Skip to main content

Showing 1–13 of 13 results for author: Nguyen, L N

.
  1. arXiv:2404.09012  [pdf, other

    physics.acc-ph

    Impact of bunch intensity asymmetry in colliders featuring strong beamstrahlung

    Authors: Khoi Le Nguyen Nguyen, Xavier Buffat, Peter Kicsiny, Tatiana Pieloni

    Abstract: An analytical investigation of beamstrahlung-induced blow-up in Gaussian beams with arbitrary dimensions is presented, using various approximations for the strength of the hourglass effect and crab waist scheme. The results, applied to the FCC-ee resonances, are compared with simulations and previous calculations, and relative luminosity values are also calculated. The stability of resultant confo… ▽ More

    Submitted 13 April, 2024; originally announced April 2024.

    Comments: 25 pages, 13 figures

  2. arXiv:2403.10611  [pdf, ps, other

    hep-th hep-ph

    Two-dimensional gauge anomalies and $p$-adic numbers

    Authors: Imogen Camp, Ben Gripaios, Khoi Le Nguyen Nguyen

    Abstract: We show how methods of number theory can be used to study anomalies in gauge quantum field theories in spacetime dimension two. To wit, the anomaly cancellation conditions for the abelian part of the local anomaly admit solutions if and only if they admit solutions in the reals and in the $p$-adics for every prime $p$ and we use this to build an algorithm to find all solutions.

    Submitted 30 May, 2024; v1 submitted 15 March, 2024; originally announced March 2024.

    Comments: 5 pp

  3. arXiv:2401.05538  [pdf, other

    cs.LG

    Multi-objective Feature Selection in Remote Health Monitoring Applications

    Authors: Le Ngu Nguyen, Constantino Álvarez Casado, Manuel Lage Cañellas, Anirban Mukherjee, Nhi Nguyen, Dinesh Babu Jayagopi, Miguel Bordallo López

    Abstract: Radio frequency (RF) signals have facilitated the development of non-contact human monitoring tasks, such as vital signs measurement, activity recognition, and user identification. In some specific scenarios, an RF signal analysis framework may prioritize the performance of one task over that of others. In response to this requirement, we employ a multi-objective optimization approach inspired by… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

    Comments: Under review

  4. arXiv:2312.07601  [pdf, other

    eess.SP cs.LG

    Non-contact Multimodal Indoor Human Monitoring Systems: A Survey

    Authors: Le Ngu Nguyen, Praneeth Susarla, Anirban Mukherjee, Manuel Lage Cañellas, Constantino Álvarez Casado, Xiaoting Wu, Olli~Silvén, Dinesh Babu Jayagopi, Miguel Bordallo López

    Abstract: Indoor human monitoring systems leverage a wide range of sensors, including cameras, radio devices, and inertial measurement units, to collect extensive data from users and the environment. These sensors contribute diverse data modalities, such as video feeds from cameras, received signal strength indicators and channel state information from WiFi devices, and three-axis acceleration data from ine… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 19 pages, 5 figures

  5. arXiv:2306.04559  [pdf

    cond-mat.supr-con physics.app-ph

    Understanding and minimizing ac losses in CORC cables of YBCO superconducting tapes

    Authors: Linh N. Nguyen, Nathaniel Shields, Stephen Ashworth, Doan N. Nguyen

    Abstract: AC losses in conductor-on-rounded-core (CORC) cables of YBCO high-temperature superconducting (HTS) tapes are a significant challenge in HTS power applications. This study employs two finite element analysis (FEA) models to investigate the contributions from different AC loss components and provide approaches for reducing AC losses in cables. An FEA model based on T-A formula treats the cross-sect… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

  6. arXiv:2204.13832  [pdf, ps, other

    cs.DS

    Efficient Algorithms for Monotone Non-Submodular Maximization with Partition Matroid Constraint

    Authors: Lan N. Nguyen, My T. Thai

    Abstract: In this work, we study the problem of monotone non-submodular maximization with partition matroid constraint. Although a generalization of this problem has been studied in literature, our work focuses on leveraging properties of partition matroid constraint to (1) propose algorithms with theoretical bound and efficient query complexity; and (2) provide better analysis on theoretical performance gu… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.

  7. arXiv:2012.07936  [pdf, other

    cs.DS

    Minimum Robust Multi-Submodular Cover for Fairness

    Authors: Lan N. Nguyen, My T. Thai

    Abstract: In this paper, we study a novel problem, Minimum Robust Multi-Submodular Cover for Fairness (MinRF), as follows: given a ground set $V$; $m$ monotone submodular functions $f_1,...,f_m$; $m$ thresholds $T_1,...,T_m$ and a non-negative integer $r$, MinRF asks for the smallest set $S$ such that for all $i \in [m]$, $\min_{|X| \leq r} f_i(S \setminus X) \geq T_i$. We prove that MinRF is inapproximable… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

  8. arXiv:2009.09955  [pdf, other

    cs.DS

    Length-Bounded Paths Interdiction in Continuous Domain for Network Performance Assessment

    Authors: Lan N. Nguyen, My T. Thai

    Abstract: Studying on networked systems, in which a communication between nodes is functional if their distance under a given metric is lower than a pre-defined threshold, has received significant attention recently. In this work, we propose a metric to measure network resilience on guaranteeing the pre-defined performance constraint. This metric is investigated under an optimization problem, namely \textbf… ▽ More

    Submitted 18 September, 2020; originally announced September 2020.

  9. OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding

    Authors: Lan N. Nguyen, Truc Nguyen, Thang N. Dinh, My T. Thai

    Abstract: A major challenge in blockchain sharding protocols is that more than 95% transactions are cross-shard. Not only those cross-shard transactions degrade the system throughput but also double the confirmation time, and exhaust an already scarce network bandwidth. Are cross-shard transactions imminent for sharding schemes? In this paper, we propose a new sharding paradigm, called OptChain, in which cr… ▽ More

    Submitted 18 October, 2021; v1 submitted 16 July, 2020; originally announced July 2020.

  10. Threat from being Social: Vulnerability Analysis of Social Network Coupled Smart Grid

    Authors: Tianyi Pan, Subhankar Mishra, Lan N. Nguyen, Gunhee Lee, Jungmin Kang, Jungtaek Seo, My T. Thai

    Abstract: Social Networks (SNs) have been gradually applied by utility companies as an addition to smart grid and are proved to be helpful in smoothing load curves and reducing energy usage. However, SNs also bring in new threats to smart grid: misinformation in SNs may cause smart grid users to alter their demand, resulting in transmission line overloading and in turn leading to catastrophic impact to the… ▽ More

    Submitted 15 May, 2020; originally announced May 2020.

    Comments: 16 pages

    Journal ref: IEEE Access 5 (2017): 16774-16783

  11. arXiv:1902.01701  [pdf, other

    cs.DS cs.PF

    Network Resilience Assessment via QoS Degradation Metrics: An Algorithmic Approach

    Authors: Lan N. Nguyen, My T. Thai

    Abstract: This paper focuses on network resilience to perturbation of edge weight. Other than connectivity, many network applications nowadays rely upon some measure of network distance between a pair of connected nodes. In these systems, a metric related to network functionality is associated to each edge. A pair of nodes only being functional if the weighted, shortest-path distance between the pair is bel… ▽ More

    Submitted 5 February, 2019; originally announced February 2019.

  12. arXiv:1612.06209  [pdf, other

    cs.CR cs.CY cs.HC

    Personalized Image-based User Authentication using Wearable Cameras

    Authors: Le Ngu Nguyen, Stephan Sigg

    Abstract: Personal devices (e.g. laptops, tablets, and mobile phones) are conventional in daily life and have the ability to store users' private data. The security problems related to these appliances have become a primary concern for both users and researchers. In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provi… ▽ More

    Submitted 29 March, 2017; v1 submitted 19 December, 2016; originally announced December 2016.

  13. arXiv:1612.03078  [pdf, ps, other

    math.PR

    A Mecke-type formula and Markov properties for STIT tessellation processes

    Authors: Werner Nagel, Linh Ngoc Nguyen, Christoph Thaele, Viola Weiss

    Abstract: An analogue of the classical Mecke formula for Poisson point processes is proved for the class of space-time STIT tessellation processes. From this key identity the Markov property of a class of associated random processes is derived. This in turn is used to determine the distribution of the number of internal vertices of the typical maximal tessellation segment.

    Submitted 13 December, 2016; v1 submitted 9 December, 2016; originally announced December 2016.

    MSC Class: 60D05; 60G55; 60J75

    Journal ref: ALEA 14, 691-718 (2017)