1. | ENABLING COEXISTENCE OF WiFi AND ZigBee | The ISM spectrum is becoming increasingly populated by emerging wireless networks. Spectrum sharing among the same network of devices can be arbitrated by MAC protocols (e.g., CSMA), but the coexistence between heterogeneous networks remains a challenge. The disparate power levels, asynchronous time slots, and incompatible PHY layers of heterogeneous networks severely degrade the effectiveness of traditional MAC. We have recently proposed a new mechanism, called the Cooperative Busy Tone (CBT), that enables the reliable coexistence between two such networks, ZigBee and WiFi. CBT allows a separate ZigBee node to schedule a busy tone concurrently with the desired transmission, thereby improving the visibility of ZigBee devices to WiFi. Its core components include a frequency flip scheme that prevents the mutual interference between cooperative ZigBee nodes, and a busy tone scheduler that minimizes the interference to WiFi, for both CSMA and TDMA packets. To optimize CBT, we establish an analytical framework that relates its key design parameters to performance and cost. Both the analytical and detailed simulation results demonstrate CBTs significant throughput improvement over the legacy ZigBee protocol, with negligible performance loss to WiFi. The results are validated further by implementing CBT on sensor motes and software radios. |
||
ENABLING COEXISTENCE OF WiFi AND ZigBee | The ISM spectrum is becoming increasingly populated by emerging wireless networks. Spectrum sharing among the same network of devices can be arbitrated by MAC protocols (e.g., CSMA), but the coexistence between heterogeneous networks remains a challenge. The disparate power levels, asynchronous time slots, and incompatible PHY layers of heterogeneous networks severely degrade the effectiveness of traditional MAC. We have recently proposed a new mechanism, called the Cooperative Busy Tone (CBT), that enables the reliable coexistence between two such networks, ZigBee and WiFi. CBT allows a separate ZigBee node to schedule a busy tone concurrently with the desired transmission, thereby improving the visibility of ZigBee devices to WiFi. Its core components include a frequency flip scheme that prevents the mutual interference between cooperative ZigBee nodes, and a busy tone scheduler that minimizes the interference to WiFi, for both CSMA and TDMA packets. To optimize CBT, we establish an analytical framework that relates its key design parameters to performance and cost. Both the analytical and detailed simulation results demonstrate CBTs significant throughput improvement over the legacy ZigBee protocol, with negligible performance loss to WiFi. The results are validated further by implementing CBT on sensor motes and software radios. |
|||
2. | Securing Wireless Networks by Exploiting Wireless Characteristics | Wireless networks have become the most widespread access medium for both mobile devices and lap-top computers. The ubiquitous presence and ease of connectivity for mobile devices are the driving force for the popularity of wireless networks. With the widespread usage, securing wireless communication has become a crucial necessity. However, the inherent characteristic of wireless networks, namely, unguided medium, variable link qualities, and interferences, adds to the security concerns. We have developed novel techniques that exploit these non-deterministic behaviors to make the wireless networks and communications secure. This talk provides an overview of our proposed techniques for securing wireless communications by exploiting wireless physical layer characteristics. Our recent works on bootstrapping secure association between nearby devices, generating shared secret-key from wireless channels, and detecting identity based attacks in wireless networks will be discussed. Experimental implementations and evaluations will be presented to validate the proposed schemes. We will conclude the talk with futuristic comments related to trustworthy wireless networks and networks forensics. | ||
Securing Wireless Networks by Exploiting Wireless Characteristics | Wireless networks have become the most widespread access medium for both mobile devices and lap-top computers. The ubiquitous presence and ease of connectivity for mobile devices are the driving force for the popularity of wireless networks. With the widespread usage, securing wireless communication has become a crucial necessity. However, the inherent characteristic of wireless networks, namely, unguided medium, variable link qualities, and interferences, adds to the security concerns. We have developed novel techniques that exploit these non-deterministic behaviors to make the wireless networks and communications secure. This talk provides an overview of our proposed techniques for securing wireless communications by exploiting wireless physical layer characteristics. Our recent works on bootstrapping secure association between nearby devices, generating shared secret-key from wireless channels, and detecting identity based attacks in wireless networks will be discussed. Experimental implementations and evaluations will be presented to validate the proposed schemes. We will conclude the talk with futuristic comments related to trustworthy wireless networks and networks forensics. | |||
3. | Debugging Long-running Parallel Programs | Cyclic debugging, where a program is executed repeatedly, is a popular methodology for tracking down and eliminating bugs. These techniques are well understood for sequential programs but they require additional techniques when used for parallel programs because of the long-running time and the inherent possibility of nondeterminism in parallel programs. To overcome the problem of nondeterminism, several sophisticated record&replay mechanisms have been developed. However, the substantial problem of the waiting time during re-execution was not sufficiently investigated in the past. A corresponding solution is offered by combining checkpointing and debugging, which allows restarting executions at an intermediate state. But it either cannot ensure that the replay time has an upper bound or accept the probe effect, where the program’s behavior could change due to the overhead of additional code. In this presentation, we introduces the MRT method to limit the waiting time with low logging overhead and the four-phase replay method & the Light-weight replay method (LiR) to avoid the probe effect. The resulting techniques are able to reduce the waiting time and the costs of cyclic debugging. | ||
Debugging Long-running Parallel Programs | Cyclic debugging, where a program is executed repeatedly, is a popular methodology for tracking down and eliminating bugs. These techniques are well understood for sequential programs but they require additional techniques when used for parallel programs because of the long-running time and the inherent possibility of nondeterminism in parallel programs. To overcome the problem of nondeterminism, several sophisticated record&replay mechanisms have been developed. However, the substantial problem of the waiting time during re-execution was not sufficiently investigated in the past. A corresponding solution is offered by combining checkpointing and debugging, which allows restarting executions at an intermediate state. But it either cannot ensure that the replay time has an upper bound or accept the probe effect, where the program’s behavior could change due to the overhead of additional code. In this presentation, we introduces the MRT method to limit the waiting time with low logging overhead and the four-phase replay method & the Light-weight replay method (LiR) to avoid the probe effect. The resulting techniques are able to reduce the waiting time and the costs of cyclic debugging. | |||
4. | AN EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORDSEARCH SCHEME | In many systems such as Healthcare, users’ sensitive information is stored at the server of service providers that is usually an untrusted server. It is known that the mechanism of Public Key Encryption with keyword Search, or searchable encryption, enables a recipient to give a third party the ability to test whether a given word is a keyword in a large message or not, and the server cannot learn anything about the keyword and the message. In this paper, we propose an effective method of security scheme based on the pseudo-inverse matrices. | ||
AN EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORDSEARCH SCHEME | In many systems such as Healthcare, users’ sensitive information is stored at the server of service providers that is usually an untrusted server. It is known that the mechanism of Public Key Encryption with keyword Search, or searchable encryption, enables a recipient to give a third party the ability to test whether a given word is a keyword in a large message or not, and the server cannot learn anything about the keyword and the message. In this paper, we propose an effective method of security scheme based on the pseudo-inverse matrices. | |||
5. | Inventing the Future of Medicine and Healthcare through Innovation and Collaboration | By transforming the delivery of healthcare from a central, hospital-based system to one that is more distributed, personalized, patient-centered and home-based, we should be able to improve the quality of care and patient wellness and outcomes in the foreseeable future. This new paradigm will benefit patients by enhancing the quality and convenience of care, controlling healthcare cost, and preventing medical errors, thus leading to more affordable and effective healthcare. Technology will be the pulling force into this new era of healthcare and its delivery. How to address key non-technical challenges and manage the process of unleashing technological advances by solving unmet clinical needs will be important to the success of this new healthcare paradigm. Furthermore, the success is dependent on bridging the „valley of death‟ in technologies and creating a dynamic and entrepreneurial culture and ecosystem for translational research and closer ties and collaboration between researchers/engineers, clinicians, industry, healthcare organizations, and government. We believe that engineers and scientists could play a key role in developing a sustainable 21st-century healthcare system, not only in the developed countries but also in the developing countries. Also, I will present on “ingredients for a high impact academic organization” and “culture of excellence” based on my 29-year experience as a researcher, professor, academic & professional leader, evaluator, advisor and consultant. |
||
Inventing the Future of Medicine and Healthcare through Innovation and Collaboration | By transforming the delivery of healthcare from a central, hospital-based system to one that is more distributed, personalized, patient-centered and home-based, we should be able to improve the quality of care and patient wellness and outcomes in the foreseeable future. This new paradigm will benefit patients by enhancing the quality and convenience of care, controlling healthcare cost, and preventing medical errors, thus leading to more affordable and effective healthcare. Technology will be the pulling force into this new era of healthcare and its delivery. How to address key non-technical challenges and manage the process of unleashing technological advances by solving unmet clinical needs will be important to the success of this new healthcare paradigm. Furthermore, the success is dependent on bridging the „valley of death‟ in technologies and creating a dynamic and entrepreneurial culture and ecosystem for translational research and closer ties and collaboration between researchers/engineers, clinicians, industry, healthcare organizations, and government. We believe that engineers and scientists could play a key role in developing a sustainable 21st-century healthcare system, not only in the developed countries but also in the developing countries. Also, I will present on “ingredients for a high impact academic organization” and “culture of excellence” based on my 29-year experience as a researcher, professor, academic & professional leader, evaluator, advisor and consultant. |
|||
6. | Development of Nanotechnology in Thailand and the R&D Activities at The National Nanotechnology Center (NANOTEC) | Nanotechnology as an important emerging technology has been formally recognized in Thailand, with the formation of the National Nanotechnology Policy Committee set-up by the cabinet and chaired by the Prime Minister. The Committee endorsed the National Nanotechnology Strategic Plan with 3 main objectives. The National Nanotechnology Center (NANOTEC) was established under umbrella of the National Science and Technology Development Agency (NSTDA) to establish, support and promote the development and application of national nanotechnology strategic programs through research innovations, technology transfer, human resource and infrastructure development. The Center coordinates the activities by partnering with universities and industry, through the formation of network of centers of excellence in 8 universities, and funding supports to university researchers and industrial partners. NANOTEC also houses an in-house Central R&D Laboratory. The R&D activities essentially belong to 3 main technology platforms: Nano-coating, Nano-encapsulation, and Functional Nanostructure. In the Nano-coating platform, the current focuses are on binder and photocatalytic technologies, especially in textile and agriculture applications. In the Nano-encapsulation platform, the research activities focus on the encapsulation and targeting of active ingredients for drug delivery, food and cosmeceutical applications in order to respond to industrial needs for better and more effective methods to deliver drugs into bodies, make food taste better, and slowly deliver active ingredients into deeper layers of the skin. The Functional Nanostructure platform focuses mainly on the synthesis of organic and inorganic materials as well as the fabrication of nanostructured thin films for nano-device applications such as solar cells and a variety of sensors, e.g. e-nose and other gas sensors. NANOTEC also cultivates researchers who specialize in computational nanoscience and safety of nanomaterials and nanotechnology. | ||
Development of Nanotechnology in Thailand and the R&D Activities at The National Nanotechnology Center (NANOTEC) | Nanotechnology as an important emerging technology has been formally recognized in Thailand, with the formation of the National Nanotechnology Policy Committee set-up by the cabinet and chaired by the Prime Minister. The Committee endorsed the National Nanotechnology Strategic Plan with 3 main objectives. The National Nanotechnology Center (NANOTEC) was established under umbrella of the National Science and Technology Development Agency (NSTDA) to establish, support and promote the development and application of national nanotechnology strategic programs through research innovations, technology transfer, human resource and infrastructure development. The Center coordinates the activities by partnering with universities and industry, through the formation of network of centers of excellence in 8 universities, and funding supports to university researchers and industrial partners. NANOTEC also houses an in-house Central R&D Laboratory. The R&D activities essentially belong to 3 main technology platforms: Nano-coating, Nano-encapsulation, and Functional Nanostructure. In the Nano-coating platform, the current focuses are on binder and photocatalytic technologies, especially in textile and agriculture applications. In the Nano-encapsulation platform, the research activities focus on the encapsulation and targeting of active ingredients for drug delivery, food and cosmeceutical applications in order to respond to industrial needs for better and more effective methods to deliver drugs into bodies, make food taste better, and slowly deliver active ingredients into deeper layers of the skin. The Functional Nanostructure platform focuses mainly on the synthesis of organic and inorganic materials as well as the fabrication of nanostructured thin films for nano-device applications such as solar cells and a variety of sensors, e.g. e-nose and other gas sensors. NANOTEC also cultivates researchers who specialize in computational nanoscience and safety of nanomaterials and nanotechnology. |