Computer Science and Communication Engineering : [85]

Follow this collection to receive daily e-mail notification of new additions
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 85
  • item.jpg
  • Journal Article


  • Authors: Tran, Vinh Quang; Nguyen, Thi Ngoc Diep (2021)

  • Table is one of the most common ways to represent structured data in documents. Existing researches on image-based table structure recognition often rely on limited datasets with the largest amount of 3,789 human-labeled tables as ICDAR 19 Track B dataset. A recent Table Bank dataset for table structures contains 145K tables, however, the tables are labeled in an HTML tag sequence format, which impedes the development of image-based recognition methods. In this paper, we propose several processing methods that automatically convert an HTML tag sequence annotation into bounding box annotation for table cells in one table image. By assembling these methods, we could convert 42,02...

  • item.jpg
  • Journal Article


  • Authors: Pham, Khoi Dong; Nguyen, Hung K; Hussin, Fawnizu Azmadi; Tran, Xuan Tu (2021)

  • Security issues in high-speed data transfer between devices are always a big challenge. On the other hand, new data transfer standards such as IEEE P802.3bs 2017 stipulate the maximum data rate up to 400 Gbps. So, security encryptions need high throughput to meet data transfer rates and low latency to ensure the quality of services. In this paper, we propose a multi-core AES encryption hardware architecture to achieve ultra-high-throughput encryption. To reduce area cost and power consumption, these cores share the same KeyExpansion blocks. Fully parallel, outer round pipeline technique is also applied to the proposed architecture to achieve low latency encryption. The design has been...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Ngoc Khai; Truong, Anh Hoang; Dang, Duc Hanh (2021)

  • Estimating memory required by complex programs is a well-known research topic. In this work, we build a type system to statically estimate the memory bounds required by shared variables in software transactional memory (STM) programs. This work extends our previous works with additional language features such as explicitly declared shared variables, introduction of primitive types, and allowing loop body to contain any statement, not required to be well-typed as in our previous works. Also, the new type system has better compositionality compared to available type systems.

  • item.jpg
  • Journal Article


  • Authors: Tran, Van Trung; Tran, Anh Tu; Nguyen, Phuong Thao; Luu, Quang Thang; Pham, Bao Son; Bui, Quang Hung (2021)

  • In this article, we present an optimal method for searching the address on VMap based on the current location and the entire view of the users. The article will focus on understanding and researching factors to optimize user's search, enhancing the user’s experience on VMap. The article used data from OpenStreetMap, open source of Pelias geocoder to run test suites. Specifically, based on comparison results with the best rated digital map platform today, Google Maps, we calculated the effectiveness of the method. The proposed method helps to diversify search results with the user's current location, providing relevant search results in case the user's view does not have much influence...

  • item.jpg
  • Journal Article


  • Authors: Pham, Manh Linh; Hoang, Xuan Tung (2021)

  • Internet of Things (IoT) applications are increasingly making impact in all areas of humanlife. Day by day, its chatty embedded devices have been generating tons of data requiring effectivenetwork infrastructure. To deliver millions of IoT messages back and fort with as few faults aspossible, participation of communication protocols like MQTT is a must. Lightweight blueprintand friendly battery are just two of many advantages of this protocol making it become a dominantin IoT world. In real application scenarios, distributed MQTT solutions are usually required sincecentralized MQTT approach is incapable of dealing with huge amount of data. Although distributedMQTT solutions are scalab...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Duc Thao; Nguyen, Viet Anh; Le, Thanh Ha; Ngo, Thi Duyen (2021)

  • With the development of virtual reality (VR) technology and its applications in many fields, creating simulated hands in the virtual environment is an e ective way to replace the controller as well as to enhance user experience in interactive processes. Therefore, hand tracking problem is gaining a lot of research attention, making an important contribution in recognizing hand postures as well as tracking hand motions for VR’s input or human machine interaction applications. In order to create a markerless real-time hand tracking system suitable for natural human machine interaction, we propose a new method that combines generative and discriminative methods to solve the hand tracking...

  • item.jpg
  • Journal Article


  • Authors: Pham, Ngoc Son; Tran, Trung Duy; Truong, Phuc Quang; Truong, Son Ngoc; Pham, Viet Tuan; Phan, Van-Ca; Ho, Van Khuong (2021)

  • In this paper, we analyze an underlay two-way decode-and-forward scheme in which secondary relays use successive interference cancellation (SIC) technology to decode data of two secondary sources sequentially, and then generate a coded signal by superposition coding (SC) technology, denoted as SIC-SC protocol. The SIC-SC protocol is designed to operate in two time slots under effects from an interference constraint of a primary receiver and residual interference of imperfect SIC processes. Transmit powers provided to carry the data are allocated dynamically according to channel powers of interference and transmission, and a secondary relay is selected from considering strongest channe...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Hong Thinh; Tran, Hoang Tung; Le, Vu Ha (2020)

  • Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and retrieval. It can be seen as a two-phase process: object detection and segmentation. Object segmentation becomes more challenging in case there is no prior knowledge about the object in the scene. In such conditions, visual attention analysis via saliency mapping may offer a mean to predict the object location by using visual contrast, local or global, to identify regions that draw strong attention in the image. However, in such situations as clutter background, highly varied object surface, or shadow, regular and salient object se...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Hung K.; Tran, Xuan-Tu (2020)

  • In this paper, a PCA and ANN-based face recognition system is proposed and implemented on a Coarse Grain Reconfigurable Computing (CGRC) platform. Our work is quite distinguished from previous ones in two aspects. First, a new hardware-software co-design method is proposed, and the whole face recognition system is divided into several parallel tasks implemented on both the Coarse-Grained Reconfigurable Architecture (CGRA) and the General-Purpose Processor (GPP). Second, we analyzed the source code of the ANN algorithm and proposed the optimization solution to explore its multi-level parallelism to improve the performance of the application on the CGRC platform. The computation tasks o...

  • 7.pdf.jpg
  • Article


  • Authors: Hoang, Hong Son; Pham, Cam Phuong; Theo, van Walsum; Luu, Manh Ha (2020)

  • Liver segmentation is relevant for several clinical applications. Automatic liver segmentation using convolutional neural networks (CNNs) has been recently investigated. In this paper, we propose a new approach of combining a largest connected component (LCC) algorithm, as a post-processing step, with CNN approaches to improve liver segmentation accuracy. Specifically, in this study, the algorithm is combined with three well-known CNNs for liver segmentation: FCN-CRF, DRIU and V-net. We perform the experiment on a variety of liver CT images, ranging from non-contrast enhanced CT images to low-dose contrast enhanced CT images. The methods are evaluated using Dice score, Haudorff distan...

  • 6.pdf.jpg
  • Article


  • Authors: Truong, Duc-Tai; Nguyen, Quoc-Tuan; Dinh, Thai-Mai Thi (2020)

  • Currently, there are a lot of secure communication schemes have been proposed to hide secret contents. In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses the security of the method encrypting directly QAM symbols instead of input bit-stream. This leads to improving the security of transmitting data by utilization of authentication key between the mobile and base station. The archived results demonstrate that the performance of the AES-OFDM system is completely acceptable to ...

  • 5.pdf.jpg
  • Article


  • Authors: Pham, Thanh Huyen; Ho, Thuan (2020)

  • The paper aims to improve the multi-label classification performance using the feature reduction technique. According to the determination of the dependency among features based on fuzzy rough relation, features with the highest dependency score will be retained in the reduction set. The set is subsequently applied to enhance the performance of the multi-label classifier. We investigate the effectiveness of the proposed model againts the baseline via time complexity.

  • 4.pdf.jpg
  • Article


  • Authors: Pham, Thi Quynh Trang; Bui, Manh Thang; Dang, Thanh Hai (2020)

  • Chemical compounds (drugs) and diseases are among top searched keywords on the PubMed database of biomedical literature by biomedical researchers all over the world (according to a study in 2009). Working with PubMed is essential for researchers to get insights into drugs’ side effects (chemical-induced disease relations (CDR), which is essential for drug safety and toxicity. It is, however, a catastrophic burden for them as PubMed is a huge database of unstructured texts, growing steadily very fast (~28 millions scientific articles currently, approximately two deposited per minute). As a result, biomedical text mining has been empirically demonstrated its great implications in biomed...

  • 3.pdf.jpg
  • Article


  • Authors: Nguyen, Thi-Hau; Do, Trung-Tuan; Nguyen, Duc-Nhan; Lu, Ha-Nam (2019)

  • This paper presents a hybrid method that combines the genetic algorithm (GA) and the ant colony system algorithm (ACS), namely GACS, to solve the traffic routing problem. In the proposed framework, we use the genetic algorithm to optimize the ACS parameters in order to attain the best trips and travelling time through several novel functions to help ants to update the global and local pheromones. The GACS framework is implemented using the VANETsim package and the real city maps from the open street map project. The experimental results show that our framework achieves a considerably higher performance than A-Star and the classical ACS algorithms in terms of the length of the global b...

  • 2.pdf.jpg
  • Article


  • Authors: Pham, Nghia-Luan; Nguyen, Van-Vinh (2019)

  • In this paper, we propose a new method for domain adaptation in Statistical Machine Translation for low-resource domains in English-Vietnamese language. Specifically, our method only uses monolingual data to adapt the translation phrase-table, our system brings improvements over the SMT baseline system. We propose two steps to improve the quality of SMT system: (i) classify phrases on the target side of the translation phrase-table use the probability classifier model, and (ii) adapt to the phrase-table translation by recomputing the direct translation probability of phrases. Our experiments are conducted with translation direction from English to Vietnamese on two very different doma...

  • 1.pdf.jpg
  • Article


  • Authors: Lam, Sinh Cong; Nguyen, Quoc Tuan; Kumbesan, Sandrasegaran (2019)

  • Fractional Frequency Reuse (FFR) is a promising to improve the spectrum e ciency in the LongTerm Evolution (LTE) cellular network. In the literature, various research works have been conducted to evaluate the performance of FFR. However, the presented analytical approach only dealt with the special cases in which the users are divided into 2 groups and only two power levels are utilised. In this paper, we consider a general case of FFR in which the users are classified into  groups and each group is assigned a serving power level. The mathematical model of the general FFR is presented and analysed through a stochastic geometry approach. The derived analytical results in terms of av...

  • New feature selection method for multi-channel EEG epileptic.pdf.jpg
  • Article


  • Authors: Nguyen, Thi Anh Dao; Le, Trung Thanh (2019)

  • Epilepsy is one of the most common brain disorders. Electroencephalogram (EEG) is widely used in epilepsy diagnosis and treatment, with it the epileptic spikes can be observed. Tensor decomposition-based feature extraction has been proposed to facilitate automatic detection of EEG epileptic spikes. However, tensor decomposition may still result in a large number of features which are considered negligible in determining expected output performance. We proposed a new feature selection method that combines the Fisher score and p-value feature selection methods to rank the features by using the longest common sequences (LCS) to separate epileptic and non-epileptic spikes. The proposed me...

  • Design and Simulation of a DC Stabilization System.pdf.jpg
  • Article


  • Authors: Pham, Thi Viet Hương; Mac, Khuong Duy; Tran, Anh Vu; Dang, Anh Viet; Pham, Minh-Trien (2019)

  • During the last few years, the demand for solar photovoltaic (PV) energy has grown remarkably since it provides electricity from an exhaustible and clean energy source. The generated power of solar panels depends on environment conditions, which changes continuously due to many factors, for example, the radiation, the characteristics of the load, etc. In order for the solar energy system operates at its most efficiency, it needs to work at its maximum power point (MPP). Previous literature has dealt with either investigating Maximum Power Point Tracking (MPPT) algorithms or tracking a steady output voltage from solar panels. However, when the load is changed, the new MPP need to be d...

  • A Survey of High-Efficiency Context-Addaptive Binary.pdf.jpg
  • Article


  • Authors: Tran, Dinh-Lam; Pham, Viet-Hương; Nguyen, Hung K; Tran, Xuan-Tu (2019)

  • High-Efficiency Video Coding (HEVC), also known as H.265 and MPEG-H Part 2, is the newest video coding standard developed to address the increasing demand for higher resolutions and frame rates. In comparison to its predecessor H.264/AVC, HEVC achieved almost double of compression performance that is capable to process high quality video sequences (UHD 4K, 8K; high frame rates) in a wide range of applications. Context-Adaptive Baniray Arithmetic Coding (CABAC) is the only entropy coding method in HEVC, whose principal algorithm is inherited from its predecessor. However, several aspects of the method that exploits it in HEVC are different, thus HEVC CABAC supports better coding effi...

  • A General Computational Framework for Prediction.pdf.jpg
  • Article


  • Authors: Le, Duc-Hau (2019)

  • Since last decade, we have been witnessing the raise of non-coding RNAs (ncRNAs) in biomedical research. Many ncRNAs have been identified and classified into different classes based on their length in number of base pairs (bp). In parallel, our understanding about functions of ncRNAs is gradually increased. However, only small set among tens of thousands of ncRNAs have been well studied about their functions and their roles in development of diseases. This raises a pressing need to develop computational methods to associate diseases and ncRNAs. Two most widely studied ncRNAs are microRNA (miRNA) and long non-coding RNA (lncRNA), since miRNAs are the regulators of most protein-codin...

Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 85

Computer Science and Communication Engineering : [85]

Follow this collection to receive daily e-mail notification of new additions
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 85
  • item.jpg
  • Journal Article


  • Authors: Tran, Vinh Quang; Nguyen, Thi Ngoc Diep (2021)

  • Table is one of the most common ways to represent structured data in documents. Existing researches on image-based table structure recognition often rely on limited datasets with the largest amount of 3,789 human-labeled tables as ICDAR 19 Track B dataset. A recent Table Bank dataset for table structures contains 145K tables, however, the tables are labeled in an HTML tag sequence format, which impedes the development of image-based recognition methods. In this paper, we propose several processing methods that automatically convert an HTML tag sequence annotation into bounding box annotation for table cells in one table image. By assembling these methods, we could convert 42,02...

  • item.jpg
  • Journal Article


  • Authors: Pham, Khoi Dong; Nguyen, Hung K; Hussin, Fawnizu Azmadi; Tran, Xuan Tu (2021)

  • Security issues in high-speed data transfer between devices are always a big challenge. On the other hand, new data transfer standards such as IEEE P802.3bs 2017 stipulate the maximum data rate up to 400 Gbps. So, security encryptions need high throughput to meet data transfer rates and low latency to ensure the quality of services. In this paper, we propose a multi-core AES encryption hardware architecture to achieve ultra-high-throughput encryption. To reduce area cost and power consumption, these cores share the same KeyExpansion blocks. Fully parallel, outer round pipeline technique is also applied to the proposed architecture to achieve low latency encryption. The design has been...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Ngoc Khai; Truong, Anh Hoang; Dang, Duc Hanh (2021)

  • Estimating memory required by complex programs is a well-known research topic. In this work, we build a type system to statically estimate the memory bounds required by shared variables in software transactional memory (STM) programs. This work extends our previous works with additional language features such as explicitly declared shared variables, introduction of primitive types, and allowing loop body to contain any statement, not required to be well-typed as in our previous works. Also, the new type system has better compositionality compared to available type systems.

  • item.jpg
  • Journal Article


  • Authors: Tran, Van Trung; Tran, Anh Tu; Nguyen, Phuong Thao; Luu, Quang Thang; Pham, Bao Son; Bui, Quang Hung (2021)

  • In this article, we present an optimal method for searching the address on VMap based on the current location and the entire view of the users. The article will focus on understanding and researching factors to optimize user's search, enhancing the user’s experience on VMap. The article used data from OpenStreetMap, open source of Pelias geocoder to run test suites. Specifically, based on comparison results with the best rated digital map platform today, Google Maps, we calculated the effectiveness of the method. The proposed method helps to diversify search results with the user's current location, providing relevant search results in case the user's view does not have much influence...

  • item.jpg
  • Journal Article


  • Authors: Pham, Manh Linh; Hoang, Xuan Tung (2021)

  • Internet of Things (IoT) applications are increasingly making impact in all areas of humanlife. Day by day, its chatty embedded devices have been generating tons of data requiring effectivenetwork infrastructure. To deliver millions of IoT messages back and fort with as few faults aspossible, participation of communication protocols like MQTT is a must. Lightweight blueprintand friendly battery are just two of many advantages of this protocol making it become a dominantin IoT world. In real application scenarios, distributed MQTT solutions are usually required sincecentralized MQTT approach is incapable of dealing with huge amount of data. Although distributedMQTT solutions are scalab...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Duc Thao; Nguyen, Viet Anh; Le, Thanh Ha; Ngo, Thi Duyen (2021)

  • With the development of virtual reality (VR) technology and its applications in many fields, creating simulated hands in the virtual environment is an e ective way to replace the controller as well as to enhance user experience in interactive processes. Therefore, hand tracking problem is gaining a lot of research attention, making an important contribution in recognizing hand postures as well as tracking hand motions for VR’s input or human machine interaction applications. In order to create a markerless real-time hand tracking system suitable for natural human machine interaction, we propose a new method that combines generative and discriminative methods to solve the hand tracking...

  • item.jpg
  • Journal Article


  • Authors: Pham, Ngoc Son; Tran, Trung Duy; Truong, Phuc Quang; Truong, Son Ngoc; Pham, Viet Tuan; Phan, Van-Ca; Ho, Van Khuong (2021)

  • In this paper, we analyze an underlay two-way decode-and-forward scheme in which secondary relays use successive interference cancellation (SIC) technology to decode data of two secondary sources sequentially, and then generate a coded signal by superposition coding (SC) technology, denoted as SIC-SC protocol. The SIC-SC protocol is designed to operate in two time slots under effects from an interference constraint of a primary receiver and residual interference of imperfect SIC processes. Transmit powers provided to carry the data are allocated dynamically according to channel powers of interference and transmission, and a secondary relay is selected from considering strongest channe...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Hong Thinh; Tran, Hoang Tung; Le, Vu Ha (2020)

  • Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and retrieval. It can be seen as a two-phase process: object detection and segmentation. Object segmentation becomes more challenging in case there is no prior knowledge about the object in the scene. In such conditions, visual attention analysis via saliency mapping may offer a mean to predict the object location by using visual contrast, local or global, to identify regions that draw strong attention in the image. However, in such situations as clutter background, highly varied object surface, or shadow, regular and salient object se...

  • item.jpg
  • Journal Article


  • Authors: Nguyen, Hung K.; Tran, Xuan-Tu (2020)

  • In this paper, a PCA and ANN-based face recognition system is proposed and implemented on a Coarse Grain Reconfigurable Computing (CGRC) platform. Our work is quite distinguished from previous ones in two aspects. First, a new hardware-software co-design method is proposed, and the whole face recognition system is divided into several parallel tasks implemented on both the Coarse-Grained Reconfigurable Architecture (CGRA) and the General-Purpose Processor (GPP). Second, we analyzed the source code of the ANN algorithm and proposed the optimization solution to explore its multi-level parallelism to improve the performance of the application on the CGRC platform. The computation tasks o...

  • 7.pdf.jpg
  • Article


  • Authors: Hoang, Hong Son; Pham, Cam Phuong; Theo, van Walsum; Luu, Manh Ha (2020)

  • Liver segmentation is relevant for several clinical applications. Automatic liver segmentation using convolutional neural networks (CNNs) has been recently investigated. In this paper, we propose a new approach of combining a largest connected component (LCC) algorithm, as a post-processing step, with CNN approaches to improve liver segmentation accuracy. Specifically, in this study, the algorithm is combined with three well-known CNNs for liver segmentation: FCN-CRF, DRIU and V-net. We perform the experiment on a variety of liver CT images, ranging from non-contrast enhanced CT images to low-dose contrast enhanced CT images. The methods are evaluated using Dice score, Haudorff distan...

  • 6.pdf.jpg
  • Article


  • Authors: Truong, Duc-Tai; Nguyen, Quoc-Tuan; Dinh, Thai-Mai Thi (2020)

  • Currently, there are a lot of secure communication schemes have been proposed to hide secret contents. In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses the security of the method encrypting directly QAM symbols instead of input bit-stream. This leads to improving the security of transmitting data by utilization of authentication key between the mobile and base station. The archived results demonstrate that the performance of the AES-OFDM system is completely acceptable to ...

  • 5.pdf.jpg
  • Article


  • Authors: Pham, Thanh Huyen; Ho, Thuan (2020)

  • The paper aims to improve the multi-label classification performance using the feature reduction technique. According to the determination of the dependency among features based on fuzzy rough relation, features with the highest dependency score will be retained in the reduction set. The set is subsequently applied to enhance the performance of the multi-label classifier. We investigate the effectiveness of the proposed model againts the baseline via time complexity.

  • 4.pdf.jpg
  • Article


  • Authors: Pham, Thi Quynh Trang; Bui, Manh Thang; Dang, Thanh Hai (2020)

  • Chemical compounds (drugs) and diseases are among top searched keywords on the PubMed database of biomedical literature by biomedical researchers all over the world (according to a study in 2009). Working with PubMed is essential for researchers to get insights into drugs’ side effects (chemical-induced disease relations (CDR), which is essential for drug safety and toxicity. It is, however, a catastrophic burden for them as PubMed is a huge database of unstructured texts, growing steadily very fast (~28 millions scientific articles currently, approximately two deposited per minute). As a result, biomedical text mining has been empirically demonstrated its great implications in biomed...

  • 3.pdf.jpg
  • Article


  • Authors: Nguyen, Thi-Hau; Do, Trung-Tuan; Nguyen, Duc-Nhan; Lu, Ha-Nam (2019)

  • This paper presents a hybrid method that combines the genetic algorithm (GA) and the ant colony system algorithm (ACS), namely GACS, to solve the traffic routing problem. In the proposed framework, we use the genetic algorithm to optimize the ACS parameters in order to attain the best trips and travelling time through several novel functions to help ants to update the global and local pheromones. The GACS framework is implemented using the VANETsim package and the real city maps from the open street map project. The experimental results show that our framework achieves a considerably higher performance than A-Star and the classical ACS algorithms in terms of the length of the global b...

  • 2.pdf.jpg
  • Article


  • Authors: Pham, Nghia-Luan; Nguyen, Van-Vinh (2019)

  • In this paper, we propose a new method for domain adaptation in Statistical Machine Translation for low-resource domains in English-Vietnamese language. Specifically, our method only uses monolingual data to adapt the translation phrase-table, our system brings improvements over the SMT baseline system. We propose two steps to improve the quality of SMT system: (i) classify phrases on the target side of the translation phrase-table use the probability classifier model, and (ii) adapt to the phrase-table translation by recomputing the direct translation probability of phrases. Our experiments are conducted with translation direction from English to Vietnamese on two very different doma...

  • 1.pdf.jpg
  • Article


  • Authors: Lam, Sinh Cong; Nguyen, Quoc Tuan; Kumbesan, Sandrasegaran (2019)

  • Fractional Frequency Reuse (FFR) is a promising to improve the spectrum e ciency in the LongTerm Evolution (LTE) cellular network. In the literature, various research works have been conducted to evaluate the performance of FFR. However, the presented analytical approach only dealt with the special cases in which the users are divided into 2 groups and only two power levels are utilised. In this paper, we consider a general case of FFR in which the users are classified into  groups and each group is assigned a serving power level. The mathematical model of the general FFR is presented and analysed through a stochastic geometry approach. The derived analytical results in terms of av...

  • New feature selection method for multi-channel EEG epileptic.pdf.jpg
  • Article


  • Authors: Nguyen, Thi Anh Dao; Le, Trung Thanh (2019)

  • Epilepsy is one of the most common brain disorders. Electroencephalogram (EEG) is widely used in epilepsy diagnosis and treatment, with it the epileptic spikes can be observed. Tensor decomposition-based feature extraction has been proposed to facilitate automatic detection of EEG epileptic spikes. However, tensor decomposition may still result in a large number of features which are considered negligible in determining expected output performance. We proposed a new feature selection method that combines the Fisher score and p-value feature selection methods to rank the features by using the longest common sequences (LCS) to separate epileptic and non-epileptic spikes. The proposed me...

  • Design and Simulation of a DC Stabilization System.pdf.jpg
  • Article


  • Authors: Pham, Thi Viet Hương; Mac, Khuong Duy; Tran, Anh Vu; Dang, Anh Viet; Pham, Minh-Trien (2019)

  • During the last few years, the demand for solar photovoltaic (PV) energy has grown remarkably since it provides electricity from an exhaustible and clean energy source. The generated power of solar panels depends on environment conditions, which changes continuously due to many factors, for example, the radiation, the characteristics of the load, etc. In order for the solar energy system operates at its most efficiency, it needs to work at its maximum power point (MPP). Previous literature has dealt with either investigating Maximum Power Point Tracking (MPPT) algorithms or tracking a steady output voltage from solar panels. However, when the load is changed, the new MPP need to be d...

  • A Survey of High-Efficiency Context-Addaptive Binary.pdf.jpg
  • Article


  • Authors: Tran, Dinh-Lam; Pham, Viet-Hương; Nguyen, Hung K; Tran, Xuan-Tu (2019)

  • High-Efficiency Video Coding (HEVC), also known as H.265 and MPEG-H Part 2, is the newest video coding standard developed to address the increasing demand for higher resolutions and frame rates. In comparison to its predecessor H.264/AVC, HEVC achieved almost double of compression performance that is capable to process high quality video sequences (UHD 4K, 8K; high frame rates) in a wide range of applications. Context-Adaptive Baniray Arithmetic Coding (CABAC) is the only entropy coding method in HEVC, whose principal algorithm is inherited from its predecessor. However, several aspects of the method that exploits it in HEVC are different, thus HEVC CABAC supports better coding effi...

  • A General Computational Framework for Prediction.pdf.jpg
  • Article


  • Authors: Le, Duc-Hau (2019)

  • Since last decade, we have been witnessing the raise of non-coding RNAs (ncRNAs) in biomedical research. Many ncRNAs have been identified and classified into different classes based on their length in number of base pairs (bp). In parallel, our understanding about functions of ncRNAs is gradually increased. However, only small set among tens of thousands of ncRNAs have been well studied about their functions and their roles in development of diseases. This raises a pressing need to develop computational methods to associate diseases and ncRNAs. Two most widely studied ncRNAs are microRNA (miRNA) and long non-coding RNA (lncRNA), since miRNAs are the regulators of most protein-codin...

Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 85