IEEE Computer Society (Singapore Section)

September 25th, 2014

On 27 August 2014, the IEEE Computer Society and the Singapore Computer Society (SCS) had signed an unprecedented Memorandum of Understanding (MoU) in Singapore between our IEEE-CS President, Dejan Milojicic, and the SCS President, Chak Kong Soon. Through this MoU, both organisations have planned to bring many more exciting technical and social activities to all our members in Singapore.

For a good start, members of the IEEE-CS Singapore Section can enjoy a 20% discount of the membership dues when you sign up as a new member with SCS now, and vice versa.

August 6th, 2014

Prize Presentation Ceremony and Showcase

Date: 5 August 2014

Venue: Auditorium, Level 2, National Design Centre, 111 Middle Road, Singapore 188969


Co-organized by Infocomm Development Authority of Singapore (IDA) and Information Technology Standards Committee (ITSC), the code::XtremeApps 2014 is a 24-hour Hackathon Challenge held annually, with both Open Category and Junior Category.  The IEEE Computer Society Singapore Section is proud to be a supporting organization of this year’s event.



















May 5th, 2014

Today we had an interesting talk by Fabio di Franco on the topic of

Wireless Body Sensor Network (WBSN): suitable Wireless protocols and propagation characteristics around the human body.


Wireless body sensor network (WBSN) is a promising technology for caregivers to provide continuous heath monitoring on dedicated health parameters, such as blood pressure, ECG, motion, SpO2, etc. Due to body blockage and limited battery capacity, reliability and energy efficiency is a fundamental challenges in the practical use and deployment of WBSNs.
This seminar will be divided in 2 half an hour presentations:
Wireless protocols suitable in Wireless Body Sensor Networks: It includes a tutorial on IEEE802.15.6, Zigbee, Bluetooth Low energy and an analysis of the protocol performance for Wireless Body Sensor applications.
Propagation Characteristics around the human body and topology analysis An analysis of the propagation conditions based on human mobility, environment (indoor /outdoor), sensor positions will be presented. It will also includes an analysis of the suggested network topology in terms of reliability, energy consumption, network lifetime.

About the speaker:

Fabio Di Franco is a PhD Student from University of Palermo-Italy. He is currently doing part of his PhD in I2R under the supervision of Dr. Ge Yu.
Fabio started his career as a RF engineer in Motorola in 2004 designing the Front end of 3G mobile phones. In 2006 Fabio moved to Cambridge Silicon Radio (CSR) where he was Hardware and Radiofrequency applications engineer in Bluetooth technology. In 2009 he joined the WISAR Lab, an Irish hub of technology solution for Wireless Sensor Networks where he worked as a research engineer. In 2012 he started his PhD in Electronic Engineering focusing on Reliable and Energy Efficient Wireless Body Sensor Networks for Human-centric Sensing Applications. He published 5 papers in IEEE conferences and two journal papers.
Fabio holds a full 5-year degree in Electronics and Telecommunications from University of Palermo and a master in Radio frequency from University of Messina.

March 13th, 2014

Subramanian pic

Today we had two interesting talks presented by Prof. K Subramanian.
Vice Chair, IEEE Computer, Education Society Delhi Section;
Chair, Technology Management Council, IEEE Delhi.

About the speaker:

Prof. K Subramanian was the first director and Professor at Advanced center for Informatics and Innovative Learning (ACIIL) and introduced Advanced Technology, Engineering and Management Courses at the Masters Level and started Research Programs in the Interdisciplinary areas of Knowledge Management, Informatics and Information and Communications Technologies and Management through Partnership Institutions at IGNOU.

He has contributed to many International/National Bodies: as a Panel Member in some of UN Technological Committees including ICAO(International Civil Aviation Organisation), served as the Indian Representative in the International Federation for Information Processing (IFIP), TC-11, Immediate Past Chairman of Bureau of Indian Standards’ LTD-38 -Committee on Information systems & Security, Member-MSD 7: Quality management systems committee of BIS in finance and also as a Member for Universal curriculum committee in the area of IT security and audit–ISACA (USA). He was the Vice chairman of the Task force on Identity managemet, set up by Government of Indias Department of Information Technology and awarded a UN fellowship.

Prof. Subramanian was also a Visiting Professor at National Institute for Multimedia Education, Japan, adjunct professor at IIM Lucknow, IIT Delhi, Fore School of Management, IIM Bangalore, IMT Ghaziabad, MDI and NILLM, IIITM Kerala, IIIT Bangalore.

Prof. Subramanian holds a B.Sc. degree from Madras University and B.E., M.E. in Electronics and Communications Engineering and Ph.D. in Computer Science & Automation from Indian Institute of Science, Bangalore. Awarded Doctor of the Faculty Degree from Commonwealth Open University, UK and appointed as a Life Visiting Professor at COU.

Securing the Unsecured in Cyberspace: Cyber Security→Cyber Assurance

Internet, Globalization, the Information technology and web technologies have made the world flat today as a global village, transcending political and national boundaries.  They interconnect people all over the world in the virtual world of cyberspace– the virtual space behind the computer screen. Innovations in communications technology keep us all wired 24/7.  Cyberspace is currently used for social interactions and networking through emails, instant messaging or video telephony, while the commercial enterprises and organizations transact business globally, transferring massive information and funds at phenomenal speed through optical fibres using wireless and satellite technology.

With the advent of Internet of Things and the associated technologies, we can see and feel the reorientation of business transformations, business deliveries and electronic transactions handled and Electronic Delivery Systems undergoing massive transformation.  As organizations have become more dependent on the networks and business transactions, external data sharing and simple day to day communications, the need drives the networks to be more transparent and accessible but also protected from illegal access and abuse.   It is also fraught with threats from organized criminals of the Cyber underworld running an underground Cyber Economy.  There is thus a need for governing this virtual world to support global social, political, economic collaboration and exchange while managing associated risks. The objective is to provide trustworthy and efficient computing in Cyber space, calling for a effective Governance of cyberspace. This is a paradigm shift from eSecurity to eAssurance1 in cyberspace. This presentation outlines the ramifications of governing such a cyberspace that impacts individual human life, social life, global business and governments on such a massive scale in a border-less world, and describes the different facets of Cyber Governance and how do we design and implement efficient, effective and trustworthy Cyber Governance systems?  Ultimately Cyber Governance must lead to cyber-assurance, that Governance leads to IT value delivery and IT risk management, with due consideration of  the global, national and corporate perspectives of Cyber Governance and Cyber Assurance. A multilayer model Cyber/Business Assurance will be outlined, comprising managerial, operational, technical, financial, legal and revenue assurance. The Research Challenges and Cooperation covers Digital Asset Protection, & Assurance, Digital/Cyber Forensics for BFSI, Energy, Aviation, Transportation, IT/ITes services, Health Care & education, Threat Models for insiders’ threats & External Threats, Security Assurance for Digital Archives-Protect tools and techniques.

Today the current security solutions are basically comprised of multi-point products designed for an isolated task (such as detecting a virus, preventing an intrusion).  This results in lack of interoperability, unmanageability and a higher cost of ownership. Integrated security is emerging as an effective approach to address the new challenges. Multiple security technologies such as anti-virus, firewall intrusion and combines policy compliance management, service and support and advance research for more complete protection.  The holistic addressing of security at each tier and of the network (i.e. client, server, gateway), the organizations are able to reduce cost, improve manageability, enhance performance, tighten security and reduce risk exposure. A challenge of perfect security is not practical, economical, or achievable—Sound practices, not best practices, will prevail. The elements of any holistic model need to address culture, policy and procedures, technology, alliances, harmonized legislation, and trusted enterprise challenges. eSecurity, Group sector specific standards & Six Sigma Approach:

Different standards covers different aspects of the process, environment, services, quality etc., No one Standard Covers All.  Every enterprise expects an assurance and cyber assurance is complex.

Assuring Quality Engineering Education for ALL

A Techno-Management framework covering content development, faculty interaction, and delivery and Educational governance Using Open source-Technology is an Enabler for Sustainable development

Emerging Telecommunications, Information & Media Technologies play a vital role in social development of any nation.  In a developing country like India, the Information Technologies and another associated supporting technologies facilitate, catalyze and help in organizing, gathering, structuring, analyzing and making information available for decision makers for devising and implementing various socio-economic development programs for making India as “super power in the new millennium”.  In order to thrive in this transition economies, the Information and Communication Technologies play a vital role in the way in which businesses are conducted, enable cost economy and improve the productivity of the work force in order to compete and survive in the market/consumer driven environments.  What we have at present is “a first generation system/process, a second generation layer, third generation concepts, fourth generation computers and fifth generation aspirations”.  The parameters, which are driving global competitiveness such as TQM, use of IT, innovation, market penetration, implementation strategies and up gradation in the work place are vital to be adapted in the Indian environment to adapt a “framework of transition”.  This involves, Re-literate the Mind, Re-tool the Body and Re-vitalize the Spirit.  We have to graduate from not only automating the environments but also work out strategies for managing around outcomes, from individual excellence to team excellence and also utilizing communication to service at all levels.  Legacy systems/processes/procedures/rules inherited to be reframed for self-reliance.  We are going to experience a fast phase of change in the next few years compared to the last 50 years what we had.  We are going to be pushed into living with uncertainty in the years to come.  What we need is speed of action, which matters the entire operation of the Governance, Government, Industry and Services.  The technological/regulatory/time/distance barriers are slowly disappearing.  The convergence of technologies and use of Internet as a catalyst and emerging of global telecommunication is opening new worlds for the individuals and society.  The more high tech we get, the more high touch we are in this paradoxical world.  The challenges such as People, Processes, Customers and Partners to work out successful relationship and achieve operational excellence and make organizations more effective by use of these technologies and processes.  The global network is driven by self-organizing concept and the feedback system enables self-correction.  The transformation is from the “Technological phenomena” to the “Social phenomena” which will enable the money to grow towards “Talent Energizing Resources”.  “The Internet changes everything”.  Every worker is transformed to be a knowledge worker.  The businesses will become customer centric.  The knowledge management assumes greater significance.  The business and commerce will become more “E” centric.  The companies/industry will reform itself to work in the newly wired economy.  The whole world will become global village.  The Technologies will pave the way for better-managed economies.  Any country adapting the above strategies will certainly become the super power in the next millennium.  Every country has to frame a strategy, vision, mission and implementation priorities with customization and localization of needs. The Internet, which is a fast development open infrastructure, is deployed for education and has opened up new opportunities in learning.  It offers companies a powerful tool to turbo charge their work-force learning efforts.  It creates new “learning space” industry.  E-Learning enables reinventing the way we learn things in our life.  e-Learning is an appealing innovative concept for companies and learners.  New learning value proposition where the power of the responsibility of learning is given to the individual learners.  In the past, organizations and trainers were the ones who took charge in providing learning opportunities and designing contents.  With e-learning, learners can receive customized training curricula according to his needs and his own time, pace and plays without compromising its effectiveness.  Learning content can be granulized into bite-sized modules that meets the learners’ needs.  Learner can also engage in collaborative learning and benefit from the experience and expertise of like-minded learners worldwide.  This is impossible at the traditional set up except at an exorbitant cost.  E-Learning offers plug-and-play training modularity, thus benefiting adult learners, enabling them effectively balance their work and family commitments while learning and enriching their skill sets.  It enables learner access to knowledge information resources and services on a scale unimagined before. E-Learning hence makes learning “convenient, relevant and enjoyable”. Everyone is talking about “change” in the new millennium.  The only one constant thing in the world is “change”.  The change is changing faster with new generation of inventions.  There are two components of the change, one is pace of change and other one is force of change.  To achieve 15 Million users penetration, telephone technology took 75 years, radio technology took 30 years, TV technology took 13 years, wireless technology took 12 years and Internet technology took only less than 5 years.  The convergence of technologies leads to e-revolution.  The four ‘C’s assume greater significance. C-ComputerGiga htz. Chips will make super computers to be available on desktops; C-Communication Voice over I/P, fax over I/P, email, Music (MP3), video image (streaming technology), 3 G wireless. C-Content New media development-multi-media technologies ;C-Consumer Electronics Intelligent and interactive appliances and interfaces.  Today personal computers streams video; the telephone provides access to WEB, wireless phones handle online transaction, tomorrow Internet based devices will do everything with the limitation of our own Imagination and Creativity. Technology is Neutral; the challenge is to enhance technology and innovate with it ahead of competition.   Creative destruction is the new rule of the game.  What worked well in the old economy has lost relevance in the new economy.  Old economies thrust on quality and productivity level to low cost production and high margin of productivity.  New economy stress on bright ideas, which are the new raw materials from making everything intelligent and integrated to the work culture.  Competitive issue is value creation; new break through products and services is the need of the hour.  Designing effective learning solutions to implement on demand learning.-Success of e-learning depends on the way learning solutions are designed and content is delivered.  An effective and appropriate pedagogy is required to teach learners and verify that they acquire the knowledge and competence to the desired level.  Design of response in e-learning environment is the need of the hour.  It is based on the content and process information based cognitive and learning models.

October 4th, 2013

Here are some pictures from the event, with a lot of attendees and extremely interesting talks.

The speech from the invited guest, Steve Leonard, and the panel discussion have been recorded and are available for replay. But if you didn’t attend the event, you still missed a lot of interesting insights into IEEE Fellows’ careers!

Steve Leonard (IDE) talk

Forum Discussion



September 6th, 2013

This event, held on 6th September, was jointly organized by IEEE Singapore Computer Chapter and IEEE Singapore Section.


Sampath will share insights on effective cellular-enabled technologies that have been successful in rural India. Originally incubated by Qualcomm out of California, BeWo Technologies is a social entrepreneurial company that designs and develops hardware & software solutions for Below-Poverty-Line markets. The Multi Authentication Cellular Handset is an Android based integrated biometric device that can bring just about all services to the doorstep of the rural individual. Applications include healthcare, self-employment, eGovernance, and financial inclusion. The design sensibility is essential in offering highly usable products to a semi-literate village population. Rightsizing convenient and durable technology makes all the difference in adoption and scalability across entire nations.

This interactive session will help deepen your interest in this most relevant sector. Partnerships make all the difference, and you are welcome to join the cause.


Sampath is a strong proponent of humanitarian entrepreneurialism that creates a shift in perspective and policy. He is Co-Founder and CEO of BeWo Technologies, an enterprise with a mission to drive change in Below-Poverty-Line markets using innovative technology and business models. Focus areas include rural development, village-level healthcare, and eGovernance across India, South Asia, and Africa.

An author of pending patents, Sampath spearheads the IEEE Rural Mobile Technology Initiative. He has taught MBA Global Business at the University of California Irvine. Sampath also delivers keynotes at international conferences on globalization, social entrepreneurship, and technology. Over the last several years, he has helped steer US & California public policy for education, innovation, and economic development.

Grounded in decades of experience, Sampath brings clear vision and global leadership to businesses and non-profits. He also serves as Director at Quanta Consulting, Inc., a Los Angeles based globalization strategy firm. Previously, he held senior management, marketing & technology roles at Reuters, Capital One, and start-ups.

Sampath holds an MBA from the University of Southern California’s Marshall School of Business, and a Bachelors in Electronics & Communication Engineering from the National Institute of Technology, Trichy, India.

August 21st, 2013

During the month of August we held a review seminar for Systems Security Certified Practitioners: joint-organised by Edgis Security and Mike Myint; sponsored by IEEE Computer Society and Singapore Polytechnic.

The seminar span one and a half weeks from the 12th to the 20th of August. It covered many areas, and had daily quiz and a final mock exam.


Access Controls; Security Operations and Administration; Monitoring and Analysis; Risk, Response and Recovery; Cryptography; Networks and Communications; Malicious Code and Activity.

InstructorMike Myint, MBCS, MAISP, CISSP

Mike is the Lecturer for Cyber & Digital Security Diploma at Temasek Polytechnic, Singapore since 2006. Originally from Yangon, Myanmar, Mike grew up in Washington D.C., USA. Mike received his Bachelor  of  Computer  Science degree from  the  University  of  Computer Studies, Yangon  in  2003. Prior  to  teaching  Mike  has  worked  in  various  Internet  Service  Providers,  Hospitality  &  Tourism Industry and Software Development in USA, Myanmar and Singapore – ranging from Network and System Security,  NOC  Operations,  Programming  and Database  Development,  Business  Continuity Planning and Disaster Recovery, and Information Security Management and Audit.

While teaching at Temasek  Polytechnic,  He  led  a  team  of  4  students  in  2009  to  win  the  Capture  the  Flag  Hacking Competition  in Syscan,  Singapore – both  in  offensive  and  defensive  areas.  He’s  also  represented Temasek  Polytechnic  as  Speaker at GovernmentWare  2011  IT  Security  Conference  at  Suntec, Singapore. He’s also certified in Basic Counseling and received Teaching in Higher Education (THEC) certificate from Temasek Polytechnic in 2008.

Mike is the Microsoft Certified Trainer (MCT), Red Hat Certified Instructor (RHCI) and Certified Cisco Academic  Instructor  (CCAI). He  also holds  CISSP, CISA,  ITIL,  ISO/IEC  27002:2005,  MCSE:  Security,  MCSA:Security,  RHCE,  and  RHCT  certifications  and  currently  pursuing CISSP-ISSAP,  CISM  and GIAC GPEN, and GCIH certifications. Mike  is  also  the  Ordinary  Member  of  British  Computer  Society  (BCS), Association  of  Computing Machinery (ACM), Association of Information Security Professionals (AISP), (ISC)2 Singapore Chapter, ISACA and Singapore Computer Society (SCS).

July 29th, 2013

This TCM seminar on July 22, 2013 was a big success with many attendees.


Beijing Tong Ren Tang Science Art, IEEE Computer Society Singapore Chapter & IEEE Womens in Engineering Singapore Section have the pleasure to invite you to attend the seminar.

TCM Talk: How To Categorize Your Body According to Traditional Chinese Medicine and the Art of Preserving Your Health (Conducted in Chinese Mandarin)

Synopsis: Do you wish to find out which body type you have? Do you wish to find out how to maintain good health based on your specific body type? In Traditional Chinese Medicine, the belief is that humans have different body types that vary from “hot”, “cold”, “weak” and “strong”. Choosing different ways to keep healthy according to your body’s condition, weather and changes in the seasons is definitely the right choice to make for healthy living. Currently, Traditional Chinese Medicine has the following classifications for body types: “neutral”, “Qi deficiency”, “Yang deficiency”, “Yin deficiency”, “phlegm wet”, “wet and hot”, “blood stasis”, “Qi blockage” and “special”. Traditional Chinese Medicine employs different methods to promote good health according to the large range of characteristics displayed by these body types.

Speaker: Professor An Li Ping

July 5th, 2013

Today there was an interesting talk by HSBC Singapore to learn more about Insurance policies and the rights of the consumers. This talk was sponsored and delivered by HSBC Singapore at the Infuse Theatre, Level 14 Connexis South Tower, in Fusionopolis.

IEEE Broadcast Technology Society & Computer Society Singapore Chapters had the pleasure to invite their members to attend the seminar.

Event’s Specials:

  • Lunch and drinks was provided for registered participants. (Delicious Subway sandwiches and drinks)
  • Lots of giveaways
  • Lucky draw at the end for the participants, with three winners

June 17th, 2013


This presentation will focus on the research and development work about broadcasting and communication on high speed railway done by Shanghai Jiao Tong University in China. The field trials of the broadcasting Single Frequency Network (SFN) of ADTB-R system, the trials of DMBT-R system, the key technologies of LTE-R system will be introduced. The latest research on hybrid broadcasting and communication network on high speed railway will also be addressed.

Speaker’s Biography

Jian Xiong is an Associate Professor at the Image Communication and Networking Engineering Institute, Shanghai Jiao Tong University. He received the B.Sc. and M.Sc. degrees from the University of Electronics Science Technology Of China, Cheng Du, China, in 1999 and 2002, respectively; and he received the Ph.D. degree from Shanghai Jiao Tong University (SJTU), Shanghai, China, in 2006. He is currently with the Image Communication and Networking Engineering Institute, SJTU. His current research interests include wireless wideband transmission technologies, and technologies of Future of Broadcast Television (FOBTV) systems.

Dr. Xiong has published more than 20 journal or conference papers and has applied 25 patents, including 9 awarded patents. He is the TPC co-chair of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2010~2013. And he is also the IEEE member and IEICE member.