Papers by Tran Uyen Thy Vu
Ucla Center For Southeast Asian Studies, Feb 12, 2004
The talk was delivered in Vietnamese with English translation provided by Prof. Thu-Huong Nguyen-... more The talk was delivered in Vietnamese with English translation provided by Prof. Thu-Huong Nguyen-vo. Below is Nguyen-vo's partial translation followed by Vu's original Vietnamese language text. An English report of the lecture, written by Ms. Rashaan Meneses of the UCLA Center for Southeast Asian Studies, can be found at http://www.international.ucla.edu/cseas/article.asp?parentid=8550. Since the lecture was illustrated and annotated with numerous slides of the artist's work, the lecture text does not capture the totality of the presentation.
EBG antennas have received intensive attention and large investigations during the last decade. T... more EBG antennas have received intensive attention and large investigations during the last decade. Their main drawbacks such as narrow bandwidth, high side lobes, lack of knowledge on input impedance are now quite well studied and partly remedied. Therefore, real industrial applications for these antennas can now be envisaged. In addition to the engineering applications, the EBG antennas have contributed to unify the theoretical studies of several disconnected domains, such as leaky-wave, Fabry-Perot (FP) or stratified medium. The objective of this paper is to present the state of the art on the main properties and applications of the EBG/FP antennas in one hand, and to the bridge theoretical approaches that can be employed for leaky and EBG antennas in the other hand.
Journal of Low Power Electronics, 2014
In this paper, we present a design and an evaluation of two power management modes that reduce th... more In this paper, we present a design and an evaluation of two power management modes that reduce the energy consumption of OpenFlow switches. First, we define two new low power modes: SLEEP PORT and SLEEP SWITCH, which reduce energy consumption in cases where packets on port or switches are absent. Second, we present a Wake on LAN (WOL) method for OpenFlow Switches to wake up Ethernet ports or the whole switch from inactive states. Finally, we describe our design, experimental results and performance evaluations. Our results show that the control SLEEP PORT mode on a switch might save about 9.8% power consumption per port, and up to about 60% of total power consumption of the switch with SLEEP SWITCH mode. In addition, we will implement this method to Openflow Switch bases on NetFPGA-10 Gigabit in the future.
Vietnam has attracted a large amount of foreign investment in recent years, and even more foreign... more Vietnam has attracted a large amount of foreign investment in recent years, and even more foreign products are imported. Foreign companies operating in this rapidly developing market have a huge need for reliable marketing information, and the marketing research industry has taken off since 1992. There are only a few full-service type research suppliers, all foreign, but there are over 30 suppliers of various specialized services. Many suppliers are local, with some of their own clients, but also subcontracting with foreign research suppliers for local fieldwork.To local companies, marketing research usually means simply calling up connections and asking them for their opinion, or talking to one's distributors. They use such information for background knowledge, not for decisions about marketing. Foreign companies are leading the development of demand for modern marketing research. They conduct or commission modern marketing research projects, and they use the results to help them decide how to structure their marketing activities.On both the supply and demand side then, the rapid growth of the marketing research industry is currently being driven by foreign companies. However, some local companies are learning fast, and certainly all of the local employees in foreign and joint venture companies have absorbed the concepts of using and doing modern marketing research. The industry looks set to continue its rapid growth and broaden its base in the years immediately ahead.
Combustion and Flame, 2015
The characteristics of tip openings in premixed bunsen flames have been studied experimentally by... more The characteristics of tip openings in premixed bunsen flames have been studied experimentally by measuring OH radicals from laser-induced fluorescence and tip curvatures from chemiluminescent images. Results showed that the tip opening occurred at a constant equivalence ratio and was independent of the jet velocity in propane/air mixtures. The observation of a local extinction phenomenon of the negatively stretched flame due to the flame curvature could not be consistently explained based on flame stretch or the Karlovitz number, since they varied appreciably with the jet velocity. The concept of the local Karlovitz number (Ka L) was introduced, which is defined as the ratio of the characteristic reaction time in the normal direction for a stretched flame to the characteristic flow time in the tangential direction for the stretched flame. The local Karlovitz number maintained a constant value under tip opening conditions, irrespective of the jet velocity. Tip opening occurred at a reasonably constant local Karlovitz number of about $1.72 when the nitrogen dilution level in propane and n-butane fuels was varied.
SpringerPlus, 2015
Data centers play an important role in our daily activities. The increasing demand on data center... more Data centers play an important role in our daily activities. The increasing demand on data centers in both scale and size has led to huge energy consumption that rises the cost of data centers. Besides, environmental impacts also increase considerably due to a large amount of carbon emissions. In this paper, we present a design aimed at green networking by reducing the power consumption for routers and switches. Firstly, we design the Balance Switch on the NetFPGA platform to save consumed energy based on Queue Engineering. Secondly, we design the test-bed system to precisely measure the consumed energy of our switches. Experimental results show that energy saving of our switches is about 30% - 35% of power consumption according to variation of input traffic compared with normal Openflow Switch. Finally, we describe performance evaluations.
American Journal of Embedded Systems and Applications, 2014
System Security means protecting confidentiality and integrity of input or output data to as well... more System Security means protecting confidentiality and integrity of input or output data to as well as the safety of the system. To meet stated security requirements, designers will need to add some special functions into the system. However, in several cases including high-throughput requirement, limited resource or trade-off between risks and costs, adding security functions should be taken into comprehensive consideration. This paper presents a method to enhance safety and update speed of the partially reconfigurable embedded systems based on FPGA is updated remotely via the Internet or from external storage devices such as a Compact Flash (CF) memory card.
Materials Science Forum, 2011
ABSTRACT Flame propagation characteristics of hydrogen/carbon monoxide/methane (or propane) air p... more ABSTRACT Flame propagation characteristics of hydrogen/carbon monoxide/methane (or propane) air premixed mixtures were studied in a constant pressure combustion chamber with a schlieren system at room temperature and elevated pressures. Unstretched laminar burning velocities and Markstein lengths of various mixtures were obtained by analyzing high-speed schlieren images. Also, the experimentally measured unstretched laminar burning velocities were compared with numerical predictions using the PREMIX code with a H-2/CO/C-1-C-4 mechanism, USC Mech II, developed by Wang et al. [23]. The two data from experiments and predictions show good agreement. The results indicate a significant increase in the unstretched laminar burning velocities with hydrogen enrichment and a decrease with the addition of hydrocarbons, whereas the opposite effects for the Markstein lengths were observed.
2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2012
ABSTRACT Rapid development of network makes it a very important and vulnerable part of every fiel... more ABSTRACT Rapid development of network makes it a very important and vulnerable part of every field of life. Many intrusion detection systems are developed to protect the network using signature-based matching technique. For connection oriented protocols, such as Transmission Control Protocol, the data should be reassembled before being scanned by the matching engine. Several techniques are introduced to reassemble TCP packets on FPGA. However, they have some disadvantages such as inefficient memory, unscalable system, and unsupported complex TCP connections. In this paper, we propose a multi-linked-list approach and a combination of edge buffering scheme for TCP reassembly, which helps detecting cross packets intrusion signatures. Our architecture not only supports TCP connections with up to 4 concurrent holes, but also uses memory more efficiently than others. The experimental results show that our system can hold about 256K connections simultaneously and support up to 46K out-of-sequence connections with only 64MB DRAM.
2013 International Conference on Computing, Management and Telecommunications (ComManTel), 2013
Intellectual Property protection on FPGAs is a major challenge for FPGA manufacturers. Adding sec... more Intellectual Property protection on FPGAs is a major challenge for FPGA manufacturers. Adding security features to the FPGA is not difficult but there is no consistency among the different manufacturers. Meanwhile, more features will increase resource costs and product prices, forcing users to pay for all these features even if they do not use them. As a result, decoders are often not integrated inside low-cost FPGAs. To protect an FPGA-based system of this kind, we must build separate security solutions. This paper presents the importance of bitstream security, including a number of attack scenarios and FPGA bitstream security methods. We introduced bitstream encryption and authentication solutions in partial reconfigurable embedded systems based on the MicroBlaze soft-core processor aimed at improving the flexibility of the system. The highlight of our solution is that it can be applied to systems that use embedded processor. This is most practical when using shared resources (soft-core processors, memory...) for different target applications.
2012 Fourth International Conference on Communications and Electronics (ICCE), 2012
ABSTRACT With the current evolution in run-time reconfigurable computing, runtime reconfigurable ... more ABSTRACT With the current evolution in run-time reconfigurable computing, runtime reconfigurable platforms are becoming increasingly viable. End users can download an updated version of a bitstream over the Internet and reconfigure the hardware platform partially without affecting the rest of the system like downloading and installing software. However, remote downloading and upgrading of bitstream is vulnerable to spoofing and replay attacks. This paper presents a framework to guarantee a secure and efficient remote updating of FPGA bitstream on runtime reconfigurable embedded platforms which consist of an embedded microprocessor and a runtime reconfigurable FPGA hardware. The framework addresses different issues including bitstream management, compression, encryption and authentication. A prototype system based on Xilinx Spartan-6 LX45 FPGA Altys board is used as a proof of concept for our framework.
2013 International Conference on Control, Automation and Information Sciences (ICCAIS), 2013
ABSTRACT Remote updating for hardware system via the Internet is an advantage of FPGA-based devic... more ABSTRACT Remote updating for hardware system via the Internet is an advantage of FPGA-based devices. Whereby the system designer or user can change or renew a part of his equipment. However, the problem of communication in an untrusted environment can lead to significant damage: The risks (cloning, reverse engineering) for the Intellectual Property (IP) of designers; damaging devices (from malicious) or losing the properties of the user (by trojan horse). In this paper, we proposed a safe and flexible protocol for secure remote update of run-time partial reconfigurable systems. Our proposed protocol can prevent cloning, reverse engineering, downgrade of the system and can protect key and license of IP cores. We have also proposed a new method to verify keys by using a SHA hash function.
Proceedings of the Second Symposium on Information and Communication Technology - SoICT '11, 2011
Abstract Nowadays, networking plays a very important role in businesses. The network infrastructu... more Abstract Nowadays, networking plays a very important role in businesses. The network infrastructure has been developing rapidly. Moreover, the invention of TCP protocol motivates a lot of network applications. Many of these applications require line rate ...
The 2012 International Conference on Advanced Technologies for Communications, 2012
Data centers play an important role in our daily activities. The increasing demand for data cente... more Data centers play an important role in our daily activities. The increasing demand for data centers in both scale and size has led to huge energy consumption. The cost and environmental impact of data centers increases due to large amounts of carbon emissions. One solution to this problem is to intelligently control the power consumption of switches used in data centers. This paper proposes an extension to OpenFlow switches to support different power saving modes. The extension includes defining new messages in Openflow standard and designing an OpenFlow Switch Controller (OSC) that is able to turn on/off switches and disable/enable ports. To prove the soundness of the proposed extension, the OSC has been used to control the NetFPGA based OpenFlow switches in the ECODANE framework. The results presented in this paper can aslo be used by the OpenFlow compliant switches manufacturer or by power aware research community.
2011 Second International Conference on Networking and Computing, 2011
Abstract Recent Network Intrusion Detection System (NIDS) utilizes more and more Regular Expressi... more Abstract Recent Network Intrusion Detection System (NIDS) utilizes more and more Regular Expression to describe malicious patterns existing in the content payload of packets. Many researches are investigated and several techniques are introduced to optimize ...
2014 2nd International Conference on Electronic Design (ICED), 2014
ABSTRACT
Journal of the Korean Physical Society, 2011
ABSTRACT Zn0.96Mn0.04O/ZnO coaxial nanocables were prepared in two steps: ZnO nanowires were synt... more ABSTRACT Zn0.96Mn0.04O/ZnO coaxial nanocables were prepared in two steps: ZnO nanowires were synthesized by using the standard thermal evaporation, followed by the depositon of Zn0.96Mn0.04 onto the surfaces of the prepared ZnO nanowires by using radio-frequency magnetron-sputtering system. The analysis by X-ray diffraction and X-ray photoelectron spectroscopy revealed that Mn was incorporated well into the wurtzite ZnO without forming any Mn oxide. The magnetic property measurements showed that the Zn0.96Mn0.04/ZnO nanocable was ferromagnetic at room temperature. The photoluminescence and the Raman spectroscopy measurements indicated that defects were formed in the shell layer of Zn0.96Mn0.04O, which favored the observed ferromagnetism.
International Journal of Hydrogen Energy, 2009
Uploads
Papers by Tran Uyen Thy Vu