Verified email at hus.edu.vn
Faculty of Information Technology
Haiphong University, Haiphong, Vietnam
Dac-Nhuong Le (Lê Đắc Nhường) has a M.Sc. and Ph.D in computer science from Vietnam National University, Vietnam in 2009 and 2015, respectively. He is Associate Professor in Computer Science, Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. Presently, he is also the Vice-Director of Information Technology Apply and Foreign Language Training Center in the same university.
He has a total academic teaching experience of 12 years with many publications in reputed international conferences, journals and online book chapter contributions (Indexed By: SCI, SCIE, SSCI, Scopus, ACM, DBLP). His area of research include: Soft computing, Network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and Image processing in biomedical.
His core work in network security, soft computing and IoT and image processing in biomedical. Recently, he has been the technique program committee, the technique reviews, the track chair for international conferences: FICTA 2014, CSI 2014, IC4SD 2015, ICICT 2015, INDIA 2015, IC3T 2015, INDIA 2016, FICTA 2016, ICDECT 2016, IUKM 2016, INDIA 2017, FICTA 2017, CISC 2017, ICICC 2018, ICCUT 2018, FICTA 2018 under Springer-ASIC/LNAI Series.
Presently, he is serving in the editorial board of international journals and he authored/edited 12 computer science books by Springer, Wiley, CRC Press.
Computer Science, Evolutionary Multi-objective Optimization, Network Communication and Security, Biomedical Imaging
Risks and conflicts are subjective events that interfere with the development of software projects. Because risks and conflicts cannot be completely eliminated during the project schedule due to complexity arising from unique characteristics, variability, lack of data, structure, and deviation in prediction/estimation. Many different techniques and tools have been developed to support better project scheduling, but the quantification of risk factors and conflicts has not been adequately considered. In it, the most challenging problem is estimating the time and resources for each specific task in project scheduling. Most research on software project risk analysis focuses on finding the link between risk factors and project outcomes. The goal of risk and conflict management problems in software projects is to provide a multi-objective optimization plan to manage and minimize its level of damage. Therefore, it is almost impossible to find exact algorithms in polynomial time. Then, we need to consider the design of optimal algorithms with the best approximation to help accurately predict, quantify risks, conflicts, as well as their consequences, impact on the project from the critical process, is project planning.
Google Scholar Citations
Google Scholar h-index
Google Scholar i10-index
International Journal of Electrical and Computer Engineering, ISSN: 20888708, Pages: 5951-5964, Published: December 2020
S. K. Prasad, J. Rachna, O. I. Khalaf, and D.-N. Le
Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), ISSN: 00402508, eISSN: 19436009, Pages: 1189-1203, Published: 2020 Begell House
Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 1013, Pages: ix-x, Published: 2020
Hong Minh Nguyen, Thang Van Doan, Dac-Nhuong Le, Ha Huy Cuong Nguyen, and Xuan Huy Nguyen
Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 1013, Pages: 341-349, Published: 2020 Springer Singapore
Virtual servers (VS) are built on a group of physical machine (PM) servers scattered across the globe and interconnected through telecommunication systems. It can be said that today data center is the very important role in the era of industrial revolution 4.0. Some countries that want to promote smart agricultural production rely on information technology infrastructure. The integral part of the IoT component is the network infrastructure and cloud computing. In this article, we talk about the ability to exploit virtual resources. The goal of this new technical solution is to make using computer resources more efficient and cost-effective, such as reducing energy costs. Especially, farmers like to use high technology in their farms, but the cost of renting a virtual server from data center is very high. In this paper, we use the Open Stack tool, which incorporates a proposed algorithm to ensure that these resources are provided accurately and in a timely manner, detecting any duplication or conflict, especially resources allocation to remote users. We found a way to create efficiently distributed resources, emphasize solutions to prevent deadlock, and propose methods to avoid resource shortages.
Deblina Sarkhel, Dhanashree Deka, Debabrata Samanta, M. V. Kumudavalli, and Dac-Nhuong Le
Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 1013, Pages: 319-327, Published: 2020 Springer Singapore
The modeling approach is increasing the intensity of research in all the domains. The present paper deals with predictive modeling and probabilities. Data analysis is a technique used to transform, reconstruct, and revise some information that is an essential step to achieve the goal or the end result. The present study involves the usage of logistic regression technique for data analysis. Various domain-specific methods pertaining to science, business, etc., are available for data analysis which plays a key role in decision-making and model building. The significance of this analysis is to get the percentage of the survival of patients with advanced breast cancer.
Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 1014, Pages: ix-x, Published: 2020
Bijeta Seth, Surjeet Dalal, Vivek Jaglan, Dac‐Nhuong Le, Senthilkumar Mohan, and Gautam Srivastava
Transactions on Emerging Telecommunications Technologies, ISSN: 21615748, eISSN: 21613915, Published: 2020 Wiley
Anand Nayyar, Vikram Puri, and Dac-Nhuong Le
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 808, Pages: 435-450, Published: 2019 Springer Singapore
In recent times, Underwater Sensor Networks (UWSNs) has become highly important for performing all sorts of underwater operations. It is somewhat cumbersome to implement terrestrial sensor networks routing protocols in UWSN due to high propagation delay, packet delay, and energy efficiency. So, lots of efforts are going on by researchers dedicated towards proposing efficient routing protocols for UWSN. As UWSN have specific characteristics in terms of rapid dynamic topology change, limited bandwidth, high energy consumption, high latency, packet delay issues, and security problems, designing a routing protocol to overcome all the aforesaid mentioned issues is quite a daunting task. In this research paper, we primarily focus on surveying various routing protocols available till date for data routing in UWSNs. In addition, comparison of protocols is also mentioned on the basis of various characteristics like routing technique, packet delivery ratio, energy efficiency, packet delay and localization to give a clear picture of the benefits and shortcomings of each and every enlisted protocol for UWSN.
Garima Srivastava, Rashmi Gupta, Raghvendra Kumar, and Dac-Nhuong Le
International Journal of Electrical and Computer Engineering Systems, ISSN: 18476996, eISSN: 18477003, Pages: 91-95, Published: 2019 Faculty of Electrical Engineering, Computer Science and Information Technology Osijek
There are several non-associative finite dimensional division algebras over different number fields. Their representations in the corresponding matrix algebras preserve additive structure. However, the embedding does not preserve multiplication as matrix multiplication is associative. As such, it gives a generalized matrix representation. Indeed, a non-associative structure provides different platforms for more effective and useful space-time coding satisfying rank criteria, and coding gain criteria for multiple antenna wireless communication. Associative division algebras have dimension restrictions, whereas non-associative division algebras over suitable fields exist in infinitely many dimensions. We illustrate the above program by using octonion algebras.
Dac-Nhuong Le, Bijeta Seth, Surjeet Dalal, , , and
Journal of Cyber Security and Mobility, ISSN: 22451439, eISSN: 22454578, Pages: 379-407, Published: 1 October 2018 River Publishers
Amira S. Ashour, Samsad Beagum, Nilanjan Dey, Ahmed S. Ashour, Dimitra Sifaki Pistolla, Gia Nhu Nguyen, Dac-Nhuong Le, and Fuqian Shi
Neural Computing and Applications, ISSN: 09410643, Pages: 1517-1533, Published: 1 June 2018 Springer Science and Business Media LLC
Microscopic images are often corrupted by noise, where Poisson noise is one of the major types that can damage them. The local polynomial approximation (LPA) filter supported by the intersection confidence interval (ICI) rule was considered as an efficient filter for image de-noising. However, this filter depends on several parameters that affect its performance. In order to determine the optimal parameters, the present study employed the classic LPA-ICI (C-LPA-ICI) filter supported by optimization algorithms, namely the genetic algorithm (GA) and the particle swarm optimization (PSO) in the context of light microscopy imaging systems. Nevertheless, inclusion of the optimization algorithms increased the computational time. A novel automatic technique entitled “Standard Optimized LPA-ICI” (SO-LPA-ICI) is proposed. In this context, the average of the optimized ICI parameters was calculated, which obtained from both LPA-ICI-based GA (G-LPA-ICI) and LPA-ICI-based PSO (P-LPA-ICI). Thus, the proposed SO-LPA-ICI is included the optimal ICI parameters without optimization iterations. This procedure is proposed to speed up the optimized filter. A pool of 50 rats’ renal microscopic images is involved to test the proposed approach. A comparative study was conducted to compare the effectiveness of the four methods, namely C-LPA-ICI, G-LPA-ICI, P-LPA-ICI, and the SO-LPA-ICI for de-noising in the presence of Poisson noise. The experimental results established the outstanding performance of the SO-LPA-ICI in terms of the PSNR, MAE, and MSSIM with 28.27, 7.65, and 0.93 values, respectively. In addition, the proposed approach achieved fast de-noising compared to the G-LPA-ICI and the P-LPA-ICI.
Mousumi Paul, Goutam Sanyal, Debabrata Samanta, Gia Nhu Nguyen, and Dac-Nhuong Le
IET Communications, ISSN: 17518628, Pages: 704-711, Published: 3 April 2018 Institution of Engineering and Technology (IET)
With pervasive of mobile computing and wireless communication, the vehicular ad-hoc network has become a key technology in modern day's information exchange. Due to the fast growing number of vehicles and saturation of the transport infrastructure, it is inhabitable to come out with better solution considering the available resources. In this study, thorough traffic analysis has been carried out to suggest a better model. Further, an attempt has been made to propose an admission control algorithm based-on the parameters evolve from the mathematical analysis. Moreover, the performance analysis has been shown to establish the efficacy of the algorithm.
Dac-Nhuong Le, Raghvendra Kumar, Gia Nhu Nguyen, and Jyotir Moy Chatterjee
Cloud Computing and Virtualization, Pages: 1-205, Published: 12 March 2018 John Wiley & Sons, Inc.
Cloud computing and Virtualization are listed as top strategic technology trends. Analysts say the economics of cloud are compelling with expected savings for business applications of 3-5 times. In this certificate, students study virtualization environments and cloud-base virtualization architecture, developing knowledge and proficiency with cloud and virtualization technologies, mechanisms, platforms, and practices. Holders of this cloud computing certificate will demonstrate an understanding of the architectural concepts of cloud computing platform and procedures for deploying, operating and managing applications in the cloud, as well as knowledge in implementing and managing virtualization technology, one of the essential components to developing effective cloud environments.
Anand Nayyar, Bandana Mahapatra, Dac Nhuong Le, and G Suseendran
International Journal of Engineering and Technology(UAE), eISSN: 2227524X, Pages: 156-160, Published: 2018 Science Publishing Corporation
Virtual Reality and Augmented Reality, these days, is offering many useful applications that is attracting greater attention from tourism researchers and professionals. As, AR and VR technologies are evolving, the number of scientific applications is also at increase. VR and AR are proving their worth especially when planning, marketing, education, tourist sport preservation coming to light. The aim of this research paper is to highlight top technologies for Tourism and Hospitality with regard to AR and VR.
Vivek Hareshbhai Puar, Chintan M. Bhatt, Duong Minh Hoang, and Dac-Nhuong Le
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: 272-281, Published: 2018 Springer Singapore
Internet of Things (IoT) is merging all things together and make this world better and make it easy to live, actually with the help of IoT we can achieve those goals which do not till now. IoT will create a very big network of huge numbers of “Things” that will communicate with each other. Use of IoT tools is the simple way to make things smart. Contiki OS is one of the simulator on which one can run programs and simulate them. One of the examples given here which is border router using InstantContiki simulator. In this paper, we look forward to research how we can connect the border router to internet and how it is connected to other motes.
Anand Nayyar, Vikram Puri, Nhu Gia Nguyen, and Dac Nhuong Le
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: 229-243, Published: 2018 Springer Singapore
The current ongoing revolution of Internet of Things (IoT), is now integrated with Robotics in various diverse fields of everyday life is making up new era i.e. Internet of Robotics (IoR). Internet of Robotics is on the mature stage of development and is currently surrounded by various challenges to be solved for more implementations, i.e., design, security, sensors, and long-range communication systems. The main objective of this paper is to propose an Internet-of-Things-based Internet of Robot, i.e., InterBot 1.0. InterBot 1.0 is efficient in terms of real-time environmental monitoring in terms of temperature, humidity, and gas sensing and is equipped with long-range communication system via 2.4 GHz 6-channel remote and also short range via HC-05 (Bluetooth module). InterBot 1.0 is IoT-based via ESP8266, and all the data can be viewed in live graphs via ThingSpeak.com. The Results state the efficiency of Interbot 1.0 in monitoring real-time environments.
Nhu-Hang Ha, Yao Chin Lin, Nhan-Van Vo, Dac-Nhuong Le, and Kuo-Sung Lin
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: 537-547, Published: 2018 Springer Singapore
It is essential to identify factors influencing the creative use of IT that can enhance organizational performance. Based on self-determination theory, our approach investigates the intermediate role of employees’ curiosity in the relationships between inherent psychological needs and employees’ creative use of IT. By using the quantitative method, this study develops a model regarding the creative use of IT. To test the model, surveys are distributed to employees working for organizations located in one of the biggest city in Vietnam. The results indicate that curiosity has partial mediation in the relation between inherent psychological needs and creative use of IT. The findings of this paper are expected to shed a new light into the study of users’ behavior, especially in their creative use of IT. This paper also provides valuable insight to practitioners on how to improve their employees’ creative use of IT.
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: v-vi, Published: 2018
Vikrant Bhateja, Ashita Srivastava, Deepak Kumar Tiwari, Deeksha Anand, Suresh Chandra Satapathy, Nguyen Gia Nhu, and Dac-Nhuong Le
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 695, Pages: 581-589, Published: 2018 Springer Singapore
Electromyogram (EMG) signal is a demonstration of muscular contraction. This being a non-stationary signal is distorted by Baseline Wander. Proper correction of Baseline Wander is a major issue while acquiring EMG signals as it may deteriorate the quality of the signal and make its diagnostic analysis difficult. This paper aims at proposing an effective method for Baseline Wander correction in the baseline-drifted EMG signals. Canonical correlation analysis (CCA) algorithm is first performed on the baseline-corrupted EMG signals to decompose them into various canonical components or variates. After that, morphological filtering deploying octagon-shaped structuring element is used to filter each canonical component. Finally, the results of the proposed technique are compared with the CCA-Gaussian- and CCA-thresholding-based techniques. Simulation results report that the Baseline Wander correction approach used in this work satisfyingly eliminates the Baseline Wander from EMG signals while distorting the original EMG signal to a minimum.
Vikrant Bhateja, Aman Gautam, Ananya Tiwari, Le Nguyen Bao, Suresh Chandra Satapathy, Nguyen Gia Nhu, and Dac-Nhuong Le
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: 787-795, Published: 2018 Springer Singapore
The contrast enhancement of mammograms at preprocessing stage optimizes the overall performance of a computer-aided detection (CAD) system for breast cancer. In the proposed approach, contrast enhancement is performed using a sigmoidal transformation mechanism followed by extracting a set of 14 Haralick features. For classification purposes, a support vector machine (SVM) classifier is used which sorts the input mammogram into either normal or abnormal subclasses. The performance of the classifier is estimated by calculating parameters like accuracy, specificity, and sensitivity. The performance of the proposed approach has been reported to be better in comparison to other existing approaches.
Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu Nguyen, Le Van Chung, and Nilanjan Dey
Journal of Global Information Management, ISSN: 10627375, eISSN: 15337995, Pages: 103-124, Published: October-December 2017 IGI Global
Face recognition is an importance step which can affect the performance of the system. In this paper, the authors propose a novel Max-Min Ant System algorithm to optimal feature selection based on Discrete Wavelet Transform feature for Video-based face recognition. The length of the culled feature vector is adopted as heuristic information for ant's pheromone in their algorithm. They selected the optimal feature subset in terms of shortest feature length and the best performance of classifier used k-nearest neighbor classifier. The experiments were analyzed on face recognition show that the authors' algorithm can be easily implemented and without any priori information of features. The evaluated performance of their algorithm is better than previous approaches for feature selection.
Structural Engineering and Mechanics, ISSN: 12254568, Pages: 429-438, Published: 25 August 2017
Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu Nguyen, Vikrant Bhateja, and Suresh Chandra Satapathy
Journal of Computational Science, ISSN: 18777503, Pages: 361-370, Published: July 2017 Elsevier BV
The online-advertising has been grown to focus on multimedia interactive model with through the Internet. Our Online Video Advertisement User-oriented (OVAU) system combined the machine learning model for face recognition from camera, multimedia streaming protocols, and video meta-data storage technology. face recognition (FR) is an importance phase which can to enhance the performance of our system. Feature Selection (FS) problem for FR is solved by MMAS-FS algorithms based-on PZMI and DWT features. The features set are represented by digraph G(E, V). Each node used to show the features, and the ability to choose a combination of features is presented the edges connecting between two adjacent nodes. The heuristic information extracted from the selected feature vector as ant's pheromone. The feature subset optimal is selected by the shortest length features and best presentation of classifier. The best subset used to classify the face recognition used Nearest Neighbor Classifier (NNC). The experiments were analyzed on FS shows that our algorithm can be easily applied without the priori information of features. The execution assessed of our calculation is more effective than previous approaches for Video-based recognition based on FS problem.
Dac-Nhuong Le, Vikrant Bhateja, and Gia Nhu Nguyen
2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics, UPCON 2017, Volume: 2018-January, Pages: 697-700, Published: 28 June 2017 IEEE
Journal of Internet Technology, ISSN: 16079264, eISSN: 20794029, Pages: 1017-1030, Published: 2017
In this paper, we study the dynamic service composition becomes a decision problem on which component services should be selected under the E2E-to- End Quality of Service constraints. This problem is modeled is a nonlinear optimization problem under several constraints. We have two approaches to solve this problem. The first approach is local selection which is an efficient strategy with polynomial time complexity but can not handle global constraints. The second approach is the traditional global selection approach based on integer linear programming can handle global constraints, but its poor performance renders it inappropriate for practical applications with dynamic requirements. To overcome this disadvantage, in this study we proposed a novel Min-Max Ant System algorithm with the new utilities heuristic information to search the global approximate optimal. Our goal focus on its efficiency in terms of execution time and the quality in terms of the obtained best solution fitness value. The experiment results show that our algorithm is efficiency and feasibility more than the recently proposed related algorithms.
Wahiba Ben Abdessalem Karaa and Nilanjan Dey
Mining Multimedia Documents, Pages: 161-172, Published: 1 January 2017 Chapman and Hall/CRC
Journal of Engineering and Applied Sciences, ISSN: 1816949X, eISSN: 18187803, Issue: Specialissue12, Pages: 9451-9454, Published: 2017
Vikrant Bhateja, Aisha Moin, Anuja Srivastava, Le Nguyen Bao, Aimé Lay-Ekuakille, and Dac-Nhuong Le
Review of Scientific Instruments, ISSN: 00346748, eISSN: 10897623, Published: 1 July 2016 AIP Publishing
Computer based diagnosis of Alzheimer's disease can be performed by dint of the analysis of the functional and structural changes in the brain. Multispectral image fusion deliberates upon fusion of the complementary information while discarding the surplus information to achieve a solitary image which encloses both spatial and spectral details. This paper presents a Non-Sub-sampled Contourlet Transform (NSCT) based multispectral image fusion model for computer-aided diagnosis of Alzheimer's disease. The proposed fusion methodology involves color transformation of the input multispectral image. The multispectral image in YIQ color space is decomposed using NSCT followed by dimensionality reduction using modified Principal Component Analysis algorithm on the low frequency coefficients. Further, the high frequency coefficients are enhanced using non-linear enhancement function. Two different fusion rules are then applied to the low-pass and high-pass sub-bands: Phase congruency is applied to low frequency coefficients and a combination of directive contrast and normalized Shannon entropy is applied to high frequency coefficients. The superiority of the fusion response is depicted by the comparisons made with the other state-of-the-art fusion approaches (in terms of various fusion metrics).
Nilanjan Dey, Amira S. Ashour, Sayan Chakraborty, Sourav Samanta, Dimitra Sifaki-Pistolla, Ahmed S. Ashour, Dac-Nhuong Le, and Gia Nhu Nguyen
Journal of Advanced Microscopy Research, ISSN: 21567573, eISSN: 21567581, Pages: 1-10, Published: June 2016 American Scientific Publishers
Dac-Nhuong Le, Vo Nhan Van, and Trinh Thi Thuy Giang
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 435, Pages: 1-10, Published: 2016 Springer India
Nowadays, the Distributed Denial of Service (DDoS) attack is still one of the most common and devastating security threats to the internet. This problem is progressing quickly, and it is becoming more and more difficult to grasp a global view of the problem. In this paper, we propose a new defense method used the bandwidth in second that a server can use for UDP packets is set as a parameter for controlling a DDoS attack by using the number of UDP packets available. It is registered in the private security policy as a parameter for detecting a flood attack. The efficiency of our proposed method was also proved in the experiments with NS2. DDoS attack is controlled effectively by the private security policy the bandwidth of the regular traffic would be maintained.
Bao Nguyen Le, Dac-Nhuong Le, Gia Nhu Nguyen, and Do Nang Toan
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN: 03029743, eISSN: 16113349, Volume: 9978 LNAI, Pages: 317-330, Published: 2016 Springer International Publishing
Presently, the advertising has been grown to focus on multimedia interactive model with through the Internet. The Online Video Advertisement User-oriented (OVAU) system is combined of the machine learning model for face recognition from camera, multimedia streaming protocols, and video meta-data storage technology. Face recognition is an importance phase which can improve the efficiency performance of the OVAU system. The Feature Selection (FS) for face recognition is solved by MMAS-FS algorithm used PZMI feature. The heuristic information extracted from the selected feature vector as ant’s pheromone. The feature subset optimal is selected by the shortest length features and best presentation of classifier. The experiments were analyzed on face recognition show that our algorithm can be easily applied without the priori information of features. The performance evaluated of our algorithm is better than previous approaches for feature selection.
Vo Nhan Van, Le Minh Chi, Nguyen Quoc Long, and Dac-Nhuong Le
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 413, Pages: 95-103, Published: 2016 Springer Singapore
Cloud computing has become popular in IT technology because of advantages that focus on flexible, scaling, resources and services which help customers easy to build their own on-demand IT system. Cloud computing also has ability to balance, share, and manage IT resources between customers to get better performance. OpenStack, a new open source cloud computing framework which was a built-in modular architecture and focus on IaaS. OpenStack also focuses on NaaS by using network virtualization technology and OpenStack has been used popular in business. This paper does a research on network performance on OpenStack network module code name Neutron. The parameter related to network performance such as throughput, package loss, time and delay of data transmission are estimated through UDP protocol. Our research investigated the possible internal traffic flow pattern and evaluated network performance of each pattern on OpenStack cloud computing environment.
Le Nguyen Bao, Dac-Nhuong Le, Le Van Chung, and Gia Nhu Nguyen
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 435, Pages: 287-295, Published: 2016 Springer India
In this research, we propose the online video contextual advertisement user-oriented system. Our system is a combination of video-based face recognition using machine learning models from the camera with multimedia communications and networking streaming architecture using Meta-data structure to video data storage. The real images captured by the camera will be analyzed based on predefined set of conditions to determine the appropriate object classes. Based on the defined object class, the system will access the multimedia advertising contents database and automatically select and play the appropriate contents. We analyse existing face recognition in videos and age estimation from face images approaches. Our experiment was analyzed and evaluated in performance when we integrate analyze age from the face identification in order to select the optimal approach for our system.
Vikrant Bhateja, Aditi Sharma, Abhishek Tripathi, Suresh Chandra Satapathy, and Dac-Nhuong Le
Communications in Computer and Information Science, ISSN: 18650929, Volume: 679, Pages: 134-140, Published: 2016 Springer Singapore
This paper focuses to address the suppression of residual speckle content, thereby leading to performance improvement of Anisotropic Diffusion (AD) filtering. The present work proposes an optimized AD filtering approach for despeckling of Synthetic Aperture Radar (SAR) images using Ant Colony Optimization (ACO). The residual speckle suppression has been attained via optimal parameter selection of parameters of AD using ACO algorithm. Further, computation of conductance function via eight-directional gradients (derivatives) leads to effective edge preservation during despeckling. During simulations, the fidelity of restored SAR images is validated using PSNR and SSIM as image quality metrics.
Vo Nhan Van, Le Minh Chi, Nguyen Quoc Long, Gia Nhu Nguyen, and Dac-Nhuong Le
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 380, Pages: 141-150, Published: 2016 Springer India
Cloud computing is a great design of technology ever made which provides services, applications, and resources through a network. Cloud computing gives the opportunity to use a very large amount of resources on demand. There are many cloud infrastructures as a service (IaaS) frameworks that exist for users, developers, and administrators and they have to make a decision about which environment is best suited for them. In this paper, we focus to analyze and evaluate the performance of the open-source OpenStack for IaaS cloud computing, and give the comparison between OpenStack and VMware. We outline some of our initial findings by providing such a testbed on OpenStack. The experimental results showed the advantages of OpenStack solution in cloud computing where infrastructure is provided as a service.
Sirshendu Hore, Souvik Chakraborty, Sankhadeep Chatterjee, Nilanjan Dey, Amira S. Ashour, Le Van Chung, and Dac-Nhuong Le
International Journal of Electrical and Computer Engineering, ISSN: 20888708, Pages: 2773-2780, Published: 2016 Institute of Advanced Engineering and Science
<p>Image segmentation is a challenging process in numerous applications. Region growing is one of the segmentation techniques as a basis for the Seeded Region Growing method. A novel real time integrated method was developed in the current work to locate the segmented region of interest of an image based on the Region Growing segmentation method along with the thresholding supported image segmentation. Through the proposed work, a homogeneity based on pixel intensity was suggested as well as the threshold value can be decided via a variety of schemes such as manual selection, Iterative method, Otsu’s method, local thresholding to obtain the best possible threshold. The experimental results were performed on different images obtained from an Alpert dataset. A comparative study was arried out with the human segmented image, threshold based region growing, and the proposed integrated method. The results established that the proposed integrated method outperformed the region growing method in terms of the recall and F-score. Although, it had comparable recall values with that gained by the human segmented images. It was noted that as the image under test had a dark background with the brighter object, thus the proposed method provided the superior recall value compared to the other methods.</p>
Vikrant Bhateja, Abhishek Tripathi, Aditi Sharma, Bao Nguyen Le, Suresh Chandra Satapathy, Gia Nhu Nguyen, and Dac-Nhuong Le
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN: 03029743, eISSN: 16113349, Volume: 9978 LNAI, Pages: 389-396, Published: 2016 Springer International Publishing
Synthetic Aperture Radar (SAR) images are known to be corrupted by granular noise known as speckle. This noise is inherently present in these images owing to acquisition constraints and is a major cause of visual quality degradation. The anisotropic diffusion approaches for despeckling are constrained in terms exercising control over the non-homogeneous regions. This paper proposes to improve the non-linear Anisotropic Diffusion (AD) filter for despeckling using Ant Colony Optimization (ACO) algorithm. The main essence of this work is to suppress speckle and preserve the structural content. The issue of residual speckle content has been minimized by optimal selection of AD parameter(s) using ACO algorithm. Experimental results advocate the performance improvement achieved and has been validated using objective measures of image quality evaluation.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, ISSN: 18678211, Volume: 146, Pages: 209-216, Published: 2015 Springer International Publishing
In this paper, we proposed a novel Min-Max Ant System algorithm for dynamic resource allocation with many of service classes while maximizing the provider’s utility in service-oriented networks. The model considers a pricing scheme for the offered services and the quality of service (QoS) requirements of each service class, which operates under a probabilistic delay bound constraint. The goal is to investigate how the utility function and the resource allocation respond to changes of various parameters given the QoS requirements of each service class. Our algorithm performance is evaluated through numerical studies and our solution is approximated the optimal solution. The computational results showed that this approach is currently among the best performing algorithms and much better than previous studies for this problem.
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 339, Pages: 843-853, Published: 2015 Springer India
In this paper, we have presented the new Ant Colony Optimization scheme for the optimal location of controllers in wireless networks, which is an important problem in the process of designing cellular mobile networks. Our objective functions are determined by the total distance based on pheromone matrix of ants satisfies capacity constraints to find good approximate solutions. Our proposed algorithms may give feasible solutions to this problem based on the global search for high quality feasible solutions. The experimental results show that our pro-posed algorithm has achieved a much better performance than the previous approaches based on heuristic and evolution algorithms.
Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 338, Pages: 9-17, Published: 2015 Springer International Publishing
Next Generation Networks (NGN) is towards providing seamless Quality of Service (QoS) for converged mobile and fix multimedia services anywhere-anytime to users through different access network technologies. Factors affecting the QoS in NGN are speech encoders, delay, jitter, packet loss and echo. The negotiation and dynamic adaptation of QoS is currently considered to be one of the key features of the NGN concept. Optimal QoS for multimedia services in the NGNs for multi-flow resource constrained utility maximization is complex problem. In this paper, we propose a novel Min-Max Ant System (MMAS) algorithm with a pheromone updating scheme to solve it. We compared effective of MMAS to SMMAS (Smoothed MMAS), MLAS (Multi-level Ant System) and 3-LAS (Three-level Ant System). The computational results showed that our approach is currently among the best performing algorithms for this problem.
Dac-Nhuong Le and Gia Nhu Nguyen
Communications in Computer and Information Science, ISSN: 18650929, Volume: 516, Pages: 98-109, Published: 2015 Springer Berlin Heidelberg
In this paper, we study the dynamic service composition becomes a decision problem on which component services should be selected under the E2E QoS constraints. This problem is modeled is a nonlinear optimization problem under several constraints. We have two approaches: local selection is an efficient strategy with polynomial time complexity but can not handle global constraints and the traditional global selection approach based on integer linear programming can handle global constraints, but its poor performance renders it inappropriate for practical applications with dynamic requirements. To overcome this disadvantage,, we proposed a novel Min-Max Ant System algorithm with the utilities heuristic information to search the global approximate optimal. The experiment results show that our algorithm is efficiency and feasibility more than the recently proposed related algorithms.
Ha Huy Cuong Nguyen, Dac-Nhuong Le, Van Son Le and Thanh Thuy Nguyen
Frontiers in Artificial Intelligence and Applications, ISSN: 09226389, Volume: 275, Pages: 184-194, Published: 2015
An allocation of resources to a virtual machine specifies the maximum amount of each individual element of each resource type that will be utilized, as well as the aggregate amount of each resource of each type. An allocation is thus represented by two vectors, a maximum elementary allocation vector and an aggregate allocation vector. There are more general types of resource allocation problems than those we consider here. In this paper, we present an approach for improving the deadlock detection algorithm, to schedule the policies of resource supply for resource allocation on heterogeneous. The deadlock detection algorithm has a run time complexity of O (min (m, n)), where m is the number of resources and n is the number of processes. We propose the algorithm for allocating multiple resources to competing services running in virtual machines on a heterogeneous distributed platform. The experiments also compare the performance of the proposed approach with other related work.
Le Dang Nguyen, Dac-Nhuong Le, and Le Trong Vinh
ACM International Conference Proceeding Series, Volume: 04-05-December-2014, Pages: 280-285, Published: 4 December 2014 ACM Press
Most modern day phishing attacks occur by luring users into visiting a malicious web page that looks and behaves like the original. Phishing is a web-based attack which end users are lured to visit fraudulent websites and give away personal information unconsciously. The key problem for checking phishing pages is timely and efficiently calculation. There is still remaining a large space for phishing detection methods. In this paper, we present an approach which calculates similarity of two web pages based on genetic algorithm and applied it to detecting phishing web pages using DOM-Tree structure. Our experimental evaluation demonstrates that our solution is feasible in practice.
N. D. Le
Moscow University Computational Mathematics and Cybernetics, ISSN: 02786419, eISSN: 19348428, Pages: 167-175, Published: December 2011 Allerton Press
The problem of correcting inconsistent systems of linear inequalities (SLI) with block matrices by the minimax criterion on weighted Euclidean norm of the blocks of correction matrices.
J M Palmer, B J Chen, D DeOliveira, N-D Le, and N J Chao
Bone Marrow Transplantation, ISSN: 02683369, eISSN: 14765365, Pages: 379-384, Published: February 2010 Springer Science and Business Media LLC
Rapamycin (RAPA) is an immunosuppressive drug that prevents and treats graft-versus-host disease (GVHD) after allogeneic hematopoietic cell transplant (HCT). One possible mechanism for its efficacy is induction of tolerance, through increased number or enhanced survival of regulatory T cells. In our experiments, B10.D2 BM and splenocytes were injected into lethally irradiated BALB/cJ recipients. The mice received i.p. injections of either RAPA or vehicle control on days 1–28. There was a significant survival advantage in RAPA-treated mice. Evaluation of the skin biopsies showed a dense cellular infiltrate in RAPA-treated mice. Further characterization of these cells revealed a higher percentage of regulatory T cells characterized by FoxP3-positive cells in high-dose RAPA-treated mice as compared with controls on day 30. This effect appears to be dose dependent. When peripheral blood analysis for FoxP3-positive cells was performed, there was no significant difference observed in the RAPA-treated mice as compared with control mice. These data show a novel mechanism of rapamycin in GVHD, accumulation of regulatory T cells in the GVHD target tissue: the skin.