J. Nayeem, Mir Oliul Pasha Taj, Md. Shahria Mahmud, Farha Hossain, A. Arabi
{"title":"Implementation of Computer Vision in Low Fidelity Robots: Analysis, Challenges, and Design Implications","authors":"J. Nayeem, Mir Oliul Pasha Taj, Md. Shahria Mahmud, Farha Hossain, A. Arabi","doi":"10.1109/NICS56915.2022.10013428","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013428","url":null,"abstract":"We observe the utilization of machine learning in a number of everyday aspects. Robotics is one of the major fields where we celebrate the prowess of machine learning. The application of machine learning and deep learning techniques to robotics has made them elegant, intelligent, and more competent. A subset of robotic gizmos consists of low-fidelity configurations that have abstract shapes and are generally constructed from low-end components. As a result, their capacities are oftentimes limited. Although several prior works sought to enforce machine learning for such contraptions, the lack of high-performance processing often bounds such applications. In this work, we fabricate a low-fidelity robot, named Tokai, implement deep learning-based object detection to perform waste bottle collection, and hence, investigate the feasibility, challenges, and design implications of implementing deep learning for low-fidelity robots.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130361484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient IDS using FIS to detect DDoS in IoT networks","authors":"Trong-Minh Hoang, Nhat-Hoang Tran, Vu-Long Thai, Dinh-Long Nguyen, Nam-Hoang Nguyen","doi":"10.1109/NICS56915.2022.10013480","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013480","url":null,"abstract":"The growing Internet of Things (IoT) applications of today have brought numerous benefits to our lives. In addition, cyber-attacks are growing as a result of increasingly sophisticated and violent attacks. Detection systems that serve as security protection against emerging attacks are also being developed using machine learning techniques. However, many additional challenges continue to emerge as demand for Intrusion Detection System (IDS) deployment at the edge network, where resource-constrained devices exist, continues to increase. These devices require a database with a high level of accuracy for attack detection. This research provides a Fuzzy-based IDS for detecting DDOS attacks with over 99 percent accuracy rate that is deployable on edge computing using the IoT23 dataset.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133368553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dung Tran Tuan, Phan The Duy, Le Cong Hau, V. Pham
{"title":"A Blockchain-based Authentication and Access Control for Smart Devices in SDN-enabled Networks for Metaverse","authors":"Dung Tran Tuan, Phan The Duy, Le Cong Hau, V. Pham","doi":"10.1109/NICS56915.2022.10013416","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013416","url":null,"abstract":"Emerging with outstanding features in network management, Software Defined Networking (SDN) is considered as a flexible and efficient paradigm in the context of smart city including a massive number of heterogeneous devices. In the vision of Metaverse towards, SDN plays important roles for network orchestration to support interactive experience through smart devices. This study presents BlockBee, a Blockchain-based architecture for decentralized authentication and access control for smart devices in SDN-supported network for the Meta-verse context. With the decentralization essence, the BlockBee strengthen the Metaverse application by enhance the security, reliability and trustworthy before every connection is set up.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116860168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust hierarchical model for joint span detection and aspect-based sentiment analysis in Vietnamese","authors":"An Pha Le, T. Pham, T. Le, Duy V. Huynh, D. Ngo","doi":"10.1109/NICS56915.2022.10013463","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013463","url":null,"abstract":"Recent successes of large pre-trained language models highlighted deep neural networks' potential in solving complicated natural language processing tasks, but some remain unsolved, especially for non-English languages. Two of them are span detection and aspect-based sentiment analysis. The former is a general sequence tagging, and the latter is a hierarchical classification task. Both are challenging in various ways, most notably due to the lack of available resources and effective methods for training. To overcome these drawbacks, this paper introduces a fashionable and robust hierarchical model that learns both tasks simultaneously using a multi-task learning framework for Vietnamese datasets. Our model is trained using a tunable custom task-dependent loss and easily adapted to a wide range of similar tasks. Experimental results showed that our approach is superior to the existing baseline systems and achieved state-of-the-art results. We also make the source code publicly available as a starter kit for further investigation and research11https://github.com/datnnt1997/ViSA.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quoc-Nguyen Banh, Van-Truc To, Minh-Man Luu, Hai D. Nguyen, V. Dong
{"title":"Optimization of Durability of Edible Spoon Using Design of Experiment Method","authors":"Quoc-Nguyen Banh, Van-Truc To, Minh-Man Luu, Hai D. Nguyen, V. Dong","doi":"10.1109/NICS56915.2022.10013412","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013412","url":null,"abstract":"Edible cutlery products have appeared on the market for a long time and are promised to become a global trend in the near future. Currently, there are countless projects in this field, and products are created more and more and increasingly contribute to reducing the impact of plastic waste on the environment. With the goal of making an edible spoon product with a good appearance, and durable structure that is widely available to everyone, this project researches and develops the baking module of the edible spoon-making machine system. Using Taguchi's method to optimize the hardness of the spoon material through analysis of the influence of factors. The results show that, with optimal parameters, the maximum durability of the material is 7.06, much larger than the impact from the outside. Additionally, with the results found, the edible spoon product has been successfully developed and undergone many different tests, the edible spoon product is completely capable of replacing the disposable plastic spoon product in daily eating activities.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122139729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nguyen D. Vo, Phuc Nguyen, Thang Truong, Hoan C. Nguyen, Khang Nguyen
{"title":"Foggy-DOTA: An adverse weather dataset for object detection in aerial images","authors":"Nguyen D. Vo, Phuc Nguyen, Thang Truong, Hoan C. Nguyen, Khang Nguyen","doi":"10.1109/NICS56915.2022.10013441","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013441","url":null,"abstract":"Nowadays, object detection in aerial images in adverse weather, especially in foggy scenes becoming very challenging and incredibly practical. Furthermore, fog and clouds usually appear in the majority of aerial images captured via drones everywhere on Earth, especially in the early morning. Understanding the need for qualified deep learning approaches, we propose a Foggy-DOTA dataset inheriting from the original DOTA dataset and then empirically evaluate it on multiple State-of-the-art methods. After having conducted lots of experiments on some well-known baselines, ReDet is the highest method achieving 76.680 mAP on the original DOTA, only 74.194 mAP on our Foggy-DOTA dataset (60.706 mAP if trained on DOTA). On the other hand, S2ANet and RoI Transformer achieve 74.190, 76,09 mAP on the original DOTA, only yield 71.629 and 73.381 mAP on our Foggy-DOTA dataset (46.503 and 40.297 mAP - significantly low if trained on DOTA), respectively. Our work provides comprehensive statistical evaluation being an essential baseline for future object detection research.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123348004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote Speaker 2: Enabling Metaverse with Secure and Smart Network Resource Slicing","authors":"E. Dutkiewicz, Diep N. Nguyen","doi":"10.1109/NICS56915.2022.10013452","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013452","url":null,"abstract":"Metaverse has recently attracted paramount attention due to its potential for future Internet. However, to fully realize such potential, Metaverse applications have to overcome various challenges such as massive resource demands, interoperability among applications, and security and privacy concerns. In this talk, we first discuss MetaChain, a novel blockchain-based framework to address emerging challenges for the development of Metaverse applications. In particular, by utilizing the smart contract mechanism, MetaChain can effectively manage and automate complex interactions among the Metaverse Service Provider (MSP) and the Metaverse users (MUs). We then proposed a novel framework, namely MetaSlicing, that can provide a highly effective and comprehensive solution in managing and allocating different types of resources for Metaverse applications. Specifically, by observing that Metaverse applications may have common functions, we first propose grouping applications into clusters, called MetaInstances. In a MetaInstance, common functions can be shared among applications. As such, the same resources can be used by multiple applications simultaneously, thereby enhancing resource utilization dramatically. To address the real-time characteristic and resource demand's dynamic and uncertainty in the Metaverse, we develop an effective framework based on the semi-Markov decision process and propose an intelligent admission control algorithm that can maximize resource utilization and enhance the Quality-of-Service for end-users.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130682169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tran Bao Thanh, Tri-Hai Nguyen, Kha-Tu Huynh, T. Le
{"title":"Lightweight IoT-Based System for COVID-19 Patient Health Monitoring and Prediction","authors":"Tran Bao Thanh, Tri-Hai Nguyen, Kha-Tu Huynh, T. Le","doi":"10.1109/NICS56915.2022.10013440","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013440","url":null,"abstract":"With the present Coronavirus disease (COVID-19) pandemic, Internet of Things (IoT)-based health monitoring devices are precious to COVID-19 patients. We present a real-time IoT-based health monitoring system that monitors patients' heart rate and oxygen saturation, the most significant measures necessary for critical care. Specifically, the proposed IoT-based system is built with Arduino Uno-based hardware and a web application for retrieving the patients' health information. In addition, we implement the Autoregressive Integrated Moving Average (ARIMA) method in the back-end server to predict future patient measurements based on current and past measurements. Compared to commercially available devices, the system's results are adequately accurate, with an acceptable RMSE for predicted value.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133702016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A BERT-based Model for Cloud Filling from Remote Sensing Data","authors":"Trong-Nghia Nguyen, Thanh Van Le","doi":"10.1109/NICS56915.2022.10013400","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013400","url":null,"abstract":"Remote Sensing data are commonly used in analysis of geographical characteristic. One of the most frequent problems in Remote Sensing is the loss of data due to cloud-covered pixels. While traditional approaches took inspiration from DINEOF, recent advancements in Deep Learning and Machine Learning prompted a new paradigm to this well-known problem. In this paper, we proposed a Bert-based model for the cloud filling task named RoBERTaCF. Our method is compared to a recent Funk-SVD and our experiments indicated that RoBERTaCF achieved better performance in filling cloud scheme from remote sensing data.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114733000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harvested Energy Maximization for Secure Full-Duplex Multi-User MIMO Networks with Non-linear Energy Harvesting","authors":"Le Ty Khanh, Xuan-Xinh Nguyen, H. H. Kha","doi":"10.1109/NICS56915.2022.10013326","DOIUrl":"https://doi.org/10.1109/NICS56915.2022.10013326","url":null,"abstract":"This paper is concerned with secure communication in multiuser full-duplex (FD) communication systems with simultaneous wireless information and power transfer (SWIPT). In the considered system, an FD base station (BS) equipped with multiple antennas communicate with both uplink users (ULUs) and downlink users (DLUs) at the same time and in the same frequency while the set of energy harvesters can scavenge energy from ambient radio frequency signals. To keep the uplink and downlink information signals confidential from the energy harvesters which can be potential eavesdroppers and to optimize the harvested energy, we aim at designing the precoders and the transmit artificial noise covariance at the BS and the transmit precoders at ULUs to maximize the harvested energy subject to the constraints of the required minimum quality of service (QoS) and transmit power at the transmitters. Due to high nonconvexity and nonlinearity of the formulated design problem, we develop an iterative algorithm based on successive convex programming (SCP) by seeking appropriate surrogate functions to recast the original optimization problems into convex optimization ones. Then, the simulation results are conducted to evaluate the system performance in terms of the sum harvested energy for different system setups.","PeriodicalId":381028,"journal":{"name":"2022 9th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}