-
A Subjective Quality Evaluation of 3D Mesh with Dynamic Level of Detail in Virtual Reality
Authors:
Duc Nguyen,
Tran Thuy Hien,
Truong Thu Huong
Abstract:
3D meshes are one of the main components of Virtual Reality applications. However, many network and computational resources are required to process 3D meshes in real-time. A potential solution to this challenge is to dynamically adapt the Level of Detail (LoD) of a 3D mesh based on the object's position and the user's viewpoint. In this paper, we conduct a subjective study to investigate users' qu…
▽ More
3D meshes are one of the main components of Virtual Reality applications. However, many network and computational resources are required to process 3D meshes in real-time. A potential solution to this challenge is to dynamically adapt the Level of Detail (LoD) of a 3D mesh based on the object's position and the user's viewpoint. In this paper, we conduct a subjective study to investigate users' quality perception of 3D meshes with dynamic Level of Detail in a Virtual Reality environment. The subjective experiment is carried out with five 3D meshes of different characteristics, four Levels of Detail, and four distance settings. The results of the experiment show that the impact of the dynamic level of detail depends on both the position of the 3D object in the virtual world and the number of vertices of the original mesh. In addition, we present a quality model that can accurately predict the MOS score of a LoD version of a 3D mesh from the number of vertices and the distance from the viewpoint.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Approximate Proper Efficiency in Vector Optimization via Benson's Approach
Authors:
Nguyen Thi Thu Huong
Abstract:
We present two criteria for checking approximate proper efficiency in vector optimization problems with the ordering cone being a nonnegative orthant. Although the criteria can be established by Benson's approach [H.P. Benson, \textit{An improved definition of proper efficiency for vector maximization with respect to cones}, J. Math. Anal. Appl. \textbf{71} (1979), 232--241], detailed proofs are g…
▽ More
We present two criteria for checking approximate proper efficiency in vector optimization problems with the ordering cone being a nonnegative orthant. Although the criteria can be established by Benson's approach [H.P. Benson, \textit{An improved definition of proper efficiency for vector maximization with respect to cones}, J. Math. Anal. Appl. \textbf{71} (1979), 232--241], detailed proofs are given for the first time here. The two criteria are strong motivations to introduce the concept of $e$-properly efficient solution, where $e$ is any nonzero vector taken from the closed pointed convex ordering cone. For an arbitrary linear vector optimization problem, we show that either the $e$-properly efficient solution set is empty or it coincides with the $e$-efficient solution set. This new result has no analogue in the literature.
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
Network-aware Prefetching Method for Short-Form Video Streaming
Authors:
Duc Nguyen,
Phong Nguyen,
Vu Long,
Truong Thu Huong,
Pham Ngoc Nam
Abstract:
Recent years have witnessed the rising of short-form video platforms such as TikTok. Apart from conventional videos, short-form videos are much shorter and users frequently change the content to watch. Thus, it is crucial to have an effective streaming method for this new type of video. In this paper, we propose a resource-efficient prefetching method for short-form video streaming. Taking into ac…
▽ More
Recent years have witnessed the rising of short-form video platforms such as TikTok. Apart from conventional videos, short-form videos are much shorter and users frequently change the content to watch. Thus, it is crucial to have an effective streaming method for this new type of video. In this paper, we propose a resource-efficient prefetching method for short-form video streaming. Taking into account network throughput conditions and user viewing behaviors, the proposed method dynamically adapts the amount of prefetched video data. Experiment results show that our method can reduce the data waste by 37~52% compared to other existing methods.
△ Less
Submitted 7 September, 2022;
originally announced September 2022.
-
Explainable Anomaly Detection for Industrial Control System Cybersecurity
Authors:
Do Thu Ha,
Nguyen Xuan Hoang,
Nguyen Viet Hoang,
Nguyen Huu Du,
Truong Thu Huong,
Kim Phuc Tran
Abstract:
Industrial Control Systems (ICSs) are becoming more and more important in managing the operation of many important systems in smart manufacturing, such as power stations, water supply systems, and manufacturing sites. While massive digital data can be a driving force for system performance, data security has raised serious concerns. Anomaly detection, therefore, is essential for preventing network…
▽ More
Industrial Control Systems (ICSs) are becoming more and more important in managing the operation of many important systems in smart manufacturing, such as power stations, water supply systems, and manufacturing sites. While massive digital data can be a driving force for system performance, data security has raised serious concerns. Anomaly detection, therefore, is essential for preventing network security intrusions and system attacks. Many AI-based anomaly detection methods have been proposed and achieved high detection performance, however, are still a "black box" that is hard to be interpreted. In this study, we suggest using Explainable Artificial Intelligence to enhance the perspective and reliable results of an LSTM-based Autoencoder-OCSVM learning model for anomaly detection in ICS. We demonstrate the performance of our proposed method based on a well-known SCADA dataset.
△ Less
Submitted 4 May, 2022;
originally announced May 2022.
-
Lipschitz continuity of solutions and corresponding multipliers to distributed and boundary semilinear elliptic optimal control problems with mixed pointwise control-state constraints
Authors:
Vu Huu Nhu,
Nguyen Quoc Tuan,
Nguyen Bang Giang,
Nguyen Thi Thu Huong
Abstract:
This paper is concerned with the existence and regularity of mininizers as well as of corresponding multipliers to an optimal control problem governed by semilinear elliptic equations, in which mixed pointwise control-state constraints are considered in a quite general form and the controls act simultaneously in the domain and on the boundary. Under standing assumptions, the minimizers and the cor…
▽ More
This paper is concerned with the existence and regularity of mininizers as well as of corresponding multipliers to an optimal control problem governed by semilinear elliptic equations, in which mixed pointwise control-state constraints are considered in a quite general form and the controls act simultaneously in the domain and on the boundary. Under standing assumptions, the minimizers and the corresponding multipliers do exist. Furthermore, by applying the bootstrap** technique and establishing some calculation tools for functions in Sobolev spaces of fractional order, the optimal solutions and the associated Lagrange multipliers are shown to be Lipschitz continuous.
△ Less
Submitted 20 May, 2021;
originally announced May 2021.
-
LocKedge: Low-Complexity Cyberattack Detection in IoT Edge Computing
Authors:
Truong Thu Huong,
Ta Phuong Bac,
Dao M. Long,
Bui D. Thang,
Nguyen T. Binh,
Tran D. Luong,
Tran Kim Phuc
Abstract:
Internet of Things and its applications are becoming commonplace with more devices, but always at risk of network security. It is therefore crucial for an IoT network design to identify attackers accurately, quickly and promptly. Many solutions have been proposed, mainly concerning secure IoT architectures and classification algorithms, but none of them have paid enough attention to reducing the c…
▽ More
Internet of Things and its applications are becoming commonplace with more devices, but always at risk of network security. It is therefore crucial for an IoT network design to identify attackers accurately, quickly and promptly. Many solutions have been proposed, mainly concerning secure IoT architectures and classification algorithms, but none of them have paid enough attention to reducing the complexity. Our proposal in this paper is an edge cloud architecture that fulfills the detection task right at the edge layer, near the source of the attacks for quick response, versatility, as well as reducing the workload of the cloud. We also propose a multi attack detection mechanism called LocKedge Low Complexity Cyberattack Detection in IoT Edge Computing, which has low complexity for deployment at the edge zone while still maintaining high accuracy. LocKedge is implemented in two manners: centralized and federated learning manners in order to verify the performance of the architecture from different perspectives. The performance of our proposed mechanism is compared with that of other machine learning and deep learning methods using the most updated BoT IoT data set. The results show that LocKedge outperforms other algorithms such as NN, CNN, RNN, KNN, SVM, KNN, RF and Decision Tree in terms of accuracy and NN in terms of complexity.
△ Less
Submitted 28 November, 2020;
originally announced November 2020.
-
Improperly Efficient Solutions in a Class of Vector Optimization Problems
Authors:
N. T. T. Huong,
N. D. Yen
Abstract:
Improperly efficient solutions in the sense of Geoffrion in linear fractional vector optimization problems with unbounded constraint sets are studied in this paper. We give two sets of conditions which assure that all the efficient solutions of a given problem are improperly efficient. We also obtain necessary conditions for an efficient solution to be improperly efficient. As a result, we have ne…
▽ More
Improperly efficient solutions in the sense of Geoffrion in linear fractional vector optimization problems with unbounded constraint sets are studied in this paper. We give two sets of conditions which assure that all the efficient solutions of a given problem are improperly efficient. We also obtain necessary conditions for an efficient solution to be improperly efficient. As a result, we have new sufficient conditions for Geoffrion's proper efficiency. The obtained results enrich our knowledge on properly efficient solutions in linear fractional vector optimization.
△ Less
Submitted 2 August, 2020;
originally announced August 2020.
-
Impacts of Retina-related Zones on Quality Perception of Omnidirectional Image
Authors:
Huyen T. T. Tran,
Duc V. Nguyen,
Nam Pham Ngoc,
Trang H. Hoang,
Truong Thu Huong,
Truong Cong Thang
Abstract:
Virtual Reality (VR), which brings immersive experiences to viewers, has been gaining popularity in recent years. A key feature in VR systems is the use of omnidirectional content, which provides 360-degree views of scenes. In this work, we study the human quality perception of omnidirectional images, focusing on different zones surrounding the foveation point. For that purpose, an extensive subje…
▽ More
Virtual Reality (VR), which brings immersive experiences to viewers, has been gaining popularity in recent years. A key feature in VR systems is the use of omnidirectional content, which provides 360-degree views of scenes. In this work, we study the human quality perception of omnidirectional images, focusing on different zones surrounding the foveation point. For that purpose, an extensive subjective experiment is carried out to assess the perceptual quality of omnidirectional images with non-uniform quality. Through experimental results, the impacts of different zones are analyzed. Moreover, nineteen objective quality metrics, including foveal quality metrics, are evaluated using our database. It is quantitatively shown that the zones corresponding to the fovea and parafovea of human eyes are extremely important for quality perception, while the impacts of the other zones corresponding to the perifovea and periphery are small. Besides, the investigated metrics are found to be not effective enough to reflect the quality perceived by viewers.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework
Authors:
Trung V. Phan,
T M Rayhan Gias,
Syed Tasnimul Islam,
Truong Thu Huong,
Nguyen Huu Thanh,
Thomas Bauschert
Abstract:
Software Defined Networking (SDN) enables flexible and scalable network control and management. However, it also introduces new vulnerabilities that can be exploited by attackers. In particular, low-rate and slow or stealthy Denial-of-Service (DoS) attacks are recently attracting attention from researchers because of their detection challenges. In this paper, we propose a novel machine learning ba…
▽ More
Software Defined Networking (SDN) enables flexible and scalable network control and management. However, it also introduces new vulnerabilities that can be exploited by attackers. In particular, low-rate and slow or stealthy Denial-of-Service (DoS) attacks are recently attracting attention from researchers because of their detection challenges. In this paper, we propose a novel machine learning based defense framework named Q-MIND, to effectively detect and mitigate stealthy DoS attacks in SDN-based networks. We first analyze the adversary model of stealthy DoS attacks, the related vulnerabilities in SDN-based networks and the key characteristics of stealthy DoS attacks. Next, we describe and analyze an anomaly detection system that uses a Reinforcement Learning-based approach based on Q-Learning in order to maximize its detection performance. Finally, we outline the complete Q-MIND defense framework that incorporates the optimal policy derived from the Q-Learning agent to efficiently defeat stealthy DoS attacks in SDN-based networks. An extensive comparison of the Q-MIND framework and currently existing methods shows that significant improvements in attack detection and mitigation performance are obtained by Q-MIND.
△ Less
Submitted 3 September, 2019; v1 submitted 27 July, 2019;
originally announced July 2019.
-
$G$-strongly positive scripts and critical configurations of chip firing games on digraphs
Authors:
Tran Thi Thu Huong
Abstract:
We show a collection of scripts, called $G$-strongly positive scripts, which is used to recognize critical configurations of a chip firing game (CFG) on a multi-digraph with a global sink. To decrease the time of the process of recognition caused by the stabilization we present an algorithm to find the minimum G-strongly positive script. From that we prove the non-stability of configurations obtai…
▽ More
We show a collection of scripts, called $G$-strongly positive scripts, which is used to recognize critical configurations of a chip firing game (CFG) on a multi-digraph with a global sink. To decrease the time of the process of recognition caused by the stabilization we present an algorithm to find the minimum G-strongly positive script. From that we prove the non-stability of configurations obtained from a critical configuration by firing inversely any non-empty multi-subset of vertices. This result is a generalization of a very recent one by Aval \emph{et.al} which is applied for CFG on undirected graphs. Last, we give a combinatorial proof for the duality between critical and super-stable configurations.
△ Less
Submitted 2 December, 2014;
originally announced December 2014.
-
The basis for design and manufacture of a dsp-based coincidence spectrometer
Authors:
N. X. Hai,
P. N. Tuan,
N. N. Dien,
D. Lanh,
T. T. T. Huong,
P. N. Son,
P. D. Khang
Abstract:
The coincidence technique and the coincidence spectroscopy have been developed and applied for over 40 years. Most of popular coincidence measurement systems were based on analog electronics techniques such as time to amplitude conversion (TAC) or logic selecting coincidence unit. The above-mentioned systems are relatively cumbersome and complicated to use. With the strong growth of digital electr…
▽ More
The coincidence technique and the coincidence spectroscopy have been developed and applied for over 40 years. Most of popular coincidence measurement systems were based on analog electronics techniques such as time to amplitude conversion (TAC) or logic selecting coincidence unit. The above-mentioned systems are relatively cumbersome and complicated to use. With the strong growth of digital electronics techniques and computational science, the coincidence measurement systems will be constructed simpler but more efficient with the sake of application. This article presents the design principle and signal processing of a simple two-channel coincidence system by a technique of Digital Signal Processing (DSP) using Field Programmable Gate Arrays (FPGA) devices at Nuclear Research Institute (NRI), Dalat.
△ Less
Submitted 7 July, 2013; v1 submitted 1 July, 2013;
originally announced July 2013.
-
Bilepton contributions to the neutrinoless double beta decay in the economical 3-3-1 model
Authors:
Dang Van Soa,
Phung Van Dong,
Trinh Thi Huong,
Hoang Ngoc Long
Abstract:
Possible contributions of the bilepton to the neutrinoless double beta $(ββ)_{0ν}$ decay in the economical 3-3-1 model are discussed. We show that the $(ββ)_{0ν}$ decay in this model is due to both sources--Majorana $<M_ν>_{L}$ and Dirac $<M_ν>_{D}$ neutrino masses. If the mixing angle between charged gauge bosons, the standard model $W$ and bilepton $Y$, is in range of the ratio of neutrino mas…
▽ More
Possible contributions of the bilepton to the neutrinoless double beta $(ββ)_{0ν}$ decay in the economical 3-3-1 model are discussed. We show that the $(ββ)_{0ν}$ decay in this model is due to both sources--Majorana $<M_ν>_{L}$ and Dirac $<M_ν>_{D}$ neutrino masses. If the mixing angle between charged gauge bosons, the standard model $W$ and bilepton $Y$, is in range of the ratio of neutrino masses $<M_ν>_{L}/< M_ν>_{D}$, both the Majorana and Dirac masses simultaneously give contributions dominant to the decay. As results, constraints on the bilepton mass are also given.
△ Less
Submitted 28 May, 2008;
originally announced May 2008.
-
Sfermion masses in the supersymmetric economical 3-3-1 model
Authors:
P. V. Dong,
Tr. T. Huong,
N. T. Thuy,
H. N. Long
Abstract:
Sfermion masses and eigenstates in the supersymmetric economical 3-3-1 model are studied. By lepton number conservation, the exotic squarks and superpartners of ordinary quarks are decoupled. Due to the fact that in the 3-3-1 models, one generation of quarks behaves differently from other two, by R-parity conservation, the mass mixing matrix of the squarks in this model are smaller than that in…
▽ More
Sfermion masses and eigenstates in the supersymmetric economical 3-3-1 model are studied. By lepton number conservation, the exotic squarks and superpartners of ordinary quarks are decoupled. Due to the fact that in the 3-3-1 models, one generation of quarks behaves differently from other two, by R-parity conservation, the mass mixing matrix of the squarks in this model are smaller than that in the Minimal Supersymmetric Standard Model (MSSM). Assuming substantial mixing in pairs of highest flavours, we are able to get mass spectrum and eigenstates of all the sfermions. In the effective approximation, the slepton mass splittings in the first two generations, are consistent with those in the MSSM, namely: $ m^2_{\tilde{l}_L} - m^2_{\tildeν_{l L}} = m_W^2 \cos 2\ga$ $(l=e, μ)$. In addition, within the above effective limit, there exists degeneracy among sneutrinos in each multiplet: $m^2_{\tildeν_{l L}} = m^2_{\tildeν_{l R}}$. In contradiction to the MSSM, the squark mass splittings are different for each generation and not to be $ m_W^2 \cos 2\ga$.
△ Less
Submitted 14 September, 2007; v1 submitted 23 August, 2007;
originally announced August 2007.
-
Dark Matter on the Smallest Scales
Authors:
E. R. Siegel,
G. D'Amico,
E. Di Napoli,
L. Fu,
M. P. Hertzberg,
N. T. T. Huong,
F. Palorini,
A. Sellerholm
Abstract:
This work investigates the dark matters structures that form on the smallest cosmological scales. We find that the types and abundances of structures which form at approximately Earth-mass scales are very sensitive to the nature of dark matter. We explore various candidates for dark matter and determine the corresponding properties of small-scale structure. In particular, we discuss possibilitie…
▽ More
This work investigates the dark matters structures that form on the smallest cosmological scales. We find that the types and abundances of structures which form at approximately Earth-mass scales are very sensitive to the nature of dark matter. We explore various candidates for dark matter and determine the corresponding properties of small-scale structure. In particular, we discuss possibilities for indirect detection of dark matter through small-scale structure, and comment on the potential of these methods for discriminating between dark matter candidates.
△ Less
Submitted 29 November, 2006;
originally announced November 2006.
-
Fermion masses in the economical 3-3-1 model
Authors:
P. V. Dong,
D. T. Huong,
Tr. T. Huong,
H. N. Long
Abstract:
We show that, in frameworks of the economical 3-3-1 model, all fermions get masses. At the tree level, one up-quark and two down-quarks are massless, but the one-loop corrections give all quarks the consistent masses. This conclusion is in contradiction to the previous analysis in which, the third scalar triplet has been introduced. This result is based on the key properties of the model: First,…
▽ More
We show that, in frameworks of the economical 3-3-1 model, all fermions get masses. At the tree level, one up-quark and two down-quarks are massless, but the one-loop corrections give all quarks the consistent masses. This conclusion is in contradiction to the previous analysis in which, the third scalar triplet has been introduced. This result is based on the key properties of the model: First, there are three quite different scales of vacuum expectation values: $\om \sim {\cal O}(1) \mathrm{TeV}, v \approx 246 \mathrm{GeV}$ and $ u \sim {\cal O}(1) \mathrm{GeV}$. Second, there exist two types of Yukawa couplings with different strengths: the lepton-number conserving couplings $h$'s and the lepton-number violating ones $s$'s satisfying the condition in which the second are much smaller than the first ones: $ s \ll h$.
With the acceptable set of parameters, numerical evaluation shows that in this model, masses of the exotic quarks also have different scales, namely, the $U$ exotic quark ($q_U = 2/3$) gains mass $m_U \approx 700 $ GeV, while the $D_\al$ exotic quarks ($q_{D_\al} = -1/3$) have masses in the TeV scale: $m_{D_\al} \in 10 ÷80$ TeV.
△ Less
Submitted 26 July, 2006;
originally announced July 2006.
-
Quartic Gauge Boson Couplings and Tree Unitarity in the SU(3)_C X SU(3)_L X U(1)_N Models
Authors:
D. T. Binh,
D. T. Huong,
Tr. T. Huong,
H. N. Long,
D. V. Soa
Abstract:
The quartic gauge boson couplings in the ${SU(3)}_C \otimes {SU(3)}_L \otimes {U(1)}_N$ models are presented. We find that the couplings of four {\it differrent} gauge bosons may have unusual Lorentz structure and the couplings sastify the tree unitarity requirement at high energy limit.
The quartic gauge boson couplings in the ${SU(3)}_C \otimes {SU(3)}_L \otimes {U(1)}_N$ models are presented. We find that the couplings of four {\it differrent} gauge bosons may have unusual Lorentz structure and the couplings sastify the tree unitarity requirement at high energy limit.
△ Less
Submitted 6 November, 2002;
originally announced November 2002.