3rd International Conference on

Wireless & Telecommunication 2020

Scientific Program

Keynote Session:

Meetings International -  Conference Keynote Speaker Moustafa H. Aly photo

Moustafa H. Aly

Arab Academy for Science

Title: New trends in optical communications

Biography:

Moustafa H. Aly has completed his PhD at the age of 34 years from Alexandria University and postdoctoral studies from Stracthclyde University (Scotland). He is professor of Optical Communications at College of Engineering, a former dean of engineering, Arab Academy. He has published more than 245 papers in reputed journals and specialized conferences. He is a co-supervisor for more than 125 M.Sc. and Ph.D. students, who already obtained their degrees. He has been serving as a reviewer of many ranked journals.                

Abstract:

The lecture include: Needs of optical networks, Fiber maps around globe, Definitions of: Optical Communications, Light and Optics, Laser and Fiber, Fiber Communications and Free Space Optics. The lecture illustrates: Optical Communication System and Submarine Cables. This is followed by the description of the great revolutions in this field, which are: Optical Amplifier (~1990) 1st Revolution, Fiber Bragg Grating, FBG (~1985), 2nd Revolution, and Visible Light Communication, VLC ~ (2010), 3rd Revolution. Applications including Fiber-To-The-Home FTTH and Endoscopes or Fiber Scopes are also explained.

For more understanding, some videos are to be displayed showing optical fibers, fabrication, undersea cables, cables repair and VLC.

 

Meetings International -  Conference Keynote Speaker Jan Buis photo

Jan Buis

Vice President Wireless LAN, IoT & Switches

Title: Peaceful coexistence of wireless technologies such as Wi-Fi 6, LTE, BLE, ZigBee and others

Biography:

Jan started his professional career at Bell Labs in the Netherlands in the late 1990s and worked within Optical Networking. After a couple of years, Jan joined the initial WLAN development organization. He joined LANCOM Systems in 2006, where he held various senior positions in sales. Since 2014, he has been fully focusing on Business Development. In 2017, he became temporary responsible for the product lines WLAN and Switches, returning early 2019 as Vice President Business Development. Jan holds an international MBA (Purdue University) as well as a Master’s degree in Industrial Engineering and Management Science (Eindhoven University of Technology).

Abstract:

Wi-Fi (WLAN) has become a 2 Trillion USD market and is on its way to become 3 trillion soon1. The economic value of Wi-Fi has become undeniable, up to a level the one of the key needs of life has become Wi-Fi accessibility in conjunction with battery life.

Wi-Fi also has become the mean of connectivity, far above mobile connectivity2. The off-loading isn’t the Wi-Fi for the cellular networks, but the cellular has become the alternative, when there is no Wi-Fi available.

Through time, it seems that Wi-Fi and Cellular is doing a rat-race on who will become the leading factor in the end. The current 5G presented applications are somehow the same being presented when LTE was introduced, even when UMTS was announced3,4. Still, the constant increase in applications needing internet access, keeps on changing the demand of each the technologies.

Instead of working against each other, we should start understand the end-user needs and related applications; each solution and ideal technology will deliver the capabilities. This won’t be only 5G, Wi-Fi or anything else.

 

Meetings International -  Conference Keynote Speaker Santosh Kumar Das  photo

Santosh Kumar Das

National Institute of Science and Technology,India

Title: Non-linear Game Theory Based Intelligent Communication System in Ad-hoc Network

Biography:

Santosh Kumar Das is working as an Assistant Professor in the School of Computer Science & Engineering, National Institute of Science and Technology, Berhampur, Odisha, India. He received his Ph.D. degree in Computer Science and Engineering from Indian Institute of Technology (ISM), Dhanbad, India, in the year 2018 and completed his M. Tech. in Computer Science and Engineering from Maulana Abul Kalam Azad University of Technology (erstwhile WBUT), West Bengal, India, in the year 2013. He has more than eight years of teaching experience and more than five years of research experience. He has contributed more than 25 research papers. His h-index is 13 with more than 310 citations. He serves as an active reviewer for several reputed international journals like Wireless Networks, Wireless Personal Communications, IEEE Access, Ad-Hoc & Sensor Wireless Networks, International Journal of Information Technology and Web Engineering, International Journal of Knowledge Discovery in Bioinformatics, etc. His research interests mainly focus on Ad-hoc and Sensor Network, Artificial Intelligence, Soft Computing, Fuzzy Logic, and Mathematical Modeling.               

Abstract:

In ad-hoc networks, designing an intelligent communication system is a challenging task because the ad-hoc network is a dynamic and infrastructure less network. Each node in the network behaves as a router for sending and receiving the data packets. The dynamic nature and high mobility features of the nodes causes frequent changes in positions and routes. The nodes consist of the batteries having a limited capacity which proves to be insufficient during any operation. Game theory is part of mathematical modeling which is basically of two types, based on the environment such as cooperative and non-cooperative. In cooperative modeling, the nodes collaborate to each other whereas in non-cooperative modeling the nodes do not collaborate with each other.  As the environment of the ad-hoc networks is dynamic. Thus, non-cooperative game theory technique is used to handle the dynamic nature of nodes. The non-cooperative game theory is used to model the conflicting strategies of the nodes by estimating non-linear parameters of the network with the fusion of geometric programming and fuzzy logic. Geometric programming is a non-linear programming based on non-linear constraints in the environment of posynomial. Fuzzy logic is a multi-value logic that works between partial true and false.  This fusion helps to handle large payoff matrices by adding flexibility in the multiple goals of the nodes. The combination of the stated techniques provides an effective mathematical modeling to analyze the conflicting conditions amongst dynamic nodes of the network. It helps to derive an intelligent communication system between the source and destination nodes. The proposed method is validated in terms of mathematical analysis as well as through simulation results based on some performance metrics.

 

Oral Session 1:

  • 5G and Beyond | Telecommunication| Wireless Communication| Technology for Wireless
Meetings International -  Conference Keynote Speaker Alex Bordetsky photo

Alex Bordetsky

Graduate School of Operational and Informational Sciences, USA

Title: Mesh Networking

Biography:

Alex Bordetsky is tenured Professor of Information Sciences at the Naval Postgraduate School. He also holds dual appointment with the Space Systems Academic Group at NPS. Professor Bordetsky is Director of the NPS Center for Network Innovation and Experimentation (CENETIX). He is a recipient of prestigious Robert W. Hamming Interdisciplinary Research Award for the pioneering studies of collaborative technologies and adaptive networking and the Fulbright Senior Fellowship Award for the experimental studies of unconventional maritime networking. Dr. Bordetsky is the Principal Investigator for the renowned TNT MIO Military-Academic Experimentation Campaign, which is now in transformation to Littoral and Maritime-Land CWMD operations study. His research accomplishments are featured in the AFCEA SIGNAL Magazine, Via Sat, USSOCOM Tip of the Spear Journal, Pentagon Channel, and Fulbright Newsletter.Dr. Bordetsky publishes in major IS journals including Information Systems Research, Telecommunication Systems Modeling and Analysis, International Journal of Mobile Wireless Communications, and International Command and Control Research Journal.

Abstract:

We discuss the NC3 Networking Experimentation Modules for studying Trans/Post Resilient Mesh Networking solutions They represent a set of hands-on field experiments focused on integration and operation of Trans/Post Resilient Mesh Networks( TP-RES MESH). The TP-RES MESH will utilize maritime-land self-forming mesh networking enclaves, R/N sensors, cubesats, rapidly deployed stratospheric aerial nodes , and links to partner agency/nation assets. Geographically, the experimentation area will span from places like Offutt, Barksdale, or Hanscom, to the assisting sites in SF Bay and Camp Roberts. The series of TP-RES MESH experiments, conducted by students quarterly, will serve as field laboratories to support the TR-RES MESH NOC class and related NC3 certificate studies
 
 
Meetings International -  Conference Keynote Speaker Derek Hall photo

Derek Hall

Department of Mechanical and Aerospace Engineering | USA

Title: Department of Mechanical and Aerospace Engineering | USA

Biography:

Major Derek Hall is a graduate of the University Wisconsin Whitewater and commissioned through ROTC as a Communications Officer. Shortly after commissioning, he was selected for undergraduate navigator training and he graduated as an Electronic Warfare Officer. He was assigned to the RC-135 at Offutt AFB, where he deployed 15 times for over 700 days to locations worldwide. During that time, he rose to Evaluator Mission Commander and attained a Mater's of Engineering degree from the University Nebraska Lincoln. Currently he is working on his Engineering Doctorate with an emphasis in Nuclear Weapons Effects Policy and Proliferation through Naval Postgraduate School.

Abstract:

Quantum key distribution (QKD) has the potential to provide nearly impregnable secure transmissions, increased bandwidth, and additional redundancy for nuclear command and control communication (NC3). While QKD is still in its adolescence, the manner in which QKD should be used for NC3 must be charted out before it can be engineered, tested, and implemented for operations. This presentation will describe how QKD works, its pros and cons, and theorize how best a QKD system would be implemented.

Meetings International -  Conference Keynote Speaker IAN Kurtz photo

IAN Kurtz

Air Force Institute of Technology , USA

Title: Russian strategic modernization

Biography:

Ian Kurtz is a doctorate candidate and instructor for the Air Force Institute of Technology at Kirtland Air Force Base in Albuquerque, New Mexico. Ian retired from the USAF after 22 years of service in 2008. In addition, he holds two Master's degrees and teaches part time for the University of New Haven. Ian is married with two children and enjoys travel, exercising, and spending time with his familY

Abstract:

Russia has, for several years, committed many millions of rubles modernizing their nuclear arsenal. In addition to enhancing the capabilities of their nuclear triad, they have also began thinking outside the box by creating new capabilities.

Meetings International -  Conference Keynote Speaker Jason Lang photo

Jason Lang

Missouri State University, USA

Title: Applying Kahn and Schelling Cold War principles to Cyber

Biography:

Jason is the USSTRATCOM Service Owner for Training, Exercise and Experimentation services and leads the CMD's technology integration laboratory. He has 15 years’ experience working on Government Information Systems and 16 years within the Aviation Maintenance domain. Jason completed a master’s degree from Creighton University in Information Technology Leadership and is currently working towards a Master’s degree on Defense and Strategic Studies with Emphasis in CWMD at Missouri State University Washington, DC area campuS

Abstract:

Nuclear deterrence, historically conceptualized through mutual assured destruction, has been the foundation for the delicate balance of power among nations. Advancements in technology in the last two decades since the Cold War, have changed the landscape significantly and has forced a relook into how equilibrium can be achieved. Within this new environment, the question becomes how to achieve ambiguity, through both offensive and defensive non-kinetic means, towards a steady-state of equilibrium. To truly understand the impact of technological advances and a way forward, it is imperative to revisit the original concepts of Kahn and Schelling on nuclear deterrence theory, but through a modern lens.

Meetings International -  Conference Keynote Speaker Christopher Thomas Kuklinski photo

Christopher Thomas Kuklinski

United States Strategic Command , USA

Title: Strategic Deterrence in the 21st Century: Dampening Momentum to Achieve Stability

Biography:

Mr. Kuklinski serves as the Assistant Deputy Director for Global Operations at United States Strategic Command.  Chris has over thirty years of experience serving in a variety of capacities in the nuclear, space, and command and control operations.  He served as the Deputy Launch Director for six space launches from Vandenberg Air Force Base and the Director for Operations conducting space-based missile warning at Buckley Air Force Base Colorado.Mr. Kuklinski holds degrees from the University of Pittsburgh, Chapman University, University of Nebraska-Omaha, and King’s College, ondon. 

Abstract:

This discussion focuses on extending deterrence principles beyond the 20th Century nuclear paradigm to address challenges within the space and cyberspace domains. It opens with the post-Cold War era, proceeds to explore the attributes of deterrence; conducts a comprehensive overview of the space and cyberspace domains; applies deterrence principles to assure the peaceful uses of the space and cyberspace domains; and concludes with a discussion on the erosion of protections for noncombatants through the evolution of warfare from the Industrial Age to the Information Age.
 
The author posits that in order to counter the effects of a constant state of war, deterrence in space and cyberspace must be executed as a campaign through all phases of conflict.  The fundamental strategy of this campaign is to assume a position of strength.  This is achieved by building a resilient architecture supporting both space and cyberspace domains.  This architecture includes a complementary set of offensive and defensive capabilities intended to make the cost of engagement exceed the intended benefits.
 
Complementing the architecture are confidence building measures designed to prevent inadvertent escalation by creating channels to resolve issues stemming from the misinterpretation of an action, miscommunication of intent, and inadvertent or accidental application of effects.  These measures also serve to resolve incidents purposefully initiated either by hubris or fear at the lowest phases of conflict.  These confidence building measures include the need for productive relationships between rivals, the establishment of norms of behavior, and the exercising of restraint to prevent emotions from clouding the judgement of decision makers. Through the combination of these measures, harmful momentum is dampened allowing a state of strategic stability to flourish.  In this state, sovereign nations can pursue national interests while adhering to established international norms.