Huan X Nguyen

Huan X Nguyen
Middlesex University, UK · Faculty of Science and Technology

PhD

About

136
Publications
21,369
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,167
Citations
Introduction
Huan X. Nguyen is a Professor of Digital Communication Engineering at Faculty of Science and Technology, Director of the London Digital Twin Research Centre (https://dt.mdx.ac.uk) and Head of the 5G & IoT Research Group (http://5g-iot.mdx.ac.uk). He leads research activities in 5G systems, machine-type communication, digital transformation and machine learning within his university with focus on applications in digital twins, industry 4.0, and critical applications (disasters).

Publications

Publications (136)
Article
Full-text available
In this paper, using diagonal signal repetition with Alamouti code employed as building blocks, we propose a high-rate groupwise space-time block code (GSTBC) which can be effectively decoded by a low-complexity successive interference cancellation (SIC) based receiver. The proposed GSTBC and SIC based receiver are jointly designed such that the di...
Article
Full-text available
To derive low-complexity multiple-input-multiple-output (MIMO) detectors, we combine two complementary approaches, i.e., lattice reduction (LR) and list within the framework of the successive interference cancellation (SIC)-based detection. It is shown that the performance of the proposed detector, which is called the SIC-based detector with list a...
Article
Full-text available
In this letter, we propose a simple groupwise space-time block code (GSTBC) which can be easily applied to a large number of transmit antennas and be effectively decoded by a low complexity successive interference cancellation (SIC) based receiver. The proposed GSTBC and SIC based receiver are jointly designed and the diversity repetition in GSTBC...
Chapter
This chapter discusses a disaster communication architecture based on device‐to‐device (D2D) communication. D2D can achieve higher system throughput by taking advantage for short distance, direct communications, and multi‐users diversity. The chapter considers a D2D‐based energy‐harvesting cellular network where the relay and user equipment relay h...
Article
This study proposes a novel framework computing the dynamic reliability and associated uncertainty quantification of structures under time-varying excitation with significantly reduced time complexity. For this purpose, the deep neural network’s power and the Bayesian theory’s probabilistic ability are leveraged, forming a Bayesian neural network d...
Article
This work investigates the effect of double intelligent reflecting surface (IRS) in improving the spectrum efficient of multi-user multiple-input multiple-output (MIMO) network operating in the millimeter wave (mmWave) band. Specifically, we aim to solve a weighted sum rate maximization problem by jointly optimizing the digital precoding at the tra...
Preprint
This work investigates the effect of double intelligent reflecting surface (IRS) in improving the spectrum efficient of multi-user multiple-input multiple-output (MIMO) network operating in the millimeter wave (mmWave) band. Specifically, we aim to solve a weighted sum rate maximization problem by jointly optimizing the digital precoding at the tra...
Article
Digital Twin technology has recently gathered pace in the engineering communities as it allows for the convergence of the real structure and its digital counterpart throughout their entire life-cycle. With the rapid development of supporting technologies, including machine learning, 5G/6G, cloud computing, and Internet of Things, Digital Twin has b...
Article
Visual communications have played an important part in our daily life as a non-verbal way of conveying information using symbols, gestures and images. With the advances of technology, people can visually communicate with each other in a number of forms via digital communications. Recently Image Super-Resolution (ISR) with Deep Learning (DL) has bee...
Article
In this paper, a novel approach to damage identification in structures using Particle Swarm Optimization (PSO) combined with Artificial neural network (ANN) is proposed. With recent substantial advances, ANN has been extensively utilized in a wide variety of fields. However, because of the application of backpropagation algorithms based on gradient...
Article
Full-text available
This article highlights the importance of Internet of Things (IoT) and 5G networks in sustainable cities, focusing on disaster management systems. It also discusses suitable 5G communication technologies in disaster affected and communications outage areas. The article surveys various potential emerging communication technologies such as IoT, devic...
Article
This study devises a novel approach, namely quadruple 1D convolutional neural network, for detecting connection stiffness reduction in steel truss bridge structure using experimental and numerical modal data. The method is developed based on expertise in two domains: firstly, in Structural Health Monitoring, the mode shapes and its high-order deriv...
Article
Full-text available
Although many countries have started the initial phase of rolling out 5G, it is still in its infancy with researchers from both academia and industry facing the challenges of developing it to its full potential. With the support of artificial intelligence, development of digital transformation through the notion of a digital twin has been taking of...
Conference Paper
Full-text available
The rapid advancements in manufacturing technologies are transforming the current industrial landscape through Industry 4.0, which refers not only to the integration of information technology with industrial production, but also to the use of innovative technologies and novel data management approaches. The target is to enable the manufacturers and...
Article
Full-text available
Recently, hybrid wired-wireless Network-on-Chip (WiNoC) has been proposed as a suitable communication fabric to provide scalability and satisfy high performance demands of the exascale era of modern multi/many-core System-on-Chip (SoC) design. A well accepted low-latency wireless communication fabric for WiNoCs is millimeter wave (mm-Wave). However...
Article
Smart structural health monitoring (SHM) for large-scale infrastructure is an intriguing subject for engineering communities thanks to its significant advantages such as timely damage detection, optimal maintenance strategy, and reduced resource requirement. Yet, it is a challenging topic as it requires handling a large amount of collected sensors...
Article
Previously, it was nearly impossible to use raw time series sensory signals for structural health monitoring due to the inherent high dimensionality of measured data. However, recent developments in deep learning techniques have overcome the need of complex preprocessing in time series data. This study extends the applicability of four prominent de...
Conference Paper
Full-text available
The advent of driverless and automated vehicle technologies opens up a new era of safe and comfortable transportation. However, one of the most important features that an autonomous vehicle requires, is a reliable pedestrian detection mechanism. Many solutions have been proposed in the literature to achieve this technology, ranging from image proce...
Article
Full-text available
In industrial environments various events can concurrently occur and may require different quality of service (QoS) provision based on different priority levels. To reduce the chances of collision and to improve efficiency in multi-event occurrence, Carrier Sense Multiple Access (CSMA) is a preferable choice for Medium Access Control (MAC) protocol...
Article
In the event of a natural disaster, communications infrastructure plays an important role in organizing effective rescue services. However, the infrastructure-based communications are often affected during severe disaster events such as earthquakes, landslides, floods, and storm surges. Addressing this issue, the article proposes a novel drone-base...
Conference Paper
Full-text available
Digital twins offer a framework to support the ever-rising demands in the fast-paced industrial evolution. This technology not only adds to the reliability of industrial processes but also offers an insight in to long-term behaviors and pattern during the aging of the industrial equipment. In this paper, a digital twin framework is presented to rep...
Article
Public Safety Networks (PSNs) provide assistance before- and post-disaster events. With the help of technological advances, PSNs are able to cope with both natural and man-made disasters, protecting people, environment and property. Effective communications, better situational awareness, lower response times and greater emergency efficiency are ess...
Chapter
This chapter provides an overview of the industrial wireless sensor networks (IWSNs). It focuses on industrial systems and the requirements of IWSNs. The chapter discusses applications of IWSNs and research developments; different attributes of IWSNs and possible research potential for future developments. Research and development, and continuous i...
Chapter
This chapter provides a detailed discussion of industrial revolutions, technology improvements, industrial processes and control requirements. Numerous researches divide communications traffic in industries into various classes. This classification depends on the underlying process, equipment and type of operation performed. The traffic in industri...
Article
Machine based analysis and prediction systems are widely used for diagnosis of Alzheimer’s Disease (AD). However, lower accuracy of existing techniques and lack of post diagnosis monitoring systems limit the scope of such studies. In this paper, a novel machine learning based diagnosis and monitoring of AD-like diseases is proposed. The AD-like dis...
Article
Full-text available
This paper investigates a new secure relaying scheme, namely physical layer network coding based modify-and-forward (PMF), in which a relay node linearly combines the decoded data sent by a source node with an encrypted key before conveying the mixed data to a destination node. We first derive the general expression for the generalized secrecy outa...
Article
As network resources are shared between many users, resource management must be a key part of any communication system as it is needed to provide seamless communication and to ensure that applications and servers receive their required Quality-of-Service. However, mobile environments also need to consider handover issues. Furthermore, in a highly m...
Chapter
In recent decades, serious natural disasters such as earthquakes, floods, tsunamis, and forest fire have occurred with catastrophic consequences. To minimize the loss of lives and damages in the aftermath of a disaster, it is important that rescuers are able to track the trapped victims and perform synchronized relief efforts immediately. The tradi...
Article
The paper proposes a dynamic priority system at Medium Access Control (MAC) layer to schedule time sensitive and critical communications in infrastructure-less wireless networks. Two schemes, Priority Enabled MAC (PE-MAC) and Optimized PE-MAC (O-PEMAC) are proposed to ensure real-time and reliable data delivery in emergency and feedback systems. Th...
Conference Paper
Disaster recovery and rescuing are challenging tasks due to the unknown parameters related with the victims in disastrous situations. Existing surveillance systems have a degree of efficiency to inform the people through the use of various communication channels about disasters and their area of effect. However, the obscureness of the rescuing proc...
Article
Full-text available
Device-to-device (D2D) communications as an underlay to cellular networks can not only increase the system capacity and energy efficiency, but also enable national security and public safety services. A key requirement for these services is to provide alternative access to cellular networks when they are partially or fully damaged due to a natural...
Article
Full-text available
This paper introduces a new differential spatial modulation (DSM) scheme which subsumes both the previously introduced DSM and high-rate spatial modulation (HR-SM) for wireless multiple input multiple output (MIMO) transmission. By combining the codeword design method of the HR-SM scheme with the encoding method of the DSM scheme, we develop a high...
Article
This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PB...
Article
Full-text available
In this paper, we investigate disaster-recovery communications utilizing two-cell cooperative D2D communications. Specifically, one cell is in a healthy area while the other is in a disaster area. A user equipment (UE) in the healthy area aims to assist a UE in the disaster area to recover wireless information transfer (WIT) via an energy harvestin...
Conference Paper
Applications for VANETs will require seamless communication between vehicle-to-infrastructure and vehicle-to-vehicle. However, this is challenging because it is being done in the context of a highly mobile environment. Therefore, traditional handover techniques are inadequate due to the high velocity of the vehicle and the small coverage radius of...
Article
Full-text available
Recently, Internet of Things (IoT) has emerged as a significant advancement for Internet and mobile networks with various public safety network applications. An important use of IoT based solutions is its application in post-disaster management, where the traditional telecommunication systems may be either completely or partially damaged. Since ena...
Article
Full-text available
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to...
Article
Full-text available
This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PB...
Article
Full-text available
This paper considers multiple-input multiple-output (MIMO) full-duplex (FD) two-way secrecy systems. Specifically, both multi-antenna FD legitimate nodes exchange their own confidential message in the presence of an eavesdropper. Taking into account the imperfect channel state information (CSI) of the eavesdropper, we formulate a robust sum secrecy...
Article
Full-text available
In this paper, we propose beamforming schemes to simultaneously transmit data securely to multiple information receivers (IRs) while transferring power wirelessly to multiple energy-harvesting receivers (ERs). Taking into account the imperfection of the instantaneous channel state information (CSI), we introduce a chance-constrained optimization pr...
Article
The success of personal mobile communication technologies has led an emerging expansion of the telecommunication infrastructure but also to an explosion to mobile broadband data traffic as more and more people completely rely on their mobile devices, either for work or entertainment. The continuously interaction of their mobile devices with the mob...
Conference Paper
In this paper, we propose beamforming schemes to simultaneously transmit data to multiple information receivers (IRs) while transfering power wirelessly to multiple energy-harvesting receivers (ERs). Taking into account the imperfection of the instantaneous channel state information, we introduce a probabilistic-constrained optimization problem to...
Conference Paper
This paper considers an underlay access strategy for coexisting wireless networks where the secondary system utilizes the primary spectrum to serve its users. We focus on the practical cases where there is uncertainty in the estimation of channel state information (CSI). Here the throughput performance of each system is limited by the interference...
Article
In this paper, a game theory-based cooperation scheme is investigated to enhance the physical layer security in both primary and secondary transmissions of a cognitive radio network (CRN). In CRNs, the primary network may decide to lease its own spectrum for a fraction of time to the secondary nodes in exchange of appropriate remuneration. We consi...
Conference Paper
Applications for VANETs will require seamless communication between vehicle-to-infrastructure and vehicle-to-vehicle. However, this is challenging because this is a highly mobile environment. Therefore, traditional handover techniques are inadequate due to the high velocity of the vehicle and the small coverage radius of Road-side Units. Hence in o...
Article
In this letter, physical layer (PHY) security is investigated for both primary and secondary transmissions of a cognitive radio network (CRN) that is in danger of malicious attempt by an eavesdropper (ED). In our proposed system, the secondary transmitter (ST) is acted as a trusted relay (TR) for primary transmission and the PHY security is facilit...
Conference Paper
This paper investigates the security at the physical layer of cooperative relay communications. Inspired by the principle of physical-layer network coding (PNC), we propose a new secure relaying scheme, namely secure PNC-based modify-and-forward (SPMF). In the proposed scheme, the relay node linearly combines the decoded data from the source node w...
Article
This paper investigates double-threshold based energy detector for cooperative spectrum sensing mechanisms in cognitive wireless radio networks. We first propose a hybrid double-threshold based energy detector (HDTED) to improve the sensing performance at secondary users (SUs) by exploiting both the local binary/energy decisions and global binary d...
Article
This paper investigates cooperative spectrum sensing (CSS) in cognitive wireless radio networks (CWRNs). A practical system is considered where all channels experience Nakagami-$m$ fading and suffer from background noise. The realisation of the CSS can follow two approaches where the final spectrum decision is based on either only the global decisi...
Conference Paper
Full-text available
This paper investigates the game theory based cooperation method to optimize the PHY security in both primary and secondary transmissions of a cognitive radio network (CRN) that include a primary transmitter (PT), a primary receiver (PR), a secondary transmitter (ST), a secondary receiver (SR) and an eavesdropper (ED). In CRNs, the primary terminal...
Conference Paper
Full-text available
In this paper, we study simultaneous data transmission and power transfer for multiple information receivers (IRs) and energy-harvesting receivers (ERs) in cellular networks. We propose an optimization problem to maximize a linear combination of the useful signal power at each IR and total received power at each ER subject to the following three se...