Dr. Houssain Kettani received the Bachelor's degree in electrical and electronic engineering from Eastern Mediterranean University, Famagusta, North Cyprus, in 1998, and Master’s and doctorate degrees both in electrical engineering from the University of Wisconsin, Madison, Wisconsin, USA, in 2000 and 2002, respectively. He joined as faculty member the department of electrical and computer engineering at the University of South Alabama, Mobile, Alabama, USA in 2002-2003, then department of computer science at Jackson State University, Jackson, Mississippi, USA in 2003-2007, and department electrical and computer engineering and computer science at Polytechnic University, San Juan, Puerto Rico, USA in 2007-2012 where he also was director of partnership development office. He joined Fort Hays State University, Hays, Kansas, USA in 2012, and is currently professor and director of computer science and information systems engineering. Dr. Kettani has served as Staff Research Assistant at Los Alamos National Laboratory, Los Alamos, New Mexico, USA in summer of 2000, Visiting Research Professor at Oak Ridge National Laboratory, Oak Ridge, Tennessee, USA in summers of 2005 to 2011, Visiting Research Professor at the Arctic Region Supercomputing Center at the University of Alaska, Fairbanks, Alaska, USA in summer of 2008, and Visiting Professor at the Joint Institute for Computational Sciences at the University of Tennessee, Knoxville, Tennessee, USA in summer of 2010. Dr. Kettani’s research interests include computational science and engineering, high performance computing algorithms, information retrieval, network traffic characterization, number theory, robust control and optimization, and Muslim population studies. He presented his research in over sixty refereed conference and journal publications and his work received over four hundred citations by researchers all over the world. He chaired over hundred international conferences throughout the world and successfully secured external funding of more than a million dollars for research and education from US federal agencies such as NSF, DOE, DOD and NRC.
Title of Speech: Information Systems Engineering Through High Performance Computing
Abstract: Information is knowledge derived from data. The latter are recorded facts and figures that include collection, storage, management, retrieval, analysis, etc. Thus, Information System is the collection of hardware, software, data, people and procedures that work together to produce quality information. To this end, Information Systems Engineering is the effective use or "engineering” of Information Systems for a better understanding of data to optimize decision making. Therefore, ISE emerging engineering discipline consists of multidisciplinary area of studies that involves software, digital storage and retrieval, networks, human computer interaction, information security, digital design and electronic media. In the past thirty years, advances in high performance computing have increased the performance by million times, and decreased the volume of the machine by similar order. Accordingly, the fastest computer in the world increased its performance from one Gigaflop/s in mid-1980s to a projected one Exaflop/s by 2020. In addition, current hand-held devices such as smartphones have performance that rivals those machines of the 1980s. Due to hardware limitations, parallel computing became an integral part of our lives that it is hard to imagine a device that is not using multiprocessor power, including smartphones. What started as a hardware solution to physical limitation, prompted software engineers to adopt to parallelism, which also motivates the theoretical solution to algorithms design and analysis to provide a solution that is parallel oriented rather than a serial oriented one. This in turn allows the use of more data points and more simulation trials to improve Monte Carlo simulations for better accuracy and smoother results. On the other hand, the increased computing power also means an increase in the efficiency of brute force attack algorithms on encryption standards, which will make the widely adopted Advanced Encryption Standard obsolete by the end of this century. However, as we move towards exascale computing and beyond, we need to keep in mind that the power of humanity is not in the powerful machines we develop, but remains in our intelligence and ability to develop solutions to problems at the basic level.
Professor Heng Chen, ever earned his PH.D in Shanghai Jiaotong University, China in Nov.2004, and pursued his postdoctoral study in University of Alberta, Canada from 2005 to 2007. He has been working in Shanghai Institutes for Biological Sciences as a director of database department, who is mainly responsible for the innovative research and development work such as construction of life science information and intelligence database, knowledge mining and extracting, knowledge organization and resource management and other aspects since July 2008. He was ever selected in the outstanding talent introduced plan in the Chinese Academy of Sciences literature and journal publishing field (subject field 100 talent program) in 2010, and was selected in Shanghai Pujiang talent program in 2009. Dr. Heng Chen is currently a member of the advisory Committee of the magazine Hepatitis Monthly (SCIE) and members of editor board of the International Journal of Biochemistry Research & Review, Journal of Biochemistry International, Current Research Journal of Biological Sciences and International Journal of Biochemistry and Molecular Biology. Hitherto, Dr. Heng Chen has published more than 40 scientific research papers in the capacity of the first author or the corresponding author. He has presided over 7 projects at the national, district and local level as project leaders since 2008. So far, he has applied for 4 invention patents, of which 1 has been authorized, and applied for 3 items of software copyright registration.
received the B.S. in Information and Computer
Engineering from Chung Yuan Christian University,
Taiwan, the M.S. in Computer Science and Information
Engineering from National Cheng Kung University,
Taiwan, the M.B.A. from the University of Illinois
at Chicago, Chicago, Illinois, USA, and the Ph.D. in
Management Information Systems from the University
of Wisconsin-Milwaukee, Wisconsin, USA.
He is an Associate Professor of Information Management and Decision Sciences in the School of Business at the College of Charleston, SC, U.S.A. His research has been published in MIS journals and major conference proceedings, including MIS Quarterly, Journal of Association for Information Systems, Decision Support Systems, IEEE Transactions on Systems, Man, and Cybernetics, Computers in Human Behavior, Internet Research, and Journal of Information Systems and e-Business Management. His areas of interests include web design issues in disaster management, ontology development, Internet abuse in the workplace, text mining, data mining, knowledge management, and behavioral studies related to the use of IT.
Title of Speech: Modern Internet Abuse Detections
Abstract: As the use of the Internet in organizations continues to grow, so does Internet abuse in the workplace. Internet abuse activities by employees—such as online chatting, gaming, investing, shopping, illegal downloading, pornography, and cybersex—and online crimes are inflicting severe costs to organizations in terms of productivity losses, resource wasting, security risks, and legal liabilities. Organizations have started to fight back via Internet usage policies, management training, and monitoring. Internet filtering software products are finding an increasing number of adoptions in organizations. These products mainly rely on blacklists, whitelists, and keyword/profile matching. In this talk, I would like to share a text mining approach to detect Internet abuse activities. I have empirically compared a variety of term weighting, feature selection, and classification techniques for Internet abuse detection in the workplace of software programmers. The experimental results are very promising; they demonstrate that the text mining approach would effectively complement the existing Internet filtering techniques. In this speech, I would like to share my knowledge and experience in conducting text mining approach for detecting Internet abuse in the workplace.