Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Huy Hoang Ngo"'
Autor:
Huy Hoang Ngo, Thi Huong Nguyen, Van Tuan Nguyen, Thi Huyen Trinh Le, Ngoc Thanh Nguyen, Thi Kim Yen Hoang
Publikováno v:
Tạp chí Khoa học Điều dưỡng. 5:93-100
Objective: To describe the current knowledge towards prevention hypertensive complications among outpatients managed by Nghe An Friendship General Hospital Hospital in 2021 and to evaluate changes in their knowledge regarding prevention complications
Publikováno v:
Advances in Neural Networks – ISNN 2018 ISBN: 9783319925363
ISNN
ISNN
In CBIR, images are represented by certain low-level features that describe their color, texture and shape. The combination of different image features in a global distance measurement requires normalized feature vectors. Nowaday, several normalizati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb960c1de9b05514c17f74bcf5085ff7
https://doi.org/10.1007/978-3-319-92537-0_71
https://doi.org/10.1007/978-3-319-92537-0_71
Publikováno v:
Advances in Neural Networks – ISNN 2018 ISBN: 9783319925363
ISNN
ISNN
Synthesizing Vietnamese tone plays an important role in Vietnamese text-to-speech systems. To accomplish this, the first important step is to determine the pitch-markers of voice utterances and this technique is still an open issue. In this paper, we
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::603dbb7ebd8e1b33772edd4c6e9ca2e7
https://doi.org/10.1007/978-3-319-92537-0_72
https://doi.org/10.1007/978-3-319-92537-0_72
Publikováno v:
Journal of Convergence Information Technology. 5:82-94
Publikováno v:
Journal of Convergence Information Technology. 5:69-81
Publikováno v:
RIVF
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642178771
Monash University
Monash University
Current mobile banking protocols simply are not as well guarded as their Internet counterparts during the transactions between a mobile device and a financial institution. Recently, many mobile banking protocols using public-key cryptography have bee
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::348e9e64b6a0e671e9e6c709737fde30
https://doi.org/10.1007/978-3-642-17878-8_42
https://doi.org/10.1007/978-3-642-17878-8_42
Publikováno v:
AINA
Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for
Publikováno v:
NBiS
Group key management is an important framework to secure group communications. To improve the performance of re-keying for group key management in large scale systems, logical hierarchical key was proposed. However, this approach does not consider th