Zobrazeno 1 - 10
of 551
pro vyhledávání: '"T.-S. Ho"'
Autor:
C.-C. King, H.-Y. Ko, T.-C. Chan, Y.-H. Pan, T.-S. Ho, T.-H. Tung, T.-H. Wen, C.-D. Chen, C.-Y. Pan, H.-P. Ho, J.-J. Huang, L.-S. Tsai, L.-H. Chiang, C.-G. Huang, P.-Y. Shu, C.-R. Yang, W. Chen, C.-H. Yu, C.-C. Ku
Publikováno v:
International Journal of Infectious Diseases, Vol 130, Iss , Pp S17-S18 (2023)
Intro: Severe outbreaks in Taiwan during 1987-2015 had always started from failure in detecting early dengue cases. However, the extreme low numbers of indigenous dengue cases in southern Taiwan during 2016-2022 have been succeeded with early efforts
Externí odkaz:
https://doaj.org/article/5370d95b3e6e436b920391b5c9158db6
Autor:
T.-C. Weng, T.-S. Ho
Publikováno v:
International Journal of Infectious Diseases, Vol 101, Iss , Pp 206- (2020)
Externí odkaz:
https://doaj.org/article/3695459872d0412f97a1ad7180b42451
Autor:
Y.-H. Pan, Y.-W. Chien, T.-S. Ho, H.-Y. Ko, S.-F. Chang, C.-Y. Yu, P.-Y. Shu, D.-Y. Chao, C.-C. Ku, C.-C. King
Publikováno v:
International Journal of Infectious Diseases, Vol 101, Iss , Pp 329- (2020)
Externí odkaz:
https://doaj.org/article/627f640d91184db7a96c9e6d50e555a7
Publikováno v:
2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
Publikováno v:
Revolutionizing Digital Healthcare Through Blockchain Technology Applications ISBN: 9781668465097
Blockchain technology is now being employed across a variety of businesses for smart contracts, data privacy, and supply chain management. A system with a data source can be decentralized, open, safe, and trusted with the help of the new data infrast
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::16b46054dc0aefbdb309f9b886512cad
https://doi.org/10.4018/978-1-6684-6509-7.ch006
https://doi.org/10.4018/978-1-6684-6509-7.ch006
Publikováno v:
Algorithms, Vol 13, Iss 9, p 227 (2020)
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between origin
Externí odkaz:
https://doaj.org/article/3d2978826c984132a1e3dfb39617751d
Publikováno v:
Journal of Organizational and End User Computing. 34:1-29
Due to the increasing ageing population, how can caregivers effectively provide long-term care services to meet the older adults’ needs with finite resources is emerging. In addressing this issue, nursing homes are striving to adopt smart health wi
Publikováno v:
Industrial Management & Data Systems. 121:1552-1576
PurposeUnder the impact of Coronavirus disease 2019 (COVID-19), this paper contributes in the deployment of the Artificial Intelligence of Things (AIoT)-based system, namely AIoT-based Domestic Care Service Matching System (AIDCS), to the existing el
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.