Keynote Speakers

Prominent international keynote speakers will be presenting the state of art in research in Parallel, Distributed and Grid Computing.


Tamas Kiss, Director of Research Centre for Parallel Computing
Professor, School of Computer Science and Engineering, University of Westminster
115 New Cavendish Street, London, W1W 6UW, Room 7.118
Tel: ++44 (0)20 79115000 ext 64526

Title: Automated deployment and autoscaling of secure cloud-native applications

Abstract: Cloud computing offers resources on-demand and without large capital investments. As such, it is extremely attractive to many industry and scientific application areas that require large computation and storage facilities. However, many end users are still struggling to get the full benefits from using the elastic nature of the cloud. Major factors prohibiting wider take-up and efficient utilisation of cloud technologies include limited automated elasticity/scalability of resources at the level of cloud applications, fear of potential vendor lock-in by depending on one particular cloud technology, and increased security concerns imposed by the third-party provisioning model and the technology itself. The University of Westminster’s Research Centre for Parallel Computing (CPC) has been leading a string of European collaborations (e.g. CloudSME, COLA and ASCLEPIOS) since 2013 to address such issues. Concentrating on some key application areas and user communities, such as SMEs (especially from the manufacturing sector) and public sector organisations (for example hospitals, healthcare organisations and local authorities), the CPC has developed cutting-edge solutions, such as the MiCADO microservices-based automated cloud deployment and autoscaling framework to address scalability, usability and security of cloud computing applications. This keynote presentation will highlight how such cloud independent and highly customisable solution can address the automated deployment and efficient run-time management of cloud-native applications in a secure and scalable way. Examples from the healthcare and manufacturing sectors will be provided to illustrate how enhanced security requirements are fulfilled and how the solution can be extended to manage applications in the edge-fog-cloud computing continuum.


David (Bong Jun) Choi, Ph.D., SMIEEE
Professor, School of Computer Science and Engineering (Joint Appointment: School of Electronic Engineering - IT Convergence)
College of Information Technology, Soongsil University, Seoul, Korea
Email: davidchoi AT soongsil DOT ac DOT kr
Phone: +82-2-820-0923 / Office: 21523 (정보과학관 523) / Lab: 21408 (정보과학관 408)

Title: Emerging Challenges in Distributed Energy Grid for Sustainable and Secure Future Society

Abstract: The smart grid is revolutionizing how we produce, transmit, and consume energy via the two-way flow of electricity and information to realize clean, affordable, and reliable energy. All sectors of society are fueled by electrical energy and becoming more tightly integrated with the IoT. Moreover, there is an increasing level of penetration of distributed generation, a need for consumer involvement, and completion/cooperation between multiple parties. Therefore, the future energy grid will not only required to be efficient and resilient but also support large-scale integration and orchestration of fully automated distributed devices. This talk will introduce recent developments in distributed algorithms and distributed learning algorithms to build a more responsive and secure energy grid.


Rahul Katarya, Senior Member IEEE
Department of Computer Science & Engineering
Officer In-Charge, International Partnership & Visitation
Office of International Affairs
Delhi Technological University (Formerly Delhi College of Engineering)
(Government of NCT, Delhi) Shabad Daulatpur, Main, Main Bawana Road, Delhi 110042, India Email:
Phone: +91-9560080569
Google Scholar:

Title: Significance of Opinion Leader in Online Social Networks

Abstract: The internet is changing more and more from a common source of information to an interactive platform. Customers form online social networks where they discuss products and influence each other's opinions. Social networking uses internet-based social media programs to make connections with friends, family, classmates, customers, and clients. Social networks often serve as platforms for information diffusion and promotion through viral marketing or product placement.  It is of great importance for companies to learn about opinions on their products to assess chances and risks. An opinion leader is a person or set of people having a significant influence on others' people's acknowledgement or adoption of products or services. They act as an influencer for adopting and diffusion of new product and user in marketing through several communication channels. Opinion leaders may influence others' opinions, drives, beliefs, attitudes, motivations, and behaviours.


Neha Sharma, PhD(IIT(Dhanbad))
Analytics & Insights, Tata Consultancy Services
Founder Secretary, Society for Data Science |
Senior IEEE Member | Execom Member, IEEE Pune Section

Title: Topic can be "Demystifying Data Science

Abstract:  Data science is known as a "fourth paradigm" of science (empirical, theoretical, computational and now data science), mainly due to the present data surge. The society is transforming with rapid speed due to digitalization, and as a result unmanageable amount of data is generated, leading us to an era of data science. Data science is a study of source of data, what it represents and how it can be transformed into a valuable resource for business and society. It incorporates tools from multiple disciplines to gather a data set, process and derive insights, extract meaningful data from the set, and interpret it for decision-making purposes. Data science is a practice of finding answers to known problems or to uncover unknown solutions that has business value or social benefit. The presentation would cover the entire life cycle of data with the help of real-life examples. It will cover step by step explanation of every step for better understanding. It will also highlight the difficulties faced using open data and how to handle it. More importantly, it will cover the few important lessons of data science.



Shailendra Mishra, Professor, College of Computer & Information Sciences ,Majmaah University, Saudi Arabia
CCIS Building, Room No 024-1-20-3
College of Computer and Information Science
Majmaah University, Majmaah
Kingdom of Saudi Arabia
Google Scholar Link:

Title: Internet of Things (IoT): Security Challenges and Concerns

Abstract: Computer devices and other networked assets, including Internet of Things (IoT) can be part of managed machines. The DDoS assault may appear as a bottleneck that is created by the bridge and blocks normal traffic at its desired location. The malware compromised computers and other systems (such as IoT devices), transforming each one of them into a bot (or zombie). Most of IoT devises are equipped with slow processors, have less memory and a short battery life. Therefore, such gadgets do not use proper authentication and encrypted communications. Developing mechanisms to detect these evolving threats will remain a challenge in network security. The backbone network of IoT is Software Defined Networking (SDN). Adapting software defined networking(SDN) raises many challenges includes scalability and security in the internet of things (IoT) network. This research is a step forward in DDoS detection in the SDN-based IoT network using supervised learning techniques support vector machine (SVM). Proposed developed technique automatically detect different attack of DDoS in IoT network.



Dinesh Kumar Saini, Ex-Dean and Coordinator BIT Program
Faculty of Computing and Information Technology, Sohar University
Ex-Research Fellow and Adjunct Faculty, University of Queensland,  Brisbane,  Australia
P.O.Box.-44, PC-311, Sohar, Sultanate of Oman

Title: Emerging Research Issues in Security of Distributed and Grid Computing Environment

Abstract: Grids become smarts and are moving towards Internet of Things( IoT) and cyber-physical-systems (CPS), having very critical complex architectures and devices. Confidentiality, integrity and availability of these critical infrastructure is very crucial and most of the time this infrastructure is vulnerable to cyber attack.  These systems are life critical, cyber attacks may cause loss of life and huge financial losses.  Securing these grid systems have lot of issues - Vulnerabilities, attack counter measures, security requirements, Authentication, Authenticity, Authorization, Accountability, Privacy, Dependability , survivability,  Safety  and Criticality are some of the issues which need attention. Firewalls, attack scenarios, countermeasures, encryption, intrusion analysis, forensic analysis, and routers are some of the critical issues which need special attention.






  • IEEE Delhi Section





  • For information to all, that official email of PDGC-2020 is