Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 94 results for author: Ngo, V

.
  1. arXiv:2407.21589  [pdf, other

    math.AP

    Determination of time dependent source terms for Stokes systems in unbounded domains

    Authors: Adel Blouza, Léo Glangetas, Yavar Kian, Van-Sang Ngo

    Abstract: This article is devoted to the analysis of inverse source problems for Stokes systems in unbounded domains where the corresponding velocity flow is observed on a surface. Our main objective is to study the unique determination of general class of time-dependent and vector-valued source terms with potentially unknown divergence. Taking into account the challenges inherent in this class of inverse s… ▽ More

    Submitted 31 July, 2024; originally announced July 2024.

  2. arXiv:2407.08470  [pdf, other

    cs.CV cs.AI

    Brain Tumor Segmentation in MRI Images with 3D U-Net and Contextual Transformer

    Authors: Thien-Qua T. Nguyen, Hieu-Nghia Nguyen, Thanh-Hieu Bui, Thien B. Nguyen-Tat, Vuong M. Ngo

    Abstract: This research presents an enhanced approach for precise segmentation of brain tumor masses in magnetic resonance imaging (MRI) using an advanced 3D-UNet model combined with a Context Transformer (CoT). By architectural expansion CoT, the proposed model extends its architecture to a 3D format, integrates it smoothly with the base model to utilize the complex contextual information found in MRI scan… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: 6 pages, 7 figures

  3. arXiv:2405.12633  [pdf

    cs.CV cs.AI cs.AR cs.HC eess.SY

    Automating Attendance Management in Human Resources: A Design Science Approach Using Computer Vision and Facial Recognition

    Authors: Bao-Thien Nguyen-Tat, Minh-Quoc Bui, Vuong M. Ngo

    Abstract: Haar Cascade is a cost-effective and user-friendly machine learning-based algorithm for detecting objects in images and videos. Unlike Deep Learning algorithms, which typically require significant resources and expensive computing costs, it uses simple image processing techniques like edge detection and Haar features that are easy to comprehend and implement. By combining Haar Cascade with OpenCV2… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: 31 pages, accepted to publish by the International Journal of Information Management Data Insights (IJIMDS) in 2024

  4. arXiv:2404.01320  [pdf, other

    cs.SI cs.AI cs.CY

    Graph-Based Optimisation of Network Expansion in a Dockless Bike Sharing System

    Authors: Mark Roantree, Niamh Murphi, Dinh Viet Cuong, Vuong Minh Ngo

    Abstract: Bike-sharing systems (BSSs) are deployed in over a thousand cities worldwide and play an important role in many urban transportation systems. BSSs alleviate congestion, reduce pollution and promote physical exercise. It is essential to explore the spatiotemporal patterns of bike-sharing demand, as well as the factors that influence these patterns, in order to optimise system operational efficiency… ▽ More

    Submitted 28 March, 2024; originally announced April 2024.

    Comments: Accepted to publish in The 2024 IEEE 40th International Conference on Data Engineering Workshops (ICDEW&DASC-2024), pp. 1-8

  5. Charting Ethical Tensions in Multispecies Technology Research through Beneficiary-Epistemology Space

    Authors: Steve Benford, Clara Mancini, Alan Chamberlain, Eike Schneiders, Simon Castle-Green, Joel Fischer, Ayse Kucukyilmaz, Guido Salimbeni, Victor Ngo, Pepita Barnard, Matt Adams, Nick Tandavanitj, Ju Row Farr

    Abstract: While ethical challenges are widely discussed in HCI, far less is reported about the ethical processes that researchers routinely navigate. We reflect on a multispecies project that negotiated an especially complex ethical approval process. Cat Royale was an artist-led exploration of creating an artwork to engage audiences in exploring trust in autonomous systems. The artwork took the form of a ro… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

    Comments: Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI '24), May 11--16, 2024, Honolulu, HI, USA

  6. Designing Multispecies Worlds for Robots, Cats, and Humans

    Authors: Eike Schneiders, Steve Benford, Alan Chamberlain, Clara Mancini, Simon Castle-Green, Victor Ngo, Ju Row Farr, Matt Adams, Nick Tandavanitj, Joel Fischer

    Abstract: We reflect on the design of a multispecies world centred around a bespoke enclosure in which three cats and a robot arm coexist for six hours a day during a twelve-day installation as part of an artist-led project. In this paper, we present the project's design process, encompassing various interconnected components, including the cats, the robot and its autonomous systems, the custom end-effector… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

    Comments: Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI '24), May 11--16, 2024, Honolulu, HI, USA

  7. arXiv:2311.02735  [pdf, other

    cond-mat.soft physics.bio-ph

    Remark on the Entropy Production of Adaptive Run-and-Tumble Chemotaxis

    Authors: Minh D. N. Nguyen, Phuc H. Pham, Khang V. Ngo, Van H. Do, Shengkai Li, Trung V. Phan

    Abstract: Chemotactic active particles, such as bacteria and cells, exhibit an adaptive run-and-tumble motion, giving rise to complex emergent behaviors in response to external chemical fields. This motion is generated by the conversion of internal chemical energy into self-propulsion, allowing each agent to sustain a steady-state far from thermal equilibrium and perform works. The rate of entropy productio… ▽ More

    Submitted 27 January, 2024; v1 submitted 5 November, 2023; originally announced November 2023.

    Journal ref: Physica A: Statistical Mechanics and its Applications 634 (2024): 129452

  8. arXiv:2307.01570  [pdf, other

    cs.CR cs.AI

    Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction

    Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran

    Abstract: Internet of things (IoT) has been playing an important role in many sectors, such as smart cities, smart agriculture, smart healthcare, and smart manufacturing. However, IoT devices are highly vulnerable to cyber-attacks, which may result in security breaches and data leakages. To effectively prevent these attacks, a variety of machine learning-based network intrusion detection methods for IoT net… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

  9. arXiv:2306.05945  [pdf, other

    physics.data-an physics.bio-ph physics.comp-ph stat.ML

    Improving Estimation of the Koopman Operator with Kolmogorov-Smirnov Indicator Functions

    Authors: Van A. Ngo, Yen Ting Lin, Danny Perez

    Abstract: It has become common to perform kinetic analysis using approximate Koopman operators that transforms high-dimensional time series of observables into ranked dynamical modes. Key to a practical success of the approach is the identification of a set of observables which form a good basis in which to expand the slow relaxation modes. Good observables are, however, difficult to identify {\em a priori}… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

    Comments: 28 pages, 6 figures

    Journal ref: J. Chem. Theory Comput. 2023

  10. arXiv:2211.13860  [pdf, other

    cs.CR

    Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning

    Authors: Mao V. Ngo, Tram Truong-Huu, Dima Rabadi, Jia Yi Loo, Sin G. Teo

    Abstract: In malware detection, dynamic analysis extracts the runtime behavior of malware samples in a controlled environment and static analysis extracts features using reverse engineering tools. While the former faces the challenges of anti-virtualization and evasive behavior of malware samples, the latter faces the challenges of code obfuscation. To tackle these drawbacks, prior works proposed to develop… ▽ More

    Submitted 24 November, 2022; originally announced November 2022.

    Comments: Accepted for presentation and publication at the 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)

  11. arXiv:2209.09526  [pdf, other

    cs.IT eess.SP

    Deep Neural Network-Based Detector for Single-Carrier Index Modulation NOMA

    Authors: Toan Gian, Vu-Duc Ngo, Tien-Hoa Nguyen, Trung Tan Nguyen, Thien Van Luong

    Abstract: In this paper, a deep neural network (DNN)-based detector for an uplink single-carrier index modulation nonorthogonal multiple access (SC-IM-NOMA) system is proposed, where SC-IM-NOMA allows users to use the same set of subcarriers for transmitting their data modulated by the sub-carrier index modulation technique. More particularly, users of SC-IMNOMA simultaneously transmit their SC-IM data at d… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

  12. arXiv:2209.09521  [pdf, other

    cs.IT eess.SP

    Deep Learning-Based Signal Detection for Dual-Mode Index Modulation 3D-OFDM

    Authors: Dang-Y Hoang, Tien-Hoa Nguyen, Vu-Duc Ngo, Trung Tan Nguyen, Nguyen Cong Luong, Thien Van Luong

    Abstract: In this paper, we propose a deep learning-based signal detector called DuaIM-3DNet for dual-mode index modulation-based three-dimensional (3D) orthogonal frequency division multiplexing (DM-IM-3D-OFDM). Herein, DM-IM-3D- OFDM is a subcarrier index modulation scheme which conveys data bits via both dual-mode 3D constellation symbols and indices of active subcarriers. Thus, this scheme obtains bette… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

  13. arXiv:2208.10273  [pdf, other

    cs.CR cs.LG

    Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning

    Authors: Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das

    Abstract: Federated learning offers a framework of training a machine learning model in a distributed fashion while preserving privacy of the participants. As the server cannot govern the clients' actions, nefarious clients may attack the global model by sending malicious local gradients. In the meantime, there could also be unreliable clients who are benign but each has a portion of low-quality training da… ▽ More

    Submitted 14 August, 2022; originally announced August 2022.

    Comments: European Symposium on Research in Computer Security (ESORICS) 2022

  14. arXiv:2207.14459  [pdf, other

    cs.IT eess.SP

    Generalized BER of MCIK-OFDM with Imperfect CSI: Selection combining GD versus ML receivers

    Authors: Vu-Duc Ngo, Thien Van Luong, Nguyen Cong Luong, Minh-Tuan Le, Thi Thanh Huyen Le, Xuan-Nam Tran

    Abstract: This paper analyzes the bit error rate (BER) of multicarrier index keying - orthogonal frequency division multiplexing (MCIK-OFDM) with selection combining (SC) diversity reception. Particularly, we propose a generalized framework to derive the BER for both the low-complexity greedy detector (GD) and maximum likelihood (ML) detector. Based on this, closedform expressions for the BERs of MCIK-OFDM… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

  15. arXiv:2207.14454  [pdf, other

    cs.IT eess.SP

    Enhancing Diversity of OFDM with Joint Spread Spectrum and Subcarrier Index Modulations

    Authors: Vu-Duc Ngo, Thien Van Luong, Nguyen Cong Luong, Mai Xuan Trang, Minh-Tuan Le, Thi Thanh Huyen Le, Xuan-Nam Tran

    Abstract: This paper proposes a novel spread spectrum and sub-carrier index modulation (SS-SIM) scheme, which is integrated to orthogonal frequency division multiplexing (OFDM) framework to enhance the diversity over the conventional IM schemes. Particularly, the resulting scheme, called SS-SIMOFDM, jointly employs both spread spectrum and sub-carrier index modulations to form a precoding vector which is th… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

  16. arXiv:2110.01248  [pdf, ps, other

    math.AP

    Hydrostatic limit of the Navier-Stokes-alpha model

    Authors: Léo Glangetas, Van-Sang Ngo, El Mehdi Said

    Abstract: In this paper we study the hydrostatic limit of the Navier-Stokes-alpha model in a very thin striped domain. We derive some Prandtl-type limit equations for this model and we prove the global well-posedness of the limit system for small initial conditions in an appropriate analytic function space.

    Submitted 4 October, 2021; originally announced October 2021.

    Comments: Premi{è}re version, 33 pages

  17. arXiv:2108.03872  [pdf, other

    cs.LG cs.AI cs.DC cs.NI

    Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge Computing: A Contextual-Bandit Approach

    Authors: Mao V. Ngo, Tie Luo, Tony Q. S. Quek

    Abstract: The advances in deep neural networks (DNN) have significantly enhanced real-time detection of anomalous data in IoT applications. However, the complexity-accuracy-delay dilemma persists: complex DNN models offer higher accuracy, but typical IoT devices can barely afford the computation load, and the remedy of offloading the load to the cloud incurs long delay. In this paper, we address this challe… ▽ More

    Submitted 9 August, 2021; originally announced August 2021.

    Comments: Accepted in ACM Transactions on Internet of Things (TIOT) in August 2021. arXiv admin note: text overlap with arXiv:2001.03314, arXiv:2004.06896

  18. Enhanced nonlinear quantum metrology with weakly coupled solitons and particle losses

    Authors: Alexander Alodjants, Dmitriy Tsarev, The Vinh Ngo, Ray-Kuang Lee

    Abstract: The estimation of physical parameters with Heisenberg sensitivity and beyond is one of the crucial problems for current quantum metrology. However, unavoidable lossy effect is commonly believed to be the main obstacle when applying fragile quantum states. To utilize the lossy quantum metrology, we offer an interferometric procedure for phase parameters estimation at the Heisenberg (up to 1/N) and… ▽ More

    Submitted 7 August, 2021; originally announced August 2021.

  19. arXiv:2105.07918  [pdf, ps, other

    math.RT

    Commuting Varieties and Cohomological Complexity

    Authors: Nham V. Ngo, Paul D. Levy, Klemen Šivic

    Abstract: In this paper we determine, for all $r$ sufficiently large, the irreducible component(s) of maximal dimension of the variety of commuting $r$-tuples of nilpotent elements of $\mathfrak{gl}_n$. Our main result is that in characteristic $\neq 2,3$, this nilpotent commuting variety has dimension $(r+1)\lfloor \frac{n^2}{4}\rfloor$ for $n\geq 4$, $r\geq 7$. We use this to find the dimension of the (or… ▽ More

    Submitted 4 April, 2022; v1 submitted 17 May, 2021; originally announced May 2021.

    Comments: 29 pages, no figures. Final version, to appear in the Journal of the London Mathematical Society

    MSC Class: 14L35 (Primary) 20G15; 17B56 (Secondary)

  20. Sampling by Divergence Minimization

    Authors: Ameer Dharamshi, Vivian Ngo, Jeffrey S. Rosenthal

    Abstract: We introduce a Markov Chain Monte Carlo (MCMC) method that is designed to sample from target distributions with irregular geometry using an adaptive scheme. In cases where targets exhibit non-Gaussian behaviour, we propose that adaption should be regional rather than global. Our algorithm minimizes the information projection component of the Kullback-Leibler (KL) divergence between the proposal an… ▽ More

    Submitted 6 May, 2022; v1 submitted 2 May, 2021; originally announced May 2021.

    Comments: 33 pages, 12 figures

  21. arXiv:2103.11271  [pdf

    cs.IR cs.CC cs.CV cs.LG

    Structural Textile Pattern Recognition and Processing Based on Hypergraphs

    Authors: Vuong M. Ngo, Sven Helmer, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: The humanities, like many other areas of society, are currently undergoing major changes in the wake of digital transformation. However, in order to make collection of digitised material in this area easily accessible, we often still lack adequate search functionality. For instance, digital archives for textiles offer keyword search, which is fairly well understood, and arrange their content follo… ▽ More

    Submitted 20 March, 2021; originally announced March 2021.

    Comments: 38 pages, 23 figures

    Journal ref: Information Retrieval Journal, Springer, 2021

  22. arXiv:2101.11902  [pdf, other

    cond-mat.mtrl-sci

    Learning Hidden Chemistry with Deep Neural Networks

    Authors: Tien-Cuong Nguyen, Van-Quyen Nguyen, Van-Linh Ngo, Quang-Khoat Than, Tien-Lam Pham

    Abstract: We demonstrate a machine learning approach designed to extract hidden chemistry/physics to facilitate new materials discovery. In particular, we propose a novel method for learning latent knowledge from material structure data in which machine learning models are developed to present the possibility that an atom can be paired with a chemical environment in an observed materials. For this purpose,… ▽ More

    Submitted 31 July, 2021; v1 submitted 28 January, 2021; originally announced January 2021.

    Comments: 7pages, 6 figures

  23. Mesoscopic quantum superposition states of weakly-coupled matter-wave solitons

    Authors: Dmitriy Tsarev, Alexander Alodjants, The Vinh Ngo, Ray-Kuang Lee

    Abstract: The Josephson junctions (JJs) are at the heart of modern quantum technologies and metrology. In this work we establish quantum features of an atomic soliton Josephson junction (SJJ) device, which consists of two weakly-coupled condensates with negative scattering length. The condensates are trapped in a double-well potential and elongated in one dimension. Starting with classical field theory we m… ▽ More

    Submitted 26 November, 2020; originally announced November 2020.

    Comments: 36 pages, 8 figures

    Journal ref: New J. Phys. 22, 113016 (2020)

  24. arXiv:2011.13190  [pdf, other

    quant-ph physics.atom-ph

    Bose-Einstein condensate soliton qubit states for metrological applications

    Authors: The Vinh Ngo, Dmitriy Tsarev, Ray-Kuang Lee, Alexander Alodjants

    Abstract: By utilizing Bose-Einstein condensate solitons, optically manipulated and trapped in a double-well potential, coupled through nonlinear Josephson effect, we propose novel quantum metrology applications with two soliton qubit states. In addition to steady-state solutions in different scenarios, phase space analysis, in terms of population imbalance - phase difference variables, is also performed to… ▽ More

    Submitted 26 November, 2020; originally announced November 2020.

    Comments: 21 pages, 9 figures

  25. arXiv:2009.05682  [pdf, other

    cs.NI

    Coordinated Container Migration and Base Station Handover in Mobile Edge Computing

    Authors: Mao V. Ngo, Tie Luo, Hieu T. Hoang, Tony Q. S. Quek

    Abstract: Offloading computationally intensive tasks from mobile users (MUs) to a virtualized environment such as containers on a nearby edge server, can significantly reduce processing time and hence end-to-end (E2E) delay. However, when users are mobile, such containers need to be migrated to other edge servers located closer to the MUs to keep the E2E delay low. Meanwhile, the mobility of MUs necessitate… ▽ More

    Submitted 11 September, 2020; originally announced September 2020.

    Comments: 6 pages. Accepted for presentation at the IEEE Global Communications Conference (Globecom), Taipei, Taiwan, Dec. 2020

  26. arXiv:2006.16025  [pdf, ps, other

    math.AP

    Hydrostatic approximation of the 2D primitive equations in a thin strip

    Authors: Nacer Aarach, Van-Sang Ngo

    Abstract: We prove the global wellposedness of the 2D non-rotating primitive equations with no-slip boundary conditions in a thin strip of width $\eps$ for small data which are analytic in the tangential direction. We also prove that the hydrostatic limit (when $\eps \to 0$) is a couple of a Prandtl-like system for the velocity with a transport-diffusion equation for the temperature.

    Submitted 26 February, 2023; v1 submitted 29 June, 2020; originally announced June 2020.

    Comments: v2, 36 pages

  27. arXiv:2004.06896  [pdf, other

    cs.LG cs.DC cs.NI stat.ML

    Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge Computing

    Authors: Mao V. Ngo, Tie Luo, Hakima Chaouchi, Tony Q. S. Quek

    Abstract: Advances in deep neural networks (DNN) greatly bolster real-time detection of anomalous IoT data. However, IoT devices can hardly afford complex DNN models, and offloading anomaly detection tasks to the cloud incurs long delay. In this paper, we propose and build a demo for an adaptive anomaly detection approach for distributed hierarchical edge computing (HEC) systems to solve this problem, for b… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: Accepted for presenting at IEEE International Conference on Distributed Computing Systems (ICDCS), Demo Track, July 2020

  28. arXiv:2003.05043  [pdf

    cs.DB cs.CY cs.LG

    Crop Knowledge Discovery Based on Agricultural Big Data Integration

    Authors: Vuong M. Ngo, M-Tahar Kechadi

    Abstract: Nowadays, the agricultural data can be generated through various sources, such as: Internet of Thing (IoT), sensors, satellites, weather stations, robots, farm equipment, agricultural laboratories, farmers, government agencies and agribusinesses. The analysis of this big data enables farmers, companies and agronomists to extract high business and scientific knowledge, improving their operational p… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: 5 pages

    Journal ref: ICMLSC-2020

  29. arXiv:2003.04470  [pdf, ps, other

    cs.DB cs.DC cs.LG cs.PF

    Data Warehouse and Decision Support on Integrated Crop Big Data

    Authors: V. M. Ngo, N. A. Le-Khac, M. T. Kechadi

    Abstract: In recent years, precision agriculture is becoming very popular. The introduction of modern information and communication technologies for collecting and processing Agricultural data revolutionise the agriculture practises. This has started a while ago (early 20th century) and it is driven by the low cost of collecting data about everything; from information on fields such as seed, soil, fertilise… ▽ More

    Submitted 12 April, 2021; v1 submitted 9 March, 2020; originally announced March 2020.

    Comments: 13 pages, 11 figures. arXiv admin note: text overlap with arXiv:1905.12411

    Journal ref: International Journal of Business Process Integration and Management 2020 Vol.10 No.1

  30. arXiv:2001.11645  [pdf

    eess.SY

    Linear Programming Contractor for Interval Distribution State Estimation Using RDM Arithmetic

    Authors: VietCuong Ngo, Wenchuan Wu

    Abstract: State estimation (SE) of distribution networks heavily relies on pseudo measurements that introduce significant errors, since real-time measurements are insufficient. Interval SE models are regularly used, where true values of system states are supposed to be within the estimated ranges. However, conventional interval SE algorithms cannot consider the correlations of same interval variables in dif… ▽ More

    Submitted 27 March, 2020; v1 submitted 30 January, 2020; originally announced January 2020.

  31. arXiv:2001.03314  [pdf, other

    cs.LG cs.NI stat.ML

    Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing

    Authors: Mao V. Ngo, Hakima Chaouchi, Tie Luo, Tony Q. S. Quek

    Abstract: Advances in deep neural networks (DNN) greatly bolster real-time detection of anomalous IoT data. However, IoT devices can barely afford complex DNN models due to limited computational power and energy supply. While one can offload anomaly detection tasks to the cloud, it incurs long delay and requires large bandwidth when thousands of IoT devices stream data to the cloud concurrently. In this pap… ▽ More

    Submitted 10 January, 2020; originally announced January 2020.

    Comments: To be published in the AAAI Workshop on Artificial Intelligence of Things (AIoT), Feb 2020

  32. arXiv:1910.03092  [pdf, ps, other

    math.AP

    Approximate controllability of second grade fluids

    Authors: Van-Sang Ngo, Geneviève Raugel

    Abstract: This paper deals with the controllability of the second grade fluids, a class of non-Newtonian of differentiel type, on a two-dimensional torus. Using the method of Agrachev-Sarychev [1], [2] and of Sirikyan [26], we prove that the system of second grade fluids is approximately controllable by a finite-dimensional control force.

    Submitted 7 October, 2019; originally announced October 2019.

  33. arXiv:1908.01845  [pdf, other

    cond-mat.stat-mech physics.comp-ph

    Nonequilibrium path-ensemble averages for symmetric protocols

    Authors: Trung Hai Nguyen, Van Ngo, João Paulo Castro Zerba, Sergei Noskov, David D. L. Minh

    Abstract: According to the nonequilibrium work relations, path-ensembles generated by irreversible processes in which a system is driven out of equilibrium according to a predetermined protocol may be used to compute equilibrium free energy differences and expectation values. Estimation has previously been improved by considering data collected from the reverse process, which starts in equilibrium in the fi… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

    Comments: 27 pages, 6 figures

    Journal ref: Journal of Chemical Physics 2019, 151 (19), 194103

  34. arXiv:1905.12411  [pdf, other

    cs.DB cs.AI cs.LG cs.PF

    Designing and Implementing Data Warehouse for Agricultural Big Data

    Authors: Vuong M. Ngo, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: In recent years, precision agriculture that uses modern information and communication technologies is becoming very popular. Raw and semi-processed agricultural data are usually collected through various sources, such as: Internet of Thing (IoT), sensors, satellites, weather stations, robots, farm equipment, farmers and agribusinesses, etc. Besides, agricultural datasets are very large, complex, u… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: Business intelligent, data warehouse, constellation schema, Big Data, precision agriculture

    Journal ref: BigData 2019

  35. arXiv:1905.06647  [pdf

    cs.CL

    Using Entity Relations for Opinion Mining of Vietnamese Comments

    Authors: P. T. Nguyen, L. T. Le, V. M. Ngo, P. M. Nguyen

    Abstract: In this paper, we propose several novel techniques to extract and mining opinions of Vietnamese reviews of customers about a number of products traded on e-commerce in Vietnam. The assessment is based on the emotional level of customers on a specific product such as mobile and laptop. We exploit the features of the products because they are much interested by customers and have many products in th… ▽ More

    Submitted 16 May, 2019; originally announced May 2019.

    Comments: 14 pages, in Vietnamese

    Journal ref: Journal of Science and Technology, Vietnam Academy of Science and Technology, Vol. 52, No. 4D, pp. 120-132 (2014)

  36. arXiv:1905.06643  [pdf

    cs.CL

    Machine Learning based English Sentiment Analysis

    Authors: T. N. T. Tran, L. K. N. Nguyen, V. M. Ngo

    Abstract: Sentiment analysis or opinion mining aims to determine attitudes, judgments and opinions of customers for a product or a service. This is a great system to help manufacturers or servicers know the satisfaction level of customers about their products or services. From that, they can have appropriate adjustments. We use a popular machine learning method, being Support Vector Machine, combine with th… ▽ More

    Submitted 16 May, 2019; originally announced May 2019.

    Comments: 6 pages, in Vietnamese

    Journal ref: Journal of Science and Technology, Vietnam Academy of Science and Technology, Vol. 52, No. 4D, pp. 142-155 (2014)

  37. arXiv:1905.06112  [pdf

    cs.IR cs.LG cs.SI

    Detecting Vietnamese Opinion Spam

    Authors: T. H. H Duong, T. D. Vu, V. M. Ngo

    Abstract: Recently, Vietnamese Natural Language Processing has been researched by experts in academic and business. However, the existing papers have been focused only on information classification or extraction from documents. Nowadays, with quickly development of the e-commerce websites, forums and social networks, the products, people, organizations or wonders are targeted of comments or reviews of the n… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: 6 pages, in Vietnamese

    Journal ref: ICTFIT 2012

  38. arXiv:1810.04604  [pdf

    cs.DB cs.CV cs.DL cs.IR

    A Similarity Measure for Weaving Patterns in Textiles

    Authors: Sven Helmer, Vuong M. Ngo

    Abstract: We propose a novel approach for measuring the similarity between weaving patterns that can provide similarity-based search functionality for textile archives. We represent textile structures using hypergraphs and extract multisets of k-neighborhoods from these graphs. The resulting multisets are then compared using Jaccard coefficients, Hamming distances, and cosine measures. We evaluate the diffe… ▽ More

    Submitted 10 October, 2018; originally announced October 2018.

    Comments: 10 papes, will be published in SIGIR 2015

    Journal ref: SIGIR 2015

  39. arXiv:1808.01968  [pdf

    cs.AI cs.IR

    Discovering Latent Information By Spreading Activation Algorithm For Document Retrieval

    Authors: Vuong M. Ngo

    Abstract: Syntactic search relies on keywords contained in a query to find suitable documents. So, documents that do not contain the keywords but contain information related to the query are not retrieved. Spreading activation is an algorithm for finding latent information in a query by exploiting relations between nodes in an associative network or semantic network. However, the classical spreading activat… ▽ More

    Submitted 29 July, 2018; originally announced August 2018.

    Comments: 12pages, will be published in The International Journal of Artificial Intelligence & Applications (IJAIA). arXiv admin note: text overlap with arXiv:1807.07967

  40. arXiv:1807.11024  [pdf

    cs.IR cs.AI cs.CL

    Opinion Spam Recognition Method for Online Reviews using Ontological Features

    Authors: L. H. Nguyen, N. T. H. Pham, V. M. Ngo

    Abstract: Nowadays, there are a lot of people using social media opinions to make their decision on buying products or services. Opinion spam detection is a hard problem because fake reviews can be made by organizations as well as individuals for different purposes. They write fake reviews to mislead readers or automated detection system by promoting or demoting target products to promote them or to damage… ▽ More

    Submitted 29 July, 2018; originally announced July 2018.

    Comments: 15 pages, In Journal of Science, Special Issue: Natural Science and Technology, Ho Chi Minh City University of Education

  41. arXiv:1807.07967  [pdf

    cs.IR

    Combining Named Entities with WordNet and Using Query-Oriented Spreading Activation for Semantic Text Search

    Authors: Vuong M. Ngo, Tru H. Cao, Tuan M. V. Le

    Abstract: Purely keyword-based text search is not satisfactory because named entities and WordNet words are also important elements to define the content of a document or a query in which they occur. Named entities have ontological features, namely, their aliases, classes, and identifiers. Words in WordNet also have ontological features, namely, their synonyms, hypernyms, hyponyms, and senses. Those feature… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

    Comments: 6 papes, Accepted by RIVF. arXiv admin note: substantial text overlap with arXiv:1807.05579; text overlap with arXiv:1807.05578

  42. arXiv:1807.07966  [pdf

    cs.IR

    Exploring Combinations of Ontological Features and Keywords for Text Retrieval

    Authors: Tru H. Cao, Khanh C. Le, Vuong M. Ngo

    Abstract: Named entities have been considered and combined with keywords to enhance information retrieval performance. However, there is not yet a formal and complete model that takes into account entity names, classes, and identifiers together. Our work explores various adaptations of the traditional Vector Space Model that combine different ontological features with keywords, and in different ways. It sho… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

    Comments: 10 pages, will be in PRICAI. arXiv admin note: substantial text overlap with arXiv:1807.05576

  43. arXiv:1807.07779  [pdf

    cs.IR cs.CL cs.DB

    A Generalized Vector Space Model for Ontology-Based Information Retrieval

    Authors: Vuong M. Ngo, Tru H. Cao

    Abstract: Named entities (NE) are objects that are referred to by names such as people, organizations and locations. Named entities and keywords are important to the meaning of a document. We propose a generalized vector space model that combines named entities and keywords. In the model, we take into account different ontological features of named entities, namely, aliases, classes and identifiers. Moreove… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

    Comments: 5 pages, in Vietnamese. information retrieval, vector space model, ontology, named entity, keyword. Accepted by Vietnamese Journal on Information Technologies and Communications

  44. arXiv:1807.07777  [pdf

    cs.IR

    Semantic Document Clustering on Named Entity Features

    Authors: Tru H. Cao, Vuong M. Ngo, Dung T. Hong, Tho T. Quan

    Abstract: Keyword-based information processing has limitations due to simple treatment of words. In this paper, we introduce named entities as objectives into document clustering, which are the key elements defining document semantics and in many cases are of user concerns. First, the traditional keyword-based vector space model is adapted with vectors defined over spaces of entity names, types, name-type p… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

    Comments: 7 papes, PAKDD workshops

  45. arXiv:1807.05579  [pdf

    cs.IR cs.AI

    Ontology-Based Query Expansion with Latently Related Named Entities for Semantic Text Search

    Authors: Vuong M. Ngo, Tru H. Cao

    Abstract: Traditional information retrieval systems represent documents and queries by keyword sets. However, the content of a document or a query is mainly defined by both keywords and named entities occurring in it. Named entities have ontological features, namely, their aliases, classes, and identifiers, which are hidden from their textual appearance. Besides, the meaning of a query may imply latent name… ▽ More

    Submitted 15 July, 2018; originally announced July 2018.

    Comments: 12 pages - accepted by Advances in Intelligent Information and Database Systems, Book of series SCI, Springer-Verlag (2010)

  46. arXiv:1807.05578  [pdf

    cs.IR

    Discovering Latent Concepts and Exploiting Ontological Features for Semantic Text Search

    Authors: Vuong M. Ngo, Tru H. Cao

    Abstract: Named entities and WordNet words are important in defining the content of a text in which they occur. Named entities have ontological features, namely, their aliases, classes, and identifiers. WordNet words also have ontological features, namely, their synonyms, hypernyms, hyponyms, and senses. Those features of concepts may be hidden from their textual appearance. Besides, there are related conce… ▽ More

    Submitted 15 July, 2018; originally announced July 2018.

    Comments: 9 pages - accpted by the 5th International Joint Conference on Natural Language Processing (IJCNLP-2011). arXiv admin note: text overlap with arXiv:1807.05574

  47. arXiv:1807.05576  [pdf

    cs.IR

    Semantic Search by Latent Ontological Features

    Authors: Tru H. Cao, Vuong M. Ngo

    Abstract: Both named entities and keywords are important in defining the content of a text in which they occur. In particular, people often use named entities in information search. However, named entities have ontological features, namely, their aliases, classes, and identifiers, which are hidden from their textual appearance. We propose ontology-based extensions of the traditional Vector Space Model that… ▽ More

    Submitted 15 July, 2018; originally announced July 2018.

    Comments: 17 pages, Accept by New Generation Computing (2012)

  48. arXiv:1807.05574  [pdf

    cs.CL cs.IR

    WordNet-Based Information Retrieval Using Common Hypernyms and Combined Features

    Authors: Vuong M. Ngo, Tru H. Cao, Tuan M. V. Le

    Abstract: Text search based on lexical matching of keywords is not satisfactory due to polysemous and synonymous words. Semantic search that exploits word meanings, in general, improves search performance. In this paper, we survey WordNet-based information retrieval systems, which employ a word sense disambiguation method to process queries and documents. The problem is that in many cases a word has more th… ▽ More

    Submitted 15 July, 2018; originally announced July 2018.

    Comments: 6pages, Will be in proceedings of the 5th International Conference on Intelligent Computing and Information Systems (ICICIS-2011), in cooperation with ACM. 30 June to 3 July, 2011, Cairo, Egypt

  49. arXiv:1807.00035  [pdf

    cs.CY cs.DB

    An Efficient Data Warehouse for Crop Yield Prediction

    Authors: Vuong M. Ngo, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: Nowadays, precision agriculture combined with modern information and communications technologies, is becoming more common in agricultural activities such as automated irrigation systems, precision planting, variable rate applications of nutrients and pesticides, and agricultural decision support systems. In the latter, crop management data analysis, based on machine learning and data mining, focus… ▽ More

    Submitted 26 June, 2018; originally announced July 2018.

    Comments: 12 pages. Keywords. Data warehouse, constellation schema, crop yield prediction, precision agriculture

    Journal ref: Proceedings of the 14th International Conference on Precision Agriculture. June 24 to June 27, 2018, Montreal, Quebec, Canada

  50. arXiv:1802.02355  [pdf, ps, other

    math.AP

    On the influence of gravity on density-dependent incompressible periodic fluids

    Authors: Van-Sang Ngo, Stefano Scrobogna

    Abstract: The present work is devoted to the analysis of density-dependent, incompressible fluids in a 3D torus, when the Froude number $\varepsilon$ goes to zero. We consider the very general case where the initial data do not have a zero horizontal average, where we only have smoothing effect on the velocity but not on the density and where we can have resonant phenomena on the domain. We explicitly deter… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

    Comments: submitted