Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Nguyen Tai Hung"'
Autor:
Truong Thu Huong, Ta Phuong Bac, Kieu Ngan Ha, Nguyen Viet Hoang, Nguyen Xuan Hoang, Nguyen Tai Hung, Kim Phuc Tran
Publikováno v:
IEEE Access, Vol 10, Pp 53854-53872 (2022)
We are now witnessing the rapid growth of advanced technologies and their application, leading to Smart Manufacturing (SM). The Internet of Things (IoT) is one of the main technologies used to enable smart factories, which is connecting all industria
Externí odkaz:
https://doaj.org/article/c2b5db76693641818a371d79b8d34f4b
Autor:
Luu, Quang-Trung, Nguyen, Minh-Thanh, Do, Tuan-Anh, Kieffer, Michel, Nguyen, Van-Dinh, Nguyen, Tai-Hung, Nguyen, Huu-Thanh
Network slicing is a critical feature in 5G and beyond communication systems, enabling the creation of multiple virtual networks (i.e., slices) on a shared physical network infrastructure. This involves efficiently mapping each slice component, inclu
Externí odkaz:
http://arxiv.org/abs/2412.05993
Autor:
Nguyen, Huu Thanh, Vu, Anh Vu, Nguyen, Duc Lam, Nguyen, Van Huynh, Tran, Manh Nam, Ngo, Quynh Thu, Truong, Thu-Huong, Nguyen, Tai Hung, Magedanz, Thomas
Publikováno v:
In Computer Networks 9 December 2015 92 Part 2:251-269
Publikováno v:
2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM).
Autor:
Nguyen Huu, Thanh, Pham Ngoc, Nam, Truong Thu, Huong, Tran Ngoc, Thuan, Nguyen Minh, Duong, Nguyen, Van Giang, Nguyen Tai, Hung, Ngo Quynh, Thu, Hock, David, Schwartz, Christian
Publikováno v:
In Simulation Modelling Practice and Theory December 2013 39:20-40
Autor:
Nguyen Danh Nghia, Nguyen Minh Hieu, Pham Huy Hung, Nguyen Tai Hung, Dinh Khac Tuyen, Nguyen Huu Thanh, Nguyen Ngoc Tuan
Publikováno v:
2020 IEEE Eighth International Conference on Communications and Electronics (ICCE).
Anomaly detection is an important step in the process of attack detection and mitigation. As the first step before attack detection mechanisms are used, it is to be decided if the network is in normal or abnormal state by anomaly traffic detection me
Publikováno v:
Advanced Computational Methods for Knowledge Engineering ISBN: 9783030383633
ICCSAMA
ICCSAMA
Internet of Things (IoT) is an attractive part of our daily life. However, the development of IoT applications still faces many challenges, such as handling unstructured data, intelligent analytics, connectivity, compatibility and interoperability, i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eca3a3dab9d8885c66853c7349bc2e8f
https://doi.org/10.1007/978-3-030-38364-0_37
https://doi.org/10.1007/978-3-030-38364-0_37
Publikováno v:
2019 International Conference on Advanced Technologies for Communications (ATC).
In wireless sensor networks (WSNs), the process of collecting information from sensor nodes is one of the most important key applications. The data collection process in a WSN should meet several requirements, such as high reliability, low power cons
Publikováno v:
International Journal of Distributed Systems and Technologies. 4:29-42
To let the service system react quickly on customers’ perception or user experience while using the service, mapping functions between Quality of Experience (QoE) and Quality of Service (QoS) are strongly required in purpose of building up an intel
Publikováno v:
2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).
A simple low-cost transmitter using low power RGB-type white LED is presented in this article. This type of white LED is widely used for illumination and communication applications. However, the low modulation bandwidth of RGB-LED, which is a few ten