Hà My Trần - Academia.edu (original) (raw)
Papers by Hà My Trần
2022 RIVF International Conference on Computing and Communication Technologies (RIVF)
Advances in Intelligent Systems and Computing, 2018
Reconstructing the surface of a 3D object is an important step in geometric modeling. This paper ... more Reconstructing the surface of a 3D object is an important step in geometric modeling. This paper presents a proposed method for filling the holes on a surface of 3D point clouds based on reverse computation of Bezier curves. The novelty of the method is processed directly on the 3D point clouds consisting of three steps. In the first step, we extract the exterior boundary of the surface. In the second step, we detect the hole boundary and its extended boundary. In the third step, we fill the holes based on the reverse computation of Bezier curves and surface patch to find and insert missing points into the holes. Our method could process very fast comparing to the existing methods, fill all holes on the surface, and obtain a reconstructed surface that is watertight and close to the initial shape of the input surface.
Tạp chí Khoa học Kỹ thuật Mỏ- Địa chất, Dec 1, 2021
The coal production of the longwall-170/-100 m in the seam H10 at the East wing of Mong Duong coa... more The coal production of the longwall-170/-100 m in the seam H10 at the East wing of Mong Duong coal mine has basically reached the designed capacity. Because the mining technology layout of this longwall was designed with only one raise in coal for travel and with one group of workers, this layout cannot fulfil the requirement of increasing production of the mine. The production organization and labour arrangement of the layout face difficulty, cause considerable time for performing a production cycle and constrain productivity. Through a field study at the mine, the authors propose a solution for improvement of mining technology layout of the longwall. That is, another raise in coal and a second group of workers are added to the current layout. The associated production organization chart has been accordingly revised. The calculation results show that the production cycle time is decreased, and the productivity is increased. The research results from the paper are important and necessary for Mong Duong coal mine as they form the basis for increase of coal production and labour productivity at the longwall-170/-130 m.
2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), 2020
Cerebellar ataxia (CA) results from injury to or disease of the cerebellum. It describes the resu... more Cerebellar ataxia (CA) results from injury to or disease of the cerebellum. It describes the resulting motor dysfunction, characterised by inaccuracy, incoordination and delay in initiation of movement, tremor, and imbalance. Assessment of ataxia to diagnose and monitor progress is by clinical observance of the performance of standard motor tasks. An accurate instrumented measurement of CA would therefore be of great interest. This study was aimed at assessing upper-limb ataxia during ballistic tracking of a computer-generated target in individuals with CA and controls using motion measures obtained from a Kinect camera and a wearable motioncaptured device. A set of features derived from these motion measurements were used to develop a method for objective quantification of CA. Difference between ataxic and non-ataxic movements can be readily be observed in features from both devices (p= 0.008) and their values associated with a standard clinical scale (rho = 0.80, p < 0.001). The combination of multimodal features improved the ability to distinguish between CA subjects and controls and to measure the severity of upper limb ataxia.
2018 International Conference on Advanced Computing and Applications (ACOMP), 2018
The development of images processing techniques in recent years brings us a lot of useful applica... more The development of images processing techniques in recent years brings us a lot of useful application in practice. In the field of medical image processing, several researches and their application have been widely applied in practice such as diagnostics, treatment, training and education. This paper presents an improved method for reconstructing the shape of 3D objects from 2D DICOM datasets. We first focus on DICOM data processing based on techniques of digital image processing to get a 3D point cloud. This step includes extracting features, boundary of the shape, removing noisy data and inserting new pixels to obtain a regular dataset on each 2D DICOM slice. In the next step, we reconstruct the 3D object based on triangulation of 3D point clouds. In the last step, we build an application for rendering and visualizing the 3D medical image objects. Comparing to the existing methods, the proposed method is very fast for creating a 3D object from DICOM images. The application can be used to support medical staffs and doctors in diagnostic, treatment and training.
Journal of Information and Telecommunication, 2021
ABSTRACT The strong growth of communication and storage gives rise to the significantly increasin... more ABSTRACT The strong growth of communication and storage gives rise to the significantly increasing demand for collecting, storing, and sharing a large amount of data on networks. This is further enhanced by the data-driven market, where everyone wants to access other parties' data. Data is the bedrock of today's technologies and researchers, especially in machine learning and deep learning. The business value of organizations is also massively data-dependent. Recent studies and industry applications can apply analytic techniques for exploiting data, or Internet users can exchange data on social networks or peer-to-peer (P2P) networks. However, sharing secured data is a challenging problem that attracts much attention from researchers. Sharing secure data with a group of users using P2P applications faces the unavailability problem of peer nodes. Thus users cannot certify and download the protected data. This affects a P2P-based application class of sharing and storing online services or customer-to-customer e-commerce applications. This article proposes a solution for sharing secured data on P2P-based applications using blockchain and attribute-based encryption. The attribute-based encryption guarantees sharing keys among a group of users, while blockchain guarantees keys distribution. We have simulated the proposed solution on the mobile peer-to-peer network that provides services for sharing and storing data securely.
Background Cerebellar ataxia (CA) is a complex motor disorder that exhibits various symptoms such... more Background Cerebellar ataxia (CA) is a complex motor disorder that exhibits various symptoms such as lack of movement accuracy, delayed motion and ataxic movements associated with gait, extremity and eye. Accurate assessment of ataxic movements forms an integral part, not only in the process of diagnosis, but also to monitor the severity of the neurodegenerative progression, particularly in a rehabilitation context. However, the current assessment schemes are mostly based on the subjective observation of experienced clinicians. Capturing the movement during standard upper limb tests using readily available motion sensors, this paper is intended to amalgamate the sensory information to obtain a more accurate and objective form of assessment. Methods An assessment scheme involving an inertial measurement system and a Kinect system was considered to quantify the degree of ataxia in four instrumented version of upper extremities tests, i.e. Finger Chase (FCT), Finger Tapping (FTT), Fing...
International Journal of Synthetic Emotions, 2018
Building 3D objects or reconstructing their surfaces from 3D point cloud data are researched acti... more Building 3D objects or reconstructing their surfaces from 3D point cloud data are researched activities in the field of geometric modeling and computer graphics. In the recent years, they are also studied and used in some fields such as: graph models and simulation; image processing or restoration of digital heritages. This article presents an improved method for restoring the shape of 3D point cloud surfaces. The method is a combination of creating a Bezier surface patch and computing tangent plane of 3D points to fill holes on a surface of 3D point clouds. This method is described as follows: at first, a boundary for each hole on the surface is identified. The holes are then filled by computing Bezier curves of surface patches to find missing points. After that, the holes are refined based on two steps (rough and elaborate) to adjust the inserted points and preserve the local curvature of the holes. The contribution of the proposed method has been shown in processing time and the ...
Lecture Notes in Computer Science, 2016
Monitoring events in communication and computing systems becomes more and more challenging due to... more Monitoring events in communication and computing systems becomes more and more challenging due to the increasing complexity and diversity of these systems. Several supporting tools have been created to assist system administrators in monitoring an enormous number of events daily. The main function of these tools is to filter as many as possible events and present highly suspected events to the administrators for fault analysis, detection and report. While these suspected events appear regularly on large and complex systems, such as cloud computing systems, analyzing them consumes much time and effort. In this study, we propose an approach for evaluating the severity level of events using a classification decision tree. The approach exploits existing fault datasets and features, such as bug reports and log events to construct a decision tree that can be used to classify the severity level of other events. The administrators refer to the result of classification to determine proper actions for the suspected events with a high severity level. We have implemented and experimented the approach for various bug report and log event datasets. The experimental results reveal that the accuracy of classifying severity levels by using the decision trees is above 80%, and some detailed analyses are also provided.
REV Journal on Electronics and Communications, 2016
In the field of traffic monitoring systems, shadows are the main causes of errors in computer vis... more In the field of traffic monitoring systems, shadows are the main causes of errors in computer vision-based vehicle detection and classification. A great number of research have been carried out to detect and remove shadows. However, these research works only focused on solving shadow problems in daytime traffic scenes. Up to now, far too little attention has been paid to the problem caused by vehicles’ reflections in rainy conditions. Unlike shadows in the daytime, which are homogeneous gray shades, reflection shadows are inhomogeneous regions of different colors. This characteristic makes reflections harder to detect and remove. Therefore, in this paper, we aim to develop a reflection detection and removal method from single images or video. Reflections are detected by determining a combination of L and B channels from LAB color space and H channel from HSV color space. The reflection removal method is performed by determining the optimal intensity of reflected areas so that they ...
REV Journal on Electronics and Communications, 2016
This paper presents a social network with a peer-to-peer architecture that facilitates social com... more This paper presents a social network with a peer-to-peer architecture that facilitates social computing services in distributed environments. This social network aims to provide users the capability of managing the dissemination of user data, searching user data on the data silos of the network, and consolidating user data from various social networks. The social network employs a super peer peer-to-peer architecture that contains peers and super peers. Users use peers to participate the network and services. Peers with sufficient storage, bandwidth and processing power become super peers that support peers for complex operations such as user authentication or group communication. We have extended the Gnutella protocol to provide the authentication and posting services on the social network. The design of these services copes with the distributed setting of the social network. The evaluation of the prototyping social network has performed on a number of laboratory workstations to in...
2015 International Conference on Advanced Computing and Applications (ACOMP), 2015
Processing surfaces with data coming from an automatic acquisition technique always generates the... more Processing surfaces with data coming from an automatic acquisition technique always generates the problem of unorganized 3D point sets or presence of geometric deficiencies (i.e. in some regions of the surface, the obtained data points are sparse or without containing any points). It leads to what we call "holes", and a mandatory surface reconstruction process. Applying the process to the whole set of 3D points in order to explore and detect all these holes that can be served to process in a further step. In this paper, we propose a method to detect the hole-boundary on a surface of 3D point clouds structured in a 3D volume. The method consists of two steps. In the first step, we extract the exterior boundary of the surface based on the neighborhood relationship between the 3D points and our particular definition of these points. In the second step, we detect the hole boundary by using a growth function on the interior boundary of the surface. Our method could process very fast and extract exactly the boundary of all holes on the surface.
2015 International Conference on Advanced Computing and Applications (ACOMP), 2015
Software defined network separates data and control planes that facilitate network management fun... more Software defined network separates data and control planes that facilitate network management functions, especially enabling programmable network control functions. Event monitoring is a fault management function involved in collecting and filtering event notification messages from network devices. This study presents an approach of distributed event monitoring for software defined network. Monitoring events usually deals with a large amount of event log data, log collecting and filtering processes thus require a high degree of automation and efficiency. This approach takes advantage of the OpenFlow and syslog protocols to collect and store log events obtained from network devices on a syslog server. It also uses the adaptive semantic filtering method to filter and present non-trivial events for system administrators to take further actions. We have evaluated this approach on a network simulation platform and provided some log collection and filtering results with analysis.
2013 Third World Congress on Information and Communication Technologies (WICT 2013), 2013
ABSTRACT
2013 Third World Congress on Information and Communication Technologies (WICT 2013), 2013
Optical flow is the pattern that represents the motion of objects, edges, surfaces in real world ... more Optical flow is the pattern that represents the motion of objects, edges, surfaces in real world by using displacement vectors or color flow. Application of optical flow is used in variant problems, especially in traffic monitoring system. The result of optical flow estimation can be used for traffic control, anomaly events detection, vehicle tracking and classification. In this paper, an approach that combines Brox's optical flow algorithm and background subtraction with a new method to improve the optical flow in the traffic monitoring system is presented. Our approach has demonstrated more accurate results than previous approaches.
Lecture Notes in Computer Science, 2008
Highly available and resilient networks play a decisive role in today's networked world. As netwo... more Highly available and resilient networks play a decisive role in today's networked world. As network faults are inevitable and networks are becoming constantly intricate, finding effective fault recovery solutions in a timely manner is becoming a challenging task for administrators. Therefore, an automated mechanism to support fault resolution is essential towards efficient fault handling process. In this paper we propose an architecture to support automated fault recovery in terms of traffic engineering, recovery knowledge discovery and automated recovery planning. We base our discussion on an application scenario for recovery from border router failure to maintain optimized configuration of outbound inter-domain traffic.
2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
DisCaRia is a distributed case-based reasoning system used for fault resolution. This system feat... more DisCaRia is a distributed case-based reasoning system used for fault resolution. This system features peer-to-peer and case-based reasoning approaches that provide the capability of exploring various fault data sources and exploiting fault solving knowledge from these distributed sources. This paper focuses on the prototype implementation and the performance evaluation of DisCaRia. The prototype system has been deployed on a distributed computing and storage testbed called EmanicsLab. This paper describes the results obtained from experiments performed on various software bug datasets.
IP Operations and Management, 2009
The NETCONF protocol provides sound mechanisms for configuring network devices. While support for... more The NETCONF protocol provides sound mechanisms for configuring network devices. While support for the protocol has been implemented by several network device vendors, there is a lack of supporting tools and libraries for NETCONF client applications. This paper presents NCClient, an open source Python library providing features and facilities for scripting and application development. The architecture, design and interoperability testing of the library is described and some examples of its usage are provided.
Lecture Notes in Computer Science
Lecture Notes in Computer Science, 2007
Our research aims to assist operators in finding solutions for faults using distributed case-base... more Our research aims to assist operators in finding solutions for faults using distributed case-based reasoning. One key operation of the distributed case-based reasoning system is to retrieve similar faults and solutions from various online knowledge sources. In this paper, we propose a multi-vector representation method which employs various semantic and feature vectors to exploit the characteristics of faults described in semi-structured data. Experiments show that this method performs well in fault retrieval.
2022 RIVF International Conference on Computing and Communication Technologies (RIVF)
Advances in Intelligent Systems and Computing, 2018
Reconstructing the surface of a 3D object is an important step in geometric modeling. This paper ... more Reconstructing the surface of a 3D object is an important step in geometric modeling. This paper presents a proposed method for filling the holes on a surface of 3D point clouds based on reverse computation of Bezier curves. The novelty of the method is processed directly on the 3D point clouds consisting of three steps. In the first step, we extract the exterior boundary of the surface. In the second step, we detect the hole boundary and its extended boundary. In the third step, we fill the holes based on the reverse computation of Bezier curves and surface patch to find and insert missing points into the holes. Our method could process very fast comparing to the existing methods, fill all holes on the surface, and obtain a reconstructed surface that is watertight and close to the initial shape of the input surface.
Tạp chí Khoa học Kỹ thuật Mỏ- Địa chất, Dec 1, 2021
The coal production of the longwall-170/-100 m in the seam H10 at the East wing of Mong Duong coa... more The coal production of the longwall-170/-100 m in the seam H10 at the East wing of Mong Duong coal mine has basically reached the designed capacity. Because the mining technology layout of this longwall was designed with only one raise in coal for travel and with one group of workers, this layout cannot fulfil the requirement of increasing production of the mine. The production organization and labour arrangement of the layout face difficulty, cause considerable time for performing a production cycle and constrain productivity. Through a field study at the mine, the authors propose a solution for improvement of mining technology layout of the longwall. That is, another raise in coal and a second group of workers are added to the current layout. The associated production organization chart has been accordingly revised. The calculation results show that the production cycle time is decreased, and the productivity is increased. The research results from the paper are important and necessary for Mong Duong coal mine as they form the basis for increase of coal production and labour productivity at the longwall-170/-130 m.
2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), 2020
Cerebellar ataxia (CA) results from injury to or disease of the cerebellum. It describes the resu... more Cerebellar ataxia (CA) results from injury to or disease of the cerebellum. It describes the resulting motor dysfunction, characterised by inaccuracy, incoordination and delay in initiation of movement, tremor, and imbalance. Assessment of ataxia to diagnose and monitor progress is by clinical observance of the performance of standard motor tasks. An accurate instrumented measurement of CA would therefore be of great interest. This study was aimed at assessing upper-limb ataxia during ballistic tracking of a computer-generated target in individuals with CA and controls using motion measures obtained from a Kinect camera and a wearable motioncaptured device. A set of features derived from these motion measurements were used to develop a method for objective quantification of CA. Difference between ataxic and non-ataxic movements can be readily be observed in features from both devices (p= 0.008) and their values associated with a standard clinical scale (rho = 0.80, p < 0.001). The combination of multimodal features improved the ability to distinguish between CA subjects and controls and to measure the severity of upper limb ataxia.
2018 International Conference on Advanced Computing and Applications (ACOMP), 2018
The development of images processing techniques in recent years brings us a lot of useful applica... more The development of images processing techniques in recent years brings us a lot of useful application in practice. In the field of medical image processing, several researches and their application have been widely applied in practice such as diagnostics, treatment, training and education. This paper presents an improved method for reconstructing the shape of 3D objects from 2D DICOM datasets. We first focus on DICOM data processing based on techniques of digital image processing to get a 3D point cloud. This step includes extracting features, boundary of the shape, removing noisy data and inserting new pixels to obtain a regular dataset on each 2D DICOM slice. In the next step, we reconstruct the 3D object based on triangulation of 3D point clouds. In the last step, we build an application for rendering and visualizing the 3D medical image objects. Comparing to the existing methods, the proposed method is very fast for creating a 3D object from DICOM images. The application can be used to support medical staffs and doctors in diagnostic, treatment and training.
Journal of Information and Telecommunication, 2021
ABSTRACT The strong growth of communication and storage gives rise to the significantly increasin... more ABSTRACT The strong growth of communication and storage gives rise to the significantly increasing demand for collecting, storing, and sharing a large amount of data on networks. This is further enhanced by the data-driven market, where everyone wants to access other parties' data. Data is the bedrock of today's technologies and researchers, especially in machine learning and deep learning. The business value of organizations is also massively data-dependent. Recent studies and industry applications can apply analytic techniques for exploiting data, or Internet users can exchange data on social networks or peer-to-peer (P2P) networks. However, sharing secured data is a challenging problem that attracts much attention from researchers. Sharing secure data with a group of users using P2P applications faces the unavailability problem of peer nodes. Thus users cannot certify and download the protected data. This affects a P2P-based application class of sharing and storing online services or customer-to-customer e-commerce applications. This article proposes a solution for sharing secured data on P2P-based applications using blockchain and attribute-based encryption. The attribute-based encryption guarantees sharing keys among a group of users, while blockchain guarantees keys distribution. We have simulated the proposed solution on the mobile peer-to-peer network that provides services for sharing and storing data securely.
Background Cerebellar ataxia (CA) is a complex motor disorder that exhibits various symptoms such... more Background Cerebellar ataxia (CA) is a complex motor disorder that exhibits various symptoms such as lack of movement accuracy, delayed motion and ataxic movements associated with gait, extremity and eye. Accurate assessment of ataxic movements forms an integral part, not only in the process of diagnosis, but also to monitor the severity of the neurodegenerative progression, particularly in a rehabilitation context. However, the current assessment schemes are mostly based on the subjective observation of experienced clinicians. Capturing the movement during standard upper limb tests using readily available motion sensors, this paper is intended to amalgamate the sensory information to obtain a more accurate and objective form of assessment. Methods An assessment scheme involving an inertial measurement system and a Kinect system was considered to quantify the degree of ataxia in four instrumented version of upper extremities tests, i.e. Finger Chase (FCT), Finger Tapping (FTT), Fing...
International Journal of Synthetic Emotions, 2018
Building 3D objects or reconstructing their surfaces from 3D point cloud data are researched acti... more Building 3D objects or reconstructing their surfaces from 3D point cloud data are researched activities in the field of geometric modeling and computer graphics. In the recent years, they are also studied and used in some fields such as: graph models and simulation; image processing or restoration of digital heritages. This article presents an improved method for restoring the shape of 3D point cloud surfaces. The method is a combination of creating a Bezier surface patch and computing tangent plane of 3D points to fill holes on a surface of 3D point clouds. This method is described as follows: at first, a boundary for each hole on the surface is identified. The holes are then filled by computing Bezier curves of surface patches to find missing points. After that, the holes are refined based on two steps (rough and elaborate) to adjust the inserted points and preserve the local curvature of the holes. The contribution of the proposed method has been shown in processing time and the ...
Lecture Notes in Computer Science, 2016
Monitoring events in communication and computing systems becomes more and more challenging due to... more Monitoring events in communication and computing systems becomes more and more challenging due to the increasing complexity and diversity of these systems. Several supporting tools have been created to assist system administrators in monitoring an enormous number of events daily. The main function of these tools is to filter as many as possible events and present highly suspected events to the administrators for fault analysis, detection and report. While these suspected events appear regularly on large and complex systems, such as cloud computing systems, analyzing them consumes much time and effort. In this study, we propose an approach for evaluating the severity level of events using a classification decision tree. The approach exploits existing fault datasets and features, such as bug reports and log events to construct a decision tree that can be used to classify the severity level of other events. The administrators refer to the result of classification to determine proper actions for the suspected events with a high severity level. We have implemented and experimented the approach for various bug report and log event datasets. The experimental results reveal that the accuracy of classifying severity levels by using the decision trees is above 80%, and some detailed analyses are also provided.
REV Journal on Electronics and Communications, 2016
In the field of traffic monitoring systems, shadows are the main causes of errors in computer vis... more In the field of traffic monitoring systems, shadows are the main causes of errors in computer vision-based vehicle detection and classification. A great number of research have been carried out to detect and remove shadows. However, these research works only focused on solving shadow problems in daytime traffic scenes. Up to now, far too little attention has been paid to the problem caused by vehicles’ reflections in rainy conditions. Unlike shadows in the daytime, which are homogeneous gray shades, reflection shadows are inhomogeneous regions of different colors. This characteristic makes reflections harder to detect and remove. Therefore, in this paper, we aim to develop a reflection detection and removal method from single images or video. Reflections are detected by determining a combination of L and B channels from LAB color space and H channel from HSV color space. The reflection removal method is performed by determining the optimal intensity of reflected areas so that they ...
REV Journal on Electronics and Communications, 2016
This paper presents a social network with a peer-to-peer architecture that facilitates social com... more This paper presents a social network with a peer-to-peer architecture that facilitates social computing services in distributed environments. This social network aims to provide users the capability of managing the dissemination of user data, searching user data on the data silos of the network, and consolidating user data from various social networks. The social network employs a super peer peer-to-peer architecture that contains peers and super peers. Users use peers to participate the network and services. Peers with sufficient storage, bandwidth and processing power become super peers that support peers for complex operations such as user authentication or group communication. We have extended the Gnutella protocol to provide the authentication and posting services on the social network. The design of these services copes with the distributed setting of the social network. The evaluation of the prototyping social network has performed on a number of laboratory workstations to in...
2015 International Conference on Advanced Computing and Applications (ACOMP), 2015
Processing surfaces with data coming from an automatic acquisition technique always generates the... more Processing surfaces with data coming from an automatic acquisition technique always generates the problem of unorganized 3D point sets or presence of geometric deficiencies (i.e. in some regions of the surface, the obtained data points are sparse or without containing any points). It leads to what we call "holes", and a mandatory surface reconstruction process. Applying the process to the whole set of 3D points in order to explore and detect all these holes that can be served to process in a further step. In this paper, we propose a method to detect the hole-boundary on a surface of 3D point clouds structured in a 3D volume. The method consists of two steps. In the first step, we extract the exterior boundary of the surface based on the neighborhood relationship between the 3D points and our particular definition of these points. In the second step, we detect the hole boundary by using a growth function on the interior boundary of the surface. Our method could process very fast and extract exactly the boundary of all holes on the surface.
2015 International Conference on Advanced Computing and Applications (ACOMP), 2015
Software defined network separates data and control planes that facilitate network management fun... more Software defined network separates data and control planes that facilitate network management functions, especially enabling programmable network control functions. Event monitoring is a fault management function involved in collecting and filtering event notification messages from network devices. This study presents an approach of distributed event monitoring for software defined network. Monitoring events usually deals with a large amount of event log data, log collecting and filtering processes thus require a high degree of automation and efficiency. This approach takes advantage of the OpenFlow and syslog protocols to collect and store log events obtained from network devices on a syslog server. It also uses the adaptive semantic filtering method to filter and present non-trivial events for system administrators to take further actions. We have evaluated this approach on a network simulation platform and provided some log collection and filtering results with analysis.
2013 Third World Congress on Information and Communication Technologies (WICT 2013), 2013
ABSTRACT
2013 Third World Congress on Information and Communication Technologies (WICT 2013), 2013
Optical flow is the pattern that represents the motion of objects, edges, surfaces in real world ... more Optical flow is the pattern that represents the motion of objects, edges, surfaces in real world by using displacement vectors or color flow. Application of optical flow is used in variant problems, especially in traffic monitoring system. The result of optical flow estimation can be used for traffic control, anomaly events detection, vehicle tracking and classification. In this paper, an approach that combines Brox's optical flow algorithm and background subtraction with a new method to improve the optical flow in the traffic monitoring system is presented. Our approach has demonstrated more accurate results than previous approaches.
Lecture Notes in Computer Science, 2008
Highly available and resilient networks play a decisive role in today's networked world. As netwo... more Highly available and resilient networks play a decisive role in today's networked world. As network faults are inevitable and networks are becoming constantly intricate, finding effective fault recovery solutions in a timely manner is becoming a challenging task for administrators. Therefore, an automated mechanism to support fault resolution is essential towards efficient fault handling process. In this paper we propose an architecture to support automated fault recovery in terms of traffic engineering, recovery knowledge discovery and automated recovery planning. We base our discussion on an application scenario for recovery from border router failure to maintain optimized configuration of outbound inter-domain traffic.
2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
DisCaRia is a distributed case-based reasoning system used for fault resolution. This system feat... more DisCaRia is a distributed case-based reasoning system used for fault resolution. This system features peer-to-peer and case-based reasoning approaches that provide the capability of exploring various fault data sources and exploiting fault solving knowledge from these distributed sources. This paper focuses on the prototype implementation and the performance evaluation of DisCaRia. The prototype system has been deployed on a distributed computing and storage testbed called EmanicsLab. This paper describes the results obtained from experiments performed on various software bug datasets.
IP Operations and Management, 2009
The NETCONF protocol provides sound mechanisms for configuring network devices. While support for... more The NETCONF protocol provides sound mechanisms for configuring network devices. While support for the protocol has been implemented by several network device vendors, there is a lack of supporting tools and libraries for NETCONF client applications. This paper presents NCClient, an open source Python library providing features and facilities for scripting and application development. The architecture, design and interoperability testing of the library is described and some examples of its usage are provided.
Lecture Notes in Computer Science
Lecture Notes in Computer Science, 2007
Our research aims to assist operators in finding solutions for faults using distributed case-base... more Our research aims to assist operators in finding solutions for faults using distributed case-based reasoning. One key operation of the distributed case-based reasoning system is to retrieve similar faults and solutions from various online knowledge sources. In this paper, we propose a multi-vector representation method which employs various semantic and feature vectors to exploit the characteristics of faults described in semi-structured data. Experiments show that this method performs well in fault retrieval.