Skip to main content

Showing 1–4 of 4 results for author: Tran, K T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.10550  [pdf, other

    cs.DC

    Addressing the Scalability Bottleneck of Semantic Technologies at Bosch

    Authors: Diego Rincon-Yanez, Mohamed H. Gad-Elrab, Daria Stepanova, Kien Trung Tran, Cuong Chu Xuan, Baifan Zhou, Evgeny Karlamov

    Abstract: At the heart of smart manufacturing is real-time semi-automatic decision-making. Such decisions are vital for optimizing production lines, e.g., reducing resource consumption, improving the quality of discrete manufacturing operations, and optimizing the actual products, e.g., optimizing the sampling rate for measuring product dimensions during production. Such decision-making relies on massive in… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Journal ref: Industry Track - Extended Semantic Web Conference (ESWC2023)

  2. arXiv:2306.06620  [pdf, other

    cs.SE cs.AI

    ARIST: An Effective API Argument Recommendation Approach

    Authors: Son Nguyen, Cuong Tran Manh, Kien T. Tran, Tan M. Nguyen, Thu-Trang Nguyen, Kien-Tuan Ngo, Hieu Dinh Vo

    Abstract: Learning and remembering to use APIs are difficult. Several techniques have been proposed to assist developers in using APIs. Most existing techniques focus on recommending the right API methods to call, but very few techniques focus on recommending API arguments. In this paper, we propose ARIST, a novel automated argument recommendation approach which suggests arguments by predicting developers'… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

  3. arXiv:1903.10018  [pdf

    cs.CR

    The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach

    Authors: Tran Khanh Dang, Khanh T. K. Tran

    Abstract: Wireless sensor networks consist of a large number of distributed sensor nodes so that potential risks are becoming more and more unpredictable. The new entrants pose the potential risks when they move into the secure zone. To build a door wall that provides safe and secured for the system, many recent research works applied the initial authentication process. However, the majority of the previous… ▽ More

    Submitted 24 March, 2019; originally announced March 2019.

    Comments: 27 pages

    Journal ref: Security and Communication Networks (SCN), Hindawi, 2019

  4. ASMCNN: An Efficient Brain Extraction Using Active Shape Model and Convolutional Neural Networks

    Authors: Duy H. M. Nguyen, Duy M. Nguyen, Mai T. N. Truong, Thu Nguyen, Khanh T. Tran, Nguyen A. Triet, Pham T. Bao, Binh T. Nguyen

    Abstract: Brain extraction (skull strip**) is a challenging problem in neuroimaging. It is due to the variability in conditions from data acquisition or abnormalities in images, making brain morphology and intensity characteristics changeable and complicated. In this paper, we propose an algorithm for skull strip** in Magnetic Resonance Imaging (MRI) scans, namely ASMCNN, by combining the Active Shape M… ▽ More

    Submitted 27 January, 2022; v1 submitted 5 February, 2018; originally announced February 2018.

    Comments: 47 pages, 20 figures

    MSC Class: 68T10