Welcome to the SEEDS-2015, “” which will be held from 16th to 17th March, 2015 at the Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India. The seminar comprises of two tracks namely Electronic Devices and Systems, and Information Security. In both tracks, expert lectures will be delivered by Academic and Industry Professional. Besides, quality research and technical presentations will be delivered by academicians, industry professional and research scholars. Through expert lectures on contemporary topics in Electronic Devices, Systems and Information Security, SEEDS-2015 will provide an opportunity to scholars and students to get infused with recent developments and challenges in these areas. The presentation sessions will create an excellent environment to discuss current research topics and development in these subjects. Prospective authors (academicians, industry professionals, research scholars, and students) are invited to speak at this event. Extended abstract of the proposed talk should be submitted to the seminar online or in PDF format before the indicated deadline to ensure its publication in the seminar proceedings.
A.Electronic Devices and Systems
Electronics Engineering is one of the fastest growing fields of engineering. The major driving force for the present day Information Technology revolution is the development in Electronics Engineering. The advancements in microelectronics, satellite and optical fibre technology, analog and digital communication techniques have resulted in developing complex electronics devices, circuits and equipment capable of implementing fast and efficient telecommunication systems. Real time transfer of audio and video signals is now possible with recent trends in broadband technologies. Penetration of electronics has now revolutionized other areas like health care, instrumentation, automation, remote sensing, signal processing etc. The Electronics engineering students thus have huge opportunities in Government and private companies for installation, operation and maintenance of electronic equipment and systems. Defence, space and other large research organizations employ electronics engineers in design and development of complex devices and systems for signal processing and telecommunication. Industries involved in design and fabrication of devices, integrated circuits, embedded systems, electronic equipment, etc. have also provided large-scale placements for engineers with this specialization.
Electronics Engineering offers scope in the field of research, mobile communication, Microwave communication, robotics, defence, radio communication, TV broadcasting, telegraphy & telephony, VLSI design, DSP, nuclear science, wireless communication and biotechnology. Installation and maintenance of electronic equipment used for health care in hospitals, equipment & systems for instrumentation and control in process industries automation systems of assembly line in production industries, etc. are also handled by electronics engineers. Furthermore, knowledge of computer hardware, networking equipment and communication systems enables electronics engineering graduate and help them to annexe an edge in the IT job market.
With the advent of digital storage and communication technologies, the entire spectrum of storage and communication system has been revolutionized as digital information can be easily stored, copied, changed, and transported. More and more people and organizations are using digital documents instead of paper documents to conduct day-to-day transactions. These desirable properties of digital information are very useful but owing to easy and almost undetected modification of digital data, they have raised several security concerns. Therefore, digital data is regarded as unreliable in areas where privacy, authentication, and integrity of data are of concern unless some security procedure is attached to it. These are areas like contracts, receipts, approvals and others where users have severe and genuine concerns of unauthorized modification or disclosure of data. The risk of data misuse has increased many folds with the advent of networking and wireless communication as many users can gain access to the data if not secured. In recent years, the scope and dimensions of information security has evolved significantly. The area of information security besides covering security of data and information extends to security of networks and allied infrastructure. It has emerged as a profession across hardware, software and communication technologies for securing applications, apps, databases and websites; security testing; information systems auditing; business continuity planning; digital forensics and crime investigations; network, and web penetration testing; incident responding; security architecture designing; security analysis; intrusion analysis; vulnerability research; disaster recovery; etc.
Mitigating information security threats is an ongoing battle, as unique threats get prevalent swiftly, therefore, security administrators must begin with an understanding of the threats facing the information, and then must examine the vulnerabilities inherent in the systems that store, process, and transmit the information possibly subjected to those threats. Continuous identification of most serious vulnerabilities, possible threats to information and their rapid mitigation can prevent an organization from falling prey to any such threat. Information security has been the focus of research since decades; however, with the advent of Internet and its vast growth, online information security research has become recurrent. Novel methods, techniques, protocols, and procedures are continuously developed to secure information from growing threats.