Dac-Nhuong Le

Verified email at hus.edu.vn

Information Technology
Haiphong University



                                         

http://researchid.co/httpsresearchid.conhuongld

Dac-Nhuong Le (Lê Đắc Nhường) has a M.Sc. and Ph.D in computer science from Vietnam National University, Vietnam in 2009 and 2015, respectively. He is Associate Professor in Computer Science, Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. Presently, he is also the Vice-Director of Information Technology Apply and Foreign Language Training Center in the same university.

He has a total academic teaching experience of 12 years with many publications in reputed international conferences, journals and online book chapter contributions (Indexed By: SCI, SCIE, SSCI, Scopus, ACM, DBLP). His area of research include: Soft computing, Network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and Image processing in biomedical.

His core work in network security, soft computing and IoT and image processing in biomedical. Recently, he has been the technique program committee, the technique reviews, the track chair for international conferences: FICTA 2014, CSI 2014, IC4SD 2015, ICICT 2015, INDIA 2015, IC3T 2015, INDIA 2016, FICTA 2016, ICDECT 2016, IUKM 2016, INDIA 2017, FICTA 2017, CISC 2017, ICICC 2018, ICCUT 2018, FICTA 2018 under Springer-ASIC/LNAI Series.

Presently, he is serving in the editorial board of international journals and he authored/edited 12 computer science books by Springer, Wiley, CRC Press.

website: http://www.dhhp.edu.vn/~nhuongld
email: nhuongld@dhhp.edu.vn

44

Scopus Publications

1173

Google Scholar Citations

17

Google Scholar h-index

47

Google Scholar i10-index

Scopus Publications

  • An effective RGB color selection for complex 3D object structure in scene graph systems
    International Journal of Electrical and Computer Engineering, ISSN: 20888708, Pages: 5951-5964, Published: December 2020

  • Preface
    Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 1013, Pages: ix-x, Published: 2020

  • Open Stack: Resources Allocation for Distributed Virtual Machine Peer to Peer
    Hong Minh Nguyen, Thang Van Doan, Dac-Nhuong Le, Ha Huy Cuong Nguyen, and Xuan Huy Nguyen

    Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 1013, Pages: 341-349, Published: 2020 Springer Singapore
    Virtual servers (VS) are built on a group of physical machine (PM) servers scattered across the globe and interconnected through telecommunication systems. It can be said that today data center is the very important role in the era of industrial revolution 4.0. Some countries that want to promote smart agricultural production rely on information technology infrastructure. The integral part of the IoT component is the network infrastructure and cloud computing. In this article, we talk about the ability to exploit virtual resources. The goal of this new technical solution is to make using computer resources more efficient and cost-effective, such as reducing energy costs. Especially, farmers like to use high technology in their farms, but the cost of renting a virtual server from data center is very high. In this paper, we use the Open Stack tool, which incorporates a proposed algorithm to ensure that these resources are provided accurately and in a timely manner, detecting any duplication or conflict, especially resources allocation to remote users. We found a way to create efficiently distributed resources, emphasize solutions to prevent deadlock, and propose methods to avoid resource shortages.

  • GUI-Based Percentage Analysis for Curing Breast Cancer Survivors
    Deblina Sarkhel, Dhanashree Deka, Debabrata Samanta, M. V. Kumudavalli, and Dac-Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 1013, Pages: 319-327, Published: 2020 Springer Singapore
    The modeling approach is increasing the intensity of research in all the domains. The present paper deals with predictive modeling and probabilities. Data analysis is a technique used to transform, reconstruct, and revise some information that is an essential step to achieve the goal or the end result. The present study involves the usage of logistic regression technique for data analysis. Various domain-specific methods pertaining to science, business, etc., are available for data analysis which plays a key role in decision-making and model building. The significance of this analysis is to get the percentage of the survival of patients with advanced breast cancer.

  • Preface
    Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 1014, Pages: ix-x, Published: 2020

  • Integrating encryption techniques for secure data storage in the cloud
    Bijeta Seth, Surjeet Dalal, Vivek Jaglan, Dac‐Nhuong Le, Senthilkumar Mohan, and Gautam Srivastava

    Transactions on Emerging Telecommunications Technologies, ISSN: 21615748, eISSN: 21613915, Published: 2020 Wiley

  • Comprehensive analysis of routing protocols surrounding underwater sensor networks (UWSNs)
    Anand Nayyar, Vikram Puri, and Dac-Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 808, Pages: 435-450, Published: 2019 Springer Singapore
    In recent times, Underwater Sensor Networks (UWSNs) has become highly important for performing all sorts of underwater operations. It is somewhat cumbersome to implement terrestrial sensor networks routing protocols in UWSN due to high propagation delay, packet delay, and energy efficiency. So, lots of efforts are going on by researchers dedicated towards proposing efficient routing protocols for UWSN. As UWSN have specific characteristics in terms of rapid dynamic topology change, limited bandwidth, high energy consumption, high latency, packet delay issues, and security problems, designing a routing protocol to overcome all the aforesaid mentioned issues is quite a daunting task. In this research paper, we primarily focus on surveying various routing protocols available till date for data routing in UWSNs. In addition, comparison of protocols is also mentioned on the basis of various characteristics like routing technique, packet delivery ratio, energy efficiency, packet delay and localization to give a clear picture of the benefits and shortcomings of each and every enlisted protocol for UWSN.

  • Space-time code design using quaternions, octonions and other non-associative structures
    Garima Srivastava, Rashmi Gupta, Raghvendra Kumar, and Dac-Nhuong Le

    International Journal of Electrical and Computer Engineering Systems, ISSN: 18476996, eISSN: 18477003, Pages: 91-95, Published: 2019 Faculty of Electrical Engineering, Computer Science and Information Technology Osijek
    There are several non-associative finite dimensional division algebras over different number fields. Their representations in the corresponding matrix algebras preserve additive structure. However, the embedding does not preserve multiplication as matrix multiplication is associative. As such, it gives a generalized matrix representation. Indeed, a non-associative structure provides different platforms for more effective and useful space-time coding satisfying rank criteria, and coding gain criteria for multiple antenna wireless communication. Associative division algebras have dimension restrictions, whereas non-associative division algebras over suitable fields exist in infinitely many dimensions. We illustrate the above program by using octonion algebras.

  • A hybrid approach of secret sharing with fragmentation and encryption in cloud environment for securing outsourced medical database: A revolutionary approach
    Dac-Nhuong Le, Bijeta Seth, Surjeet Dalal, , , and

    Journal of Cyber Security and Mobility, ISSN: 22451439, eISSN: 22454578, Pages: 379-407, Published: 1 October 2018 River Publishers

  • Light microscopy image de-noising using optimized LPA-ICI filter
    Amira S. Ashour, Samsad Beagum, Nilanjan Dey, Ahmed S. Ashour, Dimitra Sifaki Pistolla, Gia Nhu Nguyen, Dac-Nhuong Le, and Fuqian Shi

    Neural Computing and Applications, ISSN: 09410643, Pages: 1517-1533, Published: 1 June 2018 Springer Science and Business Media LLC
    Microscopic images are often corrupted by noise, where Poisson noise is one of the major types that can damage them. The local polynomial approximation (LPA) filter supported by the intersection confidence interval (ICI) rule was considered as an efficient filter for image de-noising. However, this filter depends on several parameters that affect its performance. In order to determine the optimal parameters, the present study employed the classic LPA-ICI (C-LPA-ICI) filter supported by optimization algorithms, namely the genetic algorithm (GA) and the particle swarm optimization (PSO) in the context of light microscopy imaging systems. Nevertheless, inclusion of the optimization algorithms increased the computational time. A novel automatic technique entitled “Standard Optimized LPA-ICI” (SO-LPA-ICI) is proposed. In this context, the average of the optimized ICI parameters was calculated, which obtained from both LPA-ICI-based GA (G-LPA-ICI) and LPA-ICI-based PSO (P-LPA-ICI). Thus, the proposed SO-LPA-ICI is included the optimal ICI parameters without optimization iterations. This procedure is proposed to speed up the optimized filter. A pool of 50 rats’ renal microscopic images is involved to test the proposed approach. A comparative study was conducted to compare the effectiveness of the four methods, namely C-LPA-ICI, G-LPA-ICI, P-LPA-ICI, and the SO-LPA-ICI for de-noising in the presence of Poisson noise. The experimental results established the outstanding performance of the SO-LPA-ICI in terms of the PSNR, MAE, and MSSIM with 28.27, 7.65, and 0.93 values, respectively. In addition, the proposed approach achieved fast de-noising compared to the G-LPA-ICI and the P-LPA-ICI.

  • Admission control algorithm based on the effective bandwidth in vehicle-toinfrastructure communication
    Mousumi Paul, Goutam Sanyal, Debabrata Samanta, Gia Nhu Nguyen, and Dac-Nhuong Le

    IET Communications, ISSN: 17518628, Pages: 704-711, Published: 3 April 2018 Institution of Engineering and Technology (IET)
    With pervasive of mobile computing and wireless communication, the vehicular ad-hoc network has become a key technology in modern day's information exchange. Due to the fast growing number of vehicles and saturation of the transport infrastructure, it is inhabitable to come out with better solution considering the available resources. In this study, thorough traffic analysis has been carried out to suggest a better model. Further, an attempt has been made to propose an admission control algorithm based-on the parameters evolve from the mathematical analysis. Moreover, the performance analysis has been shown to establish the efficacy of the algorithm.

  • Cloud Computing and Virtualization
    Dac-Nhuong Le, Raghvendra Kumar, Gia Nhu Nguyen, and Jyotir Moy Chatterjee

    Cloud Computing and Virtualization, Pages: 1-205, Published: 12 March 2018 John Wiley & Sons, Inc.
    Cloud computing and Virtualization are listed as top strategic technology trends. Analysts say the economics of cloud are compelling with expected savings for business applications of 3-5 times. In this certificate, students study virtualization environments and cloud-base virtualization architecture, developing knowledge and proficiency with cloud and virtualization technologies, mechanisms, platforms, and practices. Holders of this cloud computing certificate will demonstrate an understanding of the architectural concepts of cloud computing platform and procedures for deploying, operating and managing applications in the cloud, as well as knowledge in implementing and managing virtualization technology, one of the essential components to developing effective cloud environments.

  • Virtual Reality (VR) & Augmented Reality (AR) technologies for tourism and hospitality industry
    Anand Nayyar, Bandana Mahapatra, Dac Nhuong Le, and G Suseendran

    International Journal of Engineering and Technology(UAE), eISSN: 2227524X, Pages: 156-160, Published: 2018 Science Publishing Corporation
    Virtual Reality and Augmented Reality, these days, is offering many useful applications that is attracting greater attention from tourism researchers and professionals. As, AR and VR technologies are evolving, the number of scientific applications is also at increase. VR and AR are proving their worth especially when planning, marketing, education, tourist sport preservation coming to light. The aim of this research paper is to highlight top technologies for Tourism and Hospitality with regard to AR and VR. 

  • Communication in internet of things
    Vivek Hareshbhai Puar, Chintan M. Bhatt, Duong Minh Hoang, and Dac-Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: 272-281, Published: 2018 Springer Singapore
    Internet of Things (IoT) is merging all things together and make this world better and make it easy to live, actually with the help of IoT we can achieve those goals which do not till now. IoT will create a very big network of huge numbers of “Things” that will communicate with each other. Use of IoT tools is the simple way to make things smart. Contiki OS is one of the simulator on which one can run programs and simulate them. One of the examples given here which is border router using InstantContiki simulator. In this paper, we look forward to research how we can connect the border router to internet and how it is connected to other motes.

  • Smart surveillance robot for real-time monitoring and control system in environment and industrial applications
    Anand Nayyar, Vikram Puri, Nhu Gia Nguyen, and Dac Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: 229-243, Published: 2018 Springer Singapore
    The current ongoing revolution of Internet of Things (IoT), is now integrated with Robotics in various diverse fields of everyday life is making up new era i.e. Internet of Robotics (IoR). Internet of Robotics is on the mature stage of development and is currently surrounded by various challenges to be solved for more implementations, i.e., design, security, sensors, and long-range communication systems. The main objective of this paper is to propose an Internet-of-Things-based Internet of Robot, i.e., InterBot 1.0. InterBot 1.0 is efficient in terms of real-time environmental monitoring in terms of temperature, humidity, and gas sensing and is equipped with long-range communication system via 2.4 GHz 6-channel remote and also short range via HC-05 (Bluetooth module). InterBot 1.0 is IoT-based via ESP8266, and all the data can be viewed in live graphs via ThingSpeak.com. The Results state the efficiency of Interbot 1.0 in monitoring real-time environments.

  • The relation of curiosity and creative use of IT
    Nhu-Hang Ha, Yao Chin Lin, Nhan-Van Vo, Dac-Nhuong Le, and Kuo-Sung Lin

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: 537-547, Published: 2018 Springer Singapore
    It is essential to identify factors influencing the creative use of IT that can enhance organizational performance. Based on self-determination theory, our approach investigates the intermediate role of employees’ curiosity in the relationships between inherent psychological needs and employees’ creative use of IT. By using the quantitative method, this study develops a model regarding the creative use of IT. To test the model, surveys are distributed to employees working for organizations located in one of the biggest city in Vietnam. The results indicate that curiosity has partial mediation in the relation between inherent psychological needs and creative use of IT. The findings of this paper are expected to shed a new light into the study of users’ behavior, especially in their creative use of IT. This paper also provides valuable insight to practitioners on how to improve their employees’ creative use of IT.

  • Preface
    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: v-vi, Published: 2018

  • Baseline correction in EMG signals using mathematical morphology and canonical correlation analysis
    Vikrant Bhateja, Ashita Srivastava, Deepak Kumar Tiwari, Deeksha Anand, Suresh Chandra Satapathy, Nguyen Gia Nhu, and Dac-Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 695, Pages: 581-589, Published: 2018 Springer Singapore
    Electromyogram (EMG) signal is a demonstration of muscular contraction. This being a non-stationary signal is distorted by Baseline Wander. Proper correction of Baseline Wander is a major issue while acquiring EMG signals as it may deteriorate the quality of the signal and make its diagnostic analysis difficult. This paper aims at proposing an effective method for Baseline Wander correction in the baseline-drifted EMG signals. Canonical correlation analysis (CCA) algorithm is first performed on the baseline-corrupted EMG signals to decompose them into various canonical components or variates. After that, morphological filtering deploying octagon-shaped structuring element is used to filter each canonical component. Finally, the results of the proposed technique are compared with the CCA-Gaussian- and CCA-thresholding-based techniques. Simulation results report that the Baseline Wander correction approach used in this work satisfyingly eliminates the Baseline Wander from EMG signals while distorting the original EMG signal to a minimum.

  • Haralick features-based classification of mammograms using SVM
    Vikrant Bhateja, Aman Gautam, Ananya Tiwari, Le Nguyen Bao, Suresh Chandra Satapathy, Nguyen Gia Nhu, and Dac-Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 672, Pages: 787-795, Published: 2018 Springer Singapore
    The contrast enhancement of mammograms at preprocessing stage optimizes the overall performance of a computer-aided detection (CAD) system for breast cancer. In the proposed approach, contrast enhancement is performed using a sigmoidal transformation mechanism followed by extracting a set of 14 Haralick features. For classification purposes, a support vector machine (SVM) classifier is used which sorts the input mammogram into either normal or abnormal subclasses. The performance of the classifier is estimated by calculating parameters like accuracy, specificity, and sensitivity. The performance of the proposed approach has been reported to be better in comparison to other existing approaches.

  • MMAS algorithm for features selection using 1D-DWT for video-based face recognition in the online video contextual advertisement user-oriented system
    Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu Nguyen, Le Van Chung, and Nilanjan Dey

    Journal of Global Information Management, ISSN: 10627375, eISSN: 15337995, Pages: 103-124, Published: October-December 2017 IGI Global
    Face recognition is an importance step which can affect the performance of the system. In this paper, the authors propose a novel Max-Min Ant System algorithm to optimal feature selection based on Discrete Wavelet Transform feature for Video-based face recognition. The length of the culled feature vector is adopted as heuristic information for ant's pheromone in their algorithm. They selected the optimal feature subset in terms of shortest feature length and the best performance of classifier used k-nearest neighbor classifier. The experiments were analyzed on face recognition show that the authors' algorithm can be easily implemented and without any priori information of features. The evaluated performance of their algorithm is better than previous approaches for feature selection.

  • Structural failure classification for reinforced concrete buildings using trained neural network based multi-objective genetic algorithm
    Structural Engineering and Mechanics, ISSN: 12254568, Pages: 429-438, Published: 25 August 2017

  • Optimizing feature selection in video-based recognition using Max–Min Ant System for the online video contextual advertisement user-oriented system
    Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu Nguyen, Vikrant Bhateja, and Suresh Chandra Satapathy

    Journal of Computational Science, ISSN: 18777503, Pages: 361-370, Published: July 2017 Elsevier BV
    The online-advertising has been grown to focus on multimedia interactive model with through the Internet. Our Online Video Advertisement User-oriented (OVAU) system combined the machine learning model for face recognition from camera, multimedia streaming protocols, and video meta-data storage technology. face recognition (FR) is an importance phase which can to enhance the performance of our system. Feature Selection (FS) problem for FR is solved by MMAS-FS algorithms based-on PZMI and DWT features. The features set are represented by digraph G(E, V). Each node used to show the features, and the ability to choose a combination of features is presented the edges connecting between two adjacent nodes. The heuristic information extracted from the selected feature vector as ant's pheromone. The feature subset optimal is selected by the shortest length features and best presentation of classifier. The best subset used to classify the face recognition used Nearest Neighbor Classifier (NNC). The experiments were analyzed on FS shows that our algorithm can be easily applied without the priori information of features. The execution assessed of our calculation is more effective than previous approaches for Video-based recognition based on FS problem.

  • A parallel max-min ant system algorithm for dynamic resource allocation to support QoS requirements
    Dac-Nhuong Le, Vikrant Bhateja, and Gia Nhu Nguyen

    2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics, UPCON 2017, Volume: 2018-January, Pages: 697-700, Published: 28 June 2017 IEEE

  • A new ant algorithm for optimal service selection with end-to-end QoS constraints
    Dac-Nhuong Le

    Journal of Internet Technology, ISSN: 16079264, eISSN: 20794029, Pages: 1017-1030, Published: 2017
    In this paper, we study the dynamic service composition becomes a decision problem on which component services should be selected under the E2E-to- End Quality of Service constraints. This problem is modeled is a nonlinear optimization problem under several constraints. We have two approaches to solve this problem. The first approach is local selection which is an efficient strategy with polynomial time complexity but can not handle global constraints. The second approach is the traditional global selection approach based on integer linear programming can handle global constraints, but its poor performance renders it inappropriate for practical applications with dynamic requirements. To overcome this disadvantage, in this study we proposed a novel Min-Max Ant System algorithm with the new utilities heuristic information to search the global approximate optimal. Our goal focus on its efficiency in terms of execution time and the quality in terms of the obtained best solution fitness value. The experiment results show that our algorithm is efficiency and feasibility more than the recently proposed related algorithms.

  • Biological data mining: Techniques and applications
    Wahiba Ben Abdessalem Karaa and Nilanjan Dey

    Mining Multimedia Documents, Pages: 161-172, Published: 1 January 2017 Chapman and Hall/CRC

  • An aggregation approach based on elasticsearch
    Journal of Engineering and Applied Sciences, ISSN: 1816949X, eISSN: 18187803, Issue: Specialissue12, Pages: 9451-9454, Published: 2017

  • Multispectral medical image fusion in Contourlet domain for computer based diagnosis of Alzheimer's disease
    Vikrant Bhateja, Aisha Moin, Anuja Srivastava, Le Nguyen Bao, Aimé Lay-Ekuakille, and Dac-Nhuong Le

    Review of Scientific Instruments, ISSN: 00346748, eISSN: 10897623, Published: 1 July 2016 AIP Publishing
    Computer based diagnosis of Alzheimer's disease can be performed by dint of the analysis of the functional and structural changes in the brain. Multispectral image fusion deliberates upon fusion of the complementary information while discarding the surplus information to achieve a solitary image which encloses both spatial and spectral details. This paper presents a Non-Sub-sampled Contourlet Transform (NSCT) based multispectral image fusion model for computer-aided diagnosis of Alzheimer's disease. The proposed fusion methodology involves color transformation of the input multispectral image. The multispectral image in YIQ color space is decomposed using NSCT followed by dimensionality reduction using modified Principal Component Analysis algorithm on the low frequency coefficients. Further, the high frequency coefficients are enhanced using non-linear enhancement function. Two different fusion rules are then applied to the low-pass and high-pass sub-bands: Phase congruency is applied to low frequency coefficients and a combination of directive contrast and normalized Shannon entropy is applied to high frequency coefficients. The superiority of the fusion response is depicted by the comparisons made with the other state-of-the-art fusion approaches (in terms of various fusion metrics).

  • Healthy and unhealthy rat hippocampus cells classification: A neural based automated system for Alzheimer disease classification
    Nilanjan Dey, Amira S. Ashour, Sayan Chakraborty, Sourav Samanta, Dimitra Sifaki-Pistolla, Ahmed S. Ashour, Dac-Nhuong Le, and Gia Nhu Nguyen

    Journal of Advanced Microscopy Research, ISSN: 21567573, eISSN: 21567581, Pages: 1-10, Published: June 2016 American Scientific Publishers

  • A new private security policy approach for ddos attack defense in ngns
    Dac-Nhuong Le, Vo Nhan Van, and Trinh Thi Thuy Giang

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 435, Pages: 1-10, Published: 2016 Springer India
    Nowadays, the Distributed Denial of Service (DDoS) attack is still one of the most common and devastating security threats to the internet. This problem is progressing quickly, and it is becoming more and more difficult to grasp a global view of the problem. In this paper, we propose a new defense method used the bandwidth in second that a server can use for UDP packets is set as a parameter for controlling a DDoS attack by using the number of UDP packets available. It is registered in the private security policy as a parameter for detecting a flood attack. The efficiency of our proposed method was also proved in the experiments with NS2. DDoS attack is controlled effectively by the private security policy the bandwidth of the regular traffic would be maintained.

  • Optimizing selection of PZMI features based on MMAS algorithm for face recognition of the online video contextual advertisement user-oriented system
    Bao Nguyen Le, Dac-Nhuong Le, Gia Nhu Nguyen, and Do Nang Toan

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN: 03029743, eISSN: 16113349, Volume: 9978 LNAI, Pages: 317-330, Published: 2016 Springer International Publishing
    Presently, the advertising has been grown to focus on multimedia interactive model with through the Internet. The Online Video Advertisement User-oriented (OVAU) system is combined of the machine learning model for face recognition from camera, multimedia streaming protocols, and video meta-data storage technology. Face recognition is an importance phase which can improve the efficiency performance of the OVAU system. The Feature Selection (FS) for face recognition is solved by MMAS-FS algorithm used PZMI feature. The heuristic information extracted from the selected feature vector as ant’s pheromone. The feature subset optimal is selected by the shortest length features and best presentation of classifier. The experiments were analyzed on face recognition show that our algorithm can be easily applied without the priori information of features. The performance evaluated of our algorithm is better than previous approaches for feature selection.

  • Performance analysis of network virtualization in cloud computing infrastructures on OpenStack
    Vo Nhan Van, Le Minh Chi, Nguyen Quoc Long, and Dac-Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 413, Pages: 95-103, Published: 2016 Springer Singapore
    Cloud computing has become popular in IT technology because of advantages that focus on flexible, scaling, resources and services which help customers easy to build their own on-demand IT system. Cloud computing also has ability to balance, share, and manage IT resources between customers to get better performance. OpenStack, a new open source cloud computing framework which was a built-in modular architecture and focus on IaaS. OpenStack also focuses on NaaS by using network virtualization technology and OpenStack has been used popular in business. This paper does a research on network performance on OpenStack network module code name Neutron. The parameter related to network performance such as throughput, package loss, time and delay of data transmission are estimated through UDP protocol. Our research investigated the possible internal traffic flow pattern and evaluated network performance of each pattern on OpenStack cloud computing environment.

  • Performance evaluation of video-based face recognition approaches for online video contextual advertisement user-oriented system
    Le Nguyen Bao, Dac-Nhuong Le, Le Van Chung, and Gia Nhu Nguyen

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 435, Pages: 287-295, Published: 2016 Springer India
    In this research, we propose the online video contextual advertisement user-oriented system. Our system is a combination of video-based face recognition using machine learning models from the camera with multimedia communications and networking streaming architecture using Meta-data structure to video data storage. The real images captured by the camera will be analyzed based on predefined set of conditions to determine the appropriate object classes. Based on the defined object class, the system will access the multimedia advertising contents database and automatically select and play the appropriate contents. We analyse existing face recognition in videos and age estimation from face images approaches. Our experiment was analyzed and evaluated in performance when we integrate analyze age from the face identification in order to select the optimal approach for our system.

  • An optimized anisotropic diffusion approach for despeckling of SAR images
    Vikrant Bhateja, Aditi Sharma, Abhishek Tripathi, Suresh Chandra Satapathy, and Dac-Nhuong Le

    Communications in Computer and Information Science, ISSN: 18650929, Volume: 679, Pages: 134-140, Published: 2016 Springer Singapore
    This paper focuses to address the suppression of residual speckle content, thereby leading to performance improvement of Anisotropic Diffusion (AD) filtering. The present work proposes an optimized AD filtering approach for despeckling of Synthetic Aperture Radar (SAR) images using Ant Colony Optimization (ACO). The residual speckle suppression has been attained via optimal parameter selection of parameters of AD using ACO algorithm. Further, computation of conductance function via eight-directional gradients (derivatives) leads to effective edge preservation during despeckling. During simulations, the fidelity of restored SAR images is validated using PSNR and SSIM as image quality metrics.

  • A performance analysis of openstack open-source solution for IaaS cloud computing
    Vo Nhan Van, Le Minh Chi, Nguyen Quoc Long, Gia Nhu Nguyen, and Dac-Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 380, Pages: 141-150, Published: 2016 Springer India
    Cloud computing is a great design of technology ever made which provides services, applications, and resources through a network. Cloud computing gives the opportunity to use a very large amount of resources on demand. There are many cloud infrastructures as a service (IaaS) frameworks that exist for users, developers, and administrators and they have to make a decision about which environment is best suited for them. In this paper, we focus to analyze and evaluate the performance of the open-source OpenStack for IaaS cloud computing, and give the comparison between OpenStack and VMware. We outline some of our initial findings by providing such a testbed on OpenStack. The experimental results showed the advantages of OpenStack solution in cloud computing where infrastructure is provided as a service.

  • An integrated interactive technique for image segmentation using stack based seeded region growing and thresholding
    Sirshendu Hore, Souvik Chakraborty, Sankhadeep Chatterjee, Nilanjan Dey, Amira S. Ashour, Le Van Chung, and Dac-Nhuong Le

    International Journal of Electrical and Computer Engineering, ISSN: 20888708, Pages: 2773-2780, Published: 2016 Institute of Advanced Engineering and Science
    <p>Image segmentation is a challenging process in numerous applications. Region growing is one of the segmentation techniques as a basis for the Seeded Region Growing method. A novel real time integrated method was developed in the current work to locate the segmented region of interest of an image based on the Region Growing segmentation method along with the thresholding supported image segmentation. Through the proposed work, a homogeneity based on pixel intensity was suggested as well as the threshold value can be decided via a variety of schemes such as manual selection, Iterative method, Otsu’s method, local thresholding to obtain the best possible threshold. The experimental results were performed on different images obtained from an Alpert dataset. A comparative study was arried out with the human segmented image, threshold based region growing, and the proposed integrated method. The results established that the proposed integrated method outperformed the region growing method in terms of the recall and F-score. Although, it had comparable recall values with that gained by the human segmented images. It was noted that as the image under test had a dark background with the brighter object, thus the proposed method provided the superior recall value compared to the other methods.</p>

  • Ant Colony Optimization based anisotropic diffusion approach for despeckling of SAR images
    Vikrant Bhateja, Abhishek Tripathi, Aditi Sharma, Bao Nguyen Le, Suresh Chandra Satapathy, Gia Nhu Nguyen, and Dac-Nhuong Le

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN: 03029743, eISSN: 16113349, Volume: 9978 LNAI, Pages: 389-396, Published: 2016 Springer International Publishing
    Synthetic Aperture Radar (SAR) images are known to be corrupted by granular noise known as speckle. This noise is inherently present in these images owing to acquisition constraints and is a major cause of visual quality degradation. The anisotropic diffusion approaches for despeckling are constrained in terms exercising control over the non-homogeneous regions. This paper proposes to improve the non-linear Anisotropic Diffusion (AD) filter for despeckling using Ant Colony Optimization (ACO) algorithm. The main essence of this work is to suppress speckle and preserve the structural content. The issue of residual speckle content has been minimized by optimal selection of AD parameter(s) using ACO algorithm. Experimental results advocate the performance improvement achieved and has been validated using objective measures of image quality evaluation.

  • Applied MMAS algorithm to optimal resource allocation to support QOS requirements in NGNs
    Dac-Nhuong Le

    Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, ISSN: 18678211, Volume: 146, Pages: 209-216, Published: 2015 Springer International Publishing
    In this paper, we proposed a novel Min-Max Ant System algorithm for dynamic resource allocation with many of service classes while maximizing the provider’s utility in service-oriented networks. The model considers a pricing scheme for the offered services and the quality of service (QoS) requirements of each service class, which operates under a probabilistic delay bound constraint. The goal is to investigate how the utility function and the resource allocation respond to changes of various parameters given the QoS requirements of each service class. Our algorithm performance is evaluated through numerical studies and our solution is approximated the optimal solution. The computational results showed that this approach is currently among the best performing algorithms and much better than previous studies for this problem.

  • Performance evaluation of heuristic algorithms for optimal location of controllers in wireless networks
    Dac-Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 339, Pages: 843-853, Published: 2015 Springer India
    In this paper, we have presented the new Ant Colony Optimization scheme for the optimal location of controllers in wireless networks, which is an important problem in the process of designing cellular mobile networks. Our objective functions are determined by the total distance based on pheromone matrix of ants satisfies capacity constraints to find good approximate solutions. Our proposed algorithms may give feasible solutions to this problem based on the global search for high quality feasible solutions. The experimental results show that our pro-posed algorithm has achieved a much better performance than the previous approaches based on heuristic and evolution algorithms.

  • Evaluation of pheromone update in Min-Max Ant System algorithm to optimizing QoS for multimedia services in NGNs
    Dac-Nhuong Le

    Advances in Intelligent Systems and Computing, ISSN: 21945357, Volume: 338, Pages: 9-17, Published: 2015 Springer International Publishing
    Next Generation Networks (NGN) is towards providing seamless Quality of Service (QoS) for converged mobile and fix multimedia services anywhere-anytime to users through different access network technologies. Factors affecting the QoS in NGN are speech encoders, delay, jitter, packet loss and echo. The negotiation and dynamic adaptation of QoS is currently considered to be one of the key features of the NGN concept. Optimal QoS for multimedia services in the NGNs for multi-flow resource constrained utility maximization is complex problem. In this paper, we propose a novel Min-Max Ant System (MMAS) algorithm with a pheromone updating scheme to solve it. We compared effective of MMAS to SMMAS (Smoothed MMAS), MLAS (Multi-level Ant System) and 3-LAS (Three-level Ant System). The computational results showed that our approach is currently among the best performing algorithms for this problem.

  • A new ant-based approach for optimal service selection with E2E QoS constraints
    Dac-Nhuong Le and Gia Nhu Nguyen

    Communications in Computer and Information Science, ISSN: 18650929, Volume: 516, Pages: 98-109, Published: 2015 Springer Berlin Heidelberg
    In this paper, we study the dynamic service composition becomes a decision problem on which component services should be selected under the E2E QoS constraints. This problem is modeled is a nonlinear optimization problem under several constraints. We have two approaches: local selection is an efficient strategy with polynomial time complexity but can not handle global constraints and the traditional global selection approach based on integer linear programming can handle global constraints, but its poor performance renders it inappropriate for practical applications with dynamic requirements. To overcome this disadvantage,, we proposed a novel Min-Max Ant System algorithm with the utilities heuristic information to search the global approximate optimal. The experiment results show that our algorithm is efficiency and feasibility more than the recently proposed related algorithms.

  • A new technical solution for resource allocation in heterogeneous distributed platforms
    Ha Huy Cuong Nguyen, Dac-Nhuong Le, Van Son Le and Thanh Thuy Nguyen

    Frontiers in Artificial Intelligence and Applications, ISSN: 09226389, Volume: 275, Pages: 184-194, Published: 2015
    An allocation of resources to a virtual machine specifies the maximum amount of each individual element of each resource type that will be utilized, as well as the aggregate amount of each resource of each type. An allocation is thus represented by two vectors, a maximum elementary allocation vector and an aggregate allocation vector. There are more general types of resource allocation problems than those we consider here. In this paper, we present an approach for improving the deadlock detection algorithm, to schedule the policies of resource supply for resource allocation on heterogeneous. The deadlock detection algorithm has a run time complexity of O (min (m, n)), where m is the number of resources and n is the number of processes. We propose the algorithm for allocating multiple resources to competing services running in virtual machines on a heterogeneous distributed platform. The experiments also compare the performance of the proposed approach with other related work.

  • Detecting phishing web pages based on DOM-tree structure and graph matching algorithm
    Le Dang Nguyen, Dac-Nhuong Le, and Le Trong Vinh

    ACM International Conference Proceeding Series, Volume: 04-05-December-2014, Pages: 280-285, Published: 4 December 2014 ACM Press
    Most modern day phishing attacks occur by luring users into visiting a malicious web page that looks and behaves like the original. Phishing is a web-based attack which end users are lured to visit fraudulent websites and give away personal information unconsciously. The key problem for checking phishing pages is timely and efficiently calculation. There is still remaining a large space for phishing detection methods. In this paper, we present an approach which calculates similarity of two web pages based on genetic algorithm and applied it to detecting phishing web pages using DOM-Tree structure. Our experimental evaluation demonstrates that our solution is feasible in practice.

  • Correction of inconsistent systems of linear inequalities with block matrices by minimax criterion
    N. D. Le

    Moscow University Computational Mathematics and Cybernetics, ISSN: 02786419, eISSN: 19348428, Pages: 167-175, Published: December 2011 Allerton Press
    The problem of correcting inconsistent systems of linear inequalities (SLI) with block matrices by the minimax criterion on weighted Euclidean norm of the blocks of correction matrices.

  • Novel mechanism of rapamycin in GVHD: Increase in interstitial regulatory T cells
    J M Palmer, B J Chen, D DeOliveira, N-D Le, and N J Chao

    Bone Marrow Transplantation, ISSN: 02683369, eISSN: 14765365, Pages: 379-384, Published: February 2010 Springer Science and Business Media LLC
    Rapamycin (RAPA) is an immunosuppressive drug that prevents and treats graft-versus-host disease (GVHD) after allogeneic hematopoietic cell transplant (HCT). One possible mechanism for its efficacy is induction of tolerance, through increased number or enhanced survival of regulatory T cells. In our experiments, B10.D2 BM and splenocytes were injected into lethally irradiated BALB/cJ recipients. The mice received i.p. injections of either RAPA or vehicle control on days 1–28. There was a significant survival advantage in RAPA-treated mice. Evaluation of the skin biopsies showed a dense cellular infiltrate in RAPA-treated mice. Further characterization of these cells revealed a higher percentage of regulatory T cells characterized by FoxP3-positive cells in high-dose RAPA-treated mice as compared with controls on day 30. This effect appears to be dose dependent. When peripheral blood analysis for FoxP3-positive cells was performed, there was no significant difference observed in the RAPA-treated mice as compared with control mice. These data show a novel mechanism of rapamycin in GVHD, accumulation of regulatory T cells in the GVHD target tissue: the skin.

RECENT SCHOLAR PUBLICATIONS

  • An effective RGB color selection for complex 3D object structure in scene graph systems
    DN Van, C.L., Nguyen, G.N., Nguyen, T.H., Nguyen, T.S., Le
    International Journal of Electrical and Computer Engineering 10 (6), 5951-5964 2020

  • Machine Learning for Healthcare: Handling and Managing Data
    R Agrawal, JM Chatterjee, A Kumar, PS Rathore, DN Le
    Chapman and Hall/CRC 2020

  • APPLYING 3D VIRTUAL REALITY TECHNOLOGY FOR HUMAN BODY SIMULATION TO TEACHING, LEARNING AND STUDYING ACTIVITIES
    C Le Van, GN Nguyen, TS Nguyen, TH Nguyen, DN Le
    Emerging Extended Reality Technologies For Industry 4.0: Early Experiences 2020

  • IoT: Security and Privacy Paradigm
    S Pal, VG Daz, DN Le
    CRC Press 2020

  • Emerging Extended Reality Technologies for Industry 4.0: Early Experiences with Conception, Design, Implementation, Evaluation and Deployment
    JG Tromp, DN Le, C Van Le
    John Wiley & Sons 2020

  • Forecasting Confirmed and Fatalities Cases of COVID-19 Outbreak
    D Dansana, R Kumar, J Das Adhikari, M Mohapatra, R Sharma, ...
    Frontiers in Public Health 8, 592 2020

  • Open Stack: Resources Allocation for Distributed Virtual Machine Peer to Peer
    HM Nguyen, T Van Doan, DN Le, HHC Nguyen, XH Nguyen
    Frontiers in Intelligent Computing: Theory and Applications, 341-349 2020

  • GUI-Based Percentage Analysis for Curing Breast Cancer Survivors
    D Sarkhel, D Deka, D Samanta, MV Kumudavalli, DN Le
    Frontiers in Intelligent Computing: Theory and Applications, 319-327 2020

  • BioSenHealth 2.0—a low-cost, energy-efficient Internet of Things–based blood glucose monitoring system
    V Puri, R Kumar, DN Le, SS Jagdev, N Sachdeva
    Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach 2020

  • Security Designs for the Cloud, IoT, and Social Networking
    DN Le, CM Bhatt, M Madhukar
    John Wiley & Sons, Incorporated 2019

  • The Vital Role of Fog Computing in Internet of Things
    V Puri, JG Tromp, CV Le, NG Nguyen, DN Le
    Security Designs for the Cloud, Iot, and Social Networking, 153-163 2019

  • Implementation of Rest Architecure‐Based Energy‐Efficient Home Automation System
    S Garg, JM Chatterjee, DN Le
    Security Designs for the Cloud, Iot, and Social Networking, 143-152 2019

  • Fog Computing and Its security issues
    JM Chatterjee, I Priyadarshini, DN Le
    Security Designs for the Cloud, Iot, and Social Networking, 59-76 2019

  • The Role of Information‐Centric Security in the Modern Arena of Information Technology
    S Bibhuprada, DN Le, B Priyadarshini
    Security Designs for the Cloud, Iot, and Social Networking, 165-177 2019

  • Frontiers in Intelligent Computing: Theory and Applications: Proceedings of the 7th International Conference on FICTA (2018)
    SC Satapathy, V Bhateja, B Le Nguyen, NG Nguyen, DN Le
    Springer Nature 2019

  • Network Modeling, Simulation and Analysis in Matlab: Theory and Practices
    DN Le, AK Pandey, S Tadepalli, PS Rathore, JM Chatterjee
    John Wiley & Sons 2019

  • Smart-building management system: An Internet-of-Things (IoT) application business model in Vietnam
    DN Le, L Le Tuan, MND Tuan
    Technological Forecasting and Social Change 141, 22-35 2019

  • Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies
    DN Le, R Kumar, BK Mishra, JM Chatterjee, M Khari
    Wiley, ISBN: 978-1-119-48805-7 2019

  • Mapping of e‐Wallets With Features
    A Sikri, S Dalal, NP Singh, DN Le
    Cyber Security in Parallel and Distributed Computing: Concepts, Techniques 2019

  • MAPPING OF E-WALLETS WITH
    A Sikri, S Dalal, NP Singh, DN Le
    Cyber Security in Parallel and Distributed Computing: Concepts, Techniques 2019

MOST CITED SCHOLAR PUBLICATIONS

  • An integrated interactive technique for image segmentation using stack based seeded region growing and thresholding.
    S Hore, S Chakraborty, S Chatterjee, N Dey, AS Ashour, L Van Chung, ...
    International Journal of Electrical & Computer Engineering (2088-8708) 6 (6) 2016
    Citations: 76

  • Internet of nano things (IoNT): Next evolutionary step in nanotechnology
    A Nayyar, V Puri, DN Le
    Nanoscience and Nanotechnology 7 (1), 4-8 2017
    Citations: 48

  • Structural failure classification for reinforced concrete buildings using trained neural network based multi-objective genetic algorithm
    S Chatterjee, S Sarkar, S Hore, N Dey, AS Ashour, F Shi, DN Le
    Structural Engineering and Mechanics 63 (4), 429-438 2017
    Citations: 40

  • Light microscopy image de-noising using optimized LPA-ICI filter
    AS Ashour, S Beagum, N Dey, AS Ashour, DS Pistolla, GN Nguyen, ...
    Neural Computing and Applications, 1-17 2017
    Citations: 35

  • Virtual Reality (VR) & Augmented Reality (AR) technologies for tourism and hospitality industry
    A Nayyar, B Mahapatra, D Le, G Suseendran
    International Journal of Engineering & Technology 7 (2.21), 156-160 2018
    Citations: 33

  • A survey of web service discovery systems
    DN Le, AES Goh
    International Journal of Information Technology and Web Engineering (IJITWE 2007
    Citations: 32

  • Evolutionary framework for coding area selection from cancer data
    S Kamal, N Dey, SF Nimmy, SH Ripon, NY Ali, AS Ashour, WBA Karaa, ...
    Neural Computing and Applications 29 (4), 1015-1037 2018
    Citations: 31

  • A 150-MHz graphics rendering processor with 256-Mb embedded DRAM
    AK Khan, H Magoshi, T Matsumoto, J Fujita, M Furuhashi, M Imai, ...
    IEEE Journal of Solid-State Circuits 36 (11), 1775-1784 2001
    Citations: 31

  • Healthy and unhealthy rat hippocampus cells classification: a neural based automated system for Alzheimer disease classification
    N Dey, AS Ashour, S Chakraborty, S Samanta, D Sifaki-Pistolla, ...
    Journal of Advanced Microscopy Research 11 (1), 1-10 2016
    Citations: 30

  • Improved shape parameter estimation in K clutter with neural networks and deep learning
    JRF Machado, JCB Vidal
    IJIMAI 3 (7), 96-103 2016
    Citations: 27

  • Biosenhealth 1.0: A novel internet of medical things (iomt)-based patient health monitoring system
    A Nayyar, V Puri, NG Nguyen
    International Conference on Innovative Computing and Communications, 155-164 2019
    Citations: 24

  • Advances in swarm intelligence for optimizing problems in computer science
    A Nayyar, DN Le, NG Nguyen
    CRC Press 2018
    Citations: 22

  • Mining multimedia documents
    WBA Karaa, N Dey
    CRC Press 2017
    Citations: 21

  • Cloud computing and virtualization
    DN Le, R Kumar, GN Nguyen, JM Chatterjee
    John Wiley & Sons 2018
    Citations: 19

  • A new evolutionary approach for gateway placement in wireless mesh networks
    DN Le, NG Nguyen
    International Journal of Computer Networks and Wireless Communications 2012
    Citations: 17

  • A novel PSO-based algorithm for the optimal location of controllers in wireless networks
    DN Le, NG Nguyen, VT Le
    International Journal of Computer Science and Network Security (IJCSNS) 12 2012
    Citations: 17

  • A novel PSO-based algorithm for gateway placement in wireless mesh networks
    VT Le, NH Dinh, NG Nguyen
    2011 IEEE 3rd International Conference on Communication Software and 2011
    Citations: 17

  • Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies
    DN Le, R Kumar, BK Mishra, JM Chatterjee, M Khari
    Wiley, ISBN: 978-1-119-48805-7 2019
    Citations: 15

  • Multispectral medical image fusion in Contourlet domain for computer based diagnosis of Alzheimer’s disease
    V Bhateja, A Moin, A Srivastava, LN Bao, A Lay-Ekuakille, DN Le
    Review of Scientific Instruments 87 (7), 074303 2016
    Citations: 15

  • A new multiple-pattern matching algorithm for the network intrusion detection system
    N Le Dang, DN Le, VT Le
    IACSIT International Journal of Engineering and Technology 8 (2) 2016
    Citations: 15