Back You are here: Home Activity Short Courses

TC-II Short Courses

TCII offers industry based short causes, in the areas of applying a set of technologies to turn industrial problems into solutions powered by data meaningful information. It addresses industrial processes and productivity, compliance and standards, data quality and governance, customer services and market positions. TCII is widely considered as outstanding experts in the field, with research, projects and awards to prove it. We share our wealth of expertise on the topic of industrial informatics with you by series of short courses and workshops. The course is offered by our leading researchers, professors and industrial experts from the around of world. TCII short Courses are as following:

1) Data Mining for Big Data Intelligence

Data mining is the act of detecting patterns from existing data repositories. Depending on the underlying data mining algorithms, the underlying or ‘hidden patterns’ the data could be detected. These underlying patterns provide useful insight to business analysts, business managers and senior business executives is forming business strategies for strategic decision-making in organizations. The aim of this course is to provide audiences with the theoretical and practical knowledge, tools and techniques of data mining, and their applications in enterprises.

Benefits

After the completion of the course audiences should have gained the necessary theoretical and practical knowledge in data mining techniques. It is highly recommended & suitable for persons who would like to make or leverage the use of data mining in their organization to gain business insight.

Contents

Topic 1 – Introduction (Knowledge Discovery and Data Mining)

Topic 2 – Data understanding (Introduce the problems that commonly occur with data in the real world. It introduces the current techniques used for data analysis.)

Topic 3 – Data Preparation (The need for different kinds of data pre-processing, and the possible techniques used for each kind are discussed. In particular, the importance and the reason for using a particular technique are given)

Topic 4 – Association Rule Mining (Introduce association rule mining and ‘Apriori’ algorithm for association rule mining is introduced)

Topic 5 – Decision Trees (Decision tree learning is described together with an overview of the existing algorithms. Advantages and disadvantages of decision tree learning and the purpose and method of decision tree pruning are discussed)

Topic 6 – Bayesian inference (Bayesian inference & the background for its use in data mining. Naive Bayes classifier and Bayesian Belief Networks (BBN’s)

Topic 7 – Neural Networks (Symbolic rule extraction, Network pruning, Generalization and learning in general).

Topic 8 – Clustering and other methods (Different clustering techniques, Algorithms used in data mining)

Topic 9 – Review of the whole data mining process (Re-establish the links within the material learned and thereby increase the understanding of the knowledge discovery process as a whole)

Topic10– Applications and case studies (Real world applications of data mining)

2) Cloud Computing and Services

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Cloud services are software, platforms, infrastructure delivered by cloud computing. There has been a lot of attention in business and industry on “cloud computing and services” as a means for addressing business needs. It is widely believed that in the next decade, “cloud” will reshape the technology landscape in business. Obama stated that all US government services will be moved to the cloud. Australian government has indicated that all its public services will be available from the cloud. The aim of this course is present to audience about cloud computing and how businesses could leverage the use of cloud to address their needs.

Benefits

This workshop will provide a guide to understand and use cloud services for mission-critical business units as well as daily routines business logics. This workshop also provides design, development and deployment of cloud applications in business.

Contents

Topic 1 – Cloud computing and cloud services

Topic 2 – The differences between Service Oriented Computing, Grid and Cloud

Topic 3 – The use of cloud computing for your organization

Topic 4 – Refine business cases, drivers, strategies, and business processes for cloud

Topic 5 – Deployment models and cloud virtualization

Topic 6 – Design and develop your cloud with GoogleTM

Topic 7 – Design and develop your cloud with AmazonTM

Topic 8 – Cloud interoperability and standards

Topic 9 – Cloud security and privacy

Topic 10 – Conclusion, feedback, and future directions

3) Cyber-Physical Systems – The new Frontier

The very recent development of Cyber-Physical Systems (CPS) provides a smart infrastructure connecting abstract computational artifacts with the physical world. The solution to CPS must transcend the boundary between the cyber world and the physical world by providing integrated models addressing issues from both worlds simultaneously. This needs new theories, conceptual frameworks and engineering practice. In this paper, we set out the key requirements that must be met by CPS systems, and review and evaluate the progress that has been made in the development of theory, conceptual frameworks and practical applications. A case study of using CPS for enabling smart electricity grids within the industrial informatics field is then presented. Grand challenges to informatics posed by CPS are raised at the end.

However, building CPS is not a trivial task. It requires a new ground-breaking theory that models cyber and physical resources in a unified framework. This is a huge challenge that none of the current state-of-the-art methods are able to overcome due to the fact that computer science and control theory are independently developed based on overly-simplified assumptions of each other. For example, many key requirements (e.g. uncertainty, inaccuracy, etc.) crucial to physical systems are not captured and fully dealt with in the computer science research agenda. In a similar vein, computational complexity, system evolution and software failure are often ignored from the physical control theory viewpoint, which treats computation as a precise, error-free, static 'black-box'. The solution to CPS must transcend the boundary between the cyber world and the physical world by providing a unified infrastructure that permits integrated models addressing issues from both worlds simultaneously. This paper begins by setting out the requirements and then evaluates the progress that has been made in addressing these. This paper will show that CPS calls for new theories and some fundamental changes to the existing computing paradigm.

Benefits

This short course will provide a introduction on the foundamental of Cyber Physical Systems (CPS), including CPS requirements, referencial architectures, Cyber physical system design and implementation, and plenty industrial applications.

Contents

Topic 1 – CPS Foundation, Systems of Systems, compare with Cloud and Grid

Topic 2 – CPS, IoT and WoT, standards and architecture requirements, babric and nodes

Topic 3 – Computation, networking and physical processes

Topic 4 – Enbedded computers and networks software systems

Topic 5 – Computation and Feedback Loops

Topic 6 – Software embeeded in devices, stockastic processes

Topic 7 – Dynamic integration of the physical processes and processes of transforming data

Topic 8 – Conjoin abstractions, modelling, design and analysis

Topic 9 – CPS, IoT and WoT, standards and requirement

Topic 10– CPS in Health care, Transporation and smart energy

4) Ontology Modeling, Engineering and Evolution

Ontologies are widely used in knowledge engineering, artificial intelligence and computer science, in applications related to knowledge management, natural language processing, e-commerce, intelligent information, information retrieval, database design and integration, bio?informatics, education, software development, and in new emerging fields like the semantic web. Ontologies include richer relations between terms. These rich relations enable the expression of domain?specific knowledge, without the need to include domain?specific terms. Therefore, a true ontology should contain not only a hierarchy of concepts organised by the subsumption relation but also other ‘semantic relations’ that specify how one concept is related to another. It is important to remember that the ontologies are organised by concepts, not words. This can be helpful in recognising and avoiding potential logical ambiguities. Ontologies developed independently for different purposes will often differ greatly from each other. The main purpose of an ontology is to enable communication between computer systems to perform certain types of computations and communication. The key ingredient that makes up an ontology is a vocabulary of basic terms and a precise specification of what those terms mean.

Benefits

After this course you will grasp the principal concepts of ontologies and how ontologies and knowledge bases are related, and have gained experience in designing and developing an ontology.

Contents

Topic 1 – Ontology Definition

Topic 2 – Ontology Editor Protégé OWL

Topic 3 – Components of OWL Ontologies

Topic 4 – Ontology Fundamentals

Topic 5 – Ontology Engineering

Topic 6 – Ontology Implementation

Topic 7 – Ontology Reasoning Tools

Topic 8 – Ontology with Knowledge Base

Topic 9 – Ontology Maintenance

Topic 10– Cases studies

5) Wireless Sensor Networks for Environmental Sustainability

Wireless Sensor Networks (WSNs) has gathered a lot of interest recently, since it has opened new challenges with the development of interesting applications like surveillance, environment monitoring etc. The development of efficient protocols for WSNs communication as well as development of WSNs, motes itself has presented numerous challenges for the research community. Energy is the biggest concern for such networks and achieving high energy efficiency is of paramount importance for the longevity of the network. In order to combat this energy challenge energy efficient hardware and communication protocol design for such devices has gathered the intentions of the research community recently.

Benefits

The workshop provides an ideal opportunity for industry and academic to gain in-depth understanding of WSN and its applications.

Contents

Topic 1 – Introduction and Overview of WSNs

Topic 2 – Commercial and Scientific Applications of WSNs like vehicular emission measurement etc.

Topic 3 – WSN Architecture

Topic 4 – WSN Communication Protocol Stack

Topic 5 – WSN system requirements and challenges

Topic 6 – WSN simulation tool

Topic 7 – Quality-of-Service

Topic 8 – Cross-layer optimisation

6) Security, Trust, and Privacy

Security, trust, privacy and risk are some of the fundamentals of business from providers and consumers’ point of view. Imaging losing all of your company’s data! Worse still, imagine if your competitors got hold of your information, financials, new research and development information. Unfortunately, in today’s world we need consider high levels of protection for our information and data by securing it from predators, loss and destruction and reducing our data’s vulnerability. An organisation needs to identify its system’s strengths and weaknesses and measure its overall performance against ideals and best practice. Trust has played a central role in human relationships and has been the subject of study in many fields including business, law, social science, philosophy and psychology. It has been vital to people being able to form contracts, carry out business and work together cooperatively and underpins many forms of collaboration. Closely to this notion of trust is the concept of reputation within a community with other peers. This is frequently used as the basis for judgment as to whether to trust an individual or organisation particularly in the absence of previous direct contact. Privacy issues have been gaining attention from law makers, regulators and the media. As a result, businesses are under pressure to draft privacy policies and post them on their web sites, chief privacy officers are becoming essential members of many enterprises and companies are taking pro-active steps to avoid the potential reputation damage of a privacy mistake. As new technologies are developed, they increasingly raise privacy concerns – the World Wide Web, wireless location-based services, and RFIP chips are just a few examples.

Additionally, the recent focus on national security and fighting terrorism has brought with it new concerns about governmental intrusions on person privacy. As we all know almost each e-Commerce transaction has some undesired outcomes which the person doing it hopes they will not occur when he is undertaking that particular transaction. The quantification of undesired outcomes occurring can be termed as Risk. This also applies to the transactions in the field of e-commerce. One major characteristic of the transactions in e-Commerce is that they may be done in virtual environments. Hence the consumer generally has no opportunity to see and try the product before buying it, showing that there is a high level of Risk involved in these types of transactions according to the consumer’s point of view. In order to address these issues, this course will provide an in-depth look into security, trust, privacy and risk in the business environment, as well as related technologies and case studies.

Benefits

Attendees will gain understanding in security, trust, privacy and risk from philosophical, historical, ethical and technical perspectives.

Contents

Topic 1 -Introduction of information and data security

Topic 2 -Information and data security technologies (data inspection, data protection, data detection, reaction, and reflection)

Topic 3 -Introduction of trust and reputation

Topic 4 -Trustworthiness and reputation measurement and prediction methodologies (CCCI Metrics etc.)

Topic 5 -Introduction of privacy

Topic 6 -Privacy protection technologies and applications (online privacy protection, P3P, anonymity, pseudo-anonymity, government surveillance, privacy survey, etc.)

Topic 7 -Introduction of risk

Topic 8 -Risk measurement, prediction and management methodologies (CCAS Metrics etc.) and case studies

Topic 9 -Conclusion, feedback and future directions

7) Data Quality and Data Warehousing for Corporate Governance and Responsibility

The data quality issue has caught on in recent years, and more and more companies are attempting to cleanse the data. It is reported that 53% of companies have suffered losses due to the poor data quality, and the data quality problem costs US economy at over US $600 billion per annum. Data cleansing is the act of detecting and correcting corrupt or inaccurate records from data repositories. Data warehouse technology is designed for providing multi-dimensional analysis for decision-making. The aim of this course is to provide audiences with the theoretical and practical knowledge, tools and techniques of data quality, data cleansing, and data warehouse, and their applications in enterprises.

Benefits

  • Gain the necessary theoretical and practical knowledge in initiating.
  • Leading a data quality assessment, data cleansing and data warehouse project in their organisations.
  • Organise to move to the next agile, mobile and global era.
  • Learn how to organisations to move to the next era.

Contents

Topic 1 - Why data quality, data cleansing and data warehouse – causes, problems, and challenges for corporate governance

Topic 2 - Data quality rules

Topic 3 - Data quality assessment methods 

Topic 4 - Data cleansing issues, processes, methods, and applications 

Topic 5 - Data warehouse: an overview

Topic 6 - Planning and business requirement for a data warehouse project

Topic 7 - Application of data warehouse in corporations

Topic 8 - Conclusion, feedback, and future directions

TCII Australian Office
TCII Chair: Professor Elizabeth Chang 
E-mail:  elizabeth.chang@unsw.edu.au 
Tel: +61 0418 122 830,  +61 2626 88450

TCII Secretary: Dr. Omar Hussain
E-mail: O.Hussain@adfa.edu.au
Tel: +61 (2) 62688512

TCII Canada Office
Professor Bill Smyth
E-mail: smyth@mcmaster.ca
Tel: +1 905 523 7568, +1 905 525 9140

TCII Germany Office
Professor Achim Koduck
E-mail: Achim.Karduck@hs-furtwangen.de 
Tel: +49 7666913222

TCII Italy Office
Professor Ernesto Damiani
E-mail: ernesto.damiani@unimi.it 
Tel: +39 0373 898064

TCII Malaysia Office
Dr Vish Ramakonar
E-mail: vishram74@gmail.com 
Tel: +61 404 713 249

TCII China Office
Professor Jie Li
E-mail: liujie@fudan.edu.cn 
Tel: +86 25011243

TCII Japan Office
Associate Professor Kouji Kozaki
E-mail: kozaki@ei.sanken.osaka-u.ac.jp 
Tel: +81-6-6879-8416

TCII IT Support 
Dr Naeem Janjua
E-mail: n.janjua@unsw.edu.au 
Tel: +61 2 626 88149

Web Master
Ms. Maryam Haddad
E-mail: maryam.haddadm@gmail.com
Tel: +61 2 626 88149, +61 (2) 62688512

Admin Support
Dr Sazia Parvin
E-mail: s.parvin@unsw.edu.au 
Tel: +61 2 626 88149