- Cloud Computing and Resource Management
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Chaos-based Image/Signal Encryption
- Cloud Data Security Solutions
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Distributed and Parallel Computing Systems
- Algorithms and Data Compression
- Video Analysis and Summarization
- User Authentication and Security Systems
- Access Control and Trust
- Advanced Authentication Protocols Security
- Advanced MIMO Systems Optimization
- Microwave and Dielectric Measurement Techniques
- Opportunistic and Delay-Tolerant Networks
- Cryptography and Residue Arithmetic
- IoT Networks and Protocols
- Robot Manipulation and Learning
- Wireless Communication Security Techniques
- Machine Learning in Bioinformatics
- Cryptography and Data Security
- Bluetooth and Wireless Communication Technologies
- Smart Parking Systems Research
- Video Coding and Compression Technologies
Hanoi University of Science and Technology
2023
Worcester Polytechnic Institute
2018-2021
Eastern International University
2020-2021
Ho Chi Minh City University of Technology
2017
Vietnam National University Ho Chi Minh City
2017
University of Kent
2013
University of Stavanger
2007-2012
SRI International
2004
Menlo School
2004
The permittivity of blood glucose is not a strong function its concentration in microwave or millimeter-wave frequencies. Measuring concentrations remains challenge, particularly the presence interference caused by ambient leaky waves. In this paper, however, we demonstrate that near-linear correlation between and was noticeably observed at whispering gallery mode resonance. Method: proposed sensor vacuum suction aspirator partially wounded with turn Goubau line. This arrangement enabled...
This paper focuses on developing autonomous waste management which helps efficient and optimal collecting recycling of garbage. Optimized green energy-based approach lead to less fuel consumption, eventually cuts off the carbon footprint, making process eco-friendlier. Specifically, an truck is utilized automatically collect garbage from smart bins a transfer station by means solar-powered sensor networks, trajectory planning, self-driving car, RFID recognition, etc. To build bin, we use...
The paper introduces a new secure power aware many-to-many routing protocol for wireless sensor and actuator networks. Actuators register sensing data nodes send directly to actuators using the proposed protocol. has two versions. first version is designed networks where every node transmits at same level. second case can individually adjust transmission according channel conditions communications distance. increases energy efficiency prolongs network life-time while still keeps secure....
The concept of "cloud" becomes a common metaphor for an Internet accessible infrastructure, e.g. data storage and computing hardware, which is hidden from users. Cloud makes truly mobile user can simply access chosen cloud with any internet device. In computing, IT-related capabilities are provided as services, without requiring detailed knowledge the underlying technologies. Many mature technologies used components in enabling while there still exists many challenges further development...
Integer factorization is an interesting but a hard problem and stays at the core of many security mechanisms. Conventional approaches to factor big integer numbers often require powerful computers great effort in software development. In this paper, we present different approach by running quadratic sieve algorithm Hadoop framework. This offers much easier way develop program setup working environment. It can also be scaled easily work with large number computers.
In this paper, we design a test-bed for bumblebee inspired channel selection algorithm employed on wireless ad-hoc network. Vehicles in connected networks are routinely challenged with the complex decision-making problem of either staying same or moving to different under highly time-varying quality conditions. order enable vehicles adapt these conditions, designed bumblebee-inspired algorithm. The proposed uses temporal information optimal selection. Channel energy values used making...
A new secure power aware many-to-many routing protocol for wireless sensor and actuator networks is introduced. The has two versions. first version designed where every node transmits at the same level. second case nodes can individually adjust transmission according to channel conditions communications distance. In both versions, actuators are registered sensed data, intermediate that relays registration messages authenticates them through an efficient protocol. When have they sent directly...
Bluetooth has solidified its status as one of the most prominent and versatile wireless communication technologies alongside Wi-Fi. In spite widespread usage, contemporary testing technology still many unaddressed shortcomings issues. Hardware limitations, computational complexity, lack standardization are some these longstanding problems. Furthermore, very few systems possess a proven reliable capability to test both Wi-Fi Bluetooth. This paper presents development an adaptive test-bed...
The prediction of protein secondary structure is a topic that has been tackled by many researchers in the field bioinformatics.In previous work, this problem solved various methods including use traditional classification neural networks with standard error back-propagation training algorithm.Since network may have poor generalisation, Bayesian technique used to improve generalisation and robustness these networks.This paper describes optimised for structure.The well-known RS126 dataset was...
Autonomous mobile robots belong to automatically controlled objects that are designed and produced for various demands. This study aimed develop an inexpensive platform of autonomous can be used educational research purposes in technical universities. The robot was built based on popular ultrasonic sensors detect obstacles a Raspberry Pi 4, which is Linux-embedded computer. An effective obstacle avoidance algorithm the developed using Bayesian neural network classification. Training does not...