Skip to main content

Showing 1–16 of 16 results for author: Huong, T T

.
  1. arXiv:2406.06888  [pdf, other

    cs.MM

    A Subjective Quality Evaluation of 3D Mesh with Dynamic Level of Detail in Virtual Reality

    Authors: Duc Nguyen, Tran Thuy Hien, Truong Thu Huong

    Abstract: 3D meshes are one of the main components of Virtual Reality applications. However, many network and computational resources are required to process 3D meshes in real-time. A potential solution to this challenge is to dynamically adapt the Level of Detail (LoD) of a 3D mesh based on the object's position and the user's viewpoint. In this paper, we conduct a subjective study to investigate users' qu… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Acceped to ICIP 2024

  2. arXiv:2312.01428  [pdf, other

    math.OC

    Approximate Proper Efficiency in Vector Optimization via Benson's Approach

    Authors: Nguyen Thi Thu Huong

    Abstract: We present two criteria for checking approximate proper efficiency in vector optimization problems with the ordering cone being a nonnegative orthant. Although the criteria can be established by Benson's approach [H.P. Benson, \textit{An improved definition of proper efficiency for vector maximization with respect to cones}, J. Math. Anal. Appl. \textbf{71} (1979), 232--241], detailed proofs are g… ▽ More

    Submitted 3 December, 2023; originally announced December 2023.

  3. arXiv:2209.02927  [pdf, other

    cs.MM

    Network-aware Prefetching Method for Short-Form Video Streaming

    Authors: Duc Nguyen, Phong Nguyen, Vu Long, Truong Thu Huong, Pham Ngoc Nam

    Abstract: Recent years have witnessed the rising of short-form video platforms such as TikTok. Apart from conventional videos, short-form videos are much shorter and users frequently change the content to watch. Thus, it is crucial to have an effective streaming method for this new type of video. In this paper, we propose a resource-efficient prefetching method for short-form video streaming. Taking into ac… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  4. arXiv:2205.01930  [pdf, other

    eess.SY

    Explainable Anomaly Detection for Industrial Control System Cybersecurity

    Authors: Do Thu Ha, Nguyen Xuan Hoang, Nguyen Viet Hoang, Nguyen Huu Du, Truong Thu Huong, Kim Phuc Tran

    Abstract: Industrial Control Systems (ICSs) are becoming more and more important in managing the operation of many important systems in smart manufacturing, such as power stations, water supply systems, and manufacturing sites. While massive digital data can be a driving force for system performance, data security has raised serious concerns. Anomaly detection, therefore, is essential for preventing network… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: Copyright ©~ 2022, IFAC (International Federation of Automatic Control)

  5. Lipschitz continuity of solutions and corresponding multipliers to distributed and boundary semilinear elliptic optimal control problems with mixed pointwise control-state constraints

    Authors: Vu Huu Nhu, Nguyen Quoc Tuan, Nguyen Bang Giang, Nguyen Thi Thu Huong

    Abstract: This paper is concerned with the existence and regularity of mininizers as well as of corresponding multipliers to an optimal control problem governed by semilinear elliptic equations, in which mixed pointwise control-state constraints are considered in a quite general form and the controls act simultaneously in the domain and on the boundary. Under standing assumptions, the minimizers and the cor… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

    MSC Class: 49K20; 35J25

  6. arXiv:2011.14194  [pdf

    cs.CR cs.LG

    LocKedge: Low-Complexity Cyberattack Detection in IoT Edge Computing

    Authors: Truong Thu Huong, Ta Phuong Bac, Dao M. Long, Bui D. Thang, Nguyen T. Binh, Tran D. Luong, Tran Kim Phuc

    Abstract: Internet of Things and its applications are becoming commonplace with more devices, but always at risk of network security. It is therefore crucial for an IoT network design to identify attackers accurately, quickly and promptly. Many solutions have been proposed, mainly concerning secure IoT architectures and classification algorithms, but none of them have paid enough attention to reducing the c… ▽ More

    Submitted 28 November, 2020; originally announced November 2020.

    Comments: 13 pages, 20 figures, submitted to IEEE Access

    MSC Class: 68TXX ACM Class: I.2

  7. arXiv:2008.00491  [pdf, ps, other

    math.OC

    Improperly Efficient Solutions in a Class of Vector Optimization Problems

    Authors: N. T. T. Huong, N. D. Yen

    Abstract: Improperly efficient solutions in the sense of Geoffrion in linear fractional vector optimization problems with unbounded constraint sets are studied in this paper. We give two sets of conditions which assure that all the efficient solutions of a given problem are improperly efficient. We also obtain necessary conditions for an efficient solution to be improperly efficient. As a result, we have ne… ▽ More

    Submitted 2 August, 2020; originally announced August 2020.

  8. Impacts of Retina-related Zones on Quality Perception of Omnidirectional Image

    Authors: Huyen T. T. Tran, Duc V. Nguyen, Nam Pham Ngoc, Trang H. Hoang, Truong Thu Huong, Truong Cong Thang

    Abstract: Virtual Reality (VR), which brings immersive experiences to viewers, has been gaining popularity in recent years. A key feature in VR systems is the use of omnidirectional content, which provides 360-degree views of scenes. In this work, we study the human quality perception of omnidirectional images, focusing on different zones surrounding the foveation point. For that purpose, an extensive subje… ▽ More

    Submitted 17 August, 2019; originally announced August 2019.

    Comments: IEEE Access, 2019

  9. arXiv:1907.11887  [pdf, other

    cs.NI cs.CR cs.LG

    Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework

    Authors: Trung V. Phan, T M Rayhan Gias, Syed Tasnimul Islam, Truong Thu Huong, Nguyen Huu Thanh, Thomas Bauschert

    Abstract: Software Defined Networking (SDN) enables flexible and scalable network control and management. However, it also introduces new vulnerabilities that can be exploited by attackers. In particular, low-rate and slow or stealthy Denial-of-Service (DoS) attacks are recently attracting attention from researchers because of their detection challenges. In this paper, we propose a novel machine learning ba… ▽ More

    Submitted 3 September, 2019; v1 submitted 27 July, 2019; originally announced July 2019.

    Comments: This paper has been accepted for publication in IEEE GLOBECOM conference 2019

  10. arXiv:1412.1184  [pdf, other

    math.CO

    $G$-strongly positive scripts and critical configurations of chip firing games on digraphs

    Authors: Tran Thi Thu Huong

    Abstract: We show a collection of scripts, called $G$-strongly positive scripts, which is used to recognize critical configurations of a chip firing game (CFG) on a multi-digraph with a global sink. To decrease the time of the process of recognition caused by the stabilization we present an algorithm to find the minimum G-strongly positive script. From that we prove the non-stability of configurations obtai… ▽ More

    Submitted 2 December, 2014; originally announced December 2014.

    Comments: 13 pages, 2 figures

  11. arXiv:1307.0811  [pdf

    physics.ins-det

    The basis for design and manufacture of a dsp-based coincidence spectrometer

    Authors: N. X. Hai, P. N. Tuan, N. N. Dien, D. Lanh, T. T. T. Huong, P. N. Son, P. D. Khang

    Abstract: The coincidence technique and the coincidence spectroscopy have been developed and applied for over 40 years. Most of popular coincidence measurement systems were based on analog electronics techniques such as time to amplitude conversion (TAC) or logic selecting coincidence unit. The above-mentioned systems are relatively cumbersome and complicated to use. With the strong growth of digital electr… ▽ More

    Submitted 7 July, 2013; v1 submitted 1 July, 2013; originally announced July 2013.

    Comments: 9 pages, 7 figures. arXiv admin note: substantial text overlap with arXiv:1307.0286

  12. Bilepton contributions to the neutrinoless double beta decay in the economical 3-3-1 model

    Authors: Dang Van Soa, Phung Van Dong, Trinh Thi Huong, Hoang Ngoc Long

    Abstract: Possible contributions of the bilepton to the neutrinoless double beta $(ββ)_{0ν}$ decay in the economical 3-3-1 model are discussed. We show that the $(ββ)_{0ν}$ decay in this model is due to both sources--Majorana $<M_ν>_{L}$ and Dirac $<M_ν>_{D}$ neutrino masses. If the mixing angle between charged gauge bosons, the standard model $W$ and bilepton $Y$, is in range of the ratio of neutrino mas… ▽ More

    Submitted 28 May, 2008; originally announced May 2008.

    Comments: 9 pages, 6 figures

    Journal ref: J.Exp.Theor.Phys.108:757-763,2009

  13. Sfermion masses in the supersymmetric economical 3-3-1 model

    Authors: P. V. Dong, Tr. T. Huong, N. T. Thuy, H. N. Long

    Abstract: Sfermion masses and eigenstates in the supersymmetric economical 3-3-1 model are studied. By lepton number conservation, the exotic squarks and superpartners of ordinary quarks are decoupled. Due to the fact that in the 3-3-1 models, one generation of quarks behaves differently from other two, by R-parity conservation, the mass mixing matrix of the squarks in this model are smaller than that in… ▽ More

    Submitted 14 September, 2007; v1 submitted 23 August, 2007; originally announced August 2007.

    Comments: 34 pages, 2 figures, Revised version in which D-term and F-term contributions are slightly changed

    Journal ref: JHEP 0711:073,2007

  14. arXiv:astro-ph/0611864  [pdf, ps, other

    astro-ph

    Dark Matter on the Smallest Scales

    Authors: E. R. Siegel, G. D'Amico, E. Di Napoli, L. Fu, M. P. Hertzberg, N. T. T. Huong, F. Palorini, A. Sellerholm

    Abstract: This work investigates the dark matters structures that form on the smallest cosmological scales. We find that the types and abundances of structures which form at approximately Earth-mass scales are very sensitive to the nature of dark matter. We explore various candidates for dark matter and determine the corresponding properties of small-scale structure. In particular, we discuss possibilitie… ▽ More

    Submitted 29 November, 2006; originally announced November 2006.

    Comments: 10 Pages, Proceedings from the Dark Matter working group at the 86th Les Houches Summer School: Particle Physics and Cosmology

  15. Fermion masses in the economical 3-3-1 model

    Authors: P. V. Dong, D. T. Huong, Tr. T. Huong, H. N. Long

    Abstract: We show that, in frameworks of the economical 3-3-1 model, all fermions get masses. At the tree level, one up-quark and two down-quarks are massless, but the one-loop corrections give all quarks the consistent masses. This conclusion is in contradiction to the previous analysis in which, the third scalar triplet has been introduced. This result is based on the key properties of the model: First,… ▽ More

    Submitted 26 July, 2006; originally announced July 2006.

    Comments: 20 pages, 8 figures

    Journal ref: Phys.Rev.D74:053003,2006

  16. Quartic Gauge Boson Couplings and Tree Unitarity in the SU(3)_C X SU(3)_L X U(1)_N Models

    Authors: D. T. Binh, D. T. Huong, Tr. T. Huong, H. N. Long, D. V. Soa

    Abstract: The quartic gauge boson couplings in the ${SU(3)}_C \otimes {SU(3)}_L \otimes {U(1)}_N$ models are presented. We find that the couplings of four {\it differrent} gauge bosons may have unusual Lorentz structure and the couplings sastify the tree unitarity requirement at high energy limit.

    Submitted 6 November, 2002; originally announced November 2002.

    Comments: 13 pages, Latex, axodraw.sty

    Journal ref: J.Phys.G29:1213-1226,2003