The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The exponential growth of social media has created informative content, which leads to the emersion of social listening tools, in order to serve the need of companies and organizations. These tools are developed mainly in English language and for those which deal with Vietnamese, they lack the analysis capabilities to capture insightful information. In our research, we propose a framework to automatically...
Educational data mining has received much attention worldwide due to its significance in the education domain. Among a large number of the educational data mining tasks, early in-trouble student prediction is a popular one. This task focuses on identifying the students who are at risk in their study as soon as possible before the end of the permitted period of study time. For early detection, data...
To deal with the problem of large certificate in Public Key Infrastructure, several techniques have been introduced such as Identity-based cryptography, Implicit certificate, Password-based cryptography and recently Certificateless cryptography at Asiacrypt'03. In a certificateless system, only user with her full private key can decrypt the ciphertext while the authority with her master key cannot...
In this paper, we propose a novel contents verification method using the distributed redundant image storages and user-based reconstruction algorithm. There are two processes composing in our proposal such as the image dispersion method and the image reconstruction method. In the image dispersion method, the images are dispersed into many information patches and are stored on the distributed storages,...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
In this paper, we propose a method of protecting patient information using adaptive steganography technique on ECG (Electrocardiogram) signal. The process of embedding information uses the LSB (Least Significant Bit) matching algorithm to reduce the change on the cover object. Patient information is only embedded in the signal between the T-P wave (resting heart) to prevent the interfere with important...
In this paper, a compact triplexer is proposed by cascading three tilted multimode interference couplers for FTTH applications. AH components based on silicon rib waveguides. Firstly, a MMI coupler is designed to separate the 1310 nm wavelength band by using pseudo self-imaging technique. A tiled MMI coupler is then cascaded to separate the 1490 nm and 1550 nm wavelength bands. Numerical simulations...
The recent light field imaging technology has been attracting a lot of interests due to its potential applications in a large number of areas including Virtual Reality, Augmented Reality (VR/AR), Teleconferencing, and E-learning. Light Field (LF) data is able to provide rich visual information such as scene rendering with changes in depth of field, viewpoint, and focal length. However, Light Field...
Device screen size, design layout and resolution are some of the device context parameters which impact video quality on mobile devices. In this paper, through subjective tests, we evaluate the impact of mobile device pixel density on the video quality. We then, through the subjective test, propose a video quality model that takes pixel density into consideration. The proposed model was evaluated,...
The migration of railway communication technology from GSM-based to LTE-based has been decided by International Union of Railway. This means that a future train control system will be one based on LTE accordingly. For the highest reliability of train operation in such a system, a fully duplicated network structure with overlaid radio cells is needed. Existing methods and results are often relied on...
Future mobile networks are known to deploy a two-tier architecture of macrocell — femtocell [1]. In the two-tier architecture, femtocell downlink channels can cause strong co-channel interference to downlink transmission of macrocell users (MUs) which use the same frequency. The co-channel downlink interference to the MU might cause the MU's QoS degradation. To maintain the QoS of the MU's connection,...
Surveillance visual systems play an important role in modern life, especially in the Internet of Things (IoTs) era. However, the limitation of bandwidth, energy resources and the heterogeneity of devices, networks and environments have been asking for a more powerful video coding solution, which provides not only the high compression efficiency but also the flexible scalability capability. In this...
In this paper, we propose a positioning system using a time-synchronized wireless network that can achieve high positioning accuracy without being dependent on any global positioning system (GPS) devices with cm-level accuracy as the main goal and objective. The proposed system utilizes time of arrival (ToA) method to estimate the target's position. Based on the results, we can achieve time synchronization...
In this paper, two methods to improve the secrecy of cooperative transmissions using unshared jamming are investigated in which only the source and destination nodes know the jamming signals. The jamming signals are based on unique cipher keys obtained on the high layers. In the first proposed method (SJ protocol), a source combines its secrecy signal with its jamming signal using the power allocation...
Radio energy harvesting model is an another method to extend the lifetime of wireless networks. In this paper, an energy harvesting model is given for amply-and-forward relay networks with aiding of ambient interferences. For this reason, the energy constrained relays harvest energy from the received signal and then use that harvested energy to amply and send that signal to the target. A time switching...
Biological molecules (e.g. DNAs, RNs, proteins, etc.) do not function in isolation themselves but in a sophisticated manner of various interactions between them to carry out every biological processes in living cells. Data about these interactions are exponentially increased thanks to advanced technologies. Analyzing biological interaction networks is essential to get insights into how biological...
We present the two-stage optical phase conjugation (OPC) to compensate both dispersion and Kerr nonlinearities in a long-haul 4×56 Gbit/s RZ-DQPSK DWDM transmission system. The two-stage OPC is realized to reduce the amount of unwanted products that are produced through nonlinear mixing processes in third-order nonlinear media. We have investigated the benefit of the two-stage OPC using highly nonlinear...
The paper presents the design and processing-time evaluation of an embedded system with the purpose for forensic image detection based on the multi-resolution based algorithm. After the success of the proposed method we then successfully implement on the newest version of the hardware Raspberry Pi-3B which is currently a low cost and friendly environment for variously specific-research applications...
In this paper, we present the design of an energy-saving wireless sensor network using ZigBee standard with tree network topology and the frequency band of 2.4 GHz. By choosing low power consumption components, modifying the MAC algorithm and AES cryptography, the proposed network allows users to utilize the power efficiently, provide high level of security and can be applied to a variety of applications.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.