Computer Science and Communication Engineering : [97]

Follow this collection to receive daily e-mail notification of new additions
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 97
  • item.jpg
  • Journal Article


  • Authors: Tran, Vinh Quang; Nguyen, Thi Ngoc Diep (2021)

  • Table is one of the most common ways to represent structured data in documents. Existing researches on image-based table structure recognition often rely on limited datasets with the largest amount of 3,789 human-labeled tables as ICDAR 19 Track B dataset. A recent Table Bank dataset for table structures contains 145K tables, however, the tables are labeled in an HTML tag sequence format, which impedes the development of image-based recognition methods. In this paper, we propose several processing methods that automatically convert an HTML tag sequence annotation into bounding box annotation for table cells in one table image. By assembling these methods, we could convert 42,02...

  • item.jpg
  • Journal Article


  • Authors: Phi, Hoang Nha; Pham, Hung Phi; Dao, Quang Thuy; Le, Xuan Hai; Pham, Xuan Dat; Nguyen, Ngoc Linh (2021)

  • The paper presents a new approach to design a nonlinear controller for switched reluctance motors (SRMs) based on backstepping technique and artificial neuron network (ANN) in flux estimator. Backstepping controller with an ANN flux estimator will be applied for controlling SRMs which have a nonlinear drive model. The ANN flux estimator was trained off-line using backpropagation algorithm. The stability of the closed control loop was analyzed and proved accroding to the Lyapunov stability standard. The numerical simulation results confirmed the accuracy of the estimator and the quality of the backstepping control system.

  • item.jpg
  • Journal Article


  • Authors: Pham, Khoi Dong; Nguyen, Hung K; Hussin, Fawnizu Azmadi; Tran, Xuan Tu (2021)

  • Security issues in high-speed data transfer between devices are always a big challenge. On the other hand, new data transfer standards such as IEEE P802.3bs 2017 stipulate the maximum data rate up to 400 Gbps. So, security encryptions need high throughput to meet data transfer rates and low latency to ensure the quality of services. In this paper, we propose a multi-core AES encryption hardware architecture to achieve ultra-high-throughput encryption. To reduce area cost and power consumption, these cores share the same KeyExpansion blocks. Fully parallel, outer round pipeline technique is also applied to the proposed architecture to achieve low latency encryption. The design has been...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Ngoc Khai; Truong, Anh Hoang; Dang, Duc Hanh (2021)

  • Estimating memory required by complex programs is a well-known research topic. In this work, we build a type system to statically estimate the memory bounds required by shared variables in software transactional memory (STM) programs. This work extends our previous works with additional language features such as explicitly declared shared variables, introduction of primitive types, and allowing loop body to contain any statement, not required to be well-typed as in our previous works. Also, the new type system has better compositionality compared to available type systems.

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Van Tu; Le, Anh Cuong (2021)

  • The community Question Answering (cQA) problem requires the task that given a question it aims at selecting the most related question-answer tuples (a question and its answers) from the stored question-answer tuples data set. The core mission of this task is to measure the similarity (or relationship) between an input question and questions from the given question-answer data set. Under our observation, there are either various information sources as well as di erent measurement models which can provide complementary knowledge for indicating the relationship between questions and question-answer tuples. In this paper we address the problem of modeling and combining multiple knowledge ...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Van Tanh; Ngo, Quang Tri; Nguyen, Linh Giang; Nguyen, Anh Tuan; Nguyen, Van Ngo (2021)

  • With the increase of the threats at information security in Internet of Things (IoT), there are more and more security solutions have been designing. Unlike the traditional security, these solutions need to adapt with IoT Platform because of the difference about complex communication protocol, low energy, processing ability and limited memory. Our research team, after had been under a long process of analyzing theoretical documents and operating simulated experiments, improved, and implemented CurveCP which is one of these Lightweight cryptographies in the Wireless sensor Networks (WSN) to enhance data secure and information security of IoT System. This study briefly describes the imp...

  • item.jpg
  • Journal Article


  • Authors: Tran, Van Trung; Tran, Anh Tu; Nguyen, Phuong Thao; Luu, Quang Thang; Pham, Bao Son; Bui, Quang Hung (2021)

  • In this article, we present an optimal method for searching the address on VMap based on the current location and the entire view of the users. The article will focus on understanding and researching factors to optimize user's search, enhancing the user’s experience on VMap. The article used data from OpenStreetMap, open source of Pelias geocoder to run test suites. Specifically, based on comparison results with the best rated digital map platform today, Google Maps, we calculated the effectiveness of the method. The proposed method helps to diversify search results with the user's current location, providing relevant search results in case the user's view does not have much influence...

  • item.jpg
  • Journal Article


  • Authors: Pham, Manh Linh; Hoang, Xuan Tung (2021)

  • Internet of Things (IoT) applications are increasingly making impact in all areas of humanlife. Day by day, its chatty embedded devices have been generating tons of data requiring effectivenetwork infrastructure. To deliver millions of IoT messages back and fort with as few faults aspossible, participation of communication protocols like MQTT is a must. Lightweight blueprintand friendly battery are just two of many advantages of this protocol making it become a dominantin IoT world. In real application scenarios, distributed MQTT solutions are usually required sincecentralized MQTT approach is incapable of dealing with huge amount of data. Although distributedMQTT solutions are scalab...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Duc Thao; Nguyen, Viet Anh; Le, Thanh Ha; Ngo, Thi Duyen (2021)

  • With the development of virtual reality (VR) technology and its applications in many fields, creating simulated hands in the virtual environment is an e ective way to replace the controller as well as to enhance user experience in interactive processes. Therefore, hand tracking problem is gaining a lot of research attention, making an important contribution in recognizing hand postures as well as tracking hand motions for VR’s input or human machine interaction applications. In order to create a markerless real-time hand tracking system suitable for natural human machine interaction, we propose a new method that combines generative and discriminative methods to solve the hand tracking...

  • item.jpg
  • Journal Article


  • Authors: Pham, Ngoc Son; Tran, Trung Duy; Truong, Phuc Quang; Truong, Son Ngoc; Pham, Viet Tuan; Phan, Van-Ca; Ho, Van Khuong (2021)

  • In this paper, we analyze an underlay two-way decode-and-forward scheme in which secondary relays use successive interference cancellation (SIC) technology to decode data of two secondary sources sequentially, and then generate a coded signal by superposition coding (SC) technology, denoted as SIC-SC protocol. The SIC-SC protocol is designed to operate in two time slots under effects from an interference constraint of a primary receiver and residual interference of imperfect SIC processes. Transmit powers provided to carry the data are allocated dynamically according to channel powers of interference and transmission, and a secondary relay is selected from considering strongest channe...

  • item.jpg
  • Journal Article


  • Authors: Mai, Manh Trung; Do, Trung Tuan; Le, Phe Do (2020)

  • This article presents building an Elliptic curve cryptography and using it to encode and decode Vietnamese text. Here we have illustrated the prime number p = 151 in the future, which will use a large prime number. We consider an elliptic curve with a total score of 172 points. Encode and decode with standard Vietnamese text and combine with the special characters in ASCII code. The program is designed and installed and on the C# environment to give the correct result of the encryption algorithm.

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Hong Thinh; Tran, Hoang Tung; Le, Vu Ha (2020)

  • Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and retrieval. It can be seen as a two-phase process: object detection and segmentation. Object segmentation becomes more challenging in case there is no prior knowledge about the object in the scene. In such conditions, visual attention analysis via saliency mapping may offer a mean to predict the object location by using visual contrast, local or global, to identify regions that draw strong attention in the image. However, in such situations as clutter background, highly varied object surface, or shadow, regular and salient object se...

  • item.jpg
  • Journal Article


  • Authors: Ngo, Kien Tuan; Vo, Dinh Hieu; Bui, Ngoc Thang; Pham, Le Viet Anh; Pham, Khanh Ly; Phan, Hai (2020)

  • Today, bibliometric databases are indispensable sources for researchers and research institutions. The main role of these databases is to find research articles and estimate the performance of researchers and institutions. Regarding the evaluation of the research performance of an organization, the accuracy in determining institutions of authors of articles is decisive. However, current popular bibliometric databases such as Scopus and Web of Science have not addressed this point efficiently. To this end, we propose an approach to revise the authors’ affiliation information of articles in bibliometric databases. We build a model to classify articles to institutions with high accuracy by a...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Hung K.; Tran, Xuan-Tu (2020)

  • In this paper, a PCA and ANN-based face recognition system is proposed and implemented on a Coarse Grain Reconfigurable Computing (CGRC) platform. Our work is quite distinguished from previous ones in two aspects. First, a new hardware-software co-design method is proposed, and the whole face recognition system is divided into several parallel tasks implemented on both the Coarse-Grained Reconfigurable Architecture (CGRA) and the General-Purpose Processor (GPP). Second, we analyzed the source code of the ANN algorithm and proposed the optimization solution to explore its multi-level parallelism to improve the performance of the application on the CGRC platform. The computation tasks o...

  • item.jpg
  • Journal Article


  • Authors: Vu, Ngoc Anh; Le, Hai Nam; Tran, Thi Hong Tham; Trinh, Quang Kien (2020)

  • This paper studies the effects of nonlinear distortion of Low Noise Amplifier (LNA) for the multichannel direct-RF sampling receiver (DRF). The main focus of our work is to study and compare the effectiveness of the different adaptive compensation algorithms, including the inverse-based and subtract-based Least Mean Square (LMS) algorithm with a fixed and variable step size. The models for the compensation circuits have been analytically derived. As the major improvements, the effectiveness of the compensation circuits under the ADC quantization noise effect is evaluated. The bit-error-rates (BER) in dynamic signal-to-noise ratio (SNR) scenarios are calculated. We have proposed the us...

  • item.jpg
  • Journal Article


  • Authors: Ta, Van-Thanh; Hoang, Van-Phuc (2020)

  • This paper presents a method for all-digital background calibration of multiple channel mismatches including offset, gain and timing mismatches in time-interleaved analog-to-digital converters (TIADCs). The average technique is used to remove offset mismatch at each channel. The gain mismatch is calibrated by calculating the power ratio of the sub-ADC over the reference ADC. The timing skew mismatch is calibrated by using Hadamard transform for error correction and LMS for timing mismatch estimation. The performance improvement of TIADCs employing these techniques is demonstrated through numerical simulations. Besides, achievement results on the field-programmable gate array (FPGA) ha...

  • 7.pdf.jpg
  • Article


  • Authors: Hoang, Hong Son; Pham, Cam Phuong; Theo, van Walsum; Luu, Manh Ha (2020)

  • Liver segmentation is relevant for several clinical applications. Automatic liver segmentation using convolutional neural networks (CNNs) has been recently investigated. In this paper, we propose a new approach of combining a largest connected component (LCC) algorithm, as a post-processing step, with CNN approaches to improve liver segmentation accuracy. Specifically, in this study, the algorithm is combined with three well-known CNNs for liver segmentation: FCN-CRF, DRIU and V-net. We perform the experiment on a variety of liver CT images, ranging from non-contrast enhanced CT images to low-dose contrast enhanced CT images. The methods are evaluated using Dice score, Haudorff distan...

  • 6.pdf.jpg
  • Article


  • Authors: Truong, Duc-Tai; Nguyen, Quoc-Tuan; Dinh, Thai-Mai Thi (2020)

  • Currently, there are a lot of secure communication schemes have been proposed to hide secret contents. In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses the security of the method encrypting directly QAM symbols instead of input bit-stream. This leads to improving the security of transmitting data by utilization of authentication key between the mobile and base station. The archived results demonstrate that the performance of the AES-OFDM system is completely acceptable to ...

  • 5.pdf.jpg
  • Article


  • Authors: Pham, Thanh Huyen; Ho, Thuan (2020)

  • The paper aims to improve the multi-label classification performance using the feature reduction technique. According to the determination of the dependency among features based on fuzzy rough relation, features with the highest dependency score will be retained in the reduction set. The set is subsequently applied to enhance the performance of the multi-label classifier. We investigate the effectiveness of the proposed model againts the baseline via time complexity.

  • 4.pdf.jpg
  • Article


  • Authors: Pham, Thi Quynh Trang; Bui, Manh Thang; Dang, Thanh Hai (2020)

  • Chemical compounds (drugs) and diseases are among top searched keywords on the PubMed database of biomedical literature by biomedical researchers all over the world (according to a study in 2009). Working with PubMed is essential for researchers to get insights into drugs’ side effects (chemical-induced disease relations (CDR), which is essential for drug safety and toxicity. It is, however, a catastrophic burden for them as PubMed is a huge database of unstructured texts, growing steadily very fast (~28 millions scientific articles currently, approximately two deposited per minute). As a result, biomedical text mining has been empirically demonstrated its great implications in biomed...

Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 97

Computer Science and Communication Engineering : [97]

Follow this collection to receive daily e-mail notification of new additions
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 97
  • item.jpg
  • Journal Article


  • Authors: Tran, Vinh Quang; Nguyen, Thi Ngoc Diep (2021)

  • Table is one of the most common ways to represent structured data in documents. Existing researches on image-based table structure recognition often rely on limited datasets with the largest amount of 3,789 human-labeled tables as ICDAR 19 Track B dataset. A recent Table Bank dataset for table structures contains 145K tables, however, the tables are labeled in an HTML tag sequence format, which impedes the development of image-based recognition methods. In this paper, we propose several processing methods that automatically convert an HTML tag sequence annotation into bounding box annotation for table cells in one table image. By assembling these methods, we could convert 42,02...

  • item.jpg
  • Journal Article


  • Authors: Phi, Hoang Nha; Pham, Hung Phi; Dao, Quang Thuy; Le, Xuan Hai; Pham, Xuan Dat; Nguyen, Ngoc Linh (2021)

  • The paper presents a new approach to design a nonlinear controller for switched reluctance motors (SRMs) based on backstepping technique and artificial neuron network (ANN) in flux estimator. Backstepping controller with an ANN flux estimator will be applied for controlling SRMs which have a nonlinear drive model. The ANN flux estimator was trained off-line using backpropagation algorithm. The stability of the closed control loop was analyzed and proved accroding to the Lyapunov stability standard. The numerical simulation results confirmed the accuracy of the estimator and the quality of the backstepping control system.

  • item.jpg
  • Journal Article


  • Authors: Pham, Khoi Dong; Nguyen, Hung K; Hussin, Fawnizu Azmadi; Tran, Xuan Tu (2021)

  • Security issues in high-speed data transfer between devices are always a big challenge. On the other hand, new data transfer standards such as IEEE P802.3bs 2017 stipulate the maximum data rate up to 400 Gbps. So, security encryptions need high throughput to meet data transfer rates and low latency to ensure the quality of services. In this paper, we propose a multi-core AES encryption hardware architecture to achieve ultra-high-throughput encryption. To reduce area cost and power consumption, these cores share the same KeyExpansion blocks. Fully parallel, outer round pipeline technique is also applied to the proposed architecture to achieve low latency encryption. The design has been...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Ngoc Khai; Truong, Anh Hoang; Dang, Duc Hanh (2021)

  • Estimating memory required by complex programs is a well-known research topic. In this work, we build a type system to statically estimate the memory bounds required by shared variables in software transactional memory (STM) programs. This work extends our previous works with additional language features such as explicitly declared shared variables, introduction of primitive types, and allowing loop body to contain any statement, not required to be well-typed as in our previous works. Also, the new type system has better compositionality compared to available type systems.

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Van Tu; Le, Anh Cuong (2021)

  • The community Question Answering (cQA) problem requires the task that given a question it aims at selecting the most related question-answer tuples (a question and its answers) from the stored question-answer tuples data set. The core mission of this task is to measure the similarity (or relationship) between an input question and questions from the given question-answer data set. Under our observation, there are either various information sources as well as di erent measurement models which can provide complementary knowledge for indicating the relationship between questions and question-answer tuples. In this paper we address the problem of modeling and combining multiple knowledge ...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Van Tanh; Ngo, Quang Tri; Nguyen, Linh Giang; Nguyen, Anh Tuan; Nguyen, Van Ngo (2021)

  • With the increase of the threats at information security in Internet of Things (IoT), there are more and more security solutions have been designing. Unlike the traditional security, these solutions need to adapt with IoT Platform because of the difference about complex communication protocol, low energy, processing ability and limited memory. Our research team, after had been under a long process of analyzing theoretical documents and operating simulated experiments, improved, and implemented CurveCP which is one of these Lightweight cryptographies in the Wireless sensor Networks (WSN) to enhance data secure and information security of IoT System. This study briefly describes the imp...

  • item.jpg
  • Journal Article


  • Authors: Tran, Van Trung; Tran, Anh Tu; Nguyen, Phuong Thao; Luu, Quang Thang; Pham, Bao Son; Bui, Quang Hung (2021)

  • In this article, we present an optimal method for searching the address on VMap based on the current location and the entire view of the users. The article will focus on understanding and researching factors to optimize user's search, enhancing the user’s experience on VMap. The article used data from OpenStreetMap, open source of Pelias geocoder to run test suites. Specifically, based on comparison results with the best rated digital map platform today, Google Maps, we calculated the effectiveness of the method. The proposed method helps to diversify search results with the user's current location, providing relevant search results in case the user's view does not have much influence...

  • item.jpg
  • Journal Article


  • Authors: Pham, Manh Linh; Hoang, Xuan Tung (2021)

  • Internet of Things (IoT) applications are increasingly making impact in all areas of humanlife. Day by day, its chatty embedded devices have been generating tons of data requiring effectivenetwork infrastructure. To deliver millions of IoT messages back and fort with as few faults aspossible, participation of communication protocols like MQTT is a must. Lightweight blueprintand friendly battery are just two of many advantages of this protocol making it become a dominantin IoT world. In real application scenarios, distributed MQTT solutions are usually required sincecentralized MQTT approach is incapable of dealing with huge amount of data. Although distributedMQTT solutions are scalab...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Duc Thao; Nguyen, Viet Anh; Le, Thanh Ha; Ngo, Thi Duyen (2021)

  • With the development of virtual reality (VR) technology and its applications in many fields, creating simulated hands in the virtual environment is an e ective way to replace the controller as well as to enhance user experience in interactive processes. Therefore, hand tracking problem is gaining a lot of research attention, making an important contribution in recognizing hand postures as well as tracking hand motions for VR’s input or human machine interaction applications. In order to create a markerless real-time hand tracking system suitable for natural human machine interaction, we propose a new method that combines generative and discriminative methods to solve the hand tracking...

  • item.jpg
  • Journal Article


  • Authors: Pham, Ngoc Son; Tran, Trung Duy; Truong, Phuc Quang; Truong, Son Ngoc; Pham, Viet Tuan; Phan, Van-Ca; Ho, Van Khuong (2021)

  • In this paper, we analyze an underlay two-way decode-and-forward scheme in which secondary relays use successive interference cancellation (SIC) technology to decode data of two secondary sources sequentially, and then generate a coded signal by superposition coding (SC) technology, denoted as SIC-SC protocol. The SIC-SC protocol is designed to operate in two time slots under effects from an interference constraint of a primary receiver and residual interference of imperfect SIC processes. Transmit powers provided to carry the data are allocated dynamically according to channel powers of interference and transmission, and a secondary relay is selected from considering strongest channe...

  • item.jpg
  • Journal Article


  • Authors: Mai, Manh Trung; Do, Trung Tuan; Le, Phe Do (2020)

  • This article presents building an Elliptic curve cryptography and using it to encode and decode Vietnamese text. Here we have illustrated the prime number p = 151 in the future, which will use a large prime number. We consider an elliptic curve with a total score of 172 points. Encode and decode with standard Vietnamese text and combine with the special characters in ASCII code. The program is designed and installed and on the C# environment to give the correct result of the encryption algorithm.

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Hong Thinh; Tran, Hoang Tung; Le, Vu Ha (2020)

  • Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and retrieval. It can be seen as a two-phase process: object detection and segmentation. Object segmentation becomes more challenging in case there is no prior knowledge about the object in the scene. In such conditions, visual attention analysis via saliency mapping may offer a mean to predict the object location by using visual contrast, local or global, to identify regions that draw strong attention in the image. However, in such situations as clutter background, highly varied object surface, or shadow, regular and salient object se...

  • item.jpg
  • Journal Article


  • Authors: Ngo, Kien Tuan; Vo, Dinh Hieu; Bui, Ngoc Thang; Pham, Le Viet Anh; Pham, Khanh Ly; Phan, Hai (2020)

  • Today, bibliometric databases are indispensable sources for researchers and research institutions. The main role of these databases is to find research articles and estimate the performance of researchers and institutions. Regarding the evaluation of the research performance of an organization, the accuracy in determining institutions of authors of articles is decisive. However, current popular bibliometric databases such as Scopus and Web of Science have not addressed this point efficiently. To this end, we propose an approach to revise the authors’ affiliation information of articles in bibliometric databases. We build a model to classify articles to institutions with high accuracy by a...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Hung K.; Tran, Xuan-Tu (2020)

  • In this paper, a PCA and ANN-based face recognition system is proposed and implemented on a Coarse Grain Reconfigurable Computing (CGRC) platform. Our work is quite distinguished from previous ones in two aspects. First, a new hardware-software co-design method is proposed, and the whole face recognition system is divided into several parallel tasks implemented on both the Coarse-Grained Reconfigurable Architecture (CGRA) and the General-Purpose Processor (GPP). Second, we analyzed the source code of the ANN algorithm and proposed the optimization solution to explore its multi-level parallelism to improve the performance of the application on the CGRC platform. The computation tasks o...

  • item.jpg
  • Journal Article


  • Authors: Vu, Ngoc Anh; Le, Hai Nam; Tran, Thi Hong Tham; Trinh, Quang Kien (2020)

  • This paper studies the effects of nonlinear distortion of Low Noise Amplifier (LNA) for the multichannel direct-RF sampling receiver (DRF). The main focus of our work is to study and compare the effectiveness of the different adaptive compensation algorithms, including the inverse-based and subtract-based Least Mean Square (LMS) algorithm with a fixed and variable step size. The models for the compensation circuits have been analytically derived. As the major improvements, the effectiveness of the compensation circuits under the ADC quantization noise effect is evaluated. The bit-error-rates (BER) in dynamic signal-to-noise ratio (SNR) scenarios are calculated. We have proposed the us...

  • item.jpg
  • Journal Article


  • Authors: Ta, Van-Thanh; Hoang, Van-Phuc (2020)

  • This paper presents a method for all-digital background calibration of multiple channel mismatches including offset, gain and timing mismatches in time-interleaved analog-to-digital converters (TIADCs). The average technique is used to remove offset mismatch at each channel. The gain mismatch is calibrated by calculating the power ratio of the sub-ADC over the reference ADC. The timing skew mismatch is calibrated by using Hadamard transform for error correction and LMS for timing mismatch estimation. The performance improvement of TIADCs employing these techniques is demonstrated through numerical simulations. Besides, achievement results on the field-programmable gate array (FPGA) ha...

  • 7.pdf.jpg
  • Article


  • Authors: Hoang, Hong Son; Pham, Cam Phuong; Theo, van Walsum; Luu, Manh Ha (2020)

  • Liver segmentation is relevant for several clinical applications. Automatic liver segmentation using convolutional neural networks (CNNs) has been recently investigated. In this paper, we propose a new approach of combining a largest connected component (LCC) algorithm, as a post-processing step, with CNN approaches to improve liver segmentation accuracy. Specifically, in this study, the algorithm is combined with three well-known CNNs for liver segmentation: FCN-CRF, DRIU and V-net. We perform the experiment on a variety of liver CT images, ranging from non-contrast enhanced CT images to low-dose contrast enhanced CT images. The methods are evaluated using Dice score, Haudorff distan...

  • 6.pdf.jpg
  • Article


  • Authors: Truong, Duc-Tai; Nguyen, Quoc-Tuan; Dinh, Thai-Mai Thi (2020)

  • Currently, there are a lot of secure communication schemes have been proposed to hide secret contents. In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses the security of the method encrypting directly QAM symbols instead of input bit-stream. This leads to improving the security of transmitting data by utilization of authentication key between the mobile and base station. The archived results demonstrate that the performance of the AES-OFDM system is completely acceptable to ...

  • 5.pdf.jpg
  • Article


  • Authors: Pham, Thanh Huyen; Ho, Thuan (2020)

  • The paper aims to improve the multi-label classification performance using the feature reduction technique. According to the determination of the dependency among features based on fuzzy rough relation, features with the highest dependency score will be retained in the reduction set. The set is subsequently applied to enhance the performance of the multi-label classifier. We investigate the effectiveness of the proposed model againts the baseline via time complexity.

  • 4.pdf.jpg
  • Article


  • Authors: Pham, Thi Quynh Trang; Bui, Manh Thang; Dang, Thanh Hai (2020)

  • Chemical compounds (drugs) and diseases are among top searched keywords on the PubMed database of biomedical literature by biomedical researchers all over the world (according to a study in 2009). Working with PubMed is essential for researchers to get insights into drugs’ side effects (chemical-induced disease relations (CDR), which is essential for drug safety and toxicity. It is, however, a catastrophic burden for them as PubMed is a huge database of unstructured texts, growing steadily very fast (~28 millions scientific articles currently, approximately two deposited per minute). As a result, biomedical text mining has been empirically demonstrated its great implications in biomed...

Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 97