Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Honglun Hou"'
Publikováno v:
In Computers & Industrial Engineering 2007 53(2):350-356
Autor:
Hong Shen1, Honglun Hou2, Wei Tian3, MingHui Wu2, Tianzhou Chen4, Xian Zhong1 zhongxian_2000@163.com, Shen, Hong1 (AUTHOR), Hou, Honglun2 (AUTHOR), Tian, Wei3 (AUTHOR), Wu, MingHui2 (AUTHOR), Chen, Tianzhou4 (AUTHOR), Zhong, Xian1 (AUTHOR)
Publikováno v:
Technology & Health Care. 2016, Vol. 24 Issue 2, p163-168. 6p.
Publikováno v:
Technology and Health Care. 24:163-168
Background Fatigue is the most common symptom associated with cancer and its treatment, and profoundly affects all aspects of quality of life for cancer patients. It is very important to measure and manage cancer-related fatigue. Usually, the cancer-
Publikováno v:
Computing. 96:545-564
The growing number of processing cores in a single CPU is demanding more parallelism from sequential programs. But in the past decades few work has succeeded in automatically exploiting enough parallelism, which casts a shadow over the many-core arch
Publikováno v:
International Journal of Digital Content Technology and its Applications. 6:548-557
A quantitative quality control method of big data in cancer patients using artificial neural network
Publikováno v:
CCIS
Nonstandard treatments for cancer patients are commonly seen in hospitals of developing countries like China. So it is crucial to standardize the treatments for cancer with technological means in order to supervise the process of treatments. Widespre
Publikováno v:
HPCC-ICESS
Owing to the high upgrade speed of computer hardware, the courses of computer hardware and the cor-relative software courses are eager to be updated synchronously. College faculties are the key resource of higher education, so faculty training of com
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642352102
Traditional patient monitoring equipment has the capability of real-time monitoring, but now the tele-health equipment in the aged community service needs not only real-time monitoring but person locating in the communities for mobile applications. T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6721c0a558ed07bf63c296053e18a29c
https://doi.org/10.1007/978-3-642-35211-9_90
https://doi.org/10.1007/978-3-642-35211-9_90
Publikováno v:
SMC
The current security mechanism of LDAP system is authenticating and authorizing. It can tolerate attacks occurred on client and the Internet, and benign faults on servers such as crashes. But it can not tolerate Byzantine(malicious) faults on server
Publikováno v:
IMSCCS (2)
LDAP is a set of protocols for accessing information directories which provides data integrity and authentication. It takes attacks on clients, Internet and benign attacks on servers into account. But the malicious attacks on servers and software err