首页 > 最新文献

2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)最新文献

英文 中文
Deadlock prevention for resource allocation in model nVM-out-of-1PM 模型nvm -out- 1pm中资源分配的死锁预防
Ha Huy Cuong Nguyen, Van Son Le, Thanh Thuy Nguyen
The cloud computing paradigm shift brings about disruptive changes to the traditional business models in the infocomm sector, especially for existing software licensing models and server purchase or lease models. Vietnam Posts and Telecommunications Group (VNPT) have ramped up their cloud computing efforts as a strategic response to protect their current market share. This paradigm shift also has major separability on Vietnam's infocomm industry, which is heavily dependent on these traditional VNPT. Since 2014, Viet Nam has started offering services in domestic and international network in the country. The Global Data Services Joint Stock Company (GDS) is a joint venture between NTT Communications (NTT Com) and Vietnam Posts Telecommunications (VNPT). Although, a number of studies were published by third parties on how Vietnam has fared in its cloud journey. While such studies use different definitions and yardsticks, their results nonetheless are instructive in helping us to understand the progress Vietnam has made and to highlight areas for improvement. We have a few studies resources allocation such infrastructure as a services. With the aim to share research solutions and seek opportunities for local businesses who want to invest in infrastructure cloud from the Open Source duty. In this paper, we proposes an algorithm deadlock prevention the model n VM - out - of 1 PM to separate and manage resources. The algorithms for allocating multiple resources to competing services running in virtual machines on a heterogeneous distributed platforms. This paper presents an algorithm prevention deadlock used to reschedule the policies of resource supply for resource allocation. In the current scenario, deadlock prevention algorithm using method global state prevention based. We have implemented and performed our algorithm proposed by using CloudSim simulator.
云计算范式的转变给信息通信行业的传统业务模式带来了颠覆性的变化,特别是对现有的软件许可模式和服务器购买或租赁模式。越南邮电集团(VNPT)已经加大了云计算方面的努力,作为保护其当前市场份额的战略回应。这种模式的转变也对越南的信息通信产业产生了重大影响,越南的信息通信产业严重依赖这些传统的VNPT。自2014年以来,越南开始在国内和国际网络提供服务。Global Data Services Joint Stock Company (GDS)是NTT Communications (NTT Com)和Vietnam Posts Telecommunications (VNPT)的合资企业。尽管如此,第三方发表了一些关于越南在云计算之旅中如何发展的研究。虽然这些研究使用了不同的定义和标准,但其结果对帮助我们了解越南取得的进展并突出需要改进的领域具有指导意义。我们有一些研究资源分配,如基础设施服务。旨在分享研究解决方案,并为希望从开源责任中投资基础设施云的本地企业寻求机会。在本文中,我们提出了一种防止死锁的算法,该算法的模型是n VM - out - of 1 PM,以实现资源的分离和管理。将多个资源分配给在异构分布式平台上的虚拟机上运行的竞争服务的算法。本文提出了一种防止死锁的算法,用于重新调度资源分配的资源供给策略。在当前的场景中,死锁预防算法采用基于全局状态预防的方法。我们利用CloudSim模拟器实现并执行了我们提出的算法。
{"title":"Deadlock prevention for resource allocation in model nVM-out-of-1PM","authors":"Ha Huy Cuong Nguyen, Van Son Le, Thanh Thuy Nguyen","doi":"10.1109/NICS.2016.7725659","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725659","url":null,"abstract":"The cloud computing paradigm shift brings about disruptive changes to the traditional business models in the infocomm sector, especially for existing software licensing models and server purchase or lease models. Vietnam Posts and Telecommunications Group (VNPT) have ramped up their cloud computing efforts as a strategic response to protect their current market share. This paradigm shift also has major separability on Vietnam's infocomm industry, which is heavily dependent on these traditional VNPT. Since 2014, Viet Nam has started offering services in domestic and international network in the country. The Global Data Services Joint Stock Company (GDS) is a joint venture between NTT Communications (NTT Com) and Vietnam Posts Telecommunications (VNPT). Although, a number of studies were published by third parties on how Vietnam has fared in its cloud journey. While such studies use different definitions and yardsticks, their results nonetheless are instructive in helping us to understand the progress Vietnam has made and to highlight areas for improvement. We have a few studies resources allocation such infrastructure as a services. With the aim to share research solutions and seek opportunities for local businesses who want to invest in infrastructure cloud from the Open Source duty. In this paper, we proposes an algorithm deadlock prevention the model n VM - out - of 1 PM to separate and manage resources. The algorithms for allocating multiple resources to competing services running in virtual machines on a heterogeneous distributed platforms. This paper presents an algorithm prevention deadlock used to reschedule the policies of resource supply for resource allocation. In the current scenario, deadlock prevention algorithm using method global state prevention based. We have implemented and performed our algorithm proposed by using CloudSim simulator.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early containment of fast network worm malware 早期遏制快速网络蠕虫恶意软件
M. Ahmad, Steve Woodhead, D. Gan
This paper presents a countermeasure mechanism for the propagation of fast network worm malware. The mechanism uses a cross layer architecture with a detection technique at the network layer to identify worm infection and a data-link containment solution to block an identified infected host. A software prototype of the mechanism has been used to demonstrate its effective. An empirical analysis of network worm propagation has been conducted to test the mechanism. The results show that the developed mechanism is effective in containing self-propagating malware with almost no false positives.
本文提出了一种针对快速网络蠕虫恶意软件传播的对策机制。该机制使用跨层架构,在网络层使用检测技术来识别蠕虫感染,并使用数据链路遏制解决方案来阻止已识别的受感染主机。通过软件原型验证了该机制的有效性。本文对网络蠕虫的传播进行了实证分析,以检验其传播机制。结果表明,所开发的机制能够有效遏制自传播恶意软件,几乎没有误报。
{"title":"Early containment of fast network worm malware","authors":"M. Ahmad, Steve Woodhead, D. Gan","doi":"10.1109/NICS.2016.7725649","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725649","url":null,"abstract":"This paper presents a countermeasure mechanism for the propagation of fast network worm malware. The mechanism uses a cross layer architecture with a detection technique at the network layer to identify worm infection and a data-link containment solution to block an identified infected host. A software prototype of the mechanism has been used to demonstrate its effective. An empirical analysis of network worm propagation has been conducted to test the mechanism. The results show that the developed mechanism is effective in containing self-propagating malware with almost no false positives.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Incremental verification of ω-regions on binary control flow graph for computer virus detection 计算机病毒检测中二进制控制流图ω-区域的增量验证
Nguyen Thien Binh, Q. T. Tho, Ha Minh Ngoc, Nguyen Minh Hai
Generally, a computer virus, or virus, consists of two major parts, including a syntactic pattern of signature and code segment performing the core malicious actions. Currently, most of commercial security programs rely on signature matching techniques for virus detection, thus suffering difficulty from some advanced polymorphic viruses which can infinitely change their signatures. In research community, model checking has been proposed to overcome this problem. Representing core malicious actions as temporal logic formulas, a model checker can then verify presence of malicious actions on a control flow graph (CFG) extracted from a binary executable. However, model-checking-based approaches encounter the infamous state explosion problem. In this paper, we tackle this problem by suggesting to partition the binary-extracted CFG into specific sub-graphs, known as ω-regions. Based on empirical observation on real virus samples, we argue that the code segment corresponding for a viral core malicious action should not occupy more than one ω-region. The tactic for location of those ω-regions from a CFG is also presented. This approach allows us to reduce the verification complexity by means of an incremental verification strategy. As a result, we enjoy significant performance improvement when experimenting with real dataset of viruses.
计算机病毒通常由签名语法模式和执行核心恶意行为的代码段两大部分组成。目前,大多数商业安全程序依靠特征匹配技术进行病毒检测,因此一些可以无限改变其特征的高级多态病毒给病毒检测带来了困难。为了克服这一问题,学术界提出了模型检验的方法。将核心恶意操作表示为时间逻辑公式,然后模型检查器可以在从二进制可执行文件中提取的控制流图(CFG)上验证恶意操作的存在。然而,基于模型检查的方法遇到了臭名昭著的状态爆炸问题。在本文中,我们通过建议将二进制提取的CFG划分为特定的子图(ω-region)来解决这个问题。基于对真实病毒样本的经验观察,我们认为一个病毒核心恶意行为所对应的代码段不应占据多于一个ω-区域。本文还提出了从CFG中定位ω区域的策略。这种方法允许我们通过增量验证策略来降低验证的复杂性。因此,在对真实的病毒数据集进行实验时,我们享受到显著的性能改进。
{"title":"Incremental verification of ω-regions on binary control flow graph for computer virus detection","authors":"Nguyen Thien Binh, Q. T. Tho, Ha Minh Ngoc, Nguyen Minh Hai","doi":"10.1109/NICS.2016.7725670","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725670","url":null,"abstract":"Generally, a computer virus, or virus, consists of two major parts, including a syntactic pattern of signature and code segment performing the core malicious actions. Currently, most of commercial security programs rely on signature matching techniques for virus detection, thus suffering difficulty from some advanced polymorphic viruses which can infinitely change their signatures. In research community, model checking has been proposed to overcome this problem. Representing core malicious actions as temporal logic formulas, a model checker can then verify presence of malicious actions on a control flow graph (CFG) extracted from a binary executable. However, model-checking-based approaches encounter the infamous state explosion problem. In this paper, we tackle this problem by suggesting to partition the binary-extracted CFG into specific sub-graphs, known as ω-regions. Based on empirical observation on real virus samples, we argue that the code segment corresponding for a viral core malicious action should not occupy more than one ω-region. The tactic for location of those ω-regions from a CFG is also presented. This approach allows us to reduce the verification complexity by means of an incremental verification strategy. As a result, we enjoy significant performance improvement when experimenting with real dataset of viruses.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116804889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AF relay-assisted MIMO/FSO/QAM systems in Gamma-Gamma fading channels Gamma-Gamma衰落信道中AF中继辅助MIMO/FSO/QAM系统
Duong Huu Ai, Ha Duyen Trung, D. T. Tuan
In this paper, the performance of amplify-and-forward (AF) relay-assisted multiple-input multiple-output free-space optical communication (MIMO/FSO) systems using sub-carrier intensity quadrature amplitude modulation (QAM) over Gamma-Gamma fading channels, which is represented for the case of strong atmospheric turbulence region, is studied. More specifically, an average symbol error rate (ASER) analytical expression for the AF relay-assisted MIMO/FSO/QAM systems is derived taking into account the strong atmospheric turbulence channel and the number of AF relaying stations with fixed gains. Numerical results qualitatively analyze the influence of the number of relaying stations, link distances, fixed gains and MIMO configurations on the performance of such systems.
本文研究了基于子载波强度正交调幅(QAM)的放大前向(AF)中继辅助多输入多输出自由空间光通信(MIMO/FSO)系统在γ - γ衰落信道上的性能,该信道适用于强大气湍流区域。具体地说,考虑强大气湍流信道和固定增益的AF中继站数量,推导了AF中继辅助MIMO/FSO/QAM系统的平均符号误码率(ASER)解析表达式。数值结果定性地分析了中继站数量、链路距离、固定增益和MIMO配置对系统性能的影响。
{"title":"AF relay-assisted MIMO/FSO/QAM systems in Gamma-Gamma fading channels","authors":"Duong Huu Ai, Ha Duyen Trung, D. T. Tuan","doi":"10.1109/NICS.2016.7725640","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725640","url":null,"abstract":"In this paper, the performance of amplify-and-forward (AF) relay-assisted multiple-input multiple-output free-space optical communication (MIMO/FSO) systems using sub-carrier intensity quadrature amplitude modulation (QAM) over Gamma-Gamma fading channels, which is represented for the case of strong atmospheric turbulence region, is studied. More specifically, an average symbol error rate (ASER) analytical expression for the AF relay-assisted MIMO/FSO/QAM systems is derived taking into account the strong atmospheric turbulence channel and the number of AF relaying stations with fixed gains. Numerical results qualitatively analyze the influence of the number of relaying stations, link distances, fixed gains and MIMO configurations on the performance of such systems.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Spectrum utilization efficiency in elastic optical networks using virtualized elastic regenerators 基于虚拟弹性再生器的弹性光网络频谱利用效率
Hai-Chau Le, N. Dang, Ban T. Nguyen
Elastic optical networking that enables flexible spectrum resource allocation and bitrate/distance-adaptive modulation is one of the hot trends in optical networks to cope with both legacy low-bitrate services and emerging new bandwidth-abundant super-channel services. This paper evaluates spectrum utilization and regenerating spectrum requirement in regeneration capable elastic optical networks with different modulation format assignment schemes under various network and traffic conditions. The spectrum efficiency of elastic optical networks is also analyzed in comparison with that of conventional WDM networks. Finally, numerical simulation is applied to verify the performance of elastic optical networks against conventional WDM networks. The results prove that elastic optical networks are more spectrum-efficient than conventional WDM networks and the network performance significantly depends on the regeneration capability.
弹性光网络能够实现灵活的频谱资源分配和比特率/距离自适应调制,是光网络发展的热点之一,以应对传统的低比特率业务和新兴的带宽丰富的超级通道业务。本文评估了不同调制格式分配方案下具有再生能力的弹性光网络在不同网络和业务条件下的频谱利用率和再生频谱需求。并对弹性光网络的频谱效率与传统WDM网络的频谱效率进行了比较分析。最后,通过数值仿真验证了弹性光网络与传统波分复用网络的性能。结果表明,弹性光网络比传统WDM网络具有更高的频谱效率,网络性能在很大程度上取决于再生能力。
{"title":"Spectrum utilization efficiency in elastic optical networks using virtualized elastic regenerators","authors":"Hai-Chau Le, N. Dang, Ban T. Nguyen","doi":"10.1109/NICS.2016.7725642","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725642","url":null,"abstract":"Elastic optical networking that enables flexible spectrum resource allocation and bitrate/distance-adaptive modulation is one of the hot trends in optical networks to cope with both legacy low-bitrate services and emerging new bandwidth-abundant super-channel services. This paper evaluates spectrum utilization and regenerating spectrum requirement in regeneration capable elastic optical networks with different modulation format assignment schemes under various network and traffic conditions. The spectrum efficiency of elastic optical networks is also analyzed in comparison with that of conventional WDM networks. Finally, numerical simulation is applied to verify the performance of elastic optical networks against conventional WDM networks. The results prove that elastic optical networks are more spectrum-efficient than conventional WDM networks and the network performance significantly depends on the regeneration capability.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129898497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An evaluation of precise point positioning using QZSS LEX signal in Vietnam 越南QZSS LEX信号精确点定位评价
Hiep Hoang-Van, Tu Nguyen Thi Thanh, Vinh La The
Recently, Japan Aerospace Exploration Agency (JAXA) provides Quasi-Zenith Satellite System (QZSS), a regional satellite system covering East Asia and Oceania region. The objective of QZSS is to improve the availability as well as the performance of GNSS system. Besides navigation signals, QZSS also transmits L-band Experimental signal (LEX) for augmentation corrections including orbit and clock information that support Precise Point Positioning (PPP). In this paper, a method for decoding LEX signal is first presented. Next, the availability of the LEX signal and the quality of the broadcasted correction messages for PPP solutions are evaluated in Vietnam. The results of PPP using LEX signal have been compared to those using augmentation corrections from International GNSS service (IGS) in both static and kinematic positioning modes. Experimental results conducted in Hanoi, Vietnam show the feasibility of using LEX signal to deliver high accuracy positioning service to Vietnamese GNSS users.
最近,日本宇宙航空研究开发机构(JAXA)提供了准天顶卫星系统(QZSS),这是一个覆盖东亚和大洋洲地区的区域卫星系统。QZSS的目标是提高GNSS系统的可用性和性能。除了导航信号外,QZSS还发送l波段实验信号(LEX),用于增强校正,包括支持精确点定位(PPP)的轨道和时钟信息。本文首先提出了一种LEX信号的解码方法。接下来,对越南的LEX信号的可用性和PPP解决方案广播修正信息的质量进行评估。在静态和运动定位模式下,将使用LEX信号的PPP结果与使用国际GNSS服务(IGS)增强校正的PPP结果进行了比较。在越南河内进行的实验结果表明,利用LEX信号向越南GNSS用户提供高精度定位服务是可行的。
{"title":"An evaluation of precise point positioning using QZSS LEX signal in Vietnam","authors":"Hiep Hoang-Van, Tu Nguyen Thi Thanh, Vinh La The","doi":"10.1109/NICS.2016.7725657","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725657","url":null,"abstract":"Recently, Japan Aerospace Exploration Agency (JAXA) provides Quasi-Zenith Satellite System (QZSS), a regional satellite system covering East Asia and Oceania region. The objective of QZSS is to improve the availability as well as the performance of GNSS system. Besides navigation signals, QZSS also transmits L-band Experimental signal (LEX) for augmentation corrections including orbit and clock information that support Precise Point Positioning (PPP). In this paper, a method for decoding LEX signal is first presented. Next, the availability of the LEX signal and the quality of the broadcasted correction messages for PPP solutions are evaluated in Vietnam. The results of PPP using LEX signal have been compared to those using augmentation corrections from International GNSS service (IGS) in both static and kinematic positioning modes. Experimental results conducted in Hanoi, Vietnam show the feasibility of using LEX signal to deliver high accuracy positioning service to Vietnamese GNSS users.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130719474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Keynote talk #2: Health informatics: A step forward to design an intelligent system for monitoring personal healthcare 主题演讲#2:健康信息学:设计监测个人健康的智能系统的一步
Le Hoang Son
In recent years, the growing demand of personal healthcare has attracted much attention from both researchers and practitioners. The motivation of designing an efficient intelligent system that keeps track physical conditions, makes diagnosis based on the symptoms, and recommends appropriate treatments is the long-term objective in Health Informatics. In this talk, we will present our recent results of creating such the system using knowledge model and the Internet-of-Thing (IoT) technology. The system firstly requests the IoT device to send the physical conditions of a patient using specialized sensors namely LM35 (temperature measurement), Pluse Sensor (heartbeat) and ESP8266 (network connection). The collected personal symptoms are then integrated to a server for diagnosis of possible diseases such as viral fever, hypothermia, tachycardia and heart failure. This is done by a new technique called the intuitionistic fuzzy recommender system (IFRS), which in essence is a recommender system deployed in the intuitionistic fuzzy set for diagnosing of diseases under uncertain environments. We will present the theoretical basis of IFRS including: i) the formulation of single-criterion and multi-criteria IFRS accompanied with some essential properties; ii) a hybrid model between picture fuzzy clustering and IFRS called HIFCF; iii) intuitionistic fuzzy vector (IFV) with intuitionistic vector similarity measure (IVSM); and iv) linguistic similarity measure. Using the model, diseases are ranked according to the current symptoms and stored in the server. Information of diseases and appropriate treatment therapies is sent back to the patient as well as stored in a web portal for personal monitoring.
近年来,日益增长的个人保健需求引起了研究者和从业者的广泛关注。设计一个有效的智能系统的动机是跟踪身体状况,根据症状进行诊断,并建议适当的治疗,这是健康信息学的长期目标。在这次演讲中,我们将展示我们使用知识模型和物联网(IoT)技术创建这样的系统的最新成果。该系统首先要求物联网设备通过专用传感器LM35(温度测量)、Pluse Sensor(心跳)和ESP8266(网络连接)发送患者的身体状况。然后将收集到的个人症状整合到服务器中,用于诊断可能的疾病,如病毒性发烧、体温过低、心动过速和心力衰竭。这是一种被称为直觉模糊推荐系统(IFRS)的新技术,它本质上是一种部署在直觉模糊集中的推荐系统,用于不确定环境下的疾病诊断。我们将介绍国际财务报告准则的理论基础,包括:i)单准则和多准则国际财务报告准则的制定以及一些基本属性;ii)图像模糊聚类与IFRS的混合模型HIFCF;iii)直觉模糊向量(IFV)与直觉向量相似性度量(IVSM);iv)语言相似性度量。使用该模型,根据当前症状对疾病进行排序并存储在服务器中。疾病信息和适当的治疗方法被发送给患者,并存储在门户网站中供个人监测。
{"title":"Keynote talk #2: Health informatics: A step forward to design an intelligent system for monitoring personal healthcare","authors":"Le Hoang Son","doi":"10.1109/NICS.2016.7725627","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725627","url":null,"abstract":"In recent years, the growing demand of personal healthcare has attracted much attention from both researchers and practitioners. The motivation of designing an efficient intelligent system that keeps track physical conditions, makes diagnosis based on the symptoms, and recommends appropriate treatments is the long-term objective in Health Informatics. In this talk, we will present our recent results of creating such the system using knowledge model and the Internet-of-Thing (IoT) technology. The system firstly requests the IoT device to send the physical conditions of a patient using specialized sensors namely LM35 (temperature measurement), Pluse Sensor (heartbeat) and ESP8266 (network connection). The collected personal symptoms are then integrated to a server for diagnosis of possible diseases such as viral fever, hypothermia, tachycardia and heart failure. This is done by a new technique called the intuitionistic fuzzy recommender system (IFRS), which in essence is a recommender system deployed in the intuitionistic fuzzy set for diagnosing of diseases under uncertain environments. We will present the theoretical basis of IFRS including: i) the formulation of single-criterion and multi-criteria IFRS accompanied with some essential properties; ii) a hybrid model between picture fuzzy clustering and IFRS called HIFCF; iii) intuitionistic fuzzy vector (IFV) with intuitionistic vector similarity measure (IVSM); and iv) linguistic similarity measure. Using the model, diseases are ranked according to the current symptoms and stored in the server. Information of diseases and appropriate treatment therapies is sent back to the patient as well as stored in a web portal for personal monitoring.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125931966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient wireless sensor network and low power consumption station design for an urban water level monitoring system 城市水位监测系统的高能效无线传感器网络和低功耗站设计
Tuan-Duc Nguyen
In the context of wireless sensor networks (WSN), a design of an energy efficient wireless data collecting network and a low power water level monitoring station have been proposed in this paper. Different low power consumption sub-Ghz wireless modules have been compared in this paper, and a most efficient wireless module have been selected in order to design a wireless sensor network. This power efficient wireless sensor network have been designed to connect to many water level monitoring stations and transmit its data to a remote centre. In order to ensure a longterm operation in environment without the grid power supply, solar power supply have been selected and a low power consumption design of a water level monitoring station is also proposed. Finally, the power consumption of the proposed station with wireless sensor network module has been calculated to prove the energy efficiency. With the advantage of a low power consumption and low cost design, the proposed wireless sensor network and water level monitoring station can be applied widely in urban environment in developing countries like Vietnam.
在无线传感器网络的背景下,提出了一种节能无线数据采集网络和低功耗水位监测站的设计方案。本文对不同的低功耗sub-Ghz无线模块进行了比较,选择了最高效的无线模块来设计无线传感器网络。这种节能的无线传感器网络被设计用来连接许多水位监测站,并将其数据传输到远程中心。为保证在无电网供电的环境下长期运行,选择了太阳能供电,并提出了低功耗的水位监测站设计方案。最后,对所提出的无线传感器网络模块站的功耗进行了计算,以证明其能效。该无线传感器网络和水位监测站具有低功耗、低成本的设计优势,可以在越南等发展中国家的城市环境中广泛应用。
{"title":"Energy efficient wireless sensor network and low power consumption station design for an urban water level monitoring system","authors":"Tuan-Duc Nguyen","doi":"10.1109/NICS.2016.7725660","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725660","url":null,"abstract":"In the context of wireless sensor networks (WSN), a design of an energy efficient wireless data collecting network and a low power water level monitoring station have been proposed in this paper. Different low power consumption sub-Ghz wireless modules have been compared in this paper, and a most efficient wireless module have been selected in order to design a wireless sensor network. This power efficient wireless sensor network have been designed to connect to many water level monitoring stations and transmit its data to a remote centre. In order to ensure a longterm operation in environment without the grid power supply, solar power supply have been selected and a low power consumption design of a water level monitoring station is also proposed. Finally, the power consumption of the proposed station with wireless sensor network module has been calculated to prove the energy efficiency. With the advantage of a low power consumption and low cost design, the proposed wireless sensor network and water level monitoring station can be applied widely in urban environment in developing countries like Vietnam.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129450588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Vehicle classification and detection based coarse data for warning traffic jam in VietNam 基于粗数据的越南交通拥堵预警车辆分类与检测
Van-Tuyen Dinh, Ngoc-Diep Luu, Hoang-Hon Trinh
This paper describes a new method to detect vehicles such as cars, motorbikes; it will be a good coarse data to analyze the traffic jam, specially in VietNam where motorbikes densely appear on the roads. From a new image, the method auto-hierarchically (automatically and hierarchically) learns and retrieves geometrical model, backgroud model, foreground objects. The geometrical model is used for reducing size of focus region, and reducing time processing. The background is automatically retrieved and updated by using Median filter method. From the background model and new image, the foreground objects are detected as candidates of Vehicles. To detect and classify the vehicle, Morphological features as area, aspect ratio, bounding box, orientation are used. From training set, the thresholds of morphological features are specified for each type of single, double or motorbikes, cars. This approach is built and finished by several well known algorithms such as line segment detection, dominant vanishing point calculation. The results shows that single, double or motorbikes, cars of vehicles are detected and classified in high accuracy and highly potential for real applications.
本文介绍了一种检测汽车、摩托车等车辆的新方法;这将是一个很好的粗数据来分析交通堵塞,特别是在越南,摩托车密集地出现在道路上。该方法从新图像中自动分层(自动分层)学习和检索几何模型、背景模型、前景对象。利用几何模型减小了焦点区域的尺寸,减少了处理时间。采用中值滤波方法自动检索和更新背景。从背景模型和新图像中,检测出前景目标作为候选车辆。为了对车辆进行检测和分类,使用了面积、纵横比、边界框、方向等形态学特征。从训练集出发,分别为单骑、双骑或摩托车、汽车指定形态特征的阈值。该方法是由线段检测、优势消失点计算等几种著名算法建立和完成的。结果表明,该方法对单、双、摩托车、汽车等车辆进行了高精度的检测和分类,具有很大的实际应用潜力。
{"title":"Vehicle classification and detection based coarse data for warning traffic jam in VietNam","authors":"Van-Tuyen Dinh, Ngoc-Diep Luu, Hoang-Hon Trinh","doi":"10.1109/NICS.2016.7725654","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725654","url":null,"abstract":"This paper describes a new method to detect vehicles such as cars, motorbikes; it will be a good coarse data to analyze the traffic jam, specially in VietNam where motorbikes densely appear on the roads. From a new image, the method auto-hierarchically (automatically and hierarchically) learns and retrieves geometrical model, backgroud model, foreground objects. The geometrical model is used for reducing size of focus region, and reducing time processing. The background is automatically retrieved and updated by using Median filter method. From the background model and new image, the foreground objects are detected as candidates of Vehicles. To detect and classify the vehicle, Morphological features as area, aspect ratio, bounding box, orientation are used. From training set, the thresholds of morphological features are specified for each type of single, double or motorbikes, cars. This approach is built and finished by several well known algorithms such as line segment detection, dominant vanishing point calculation. The results shows that single, double or motorbikes, cars of vehicles are detected and classified in high accuracy and highly potential for real applications.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131022923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic translation of Vietnamese simple sentences based on UNL 基于UNL的越南语简单句自动翻译
Phan Thị Lệ Thuyền, V. T. Hung
The purpose of the Universal Networking Language (UNL) is to allow people to access information on the Internet in their own language. UNL has been studied and applied to 48 languages. UNL system consists of two main components: EnConverter and DeConverter. EnConverter is used for converting a text from the source language to UNL, and DeConverter is used for converting a text from UNL to a target language. The UNL system has not yet been developed for Vietnamese. In this paper, we present the process of encoding a Vietnamese simple sentence into its corresponding UNL expression. We propose the algorithm using enconversion rules generate attributes and solve other relations. The achievement of result that we were able to create the CoDeVie tool to perform encode function for some cases of Vietnamese simple sentence.
通用网络语言(UNL)的目的是允许人们用自己的语言访问互联网上的信息。研究和应用了48种语文。UNL系统主要由两个部分组成:EnConverter和deconconverter。EnConverter用于将文本从源语言转换为UNL, DeConverter用于将文本从UNL转换为目标语言。UNL系统还没有为越南发展。本文介绍了将越南语简单句编码为相应的UNL表达式的过程。我们提出了使用转换规则生成属性和解决其他关系的算法。结果是我们能够创建codevice工具来对越南语简单句的一些情况执行编码功能。
{"title":"Automatic translation of Vietnamese simple sentences based on UNL","authors":"Phan Thị Lệ Thuyền, V. T. Hung","doi":"10.1109/NICS.2016.7725653","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725653","url":null,"abstract":"The purpose of the Universal Networking Language (UNL) is to allow people to access information on the Internet in their own language. UNL has been studied and applied to 48 languages. UNL system consists of two main components: EnConverter and DeConverter. EnConverter is used for converting a text from the source language to UNL, and DeConverter is used for converting a text from UNL to a target language. The UNL system has not yet been developed for Vietnamese. In this paper, we present the process of encoding a Vietnamese simple sentence into its corresponding UNL expression. We propose the algorithm using enconversion rules generate attributes and solve other relations. The achievement of result that we were able to create the CoDeVie tool to perform encode function for some cases of Vietnamese simple sentence.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131632619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1