International Week 2018 | Software Engineering

International Week 2018 | Software Engineering

The fourth industrial revolution
by Ben van Lier

As an individual, organization and society we undergo a technological revolution.  Our postmodern society is increasingly based on people, organizations and objects that are linked in networks. These networks allow us to make new interconnections and exchange and share information between random people, organizations and objects, regardless of time and space. Also the worldwide industry cannot escape from these developments. As a consequence of this, terms like industrial internet, advanced manufacturing, smart industries and cyber-physical systems become more usual. This fourth industrial revolution as the World Economic Forum appoints this development, forms a new challenge for companies and organizations and also a necessity to reinvent their (production) processes. Living, housing, working, producing and creating in networks requires a fundamental change in the perspectives with which we live, organize and produce.


Cyber security: Tools for attack Analysis
by Yvan Rooseleer

Description

During this workshop you will learn to analyse cybersecurity attacks pivotting through information and logs using several useful tools.

 Necessary equiment & software

-          Laptop  with min 8 GB RAM  and 5 GB of free disk space

-          Pre-installed Virtual Box

Prerequisites

Understanding of network applications and protocols


Responsive Web design
by Prins Butt

Responsive web design is an approach which delivers web pages that adapt to the user's viewing environment across a variety of devices.  This approach aims to deliver websites that respond to the needs of users and deliver rich user experiences. In this session we explore key motivations and techniques used in responsive web design as well as the use of a popular framework, Bootstrap,  that can be used to implement responsive web design.


How to fool Artificial Intelligence
by Abbey Waldron

Impressive breakthroughs have been made in the field of artificial intelligence over the past few years. Human level computer vision in particular has made many applications possible from surveillance to self-driving cars. But how intelligent is AI really? In this talk we'll explore some of the surprising ways in which neural networks can be fooled, from turtle-rifles to stop sign attacks for cars.

We'll take a quick overview of deep learning with convolutional neural networks (CNNs) and then we'll introduce adversarial attacks.  Bring your laptops - we'll get the chance to try out some attacks in the class.


A brief introduction to VR and experiencing VR with a head mounted display
by Jens Herder

Lecture (90 Minutes): A brief Introduction to Virtual Reality. Hands on workshop (90 Minutes): Experiencing VR with a Head Mounted Display


How models of large scale economic activities were created for forecasting
by Duc Pham Hi

Students will be guided through a short history of economists ideas and theories from 19thcentury to today

They will be shown (and can program themselves if they have personal laptops with Windows and Excel and Visual Basic)  a few models (static and dynamic, of various kinds : ISLM, ISMP, CCLM, AD-AS, and DSGE)

They will understand why the widely used models, balancing supply and demand, do not work anymore since 201X , especially for disruptions like cryptocurrencies-based societies and why it provides more opportunities for programmers and less for economists (which points to my Part II)


GIT
by Joe Appleton

There's no getting away from it, it's 2018 and you need to learn version control.

This 2-hour session will begin by introducing version control using GIT and GITHub. Students will then undertake a practical where they'll publish work to GitHub.


Cyber Security Defensive coding
by Prins Butt

Cybersecurity is concerned with the tools, technologies, processes and practices used to protect data, software and networks from unauthorized access, modification or other attacks.  In this session we focus on the aspect of cyber security that is concerned with software implementation.  We discuss the psychology secure software development and apply defensive coding techniques.


Creative Al
by Abbey Waldron

In this hands on workshop we'll learn about artistic uses of artificial intelligence.  We'll show some surprising examples of how the so-called dreams of neural networks can create both images capable of fooling humans and crazy abstract visions.  We'll have an overview of how deep convolutional neural networks are used in computer vision, and how they can also be used for image generation.  Bring your laptops we will be experimenting with style transfer!


User Experience
by Rogier van der Linde

Developers, marketeers, designers, managers… we all have very different and often conflicting views on what a perfect user interface should look like. Yet the only factor that really matters, the end user experience, is often forgotten in this discussion. Investigating user experience is a little more complex than just asking – a cook will rarely get an honest answer to the question “how was the food?” – so in this session we’ll cover a whole range of tools and techniques to query, observe and measure our users, that will help you to build and optimize solutions for actual needs instead of filling the graveyard with another product that was solely built to reflect your own dreams and hopes. We’ll also cherry pick a few so you can try them out yourself.


Reviewing the coders
by Arne van Raepenbusch

While working on projects, writing quality code isn't always as easy as we think. Our solutions might be great for the moment, but another requirement might wreck our code completely. Refactoring plays a huge part in making sure code quality is maintained. Also code reviewing is a tool that can be used not only to ensure quality, but to learn and refine your coding skills. During this presentation we explore the world of code reviewing. We will dive into different kinds of reviewing, but also different styles of coding. We talk about how you need to formulate your review and how we can all learn from each other.


How to use a virtual TV studio for demonstration of VR applications / mixed reality recording using a head mounted display
by Jens Herder

If you are interested in this second lecture/workshop it is very helpful to visit the first lecture/workshop too, but this is not mandatory.

Lecture (90 Minutes): How to use a Virtual (TV) Studio for Demonstration of Virtual Reality Applications

Hands on workshop (90 Minutes): Mixed Reality Recording of using a Head Mounted Display

 

http://vsvr.medien.hs-duesseldorf.de/productions/openvr/index.html.en


Non-equilibrium macro-economic modelling and how computational approach help face bubbles, bitcoins and blockchains
by Duc Pham Hi

A short refresher on previous lecture (for those who did not follow Part I)

Agent based programming : a view from Excel and a view from python on bitcoin speculation : an example of use of object oriented language for economists.

The underlying, different, logic of computing Monte Carlo simulations of “Value at risk”, and modelling disruptions, and the rare events : operational losses, bursting bubbles, agent triggered avalanches …   

Wrap up and some leads for the next steps.