Tran Trung Duy

ORCID: 0000-0002-3947-2174
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Communication Technologies
  • Energy Harvesting in Wireless Networks
  • Cognitive Radio Networks and Spectrum Sensing
  • Full-Duplex Wireless Communications
  • Mobile Ad Hoc Networks
  • IoT Networks and Protocols
  • Energy Efficient Wireless Sensor Networks
  • Satellite Communication Systems
  • Optical Wireless Communication Technologies
  • Wireless Communication Networks Research
  • Advanced Antenna and Metasurface Technologies
  • Muscle activation and electromyography studies
  • Security in Wireless Sensor Networks
  • Advanced Sensor and Energy Harvesting Materials
  • Advanced Wireless Communication Techniques
  • Advanced Wireless Network Optimization
  • Non-Invasive Vital Sign Monitoring
  • UAV Applications and Optimization
  • Advancements in Battery Materials
  • Distributed Sensor Networks and Detection Algorithms
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Research in Systems and Signal Processing

Vietnam Posts and Telecommunications Group (Vietnam)
2015-2025

Ton Duc Thang University
2017-2025

Research Institute of Posts and Telecommunications
2015-2024

Posts and Telecommunications Institute of Technology
2015-2024

Hanoi University of Science and Technology
2024

Phenikaa University
2022

Saigon International University
2020

Anova Corp (Vietnam)
2020

Hoa Sen University
2020

Ho Chi Minh City University of Transport
2020

This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward networks, where a pair of relays is opportunistically selected security protection against eavesdropping. The first transmits the secrecy information to destination, and second relay, as friendly jammer, jamming signal confound eavesdropper. We present new exact closed-form expressions outage probability. Our analysis simulation results strongly support our conclusion that proposed...

10.1109/lwc.2014.2365808 article EN IEEE Wireless Communications Letters 2014-10-30

In this paper, we investigate the end-to-end performance of dual-hop proactive decode-and-forward relaying networks with Nth best relay selection in presence two practical deleterious effects: i) hardware impairment and ii) co-channel interference. particular, derive new exact asymptotic closed-form expressions for outage probability average channel capacity partial opportunistic schemes over Rayleigh fading channels. Insightful discussions are provided. It is shown that, when system cannot...

10.1109/tcomm.2015.2396517 article EN IEEE Transactions on Communications 2015-01-28

Energy-harvesting-based physical-layer security has become a promising technique, as it not only secures information from eavesdropping without upper layer data encryption but also improves the energy efficiency of wireless networks. However, imposes new challenges, adversary parties can overhear transmission confidential between source and destination via relay. Therefore, transmit power signals must be large enough for harvesting, small to avoid eavesdropping. This is even more challenging...

10.1109/jsen.2018.2829145 article EN IEEE Sensors Journal 2018-04-23

Outage probability (OP) and potential throughput (PT) of multihop full-duplex (FD) nonorthogonal multiple access (NOMA) systems are addressed in the present paper. More precisely, two metrics derived closed-form expressions under impact both imperfect successive interference cancellation (SIC) self-interference cancellation. Moreover, to model short transmission distance from transmit receive antennae at relays, near-field path-loss is taken into consideration. Additionally, total power on...

10.3390/s23010524 article EN cc-by Sensors 2023-01-03

This paper proposes and studies performance of reconfigurable intelligent surface (RIS)assisted multi-hop schemes employing short packet communication (SPC).In the proposed schemes, a source sends its data to destination, one RIS is deployed assist transmission at each hop.For complexity reduction purposes, we propose two RIS-assisted methods hop.In first one, only used when quality direct link not good.In second or relay via selected for transmission.We evaluate by deriving formulas...

10.15598/aeee.v22i1.5583 article EN Advances in Electrical and Electronic Engineering 2024-03-31

In this study, the authors analyse outage performance of a cognitive two-way relaying system under an interference constraint. proposed protocol, best relay which is chosen by opportunistic selection strategy, combines received packets using XOR operation and then forwards combined packet to two secondary sources. The derive exact closed-form expression probability over flat block Rayleigh fading channels. Various Monte-Carlo simulations are presented verify theoretical analyses compare...

10.1049/iet-com.2012.0235 article EN IET Communications 2012-11-06

In this study, the authors evaluate secrecy performance of cooperative protocols with relay selection methods under impact co-channel interference. particular, propose an optimal scheme to maximise capacity obtained at phase. addition, also consider suboptimal and random schemes which reduce complexity implementation, when compared one. For evaluation, derive exact asymptotic closed-form expressions outage probability non-zero for considered over Rayleigh fading channels. Monte Carlo...

10.1049/iet-com.2014.1128 article EN IET Communications 2015-05-27

This study considers a dual-hop cognitive inter-vehicular relay-assisted communication system where all links are non-line of sight ones and their fading is modelled by the double Rayleigh distribution. Road-side relays (or access points) implementing decode-and-forward relaying protocol employed one them selected according to predetermined policy enable between vehicles. The performance considered cooperative investigated for Kth best partial full relay selection (RS) as well two distinct...

10.1049/iet-com.2015.0236 article EN other-oa IET Communications 2015-12-15

The present paper addresses the performance of broadcasting scheme in cognitive radio networks (CRNs) under a fountain codes (FC) approach. Particularly, closed-form expressions are derived for cumulative distribution function (CDF) and expectation number FC clock cycles required packets to all secondary receivers. energy efficiency (EE) (SN) is also provided. Moreover, simple transmit power proposed enhance SN guarantee quality-of-service (QoS) primary network (PN). trends introduced...

10.1109/tvt.2022.3188969 article EN IEEE Transactions on Vehicular Technology 2022-07-07

Full-duplex communication offers enhanced spectral efficiency for relay deployment, but suffers from the inherent self-interference strong transmit signal coupling to sensitive receive chain. In this article, we propose a self-energy recycling (S-ER) protocol full-duplex multi-relay networks, in which energy is harvested back at future use. Furthermore, two amplify-and-forward (AF) selection algorithms, namely, partial (PRS) and full (FRS) are introduced enhance reliability of proposed...

10.1109/tvt.2022.3158340 article EN IEEE Transactions on Vehicular Technology 2022-03-10

Next- generation wireless communications are projected to integrate reconfigurable intelligent surfaces (RISs) perpetrate enhanced spectral and energy efficiencies. To quantify the performance of RIS-aided networks, statistics a single random variable plus sum double variables becomes core approach reflect how communication links from RISs improve wireless-based systems versus direct ones. With this in mind, work applies secure RIS-based non-orthogonal multi-access (NOMA) with presence...

10.3390/electronics14020392 article EN Electronics 2025-01-20

This paper proposes a secure wireless communication system that integrates Physical Layer Security (PLS) with Energy Harvesting (EH) to improve both data confidentiality and network sustainability. The model consists of source node S, powered by energy harvested from spatially distributed power stations, multi-antenna destination D, an eavesdropper E located within the range. A time-switching protocol enables S alternate between harvesting transmission. To enhance signal quality security, D...

10.5455/jjcit.71-1732244909 article EN cc-by Jordanian Journal of Computers and Information Technology 2025-01-01

This research delves into the promising applications of silicon dioxide (SiO2) nanoparticles related to their ability enhance conversion efficiency for luminescent materials through modifications in scattering effects. In addition, study uses semi-spherical lens packaging structure preparing LED models, owing its advantages achieving higher light extraction and minimal total internal reflection loss. The core objective this paper is augment existing knowledge by incorporating SiO2 uniformly...

10.55579/jaec.202591.476 article EN cc-by Journal of Advanced Engineering and Computation 2025-03-31

The performance of hybrid satellite-terrestrial relaying (HSTR) networks is investigated in this work. Specifically, we examine the trade-off between reliability and security HSTR using two key parameters: outage probability (OP) intercept (IP). Both metrics are derived closed-form expressions under assumption imperfect channel state information (CSI) for legitimate channels. Additionally, a directional antenna employed to compensate significant path loss caused by long transmission distance...

10.21553/rev-jec.399 article EN REV Journal on Electronics and Communications 2025-03-29

The requirements for facilitating spectral efficiency and energy become increasing important future wireless networks. Ambient backscatter communication (AmBC) has recently been recognized as a technology to meet these requirements. Furthermore, reconfigurable intelligent surfaces (RISs) have emerged an effective ameliorate the performance of communications. Motivated by these, this letter investigates channel characterization RIS-assisted AmBC system. Particularly, we derive closed-form...

10.1109/lwc.2023.3344113 article EN IEEE Wireless Communications Letters 2023-12-18

In this paper, we propose a hybrid decode-amplify-forward incremental cooperative diversity protocol using SNR-based relay selection. the proposed protocol, whenever destination unsuccessfully receives source's signal, one of relays that exploit technique is chosen to retransmit signal. We derive approximate closed-form expressions outage probability and average channel capacity. MonteCarlo simulations are presented verify theoretical results compare performance with direct transmission...

10.1109/jcn.2012.00036 article EN Journal of Communications and Networks 2012-12-01

In this paper, we propose an energy harvesting (EH)-based spectrum access model in cognitive radio (CR) network.In the proposed scheme, one of available secondary transmitters (STs) helps a primary transmitter (PT) forward signals to receiver (PR).Via cooperation, selected ST finds opportunities licensed bands transmit its intended (SR).Secondary users are assumed be mobile, hence, optimization consumption for these is interested.The EH STs have harvest from PT's radio-frequency (RF) serve...

10.13164/re.2017.0240 article EN cc-by Radioengineering 2017-04-13

In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. the proposed protocol, secondary source attempts transmit its data destination with assistance of multiple relays. addition, there exists eavesdropper who tries overhear data. Under maximum interference level required by primary user, and relay nodes must adjust their power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well secrecy capacity...

10.3390/e21020217 article EN cc-by Entropy 2019-02-24

In this paper, we propose physical layer security for cooperative cognitive radio networks (CCRNs) with relay selection in the presence of multiple primary users and eavesdroppers. To be specific, three schemes, namely, opportunistic (ORS), suboptimal (SoRS), partial (PRS) secured CCRNs, which are based on availability channel state information (CSI) at receivers. For each approach, derive exact asymptotic expressions secrecy outage probability. Results show that under assumption perfect...

10.1109/glocom.2014.7037277 article EN 2014-12-01

To solve the problem of energy constraints and spectrum scarcity for cognitive radio wireless sensor networks (CR-WSNs), an underlay decode-and-forward relaying scheme is considered, where constrained secondary source relay nodes are capable harvesting from a multi-antenna power beacon (PB) using that harvested to forward information destination. Based on time switching receiver architecture, three protocols, namely, hybrid partial selection (H-PRS), conventional opportunistic (C-ORS), best...

10.3390/s18061843 article EN cc-by Sensors 2018-06-05
Coming Soon ...