skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Nguyen, Linh"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. This paper investigates the problem of informative path planning for a mobile robotic sensor network in spatially temporally distributed mapping. The robots are able to gather noisy measurements from an area of interest during their movements to build a Gaussian process (GP) model of a spatio-temporal field. The model is then utilized to predict the spatio-temporal phenomenon at different points of interest. To spatially and temporally navigate the group of robots so that they can optimally acquire maximal information gains while their connectivity is preserved, we propose a novel multi-step prediction informative path planning optimization strategy employing our newly defined local cost functions. By using the dual decomposition method, it is feasible and practical to effectively solve the optimization problem in a distributed manner. The proposed method was validated through synthetic experiments utilizing real-world data sets. 
    more » « less
    Free, publicly-accessible full text available July 8, 2026
  2. The development of fifth-generation (5G) technology marks a significant milestone for digital communication systems, providing substantial improvements in data transmission speeds and enabling enhanced connectivity across a wider range of devices. However, this rapid increase in data volume also introduces new challenges related to transmission latency, reliability, and security. This paper introduces KyMLP-LDPC, a novel approach that integrates a multi-layer parallel LDPC (MLP-LDPC) algorithm with Kyber, a post-quantum cryptography scheme, to accelerate and enable reliable and secure transmission. MLP-LDPC partitions the LDPC parity check matrix into processing groups to streamline parallel decoding and minimize message collisions during transmission, thereby accelerating error correction operations. Kyber encrypts data preemptively to safeguard against potential attacks. The effectiveness of our proposed method is evaluated using both image data and signals transmitted through an additive white Gaussian noise communication channel. Evaluation results demonstrate that the proposed method achieves superior performance in terms of error correction capabilities and data security compared to existing approaches. 
    more » « less
  3. This paper presents a novel approach for classifying electrocardiogram (ECG) signals in healthcare applications using federated learning and stacked convolutional neural networks (CNNs). Our innovative technique leverages the distributed nature of federated learning to collaboratively train a high-performance model while preserving data privacy on local devices. We propose a stacked CNN architecture tailored for ECG data, effectively extracting discriminative features across different temporal scales. The evaluation confirms the strength of our approach, culminating in a final model accuracy of 98.6% after 100 communication rounds, significantly exceeding baseline performance. This promising result paves the way for accurate and privacy-preserving ECG classification in diverse healthcare settings, potentially leading to improved diagnosis and patient monitoring. 
    more » « less
  4. Homomorphic encryption (HE) algorithms, particularly the Cheon-Kim-Kim-Song (CKKS) scheme, offer significant potential for secure computation on encrypted data, making them valuable for privacy-preserving machine learning. However, high latency in large integer operations in the CKKS algorithm hinders the processing of large datasets and complex computations. This paper proposes a novel strategy that combines lossless data compression techniques with the parallel processing power of graphics processing units to address these challenges. Our approach demonstrably reduces data size by 90% and achieves significant speedups of up to 100 times compared to conventional approaches. This method ensures data confidentiality while mitigating performance bottlenecks in CKKS-based computations, paving the way for more efficient and scalable HE applications. 
    more » « less
  5. This paper aims to reconstruct the initial condition of a hyperbolic equation with an unknown damping coefficient. Our approach involves approximating the hyperbolic equation’s solution by its truncated Fourier expansion in the time domain and using the recently developed polynomial-exponential basis. This truncation process facilitates the elimination of the time variable, consequently, yielding a system of quasi-linear elliptic equations. To globally solve the system without needing an accurate initial guess, we employ the Carleman contraction principle. We provide several numerical examples to illustrate the efficacy of our method. The method not only delivers precise solutions but also showcases remarkable computational efficiency. 
    more » « less
  6. Bodlaender, Hans L (Ed.)
    Given a geometric domain P, visibility-based search problems seek routes for one or more mobile agents ("watchmen") to move within P in order to be able to see a portion (or all) of P, while optimizing objectives, such as the length(s) of the route(s), the size (e.g., area or volume) of the portion seen, the probability of detecting a target distributed within P according to a prior distribution, etc. The classic watchman route problem seeks a shortest route for an observer, with omnidirectional vision, to see all of P. In this paper we study bicriteria optimization problems for a single mobile agent within a polygonal domain P in the plane, with the criteria of route length and area seen. Specifically, we address the problem of computing a minimum length route that sees at least a specified area of P (minimum length, for a given area quota). We also study the problem of computing a length-constrained route that sees as much area as possible. We provide hardness results and approximation algorithms. In particular, for a simple polygon P we provide the first fully polynomial-time approximation scheme for the problem of computing a shortest route seeing an area quota, as well as a (slightly more efficient) polynomial dual approximation. We also consider polygonal domains P (with holes) and the special case of a planar domain consisting of a union of lines. Our results yield the first approximation algorithms for computing a time-optimal search route in P to guarantee some specified probability of detection of a static target within P, randomly distributed in P according to a given prior distribution. 
    more » « less
  7. The deep operator network (DeepONet) architecture is a promising approach for learning functional operators, that can represent dynamical systems described by ordinary or partial differential equations. However, it has two major limitations, namely its failures to account for initial conditions and to guarantee the temporal causality – a fundamental property of dynamical systems. This paper proposes a novel causal deep operator network (Causal-DeepONet) architecture for incorporating both the initial condition and the temporal causality into data-driven learning of dynamical systems, overcoming the limitations of the original DeepONet approach. This is achieved by adding an independent root network for the initial condition and independent branch networks conditioned, or switched on/off, by time-shifted step functions or sigmoid functions for expressing the temporal causality. The proposed architecture was evaluated and compared with two baseline deep neural network methods and the original DeepONet method on learning the thermal dynamics of a room in a building using real data. It was shown to not only achieve the best overall prediction accuracy but also enhance substantially the accuracy consistency in multistep predictions, which is crucial for predictive control. 
    more » « less