Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dinh Thai Hoang is active.

Publication


Featured researches published by Dinh Thai Hoang.


IEEE Transactions on Wireless Communications | 2013

QoS-Aware and Energy-Efficient Resource Management in OFDMA Femtocells

Long Bao Le; Dusit Niyato; Ekram Hossain; Dong In Kim; Dinh Thai Hoang

We consider the joint resource allocation and admission control problem for Orthogonal Frequency-Division Multiple Access (OFDMA)-based femtocell networks. We assume that Macrocell User Equipments (MUEs) can establish connections with Femtocell Base Stations (FBSs) to mitigate the excessive cross-tier interference and achieve better throughput. A cross-layer design model is considered where multiband opportunistic scheduling at the Medium Access Control (MAC) layer and admission control at the network layer working at different time-scales are assumed. We assume that both MUEs and Femtocell User Equipments (FUEs) have minimum average rate constraints, which depend on their geographical locations and their application requirements. In addition, blocking probability constraints are imposed on each FUE so that the connections from MUEs only result in controllable performance degradation for FUEs. We present an optimal design for the admission control problem by using the theory of Semi-Markov Decision Process (SMDP). Moreover, we devise a novel distributed femtocell power adaptation algorithm, which converges to the Nash equilibrium of a corresponding power adaptation game. This power adaptation algorithm reduces energy consumption for femtocells while still maintaining individual cell throughput by adapting the FBS power to the traffic load in the network. Finally, numerical results are presented to demonstrate the desirable operation of the optimal admission control solution, the significant performance gain of the proposed hybrid access strategy with respect to the closed access counterpart, and the great power saving gain achieved by the proposed power adaptation algorithm.


IEEE Journal on Selected Areas in Communications | 2014

Opportunistic Channel Access and RF Energy Harvesting in Cognitive Radio Networks

Dinh Thai Hoang; Dusit Niyato; Ping Wang; Dong In Kim

Radio frequency (RF) energy harvesting is a promising technique to sustain operations of wireless networks. In a cognitive radio network, a secondary user can be equipped with RF energy harvesting capability. In this paper, we consider such a network where the secondary user can perform channel access to transmit a packet or to harvest RF energy when the selected channel is idle or occupied by the primary user, respectively. We present an optimization formulation to obtain the channel access policy for the secondary user to maximize its throughput. Both the case that the secondary user knows the current state of the channels and the case that the secondary knows the idle channel probabilities of channels in advance are considered. However, the optimization requires model parameters (e.g., the probability of successful packet transmission, the probability of successful RF energy harvesting, and the probability of channel to be idle) to obtain the policy. To obviate such a requirement, we apply an online learning algorithm that can observe the environment and adapt the channel access action accordingly without any a prior knowledge about the model parameters. We evaluate both the efficiency and convergence of the learning algorithm. The numerical results show that the policy obtained from the learning algorithm can achieve the performance in terms of throughput close to that obtained from the optimization.


wireless communications and networking conference | 2012

Optimal admission control policy for mobile cloud computing hotspot with cloudlet

Dinh Thai Hoang; Dusit Niyato; Ping Wang

We consider an admission control problem and adaptive resource allocation for running mobile applications on a cloudlet. We formulate an optimization problem for dynamic resource sharing of mobile users in mobile cloud computing (MCC) hotspot with a cloudlet as a semi-Markov decision process (SMDP). SMDP is transformed into a linear programming (LP) model and it is solved to obtain an optimal solution. In the optimization model, the quality of service (QoS) for different classes of mobile user is taken into account under resource constraints (i.e., bandwidth and server). The numerical results are presented to illustrate that the proposed admission control scheme can achieve a desirable performance and improve throughput of an MCC hotspot significantly.


IEEE Communications Surveys and Tutorials | 2016

Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey

Nguyen Cong Luong; Dinh Thai Hoang; Ping Wang; Dusit Niyato; Dong In Kim; Zhu Han

This paper provides a state-of-the-art literature review on economic analysis and pricing models for data collection and wireless communication in Internet of Things (IoT). Wireless sensor networks (WSNs) are the main components of IoT which collect data from the environment and transmit the data to the sink nodes. For long service time and low maintenance cost, WSNs require adaptive and robust designs to address many issues, e.g., data collection, topology formation, packet forwarding, resource and power optimization, coverage optimization, efficient task allocation, and security. For these issues, sensors have to make optimal decisions from current capabilities and available strategies to achieve desirable goals. This paper reviews numerous applications of the economic and pricing models, known as intelligent rational decision-making methods, to develop adaptive algorithms and protocols for WSNs. Besides, we survey a variety of pricing strategies in providing incentives for phone users in crowdsensing applications to contribute their sensing data. Furthermore, we consider the use of some pricing models in machine-to-machine (M2M) communication. Finally, we highlight some important open research issues as well as future research directions of applying economic and pricing models to IoT.


IEEE Communications Surveys and Tutorials | 2015

Markov Decision Processes With Applications in Wireless Sensor Networks: A Survey

Mohammad Abu Alsheikh; Dinh Thai Hoang; Dusit Niyato; Hwee-Pink Tan; Shaowei Lin

Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are used to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs.


international conference on communications | 2012

Joint load balancing and admission control in OFDMA-based femtocell networks

Long Bao Le; Dinh Thai Hoang; Dusit Niyato; Ekram Hossain; Dong In Kim

In this paper, we consider the admission control problem for hybrid access in OFDMA-based femtocell networks. We assume that Macrocell User Equipments (MUEs) can establish connections with Femtocell Base Stations (FBSs) to improve their QoSs. Both MUEs and Femtocell User Equipments (FUEs) have minimum rate requirements, which depend on their geographical locations and maybe their running applications. In addition, blocking probability constraints are imposed on each FUE so that connections from MUEs only result in controllable performance degradation for FUEs. We show how to formulate the admission control problem as a Semi-Markov Decision Process (SMDP) and present a Linear Programming (LP) based solution approach. Moreover, we develop a novel femtocell power adaptation algorithm, which can be implemented in a distributed manner jointly with the proposed admission control scheme. This power adaptation algorithm enables to achieve better cell throughput and more energy-efficient operation of the femtocell network considering the heterogeneity of traffic load in the network. Finally, numerical results are presented to illustrate the desirable performance of the optimal admission control solution and the significant throughput and power saving gains of the proposed cross-layer solution.


IEEE Network | 2016

Smart data pricing models for the internet of things: a bundling strategy approach

Dusit Niyato; Dinh Thai Hoang; Nguyen Cong Luong; Ping Wang; Dong In Kim; Zhu Han

The Internet of Things (IoT) has emerged as a new paradigm for the future Internet. In IoT, devices are connected to the Internet and thus are a huge data source for numerous applications. In this article, we focus on addressing data management in IoT through using a smart data pricing (SDP) approach. With SDP, data can be managed flexibly and efficiently through intelligent and adaptive incentive mechanisms. Moreover, data is a major source of revenue for providers and partners. We propose a new pricing scheme for IoT service providers to determine the sensing data buying price and IoT service subscription fee offered to sensor owners and service users, respectively. Additionally, we adopt the bundling strategy that allows multiple providers to form a coalition and offer their services as a bundle, attracting more users and achieving higher revenue. Finally, we outline some important open research issues for SDP and IoT.


IEEE Access | 2017

Charging and Discharging of Plug-In Electric Vehicles (PEVs) in Vehicle-to-Grid (V2G) Systems: A Cyber Insurance-Based Model

Dinh Thai Hoang; Ping Wang; Dusit Niyato; Ekram Hossain

In addition to being environment friendly, vehicle-to-grid (V2G) systems can help the plug-in electric vehicle (PEV) users in reducing their energy costs and can also help stabilizing energy demand in the power grid. In V2G systems, since the PEV users need to obtain system information (e.g., locations of charging/discharging stations, current load, and supply of the power grid) to achieve the best charging and discharging performance, data communication plays a crucial role. However, since the PEV users are highly mobile, information from V2G systems is not always available for many reasons, e.g., wireless link failures and cyber attacks. Therefore, in this paper, we introduce a novel concept using cyber insurance to “transfer” cyber risks, e.g., unavailable information, of a PEV user to a third party, e.g., a cyber-insurance company. Under the insurance coverage, even without information about V2G systems, a PEV user is always guaranteed the best price for charging/discharging. In particular, we formulate the optimal energy cost problem for the PEV user by adopting a Markov decision process framework. We then propose a learning algorithm to help the PEV user make optimal decisions, e.g., to charge or discharge and to buy or not to buy insurance, in an online fashion. Through simulations, we show that cyber insurance is an efficient solution not only in dealing with cyber risks, but also in maximizing revenue for the PEV user.


IEEE Transactions on Communications | 2017

Ambient Backscatter: A New Approach to Improve Network Performance for RF-Powered Cognitive Radio Networks

Dinh Thai Hoang; Dusit Niyato; Ping Wang; Dong In Kim; Zhu Han

This paper introduces a new solution to improve the performance for secondary systems in radio frequency (RF) powered cognitive radio networks (CRNs). In a conventional RF-powered CRN, the secondary system works based on the harvest-then-transmit protocol. That is, the secondary transmitter (ST) harvests energy from primary signals and then uses the harvested energy to transmit data to its secondary receiver (SR). However, with this protocol, the performance of the secondary system is much dependent on the amount of harvested energy as well as the primary channel activity, e.g., idle and busy periods. Recently, ambient backscatter communication has been introduced, which enables the ST to transmit data to the SR by backscattering ambient signals. Therefore, it is potential to be adopted in the RF-powered CRN. We investigate the performance of RF-powered CRNs with ambient backscatter communication over two scenarios, i.e., overlay and underlay CRNs. For each scenario, we formulate and solve the optimization problem to maximize the overall transmission rate of the secondary system. Numerical results show that by incorporating such two techniques, the performance of the secondary system can be improved significantly compared with the case when the ST performs either harvest-then-transmit or ambient backscatter technique.


IEEE Transactions on Cognitive Communications and Networking | 2015

Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks Under Smart Jamming Attacks

Dinh Thai Hoang; Dusit Niyato; Ping Wang; Dong In Kim

In cognitive radio networks with wireless energy harvesting, secondary users are able to harvest energy from a wireless power source and then use the harvested energy to transmit data opportunistically on an idle channel allocated to primary users. Such networks have become more common due to pervasiveness of wireless charging, improving the performance of the secondary users. However, in such networks, the secondary users can be vulnerable to jamming attacks by malicious users who can also harvest wireless energy to launch the attacks. In this paper, we first formulate the throughput optimization problem for a secondary user under the attacks by jammers as a Markov decision process (MDP). We then introduce a new solution based on the deception tactic to deal with smart jamming attacks. Furthermore, we propose a learning algorithm for the secondary user to find an optimal transmission policy and extend to the case with multiple secondary users in the same environment. Through the simulations, we demonstrate that the proposed learning algorithms can effectively reduce adverse effects from smart jammers even when they use different attack strategies.

Collaboration


Dive into the Dinh Thai Hoang's collaboration.

Top Co-Authors

Avatar

Dusit Niyato

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Ping Wang

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Dong In Kim

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Zhu Han

University of Houston

View shared research outputs
Top Co-Authors

Avatar

Nguyen Cong Luong

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Long Bao Le

Université du Québec

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiao Lu

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Wenbo Wang

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hwee-Pink Tan

Singapore Management University

View shared research outputs
Researchain Logo
Decentralizing Knowledge