Pub Date : 2016-10-31DOI: 10.1109/NICS.2016.7725659
Ha Huy Cuong Nguyen, Van Son Le, Thanh Thuy Nguyen
The cloud computing paradigm shift brings about disruptive changes to the traditional business models in the infocomm sector, especially for existing software licensing models and server purchase or lease models. Vietnam Posts and Telecommunications Group (VNPT) have ramped up their cloud computing efforts as a strategic response to protect their current market share. This paradigm shift also has major separability on Vietnam's infocomm industry, which is heavily dependent on these traditional VNPT. Since 2014, Viet Nam has started offering services in domestic and international network in the country. The Global Data Services Joint Stock Company (GDS) is a joint venture between NTT Communications (NTT Com) and Vietnam Posts Telecommunications (VNPT). Although, a number of studies were published by third parties on how Vietnam has fared in its cloud journey. While such studies use different definitions and yardsticks, their results nonetheless are instructive in helping us to understand the progress Vietnam has made and to highlight areas for improvement. We have a few studies resources allocation such infrastructure as a services. With the aim to share research solutions and seek opportunities for local businesses who want to invest in infrastructure cloud from the Open Source duty. In this paper, we proposes an algorithm deadlock prevention the model n VM - out - of 1 PM to separate and manage resources. The algorithms for allocating multiple resources to competing services running in virtual machines on a heterogeneous distributed platforms. This paper presents an algorithm prevention deadlock used to reschedule the policies of resource supply for resource allocation. In the current scenario, deadlock prevention algorithm using method global state prevention based. We have implemented and performed our algorithm proposed by using CloudSim simulator.
云计算范式的转变给信息通信行业的传统业务模式带来了颠覆性的变化,特别是对现有的软件许可模式和服务器购买或租赁模式。越南邮电集团(VNPT)已经加大了云计算方面的努力,作为保护其当前市场份额的战略回应。这种模式的转变也对越南的信息通信产业产生了重大影响,越南的信息通信产业严重依赖这些传统的VNPT。自2014年以来,越南开始在国内和国际网络提供服务。Global Data Services Joint Stock Company (GDS)是NTT Communications (NTT Com)和Vietnam Posts Telecommunications (VNPT)的合资企业。尽管如此,第三方发表了一些关于越南在云计算之旅中如何发展的研究。虽然这些研究使用了不同的定义和标准,但其结果对帮助我们了解越南取得的进展并突出需要改进的领域具有指导意义。我们有一些研究资源分配,如基础设施服务。旨在分享研究解决方案,并为希望从开源责任中投资基础设施云的本地企业寻求机会。在本文中,我们提出了一种防止死锁的算法,该算法的模型是n VM - out - of 1 PM,以实现资源的分离和管理。将多个资源分配给在异构分布式平台上的虚拟机上运行的竞争服务的算法。本文提出了一种防止死锁的算法,用于重新调度资源分配的资源供给策略。在当前的场景中,死锁预防算法采用基于全局状态预防的方法。我们利用CloudSim模拟器实现并执行了我们提出的算法。
{"title":"Deadlock prevention for resource allocation in model nVM-out-of-1PM","authors":"Ha Huy Cuong Nguyen, Van Son Le, Thanh Thuy Nguyen","doi":"10.1109/NICS.2016.7725659","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725659","url":null,"abstract":"The cloud computing paradigm shift brings about disruptive changes to the traditional business models in the infocomm sector, especially for existing software licensing models and server purchase or lease models. Vietnam Posts and Telecommunications Group (VNPT) have ramped up their cloud computing efforts as a strategic response to protect their current market share. This paradigm shift also has major separability on Vietnam's infocomm industry, which is heavily dependent on these traditional VNPT. Since 2014, Viet Nam has started offering services in domestic and international network in the country. The Global Data Services Joint Stock Company (GDS) is a joint venture between NTT Communications (NTT Com) and Vietnam Posts Telecommunications (VNPT). Although, a number of studies were published by third parties on how Vietnam has fared in its cloud journey. While such studies use different definitions and yardsticks, their results nonetheless are instructive in helping us to understand the progress Vietnam has made and to highlight areas for improvement. We have a few studies resources allocation such infrastructure as a services. With the aim to share research solutions and seek opportunities for local businesses who want to invest in infrastructure cloud from the Open Source duty. In this paper, we proposes an algorithm deadlock prevention the model n VM - out - of 1 PM to separate and manage resources. The algorithms for allocating multiple resources to competing services running in virtual machines on a heterogeneous distributed platforms. This paper presents an algorithm prevention deadlock used to reschedule the policies of resource supply for resource allocation. In the current scenario, deadlock prevention algorithm using method global state prevention based. We have implemented and performed our algorithm proposed by using CloudSim simulator.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-31DOI: 10.1109/NICS.2016.7725649
M. Ahmad, Steve Woodhead, D. Gan
This paper presents a countermeasure mechanism for the propagation of fast network worm malware. The mechanism uses a cross layer architecture with a detection technique at the network layer to identify worm infection and a data-link containment solution to block an identified infected host. A software prototype of the mechanism has been used to demonstrate its effective. An empirical analysis of network worm propagation has been conducted to test the mechanism. The results show that the developed mechanism is effective in containing self-propagating malware with almost no false positives.
{"title":"Early containment of fast network worm malware","authors":"M. Ahmad, Steve Woodhead, D. Gan","doi":"10.1109/NICS.2016.7725649","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725649","url":null,"abstract":"This paper presents a countermeasure mechanism for the propagation of fast network worm malware. The mechanism uses a cross layer architecture with a detection technique at the network layer to identify worm infection and a data-link containment solution to block an identified infected host. A software prototype of the mechanism has been used to demonstrate its effective. An empirical analysis of network worm propagation has been conducted to test the mechanism. The results show that the developed mechanism is effective in containing self-propagating malware with almost no false positives.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725670
Nguyen Thien Binh, Q. T. Tho, Ha Minh Ngoc, Nguyen Minh Hai
Generally, a computer virus, or virus, consists of two major parts, including a syntactic pattern of signature and code segment performing the core malicious actions. Currently, most of commercial security programs rely on signature matching techniques for virus detection, thus suffering difficulty from some advanced polymorphic viruses which can infinitely change their signatures. In research community, model checking has been proposed to overcome this problem. Representing core malicious actions as temporal logic formulas, a model checker can then verify presence of malicious actions on a control flow graph (CFG) extracted from a binary executable. However, model-checking-based approaches encounter the infamous state explosion problem. In this paper, we tackle this problem by suggesting to partition the binary-extracted CFG into specific sub-graphs, known as ω-regions. Based on empirical observation on real virus samples, we argue that the code segment corresponding for a viral core malicious action should not occupy more than one ω-region. The tactic for location of those ω-regions from a CFG is also presented. This approach allows us to reduce the verification complexity by means of an incremental verification strategy. As a result, we enjoy significant performance improvement when experimenting with real dataset of viruses.
{"title":"Incremental verification of ω-regions on binary control flow graph for computer virus detection","authors":"Nguyen Thien Binh, Q. T. Tho, Ha Minh Ngoc, Nguyen Minh Hai","doi":"10.1109/NICS.2016.7725670","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725670","url":null,"abstract":"Generally, a computer virus, or virus, consists of two major parts, including a syntactic pattern of signature and code segment performing the core malicious actions. Currently, most of commercial security programs rely on signature matching techniques for virus detection, thus suffering difficulty from some advanced polymorphic viruses which can infinitely change their signatures. In research community, model checking has been proposed to overcome this problem. Representing core malicious actions as temporal logic formulas, a model checker can then verify presence of malicious actions on a control flow graph (CFG) extracted from a binary executable. However, model-checking-based approaches encounter the infamous state explosion problem. In this paper, we tackle this problem by suggesting to partition the binary-extracted CFG into specific sub-graphs, known as ω-regions. Based on empirical observation on real virus samples, we argue that the code segment corresponding for a viral core malicious action should not occupy more than one ω-region. The tactic for location of those ω-regions from a CFG is also presented. This approach allows us to reduce the verification complexity by means of an incremental verification strategy. As a result, we enjoy significant performance improvement when experimenting with real dataset of viruses.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116804889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725640
Duong Huu Ai, Ha Duyen Trung, D. T. Tuan
In this paper, the performance of amplify-and-forward (AF) relay-assisted multiple-input multiple-output free-space optical communication (MIMO/FSO) systems using sub-carrier intensity quadrature amplitude modulation (QAM) over Gamma-Gamma fading channels, which is represented for the case of strong atmospheric turbulence region, is studied. More specifically, an average symbol error rate (ASER) analytical expression for the AF relay-assisted MIMO/FSO/QAM systems is derived taking into account the strong atmospheric turbulence channel and the number of AF relaying stations with fixed gains. Numerical results qualitatively analyze the influence of the number of relaying stations, link distances, fixed gains and MIMO configurations on the performance of such systems.
{"title":"AF relay-assisted MIMO/FSO/QAM systems in Gamma-Gamma fading channels","authors":"Duong Huu Ai, Ha Duyen Trung, D. T. Tuan","doi":"10.1109/NICS.2016.7725640","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725640","url":null,"abstract":"In this paper, the performance of amplify-and-forward (AF) relay-assisted multiple-input multiple-output free-space optical communication (MIMO/FSO) systems using sub-carrier intensity quadrature amplitude modulation (QAM) over Gamma-Gamma fading channels, which is represented for the case of strong atmospheric turbulence region, is studied. More specifically, an average symbol error rate (ASER) analytical expression for the AF relay-assisted MIMO/FSO/QAM systems is derived taking into account the strong atmospheric turbulence channel and the number of AF relaying stations with fixed gains. Numerical results qualitatively analyze the influence of the number of relaying stations, link distances, fixed gains and MIMO configurations on the performance of such systems.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725642
Hai-Chau Le, N. Dang, Ban T. Nguyen
Elastic optical networking that enables flexible spectrum resource allocation and bitrate/distance-adaptive modulation is one of the hot trends in optical networks to cope with both legacy low-bitrate services and emerging new bandwidth-abundant super-channel services. This paper evaluates spectrum utilization and regenerating spectrum requirement in regeneration capable elastic optical networks with different modulation format assignment schemes under various network and traffic conditions. The spectrum efficiency of elastic optical networks is also analyzed in comparison with that of conventional WDM networks. Finally, numerical simulation is applied to verify the performance of elastic optical networks against conventional WDM networks. The results prove that elastic optical networks are more spectrum-efficient than conventional WDM networks and the network performance significantly depends on the regeneration capability.
{"title":"Spectrum utilization efficiency in elastic optical networks using virtualized elastic regenerators","authors":"Hai-Chau Le, N. Dang, Ban T. Nguyen","doi":"10.1109/NICS.2016.7725642","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725642","url":null,"abstract":"Elastic optical networking that enables flexible spectrum resource allocation and bitrate/distance-adaptive modulation is one of the hot trends in optical networks to cope with both legacy low-bitrate services and emerging new bandwidth-abundant super-channel services. This paper evaluates spectrum utilization and regenerating spectrum requirement in regeneration capable elastic optical networks with different modulation format assignment schemes under various network and traffic conditions. The spectrum efficiency of elastic optical networks is also analyzed in comparison with that of conventional WDM networks. Finally, numerical simulation is applied to verify the performance of elastic optical networks against conventional WDM networks. The results prove that elastic optical networks are more spectrum-efficient than conventional WDM networks and the network performance significantly depends on the regeneration capability.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129898497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725657
Hiep Hoang-Van, Tu Nguyen Thi Thanh, Vinh La The
Recently, Japan Aerospace Exploration Agency (JAXA) provides Quasi-Zenith Satellite System (QZSS), a regional satellite system covering East Asia and Oceania region. The objective of QZSS is to improve the availability as well as the performance of GNSS system. Besides navigation signals, QZSS also transmits L-band Experimental signal (LEX) for augmentation corrections including orbit and clock information that support Precise Point Positioning (PPP). In this paper, a method for decoding LEX signal is first presented. Next, the availability of the LEX signal and the quality of the broadcasted correction messages for PPP solutions are evaluated in Vietnam. The results of PPP using LEX signal have been compared to those using augmentation corrections from International GNSS service (IGS) in both static and kinematic positioning modes. Experimental results conducted in Hanoi, Vietnam show the feasibility of using LEX signal to deliver high accuracy positioning service to Vietnamese GNSS users.
{"title":"An evaluation of precise point positioning using QZSS LEX signal in Vietnam","authors":"Hiep Hoang-Van, Tu Nguyen Thi Thanh, Vinh La The","doi":"10.1109/NICS.2016.7725657","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725657","url":null,"abstract":"Recently, Japan Aerospace Exploration Agency (JAXA) provides Quasi-Zenith Satellite System (QZSS), a regional satellite system covering East Asia and Oceania region. The objective of QZSS is to improve the availability as well as the performance of GNSS system. Besides navigation signals, QZSS also transmits L-band Experimental signal (LEX) for augmentation corrections including orbit and clock information that support Precise Point Positioning (PPP). In this paper, a method for decoding LEX signal is first presented. Next, the availability of the LEX signal and the quality of the broadcasted correction messages for PPP solutions are evaluated in Vietnam. The results of PPP using LEX signal have been compared to those using augmentation corrections from International GNSS service (IGS) in both static and kinematic positioning modes. Experimental results conducted in Hanoi, Vietnam show the feasibility of using LEX signal to deliver high accuracy positioning service to Vietnamese GNSS users.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130719474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725627
Le Hoang Son
In recent years, the growing demand of personal healthcare has attracted much attention from both researchers and practitioners. The motivation of designing an efficient intelligent system that keeps track physical conditions, makes diagnosis based on the symptoms, and recommends appropriate treatments is the long-term objective in Health Informatics. In this talk, we will present our recent results of creating such the system using knowledge model and the Internet-of-Thing (IoT) technology. The system firstly requests the IoT device to send the physical conditions of a patient using specialized sensors namely LM35 (temperature measurement), Pluse Sensor (heartbeat) and ESP8266 (network connection). The collected personal symptoms are then integrated to a server for diagnosis of possible diseases such as viral fever, hypothermia, tachycardia and heart failure. This is done by a new technique called the intuitionistic fuzzy recommender system (IFRS), which in essence is a recommender system deployed in the intuitionistic fuzzy set for diagnosing of diseases under uncertain environments. We will present the theoretical basis of IFRS including: i) the formulation of single-criterion and multi-criteria IFRS accompanied with some essential properties; ii) a hybrid model between picture fuzzy clustering and IFRS called HIFCF; iii) intuitionistic fuzzy vector (IFV) with intuitionistic vector similarity measure (IVSM); and iv) linguistic similarity measure. Using the model, diseases are ranked according to the current symptoms and stored in the server. Information of diseases and appropriate treatment therapies is sent back to the patient as well as stored in a web portal for personal monitoring.
{"title":"Keynote talk #2: Health informatics: A step forward to design an intelligent system for monitoring personal healthcare","authors":"Le Hoang Son","doi":"10.1109/NICS.2016.7725627","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725627","url":null,"abstract":"In recent years, the growing demand of personal healthcare has attracted much attention from both researchers and practitioners. The motivation of designing an efficient intelligent system that keeps track physical conditions, makes diagnosis based on the symptoms, and recommends appropriate treatments is the long-term objective in Health Informatics. In this talk, we will present our recent results of creating such the system using knowledge model and the Internet-of-Thing (IoT) technology. The system firstly requests the IoT device to send the physical conditions of a patient using specialized sensors namely LM35 (temperature measurement), Pluse Sensor (heartbeat) and ESP8266 (network connection). The collected personal symptoms are then integrated to a server for diagnosis of possible diseases such as viral fever, hypothermia, tachycardia and heart failure. This is done by a new technique called the intuitionistic fuzzy recommender system (IFRS), which in essence is a recommender system deployed in the intuitionistic fuzzy set for diagnosing of diseases under uncertain environments. We will present the theoretical basis of IFRS including: i) the formulation of single-criterion and multi-criteria IFRS accompanied with some essential properties; ii) a hybrid model between picture fuzzy clustering and IFRS called HIFCF; iii) intuitionistic fuzzy vector (IFV) with intuitionistic vector similarity measure (IVSM); and iv) linguistic similarity measure. Using the model, diseases are ranked according to the current symptoms and stored in the server. Information of diseases and appropriate treatment therapies is sent back to the patient as well as stored in a web portal for personal monitoring.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125931966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725660
Tuan-Duc Nguyen
In the context of wireless sensor networks (WSN), a design of an energy efficient wireless data collecting network and a low power water level monitoring station have been proposed in this paper. Different low power consumption sub-Ghz wireless modules have been compared in this paper, and a most efficient wireless module have been selected in order to design a wireless sensor network. This power efficient wireless sensor network have been designed to connect to many water level monitoring stations and transmit its data to a remote centre. In order to ensure a longterm operation in environment without the grid power supply, solar power supply have been selected and a low power consumption design of a water level monitoring station is also proposed. Finally, the power consumption of the proposed station with wireless sensor network module has been calculated to prove the energy efficiency. With the advantage of a low power consumption and low cost design, the proposed wireless sensor network and water level monitoring station can be applied widely in urban environment in developing countries like Vietnam.
{"title":"Energy efficient wireless sensor network and low power consumption station design for an urban water level monitoring system","authors":"Tuan-Duc Nguyen","doi":"10.1109/NICS.2016.7725660","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725660","url":null,"abstract":"In the context of wireless sensor networks (WSN), a design of an energy efficient wireless data collecting network and a low power water level monitoring station have been proposed in this paper. Different low power consumption sub-Ghz wireless modules have been compared in this paper, and a most efficient wireless module have been selected in order to design a wireless sensor network. This power efficient wireless sensor network have been designed to connect to many water level monitoring stations and transmit its data to a remote centre. In order to ensure a longterm operation in environment without the grid power supply, solar power supply have been selected and a low power consumption design of a water level monitoring station is also proposed. Finally, the power consumption of the proposed station with wireless sensor network module has been calculated to prove the energy efficiency. With the advantage of a low power consumption and low cost design, the proposed wireless sensor network and water level monitoring station can be applied widely in urban environment in developing countries like Vietnam.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129450588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725654
Van-Tuyen Dinh, Ngoc-Diep Luu, Hoang-Hon Trinh
This paper describes a new method to detect vehicles such as cars, motorbikes; it will be a good coarse data to analyze the traffic jam, specially in VietNam where motorbikes densely appear on the roads. From a new image, the method auto-hierarchically (automatically and hierarchically) learns and retrieves geometrical model, backgroud model, foreground objects. The geometrical model is used for reducing size of focus region, and reducing time processing. The background is automatically retrieved and updated by using Median filter method. From the background model and new image, the foreground objects are detected as candidates of Vehicles. To detect and classify the vehicle, Morphological features as area, aspect ratio, bounding box, orientation are used. From training set, the thresholds of morphological features are specified for each type of single, double or motorbikes, cars. This approach is built and finished by several well known algorithms such as line segment detection, dominant vanishing point calculation. The results shows that single, double or motorbikes, cars of vehicles are detected and classified in high accuracy and highly potential for real applications.
{"title":"Vehicle classification and detection based coarse data for warning traffic jam in VietNam","authors":"Van-Tuyen Dinh, Ngoc-Diep Luu, Hoang-Hon Trinh","doi":"10.1109/NICS.2016.7725654","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725654","url":null,"abstract":"This paper describes a new method to detect vehicles such as cars, motorbikes; it will be a good coarse data to analyze the traffic jam, specially in VietNam where motorbikes densely appear on the roads. From a new image, the method auto-hierarchically (automatically and hierarchically) learns and retrieves geometrical model, backgroud model, foreground objects. The geometrical model is used for reducing size of focus region, and reducing time processing. The background is automatically retrieved and updated by using Median filter method. From the background model and new image, the foreground objects are detected as candidates of Vehicles. To detect and classify the vehicle, Morphological features as area, aspect ratio, bounding box, orientation are used. From training set, the thresholds of morphological features are specified for each type of single, double or motorbikes, cars. This approach is built and finished by several well known algorithms such as line segment detection, dominant vanishing point calculation. The results shows that single, double or motorbikes, cars of vehicles are detected and classified in high accuracy and highly potential for real applications.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131022923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725653
Phan Thị Lệ Thuyền, V. T. Hung
The purpose of the Universal Networking Language (UNL) is to allow people to access information on the Internet in their own language. UNL has been studied and applied to 48 languages. UNL system consists of two main components: EnConverter and DeConverter. EnConverter is used for converting a text from the source language to UNL, and DeConverter is used for converting a text from UNL to a target language. The UNL system has not yet been developed for Vietnamese. In this paper, we present the process of encoding a Vietnamese simple sentence into its corresponding UNL expression. We propose the algorithm using enconversion rules generate attributes and solve other relations. The achievement of result that we were able to create the CoDeVie tool to perform encode function for some cases of Vietnamese simple sentence.
{"title":"Automatic translation of Vietnamese simple sentences based on UNL","authors":"Phan Thị Lệ Thuyền, V. T. Hung","doi":"10.1109/NICS.2016.7725653","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725653","url":null,"abstract":"The purpose of the Universal Networking Language (UNL) is to allow people to access information on the Internet in their own language. UNL has been studied and applied to 48 languages. UNL system consists of two main components: EnConverter and DeConverter. EnConverter is used for converting a text from the source language to UNL, and DeConverter is used for converting a text from UNL to a target language. The UNL system has not yet been developed for Vietnamese. In this paper, we present the process of encoding a Vietnamese simple sentence into its corresponding UNL expression. We propose the algorithm using enconversion rules generate attributes and solve other relations. The achievement of result that we were able to create the CoDeVie tool to perform encode function for some cases of Vietnamese simple sentence.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131632619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}