Professional Documents
Culture Documents
NGHIN CU C BN V NG DNG
CNG NGH THNG TIN
TM TT BO CO
LI NI U
Ban ch o
Trng ban
GS.VS. ng V Minh
Thnh vin:
GS.TSKH. Trn Vn Nhung
GS.TSKH Dng Ngc Hi
GS.TSKH. Hong Vn Kim
GS.TS. V c Thi
GS.TS. ng Kim Vui
PGS.TS. Mai H
PGS.TS. Trn Vn Lng
Ban T chc:
Trng ban:
GS.TS. V c Thi
Ph trng ban:
PGS.TS. Nguyn Ngc Bnh
PGS.TS. Hynh Quyt Thng
TS. Nguyn i Vit
Thnh vin:
PGS.TS. Phm Vit Bnh
PGS.TS. Li Khc Li
PGS.TS. Trn Vn Lng
PGS.TS. Nng Ton
Ban T chc a phng:
Trng ban:
PGS.TS. Phm Vit Bnh
Thnh vin:
PGS.TS. Li Khc Li
TS. V c Thi
TS. Nguyn Vn To
ThS. Mai Ngc Anh
CN. Lng Th Hong Dung
ThS. Nguyn Xun Hng
TS. ng Th Oanh
Ban Chng trnh:
Trng ban:
GS.TS. ng Quang
Ph trng ban:
PGS.TS. Trn nh Khang
PGS.TS. Trn Vn Lng
Trng H CNTT&TT
H Thi Nguyn
Trng H CNTT&TT
Trng H CNTT&TT
Trng H CNTT&TT
Trng H CNTT&TT
Trng H CNTT&TT
Trng H CNTT&TT
Vin CNTT
Trng HBK H Ni
Vin CH&THD
5
PGS.TS. Ng Quc To
PGS.TS. L Mnh Thnh
PGS.TS. Hunh Quyt Thng
PGS.TS. L Huy Thp
GS.TS. V c Thi
PGS.TS. Nguyn nh Thc
TS. Nguyn nh Thun
PGS.TS. Trn an Th
PGS.TS. o Thanh Tnh
PGS.TS. Nng Ton
TS. Nguyn Hu Trng
PGS.TS. Nguyn Thanh Tng
PGS.TS. V Thanh T
TS. Nguyn Anh Tun
GS.TS. Phan Th Ti
PGS.TS. Nguyn nh Vit
TS. Phan Cng Vinh
TS. H Tng Vinh
PGS.TS. Trnh nh Thng
TS. L S Vinh
TS. Phm Trn V
Ban K thut
Trng ban
PGS.TS. Trn Vn Lng
Thnh vin
ThS. Phan Mnh Thng
ThS. Nguyn Th Thu D
Ban Th k
Trng ban
TS. ng Th Oanh
Thnh vin
TS. Nguyn Vn Hun
ThS. L Hng Linh
Ban Xut bn
Trng ban
PGS.TS. Nng Ton
Thnh vin
ThS. Phan Th Qu Anh
ThS. Trnh Hin Anh
Vin CNTT
i hc Hu
Trng HBK H Ni
Trng H Lc Hng
Vin CNTT, HQG-HN
Trng H KHTN Tp.HCM
Trng H CNTT
Trng H KHTN Tp.HCM
Hc vin KTQS
Vin CNTT
Trng H Nha Trang
Trng H Lc Hng
Trng HKH Hu
Trng H CNTT
Trng HBK Tp.HCM
Trng H Cng ngh
Trng H Nguyn Tt Thnh
Vin Tin hc Php ng
Trng H SP 2 H Ni
Trng i hc Cng ngh
Trng HBK Tp.HCM
Vin CH&THD
Trng H Lc Hng
Vin C hc v Tin hc ng dng
Trng H CNTT&TT
Trng H CNTT&TT
Trng H CNTT&TT
Vin CNTT
Tp ch TH&KH
Vin CNTT
Khoa CNTT & TT, H Cn Th, 2Trung tm cng ngh phn mm Tp. Cn Th
Based on the Bayesian network approach and the Markov chain, this paper proposes
models to forecast the propagation of Bacillus Necrosis Pangasius (BNP) disease on the
shark catfish in a pond, ponds in the same area, and along river routes. The key factors
considered in these models are: care and management conditions of fish farmers (such as
water changes, nutrient levels, stocking densities); the environment change including
physical factors (such as temperature, salty) and chemical factors (such as pH, H2S, CO2,
heavy metals); the health status of fishes; and pathogens. Using these models, aquaculture
experts can consolidate their judgments about the pathogenesis and the transmission of
BNP, and especially can recommend fish farmers some ways to prevent BNP effectively.
There are two main tendencies in Medical Imaging Informatics. One is the
development of core theory in the information technology itself and the other one is the
9
use of technologies in applications for health improving. In recent years, the deployment
of Health Information Technology applications in some hospitals has enhanced the
quality of administrative management and actively supported the diagnosis and treatment
tasks. Currently, some large hospitals in the developed countries have deployed Picture
Archiving and Communication Systems aiming to further enhance the quality of the
diagnosis and treatment tasks of the doctor at the hospital. In this paper, we will present
an architectural model of the PACS System, a system to perform the mission of
collecting and archiving photos created from creating photo devices. Such images include
X-ray images (digital X-ray machine), Computerized Tomography images, MRI images
(Magnetic Resonance Machines), ultrasound images (Ultrasound Machines) and some
recent results at the medical Informatics of the Institute of Applied Mechanics and
Informatics in the deployment of applications that combine PACS System with
Radiology Information Sytems to manage files and support the diagnosis and treatment
tasks of patients in the Department of Radiology.
applied in the classification problem. From the background knowledge, we improve and
apply this model to solve the problem of virus detection. In the training phase, virus
samples in the virus warehouse are extracted their features and trained to create the
Entropy Model. In the detection process, the Entropy Model is used to recognize virus
based on the corresponding features of a checked file.
H Cng ngh Thng tin & Truyn thng Thi Nguyn, 2HV K thut Qun s
11
H Cng ngh Thng tin & Truyn thng, H Thi nguyn, 2Military University of
Science and Technology
parameter for training algorithm. The research proposes to apply algorithm of reducing
gradient to Kohonen complex neural network improving nonlinear distortion in order to
enhance quality-improved effect of M-QAM digital information system.
As a crucial step in metagenomic analysis, the binning of reads aims to classify the
reads into different groups that represent individual species or closely related organisms.
This paper presents a new binning approach for metagenomic reads basing on species
abundances and not requiring any reference databases. The proposed approach consists of
three steps in which a fuzzy k-mediods method is applied in its major step for the
classification of l-mers. Our experiments show that the proposed approach can work with
short read datasets and achieves better overall results than a recent abundance-based
binning method.
13
Information comes in many shapes and sizes. The amount of natural language text
that is available in electronic form is truly staggering, and is increasing every day. In
order to improve the quality of machine translation systems, the constitution of
multilingual resources (dictionaries, written corpora and bilingual lexicons) is essential
and fundamental. But these resources are not yet available publicly for all language pairs,
especially with Asean languages. And the researches in natural language processing for
Asian languages are currently on the edge of major developments. This paper aims to
describe an approach on the automatic extraction of bilingual named entities (NE) pairs
by projection from a small bilingual Vietnamese-French corpus. We present in this paper
how to extract the bilingual NE pairs by identifying the relationships between the
bilingual sentence pairs in the bilingual corpus. The experimentations show that this
novel approach has identified NE-pairs with the higher accuracy (90.65%) in our
Vietnamese-French NE automatic extraction task.
Bi ton phn lung giao thng a phng tin tuyn tnh trn mng
giao thng
Trn Ngc Vit, Trn Quc Chin, Nguyn nh Lu, Nguyn Mu Tu
762 Trn Cao Vn, Thanh Kh, Nng
A graph is a powerful mathematical tool applied in many fields such as
transportation, communication, informatics, economy, In an ordinary graph, the
weights of edges and vertexes are considered independently where the length of a path is
14
the sum of weights of the edges and the vertexes on this path. However, in practice,
weights at a vertex are not the same for all paths passing this vertex, but dependent on
coming and leaving edges. This paper develops a model of extended network that can be
applied to modelize many practical problems more exactly and effectively. The maximal
concurent multicomodity linear flow problem with minimal cost and the optimal
multicomodity linear flow problem are defined with the linear programming model. Dual
problems and related questions are dealt with. The results from this study will be a
theoretical base for effective algorithms that solve the problems above in the following
works [7] and [8].
i hc ng Nai, 2i hc Khoa hc Hu
Vin cng ngh thng tin, 2Khoa in t, H k thut cng nghip, H Thi Nguyn
-Bi ton cy khung chi ph nh tuyn nh nht (Minimum Routing Cost Spanning
Tree - MRCST) l mt bi ton ti u th c nhiu ng dng trong lnh vc thit k
mng v trong tnh ton sinh hc. Trong trng hp tng qut, bi ton MRCST c
chng minh l thuc vo lp bi ton NP-kh. gii cc bi ton MRCST thc tin
kch thc ln ngi ta thng s dng cc thut ton metaheuristic, chng hn nh thut
ton leo i, thut ton tm kim a phng, thut ton tm kim tabu, cc thut ton di
truyn, cc thut ton by ong, Mi thut ton nh vy u s dng mt chin lc
tm kim cy khung ln cn ring. Bi bo ny trnh by phn tch tng quan cc chin
lc tm kim cy khung ln cn hin bit v vic s dng chng trong cc thut ton
metaheuristic gii bi ton MRCST. Cc kt qu thc nghim c trnh by trong bi
bo ny cho thy cc chin lc tm kim cy khung ln cn gi vai tr trung tm trong
vic khm ph khng gian li gii v c nh hng quyt nh n cht lng ca li gii
thu c bi cc thut ton metaheuristic.
16
phng thc m, cng nh cc lut suy dn ca n trn m hnh CSDL hng i tng
(HT) vi thng tin m v khng chc chn
c th thc hin trn cc h thng tin c kch thc ln. c nhiu phng php rt
gn thuc tnh c xut, tuy nhin cc phng php ny u tm tp rt gn trn ton
b tp i tng ban u. Trong bi bo ny, chng ti xut phng php la chn tp
i tng i din t tp i tng ban u cho bi ton rt gn thuc tnh trn h thng
tin khng y . V kch thc tp i tng i din nh hn kch thc tp i tng
ban u nn phng php ca chng ti gim thiu ng k thi gian thc hin cc thut
ton tm tp rt gn
18
Wide WLANs such as city or campus WLAN support a large number of mobile
users to access Internet applications from where they want and still remain connected to
the Internet whilst on the move. Due to dynamic relocation, WLAN has some problems
of location management and network resource management. Mobility prediction may
produce mobility information of mobile users as well as accurate estimation of network
resource demands at future time. Therefore, mobility prediction has attracted recently a
great deal of research interests toward efficient location management and resource
management. Most previous approaches have utilized individual movement history to
predict. A few other works have investigated group of users with similar movement
behaviors. Most of them have some deficiencies. The first group of mobility prediction is
only based on individual mobility behaviors so the lack of information on personal
movement profile may cause false prediction. The second group of mobility prediction
applies similar mobility behaviors of multiple users to facilitate the predicting in the case
of new users or ones with movements on novel paths. However, they do not distinguish
between regular movements and random movements of mobile users, so they may cause
significant degradation in prediction accuracy. Towards these two deficiencies of
previous approaches, this paper is proposed as a combination of sequential pattern mining
and clustering. Sequential pattern mining is used to discover frequent mobility patterns to
deal with noise of random movements in the entire body of mobile users histories.
Whilst, clustering technique take full responsibility for partition mobile users into groups
of similar mobility behaviors to deal with the lack of information on personal profile. We
have conducted experiments to investigate the efficiency of the proposed mobility
prediction approach. Its the combination of sequential patterns mining and clustering
that makes the mobility prediction accuracy so improvable.
Vin Cng ngh thng tin, 2H CNTT v Truyn thng - H Thi Nguyn
In this paper we propose numerical techniques for solving some boundary value
problems (BVPs) for a fourth order semilinear equation. They are based on the reduction
of the fourth order problems to the solution of a sequence of BVPs for the Poisson
equation. It is an extension of our method developed by ourselves recently for linear
fourth order BVPs. The performed numerical experiments show the very fast
convergence of the proposed techniques.
19
i vi cc doanh nghip lun cn kim sot tt quy trnh hot ng, trnh mt
kim sot cht lng v tht thot ti sn. Quy trnh ISO gip cc doanh nghip hn ch
tht thot v kim sot tt quy trnh cng nh cht lng cng vic. im yu ca ISO
l: thc hin cng vic trn giy t, rt kh tm kim, vic lin kt d liu l khng d
dng. Cng ngh ha hot ng doanh nghip da trn ISO ang l xu th pht trin rt
mnh. u im l: tin ch v tm kim, qun l d liu tt, gim ti s dng giy t, lin
kt d liu cc phng ban. Hin ti, cc gii php cng ngh & phn mm thng ch p
ng mt b phn nht nh, m cha c giao tip vi k ton trn cng mt c s d liu.
Core-data M&D l gii php c s d liu SQL server, c pht trin nhm tm trung
tt c d liu ca mt doanh nghip bao gm c d liu k ton.
In evolutionary computation, crowding is a popular technique to handle multimodal optimization problems, which include many possible local or global solutions. In
our previous publication, we proposed a new direction-based evolutionary algorithm,
called DEAL. It was shown working effectively on nonlinear optimization problems. In
this paper, we extend further DEAL towards the area of multi-modality by applying
fitness sharing, and called the new version as CrowdingDEAL. We validated
CrowdingDEAL with a wide range of 15 popular test problems. The obtained results
indicated a strong performance of CrowdingDEAL in dealing with multi-modality and in
comparison with other algorithms.
20
xut ci tin hiu nng mng Peer-to-Peer Chord cho tin trnh gia
nhp v ri i ca cc nt mng
Phm Thnh Nam, Nguyn Th Minh Huyn
H Cng Ngh Thng Tin v Truyn Thng Thi Nguyn
Ngy nay, cc m hnh mng ngang hng peer-to-peer (P2P) c tnh hn lon, tp
hp bao gm nhiu thnh phn nt mng di ng tham gia kt ni vo mng. Cc nt
mng di ng ny thng khng n nh v c thi gian tham gia kt ni ngn. S khng
n nh ca cc nt mng dn n vic suy gim nghim trng hiu nng tm kim d
liu ca cc mng P2P. Trong cc mng Peer-to-Peer (P2P) c cu trc c t chc theo
cc bng bm phn tn DHT th vn quan trng l vic tm kim d liu chnh xc v
nhanh nht. Khi mng n nh thp c ngha l thi gian gia nhp v ri i khi mng ca
cc nt din ra trong thi gian ngn dn ti cn phi tm ra cc c ch qun l m bo
duy tr hiu nng tm kim d liu n nh trong mng. Trong bi bo ny, chng ti
xut mt thut ton mi cho vic qun l cc nt gia nhp v ri i khi mng khi mng
Peer-to-Peer c t chc theo thut ton Chord DHT trong mng c n nh thp.
Thut ton ca chng ti xut tin hnh cp nhp tc thi bng nh tuyn ca cc nt
mng khi c s gia nhp/ri i mi ca cc nt. Cc kt qu m phng ca thut ton
ch ra rng thut ton ca chng ti ci tin ng k hiu nng mng Chord trong iu
kin mng c n nh thp.
i hc ng Thp, 2i hc Khoa hc Hu
21
DFCB: Data Fusion and Chain-Based Routing Protocol for EnergyEfficient in Wireless Sensor Networks
Nguyn Duy Tn1, Nguyn nh Vit2
1
A chief challenging task for designing routing protocols in wireless sensor network
(WSN) is how to use energy efficiency. To solve this problem, in this paper, we propose
to combine data fusion and chain-base routing (DFCB) protocol. In DFCB designing
consists of two main works. In the first work, the chain-based routing technique is used to
connect sensor nodes into a chain, which communicates with only the closest neighbor, a
like PEGASIS. In the second work, we fuse one or more packets to generate a less than
size resultant packet base on the Slepian-Wolf and Dempster-Shafer theory. Simulation
results show that the network lifetime of our proposed protocol can be improved about
370% and 20% compared to low-energy adaptive clustering hierarchy (LEACH) and
power-efficient gathering in sensor information system (PEGASIS), respectively.
22
Nguyen Tat Thanh University, 2Informations Technology College, 3Duy Tan University,
This work is about the processing of regular queries over the very large XML trees
which are fragmented over a shared-nothing parallel database system (SNPDS for short).
SNPDS is a system of machines connected to each other by high-speed links. The
fragments which are sub-trees of XML tree are stored on machines. The partial
processing approach is the most popular and famous algorithm for processing regular
queries on SNPDS. The query is sent to and evaluated partially at each machine. The
parallelism reduces the waiting time, but there are many unnecessary operations to be
computed. Our algorithm is also based on the partial evaluation, but unnecessary
operations are restrained by tree index and structural indexes. Two types of unnecessary
fragment operations are defined. The unnecessary fragment operations: type 1 are
unreachable operations that are determined by pre-processing on the tree index. The
unnecessary operations type 2 return no result. These are restrained by pre-processing on
the structural indexes of the fragments. Since the tree- and the structural indexes are
small, our algorithm overcomes the existing algorithms according to criteria of the
waiting time or the total processing and communication cost
There have been many research papers improved LEACH routing algorithm to
prolong the lifespan of wireless sensor networks but that is not enough that we still have
to improve LEACH routing protocol to get better result in WSN lifetime. In this paper,
we improve LEACH routing protocol to use energy efficiency to prolong the lifetime of
wireless sensor networks, called LEACH-FFC (Free to Fix LEACH Cluster). LEACH FFC implements the clusters in two different states are: freely to fix clustering and after a
number of rounds, when the number of clusters in WSN is proved to be optimal number,
BS will fixed that number of clusters at that round and the next rounds, there is no reclustering in WSN to save energy. The selection of Cluster Heads then will be performed
by criteria function, called fc. fc function selects CH based on the consideration of
residual energy of nodes required greater than the average residual energy of the whole
network and the distance from the candidate Cluster Head node to BS [3]. The simulation
results show that our proposed algorithm is approximate 12% energy efficiency more
than LEACH - DE algorithm and 22% compared to LEACH algorithm in terms of energy
saving and wireless sensor networks lifetime.
23
Gom cm d liu web video theo hng tip cn early fusion cho
c trng vn bn
Nguyn Quang Phc, Nguyn Hong T Anh, Ng c Thnh, L nh Duy4
Multimedia Communications Laboratory, University of Information Technology HCM
Gom cm kt qu tm kim video l bi ton nhm gip ngi dng xc nh c
cc video clip m h quan tm mt cch hiu qu hn. Cc nghin cu gom cm video
trc ch yu tp trung khai thc tng t c trng hnh nh ca d liu video
cho chnh xc khng cao. Tuy nhin, bn cnh c trng hnh nh th c trng vn
bn cng mang nhiu thng tin ng ngha gip tng chnh xc gom cm. Do , trong
bi bo ny, chng ti xut mt phng php kt hp a c trng vi cch kt hp
mi cho bi ton gom cm video nhm tng chnh xc gom cm. Cc th nghim c
tin hnh trn kt qu tm kim video ca YouTube vi phng php th nghim theo
cch kt hp mi cho kt qu tt hn.
26
Phm Minh Chun , L Thanh Hng2, Trn nh Khang2, Cao Xun Bch2
1
cao v tc x l nhanh. H thng qua thc nghim t chnh xc cao v thn thin
vi ngi dng l minh chng r nt cho tnh thc t ca nghin cu.
29
Trong tra cu nh da trn ni dung, phn hi lin quan l cng ngh thng c
s dng thu hp khong cch gia c trng mc thp v khi nim mc cao. Mc
ch ca n l ci thin hiu qu tra cu thng qua vic hc vi cc iu chnh ca ngi
dng trn cc kt qu tra cu. Mc d c quan tm rng ri, nhng cng ngh phn hi
lin quan thng phi i mt vi mt vi hn ch nht nh. Mt trong s cc hn ch r
nht l i hi ngi dng phi lp i lp li mt s bc trc khi thu c cc kt qu
tm kim c ci thin. iu ny to ra qu trnh khng hiu qu v thiu hp dn cho
cc ng dng tra cu trc tuyn. Trong bi bo ny, mt m hnh phn hi lin quan hiu
qu cho tra cu nh da trn ni dung c xut. Trc ht, mt ng bao quyt
nh c hc thng qua SVM lc cc nh trong c s d liu. Sau mt o
tng t cho vic sp hng cc nh c gn nhn s c tnh ton da trn vic tch
hp gia gi tr ca hm phn lp SVM vi gi tr ca hm tng t ca nh c gn
nhn so vi nh tuy vn. Cc kt qu th nghim trn tp d liu chun ch ra tnh
hiu qu ca phng php xut.
Vin Cng ngh thng tin, 2H Cng ngh thng tin & truyn thng
30
ton c pht trin nhm mc tiu lit k cc th con ng vin tt hn, kim tra tnh
ph bin ca cc th con hiu qu hn.
31
Trong cc h thng mng CNTT hin nay tng la l mt thit b khng th thiu
cho mc ch bo m an ton cho h thng. Vi vai tr l thit b kim sot tt c cc
kt ni vo ra mt mng nn tng la c t v tr kt ni duy nht gia mng cn
c bo v vi mng bn ngoi. Nng cao tc phn loi v x l gi tin trn firewall
s nng cao c thng lng trao i d liu gia mng ni b vi mng bn ngoi v
trnh c tnh trng qu ti ca firewall trong cc trng hp c th. lm c iu
ny th mt tng c s dng l da vo c im ca b lc hay tnh cht ca
cc lung thng tin i qua firewall nhm hn ch thp nht cc thao tc trn mt gi tin
trong qu trnh phn loi, chnh l vic loi b sm gi tin. Mt s k thut loi b
sm gi tin trong h thng tng la c xut nh: k thut to tp gi tr ph
(Field Value Set Cover - FVSC), k thut s dng cy nh phn t hiu chnh theo di
tin t (Self Adjusting Binary Search on Prefix Length-SA-BSPL), k thut s dng cy
nh phn t hiu chnh da trn thng k theo di tin t(Statistical Splaying Filters
with Binary Search on Prefix Length - SSF-BSPL). Trong bi bo ny chng ti thc
hin phn tch cc im mnh yu ca cc k thut ni trn v xut k thut loi sm
gi tin theo hai chiu da trn cy cn bng. K thut xut c so snh vi cc k
thut khc bng thc nghim.
Khoa Cng Ngh Thng Tin, i Hc in Lc, 2Vin Tin hc Php Ng, HQG H
Ni, 3UMMISCO 209, Institut de Recherche pour le development
32
33
s dng m hnh tnh ton chi ph pht hnh s dng yu t ri ro da trn m hnh tnh
ton tin cy. Pht trin m hnh Pham-Nordmann-Zhang [4, 6], chng ti tin hnh
thc nghim vi mt b d liu thc t NTDS [4]. Trn c s kho st cc s liu thc t
ti M v Vit Nam, chng ti tin hnh phn tch v nh gi nh hng ca cc tham
s nh chi ph cha li, chi ph ri ro, thi gian cha li trung bnh n thi im pht
hnh ti u T^* v tng chi ph pht hnh ti u E[T^*].
Trong bi bo ny, t tnh hnh nc bin dng din bin phc tp hin nay. Chng
ti xy dng mt m hnh m phng hin trng ngp a hnh do nc bin dng vng
ng bng sng Cu Long, th im ti tnh Bc Liu. Qu trnh ngp a hnh do nc
bin dng c m phng trn b mt v din tch a hnh ca tnh Bc Liu chy trn
nn cng c m phng GAMA. Kt qu m phng cho ra cc bn ngp v bn
nguy c ngp, thng k din tch ngp. M phng qu trnh ngp a hnh do nc bin
dng qua cc giai on trong qu kh (t nm 1992 n nm 2012). a ra kch bn m
phng ngp a hnh do nc bin dng trong tng lai (t nm 2013 n nm 2050).
36
Khoa Cng ngh Thng tin, i hc Bc Liu, 2Nhm nghin cu lin ngnh DREAMCTU/IRD, i hc Cn Th
37
Mt gii php chuyn i giao din tnh Web RIA sang giao din
di ng
Nguyn c Huy, Nguyn Vn V, Trn Minh Trit
H Khoa hc T nhin - HQG Tp.H Ch Minh
Trong nhng nm gn y, lnh vc cng ngh Web c s pht trin mnh m, c
bit l s pht trin ca cc cng ngh RIA(Rich Internet Application) nh: Adobe
Flash/Flex, Microsoft Silverlight, JavaFX. Vi cng ngh RIA, cc nh pht trin Web c
th d dng hn trong vic pht trin nhiu ng dng c tnh tng tc cao v c giao
din tin dng v p hn trn mi trng web. Tuy nhin vic ti s dng ti nguyn
ca mt ng dng trn mt nn tng c th chuyn i sang mt nn tng khc l mt
vn kh khn. Bn cnh , cng vi s pht trin ca cc thit b di ng trn cc nn
tng nh Windows Phone, iOS, Android... ngng cng mnh m. V vic chuyn i t
ng hoc bn t ng t cc ng dng c tn ti trc t cc nn tng Web
RIA sang cc nn tng trn cc thit b ng gn nh l khng th thc hin c. Do ,
38
39
thc do tnh bo ton ca php tru tng ha. Tuy nhin, s dng cc k thut tru
tng i khi lm mt i tnh chnh xc trong phn tch tnh kh t do mt s trng thi
b b qua, c bit khi c s xut hin ca cc vng lp. Mt s gii php hin thi
gii quyt vn ny bng cch s dng cc tp b chn di v cc hm xp hng
(ranking function). Gii php ca chng ti gii quyt vn theo mt cch tip cn khc,
khng s dng cc tp b chn di v hm xp hng. Thay vo , chng ti da trn
vic kim tra cc iu kin trn th chng trnh (program graph) ng vi h thng
thc, cc iu kin ny c kim tra t ng i vi m hnh tru tng.
40
Vin Cng Ngh Thng Tin, 2Hc Vin Cng ngh Bu chnh Vin thng
41
Khoa Cng ngh Thng tin - Trng Cao ng Cng nghip Hu, 2Huawei
Technologies, European Research Center, 3Hc vin Cng ngh Bu chnh Vin thng
In elastic optical networks (EON), the signal channels are transmitted on the
lightpath with their carriers variable as well as their flexible spectral width. The bit rate of
each channel can also be able to be flexibly changed from 10 Gb/s to 400 Gb/s or beyond.
Furthermore the channels spacing can be 50, 25, 12.5GHz, and even 6.25GHz. Thus the
impact on transmission performance due to the linear dispersion and nonlinear effects on
interconnecting optical paths in elastic optical networks are critical. We present in this
paper the impact of the linear dispersion with regard to the performance of the elastic
optical networks operating under burst switching. An optimal burst routing algorithm is
then proposed to minimize such impacts. The results obtained by simulation show that
the proposed novel algorithm reduces the broadening due to the linear dispersion about
46% for the mesh network topologies. Keywords - Elastic Optical Networks, OBS,
Physical Impairment Routing, Linear Dispersion, Network Simulation. Tm tt. Trong
mng truyn ti quang EON (Elastic Optical Networks) , tn hiu d liu c truyn qua
mng bng cc knh quang c rng ph thay i linh hot. Tc d liu ca mi
knh c th thay i t 10 Gb/s n 400 Gb/s, hoc c th ln hn, khong cch gia cc
knh l 25 GHz, 12.5 GHz hoc 6.25 GHz. Khi tc truyn dn trn cc knh tng v
khong cch gia cc knh nh, nh hng ca cc hiu ng tuyn tnh cng nh phi
42
43
Trong nhiu lnh vc thc t hin nay nh phn loi ri ro ngn hng, phn loi vn
bn, chun on bnh ang xut hin ngy cng nhiu d liu mt cn bng, trong s
lng cc phn t thuc mt lp chim s lng ln hn rt nhiu so vi lp cn li. i
vi nhng d liu ny, s khng cn bng nh hng rt ln n hiu qu phn lp, c
th phn loi c th thu c chnh xc cao trn lp a s nhng d dng b phn lp
nhm cc phn t thuc lp thiu s. D liu khng cn bng l mt trong nhng vn
kh v ang rt c quan tm trong lnh vc hc my v khai ph d liu. Nhiu gii
php c xut gii quyt vn trn, trong , thut ton SMOTE l mt
phng php ni ting v ph bin trong cc phng php sinh thm phn t nhn to
mi cho lp thiu s. Bn cnh , chng ti nhn thy trong mt s b d liu mt cn
bng c nhiu thuc tnh d tha, khng cn thit, khng c ngha d bo. Mt s bi
bo co ch ra nu loi b nhng thuc tnh ny i th s lm tng chnh xc trong
phn lp d liu mt cn bng. T , chng ti pht trin mt phng php mi kt
hp gim s thuc tnh v sinh thm phn t trong phn lp d liu mt cn bng. Cc
kt qu thc nghim trn b d liu thc t v phn lp ung th l leukemia v coloncancer cho thy phng php mi ca chng ti phn lp chnh xc hn vi o Gmean so vi phng php s dng d liu gc, SMOTE, hoc ch s dng la chn thuc
tnh. Thm vo , chng minh tnh hiu qu ca phng php mi, chng ti thc
nghim i vi b d liu chun mt cn bng breast-p, ionosphere, v satimage c ly
t ngun UCI. Nhng kt qu ny cng cho thy rng phng php ca chng ti t
c kt qu tt hn vi o G-mean. ng thi, vi vic s dng nh gi t-test ch ra
rng cc kt qu trn c ngha thng k vi p-value nh hn 0.05.
Nhiu phng php pht hin, phn loi v theo di i tng chuyn ng trong
video giao thng c pht trin trong nhng nm gn y. Mc ch ca bi vit ny l
44
trnh by phng php m s lng xe trong vng quan st gm: Th nht, tin hnh ci
tin phng php m hnh nn hn hp Gaussian thch ng tt vi s thay i nh sng
v nn ng. Th hai, kt hp phng php pht hin i tng chuyn ng bng
phng php hn hp Gaussian thch ng, lm sch khung hnh bng phng php loi
b bng v theo di, m s lng i tng da trn lung quang hc. Chng ti tin
hnh th nghim m xe vi phng php xut trn cc tp d liu video thu c t
mt s tuyn ng H Ni v ph cn. Kt qu thu c tng i chnh xc vi mt
xe thp trn cc ng cao tc.
Trng Cao ng ngh Vit - c Vnh Phc, 2H Cng ngh - HQG H Ni, 3i
hc S phm Thi Nguyn
Abstract Trong dch my thng k, kho d liu song ng l mt trong nhng nhn
t quan trng quyt nh cht lng ca h dch. xy dng kho d liu song ng,
ngoi phng php th cng truyn thng, ngi ta s dng cc phng php ging hng
cu t ng nhm rt trch mt cch t ng cc cp cu song ng t cc vn bn song
ng. Cht lng ca h dch t l thun vi kch thc kho d liu song ng. Vic xy
dng kho d liu song ng ln bng phng php th cng thng rt tn km thi gian
v chi ph. V vy, trong bi bo ny, chng ti xut mt phng php ging hng mi.
Phng php ny m rng t phng php ca Ma (2006) bng cch s dng bng cm
t song ng v xc sut tng ng c hc t ng t kho ng liu song ng tnh
tng t ca cc on vn bn tng ng. Chng ti tin hnh th nghim trn tp cc
vn bn song ng Anh-Vit. Cc kt qu th nghim cho thy phng php ny cho kt
qu kh quan v ng tin cy.
Ban C yu Chnh ph, 2H Cng ngh- HQG H Ni, 3H CNTT&TT Thi nguyn
B phn Nghin cu v Pht trin, Cng ty Samsung, 2Hc vin Cng ngh BCVT,
3
Trng CKT Thi Nguyn
Khoa CNTT H S phm K thut Hng Yn, 2Vin CNTT & TT HBK HN
46
Vin Cng ngh Thng tin, Vin Hn lm KH&CN Vit Nam, 2HSP- H Thi Nguyn
Many problems of mechanics and physics are posed in unbounded (or infinite)
domains. For solving these problems one typically limits them to bounded domains and
find ways to set appropriate conditions on artificial boundaries or use quasi-uniform grid
that maps unbounded domains to bounded ones. Differently from the above methods we
approach to problems in unbounded domains by infinite systems of equations. Some
initial results of this method are obtained for some 1D nonstationary problems. Recently,
we have developed the method for an elliptic problem in a semistrip. Using the idea of
Polozhii in the method of summary representations we transform infinite system of threepoint vector equations to infinite systems of three-point scalar equations. In this paper we
continue to develop the method for a strongly mixed elliptic boundary value problem in a
47
In this paper, we propose and deploy a new method to optimize the power
consumption of embedded systems based on reverse engineering and the processor reconfiguration. Basing oneself on the analysis of the power consumption of the
components in the processor, we build formulas for evaluating the power consumption
and propose the optimization model. Techniques of the reverse engineering are used to
decompile machine code into assembly code of a processor. We analyze assembly code
and the processor profile to find the functional units that are not used. Relying on the
analyzing results, the processor is reconfigured to optimize the power consumption.
Phn tch xc sut nghn ca thut ton ci tin giao thc nh tuyn
AODV da trn tc t di ng bng phng php m phng
Cung Trng Cng1, V Thanh T2, Nguyn Thc Hi3
1
Trng Cao ng Cng nghip Hu, 2Trng HKH, H Hu, 3H Bch khoa H Ni
48
49
i theo thi gian, phn tch cc im nh da trn mu sc v phn tch c tnh lay
ng ca m la pht hin v cnh bo chy. Lc x l gm cc bc: 1) phn
tch s bin i gia hai nh lin tip s dng phng php i snh theo h s tng
quan pht hin vng chuyn ng; 2) phn tch mu sc cc im nh trn vng
chuyn ng xc nh vng tim nng l m la, k thut phn tch bc ny s
dng phn lp Bayes trong khng gian RGB; v 3) phn tch c tnh lay ng ca m
la da trn s bin i v kch thc bao ca vng tim nng khng nh v a ra
cnh bo. Kt qu th nghim cho thy xut trong nghin cu ny gim c t l
cnh bo nhm v thi gian x l trung bnh mi nh so vi mt s nghin cu trc,
ng thi c th pht hin v cnh bo trong thi gian khong 20ms ngay sau khi m
chy xut hin trong khun hnh
H Lc Hng, 2Vin Cng ngh thng tin, VAST, 3Vin C hc v Tin hc ng dng
Pht hin lut chui lin kt giao dch t c s d liu thi gian
Trng c Phng1, Vn Thnh2
1
Bi bo gii quyt bi ton pht hin cc lut chui lin kt giao dch t c s d
liu tc v thi gian, lut ny a ra d bo c th v thi gian xy ra gia cc s kin
trong mt chui. Thut ton SITARM c xut da trn vic pht trin thut ton
CHARM, mt thut ton tm tp ph bin hiu qu, kt hp ca s thi gian nhm gii
quyt bi ton trn. Kt qu th nghim thut ton mi SITARM cho thy tnh kh thi v
trin vng ca thut ton ny
50
Pht trin thng tin ngn iu cho h thng tng hp ting ni da trn
HMM dnh cho cc thng bo hng khng
Trn Lm Qun1, Phan ng Hng2, inh Anh Tun2, V Tt Thng2
1
Vin NC hng khng Vit Nam - Vietnam Airlines, 2Vin Cng ngh thng tin-VAST
51
i hc Hng Vng, Vit Tr, Ph Th, 2Vin Cng ngh thng tin - VAST
H Nha Trang, 2HV Hi Qun - Nha Trang 3Trng S quan khng qun - Nha Trang
52
a dng th trong ting Vit cn nhng hn ch nht nh, c v phng php lun v ng
dng. Vi mong mun gp thm nhng nghin cu v lnh vc mi m ny, bi bo s
da trn mt s phng php x l ngn ng t nhin trong ting Anh cng b, a ra
mt tip cn cho vic nh gi tng t trong vn bn ting Vit bng cch kt hp
mt s nh gi tng t trong vn bn ting Anh. Trn c s , bi bo a ra cc
phn tch, nh gi i vi kt qu th nghim c trin khai trn mt s ti liu
nht nh.
Khoa HTTT Kinh T - Hc Vin Ti Chnh, 2VNU, 3Hc Vin Bo ch v Tuyn truyn
Vin Cng ngh thng tin, HQG H Ni, 2 H Cng ngh thng tin v Truyn thng,
HTN, 3 H Cng nghip Tp. H Ch Minh
53
Phng php lc thch nghi trong tch ting tim v ting phi
Phng Trung Ngha, Nguyn Thnh Trung, Nguyn Th Dng, on Th Hin
i hc Cng ngh Thng tin v Truyn thng
Nghe ting tim l phng php khm lm sng truyn thng v r tin. Tuy nhin
ting tim thu m vo my tnh thng b nh hng bi ting phi v ngc li. Bi bo
ny trnh by phng php s dng b lc thch nghi vi thut ton c lng trung bnh
phng ti thiu tch ting tim v ting phi t m thanh thu c t ng nghe. Sau
khi so snh hiu qu ca b lc vi cc tham s thc nghim khc nhau, bi bo a
ra b tham s thc nghim ti u tch ting tim v ting phi. Cc kt qu nghin cu
c th c p dng trong cc h thng h tr chn on lm sng dng ting tim.
54
Vin Cng Ngh Thng Tin, Vin Hn Lm Khoa Hc v Cng Ngh Vit Nam, 2i hc
Nng lm TP. H Ch Minh, 3Cng ty C phn T vn xy dng VietDelta, 4Cng ty C
phn Phn mm v Cng ngh ng dng, 5i hc Giao thng Vn ti
55
Phng php trit nhiu tn hiu s dng lut cc tiu ha pht hin li
(minFDR) trn c s bin i wavelet ri rc dch khng i
Huy Khi, V Thy Hng
i hc Cng ngh thng tin v Truyn thng
K thut trit nhiu tn hiu s dng bin i wavelet c nghin cu nhiu
trn th gii. Hu ht cc nghin cu tp trung vo cch c lng v t ngng mm
trn c s ca Iain Johnstone v David Dohono. Bi bo ny trnh by phng php trit
nhiu tn hiu s dng lut cc tiu ha tc pht hin li (minFDR rule)trn c s bin
i wavelet ri rc dch khng i(TIDWT).
B mn Tin hc, i hc Cng on, 2Vin Cng ngh thng tin, Vin Hn lm khoa
hc v Cng ngh Vit Nam, 3Trung tm Tin hc, i hc S phm H Ni 2
The report proposed the concept of positive Boolean dependency in the database
model of block form, proved the equivalence of three types derived: logically derived,
derived by block, derived by block not exceeding two elements, the necessary and
sufficient criteria of the derived types, the members problem... In addition, the properties
related to this concept while the block degenerate into relationship has been stated and
proved here.
56
Vin CNTT - Vin Hn lm KH&CN VN, 2Vin CNTT - HQG HN, 3Hc vin Cnh st
57
rt gn thuc tnh u thc hin trn cc bng quyt nh c nh, khng thay i. S
dng o khong cch, trong bi bo ny chng ti xut cc thut ton tm tp rt
gn ca bng quyt nh khi b sung v loi b i tng. V khng phi thc hin li
thut ton trn ton b tp i tng nn cc thut ton xut gim thiu ng k
phc tp v thi gian thc hin.
So snh hiu sut m ha gia CPU v GPU s dng thut ton AES
Ng Minh Qun, Phm Vn Thun, Nguyn Anh Tun
i hc Cng ngh thng tin, HQG-HCM
Ti liu ny trnh vic so snh hiu sut x l ca CPU v GPU trong vic m ha
mt khi d liu u vo c kch thc khc nhau s dng thut ton m ha nng cao
AES (Advanced Encryption Standard). Vic m ha c thc hin trn my tnh Core i5,
2.5GHz, Ram 4GB, GPU Gefore 610M. Cc kt qu c s dng xy dng biu
biu din t sut tng ca thi gian khi kch thc khi d liu tng ln gia CPU
v GPU
58
59
Bo co trnh by v cch song song ha thut ton Smith Waterman, thut ton bt
cp trnh t trong tin-sinh hc, theo hng ng cho ca ma trn khi to. Bi bo m
t vic ng dng cng ngh OpenCL hin thc song song thut ton Smith-Waterman
bng cch tnh ton cng lc cc ma trn con hnh vung kch thc k theo hng ng
cho, ng thi xc nh hm s bin thin theo k da trn kt qu thc nghim t c.
Bn cnh , t kt qu t c trong qu trnh thc nghim, bi bo xc nh c
gi tr k ph hp nht thi gian thc hin song song thut ton Smith-Waterman l ti
u nht.
Tng hiu sut tnh ton thut ton phn cm K-Means trn nn tng
CUDA
Trn Tng1, Nguyn Th Thy Anh2, on Duy Trung1
1
Vin Ton ng dng & Tin hc, HBK H Ni, 2Khoa HTTTQL, Hc vin Ngn Hng
One of the most difficult issues in the algorithms of Data Mining that having to
handle a large volume of data, large computational space. Parallel Computing is an
effective solution to solve these problems. In the world there are a lot of research to
improve the performance of the algorithms of Data Mining such as improved algorithm,
applied hardware, software to increase performance ... One of the most useful tools of
Parallel Computing are widely used today as technology GPU ( Graphic Processing
Unit ) to solve these problems. In this paper, we propose using graphics processors to
improve speed calculated in K -Means algorithms.
60
Trng Trung hc ph thng Chuyn H Long - Qung Ninh, 2IOIT Vit Nam
61
Hin nay, nc ta c khong 30 bnh vin tuyn trung ng v 300 bnh vin a
khoa, chuyn khoa tuyn tnh, c tnh mi nm c ti hn 150 triu lt khm bnh dn
n tnh trng h thng bnh vin nc ta lun trong tnh trng b qu ti. Trc thc
trng ny, B y t v ang trin khai rt nhiu phng n nhm gii quyt thc trng
trn. Tuy nhin do nhiu nguyn nhn khc nhau nh ngun nhn lc cn hn ch, trang
thit b phc v cn thiu thn, ch yu l thit b c in, thng thng do cha th
p ng c yu cu chm sc sc khe cho bnh nhn mt cch tt nht. Mt thc t
khc cng cho thy, vi s pht trin v mi mt ca x hi th nhu cu chm sc sc
khe cng ngy mt tng cao, chi ph chm sc cho sc kho gia tng theo cp s
nhn trong thp k va qua. Nhng ngi cao tui c bc s chm sc v theo di
thng xuyn thng qua nhng du hiu sc kho. T , hnh thnh mt th trng
rng ln nhm cung cp nhng gii php o c nhng du hiu quan trng ca sc kho.
xc nh c ng thi nhp tim v nhit c th ngi th khng c nhiu thit b
thc hin c cng vic ny. Bn cnh , vic theo di lin tc nhng du hiu sc
khe cng nh vic chm sc cho nhiu bnh nhn cng mt lc gy ra rt nhiu kh
khn cho bc s; Nhm gii quyt vn ny, mt gii php c a ra l ng dng
cng ngh mng cm bin khng dy theo di lin tc cc thng s sc khe ca
nhiu bnh nhn. Mc tiu ca thit k l thit k mt h thng vi chi ph thp, hot
ng hiu qu v chnh xc, cc thit b gim st c kh nng theo di ng thi thng s
sc khe ca nhiu bnh nhn mt cch thng xuyn v cnh bo trn thit b gim st
ca bc s khi c nhng du hiu bt thng. Thng s nhp tim v nhit c th s
c o c mt cch chnh xc vi mt thit b tch hp cc cm bin nhp tim v cm
bin nhit , kt qu thu thp c s c hin th thng qua mt chng trnh c
thit k trn my tnh. Ti Vit Nam, hin cha c n v no trong nc nghin cu,
thit k thit b hot ng nh nu trn. Cc thit b tng ng hin c u phi
nhp khu t nc ngoi vi gi thnh cao, trong khi nhu cu iu tr ca bnh nhn l
rt ln. Vic thit k thnh cng thit b ny s mang li nhng li ch to ln v mt khoa
hc v kinh t.
Bi bo ny trnh by vic ng dng ba thut gii l thut gii by ong (BA), thut
gii di truyn (GA) v thut gii K_means vo gii quyt bi ton phn cm d liu. c
bit tc gii xut thut gii kt hp gia cc thut gii by ong, thut gii K_means v
62
thut gii di truyn gi tt l BKG nhm lm tng hiu nng ca thut gii by ong cho
vn phn cm d liu. Khi thc nghim trn 10 b d liu c ly t ngun ICU v
SHAPE cho thy thut gii xut BKG cho kt qu tt hn nhiu so vi cc thut gii
cn li.
i hc Nng , 2i hc Hu
Thut ton gn nhn theo ng bin trong xy dng atlas gii phu b
xng ngi
L Thi Kim Nga1, Nguyn Quang Thnh2, Phm B My3, Nguyn Vn Hun4,
Hunh Cao Tun5, L Hng Qun5
1
H Qui Nhn, 2 HSP H Ni 2, 3Vin Cng ngh thng tin, 4 H Cng ngh thng tin
&Truyn thng, 5H Lc Hng, 5HSP H Ni
63
Vin Cng ngh thng tin- VAST, 2Vin Cng ngh thng tin, HQG H Ni
64
Trng C ng kinh t - k thut Vnh Phc 2Cc KTNV I- B cng an, 3H Lc Hng
Bi bo ny xut cc thut ton pht hin thng tin du trong nh nh phn (bng
k thut Least Significant Bit) vi t l nhng thp, ng thi cc thut ton cng rt hiu
qu cho vic xc nh m php trong qu trnh phn tch cc H mt m kha i xng.
66
67
Khoa CNTT H Khoa hc Hu, 2TT CNTT H Cng nghip Thc phm Tp.HCM
Thnh phn quan trng nht ca mt Intrusion Detection System (IDS) l thnh
phn nhn bit tn cng. n nay, c hai cch tip cn chnh nhn bit tn cng l
nhn bit trc tip qua cc thng tin dng mt on k t (thng gi l signature) c
trng ca chng trnh tn cng hoc nhn bit gin tip qua cc th hin ca tn cng
trn h thng (thng gi l nhn bit qua hnh vi). Nhn bit qua signature thng chnh
xc, t bo ng sai nhng nhiu bo ng thiu khi m c bin i v hon ton mt
kh nng nhn bit vi cc m c mi. Nhn bit qua hnh vi thng t chnh xc hn
(nhiu bo ng sai v bo ng thiu), nhng li c th nhn bit virus mi, ngay c khi
chng ta cha bit v n [4][8][10]. Pht trin h thng nhn bit qua hnh vi cng
phi hp vi nhn bit bng signature l xu hng nghin cu pht trin hin nay. Vi h
thng nhn bit tn cng qua hnh vi, h thng cn phi c hun luyn t trc v cc
hnh vi xu v bnh thng sau c th phn loi cc hnh vi m n s gp phi.
Tuy nhin, h thng s gp phi kh nhiu trng hp, khi m hnh vi ri vo vng m,
kh xc nh l xu hay bnh thng do tnh cht rt a dng ca hot ng ca mt h
thng ln hnh vi tn cng. Do , cng tc hun luyn thng c thc hin vi s
gip ca con ngi. Nhng qu trnh hun luyn ny khng bao gi l y v h
thng IDS nhn chung cha c kh nng t hun luyn, t trng thnh m khng cn s
can thio, hng dn ca con ngi. Mc tiu ca trnh by ny l xut phng n cho
php h thng IDS c th t lm giu kin thc trong qu trnh thc hin nhim v cnh
bo ca mnh. Vi kh nng t thu nhp thm kin thc, h thng IDS s nhn bit ngy
mt chnh xc hn, bit nhiu loi hnh hot ng mng hn theo cng vi thi gian
trin khai.
69
Trng thi mt nhm, mt m l thng tin hu ch cho bit mt ngi ang trang
thi ng hoc thc. Vic pht hin trng thi ny c th c ng dng trong nhiu bi
ton khc nhau nh pht hin li xe ng gt, nghin cu v cc biu cm trn khun
mt Trong phm vi bi bo ny, chng ti xut mt phng php s dng mng
noron SOM c gim st xc nh trng thi nhm hoc m ca mt ngi. Chng ti
thc nghim m hnh mng noron xut trn hai tp d liu c cng b. Tp
d liu th nht l cc nh mt ngi c tch ra t nh khun mt thu c trong cc
video thc t. Tp d liu th hai l tp cc c trng c trch chn t nh mt ngi.
Kt qu th nghim trn hai tp d liu c chnh xc cao hn so vi mt s nghin
cu khc cng b.
Khoa CNTT Hc vin k thut qun s, 2Vin CNTT, Vin KH v Cng ngh qun s
70
c lng quan h khng chc chn gia hai khong thi gian bt nh
da trn l thuyt kh nng
H ng Cao Tng
Cao ng S phm H Ni
Thng tin v thi gian thng mang t nhiu yu t khng chc chn. Trong nhiu
ng dng ca tr tu nhn to, chng hn khi cn phi x l cc truy vn trong c s d
liu thi gian, ngi ta cn phi xc nh quan h gia hai phn t thi gian ngay c khi
d liu v chng khng c bit mt cch chnh xc. Trong [7], Ryabov c lng
71
quan h khng chc chn gia hai khong thi gian bt nh bng phng php xc sut.
Trong [3], Dubois xut tip cn x l quan h khng chc chn gia cc im thi
gian da trn l thuyt kh nng. Bi nghin cu ny xut mt cch c lng quan
h khng chc chn gia hai khong thi gian bt nh da trn l thuyt kh nng nh
vo php bin i biu din ma trn sang biu din vc t ca quan h khng chc chn
gia hai khong thi gian c gii thiu trong [9]. ng dng trong c s d liu thi
gian c trnh by phn cui bi bo th hin ngha ca phng php c lng
c xut.
di nc v so snh vi mng c hun luyn bi thut ton lan truyn ngc (Back
Propagation BP)
73
74
Xy dng m hnh trang tri chn nui gia sc thng minh da trn
kin trc hng dch v v mng cm bin khng dy
Nguyn Trnh Nguyn1, Xun Thiu2, Ng Hong Huy3,
Nguyn Tu Trung3, Nguyn c Hi4
1
Internet bng n, cng ngh thng tin pht trin, hin nay, c nhiu ng dng thng
minh. Cc ng dng thng minh hin mang n nhng thay i ng k trong cuc sng
ca chng ta. Hin nay, cc ng dng ny c mong i rng vic p dng cng ngh
trong nng nghip c th tng gi tr thng d v nng sut ca nng nghip vi vic s
dng khc nhau ca n. Bi bo ny xut m hnh nng tri thng minh cho vic kim
sot v qun l nng tri gia sc thi gian thc bt k thi im no, ni no da trn
kin trc hng dch v v mng cm bin khng dy. Trong , mng cm bin khng
dy v camera c ci t ti nng tri gia sc thu thp v kim sot mi trng
trang tri gia sc v thng tin hnh nh trong vic chn nui gia sc nh nh sng, m,
nhit v CO2. Cc thng s mi trng v thng tin hnh nh c gi v my ch,
ni ci t ng dng qun l nng tri kim sot v iu khin cc tin ch nng tri
gia sc v cnh bo ngi dng trong nhng trng hp khn cp. Vic qun l nng tri
c th thc hin ti bt k lc no, ni no khi ng dng trn my ch c th c truy
cp qua Internet hay in thoi thng minh. M hnh c p dng th nghim ti trang
tri nui ln ca hp tc x C ng Sn ty H ni.
75
76
77
78
CH DN
Nguyn Nht An 73
Ng Trn Anh 55
Nguyn c Anh 29
Nguyn Hong T Anh 26
Nguyn Th Thy Anh 60
Nguyn V Kiu Anh 28, 73
Nguyn Xun Anh 40
Trn Ngc Anh 46, 73
Trn Th Anh 64
Trinh Th Vn Anh 27
Trnh Hin Anh 39
V Th Lan Anh 77
ng Quang 19, 47
H c i 65
Nguyn Thi n 34, 67
Hunh Hi u 68
Phm Vn t 43
on Vn Ban 30
Cao Xun Bch 27
Quc Bo 66
Lm Hoi Bo 9
Trn Minh Bo 68
Nguyn Quang Bc 73
on Duy Bnh 60
L Hu Bnh 42
L Nguyn Bnh 42
Nguyn Ngc Bnh 48
Nguyn Thanh Bnh 24
Phm B Bnh 12
Phm Vit Bnh 61, 69
H Vn Canh 66
Khu Minh Cnh 35
Nguyn Vn Cn 44
Nguyn Vit Chnh 15
Nguyn Th Minh Chu 52
Th Kim Chi 24
Trn Quc Chin 14, 60, 63
Phm Minh Chun 27
Nguyn Vn Chung 66
Phm Ngc Cng 52
Cung Trng Cng 48
Dng T Cng 55
L B Cng 10
Nguyn Hng Cng 34
Nguyn Mnh Cng 43
Phm Vn Cng 46
V Ch Cng 20
Hunh B Diu 39
Ngo Manh Dung 23
Trn Th Dung 68
Chung Khnh Duy 59
ng Khng Duy 77
L nh Duy 26, 28, 73
Nguyn Tin Duy 15
Trinh Thanh Duy 14
Lu Hng Dng 18
Nguyn c Dng 61
Nguyn Th Dng 54, 55, 62
Nguyn Vit Dng 62
Phm Quang Dng 57
Trn Tin Dng 52
H i Dng 49
L Khnh Dng 53
Trn Huy Dng 64
H Mnh o 22
Trn V i 72
inh Quang t 39
Nguyn Tun ng 51
Nguyn Vn nh 59
V Vn nh 17
Nguyn Vn on 58
L Ph 19
Nguyn Trnh ng 57
Trn Mnh ng 43
Dng Anh c 28, 65, 73
Dng Minh c 65
ng Trn c 9, 77
ng Vn c 52
Nguyn Huy c 33
Trng nh Minh c 35
on Th Hng Giang 25
Ng Trng Giang 30
Nguyn c Giang 43
Nguyn Long Giang 9, 17, 57
Nguyn Tin Giang 18
V L Qunh Giang 48
Nguyn Khc Gio 77
Nguyen Thuc Hai 23
Vo Hoang Hai 23
Hong Vnh H 45
Nguyn Thi H 62
Nguyn Th Thu H 41
Trn Hnh 50
Trn Quang Ho 66
L Mnh Hi 25
Nguyn c Hi 55, 75
Nguyn Thc Hi 21, 48
Phan Nguyn Hi 70
Phm Vn Hi 17
Trn Th Thanh Hi 25, 29, 47
Trng H Hi 19
V Hi 25, 29, 47
Hong Hu Hnh 56, 76
on Hu Hu 20, 70
Dng Vit Hng 37
Nguyn Th Hng 54
V Thy Hng 56
Mai Th Hin 52
Trn ng Hin 43
inh Trng Hiu 59
L c Hiu 61
L Trung Hiu 23, 74
Nguyn c Hiu 73
Trn c Hiu 9
on Th Hin 54
Nguyn Vn Hin 50, 62
V Thanh Hin 28, 73
80
Nguyn c Mn 39, 42
L Quang Minh 20, 53, 70
Trnh Ngc Minh 68
Chu Vn Nam 76
inh Vn Nam 13
L Nam 42
L Hi Nam 12
Nguyn H Nam 53
Phm Thnh Nam 21
V Xun Nam 33
L Thi Kim Nga 63
Nguyn Th Ngn 71
Ron Hi Ngn 59
Huynh Huu Nghia 27
Lng Vn Ngha 16
Nguyn c Ngha 16
Phng Trung Ngha 54, 62
Thanh Ngh 34
Lng Thi Ngc 21
Nguyn Thng Ngc 46
Nguyn Th Bo Ngc 73
Phm Vn Ngc 12
o Anh Nguyn 34, 67
Nguyn Phm Bo Nguyn 28, 73
Nguyn Trnh Nguyn 55, 75
L ng Nhc 53
Trn Trng Nhn 75
V Duy Nht 32
Nguyn Minh Nht 39
Vn Nhn 35
Nguyn Xun Nht 16
Marilleau Nicolas 32
Ioannis Parissis 24
Hunh Cng Php 71
Hunh Nht Pht 56
Dng Phc Phn 31
Bi Thanh Phong 68
Phm Hng Phong 59
Hunh Tho Phc 71
La Hu Phc 31, 40
Nguyn Quang Phc 26
81
V c Thi 25
Cng Thnh 67
Vn Thnh 50
Ng c Thnh 26, 28, 65, 73
Nguyn Quang Thnh 63
on Th Thanh Tho 12
Nguyn Xun Tho 59
Trn Th Ngc Tho 49
L Mnh Thnh 63
L Huy Thp 66, 66
Truong Cong Thang 9
Cp Phm nh Thng 73
on Vn Thng 16
Hunh Quyt Thng 34, 42
L Quyt Thng 36
Nguyn Trng Thng 39, 43
Nguyn Vn Thng 71
Trnh nh Thng 56
V Chin Thng 61
V Tt Thng 51
V c Thi 9, 57, 64, 72
Vn Thin 39
Nguyn Hong Duy Thin 13
Trn Khi Thin 28, 73
Xun Thiu 55, 75
V Vn Tho 41
ng Xun Th 12, 43
Phm c Th 52
Hong Vn Thng 65
Phm Th Thm 66
Phm Vn Thun 58
L c Thun 10
V Chnh Thu 54
Th Thanh Thy 20, 70
Phm H Thy 76
Bi Th Th 39
Phm Th Thng 11
L Trung Thc 19
Vn Tin 28
Trnh Nht Tin 43
Phan Tun Tip 38
82
V Hong T 36
V Ngc Cm T 36
V Thanh T 21, 21, 48
H ng Cao Tng 71
Nguyn Thanh Tng 10, 33, 57
Phm Hu Tng 48
Trn Tng 60
Trng Tin Tng 52
Nguyn Quang Uy 11
Nguyn Mu Uyn 69
Le Thi Thuy Van 37, 58
Dng Th Thy Vn 18
L Th Hng Vn 10
Mc Vn Vin 70
Nguyn i Vit 20, 24, 41, 70
Nguyn nh Vit 22, 65
Trn Ngc Vit 14, 63
Trng Xun Vit 36
H Tng Vinh 32
L Vn Vinh 13
Nguyn Trn Quc Vinh 75
Nguyn Vn Vinh 45
Phan Cng Vinh 50, 56, 62
Hong Vn V 42
Chu B V 25
L Anh V 23, 74
Nguyn Hong V 73
Nguyn Tn Tn Tht V 24, 41
Nguyn Vn V 38
Trng Tin V 39
Ng Minh Vng 49
Bi Th Thanh Xun 26
Trn Th Xun 13
Phm Cng Xuyn 10
Dng Th Hi Yn 76
Triu Yn Yn 36
83