Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where L. Pham is active.

Publication


Featured researches published by L. Pham.


15th international Conference on Electronics, Information, and Communication: ICEIC 2016 | 2016

Survey on memrister models

S. Singh; P. W. C. Prasad; Abeer Alsadoon; Azam Beg; L. Pham; A. Elchouemi

While hardware in a computer have developed greatly, users still has faced problems with its speed, and memory in terms of its performance. The recent developments in memristors made it possible to reduce the problems, as memristive models have been be designed to suit the requirements of time. However, different characteristics are expected from memristors depending upon its applications. The paper aims to compare three major models of memristors focusing on their advantages and limitations. It identifies the most suitable model of memristor that satisfies the memristive device conditions. Out of the three models, Voltage threshold adaptive memristor model (VTEAM) fits into the requirements and it has sufficient accuracy and computational efficiency.


international conference on ict and knowledge engineering | 2015

A hybrid encryption model for secure cloud computing

Atewologun Olumide; Abeer Alsadoon; P. W. C. Prasad; L. Pham

Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect users confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.


international conference on information science and technology | 2017

Experiments on the MFCC application in speaker recognition using Matlab

Kritagya Bhattarai; P. W. C. Prasad; Abeer Alsadoon; L. Pham; A. Elchouemi

Speaker recognition is a very important research area where speech synthesis, and speech noise reduction are some of the major research areas. Speaker recognition is a new challenge for technologies. Many algorithms have been suggested and developed for feature extraction. This paper presents a feature extraction technique for speaker recognition using Mel Frequency Cepstral Coefficients (MFCC). Further, this paper evaluates experiments conducted along each step of the MFCC process. Finally, the paper compares hamming window and rectangular window technique based on the number of filters for accurate and efficient result in a Matlab environment. The result indicates that using a 32 filter with hamming window has more accuracy and efficiency compared to other windowing techniques and number of filters.


international joint conference on computer science and software engineering | 2016

Synchronous virtual classroom for student with ADHD disorder

M. Ibrahim; P. W. C. Prasad; Abeer Alsadoon; L. Pham

This paper focuses on the ADHD disorders of students between 6-18 years old; the aim of this study is to find out what has been done with advanced technology for students with ADHD. Providing education for Students with learning disabilities is a significant challenge, as these types of students need special learning tools. Attention-deficit/hyperactivity disorder (ADHD) is a common type of disorder which causes learning difficulty and disability. Students with this kind of disorder usually have a limited span of attention, and they are easily distracted. In addition to the possibility of using advanced learning tools for enhancing teaching processes for students with ADHD, this paper evaluates current learning management systems (LMS) that are used in schools and investigates what should be modified in the current (LMS) to make them more helpful for students with ADHD. Research shows that students with ADHD can significantly benefit from the application of ICT tools for academic purposes. Advanced technologies can be used to improve the teaching process for these students through virtual learning; adding a virtual classroom at schools would be very helpful for these kinds of students especially if this classroom is designed well.


international joint conference on computer science and software engineering | 2016

Impact of using mobile devices in earthquake

M. Thapa; Abeer Alsadoon; P. W. C. Prasad; L. Pham; A. Elchouemi

The natural disaster is an unstoppable reality that people are facing. Nowadays, mobile devices (MDs) such as smartphone, tablets, laptops are common to people, and they are using it in day-to-day life. This research work explores the use of MDs at the situation of the catastrophic earthquake in developing countries for rescue. The main concern of this research is to limited knowledge, infrastructure and access to MDs and the internet in developing countries of both people and rescue team. The universal proposed framework is introduced with low-cost balloon network, Finder Radar and Drone. The main contribution of this framework is the rescue operation after the catastrophic earthquake when all another internet connection will be interrupted. To establish communication between earthquake victims and rescue teams, balloon Wi-Fi network provides free Wi-Fi signals. Furthermore, Drone has considered as an earthquake area monitoring MDs and Finder Radar to search trapped earthquake survivals.


international joint conference on computer science and software engineering | 2016

Impact of wireless communications technologies on elder people healthcare: Smart home in Australia

A. Mageroski; Abeer Alsadoon; P. W. C. Prasad; L. Pham; A. Elchouemi

Over the last three decades, there has been a dramatic rise in ageing populations in most countries. Older people are remaining in nursing home care due to the fact that general services and medical support are provided. However, these costly environments often negatively affect older people due to high cost, limited staff and the social impacts they have. A way to overcome these challenges is to place the elderly instead in a smart home environment. The aim of this study is to describe the impact of wireless communications technologies on elderly people in a smart home. This has been compared with conditions in nursing homes. Using smart wireless sensors, wireless communications and ambient intelligent system, it is possible to create systems capable of measuring vital signs of the person in their own home. The findings indicate that wireless technology is the most suitable basis for a communications framework in a smart home to assist older people.


international conference on advances in electrical electronic and systems engineering | 2016

Upgrading Internet service provider (ISP) network in multiprotocol label switching (MPLS) and border gateway protocol (BGP) environment

Zhenxing Song; P. W. C. Prasad; Abeer Alsadoon; L. Pham; A. Elchouemi

This report describes a project which creates an upgraded topology based on the Internet service provider (ISP) environment. In the current service provider network, reliability, availability and management have become issues which need to be considered. Many technologies have been presented to solve these issues. This project is based on the virtual environment finished by simulators which are tools necessary to accomplish the project. In this project, two simulators are applied. One simulator creates a network topology which can be used to simulate real architecture, check all the protocols and process packets exchange. The second simulator deals with traffic. In the virtual environment, the simulated traffic will be created, collected and analysed. From this operation, a report about the advantages and disadvantages in both the current and the upgraded network environments will be generated. Detailed results are then compared, explained and clearly presented using data format.


international conference on advances in electrical electronic and systems engineering | 2016

An improvement of backbone network security using DMVPN over an EZVPN structure

Hongru Li; P. W. C. Prasad; Abeer Alsadoon; L. Pham; A. Elchouemi

The purpose of this work is to promote an improvement of backbone networks in terms of availability and remote access. It especially focuses on network environments based on a hub and spoke topology. The significant findings indicate that data isolation, data encryption and encrypted dynamic routing information transmission are the main requirements for backbone network security. In addition, due to the importance of the backbone network, redundancy is also a necessary consideration for its availability, especially link and gateway redundancies. This report introduces a two-surface structure based on particular security protocols addressing backbone network security. The simulation of the proposed structure was carried out on GNS3, but a performance test on real devices is still needed for further research.


international conference on advances in electrical electronic and systems engineering | 2016

An exploration of non-contact cardiopulmonary measurement using the smartphone in rescue relief events

L. Pham; P. W. C. Prasad

The aim of this paper is to explore a non-contact cardiopulmonary detection method in natural disaster rescue relief, based on the use of frequencies and antennas that are similar to current smartphone-like devices. The paper focuses in particular on the current Wi-Fi 2.4 GHz and 5 GHz radio frequencies wavelength, Doppler effect radar, signal processes, and a signal noise cleansing technique that detects and measures vital signs. This approach could be used as an alternative to the commercially designed, devices currently used for heartbeat and respiration detection during rescue relief with the aim of reducing device transit time and cost. This paper further evaluates a new type of multi-directional antenna that could be used to detect the human pulsatile from 360 degree view.


international conference on advances in electrical electronic and systems engineering | 2016

An enhanced model of biometric authentication in E-Learning: Using a combination of biometric features to access E-Learning environments

Navjot Kaur; P. W. C. Prasad; Abeer Alsadoon; L. Pham; A. Elchouemi

E-Learning is a very widely used mode of education these days. Many universities have adopted E-Learning as their preferred system for resource sharing, assessments and grading. The problem is that apart from being usable, economical and accessible, E-Learning systems are often prone to fraud perpetrated by dishonest students. Using a strong authentication mechanism would help in limiting the exploitation of E-Learning systems. Biometrics is one such authentication technique that provides unique and universal identification for any system. A number of different biometric frameworks have been developed for E-Learning systems, but there are still loopholes which need to be considered. This project discusses the main issues faced by E-Learning systems and how using biometrics can help overcome such issues. Firstly, it gives some information about the need for biometrics and the types of frameworks currently available. The proposed framework is then developed and evaluated based on a survey conducted with teachers and students. The project concludes with examining user perceptions about the proposed framework.

Collaboration


Dive into the L. Pham's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abeer Alsadoon

Charles Sturt University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Azam Beg

United Arab Emirates University

View shared research outputs
Top Co-Authors

Avatar

A. Mageroski

Charles Sturt University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hongru Li

Charles Sturt University

View shared research outputs
Top Co-Authors

Avatar

M. Ibrahim

Charles Sturt University

View shared research outputs
Top Co-Authors

Avatar

M. Thapa

Charles Sturt University

View shared research outputs
Top Co-Authors

Avatar

Navjot Kaur

Charles Sturt University

View shared research outputs
Researchain Logo
Decentralizing Knowledge