Search Results - "Nguyen, Luong Nhat"
-
1
On the performance of outage probability in cognitive NOMA random networks with hardware impairments
Published in Journal of information and telecommunication (Print) (02-07-2024)“…The performance of the cognitive non-orthogonal multiple access (NOMA) systems with random locations is examined in the present paper. More precisely, the…”
Get full text
Journal Article -
2
Real-time Single-Channel EOG removal based on Empirical Mode Decomposition
Published in EAI endorsed transactions on industrial networks and intelligent systems (08-04-2024)“…In recent years, single-channel physiological recordings have gained popularity in portable health devices and research settings due to their convenience…”
Get full text
Journal Article -
3
On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming
Published in EAI endorsed transactions on industrial networks and intelligent systems (07-12-2023)“…The performance of the satellite-terrestrial network with Fountain codes (FCs) is conducted in the present work. More precisely, the air-to-ground link is…”
Get full text
Journal Article -
4
On the Performance of the Relay Selection in Multi-hop Cluster-based Wireless Networks with Multiple Eavesdroppers Under Equally Correlated Rayleigh Fading
Published in EAI endorsed transactions on industrial networks and intelligent systems (02-05-2024)“…The performance of multi-hop cluster-based wireless networks under multiple eavesdroppers is investigated in the present work. More precisely, we derive the…”
Get full text
Journal Article -
5
Performance of Energy Harvesting Aided Multi-hop Mobile Relay Networks With and Without Using Cooperative Communication
Published in 2023 International Conference on System Science and Engineering (ICSSE) (27-07-2023)“…This paper studies performance of two radio frequency (RF) energy harvesting (EH) aided multi-hop mobile relaying models. In the first one, named MHM2M-DT, a…”
Get full text
Conference Proceeding -
6
A dynamic model for temperature prediction in glass greenhouse
Published in 2019 6th NAFOSTED Conference on Information and Computer Science (NICS) (01-12-2019)“…As glass greenhouse becomes a main engine in smart agriculture, internet of things-based automation systems will enable control simply and efficiently for the…”
Get full text
Conference Proceeding -
7
Effect of imperfect CSI on secrecy performance of cluster based relaying networks
Published in 2016 International Conference on Advanced Technologies for Communications (ATC) (01-10-2016)“…In this paper, we study two important secure performance metrics of cluster-based multihop relaying networks under the presence of eavesdropper with imperfect…”
Get full text
Conference Proceeding -
8
Security-reliability analysis for underlay cognitive radio networks with relay selection methods under impact of hardware noises
Published in 2016 International Conference on Advanced Technologies for Communications (ATC) (01-10-2016)“…In this paper, we study physical-layer security (PLS) issue in underlay cognitive radio (UCR) networks in presence of multiple primary users (PUs). In…”
Get full text
Conference Proceeding -
9
Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming
Published in EAI endorsed transactions on industrial networks and intelligent systems (13-04-2021)“…This paper evaluates intercept probability (IP) of a cooperative cognitive radio network. Using Fountain codes, a secondary source continuously generates…”
Get full text
Journal Article -
10
On the performance of cognitive underlay Alamouti space-time coding schemes
Published in 2013 International Conference on Advanced Technologies for Communications (ATC 2013) (01-10-2013)“…In this paper, we study the performance of underlay Alamouti schemes over Rayleigh fading channels. In particular, the closed form expressions of outage…”
Get full text
Conference Proceeding -
11
Multi-modal deformable image registration using untrained neural networks
Published 04-11-2024“…Image registration techniques usually assume that the images to be registered are of a certain type (e.g. single- vs. multi-modal, 2D vs. 3D, rigid vs…”
Get full text
Journal Article -
12
Security enhancement for dual-hop RF protocols with Nth-best partial relay and EH-based jammer
Published in 2015 International Conference on Communications, Management and Telecommunications (ComManTel) (01-12-2015)“…In this paper, we propose an energy harvestingbased jamming scheme to enhance secrecy outage probability (SOP) for cooperative relaying protocols. In the…”
Get full text
Conference Proceeding