Tu N. Nguyen

ORCID: 0000-0001-7184-4102
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Energy Harvesting in Wireless Networks
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Mobile Ad Hoc Networks
  • Indoor and Outdoor Localization Technologies
  • Quantum Computing Algorithms and Architecture
  • Software-Defined Networks and 5G
  • Advanced Malware Detection Techniques
  • Machine Fault Diagnosis Techniques
  • IoT Networks and Protocols
  • Quantum Information and Cryptography
  • Advanced Wireless Communication Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Full-Duplex Wireless Communications
  • Anomaly Detection Techniques and Applications
  • UAV Applications and Optimization
  • Advanced Text Analysis Techniques
  • Security in Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Gear and Bearing Dynamics Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Complex Network Analysis Techniques
  • Distributed Control Multi-Agent Systems
  • Digital Transformation in Industry

Kennesaw State University
2021-2025

Purdue University Fort Wayne
2019-2024

Ho Chi Minh City University of Technology
2010-2024

Vietnam National University Ho Chi Minh City
2023-2024

Hohai University
2023-2024

National Center for Technological Progress
2023

FPT University
2022

VNU University of Science
2021

University of Milan
2021

National Institute of Technology Kurukshetra
2021

The common modeling of digital twins uses an information model to describe the physical machines. integration into productive cyber-physical cloud manufacturing (CPCM) systems imposes strong demands such as reducing overhead and saving resources. In this paper, we develop investigate a new method for building cloud-based (CBDT), which can be adapted CPCM platform. Our helps reduce computing resources in processing center efficient interactions between human users We introduce knowledge...

10.1016/j.promfg.2018.07.155 article EN Procedia Manufacturing 2018-01-01

Internet of Things (IoT) and named data network (NDN) are innovative technologies to meet up the future requirements. NDN is considered as an enabling approach improving dissemination in IoT scenarios. delivers in-network caching, which most prominent feature provide fast compared protocol (IP)-based communication. The proper integration caching placement strategies replacement policies suitable support networks. It can improve multicast communication minimizes delay responding IoT-based...

10.1109/jiot.2021.3075317 article EN IEEE Internet of Things Journal 2021-04-23

The usage of cloud services is growing exponentially with the recent advancement Internet Things (IoT)-based applications. Advanced scheduling approaches are needed to successfully meet application demands while harnessing computing's potential effectively schedule IoT onto resources optimally. This article proposes an alternative task scheduler approach for organizing tasks over CCE. In particular, a novel hybrid swarm intelligence method, using modified Manta ray foraging optimization...

10.1109/tii.2022.3148288 article EN IEEE Transactions on Industrial Informatics 2022-02-04

Automotive-Industry 5.0 will use emerging 6G communications to provide robust, computationally intelligent, and energy-efficient data sharing among various onboard sensors, vehicles, other intelligent transportation system entities. Nonorthogonal multiple access (NOMA) backscatter are two key techniques of for enhanced spectrum energy efficiency. In this article, we an introduction green also discuss the advantages using NOMA in Automotive Industry 5.0. We briefly review recent work area...

10.1109/tii.2022.3161029 article EN IEEE Transactions on Industrial Informatics 2022-03-22

With the increasingly humanized and intelligent operation of Industrial Internet Things (IIoT) systems in Industry 5.0, delay-sensitive compute-intensive (DSCI) devices have proliferated, their demand for low latency power consumption has become more eager. In order to extend battery life improve quality user experience, we can offload DSCI-type workloads mobile edge computing (MEC) servers processing. However, offloading massive amounts tasks will incur higher energy consumption, which is a...

10.1109/tii.2022.3206787 article EN IEEE Transactions on Industrial Informatics 2022-09-15

Along with the development of Information Technology, Online Social Networks (OSN) are constantly developing and have become popular media in world. Besides communication enhancement benefits, OSN such limitations on rapid spread false information as rumors, fake news, contradictory news. False is collectively referred to misinformation which has significant social communities. The more sources topics are, greater number users affected. Therefore, it necessary prevent multiple within a given...

10.1109/access.2020.2989140 article EN cc-by IEEE Access 2020-01-01

Summary In wireless rechargeable sensor networks, sensors are responsible for sensing environment and generating sensed data, mobile devices recharging and/or collecting data to the sink. Because of rapid development charging technology, can be recharged when they within limited ranges devices. addition, because sensors' electric capacity memory storage often limited, must recharged, their generated collected by periodically, or network cannot provide adequate quality services. Therefore,...

10.1002/dac.3050 article EN International Journal of Communication Systems 2015-09-10

Recently, the problem of scheduling mobile sensors to cover all targets and maintain network connectivity such that total movement distance is minimized, termed sensor deployment (MSD) problem, has received a great deal attention. However, complexity MSD remains unknown because no exact proof been provided before. In this paper, we show not only but also its special case, target coverage are NP-hard.

10.1109/jsyst.2018.2828879 article EN IEEE Systems Journal 2018-05-09

In this study, the performance of a secondary network in cognitive radio (CR) is studied context vehicle-to-everything (V2X). The non-orthogonal multiple access (NOMA) effectively applied new system model, namely CR-assisted NOMA-V2X, and it beneficial to serve group vehicles. our proposed system, two schemes related vehicle-to-vehicle (V2V) transmissions are further considered enhance vehicle that needs higher quality service (QoS). However, degradation can be predicted by evaluating...

10.1109/access.2020.3008788 article EN cc-by IEEE Access 2020-01-01

Most of today's infrastructure systems can be efficiently operated thanks to the intelligent power supply smart grids. However, grids are highly vulnerable malicious attacks, that is, because interplay between components in grids, failure some critical may result cascading and breakdown whole system. Therefore, question how identify most protect grid system is first challenge operators. To enable system's robustness, there has been a lot effort aimed at analysis, designing new architectures,...

10.1109/icc40277.2020.9148850 article EN 2020-06-01

The integration of Ambient Backscatter Communication (AmBC) with Non-Orthogonal Multiple Access (NOMA) is expected to support connectivity low-powered Internet-of-Vehicles (IoVs) in the upcoming Sixth-Generation (6G) transportation systems. This paper proposes an energy-efficient resource allocation framework for AmBC-enabled NOMA IoV network under imperfect Successive Interference Cancellation (SIC) decoding. In particular, multiple Road-Side Units (RSUs) transmit superimposed signals their...

10.1109/tits.2021.3110942 article EN IEEE Transactions on Intelligent Transportation Systems 2021-09-21

Fingerprint image enhancement is a key aspect of an automated fingerprint identification system. This paper describes effective algorithm based on novel lighting compensation scheme. The scheme involves the use adaptive higher-order singular value decomposition tensor wavelet subbands (AHTWF) to enhance quality image. consists three stages. first stage input size <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math...

10.1109/access.2020.2964035 article EN cc-by IEEE Access 2020-01-01

Data collection is one of the most important operations in applications wireless sensor networks (WSNs). In many emerging WSN applications, it urgent to achieve a guarantee for latency involved collecting data. Many researchers have studied data WSNs with minimum but without collision while assuming that any (or no) are allowed be aggregated into packet. addition, tree structures often used solutions. However, some cases, fixed number This motivates us study problem minimizing aggregation...

10.1109/jsyst.2017.2751645 article EN IEEE Systems Journal 2017-09-26

Cow behavior recognition systems support the assessment of cows' condition by providing their information. Accelerometers are particularly suited for a non-invasive solution development these monitoring systems. They cheap and simple in setting up high-performance when using machine learning algorithms. The activity complexity animals brings challenges real context applications because different behaviors may have similar acceleration data. reason is that they contain gestures, example,...

10.1109/jsen.2021.3051194 article EN IEEE Sensors Journal 2021-01-13

In wireless sensor networks (WSNs), the sensed data by sensors need to be gathered, so that one very important application is periodical collection. There much effort which aimed at collection scheduling algorithm development minimize latency. Most of previous works investigating minimum latency issue have an ideal assumption network a centralized system, in entire completely synchronized with full knowledge components. addition, most existing often assume any (or no) are allowed aggregated...

10.1109/tnsm.2018.2884445 article EN IEEE Transactions on Network and Service Management 2018-12-04

Abstract Modern malware evolves various detection avoidance techniques to bypass the state‐of‐the‐art methods. An emerging trend deal with this issue is combination of image transformation and machine learning models classify detect malware. However, existing works in field only perform simple These transformations have not considered color encoding pixel rendering on performance classifiers. In article, we propose a novel approach arranging bytes from binary files into images. developed...

10.1002/ett.3789 article EN Transactions on Emerging Telecommunications Technologies 2019-11-20

Most of today's smart grids are highly vulnerable to cascading failure attacks in which the one or more critical components may trigger sequential other components, resulting eventual breakdown whole system. Existing works design different ranking methods for node link identifications that fail identify potential attacks. In this work, we first consider system from attacker's point view with a limited attack budget study grid vulnerability, referred as Maximum-Impact through Critical-Line...

10.1109/tpwrd.2021.3061358 article EN IEEE Transactions on Power Delivery 2021-02-23

This paper proposes a novel traffic monitoring framework, namely, DeepMonitor, for SDN-based IoT networks to provide fine-grained analysis capability different types at the network edges. Specifically, we first develop an intelligent flow rule match-field control system, called DeepMonitor agent, edge nodes, taking granularity-level requirements and their maximum flow-table capacity into consideration. We then formulate optimization problem each node employing Markov decision process (MDP)....

10.1109/tccn.2021.3102971 article EN IEEE Transactions on Cognitive Communications and Networking 2021-08-06
Coming Soon ...