Search

Browse Subject Areas

For Authors

Submit a Proposal

Creative Approaches Towards Development of Computing and Multidisciplinary IT Solutions for Society

Edited by Anchit Bijalwan, Rick Bennett, Jyotsna G.B and Sachi Nandan Mohanty
Copyright: 2024   |   Status: Published
ISBN: 9781394272273  |  Hardcover  |  
582 pages
Price: $225 USD
Add To Cart

One Line Description
This book containing 33 chapters provides an insightful look at creative approaches toward the accelerated development of computing and multidisciplinary IT solutions for society.

Audience
The book has a wide audience comprising specialists in artificial intelligence, information technology, software engineers, data and cyber security scientists, as well as those in the applied areas such as business, finance, industry and manufacturing. Policymakers and consultants will find this book useful as well.

Description
Technology is advancing on all fronts and is opening new and innovative adaptations to our modern world every single day causing huge shifts in practices and patterns. These new technologies allow us opportunities to gain insights into the discoveries of creative and innovative approaches. The book covers emerging next-generation computing research, developments of computing, and multidisciplinary ICT solutions in seven themes:
•The first theme concerns the emerging research into next-generation computing like cloud computing, cyber security, and gaming;
•The second theme pertains to information technology in the textile industry;
•The third theme zeroes in on the adoption of ICT for digitalization, artificial intelligence, and machine learning;
•The fourth theme addresses online collaboration in the creative process;
•The fifth theme covers the development of computing and multidisciplinary ICT solutions for salient disciplines like education, governance, commerce, and business communication;
•The sixth theme provides a security assessment and defense strategies for banking and financial institutions;
•The seventh theme covers creative approaches towards the implementation of the 4th Industrial Revolution.

Back to Top
Author / Editor Details
Anchit Bijalwan, PhD, is an academician, researcher, consultant, and mentor with 18 years of teaching experience for graduate, and postgraduate students. He works at the School of Computing and Innovative Technologies, British University Vietnam. In 2018, he was awarded an International Research Award from the International Research Association, London, UK.

Rick Bennett, PhD, is a Deputy Vice-Chancellor of British University Vietnam. Raised and educated in London, England, Rick completed his PhD from University of Sydney, Australia. In addition, he continues to work on a series of Creative Outreach Projects that aim to assist communities in less fortunate parts of the world – including Kenya, Uganda, Sri Lanka, and the Philippines.

Jyotsna G.B., PhD, is the Head Academic Quality at the British University Vietnam. She is an academician, author, and researcher with diverse multinational work experience in teaching undergraduate and postgraduate students. Dr. Jyotsna has 15 years of teaching experience with various reputed universities in India, Africa, and Vietnam. She has published over 15 research papers in reputed national and international journals and conferences and authored three books.

Sachi Nandan Mohanty, PhD, is in the School of Computer Science and Engineering (SCOPE) at VIT-AP University, Amaravati, Andhra, Pradesh, India. He has edited 25 books and published 60 international journals of international repute. His research areas include data mining, big data analysis, cognitive science, fuzzy decision-making, brain-computer interface, cognition, and computational intelligence. In 2015, he was awarded the first prize of the Best Thesis Award by the Computer Society of India.

Back to Top

Table of Contents
Preface
Part 1: Emerging Research in Next Generation Computing Like Cloud Computing, Cybersecurity, and Gaming
1. Deploying Virtual Desktop Infrastructure with Open-Source Platform for Higher Education

Hung Vu Duy, Thu Nguyen Xuan, Trang Ha Mai Huyen, Tuan Nguyen Dinh, Tung Nguyen Khanh, Tinh Hoang Quy, Phong Bui Hai, Thang Tran Van and Trung Tran
1.1 Introduction
1.2 Background
1.2.1 Cloud Computing
1.2.2 Virtualization
1.3 VDI Deployment Using CloudStack as a Private Cloud
1.4 Deploy at Information Technology Laboratories
1.5 Conclusion
References
2. Enhancing Intrusion Detection Effectiveness Through an Enhanced Hierarchical Communication Architecture
Thu Nguyen Xuan, Trang Ha Mai Huyen, Trung Tran and Ngoc Le Anh
2.1 Introduction
2.2 Related Works
2.3 Proposed Model
2.4 Analysis
2.5 Conclusion
References
3. Enhanced SDN Security Using Mobile Agent
Nguyen Minh Phuc,, Nguyen Ai Viet, Tran Quy Nam, Long Cu Kim and Vijender Kumar Solanki
3.1 Introduction
3.1.1 Introduction to SDN
3.1.2 SDN Compared to Conventional Networking
3.2 Network Security in SDN
3.2.1 Vulnerabilities in SDN
3.2.2 Threats on SDN
3.3 Enhanced SDN Network Security Using Mobile Agent
3.3.1 Cloud Network Management Mobile Agent (CNMMA) Architecture Model
3.3.2 Mobile Agent Platform (MAP)
3.3.3 Network Management Mobile Agent
3.3.4 Mobile Agent Distributed Intrusion Detection System Framework (MA-DIDS)
3.3.4.1 IDS-Control Center
3.3.4.2 Mobile Agent SDN Control App
3.3.5 SDN Network Simulator
3.4 Conclusions
References
4. Understanding the Impact and Implications of Emagnet and Pastebin in Cybersecurity
Shivam Mishra, Sundaram Mishra, Satyam Mishra, Phung Thao Vi and Yan Chi Toh
4.1 Introduction
4.1.1 Background of Emagnet and Pastebin
4.1.2 Importance of the Research
4.1.2.1 Research Questions
4.2 Literature Review
4.2.1 Evolution of Pastebin as a Platform for Hacker Exploits
4.2.1.1 Emagnet’s Capabilities and Functionalities
4.3 Leaked Databases
4.4 Methodology
4.4.1 Emagnet
4.4.2 Key Features and Known Issues
4.4.3 How Emagnet Works
4.4.4 Installation and Platform Requirements
4.4.5 Emagnet Usage Options
4.4.6 Key Features and Benefits
4.4.7 Our Review
4.4.8 Pastebin
4.4.9 Pastebin’s Dark Side
4.4.10 The Need for Vigilance
4.4.11 Leveraging Authentic8 Flash Report
4.4.12 The Role of Silo for Research
4.4.13 Our Implementation Case Study
4.4.14 Our Review
4.5 Countermeasures and Best Practices
4.5.1 Strategies for Individuals and Organizations
4.5.2 Strengthening Password Security and Promoting 2FA
4.5.3 Responsible Vulnerability Disclosure
4.6 Recommendations and Future Directions
4.6.1 Developing Effective Policies
4.6.2 Enhancing Collaboration Between Stakeholders
4.6.3 Raising Awareness Among Users
4.6.4 Predicting Future Trends and Challenges
4.7 Conclusion
References
5. Mitigating the Threat of Multi‑Factor Authentication (MFA) Bypass Through Man-in-the-Middle Attacks Using EvilGinx2
Sundaram Mishra, Shivam Mishra, Yan Chi Toh, Satyam Mishra and Phung Thao Vi
5.1 Introduction
5.1.1 Background and Significance of MFA in Enhancing Account Security
5.1.2 Overview of the Research Topic and the Use of EvilGinx2 for MFA Bypass
5.1.3 Research Objectives and Research Questions
5.2 Literature Review
5.2.1 Overview of MFA and its Effectiveness in Preventing Unauthorized Access
5.2.2 Previous Research on MFA Vulnerabilities and Bypass Techniques
5.2.3 Case Studies
5.3 Methodology
5.3.1 Description of Experimental Setup and Environment
5.3.2 Demonstration of EvilGinx2’s Functionality and Operation
5.4 Results and Discussion
5.4.1 Evaluation of EvilGinx2’s Ability to Bypass MFA Protections
5.4.2 Analysis of Captured Authentication Data, Including Usernames, Passwords, and Cookies
5.4.3 Discussion of the Effectiveness of the MFA Bypass Technique
5.4.4 Identification of Potential Vulnerabilities and Areas of Improvement
5.5 Conclusion
5.5.1 Summary of the Research Objectives and Main Findings
5.5.2 Contribution to the Field of Cybersecurity and MFA Protection
5.5.3 Implications for Organizations and Recommendations for Future Research
References
6. Implementation of Rule-Based DDoS Solution in Software-Defined Network
Kim Gyoung Tae, Anchit Bijalwan and Hamza Mutaher
6.1 Introduction
6.2 Background Study
6.2.1 Software-Defined Network (SDN)
6.2.2 Software-Defined Architecture
6.2.2.1 Application Layer
6.2.2.2 Control Layer
6.2.2.3 Data Layer
6.2.3 OpenFlow Protocol
6.2.4 Flow Table
6.2.5 Advantages of SDN
6.2.6 Vulnerabilities of SDN and OpenFlow
6.2.6.1 SYN Flag DDoS Attacks in SDN
6.2.6.2 Three-Way Handshake in TCP Protocol
6.3 Critical Literature Review
6.3.1 Machine Learning-Based Mitigation
6.3.1.1 Limitations of Machine Learning-Based Approach
6.3.2 Statistical-Based Mitigation
6.3.2.1 Limitations of Statistical-Based Approach
6.3.3 Rule-Based Mitigation
6.3.3.1 Limitations of Rule-Based Approach
6.4 Methodologies
6.4.1 System Configuration
6.4.2 Static Threshold Rule-Based Approach
6.4.3 Testing
6.5 Results and Discussion
6.5.1 Reflection and Future Scope
6.6 Conclusion
References
7. Securing Network Data with a Novel Encryption Scheme
Viju Prakash Maria John, Tadesse Birara Akele and Alemu Jorgie Mohammed
7.1 Introduction
7.2 Related Work
7.3 Proposed System and Methodology
7.3.1 Advanced Encryption Standards (AES)
7.3.2 RSA Public-Key Encryption
7.4 Results and Discussion
7.4.1 Result Analysis
7.4.1.1 CRC Generation Time
7.4.1.2 Encryption Time
7.4.1.3 Decryption Time
7.4.1.4 CRC Checker Time
7.4.1.5 CRC Generation Memory
7.4.1.6 Encryption Memory
7.4.1.7 CRC Checker Memory
7.4.1.8 Decryption Memory
7.4.1.9 Error Detection Capability
7.5 Conclusion and Future Works
References
8. A Robust Authentication Technique for Client–Server Secure Login
Lê Duy Anh, Hamza Mutaher and Anchit Bijalwan
8.1 Introduction
8.2 Preliminary Concept
8.2.1 Cryptography
8.2.2 Symmetric Key Algorithms
8.2.3 Asymmetric Key Algorithms
8.2.4 Hash Function
8.2.5 Key Exchange
8.3 Related Work
8.3.1 Transport Layer Security (TLS) Protocol
8.3.2 Kerberos
8.3.3 Secure Remote Password (SRP) Protocol
8.3.4 OAuth
8.3.5 Mutual Authentication
8.4 Proposed Technique
8.4.1 Key-Generation Phase
8.4.2 Registration Phase
8.4.3 Login Phase
8.4.4 Principles of the Algorithm
8.5 Implementation
8.6 Discussion
8.6.1 Security Analysis
8.6.2 Security Features and Performance Comparison
8.7 Conclusion
References
9. Application of a Web-Based Food Ordering Platform to Minimize Food Wastage and Prevent Theft
Le Hoang Minh, Anchit Bijalwan and Hamza Mutaher
9.1 Introduction
9.1.1 Background
9.1.2 The Food Wastage Issues in Cafeterias
9.1.3 Overcrowding and Long Queues in Cafeteria
9.1.4 Theft and Delivery Assurance
9.1.5 Scalability of Cafeteria Operations
9.1.6 Lack of Use of Technology in School Cafeteria
9.1.7 Problems with Traditional Software Architecture
9.2 Literature Review
9.2.1 The Current Food Wastage Problem in Cafeterias
9.2.2 Identifying Gaps to Overcome Overcrowding Issues in Cafeteria
9.2.2.1 Similar Food Ordering Solutions
9.2.3 Research Gaps
9.3 Methodology
9.3.1 Introduction
9.3.2 Feature Requirements
9.3.3 System Architecture Requirements
9.3.4 Technical Requirements
9.3.5 Infrastructure Design
9.3.6 Software Architecture
9.3.7 IoT Integrations
9.3.8 Database Schema
9.4 Discussion
9.4.1 Advantages
9.4.2 Limitations
9.4.3 Comparison to Other Implementations
9.5 Conclusion
References
Part 2: IT in the Textile Industry
10. Research Design Machine Maintenance Management Software Module for Garment Industry

Vu Thi Duom, La Thi Ngoc Anh, Le Thi Dung and Le Tieu Thanh
10.1 Introduction
10.2 Building a Maintenance Process for Garment Industry Machine
10.2.1 Maintenance Process for Machinery
10.2.2 Information in the Maintenance Management Machine Records
10.3 Designing a “Machine Maintenance Management” Software Module
10.3.1 Database Design
10.3.2 Designing a “Machine Maintenance Management” Software Module
10.4 Conclusion
References
Part 3: Adoption of ICT for Digitalization, Artificial Intelligence, and Machine Learning
11. Performance Comparison of Prediction of a Hydraulic Jump Depth in a Channel Using Various Machine Learning Models

Nguyen Minh Ngoc and Bui Hai Phong
Nomenclature
11.1 Introduction
11.2 Related Works
11.3 Materials and Methods
11.3.1 Equation of the Hydraulic Jump
11.3.2 Data Used in the Study
11.4 Machine Learning Models
11.4.1 Features of Machine Learning Models
11.4.2 Support Vector Machine (SVM)
11.4.3 Decision Tree (DT)
11.4.4 Random Forest (RF)
11.4.5 Artificial Neural Network (ANN)
11.5 Results and Discussion
11.6 Conclusions
References
12. Creating a Video from Facial Image Using Conditional Generative Adversarial Network
Bui Thanh Hung, Ho Vo Hoang Duy and Vo Quoc Huy
12.1 Introduction
12.2 Related Works
12.3 Methodology
12.3.1 The Proposed Model
12.3.2 Conditional Generative Adversarial Network (cGAN)
12.3.3 Hidden Affine Transformation
12.4 Experiments
12.4.1 Dataset
12.4.2 Dlib
12.4.3 Evaluation
12.4.4 Result
12.5 Conclusion
References
13. Deep Learning Framework for Detecting, Classifying, and Recognizing Invoice Metadata
Nhat Quang Doan, Van Tang Nguyen, Anh Tuan Giang, Van Trung Doan and Dang Bui Hai
13.1 Introduction
13.2 Related Works
13.3 Invoice Data Analysis
13.4 Proposed Method
13.5 Experiments
13.6 Conclusion and Perspectives
References
14. Artificial Neural Network-Based Approach for Molecular Bitter Prediction
Huynh Quoc Anh Bui, Trong Hop Do and Thanh Binh Nguyen
14.1 Introduction
14.2 Our Proposed Approach (EC-ANN)
14.2.1 Data Preparation and Curation
14.2.2 Augmentation
14.2.3 ECFPs and Vectorization
14.2.4 Model Architecture
14.3 Our Experiment Results
14.4 Conclusion
Acknowledgment
References
15. An Efficiency Improvement of the N-Beats Model for Sale Forecast Problem
Huy Nguyen Dinh, Trong Hop Do and Thanh Binh Nguyen
15.1 Introduction
15.2 N-Beats and our Proposed Improvement
15.2.1 The Original N-Beats Model
15.2.2 Our Proposed Improvement
15.3 Experimental Results
15.3.1 Dataset
15.3.2 Experimental Method
15.4 Conclusion
Acknowledgments
References
16. Generative Pre-Trained Transformer for Vietnamese Community-Based COVID-19 Question Answering
Tam Minh Vo and Khiem Vinh Tran
16.1 Introduction
16.2 Related Work
16.3 Methodologies
16.3.1 Neural Network
16.3.1.1 Attention-Based Recurrent Neural Network
16.3.1.2 Convolutional Neural Network
16.3.1.3 Transformer
16.3.1.4 Generative Pre-Trained Transformer
16.4 Experiment
16.4.1 Dataset
16.4.2 Evaluation Metrics
16.4.2.1 BLEU
16.4.2.2 METEOR
16.4.2.3 ROGUE-L
16.4.3 Experiment Setup
16.4.4 Main Results
16.5 Conclusion and Future Work
Acknowledgment
References
17. Identification and Classification of Plant Leaf Diseases Using Data Augmentation and Deep Convolutional Neural Networks
Phong Bui Hai, Nguyen Ngoc Bao, Nguyen Canh Thai, Pham Hong Phuc, Nguyen Quang Minh, Le Chi Luan, Nguyen Quang Trung and Pham Van Khuong
17.1 Introduction
17.2 Related Work
17.3 Proposed Method
17.4 Experimental Results
17.4.1 Dataset and Evaluation Metric
17.4.2 Performance Evaluation
17.5 Conclusions and Future Works
Acknowledgments
References
18. Tourists’ Perception of Technology Adoption in the Tourism Industry and Innovative Strategies for Integration
Nguyen Thi Van Hanh
18.1 Introduction
18.2 Method
18.3 Result and Discussion
18.3.1 Demographics
18.3.2 Tourists’ Perception of Technology Adoption
18.3.3 Innovative Strategies for Integrating Technology in the Tourism Industry
18.4 Conclusion and Implications
References
Part 4: Online Collaboration in the Creative Process
19. Security for 5G Networks is Based on Pseudo‑Random Sequences

Long Tran Huy, Quynh Le Chi, Canh Duong Tran, Chinh Tran Thien, Ngoc Le, Anh Thu Le, Huy Le and Phuong Thao Le
19.1 Introduction
19.2 Scrambler
19.3 Algorithm
19.4 Simulation
19.5 Conclusion
References
20. Navigating the Digital Information Flow the Influence of the Internet on the Choice of Technology in Creative Processes of Interactive Art
Le Minh Cat Tuong and Gaja Ortega Alex
20.1 Introduction
20.2 Literature Review
20.2.1 Digital Interactive Art and Internet: The Definition
20.2.2 In the Early Days: Interactive Web Art and Coding Language
20.2.2.1 The Dependency on the Available Technology
20.2.2.2 Technology as Motivation
20.2.3 Current Times: Advanced Technology and Accessibility
20.2.3.1 Advanced Technology: A New Reality
20.2.3.2 Accessibility: Community and Education
20.3 Methodology
20.3.1 Research Gaps and Goals of the Study
20.3.2 Data Collecting Methods
20.3.2.1 Methodology Approaches
20.3.2.2 Sampling Method
20.3.3 Interview Structure Design
20.3.3.1 Question Design
20.3.3.2 Interview Preparation
20.3.4 Data Analysis Methods
20.4 Data Analysis
20.4.1 Overview of the Main Theme
20.4.2 Theme 01: Feelings Towards New Technology
20.4.3 Theme 02: Action Toward New Technology
20.4.4 Theme 03: Motivation to Try New Technology
20.4.5 Theme 04: Community
20.5 Discussion and Conclusion
20.5.1 Discussion
20.5.2 Conclusion
References
21. Learning Space Using Adaptive Models
Shruthi T. Gopi
21.1 Introduction
21.2 Methodology
21.2.1 User-Centered Design Approach
21.2.2 Iterative Development
21.2.3 Adaptive Learning Capabilities
21.2.4 Social and Collaborative Features
21.2.5 Personalization Feedback and Guidance—That Facilitate Feedback Mechanisms
21.2.5.1 Seamless Integration
21.2.6 Customization Options
21.3 Results
21.4 Discussion
21.5 Conclusion
References
Part 5: Development of Computing and Multidisciplinary ICT Solutions for Salient Disciplines like Education, Governance, Commerce and Business Communication
22. Loan Credit Prediction Using Deep Learning Approach

Bui Thanh Hung and Luu Hoang Ngoc Trinh
22.1 Introduction
22.2 Related Works
22.3 Methodology
22.3.1 The Proposed Model
22.3.2 Feature Extraction
22.3.3 Training Deep Learning Model
22.4 Experiments
22.4.1 Dataset
22.4.2 Evaluating Metric
22.5 Results
22.6 Conclusion
References
23. User Interface Design and Usability in Information Systems
Phung Thao Vi, Satyam Mishra and Nguyen Van Tanh
23.1 Introduction
23.2 Literature Review
23.2.1 User Interface Principles
23.2.2 User Interface Designing Faces to Several Challenges
23.2.3 Usability Factors and Challenges in Information System
23.2.4 User Interface Design and Usability in Information System
23.3 Methodology
23.3.1 Finding Out MDA-Compliant Environment Principles and UsiXML Model Approach
23.3.2 Usability Benchmarks Using CIUEs Approach
23.3.3 Usability and How it Works on Heuristics Method in Bank System
23.4 Discussion
23.5 Conclusion
References
24. RobotGPT: A Voice-Based Robot Integrated with Edge Computing Technology
Van Dai Pham, Ba Anh Luu, Tan Dat Ly, Khang Minh Vuong, Thai Anh Bui and Anh Ngoc Le
24.1 Introduction
24.2 Related Works
24.2.1 AI, GPT, and ChatGPT
24.2.2 Edge Computing for Reduced Response Latency
24.2.3 Applications and Use Cases
24.2.3.1 Virtual Assistants
24.2.3.2 Customer Support and Help Desks
24.2.3.3 Education and Training
24.2.3.4 Smart Home Automation
24.3 RobotGPT Framework
24.4 Demonstration Results
24.5 Conclusion
References
25. Peer-to-Peer Electricity Trading: A Business Solution Based on Blockchain for Developing Renewable Energy in Vietnam
Cong-Doan Truong, Ha Duc Minh Chau and Le Anh Ngoc
25.1 Introduction
25.2 Methodology
25.2.1 The Virtual Layer
25.2.2 The Physical Layer
25.3 Results
25.3.1 A Proposed Semi-P2P Electricity Trading Model Incorporating Electric Vehicle Charging Stations
25.3.2 A Pathway for Developing P2P Electricity Markets in Vietnam
25.4 Conclusions
References
26. Designing Software to Digitize Data of Shirt Sewing Technology Process
Bui Thi Phuong Thao, La Thi Ngoc Anh and Le Tiểu Thanh
26.1 Introduction
26.2 Building Sewing Technology Process for Shirt Products
26.3 Designing Software to Digitize the Shirt Sewing Technology Process (Nottingham, 2017)
26.3.1 Building a Database System
26.4 Design Software
26.5 Result of Software Design to Digitize the Shirt Processing Procedure
26.6 Conclusion
References
Part 6: Security Assessment and Defence Strategies for Banking and Financial Institutions
27. Analysis of the Preconditions for the Introduction of a Central Bank Digital Currency and Some Recommendations for Central Banks

Phuong Anh Pham, Nhat Minh Nguyen and Thi Minh Trang Nguyen
27.1 Introduction
27.2 Global Status of CBDC Development and Application
27.3 Features and Conditions of the Birth of CBDC
27.3.1 Features of CBDC
27.3.2 Analysis of the Birth Conditions of CBDC
27.3.2.1 Clear Policy Goals
27.3.2.2 Support from Stakeholders
27.3.2.3 Solid Legal Framework
27.3.2.4 Technology Capacity
27.3.2.5 Market Feasibility
27.4 Some Recommendations for Central Banks
27.5 Conclusion
References
28. Efficient Face Mask Detection for Banking Information Systems
Cong-Doan Truong, Satyam Mishra, Nguyen Quang Long and Le Anh Ngoc
28.1 Introduction
28.1.1 Background and Motivation
28.1.2 Literature Review
28.1.3 Overview and Objectives of Proposed System
28.2 Theoretical Background
28.2.1 Traditional Object Detection Techniques
28.2.2 Convolutional Neural Networks (CNNs)
28.2.3 Two-Stage Detectors vs Single-Stage Detectors
28.3 Methodology
28.3.1 System Overview and Architecture
28.3.2 Dataset Description and Preprocessing
28.3.3 Face Detector Selection and Evaluation
28.3.4 Face Mask Classifier Model Development
28.3.5 Post-Processing Techniques
28.4 Results and Discussion
28.4.1 Evaluation Results
28.4.2 Experiments
28.4.3 Discussion
28.4.4 Conclusion
References
29. Corporate Governance in Vietnam: Case from Private Sector
Jyotsna Ghildiyal Bijalwan
29.1 Introduction
29.2 Review of Literature
29.2.1 Significance of Corporate Governance in Vietnam
29.2.2 Corporate Governance in Vietnam
29.2.3 Statement of the Problem
29.3 Research Methodology
29.4 Results and Discussions
29.4.1 Transparency
29.4.1.1 Transparency Towards Employees
29.4.1.2 Towards Investors
29.4.1.3 Total Transparency
29.4.2 Ownership Structure
29.4.3 Board Procedure
29.4.4 Investor Rights
29.4.5 Governance Strategy
29.4.6 Overall Corporate Governance Rating
29.5 Conclusion
References
Part 7: Creative Approaches Towards Implementation of the 4th Industrial Revolution
30. Leveraging BIM Technology for Fire Prevention and Fighting Design, Appraisal and Management in Vietnam

Nguyen Van Tam, To Thi Huong Quynh and Nguyen Viet Phuong
30.1 Introduction
30.2 Application of BIM Technology in Fire Prevention and Fighting Design
30.3 Appraisal of Fire Prevention and Fighting Design for BIM Implementation Projects in Vietnam
30.3.1 Proposing Additional Tasks in the Appraisal and Approval of Fire Protection and Fighting Design
30.3.2 Proposing Fire Protection and Fighting Process to Integrate BIM Technology in Construction Phase
30.4 Conclusion
References
31. Assessing the Feasibility of Smart Cities and Promoting an Intelligent Urban System for Vietnam
Dao Thi Nhu, To Thi Huong Quynh and Le Hoang Trung
31.1 Introduction
31.2 Smart Cities
31.2.1 Definition of Smart City
31.2.2 Components of a Smart City
31.2.3 Successful Keys to Develop Smart Cities
31.3 International Experience on Smart City Development
31.3.1 Improving Land Management for Urban Construction
31.3.2 Promote Public Transport
31.3.3 Urban Environment
31.3.4 Management of Social Infrastructure and Other Public Assets
31.3.5 Participatory Urban Development
31.4 SWOT Analysis Assesses the Feasibility of Smart Cities and Promotes the Intelligence of Vietnam’s System
31.4.1 Preliminary Analysis of the Feasibility of Smart City Orientation in Vietnam
31.4.1.1 Strengths
31.4.1.2 Weaknesses
31.4.1.3 Opportunities
31.3.1.4 Threats
31.4.2 Setting Smart City Development Goals
31.4.3 Develop an Action Plan
31.4.3.1 The Strategy Develops in Stages
31.4.3.2 Pilot Strategy
31.4.3.3 Parallel Development Strategy
31.4.3.4 Complete Adaptation Strategy
31.4.4 Proposals to Promote the Development of Smart Cities
31.4.4.1 Urban Management Policy
31.4.4.2 Policies on Technological Development
31.4.4.3 Implementation Organization
31.4.4.4 Capital Mobilization and Management
31.5 Conclusions
References
32. Design and Implementation of a Secured Enterprise Network Infrastructure
Nguyen Dang Hieu, Hamza Mutaher and Anchit Bijalwan
32.1 Introduction
32.1.1 Research Questions
32.1.2 Aim
32.1.3 Objectives
32.2 Related Work
32.2.1 Identified Knowledge Gap
32.3 Design Methodology
32.4 Implementation
32.4.1 VLAN Configuration
32.4.2 IP Addressing
32.4.3 Routing Protocol Configuration
32.4.4 ASA Firewall Configuration
32.4.5 Security Techniques Configuration
32.5 Results and Discussion
32.5.1 Verifying Routing Protocol Configuration
32.5.2 Performance Evaluation of Routing Protocol
32.5.3 Delay Time
32.5.4 Convergence Time
32.6 Conclusion and Recommendations
References
33. Platform Software for Building Web SCADA Applications
Cong Pham Chi, Thai Trinh Hai, Long Tran Huy, Linh Le Ba, Ngoc Le and Nghia Hoang Trong
33.1 Introduction
33.2 Research Platform Software for Developing SCADA Applications
33.2.1 Platform Software for Developing SCADA Applications on Desktop
33.2.2 Platform Software for Developing SCADA Applications on the Web
33.2.2.1 Ignition/Inductive Automation
33.2.2.2 WinCC WebNavigator/Siemens
33.2.2.3 WebAccess/Advantech
33.2.3 Review of Studies on the Software Platform for Developing SCADA Applications on the Web
33.3 Proposed Directions for Research and Development of Platform Software
33.4 Conclusion and Future Work
Acknowledgement
References
Index

Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page