SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Tran Nhan) "

Sökning: WFRF:(Tran Nhan)

  • Resultat 1-10 av 18
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Phu, Vu Dinh, et al. (författare)
  • Burden of Hospital Acquired Infections and Antimicrobial Use in Vietnamese Adult Intensive Care Units
  • 2016
  • Ingår i: PLOS ONE. - : PUBLIC LIBRARY SCIENCE. - 1932-6203. ; 11:1
  • Tidskriftsartikel (refereegranskat)abstract
    • Background Vietnam is a lower middle-income country with no national surveillance system for hospital-acquired infections (HAIs). We assessed the prevalence of hospital-acquired infections and antimicrobial use in adult intensive care units (ICUs) across Vietnam. Methods Monthly repeated point prevalence surveys were systematically conducted to assess HAI prevalence and antimicrobial use in 15 adult ICUs across Vietnam. Adults admitted to participating ICUs before 08: 00 a.m. on the survey day were included. Results Among 3287 patients enrolled, the HAI prevalence was 29.5% (965/3266 patients, 21 missing). Pneumonia accounted for 79.4% (804/1012) of HAIs Most HAIs (84.5% [855/1012]) were acquired in the survey hospital with 42.5% (363/855) acquired prior to ICU admission and 57.5% (492/855) developed during ICU admission. In multivariate analysis, the strongest risk factors for HAI acquired in ICU were: intubation (OR 2.76), urinary catheter (OR 2.12), no involvement of a family member in patient care (OR 1.94), and surgery after admission (OR 1.66). 726 bacterial isolates were cultured from 622/1012 HAIs, most frequently Acinetobacter baumannii (177/726 [24.4%]), Pseudomonas aeruginosa (100/726 [13.8%]), and Klebsiella pneumoniae (84/726 [11.6%]), with carbapenem resistance rates of 89.2%, 55.7%, and 14.9% respectively. Antimicrobials were prescribed for 84.8% (2787/ 3287) patients, with 73.7% of patients receiving two or more. The most common antimicrobial groups were third generation cephalosporins, fluoroquinolones, and carbapenems (20.1%, 19.4%, and 14.1% of total antimicrobials, respectively). Conclusion A high prevalence of HAIs was observed, mainly caused by Gram-negative bacteria with high carbapenem resistance rates. This in combination with a high rate of antimicrobial use illustrates the urgent need to improve rational antimicrobial use and infection control efforts.
  •  
2.
  • Nhan Vo, Van, et al. (författare)
  • On Communication Performance in Energy Harvesting WSNs Under a Cooperative Jamming Attack
  • 2020
  • Ingår i: IEEE Systems Journal. - 1932-8184 .- 1937-9234. ; 14:4, s. 4955-4966
  • Tidskriftsartikel (refereegranskat)abstract
    • In this article, we consider the system performance of an energy harvesting (EH) wireless sensor network in terms of reliable communications when subjected to a cooperative jamming attack. A set of strategically located nodes acting as cluster heads (CHs) transfer energy to the wireless sensors within range, forming a cluster. The sensors use this energy to transmit data to the CHs, which, in turn, deliver the information to a base station (BS) using nonorthogonal multiple access. The BS processes the collected information and synchronizes the operation of all CHs. Furthermore, there exist two adversaries, namely, a jamming attacker and an eavesdropper, who cooperate to attack the considered system. To protect against this attack, the CHs should be controlled by suitable power allocation coefficients obtained from the security constraints of the CHs. Using these constraints, closed-form expressions are derived to find the power allocation coefficients that will enable reliable and secure communication. In addition, we propose an interference channel selection policy for the sensor-to-CHs links and CHs-to-BS links to improve the reliability of communication while enhancing energy utilization. Finally, an algorithm for finding the optimal EH time is also proposed.
  •  
3.
  • Nhan Vo, Van, et al. (författare)
  • On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
  • 2019
  • Ingår i: IEEE Access. - United States : IEEE. - 2169-3536. ; 2:1, s. 1-30
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of relays. Specifically, the communication process is separated into two phases. In the first phase, the BS applies transmit antenna selection (TAS) to broadcast the signal to the relays and IoTDs by using non-orthogonal multiple access (NOMA). Here, the relays use power-splitting-based relaying (PSR) for EH and information processing. In the second phase, the selected relay employs the amplify-and-forward (AF) technique to forward the received signal to the IoTDs using NOMA. The information transmitted from the BS to the IoTD risks leakage by the relay, which is able to act as an eavesdropper (EAV) (i.e., an untrusted relay). To analyze the secrecy performance, we investigate three schemes: random-BS-best-relay (RBBR), best-BS-random-relay (BBRR), and best-BS-best-relay (BBBR). The physical layer secrecy (PLS) performance is characterized by deriving closed-form expressions of secrecy outage probability (SOP) for the IoTDs. A BS transmit power optimization algorithm is also proposed to achieve the best secrecy performance. Based on this, we then evaluate the system performance of the considered system, i.e., the outage probability and throughput. In addition, the impacts of the EH time, the power-splitting ratio, the numbers of BS antennas, and the numbers of untrusted relays on the SOP and throughput are investigated. The Monte Carlo approach is applied to verify our analytical results. Finally, the numerical examples indicate that the system performance of BBBR is greater than that of RBBR and BBRR.
  •  
4.
  • Tran, Dien M., et al. (författare)
  • High prevalence of colonisation with carbapenem-resistant Enterobacteriaceae among patients admitted to Vietnamese hospitals : Risk factors and burden of disease
  • 2019
  • Ingår i: Journal of Infection. - : Saunders Elsevier. - 0163-4453 .- 1532-2742. ; 79:2, s. 115-122
  • Tidskriftsartikel (refereegranskat)abstract
    • BackgroundCarbapenem-resistant Enterobacteriaceae (CRE) is an increasing problem worldwide, but particularly problematic in low- and middle-income countries (LMIC) due to limitations of resources for surveillance of CRE and infection prevention and control (IPC).MethodsA point prevalence survey (PPS) with screening for colonisation with CRE was conducted on 2233 patients admitted to neonatal, paediatric and adult care at 12 Vietnamese hospitals located in northern, central and southern Vietnam during 2017 and 2018. CRE colonisation was determined by culturing of faecal specimens on selective agar for CRE. Risk factors for CRE colonisation were evaluated. A CRE admission and discharge screening sub-study was conducted among one of the most vulnerable patient groups; infants treated at an 80-bed Neonatal ICU from March throughout June 2017 to assess CRE acquisition, hospital-acquired infection (HAI) and treatment outcome.ResultsA total of 1165 (52%) patients were colonised with CRE, most commonly Klebsiella pneumoniae (n=805), Escherichia coli (n=682) and Enterobacter spp. (n=61). Duration of hospital stay, HAI and treatment with a carbapenem were independent risk factors for CRE colonisation. The PPS showed that the prevalence of CRE colonisation increased on average 4.2 % per day and mean CRE colonisation rates increased from 13% on the day of admission to 89% at day 15 of hospital stay. At the NICU CRE colonisation increased from 32% at admission to 87% at discharge, mortality was significantly associated (OR 5•5, P < 0•01) with CRE colonisation and HAI on admission.ConclusionThese data indicate that there is an epidemic spread of CRE in Vietnamese hospitals with rapid transmission to hospitalised patients.
  •  
5.
  • Vo, Van Nhan, et al. (författare)
  • Performance Analysis of an Energy-Harvesting IoT System Using a UAV Friendly Jammer and NOMA Under Cooperative Attack
  • 2020
  • Ingår i: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 8, s. 221986-222000
  • Tidskriftsartikel (refereegranskat)abstract
    • In this article, we consider the information leakage and outage probabilities of a multiple-input single-output (MISO) energy-harvesting (EH) Internet of Things (IoT) system in which a multiantenna ground base station (GBS) transmits messages to legitimate IoT destinations (LIDs) with the help of IoT relays (IRs) using non-orthogonal multiple access (NOMA) in the presence of a malicious jammer (MJ) and eavesdroppers (EAVs). The communication protocol is separated into two phases. In the EH phase, the IRs harvest energy from a power beacon (PB). In the information transmission (IT) phase, the communication process is further divided into two subphases: 1) The GBS broadcasts signals to the IRs using NOMA. Simultaneously, the MJ sends interfering signals to attack the IRs while the EAVs steal the confidential signals from the GBS, in a process called a cooperative attack. On the other hand, to protect the legitimate communication, an unmanned aerial vehicle (UAV) is used as a friendly jammer to defend against the EAVs. 2) A selected IR employs the time-switching-based relaying (TSR) technique to forward the received signal to the LIDs using NOMA. Similar to the first subphase, the LIDs are subjected to a cooperative attack, and the UAV attacks the EAVs in return. The secrecy performance of this communication protocol is characterized by deriving expressions for the information leakage probabilities (ILPs) for the LIDs' signals. A UAV altitude optimization algorithm is also proposed to achieve the best possible secrecy performance. Furthermore, we evaluate the system performance by deriving closed-form expressions for the outage probabilities (OPs). Accordingly, an algorithm is proposed to guarantee both the secrecy and system performance (in terms of the ILPs and OPs). Monte Carlo simulations are presented to verify our analytical results.
  •  
6.
  • Vo, Van Nhan, et al. (författare)
  • Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays
  • 2018
  • Ingår i: IEEE Access. - 2169-3536. ; 6, s. 48247-48258
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.
  •  
7.
  • Aarrestad, Thea, et al. (författare)
  • Fast convolutional neural networks on FPGAs with hls4ml
  • 2021
  • Ingår i: Machine Learning: Science and Technology. - : IOP Publishing. - 2632-2153. ; 2:4
  • Tidskriftsartikel (refereegranskat)abstract
    • We introduce an automated tool for deploying ultra low-latency, low-power deep neural networks with convolutional layers on field-programmable gate arrays (FPGAs). By extending the hls4ml library, we demonstrate an inference latency of 5 mu s using convolutional architectures, targeting microsecond latency applications like those at the CERN Large Hadron Collider. Considering benchmark models trained on the Street View House Numbers Dataset, we demonstrate various methods for model compression in order to fit the computational constraints of a typical FPGA device used in trigger and data acquisition systems of particle detectors. In particular, we discuss pruning and quantization-aware training, and demonstrate how resource utilization can be significantly reduced with little to no loss in model accuracy. We show that the FPGA critical resource consumption can be reduced by 97% with zero loss in model accuracy, and by 99% when tolerating a 6% accuracy degradation.
  •  
8.
  • Huu, Tung Pham, et al. (författare)
  • Secrecy Performance Analysis of Cooperative NOMA Networks With Active Protection under alpha - mu Fading
  • 2019
  • Ingår i: 2019 12TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC 2019). - : IEEE. - 9781728123929 ; , s. 215-220
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we analyze the secrecy performance of a cooperative communication wireless system using non-orthogonal multiple access (NOMA) over alpha - mu fading channel. A new cooperative NOMA scheme is proposed to protect the confidential communication that is transmitted from a source to two users by the help of a relay under the monitoring of an eavesdropper (EAV). In particular, the legitimate user generates jamming signals to the EAV while the source transmits the signals to the relay and the source sends jamming signals to the EAV while the relay forwards the signals to the users. In order to evaluate the secrecy performance, the physical layer security (PLS) in term of the secrecy outage probability (SOP) for the active protection scheme (APS) is investigated and compared to that for a benchmark non-protection scheme (NPS). Simulation results show that the APS can effectively enhance the secrecy performance.
  •  
9.
  • Nhan Vo, Van, et al. (författare)
  • Secrecy Performance in the Internet of Things : Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers
  • 2020
  • Ingår i: Software, practice & experience. - Sweden : Springer. - 0038-0644 .- 1097-024X. ; 25:1, s. 193-210
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.
  •  
10.
  • Quach, Kha Gia, et al. (författare)
  • Dyglip: A dynamic graph model with link prediction for accurate multi-camera multiple object tracking
  • 2021
  • Ingår i: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. - 1063-6919. ; , s. 13779-13788
  • Konferensbidrag (refereegranskat)abstract
    • Multi-Camera Multiple Object Tracking (MC-MOT) is a significant computer vision problem due to its emerging applicability in several real-world applications. Despite a large number of existing works, solving the data association problem in any MC-MOT pipeline is arguably one of the most challenging tasks. Developing a robust MC-MOT system, however, is still highly challenging due to many practical issues such as inconsistent lighting conditions, varying object movement patterns, or the trajectory occlusions of the objects between the cameras. To address these problems, this work, therefore, proposes a new Dynamic Graph Model with Link Prediction (DyGLIP) approach to solve the data association task. Compared to existing methods, our new model offers several advantages, including better feature representations and the ability to recover from lost tracks during camera transitions. Moreover, our model works gracefully regardless of the overlapping ratios between the cameras. Experimental results show that we outperform existing MC-MOT algorithms by a large margin on several practical datasets. Notably, our model works favorably on online settings but can be extended to an incremental approach for large-scale datasets.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 18
Typ av publikation
tidskriftsartikel (14)
konferensbidrag (3)
rapport (1)
Typ av innehåll
refereegranskat (16)
övrigt vetenskapligt/konstnärligt (2)
Författare/redaktör
Tran, Hung (9)
Åkesson, Torsten (3)
Pöttgen, Ruth (3)
Schuster, Philip (3)
Krnjaic, Gordan (3)
Mullier, Geoffrey (2)
visa fler...
Larsson, Mattias (2)
Uhlemann, Elisabeth, ... (2)
Nilsson, Lennart E (2)
BRYNGEMARK, LENE (1)
Herde, Hannah (1)
Aarrestad, Thea (1)
Ngadiuba, Jennifer (1)
Pierini, Maurizio (1)
Wallin, Erik (1)
Loncar, Vladimir (1)
Ghielmetti, Nicolo (1)
Summers, Sioni (1)
Petersson, Christoff ... (1)
Linander, Hampus (1)
Iiyama, Yutaro (1)
Di Guglielmo, Giusep ... (1)
Duarte, Javier (1)
Harris, Philip (1)
Rankin, Dylan (1)
Jindariani, Sergo (1)
Pedro, Kevin (1)
Nhan Tran, (1)
Liu, Mia (1)
Kreinar, Edward (1)
Wu, Zhenbin (1)
Hoang, Duc (1)
Balador, Ali (1)
Elén, Einar (1)
Hanberger, Håkan (1)
Nguyen, Tuan V (1)
Abraham, Ajith (1)
Peterson, Stefan, 19 ... (1)
Berglund, Björn (1)
Wu, Di (1)
Bagni, Tommaso (1)
Olson, Linus (1)
Senatore, Carmine (1)
Hanberger, Håkan, 19 ... (1)
Dao, Van-Lan (1)
Tran, M.-T. (1)
Le, Huu, 1988 (1)
Ha, Dac-Binh (1)
Rydell, Ulf (1)
Shen, Boyang (1)
visa färre...
Lärosäte
Mälardalens universitet (9)
Lunds universitet (3)
Karolinska Institutet (3)
Uppsala universitet (2)
Linköpings universitet (2)
Chalmers tekniska högskola (2)
Språk
Engelska (18)
Forskningsämne (UKÄ/SCB)
Teknik (10)
Naturvetenskap (6)
Medicin och hälsovetenskap (3)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy