Dương Thị Thanh Tú, Nguyễn Văn Tân, Hoàng Minh Đức, Nguyễn Việt Hưng
Recently, the Multiple-input multiple-output (MIMO) antennas have been used a lot and attracted many researchers in advanced high-speed wireless communication systems. MIMO antennas are an essential part not only in access points but also in end-user devices.
Lê Hồng Lam, Lê Thành Tươi, Vũ Thị Thu Hiền, Trần Đoàn Hiếu, Đinh Văn Châu, Ngô Thị Thu Trang
Previous studies have examined the effects of hyperparameters on random forests, but little research has been done in the context of fall detection. To address this gap, our study aimed to examine how hyperparameters influence the performance and training time of a random forest algorithm used in fall detection systems.
Năm:2023
|
Chủ đề: Trí tuệ nhân tạo
|
Nhà xuất bản: International Society for Computers and Their Applications (ISCA)
Hoàng Trọng Minh, Lương Đức Thuận, Nguyễn Hồng Đức, Trần Thị Thanh Thủy
Current security challenges are made more difficult by the complexity and difficulty of spotting cyberattacks due to the Internet of Things explosive growth in connected devices and apps. Therefore, various sophisticated attack detection techniques have been created to address these issues in recent years.
Trần Thị Minh Phương, Nguyễn Thị Cẩm Nhung, Nguyễn Thị Hồng
Work engagement is an important indicator in human resource management. From a personal perspective, engagement is related to safety, job satisfaction, employee loyalty, work performance, and personal behavior in the organization (Markos & Sridevi, 2010) [9]. This study aims to determine the contents of the work engagement of sales staff at real estate firms in Hanoi.
In this work, we introduce a simple method to investigate the asymptotic stability of discrete dynamical systems, which can be considered as an extension of the classical Lyapunov’s indirect method.
In recent years, we have experienced rapid and beneficial development of IoT solutions throughout all aspects of life. In addition to the apparent advantages, the increased number and variety of devices have resulted in more security issues.
Năm:2023
|
Chủ đề: Internet vạn vật
|
Nhà xuất bản: Vietnam Academy of Science and Technology
Lê Thị Trang Linh, Nguyễn Minh Quý, Hoàng Trọng Minh
To meet the growing number and variety of IoT devices in 5G and 6G network environments, the development of edge computing technology is a powerful strategy for offloading processes in data servers by processing at the network and nearby the user. Besides its benefits, several challenges related to decentralized operations
Bui Van Cong, Ma Công Thanh, Dao Hoang Mai, Đỗ Xuân Chợ
Improving and enhancing the efectiveness of software vulnerability detection methods is urgently needed today. In this study, we propose a new source code vulnerability detection method based on intelligent and advanced computational algorithms. It’s a combination of four main processing techniques including (i)
Nguyễn Đình Hóa, Đỗ Xuân Chợ, Nguyễn Hoa Cương, Nguyễn Thành Long
Advanced Persistent Threat (APT) attack detection and monitoring has attracted a lot of attention recently when this type of cyber-attacks is growing in both number and dangerous levels. In this paper, a new APT attack model, which is the combination of three different neural network layers including:
Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting vulnerabilities in software written in C/C++, we propose to use a combination of Deep Graph Convolutional Neural Network (DGCNN) and code property graph (CPG).
Nowadays, money transfer through the internet has become so popular because of its convenience and speed which makes users’ lives easier. Even so, the safety of these transactions has been threatened by illegal activities causing great difficulty and loss for users. One of those unauthorized actions is fraud through credit cards used for financial transactions on online platforms. Therefore, research in detecting and early warning of fraudulent transactions through credit cards is essential today.
Quy Vu Khanh, Quy Nguyen Minh, Van Hau Nguyen, Nguyễn Tiến Ban
The fifth-generation mobile network (5G) provides extreme throughput and extremely low latency, which enables the Internet of Things (IoT) era and a series of smart IoT ecosystems. The widespread equipping of Device-to -Device (D2D) modules for vehiculars allows transmitting directly between devices without relying on central devices such as access points or base stations. This is the foundation for the shaping of mobile ad hoc communications, so-called MANETs. The combination of MANETs and IoT technology has led to the development of MANET-assisted IoT applications, which offer unprecedented capabilities. However, due to the mobility of network nodes, routing is one of the main challenges in these networks. To address this problem, we propose a multi-constraints routing schema to enhance the performance of MANET-assisted IoT systems.
Protecting information systems is a difficult and long-term task. The size and traffic intensity of computer networks are diverse and no one protection solution is universal for all cases. A certain solution protects well in the campus network, but it is unlikely to protect well in the service provider's network.
Năm:2023
|
Chủ đề: An toàn bảo mật
|
Nhà xuất bản: Academy and Industry Research Collaboration Center (AIRCC)
Sentiment analysis, a natural language processing task, has gained significant attention because of its diverse applications in understanding user opinions and emotions in social media, customer feedback, and online reviews. Several studies have been conducted on this task using English datasets, yielding noteworthy outcomes.
Atsuki Koyama, Van Chuong Tran, Manato Fujimoto , Thi Hong Tran, Võ Nguyễn Quốc Bảo
Coronavirus disease 2019 (COVID-19) vaccines play a crucial role in preventing the spread of the disease. However, the circulation of low-quality and counterfeit vaccines seriously affects human health and the reputation of real vaccine manufacturers (VMs) and increases the amount of fear concerning vaccination. In this study, we address this problem by developing a blockchain-based COVID-19 vaccine tracking system called “Vacchain”.
Năm:2023
|
Chủ đề: Blockchain
|
Nhà xuất bản: Multidisciplinary Digital Publishing Institute (MDPI)
Vu Khanh Quy, Dang Van Anh, Nguyen Minh Quy, Gwanggil Jeon, Nguyễn Tiến Ban
The Internet of things (IoT) is a concept that allows all things such as sensors, actuators, humans, platforms, and software to interact with others relying on Internet infrastructure.
The article analyzes the current situation of teachers using information technology in teaching at universities, and then introduces the flipped classroom model and the method of conducting flipped teaching. With the primary objective of highlighting the advantages of adopting the flipped teaching technique, the article seeks to establish the respective duties of both educators and learners in this instructional model
Năm:2023
|
Chủ đề: Khác
|
Nhà xuất bản: Publishing House «Scientific survey»
La Văn Quân, Nguyễn Thị Hạnh, Huỳnh Thị Thanh Bình, Vũ Đức Toàn, Bùi Thu Lâm, Đặng Thế Ngọc
A concise and factual abstract is required. The abstract should state Target coverage and lifetime maximization problems are major challenges for mobile wireless sensor networks (MWSN). In this paper, we propose a Multi-Objective formulation for MaxiMizing lifetime with Target Coverage called MO-MMTC, which accounts for the energy fluctuation among mobile sensors after each movement. We prove the formulation to be NP-hard and propose the Enhanced Non-dominated Sorting Genetic Algorithm II (ENSGA-II), a multi-population genetic
algorithm, to solve this problem. Experiments are performed to compare ENSGA-II with TV-Greedy, an existing state-of-the-art heuristic for MMTC. Our results show that the proposed algorithm significantly improves many evaluation metrics compared to baseline methods.
The conventional detectors that require high computational complexity can not be applied in complicated 5G systems, where many new techniques (massive MIMO and mmWave) to be employed. This paper proposes a new detector for 5G systems, called tensor decomposition deep learning (3-D DL). We show that the 5G systems can be expressed as a deep learning network in an equivalent tensor form, where the affine transformation is replaced by the multi-linear and multi-way. Such multi-way information then is preserved through layer wise factorization, where the tensor decomposition and nonlinear activation are performed in each hidden layer. Finally, the tensor-decomposed error backpropagation is developed to train the established network. This 3-D DL fully exploits the advantages of the multi-dimensional structural information of signals, to accomplish the estimations with higher resolution. It also avoids the disregard of structural information across different ways and high complexity found in the traditional methods
Nguyễn Ngọc Anh Đào, Nguyễn Văn Phước, Bùi Kim Hiếu
Vietnam is home to a prospering technology community and numerous enterprises that range from small start-ups to development giants. Virtually all public services are offered online. In fact, the country even has a system for e-residency and “data embassies.” This achievement derives in part from the nation’s transparent and enduring political preferences, but more importantly from Vietnamese law and its regulatory system regarding information, the digital general public, and intellectual property rights (IPR) protection. In this examination of the most pertinent aspects of Vietnam’s digital economy legislation, this study explores the nation’s regulatory structure regarding copyright and patents within the context of digital transformation. The study discusses the relationship between foreign and national regulations in terms of IPR protection and the advancement of digitalization. Research on Vietnamese regulations and the practical application of major patent and copyright regulations has revealed that in many respects, the nation is highly reliant on the effective operation of a broader foreign institutional and legal framework. Thus, in the near future, technological advancement will necessitate the establishment of additional transnational regulatory systems
Nguyễn Bình Minh, Nguyễn Thị Tuyết Mai, Nguyễn Bảo Ngọc
This study aims to explore how inconspicuous luxury consumption is being practiced in an Asian culture like Vietnam. Moreover, the ethical motivations that drive Vietnamese luxury consumers to engage in consuming inconspicuous luxury fashion products are also investigated. A qualitative research approach was used to serve the purpose of this study. Specifically, the authors conducted two rounds of in-depth interviews with 42 Vietnamese luxury consumers recruited using the snowball sampling technique. The findings from the interviews indicate that inconspicuous luxury consumption is on the rise in Vietnam. This study also reveals that inconspicuous luxury consumers in Vietnam share some common characteristics with their counterparts in Western and other Asian countries. Significantly, based on Hunt–Vitell model, the findings suggest that ethical considerations play a crucial role in motivating Vietnamese consumers to engage in inconspicuous luxury consumption. Together with typical motivations such as differentiation seeking, aesthetics seeking and status seeking, consumers buy inconspicuous luxury products to adhere to internalized norms and moral principles. This study contributes to the extant literature by enriching knowledge pertaining to practices of inconspicuous luxury consumption, especially in the context of an emerging Asian country. Notably, an essential contribution of this study is to identify ethical considerations as a new emerging motivation driving inconspicuous luxury consumption. The link between ethical issues and inconspicuous luxury consumption has been largely unexamined in the literature. In this study, the Hunt–Vitell model’s process of ethical reasoning is used in a new context of inconspicuous luxury consumption in an emerging Asian economy
In recent years, a large number of Internet of Things devices are used in life, many of which are vulnerable to attacks from a security perspective. Botnet malware is one of the main threats to IoT devices. Hence detection of IoT botnet is one of the most important challenge for IoT devices. This paper proposes an IoT botnet detection approach based on PSI graph data combine with evolutionary algorithm-based technique. In recent years, a large number of Internet of Things devices are used in life, many of which are vulnerable to attacks from a security perspective. Botnet malware is one of the main threats to IoT devices. Hence detection of IoT botnets is one of the most important challenges for IoT devices. In the paper, a IoT botnet detection approach based on PSI graph analysis by using the evolutionary algorithm based technique. It applies bacterial evolution algorithm (BEA) in the training process on PSI graph multi-architecture IoT Botnet data to detect IoT Botnet. The PSI graphs were extracted from executable
files and transform into vectors to feed into the classical machine learning classifiers. The result of the
classifiers is then combine using soft voting method with BEA. The proposed method has achieved good
experimental results (i.e., Accuracy at 95.30%, F1 at 96.15%). The approach also achieves a relatively
low false-positive rate at 4.59%.
The article focuses on studying the theoretical framework of the connectedness between many stock markets and the Bitcoin market with a specific review in Vietnamese market. With a desk-based approach, content aspects are focused on including a research overview of financial contagion and inter-market relationship. The majority of the related researches confirmed that the contagion between Bitcoin and stock market existed in many different contexts. The two most popular mechanisms for the spillover effect analyzed in these studies were safe-haven characteristic and investor behavior. If Bitcoin could serve as a safe – haven, investors tended to shift the portfolio from stock to this crypto in case of a downtrend leading to the movement of cash flow out of stock market. On the other hand, when investors had sentiment on Bitcoin value, they would prefer investing more in this crypto to holding only securities, which also results in a contagion between two markets
Reading is considered an important skill for Vietnamese adult learners, especially at work. In the past, the traditional method of teaching reading with outdated textbooks made reading lessons repetitive and tedious. Reading texts are chosen with a focus on teaching vocabulary and grammar. Nowadays, a number of teachers have shifted to authentic reading materials to make the lessons more practical and interesting. Authentic reading texts have become increasingly popular due to their various advantages. However, not many teachers have a thorough understanding of authenticity and how to exploit authentic texts. This paper will focus on the use of authentic texts in teaching reading to adult learners in Vietnam