Research and Industry Shaping the 6G Era
Room: EV003-309, Bldg: Electrical & Computer Engineering Department EV, Concordia University, 1515 Ste. Catherine West, MONTREAL, Quebec, Canada, H3G 1M8Abstract :This talk shares an independent perspective on how industry and research meet and how together they potentially shape and transform the next decade and beyond. This is outlined in the context of expected paradigm shifts in global intelligent and resilient connectivity, with multi-modal and multi-sensory immersive interaction and digital world experience, autonomous swarms, intelligent agents, and man-machine collaboration, and environmental awareness. It highlights the journey of related research topics, their transformative potentials, and the associated questions and challenges, in an end-to-end context and path, towards a seamless, inclusive, and sustainable socio-economic <a href="http://transformation.Co-sponsored" target="_blank" title="transformation.Co-sponsored">transformation.Co-sponsored by: <a href="http://[email protected](s):" target="_blank" title="[email protected](s):">[email protected](s): Dr. Javan Erfanian, Room: EV003-309, Bldg: Electrical & Computer Engineering Department EV, Concordia University, 1515 Ste. Catherine West, MONTREAL, Quebec, Canada, H3G 1M8
Task-Specific Trust Modeling and Resource Matching Enabled by Hypergraph for Efficient Task Completion in Collaborative IoT Systems
Virtual: https://events.vtools.ieee.org/m/496565Rapid advancements in collaborative computing have enabled the exponential expansion of Internet of Things (IoT) systems, supporting pervasive connectivity and intelligent task execution across heterogeneous devices. However, achieving reliable and efficient task completion in IoT systems remains challenging due to dynamic network conditions and diverse physical attributes of computing resources and tasks. To overcome these challenges, this thesis introduces a novel task-specific trust modeling and resource matching enabled by hypergraph to achieve efficient task completion in IoT networks. Firstly, a task-oriented trusted collaboration enabled by hypergraph (TTC-hypergraph) is modeled to assign tasks to suitable collaborators based on dynamic trust evaluation that integrate task-specific requirements, and resource availability. Secondly, a trusted task-resource matching (TTRM) framework is constructed by leveraging historical collaboration-based hypergraph and task hypergraph to capture device historical performances and task requirements respectively. Then, task-resource matching is performed to identify the most suitable collaborators through a novel trust-driven reweighted random walk mechanism. Simulation results demonstrate that the proposed solutions achieve higher task execution efficiency, providing a robust foundation for trusted collaboration in IoT systems. The proposed frameworks hold significant practical implications, particularly in large-scale, complex IoT applications such as autonomous vehicular networks, industrial automation, and real-time healthcare systems, where efficient and reliable collaboration among devices is <a href="http://essential.Virtual:" target="_blank" title="essential.Virtual:">essential.Virtual: https://events.vtools.ieee.org/m/496565
SAS Annual Volunteer Appreciation BBQ
Bldg: Picnic Site 6, Edworthy Park, 5050 Spruce Dr SW, Calgary, Alberta, CanadaYou and one guest are invited to the Southern Alberta's 2025 Volunteer Appreciation BBQ. We celebrate the contributions of our volunteers and the success of our Section, Technical Chapters and Affinity Groups!The BBQ will take place on Friday, August 15 2025 from 5:00 PM to 8:00 PM, at Edworthy Park, Calgary, AB, Picnic Site 6. The BBQ will take place rain or <a href="http://shine.This" target="_blank" title="shine.This">shine.This IEEE Southern Alberta Special Event (BBQ) is no charge to attend and no charge for the food and beverages provided, however please register in advance so we know how much food and/or what type of meal (burger selection) to purchase of those selections offered (Regular Beef, Veggie, Chicken, Halal Beef Patties). Registration ends late on the evening of Wednesday, August 13. Please register your guest, separately, as <a href="http://well.Please" target="_blank" title="well.Please">well.Please indicate any food allergies or dietary restrictions under "Special Requests" when registering (we will do our best to accommodate, but food served will be typical BBQ fare).Please note: Pictures will be taken during the event. By registering to this event, you are consenting to the use of your portrait, picture or photograph taken during this event to be used by IEEE Southern Alberta Section in promotional material, including printed and electronic material as well as the IEEE Southern Alberta Section website and social mediaParking:Park at either the south or north Edworthy Park lots. Please refer to the map <a href="http://below.Bldg: Picnic Site 6, Edworthy Park, 5050 Spruce Dr SW, Calgary, Alberta, Canada
Energy Cyber-Physical Systems and their Communication and Control Challenges for Operational Security in Industrial Systems
Room: UA1140, Bldg: UA, 2000 Simcoe Street North, Oshawa, Ontario, Canada, L1G7K4The development of innovative cybersecurity technologies, tools, and methodologies that advance the energy system’s ability to survive cyber-attacks and incidents while sustaining critical functions is needed for the secure operation of utility and industrial systems. It is essential to verify and validate the ability of the developed solutions and methodologies so that they can be effectively used in practice. Developing solutions to mitigate cyber vulnerabilities throughout the energy delivery system is essential to protect hardware assets. It will also make systems less susceptible to cyber threats and provide reliable delivery of electricity if a cyber incident <a href="http://occurs.This" target="_blank" title="occurs.This">occurs.This talk will describe how the developed solution can protect the power grid and industrial infrastructure from cyber-attacks and build cybersecurity protection into emerging power grid components and services. This includes microgrid and demand-side management components and protecting the network (substations and productivity lines) and data infrastructure (SCADA) to increase the resilience of the energy delivery systems against cyber-attacks. These developments will also help utility security systems manage large amounts of cybersecurity risk data and cybersecurity operations. For these developments to succeed, cybersecurity testbeds and testing methodologies are necessary to evaluate the effectiveness of any proposed security <a href="http://technologies.The" target="_blank" title="technologies.The">technologies.The focus on developing cybersecurity capabilities in energy systems should span over multiple strategies: in the near term, midterm, and long term. Continuous security state monitoring across cyber-physical domains is the goal in the near term. The development of continually defending interoperable components that continue operating in degraded conditions is required in the midterm. Developing methodologies to mitigate cyber incidents to return to normal operations quickly is necessary for all system components in the long term. We will discuss R&D efforts in these areas centered on developing operational frameworks related to communication and interoperability, control, and <a href="http://protection.The" target="_blank" title="protection.The">protection.The importance of interoperability between smart grid applications and multi-vendor devices must be considered. The current grid comprises multi-vendor devices and multi-lingual applications that add to the complexity of integrating and securing the smart grid components. Standards development entities have been working with utilities, vendors, and regulatory bodies to develop standards that address smart grid interoperability. These include IEEE, IEC, NIST, ANSI, NERC, and others. In this presentation, we will conceptualize a comprehensive cyber-physical platform that involves the communication and power network sides integrating the cyber information flow, physical information flow, and the interaction between them. A data-centric communication middleware provides a common-data bus to orchestrate the system’s components, leading to an expandable multi-lingual system. We will present a hardware protocol gateway that was developed as a protocol translator capable of mapping IEC 61850 generic object-oriented substation event (GOOSE) and sampled measured value (SMV) messages into the data-centric Data Distribution Service (DDS) global data bus. This is necessary for integrating the widely used IEC 61850-based devices into an exhaustive microgrid control and security <a href="http://framework.We" target="_blank" title="framework.We">framework.We will also discuss a scalable cloud-based Multi-Agent System for controlling large-scale penetration of Electric Vehicles (EVs) and their infrastructure into the power grid. This is a system that can survive cyber-attacks while sustaining critical functions. This framework’s network will be assessed by applying contingencies and identifying the resulting signatures for detection in real-time operation. As a result, protective measures can be taken to address the dynamic threats in the foreseen grid-integrated EV parks where the developed system will have an automated response to a <a href="http://cyber-attack.In" target="_blank" title="cyber-attack.In">cyber-attack.In distributed energy management systems, the protection system must be adaptive. Communication networks assist in reacting to dynamic changes in the microgrid configurations. This presentation will also describe a newly developed protection scheme with extensive communication provided by the IEC 61850 standard for power networks to monitor the microgrid during these dynamic changes. The robustness and availability of the communication infrastructure are required for the success of protection measures. This adaptive protection scheme for AC microgrids can survive communication failures through energy storage <a href="http://systems.Co-sponsored" target="_blank" title="systems.Co-sponsored">systems.Co-sponsored by: Power Electronics/Industrial ElectronicsSpeaker(s): Osama, Room: UA1140, Bldg: UA, 2000 Simcoe Street North, Oshawa, Ontario, Canada, L1G7K4
Energy Cyber-Physical Systems and their Communication and Control Challenges for Operational Security in Industrial Systems
Room: 1140, Bldg: UA, 2000 Simcoe Street North, Oshawa, Ontario, Canada, L1G0C5The development of innovative cybersecurity technologies, tools, and methodologies that advance the energy system’s ability to survive cyber-attacks and incidents while sustaining critical functions is needed for the secure operation of utility and industrial systems. It is essential to verify and validate the ability of the developed solutions and methodologies so that they can be effectively used in practice. Developing solutions to mitigate cyber vulnerabilities throughout the energy delivery system is essential to protect hardware assets. It will also make systems less susceptible to cyber threats and provide reliable delivery of electricity if a cyber incident <a href="http://occurs.This" target="_blank" title="occurs.This">occurs.This talk will describe how the developed solution can protect the power grid and industrial infrastructure from cyber-attacks and build cybersecurity protection into emerging power grid components and services. This includes microgrid and demand-side management components and protecting the network (substations and productivity lines) and data infrastructure (SCADA) to increase the resilience of the energy delivery systems against cyber-attacks. These developments will also help utility security systems manage large amounts of cybersecurity risk data and cybersecurity operations. For these developments to succeed, cybersecurity testbeds and testing methodologies are necessary to evaluate the effectiveness of any proposed security <a href="http://technologies.The" target="_blank" title="technologies.The">technologies.The focus on developing cybersecurity capabilities in energy systems should span over multiple strategies: in the near term, midterm, and long term. Continuous security state monitoring across cyber-physical domains is the goal in the near term. The development of continually defending interoperable components that continue operating in degraded conditions is required in the midterm. Developing methodologies to mitigate cyber incidents to return to normal operations quickly is necessary for all system components in the long term. We will discuss R&D efforts in these areas centered on developing operational frameworks related to communication and interoperability, control, and <a href="http://protection.The" target="_blank" title="protection.The">protection.The importance of interoperability between smart grid applications and multi-vendor devices must be considered. The current grid comprises multi-vendor devices and multi-lingual applications that add to the complexity of integrating and securing the smart grid components. Standards development entities have been working with utilities, vendors, and regulatory bodies to develop standards that address smart grid interoperability. These include IEEE, IEC, NIST, ANSI, NERC, and others. In this presentation, we will conceptualize a comprehensive cyber-physical platform that involves the communication and power network sides integrating the cyber information flow, physical information flow, and the interaction between them. A data-centric communication middleware provides a common-data bus to orchestrate the system’s components, leading to an expandable multi-lingual system. We will present a hardware protocol gateway that was developed as a protocol translator capable of mapping IEC 61850 generic object-oriented substation event (GOOSE) and sampled measured value (SMV) messages into the data-centric Data Distribution Service (DDS) global data bus. This is necessary for integrating the widely used IEC 61850-based devices into an exhaustive microgrid control and security <a href="http://framework.We" target="_blank" title="framework.We">framework.We will also discuss a scalable cloud-based Multi-Agent System for controlling large-scale penetration of Electric Vehicles (EVs) and their infrastructure into the power grid. This is a system that can survive cyber-attacks while sustaining critical functions. This framework’s network will be assessed by applying contingencies and identifying the resulting signatures for detection in real-time operation. As a result, protective measures can be taken to address the dynamic threats in the foreseen grid-integrated EV parks where the developed system will have an automated response to a <a href="http://cyber-attack.In" target="_blank" title="cyber-attack.In">cyber-attack.In distributed energy management systems, the protection system must be adaptive. Communication networks assist in reacting to dynamic changes in the microgrid configurations. This presentation will also describe a newly developed protection scheme with extensive communication provided by the IEC 61850 standard for power networks to monitor the microgrid during these dynamic changes. The robustness and availability of the communication infrastructure are required for the success of protection measures. This adaptive protection scheme for AC microgrids can survive communication failures through energy storage <a href="http://systems.Co-sponsored" target="_blank" title="systems.Co-sponsored">systems.Co-sponsored by: IEEE Toronto PELS/IAS SectionSpeaker(s): , Osama MohammedRoom: 1140, Bldg: UA, 2000 Simcoe Street North, Oshawa, Ontario, Canada, L1G0C5
Dr. Houbing Herbert Song: “Neuro-symbolic AI: The Third Wave of AI”
Bldg: ICT 516, University of Calgary, Calgary, Alberta, CanadaAbstract: There are three waves of Artificial Intelligence. The first Wave of AI is Crafted Knowledge, which includes rule-based AI systems. The second wave of AI is Statistical Learning, which includes machine becoming intelligent by using statistical methods. The third wave of AI is contextual adaptation. In the third wave, instead of learning from data, intelligent machines will understand and perceive the world on its own, and learn by understanding the world and reason with it. Neuro-symbolic AI, which combines neural networks with symbolic representations, has emerged as a promising solution of the third wave of AI. In this talk, first I will share my journey from counter-unmanned aircraft systems to explainable AI to neuro-symbolic AI. Then I will present the past, present, and future of neuro-symbolic AI. I will also share my perspective on the emerging area of neuro-symbolic <a href="http://AI.Speaker:" target="_blank" title="AI.Speaker:">AI.Speaker: Houbing Herbert Song, Ph.D., IEEE Fellow, Co-EiC of IEEE TIISpeaker(s): Prof. Houbing Herbert SongBldg: ICT 516, University of Calgary, Calgary, Alberta, Canada
IEEE IAS/PES Committee Meeting
Bldg: 140, 1500 Quebec Ave, Saskatoon, Saskatchewan, Canada, S7K 1V7, Virtual: https://events.vtools.ieee.org/m/487740IEEE IAS/PES Committee MeetingBldg: 140, 1500 Quebec Ave, Saskatoon, Saskatchewan, Canada, S7K 1V7, Virtual: https://events.vtools.ieee.org/m/487740
Understanding LLMs in Education: Unlocking Opportunities and Navigating Challenges Webinar
Virtual: https://events.vtools.ieee.org/m/495806Join this free Webinar hosted by Winnipeg IEEE Young Professionals Alumni Andrew Fisher!Title: Understanding LLMs in Education: Unlocking Opportunities and Navigating ChallengesAbstract: Large language model (LLM) platforms such as ChatGPT are changing how we learn and teach. From helping personalize lessons to making learning more accessible and engaging, these tools are becoming a growing part of the classroom. In this session, we will break down how LLMs work, explore what they can do in education, and discuss some of the key ethical questions they raise. The presentation will also introduce a skill called prompt engineering, which is the process of asking the right questions or giving clear instructions to get useful responses from LLMs. Attendees will see how small changes in wording can lead to very different results, whether you’re planning a lesson, creating study guides, or explaining complex ideas more clearly. This includes using LLMs as agents, where the technology follows structured prompts to complete a series of tasks toward a specific goal. To conclude, you will get hands-on experience with ChatGPT in an interactive activity. Together, we will explore what it does well, where it struggles, and how you can use it effectively in your own learning or future teaching. By the end of the session, you will leave with practical tips for using LLMs responsibly, as well as the confidence to start crafting better prompts that work for <a href="http://you.Virtual:" target="_blank" title="you.Virtual:">you.Virtual: https://events.vtools.ieee.org/m/495806
The Sketches of Infinite Data and Algorithms for Real-Time Data Insights
Virtual: https://events.vtools.ieee.org/m/482936Free Registration (with a Zoom account; you can get one for free if you don't already have it. This requirement is to avoid Zoom bombing. Please sign in using the email address tied to your Zoom account — not necessarily the one you used to register for the <a href="http://event.):https://sjsu.zoom.us/webinar/register/WN_DIDfdbkgRFeEd3JbzURIUQSynopsis:How" target="_blank" title="event.):https://sjsu.zoom.us/webinar/register/WN_DIDfdbkgRFeEd3JbzURIUQSynopsis:How">event.):https://sjsu.zoom.us/webinar/register/WN_DIDfdbkgRFeEd3JbzURIUQSynopsis:How are machine learning algorithms able to answer questions from any nook and corner of the World Wide Web? How are trending hashtags from the near infinite microblog posts, unique visitors and other distinct counts in the near infinite website traffic determined? How do blogging websites avoid recommending articles a user has previously read? In general, how can we answer complex queries about enormous data streams without storing them entirely, in real-time? The answer often lies in clever approximation algorithms and data "sketches" that capture essential properties using vastly reduced space. The relentless flow of data in modern systems indeed presents significant challenges. These data streams are often too large to store and too fast to process exhaustively with traditional methods. This talk introduces key sketching and approximation techniques that help generate real-time data insights by processing data <a href="http://streams.---------------------------------------------------------------By" target="_blank" title="streams.---------------------------------------------------------------By">streams.---------------------------------------------------------------By registering for this event, you agree that IEEE and the organizers are not liable to you for any loss, damage, injury, or any incidental, indirect, special, consequential, or economic loss or damage (including loss of opportunity, exemplary or punitive damages). The event will be recorded and will be made available for public <a href="http://viewing.Speaker(s):" target="_blank" title="viewing.Speaker(s):">viewing.Speaker(s): Dr. Vishnu S. PendyalaVirtual: https://events.vtools.ieee.org/m/482936
Neuro-symbolic AI: The Third Wave of AI
Room: EV002-0184, Bldg: Electrical & Computer Engineering Department EV, 1515 Ste. Catherine West (corner with Guy St.), MONTREAL, Quebec, Canada, H3G 1M8ABSTRACT:There are three waves of Artificial Intelligence. The first Wave of AI is Crafted Knowledge, which includes rule-based AI systems. The second wave of AI is Statistical Learning, which includes machine becoming intelligent by using statistical methods. The third wave of AI is contextual adaptation. In the third wave, instead of learning from data, intelligent machines will understand and perceive the world on its own and learn by understanding the world and reason with it. Neuro-symbolic AI, which combines neural networks with symbolic representations, has emerged as a promising solution of the third wave of AI. In this talk, first I will share my journey from counter-unmanned aircraft systems to explainable AI to neuro-symbolic AI. Then I will present the past, present, and future of neuro-symbolic AI. I will also share my perspective on the emerging area of neuro-symbolic <a href="http://AI.Co-sponsored" target="_blank" title="AI.Co-sponsored">AI.Co-sponsored by: Dr. Jun CaiSpeaker(s): Dr. Houbing Herbert Song , Room: EV002-0184, Bldg: Electrical & Computer Engineering Department EV, 1515 Ste. Catherine West (corner with Guy St.), MONTREAL, Quebec, Canada, H3G 1M8
Precision by Design: How Genetics is Engineering the Future of Medicine
Virtual: https://events.vtools.ieee.org/m/490415What is Precision Medicine and how does it help you?We have a panel of experts in using genetic information to improve your health outcomes. In this introduction to the field, they will provide an overview of:- Blueprints of Life: The Basics of Genes and Genetic Testing- Genetic Glitches: When the Code Misfires- From Code to Cure: Engineering Precision Treatments from Genetic <a href="http://Data.There" target="_blank" title="Data.There">Data.There will be time for questions after their <a href="http://presentation.To" target="_blank" title="presentation.To">presentation.To receive your personalized link to attend the Zoom platform meeting, you must also register at the below <a href="http://link.https://us06web.zoom.us/meeting/register/VEfWsWLgRPSUcS0wkgRCyQAgenda:" target="_blank" title="link.https://us06web.zoom.us/meeting/register/VEfWsWLgRPSUcS0wkgRCyQAgenda:">link.https://us06web.zoom.us/meeting/register/VEfWsWLgRPSUcS0wkgRCyQAgenda: - Blueprints of Life: The Basics of Genes and Genetic Testing- Speakers: Emile Moura & Althea Smith- Genetic Glitches: When the Code Misfires- Speakers: Ludovica Montanucci & Rebekka Staal Dahl- From Code to Cure: Engineering Precision Treatments from Genetic Data- Speakers: Manuela Ochoa-Urrea, Jessica Lal, & Alina IvaniukVirtual: https://events.vtools.ieee.org/m/490415
How To Crack The TPM Interview
Virtual: https://events.vtools.ieee.org/m/493655Curious about how to break into top tech companies as a Technical Program Manager (TPM)? In this session, Mansi Tripathi, TPM at Meta and former Microsoft engineer, shares proven strategies to ace TPM interviews. Get insights into system design expectations, stakeholder management scenarios, and how to highlight your leadership skills—even without formal authority. Whether you’re transitioning from engineering or refining your TPM approach, this session offers practical guidance, real examples, and actionable tips to help you stand out and succeed in your next TPM <a href="http://interview.Co-sponsored">interview.[]Co-sponsored by: N/ASpeaker(s): , Mansi TripathiAgenda: Curious about how to break into top tech companies as a Technical Program Manager (TPM)? In this session, Mansi Tripathi, TPM at Meta and former Microsoft engineer, shares proven strategies to ace TPM interviews. Get insights into system design expectations, stakeholder management scenarios, and how to highlight your leadership skills—even without formal authority. Whether you’re transitioning from engineering or refining your TPM approach, this session offers practical guidance, real examples, and actionable tips to help you stand out and succeed in your next TPM <a href="http://interview.Virtual:" target="_blank" title="interview.Virtual:">interview.Virtual: https://events.vtools.ieee.org/m/493655