Semiconductor Thermal Measurement and Management IEEE Symposium, 2012
In the present investigation, high-performance capillary pump has been developed and evaluated fo... more In the present investigation, high-performance capillary pump has been developed and evaluated for using inside loop heat pipes with 500 W heat transfer capability up to distance of 250 mm. Wick structure is one of the most critical components of the loop heat pipe that provides the necessary capillary pumping, liquid-vapour phase separation and heat leak barrier from evaporation section
Résumé/Abstract An investigative prototype of a single-phase cooling system based on the microcha... more Résumé/Abstract An investigative prototype of a single-phase cooling system based on the microchannel heat sink with water as the heat transfer medium was developed to study the fluid flow and forced-convection heat transfer characteristics for the cooling of electronics ...
In this paper, we propose secure communication schemes using projective-lag and/or projective-ant... more In this paper, we propose secure communication schemes using projective-lag and/or projective-anticipating synchronization or multidelay feedback systems and the modulation scheme of synchronization-manifold shift keying. The strategy to assure the security is based on non-stationary dynamics and random synchronization manifolds. Where, random synchronization manifolds are generated to encode various blocks of bits during transmission time. Numerical simulation will confirm the
International Conference on Engineering Education, 2012
The international community is heavily reliant on the Internet to provide services such as video ... more The international community is heavily reliant on the Internet to provide services such as video phones, video conferences, video-on-demand, tele-shopping, web-advisement and virtual reality. Tertiary networks and telecommunications engineering students are required to learn all aspects about the Internet and Internet services. The open-source, research and teaching platform, Network Simulator (NS) was integrated with the open-source Joint Model (JM) H.264/AVC
During a lifecycle of a large-scale Web application, Web develop- ers produce a wide variety of i... more During a lifecycle of a large-scale Web application, Web develop- ers produce a wide variety of inter-related Web objects. Follow- ing good Web engineering practice, developers often create them based on a Web application development method, which requires certain logical models for the development and maintenance pro- cess. Web development is dynamic, thus, those logical models as well as Web
The Advanced Wideband System (AWS) is being developed to provide worldwide, wideband communicatio... more The Advanced Wideband System (AWS) is being developed to provide worldwide, wideband communications capabilities to address the long term needs of the DoD for information transmission, reception, and handling. This system will require wideband fixed-to-fixed, fixed-to-mobile, mobile-to-mobile and other tactical communications services, with maximum data rates on the order of hundreds of megabits per second. Based on the design methodology
We propose a probabilistic model based on stochastic geometry to analyze cognitive radio in a mob... more We propose a probabilistic model based on stochastic geometry to analyze cognitive radio in a mobile ad hoc network using carrier sensing multiple access. Analytical results are derived on the impact of the interaction between primary and secondary users ...
Recently, ultra-wideband (UWB) is one of the most attractive technologies in communications. UWB ... more Recently, ultra-wideband (UWB) is one of the most attractive technologies in communications. UWB communication systems are designed to intent to low power, low cost, and low complexity devices. However, costly high-speed analog-to-digital converters ...
The ability to manage the evolution of a software system is critical to a successful development ... more The ability to manage the evolution of a software system is critical to a successful development process. In a typical software development process, software engineers think and reason in terms of logical abstractions, their compositions and interrelations. However ...
A dual-antenna ultra-wideband (UWB) transceiver in 0.18-μm CMOS for mode-1 OFDM applications empl... more A dual-antenna ultra-wideband (UWB) transceiver in 0.18-μm CMOS for mode-1 OFDM applications employs the techniques of antenna diversity and integrated RF selectivity to improve robustness to interferers. Optimal selectivity in receiver and band flatness in transmitter are achieved ...
Page 1. Journal of Intelligent Information Systems, 24:1, 6185, 2005 c 2005 Springer Science + B... more Page 1. Journal of Intelligent Information Systems, 24:1, 6185, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. A New Term Significance Weighting Approach JIN ZHANG jzhang@csd.uwm.edu ...
Fixing defects is an essential software development activity. For commercial software vendors, th... more Fixing defects is an essential software development activity. For commercial software vendors, the time to repair defects in deployed business-critical software products or applications is a key quality metric for sustained customer satisfaction. In this paper, we report on the analysis of about 1,500 defect records from an IBM middle-ware product collected over a five-year period. The analysis includes a characterization of each repaired defect by topic and a ranking of developers by inferred expertise on each topic. We find ...
Software security vulnerabilities are discovered on an almost daily basis and have caused substan... more Software security vulnerabilities are discovered on an almost daily basis and have caused substantial damage. It is vital to be able to detect and resolve them as early as possible. One of early detection approaches is to consult with the prior known vulnerabilities and corresponding patches. With the hypothesis that recurring software vulnerabilities are due to software reuse, we conducted an empirical study on several databases for security vulnerabilities and found several recurring and similar software security vulnerabilities ...
Assigning a bug to the right developer is a key in reducing the cost, time, and efforts for devel... more Assigning a bug to the right developer is a key in reducing the cost, time, and efforts for developers in a bug fixing process. This assignment process is often referred to as bug triaging. In this paper, we propose Bugzie, a novel approach for automatic bug triaging based on fuzzy set-based modeling of bug-fixing expertise of developers. Bugzie considers a system to have multiple technical aspects, each is associated with technical terms. Then, it uses a fuzzy set to represent the developers who are capable/competent of fixing the bugs ...
Software bugs are inevitable and bug fixing is an essential and costly phase during software deve... more Software bugs are inevitable and bug fixing is an essential and costly phase during software development. Such defects are often reported in bug reports which are stored in an issue tracking system, or bug repository. Such reports need to be assigned to the most appropriate developers who will eventually fix the issue/bug reported. This process is often called Bug Triaging.
Locating buggy code is a time-consuming task in software development. Given a new bug report, dev... more Locating buggy code is a time-consuming task in software development. Given a new bug report, developers must search through a large number of files in a project to locate buggy code. We propose BugScout, an automated approach to help developers reduce such efforts by narrowing the search space of buggy files when they are assigned to address a bug report. BugScout assumes that the textual contents of a bug report and that of its corresponding source code share some technical aspects of the system which can be ...
Each snout whisker of the rat is represented in the contralateral cortex by a group of cells whic... more Each snout whisker of the rat is represented in the contralateral cortex by a group of cells which, because of the group shape, is called a barrel. The barrel cortex represents invariant somatotopy and function from animal to animal. This model has been used frequently in animals with whisker trimming or removal to study use-dependent cortical plasticity. We have developed
Semiconductor Thermal Measurement and Management IEEE Symposium, 2012
In the present investigation, high-performance capillary pump has been developed and evaluated fo... more In the present investigation, high-performance capillary pump has been developed and evaluated for using inside loop heat pipes with 500 W heat transfer capability up to distance of 250 mm. Wick structure is one of the most critical components of the loop heat pipe that provides the necessary capillary pumping, liquid-vapour phase separation and heat leak barrier from evaporation section
Résumé/Abstract An investigative prototype of a single-phase cooling system based on the microcha... more Résumé/Abstract An investigative prototype of a single-phase cooling system based on the microchannel heat sink with water as the heat transfer medium was developed to study the fluid flow and forced-convection heat transfer characteristics for the cooling of electronics ...
In this paper, we propose secure communication schemes using projective-lag and/or projective-ant... more In this paper, we propose secure communication schemes using projective-lag and/or projective-anticipating synchronization or multidelay feedback systems and the modulation scheme of synchronization-manifold shift keying. The strategy to assure the security is based on non-stationary dynamics and random synchronization manifolds. Where, random synchronization manifolds are generated to encode various blocks of bits during transmission time. Numerical simulation will confirm the
International Conference on Engineering Education, 2012
The international community is heavily reliant on the Internet to provide services such as video ... more The international community is heavily reliant on the Internet to provide services such as video phones, video conferences, video-on-demand, tele-shopping, web-advisement and virtual reality. Tertiary networks and telecommunications engineering students are required to learn all aspects about the Internet and Internet services. The open-source, research and teaching platform, Network Simulator (NS) was integrated with the open-source Joint Model (JM) H.264/AVC
During a lifecycle of a large-scale Web application, Web develop- ers produce a wide variety of i... more During a lifecycle of a large-scale Web application, Web develop- ers produce a wide variety of inter-related Web objects. Follow- ing good Web engineering practice, developers often create them based on a Web application development method, which requires certain logical models for the development and maintenance pro- cess. Web development is dynamic, thus, those logical models as well as Web
The Advanced Wideband System (AWS) is being developed to provide worldwide, wideband communicatio... more The Advanced Wideband System (AWS) is being developed to provide worldwide, wideband communications capabilities to address the long term needs of the DoD for information transmission, reception, and handling. This system will require wideband fixed-to-fixed, fixed-to-mobile, mobile-to-mobile and other tactical communications services, with maximum data rates on the order of hundreds of megabits per second. Based on the design methodology
We propose a probabilistic model based on stochastic geometry to analyze cognitive radio in a mob... more We propose a probabilistic model based on stochastic geometry to analyze cognitive radio in a mobile ad hoc network using carrier sensing multiple access. Analytical results are derived on the impact of the interaction between primary and secondary users ...
Recently, ultra-wideband (UWB) is one of the most attractive technologies in communications. UWB ... more Recently, ultra-wideband (UWB) is one of the most attractive technologies in communications. UWB communication systems are designed to intent to low power, low cost, and low complexity devices. However, costly high-speed analog-to-digital converters ...
The ability to manage the evolution of a software system is critical to a successful development ... more The ability to manage the evolution of a software system is critical to a successful development process. In a typical software development process, software engineers think and reason in terms of logical abstractions, their compositions and interrelations. However ...
A dual-antenna ultra-wideband (UWB) transceiver in 0.18-μm CMOS for mode-1 OFDM applications empl... more A dual-antenna ultra-wideband (UWB) transceiver in 0.18-μm CMOS for mode-1 OFDM applications employs the techniques of antenna diversity and integrated RF selectivity to improve robustness to interferers. Optimal selectivity in receiver and band flatness in transmitter are achieved ...
Page 1. Journal of Intelligent Information Systems, 24:1, 6185, 2005 c 2005 Springer Science + B... more Page 1. Journal of Intelligent Information Systems, 24:1, 6185, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. A New Term Significance Weighting Approach JIN ZHANG jzhang@csd.uwm.edu ...
Fixing defects is an essential software development activity. For commercial software vendors, th... more Fixing defects is an essential software development activity. For commercial software vendors, the time to repair defects in deployed business-critical software products or applications is a key quality metric for sustained customer satisfaction. In this paper, we report on the analysis of about 1,500 defect records from an IBM middle-ware product collected over a five-year period. The analysis includes a characterization of each repaired defect by topic and a ranking of developers by inferred expertise on each topic. We find ...
Software security vulnerabilities are discovered on an almost daily basis and have caused substan... more Software security vulnerabilities are discovered on an almost daily basis and have caused substantial damage. It is vital to be able to detect and resolve them as early as possible. One of early detection approaches is to consult with the prior known vulnerabilities and corresponding patches. With the hypothesis that recurring software vulnerabilities are due to software reuse, we conducted an empirical study on several databases for security vulnerabilities and found several recurring and similar software security vulnerabilities ...
Assigning a bug to the right developer is a key in reducing the cost, time, and efforts for devel... more Assigning a bug to the right developer is a key in reducing the cost, time, and efforts for developers in a bug fixing process. This assignment process is often referred to as bug triaging. In this paper, we propose Bugzie, a novel approach for automatic bug triaging based on fuzzy set-based modeling of bug-fixing expertise of developers. Bugzie considers a system to have multiple technical aspects, each is associated with technical terms. Then, it uses a fuzzy set to represent the developers who are capable/competent of fixing the bugs ...
Software bugs are inevitable and bug fixing is an essential and costly phase during software deve... more Software bugs are inevitable and bug fixing is an essential and costly phase during software development. Such defects are often reported in bug reports which are stored in an issue tracking system, or bug repository. Such reports need to be assigned to the most appropriate developers who will eventually fix the issue/bug reported. This process is often called Bug Triaging.
Locating buggy code is a time-consuming task in software development. Given a new bug report, dev... more Locating buggy code is a time-consuming task in software development. Given a new bug report, developers must search through a large number of files in a project to locate buggy code. We propose BugScout, an automated approach to help developers reduce such efforts by narrowing the search space of buggy files when they are assigned to address a bug report. BugScout assumes that the textual contents of a bug report and that of its corresponding source code share some technical aspects of the system which can be ...
Each snout whisker of the rat is represented in the contralateral cortex by a group of cells whic... more Each snout whisker of the rat is represented in the contralateral cortex by a group of cells which, because of the group shape, is called a barrel. The barrel cortex represents invariant somatotopy and function from animal to animal. This model has been used frequently in animals with whisker trimming or removal to study use-dependent cortical plasticity. We have developed
Uploads
Papers by tien nguyen