Phan Cong Vinh | Nguyen Tat Thanh University (original) (raw)
Papers by Phan Cong Vinh
Journal on special topics in mobile networks and applications/Mobile networks and applications, Apr 24, 2024
EAI endorsed transactions on context-aware systems and applications, Jul 14, 2021
EAI endorsed transactions on context-aware systems and applications, Dec 16, 2014
On behalf of the Editorial board, we welcome you to the fourth issue of the ICST Transactions on ... more On behalf of the Editorial board, we welcome you to the fourth issue of the ICST Transactions on Context-Aware Systems and Applications. In this issue, we present four selected papers that span various aspects of context-aware systems and applications, and an introduction to the book titled "Nature of Computation and Communication". This issue will serve as a reference material for researchers, scientists, professionals and students in computer science and computer engineering as well as developers and practitioners in computing and networking systems design by providing them with state-of-the-art research findings and future opportunities and trends. These papers include some recent advances in context-awareness reflected in this issue. In particular, the issue covers various themes of context-awareness as follows: Paper 1 by N. Khabou, I. B. Rodriguez and M. Jmaiel reports that the increase of mobile and interconnected devices leads to the growth of demands for context aware applications. These applications deployed on top of pervasive environments must adapt themselves to context changes. Context aware applications have to continuously sense their physical environment, and adapt their behavior accordingly. These applications must perform four phases starting by collecting and monitoring context, then analyzing context, deciding adaptation actions and finally executing the planned adaptation actions to deal with the context changes. In this paper, authors focus on the second phase. Authors propose a context analysis approach that relies on different thresholds defined according to the user needs to detect context changes and raise notifications when changes occur. The analysis approach is performed according to three different steps. A context storage
International Journal for Numerical Methods in Biomedical Engineering, 2010
Analytical solutions to 2D depth-averaged (external mode) and fully 3D (internal mode) periodic f... more Analytical solutions to 2D depth-averaged (external mode) and fully 3D (internal mode) periodic flows for numerical model testing are presented in this paper. These solutions take into account the effects of the bottom friction, the horizontal turbulent viscosity, and the vertical turbulent viscosity for the case of 3D flow. The key linkage for the modes is the relationship between the bottom friction coefficients in the 2D and 3D solutions. In the analytical solutions, two parameters are introduced concerning the periodic flows studied, namely, the rate of the horizontal turbulent viscosity and a dimensionless number given by the ratio of this rate to the wave celerity. The effects of the horizontal turbulent viscosity on the wave amplitude and the phase are significant if the square of this number is not much smaller than one. Three cases for numerical model testing are developed according to three different chosen values of the complex wave number. Various results illustrating the solutions to these test cases are also presented.
Internet of things, Jul 1, 2023
Mobile Networks and Applications, Aug 2, 2023
Lecture Notes in Computer Science, Dec 30, 2018
The rapidly growth urbanization and using high-intensity land in urban areas recently are hot top... more The rapidly growth urbanization and using high-intensity land in urban areas recently are hot topics interested in researchers of 2-3-4D GIS (2-dimensional, 3-dimensional, and 4-dimensional geographic information system) more and more by the shapes of high-rise buildings (buildings) of diversity and abundance located on limited land funds. This problem is a big challenge for researchers of 2-3-4D GIS, how they can visually represent it into the 2D computer screen. This paper proposes to build space-data storage structures and to develop 3D space data interpolation algorithms (IA and NCA) for visual representation of buildings located on limited land funds in 3D geographical scientific space. This paper also presents experiments by these 3D bodies to represent visualization of buildings. Through these experimental results show able to support the authorities apply for management stages of urban techniques infrastructures in the near future.
Internet of things, Oct 1, 2023
Springer eBooks, Jan 23, 2015
This book constitutes the thoroughly refereed post-conference proceedings of the International Co... more This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Nature of Computation and Communication, ICTCC 2014, held in November 2014 in Ho Chi Minh City, Vietnam. The 34 revised full papers presented were carefully reviewed and selected from over 100 submissions. The papers cover formal methods for self-adaptive systems and discuss natural approaches and techniques for computation and communication.
Concurrency and Computation: Practice and Experience, May 21, 2019
Software Defined Networking (SDN) with multiple controllers draws more attention for the increasi... more Software Defined Networking (SDN) with multiple controllers draws more attention for the increasing scale of the network. Multi-controller architectures can handle what SDN with single controller is not able to address. In order to understand what these architectures can accomplish and face precisely, we analyze them with formal methods. In this paper, we apply Communicating Sequential Processes (CSP) to model the routing service of SDN under multi-controller architectures, in particular the HyperFlow architecture and the Kandoo architecture based on OpenFlow protocol. By using model checker Process Analysis Toolkit (PAT), we verify that the models satisfy three properties, namely deadlock freeness, consistency, and fault tolerance. In addition, for studying the security of those models, some extension is added. We find that the extended models are capable of coping with Denial of Service and may suffer from Information Disclosure. Moreover, a fake path and a tampered message could be present in SDN.
Lecture Notes in Computer Science, 2012
Data management in data aware self-organizing networks (DASNs) such as wireless sensor networks (... more Data management in data aware self-organizing networks (DASNs) such as wireless sensor networks (WSNs), mobile ad hoc networks (MANETs) and so on, whose fundamental paradigm is data aware computing, is currently on the spot as one of the priority research areas and research activities are booming recently. At a borderline of changing DASN configuration, data evolve over time. Thus investigating data awareness emerges as a need, on the one hand, for managing data in DASNs, but on the other hand, for modeling, specifying, programming, and verifying DASNs. Moreover, a well-established foundation of data aware computing in such self-organizing networks becomes a requirement. Hence in this paper, we first construct algebraic models for DASNs. Second, algebraic model of data streams is developed and quantitative behaviors for data streams in DASNs are computed. Third, using algebraic models for DASNs we form monoids of data aware self-organizations and shape streams of data aware self-organizations. Finally, a category of data aware self-organizations monoids is established and streams of data aware self-organizations monoids are considered.
Tạp chí Khoa học Đại học Huế: Kỹ thuật Công nghệ, Jul 16, 2019
In this paper, we study fuzzy graph rewriting with automaton and regular expression. We use hedge... more In this paper, we study fuzzy graph rewriting with automaton and regular expression. We use hedge algebra and linguistic variables for modeling and reasoning with words. We figure out theorem of limiting in state space. We also prove that both regular language generated from fuzzy grammar and fuzzy automata are the same.
Internet of things, Oct 1, 2023
EAI endorsed transactions on context-aware systems and applications, Aug 4, 2015
On behalf of the Editorial board, we welcome you to the fourth issue of the ICST Transactions on ... more On behalf of the Editorial board, we welcome you to the fourth issue of the ICST Transactions on Context-Aware Systems and Applications. In this issue, we present four selected papers that span various aspects of context-aware systems and applications, and an introduction to the book titled "Nature of Computation and Communication". This issue will serve as a reference material for researchers, scientists, professionals and students in computer science and computer engineering as well as developers and practitioners in computing and networking systems design by providing them with state-of-the-art research findings and future opportunities and trends. These papers include some recent advances in context-awareness reflected in this issue. In particular, the issue covers various themes of context-awareness as follows: Paper 1 by N. Khabou, I. B. Rodriguez and M. Jmaiel reports that the increase of mobile and interconnected devices leads to the growth of demands for context aware applications. These applications deployed on top of pervasive environments must adapt themselves to context changes. Context aware applications have to continuously sense their physical environment, and adapt their behavior accordingly. These applications must perform four phases starting by collecting and monitoring context, then analyzing context, deciding adaptation actions and finally executing the planned adaptation actions to deal with the context changes. In this paper, authors focus on the second phase. Authors propose a context analysis approach that relies on different thresholds defined according to the user needs to detect context changes and raise notifications when changes occur. The analysis approach is performed according to three different steps. A context storage
EAI endorsed transactions on context-aware systems and applications, Dec 23, 2020
Journal on special topics in mobile networks and applications/Mobile networks and applications, Apr 24, 2024
EAI endorsed transactions on context-aware systems and applications, Jul 14, 2021
EAI endorsed transactions on context-aware systems and applications, Dec 16, 2014
On behalf of the Editorial board, we welcome you to the fourth issue of the ICST Transactions on ... more On behalf of the Editorial board, we welcome you to the fourth issue of the ICST Transactions on Context-Aware Systems and Applications. In this issue, we present four selected papers that span various aspects of context-aware systems and applications, and an introduction to the book titled "Nature of Computation and Communication". This issue will serve as a reference material for researchers, scientists, professionals and students in computer science and computer engineering as well as developers and practitioners in computing and networking systems design by providing them with state-of-the-art research findings and future opportunities and trends. These papers include some recent advances in context-awareness reflected in this issue. In particular, the issue covers various themes of context-awareness as follows: Paper 1 by N. Khabou, I. B. Rodriguez and M. Jmaiel reports that the increase of mobile and interconnected devices leads to the growth of demands for context aware applications. These applications deployed on top of pervasive environments must adapt themselves to context changes. Context aware applications have to continuously sense their physical environment, and adapt their behavior accordingly. These applications must perform four phases starting by collecting and monitoring context, then analyzing context, deciding adaptation actions and finally executing the planned adaptation actions to deal with the context changes. In this paper, authors focus on the second phase. Authors propose a context analysis approach that relies on different thresholds defined according to the user needs to detect context changes and raise notifications when changes occur. The analysis approach is performed according to three different steps. A context storage
International Journal for Numerical Methods in Biomedical Engineering, 2010
Analytical solutions to 2D depth-averaged (external mode) and fully 3D (internal mode) periodic f... more Analytical solutions to 2D depth-averaged (external mode) and fully 3D (internal mode) periodic flows for numerical model testing are presented in this paper. These solutions take into account the effects of the bottom friction, the horizontal turbulent viscosity, and the vertical turbulent viscosity for the case of 3D flow. The key linkage for the modes is the relationship between the bottom friction coefficients in the 2D and 3D solutions. In the analytical solutions, two parameters are introduced concerning the periodic flows studied, namely, the rate of the horizontal turbulent viscosity and a dimensionless number given by the ratio of this rate to the wave celerity. The effects of the horizontal turbulent viscosity on the wave amplitude and the phase are significant if the square of this number is not much smaller than one. Three cases for numerical model testing are developed according to three different chosen values of the complex wave number. Various results illustrating the solutions to these test cases are also presented.
Internet of things, Jul 1, 2023
Mobile Networks and Applications, Aug 2, 2023
Lecture Notes in Computer Science, Dec 30, 2018
The rapidly growth urbanization and using high-intensity land in urban areas recently are hot top... more The rapidly growth urbanization and using high-intensity land in urban areas recently are hot topics interested in researchers of 2-3-4D GIS (2-dimensional, 3-dimensional, and 4-dimensional geographic information system) more and more by the shapes of high-rise buildings (buildings) of diversity and abundance located on limited land funds. This problem is a big challenge for researchers of 2-3-4D GIS, how they can visually represent it into the 2D computer screen. This paper proposes to build space-data storage structures and to develop 3D space data interpolation algorithms (IA and NCA) for visual representation of buildings located on limited land funds in 3D geographical scientific space. This paper also presents experiments by these 3D bodies to represent visualization of buildings. Through these experimental results show able to support the authorities apply for management stages of urban techniques infrastructures in the near future.
Internet of things, Oct 1, 2023
Springer eBooks, Jan 23, 2015
This book constitutes the thoroughly refereed post-conference proceedings of the International Co... more This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Nature of Computation and Communication, ICTCC 2014, held in November 2014 in Ho Chi Minh City, Vietnam. The 34 revised full papers presented were carefully reviewed and selected from over 100 submissions. The papers cover formal methods for self-adaptive systems and discuss natural approaches and techniques for computation and communication.
Concurrency and Computation: Practice and Experience, May 21, 2019
Software Defined Networking (SDN) with multiple controllers draws more attention for the increasi... more Software Defined Networking (SDN) with multiple controllers draws more attention for the increasing scale of the network. Multi-controller architectures can handle what SDN with single controller is not able to address. In order to understand what these architectures can accomplish and face precisely, we analyze them with formal methods. In this paper, we apply Communicating Sequential Processes (CSP) to model the routing service of SDN under multi-controller architectures, in particular the HyperFlow architecture and the Kandoo architecture based on OpenFlow protocol. By using model checker Process Analysis Toolkit (PAT), we verify that the models satisfy three properties, namely deadlock freeness, consistency, and fault tolerance. In addition, for studying the security of those models, some extension is added. We find that the extended models are capable of coping with Denial of Service and may suffer from Information Disclosure. Moreover, a fake path and a tampered message could be present in SDN.
Lecture Notes in Computer Science, 2012
Data management in data aware self-organizing networks (DASNs) such as wireless sensor networks (... more Data management in data aware self-organizing networks (DASNs) such as wireless sensor networks (WSNs), mobile ad hoc networks (MANETs) and so on, whose fundamental paradigm is data aware computing, is currently on the spot as one of the priority research areas and research activities are booming recently. At a borderline of changing DASN configuration, data evolve over time. Thus investigating data awareness emerges as a need, on the one hand, for managing data in DASNs, but on the other hand, for modeling, specifying, programming, and verifying DASNs. Moreover, a well-established foundation of data aware computing in such self-organizing networks becomes a requirement. Hence in this paper, we first construct algebraic models for DASNs. Second, algebraic model of data streams is developed and quantitative behaviors for data streams in DASNs are computed. Third, using algebraic models for DASNs we form monoids of data aware self-organizations and shape streams of data aware self-organizations. Finally, a category of data aware self-organizations monoids is established and streams of data aware self-organizations monoids are considered.
Tạp chí Khoa học Đại học Huế: Kỹ thuật Công nghệ, Jul 16, 2019
In this paper, we study fuzzy graph rewriting with automaton and regular expression. We use hedge... more In this paper, we study fuzzy graph rewriting with automaton and regular expression. We use hedge algebra and linguistic variables for modeling and reasoning with words. We figure out theorem of limiting in state space. We also prove that both regular language generated from fuzzy grammar and fuzzy automata are the same.
Internet of things, Oct 1, 2023
EAI endorsed transactions on context-aware systems and applications, Aug 4, 2015
On behalf of the Editorial board, we welcome you to the fourth issue of the ICST Transactions on ... more On behalf of the Editorial board, we welcome you to the fourth issue of the ICST Transactions on Context-Aware Systems and Applications. In this issue, we present four selected papers that span various aspects of context-aware systems and applications, and an introduction to the book titled "Nature of Computation and Communication". This issue will serve as a reference material for researchers, scientists, professionals and students in computer science and computer engineering as well as developers and practitioners in computing and networking systems design by providing them with state-of-the-art research findings and future opportunities and trends. These papers include some recent advances in context-awareness reflected in this issue. In particular, the issue covers various themes of context-awareness as follows: Paper 1 by N. Khabou, I. B. Rodriguez and M. Jmaiel reports that the increase of mobile and interconnected devices leads to the growth of demands for context aware applications. These applications deployed on top of pervasive environments must adapt themselves to context changes. Context aware applications have to continuously sense their physical environment, and adapt their behavior accordingly. These applications must perform four phases starting by collecting and monitoring context, then analyzing context, deciding adaptation actions and finally executing the planned adaptation actions to deal with the context changes. In this paper, authors focus on the second phase. Authors propose a context analysis approach that relies on different thresholds defined according to the user needs to detect context changes and raise notifications when changes occur. The analysis approach is performed according to three different steps. A context storage
EAI endorsed transactions on context-aware systems and applications, Dec 23, 2020