi, India;Invited Panel Speaker at the ITU Kaleidoscope Conference, Dec. 2010 in Pune, India;Panel Speaker at the KIZUNA WINDS Symposium Tokyo Feb 2010; Invited Speaker at National University of Yokohama and University of Electro-Communications in Tokyo, December 2009; Invited Panel Chair and Speaker at MIT, USA, May 2010 and September 2005; Expert-Evaluator for the European Commission in Brussels, June, 2007.
ProfessorBabulak research interests are in Cyberspace, Security, Future Networks and Ubiquitous Computing and QoS, E-Commerce, E-Health, IT, MIS, Applied Informatics in Transportation, E-Manufacturing, Human Centric Computing, E-Learning, Automation and Applied Mathematics.
Professor Babulak speaks 14 languages, a member of the Institution of Engineering Technology (MIET), American Society for Engineering Education (MASEE), American Mathematical Association (MAMA) and Mathematical Society of America (MMSA). He's biography was cited in the Cambridge Blue Book, Cambridge Index of Biographies and number of issues of Who's Who.
*†††††††††††††††††††††††††† *†††††††††††††††††††††††††† *
†Secure Multi-party Computation for Preserving Privacy:
Problems, Techniques and Applications (to be confirmed)
Durgesh Kumar Mishra
Professor (CSE) and Dean (R&D),
Acropolis Institute of Technology and Research, Indore, MP, India,
Ph - +91 9826047547, +91-731-4730038
Chairman IEEE Computer Society, Bombay Chapter,
Vice Chairman,† IEEE MP-Subsection,
Abstract: Consider a set of parties who do not have trust in each other, nor in the channel by which they communicate. Even then the parties wish to correctly compute some common function of their local inputs, while keeping their local data secure from others. This, in a nutshell, is the problem of secure multi-party computation (SMC).† This problem is fundamentally in cryptography and in the study of distributed computations. It takes many different forms depending on the underlying network, on the function to be computed, and on the amount of distrust the parties have in each others and in the network.††
In this tutorial, we present several aspects of secure multi-party computation like privacy of Individuals, correctness of result and network traffic reductions. We first present the definition of this problem in various situations. Our definition is drawn from the previous idea and formulizations, and incorporate aspects that were previously overlooked. We also present several problems associated with SMC. Next we show the problem of hiding the data form trusted third party (TTP) which computes the result. We present the existing solutions of SMC along with the protocols developed by us.† In our first solution, we introduced a randomly selected anonymizer between the parties and the TTP to hide the data. Apart from the randomly selection of anonymizer, the party will divide the data into number of packets and then send to different anonymizer so that the entire data will not reach to a single anonymizer and the privacy of individual will be maintained. After that, we present another problem, which enables the SMC to perform the correct computation of the result as well as the authentication of computational body.† We have introduced multiple TTPs instead of a single one. If there is only one TTP then its behavior can be suspicious. Using this multiple TTP concepts we have the option to choose a TTP from domain of TTPs for computation. In this method we divide the data in several packets and these packets are sent to multiple TTPs and a randomly selected master TTP will perform the computation after accumulating data from other TTPs. For the authentication of TTP, we have introduced the concepts of equivalence classes. With the help of this concept we remove the malicious TTP from the system for further computation. Finally, present the problem of dealing with adversaries in SMC and minimizing their effects.† We investigate the power of adversaries in several situations. We have also minimized the complexity of network traffic in entire process of SMC.
Dr Durgesh Kumar Mishra received M.Tech. degree in Computer Science from DAVV, Indore in 1994 and PhD degree in Computer Engineering in 2008. Presently he has been working as Professor (CSE) and Dean (R&D) in Acropolis Institute of Technology and Research, Indore, MP, India. He has around 20 years of teaching experience and over 5 years of research experience. He has completed his research work with Dr. M. Chandwani, Director, IET-DAVV Indore, MP, India in Secure Multi-Party Computation. He has published more than 60 papers in refereed International/National Journals and Conferences including IEEE and ACM. He is a Senior Member of IEEE, Chairman of IEEE Computer Society, Bombay Chapter, India. Dr. Mishra has delivered his tutorials in IEEE International conferences in India and other countries. He is also a programme committee member of several International conferences. He visited and delivered his invited talk in Taiwan, Bangladesh, Singapore, USA, UK and several places in India in Secure Multi-Party Computation of Information Security. He is an author of one book and reviewer of three International Journals of Information Security. He is Chief Editor of the Journal of Technology and Engineering Sciences. He has been a consultant to industries and Government organizations like Sale Tax and the Labour Department of the Government of Madhya Pradesh, India.