Hung Viet Nguyen

ORCID: 0000-0001-6349-1044
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Computing Algorithms and Architecture
  • Cooperative Communication and Network Coding
  • Quantum Information and Cryptography
  • Advanced Wireless Communication Technologies
  • Software Engineering Research
  • Software Testing and Debugging Techniques
  • Quantum-Dot Cellular Automata
  • Optical Wireless Communication Technologies
  • Advanced MIMO Systems Optimization
  • Web Application Security Vulnerabilities
  • Optical Network Technologies
  • Full-Duplex Wireless Communications
  • IoT and Edge/Fog Computing
  • Advancements in Semiconductor Devices and Circuit Design
  • Web Data Mining and Analysis
  • Advanced Text Analysis Techniques
  • Advanced Malware Detection Techniques
  • Software System Performance and Reliability
  • Natural Language Processing Techniques
  • Energy Harvesting in Wireless Networks
  • Semiconductor materials and devices
  • Wireless Networks and Protocols
  • Software Reliability and Analysis Research
  • Healthcare Technology and Patient Monitoring
  • Semantic Web and Ontologies

Hanoi Medical University
2025

University of Massachusetts Chan Medical School
2025

Federation University
2025

University of Transport and Communications
2013-2023

Mie University
2022

Vietnam Academy of Science and Technology
2022

Vietnam National University Ho Chi Minh City
2021

University of Southampton
2010-2019

California State University, Long Beach
2019

California University of Pennsylvania
2019

Quantum information processing exploits the quantum nature of information. It offers fundamentally new solutions in field computer science and extends possibilities to a level that cannot be imagined classical communication systems. For channels, many capacity definitions were developed comparison counterparts. A channel can used realize transmission or deliver information, such as entanglement. Here we review properties channel, various measures fundamental differences between channels.

10.1109/comst.2017.2786748 article EN cc-by IEEE Communications Surveys & Tutorials 2018-01-01

Faster, ultra-reliable, low-power, and secure communications has always been high on the wireless evolutionary agenda. However, appetite for faster, more reliable, greener, continues to grow. The state-of-the-art methods conceived achieving performance targets of associated processes may be accompanied by an increase in computational complexity. Alternatively, a degraded have accepted due lack jointly optimized system components. In this survey we investigate employment quantum computing...

10.1109/comst.2018.2882385 article EN cc-by IEEE Communications Surveys & Tutorials 2018-11-20

Code completion helps improve developers' programming productivity. However, the current support for code is limited to context-free templates or a single method call of variable on focus. Using software libraries development, developers often repeat API usages certain tasks. Thus, tool could make use usage patterns. In this paper, we introduce GraPacc, graph-based, pattern-oriented, context-sensitive approach that based database such GraPacc represents and manages patterns multiple...

10.5555/2337223.2337232 article EN International Conference on Software Engineering 2012-06-02

Quantum error correction codes (QECCs) can be constructed from the known classical coding paradigm by exploiting inherent isomorphism between and quantum regimes, while also addressing challenges imposed strange laws of physics. In this spirit, paper provides deep insights into duality theory, hence aiming for bridging gap them. Explicitly, we survey rich history both as well codes. We then provide a comprehensive slow-paced tutorial constructing stabilizer-based QECCs arbitrary binary...

10.1109/comst.2018.2861361 article EN cc-by IEEE Communications Surveys & Tutorials 2019-01-01

This paper proposes a novel design and analyzes security performance of quantum key distribution (QKD) protocol over free-space optics (FSO). Unlike conventional QKD protocols based on physical characteristics mechanics, the proposed can be implemented standard FSO systems using subcarrier intensity modulation binary phase shift keying direct detection with dual-threshold receiver. Under constraints, criteria for transmitter receiver, in particular, depth selection detection, respectively,...

10.1109/access.2018.2800291 article EN cc-by-nc-nd IEEE Access 2018-01-01

Most of the nodes in ad hoc networks rely on batteries, which requires energy saving. Hence, numerous energy-efficient routing algorithms have been proposed for solving this problem. In paper, we exploit benefits cross-layer information exchange, such as knowledge Frame Error Rate (FER) physical layer, maximum number retransmissions Medium Access Control (MAC) layer and relays network layer. Energy-consumption-based Objective Functions (OF) are invoked calculating end-to-end consumption each...

10.1109/tcomm.2013.121413.120767 article EN IEEE Transactions on Communications 2014-01-31

Socioeconomic status (SES) measures one’s access to social resources across various dimensions. Traditionally, studies on SES commonly use principal component analysis (PCA), a data-driven method, condense these dimensions into components, typically selecting the first represent SES. However, PCA may lack specificity for particular outcomes. Decision tree (DTA), knowledge-driven approach that identifies outcome-specific dimensions, address PCA’s weaknesses but might not comprehensively...

10.1177/00220345251324494 article EN cc-by-nc Journal of Dental Research 2025-03-18

Sentiment analysis is a natural language processing (NLP) task of identifying orextracting the sentiment content text unit. This has become an active research topic since early 2000s. During two last editions VLSP workshop series, shared on Analysis (SA) for Vietnamese been organized in order to provide objective evaluation measurement about performance (quality) tools, and encouragethe development systems, as well benchmark datasets this task. The rst campaign 2016 only focused polarity...

10.15625/1813-9663/34/4/13160 article EN Journal of Computer Science and Cybernetics 2019-01-30

Build process is crucial in software development. However, the analysis support for build code still limited. In this paper, we present SYMake, an infrastructure and tool of make. Due to dynamic nature make language, it challenging understand maintain complex Makefiles. SYMake provides a symbolic evaluation algorithm that processes Makefiles produces dependency graph (SDG), which represents dependencies (i.e. rules) among files via commands. During evaluation, each resulting string value SDG...

10.5555/2337223.2337300 article EN International Conference on Software Engineering 2012-06-02

Build process is crucial in software development. However, the analysis support for build code still limited. In this paper, we present SYMake, an infrastructure and tool of make. Due to dynamic nature make language, it challenging understand maintain complex Makefiles. SYMake provides a symbolic evaluation algorithm that processes Makefiles produces dependency graph (SDG), which represents dependencies (i.e. rules) among files via commands. During evaluation, each resulting string value SDG...

10.1109/icse.2012.6227152 article EN 2013 35th International Conference on Software Engineering (ICSE) 2012-06-01

Checking/correcting HTML validation errors in Web pages is helpful for developers finding/fixing bugs. However, existing validating/fixing tools work well only on static and do not help fix the corresponding server code if are found pages, due to several challenges with dynamically generated development. We propose PhpSync, a novel automatic locating/fixing tool PHP-based applications. Given an page produced by server-side PHP program, PhpSync uses Tidy, validating/correcting find that page....

10.1109/ase.2011.6100047 article EN 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2011-11-01

In dynamic Web applications, there often exists a type of code smells, called embedded that violate important principles in software development such as modularity and separation concerns, resulting much maintenance effort. Detecting fixing those smells is crucial yet challenging since the with generated from server-side code.

10.1145/2351676.2351724 article EN 2012-09-03

Large-scale quantum network coding (LQNC) is conceived for distributing entangled qubits over large-scale communication networks supporting both teleportation and key distribution. More specifically, the LQNC characterized by detailing encoding decoding process pairs of to <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$M$ </tex-math></inline-formula> source-and-target users connected via a backbone route...

10.1109/access.2017.2738781 article EN cc-by IEEE Access 2017-01-01

An ideal visible light communication (VLC) system should facilitate reliable data transmission at high throughputs, while also providing flicker-free illumination the user-defined dimming level. In this spirit, we conceive a unary code aided scheme for ON-OFF keying (OOK) modulated VLC systems. The proposed unary-coded facilitates joint and throughput control, relying on iterative decoding. It is demonstrated that provides attractive gains over its contemporaries it capable of approaching...

10.1109/tcomm.2017.2759271 article EN IEEE Transactions on Communications 2017-10-04

When developing and maintaining a software system, programmers often rely on IDEs to provide editor services such as syntax highlighting, auto-completion, "jump declaration". In dynamic web applications, tool support is currently limited either the server-side code or hand-written generated client-side code. Our goal build call graph for providing while it still embedded string literals within First, we symbolically execute identify all possible variations. Subsequently, parse with its...

10.1145/2635868.2635928 article EN 2014-11-04

Abstract When quantum computing becomes a wide-spread commercial reality, Quantum Search Algorithms (QSA) and especially Grover’s QSA will inevitably be one of their main applications, constituting cornerstone. Most the literature assumes that circuits are free from decoherence. Practically, decoherence remain unavoidable as is Gaussian noise classic imposed by Brownian motion electrons, hence it may have to mitigated. In this contribution, we investigate effect on performance QSAs, in terms...

10.1038/srep38095 article EN cc-by Scientific Reports 2016-12-07

With the proliferation of millimeter-Wave (mm-Wave) systems and visible light communications (VLCs), indoor localization may find multiple applications. When high accuracy is required triangulation not possible due to infrastracture scenario limitations, computational complexity searching on a virtual grid become excessive. In this paper, we amalgamate uplink mm-Wave-based downlink VLC-based localization. We employ quantum search algorithms for reducing achieving optimal full-search-based...

10.1109/access.2017.2733557 article EN cc-by IEEE Access 2017-01-01

During software maintenance, program slicing is a useful technique to assist developers in understanding the impact of their changes. While different program-slicing techniques have been proposed for traditional systems, dynamic web applications challenging since client-side code generated from server-side and data entities are referenced across languages often embedded string literals program. To address those challenges, we introduce WebSlice, an approach compute slices applications. We...

10.1145/2786805.2786872 article EN 2015-08-26

In this contribution, the Hashing bound of entanglement-assisted quantum channels is investigated in context devices built from a range popular materials, such as trapped ion and relying on solid state nuclear magnetic resonance, which can be modeled so-called asymmetric channel. Then, error correction codes (QECC) are designed based extrinsic information transfer charts for improving performance when employing these devices. The results also verified by simulations. Our QECC schemes capable...

10.1109/access.2016.2591910 article EN cc-by IEEE Access 2016-01-01

With the research on implementing a universal quantum computer being under technological spotlight, new possibilities appear for their employment in wireless communications systems reducing complexity and improving performance. In this treatise, we consider downlink of rank-deficient, multi-user system propose discrete-valued continuous-valued quantum-assisted particle swarm optimization (PSO) algorithms performing vector perturbation precoding, as well lowering required transmission power...

10.1109/access.2016.2591904 article EN cc-by IEEE Access 2016-01-01

A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log medical device patient information allows efficient forensic analysis cases adverse events or attacks on interoperable devices. secure as such must meet requirements confidentiality integrity message logs provide tamper-detection tamper-evidence. In this paper, we propose design for cloud-based using Intel Software Guard Extensions (SGX) Trusted Platform Module (TPM). The proposed receives from dongle...

10.1109/chase.2016.48 article EN 2016-06-01

In this tutorial, the design procedure of near-capacity channel code invoking non-binary EXtrinsic Information Transfer (EXIT) charts is illustrated by using examples Irregular Concatenated Coding Arrangements (ICCAs) relying on Convolutional Codes (IrCCs). More specifically, in order to benchmark examples, both capacity and Outage Probability (OP) Continuous-input Continuous-output Memoryless Channel (CCMC), Discrete-input (DCMC) as well Differential (D-DCMC) are characterised. Furthermore,...

10.1109/comst.2015.2464300 article EN IEEE Communications Surveys & Tutorials 2015-01-01

In this letter, we aim for maximizing the throughput of a visible light communication (VLC) system. Explicitly, conceive soft-in soft-out decoder providing soft feedback classic run length limited (RLL) codes, hence facilitating iterative decoding exchanging valuable extrinsic information between RLL and error correction modules VLC Furthermore, propose unity rate code our system, which, hence, becomes capable matching ON-OFF keying capacity, while maintaining flicker-free dimming value 50%.

10.1109/lpt.2016.2625808 article EN IEEE Photonics Technology Letters 2016-11-07

An A3 is a problem-solving tool, however, it can be used in other ways and the corresponding formats vary depending on purpose of use. For example, Toyota uses three basic types reports (Shook 2008, Sobek &amp; Smalley 2008): problem solving proposal status. This summary our research Virtual First-Run Studies (VRFSs), therefore its story line represents flow structure scientific paper. In creating this A3, authors attempted to so as add most value Lean Construction Journal readers. Only...

10.60164/29d1f0f1d article EN cc-by-nc-nd Lean Construction Journal 2010-12-31
Coming Soon ...