The subject matter of this stationary workshop is the discussion of legal framework applicable to Artificial Intelligence with international focus. By discussing the application of Artificial Intelligence, various types of Artificial Agents in many spheres of life will be considered, including: business activity, household, and the public sector. During the workshop different definitions of Artificial Intelligence will be considered and discussed from a legal point of view.
This course will cover mobile broadband Internet, 5G and future services, including technologies, regulation and business aspects. The course will cover Internet and IP mobility management approaches, Mobile IPv6, and mobile Internet governance. Also, it will include 4G/4.5G access, LTE-Advanced and LTE-Advanced Pro, Evolved Packet System (EPS) architecture, WiFi traffic offload, 4G QoS, small cells approaches, and spectrum management.
Satellite technology has an important role in driving the growth momentum behind the Internet of Things (IoT) and unlocking the promise of connected devices worldwide. Satellites serves as a key enabler for IoT applications across industries and across geographical borders.
In this capacity building activity we will cover technologies of GEO (geostationary) satellites in C-, Ku- and Ka-band, new LEO (low earth orbit) or HEO (highly elliptical orbit) constellations, as well as the new developments in nanosatellites.
Upon completion of this training, participants will have understanding of:
â¢ Methods of analyzing the impact of uneven distribution of users in the cells on the network bandwidth for reconfiguring devices in the network and increasing bandwidth in general;
â¢ Functional model of adaptive video transmission system in radiocommunication channels;
â¢ Technology of creation, preparation, reception / transmission of video information for civil purposes.
This course will focus on technical, business and regulatory aspects of Internet of Things (IoT), Big Data and Artificial Intelligence (AI). It will cover Internet technologies for IoT, then IoT standards, architectures and interoperability, as well as IoT policies and regulations, including IoT security and privacy issues. The course will include IoT services in 4G and 5G mobile systems, including massive IoT and critical IoT use cases. The IoT generates large amounts of data that cannot be processed by traditional techniques, and such data is referred to as Big Data.
Brindar una introducción histórica a la temática. Estudiar nuevos protocolos, arquitecturas y topologías asociadas a la tecnología SDN. Analizar los principales proyectos de Software Libre asociados a esta temática. Dar a conocer los principales desarrollos y aplicaciones de la tecnología en redes de proveedores de servicios de Internet y Data Center.
This course will focus on technical, business and regulatory aspects of QoS for Fixed and Mobile Networks. It includes QoS (Quality of Service) and QoE (Quality of Experience) fundamentals by ITU, as well as traffic and QoS management in Internet and IP networks. Further, it includes QoS for fixed ultra-broadband access, including QoS solutions in metallic and optical networks, carrier grade Ethernet QoS, as well as end-to-end QoS.
5G technologies address a variety of applications in many fields, but those related with IoT are of particular interest given the great number of devices that are being connected.There is no doubt that 5G will play a pivotal role, both in massive and in critical applications.
This training aims to introduce participants to modern methods of telecommunication network designing and the principles of its automation. It is focused on the aspects of broadband networks designing. Automated selection of the most appropriate solutions to build network using the Broadband Calculator online tool is considered. The training will allow participants to contribute personally to the implementation and development of telecommunication networks in future.
This course will provide students with unique expertise in the area of critical infrastructure cyber security. The course will cover typical threats and vulnerabilities typical to it and industrial control systems.
Another part of the course will be dedicated to a case study on incident response in a hypothetical environment. This will be continued by the practical part, where students will play the role of hackers, who a targeting industrial control and security systems of the improvised company with the break-out session on consequences and potential mitigation strategies.