00:01 | Hello everybody and welcome to my introduction violence, networking, signal processing and |
|
00:08 | lab. And my name is and can find my website and my life |
|
00:13 | at this location. And here is introduction overview about people in our |
|
00:22 | We currently have 11 PhD students and doc. And previously, since 2008 |
|
00:30 | have 23 PhD students already graduated and master students. And also we have |
|
00:37 | former postdoc include one of them already actually final. And here is our |
|
00:44 | resources. We are mainly funded by National Science Foundation and also the military |
|
00:51 | discipline University of Research Initiative. And we were also supported by other resources |
|
00:59 | as called Qatar Gulf of Mexico Air and also by many kinds of industry |
|
01:05 | direct Energy center. Point several shell and advanced uh geophysics technology and for |
|
01:17 | . Missing from my point of Okay. The philosophy is that |
|
01:21 | This is the kind of buddha buddha , the biggest big buddha temple in |
|
01:28 | in Indonesia. And here this is buddha temple and we have the base |
|
01:34 | here which basically means teaching and in middle. Okay. They have this |
|
01:39 | in the middle. They have buddha then they are doing the meditation thinking |
|
01:44 | . And basically my job is to him And teach the students how to |
|
01:49 | the imagination so that they can achieve reason on the top. Okay. |
|
01:54 | reality. Okay, this is my PhD student and the Microsoft judge or |
|
02:00 | and I'm 29. And then my student is 46. I'm just |
|
02:05 | And we also do a lot of for this education And here is a |
|
02:11 | of my Cambridge University press textbook and also published many manuscript And here is |
|
02:21 | research concentration and uh for our lab uh my uh my identity is again |
|
02:30 | approach. So I try to keep of my research there and we have |
|
02:35 | lot of different type of game applying and beyond the game. We also |
|
02:42 | to catch up with a very hot for example, comparison thing and big |
|
02:48 | machine learning. We do the deep federal learning based in part non parametric |
|
02:53 | multi armed bandit problem. So for G 60 and beyond we do the |
|
02:58 | harvesting photo party to the millimeter wave cell back speaker IOT and also mobile |
|
03:05 | computing network virtualization and software defined Recently we also do the reconfigurable intelligence |
|
03:12 | and also okay this this is a this is the era access network Tv |
|
03:19 | satellite. And we recently we were working on the optimization, distribution, |
|
03:27 | um robust optimization. And also we recruiting a new student for quantum |
|
03:33 | And also we do some kind of and privacy. And here we have |
|
03:39 | device finger device identification with based non trust management, quickly detection, physical |
|
03:47 | security, prime user emulation attack. do the security and privacy application and |
|
03:54 | for smart grades. We have the data injection attack, ph D v |
|
04:00 | , distributed the micro control, renewable smart meter and demand side management basically |
|
04:07 | are smart smart grid power system And from my former student. |
|
04:13 | And after he graduated he posted on and he says theory is something we |
|
04:19 | why but it doesn't work and the practice is something work. But we |
|
04:24 | know why your research lab. We both. Nothing works and we don't |
|
04:28 | why. I'm just joking. And for our group. Okay. |
|
04:33 | we have many visitors and uh, we also taking any kind of adventure |
|
04:40 | after some deadline and for example, ball, dragon ball cutting, |
|
04:46 | voting, uh, artery and half marathon. So if you have |
|
04:52 | interest, please draw our group. you very |
|