Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Thuong Doan"'
Autor:
Thi Thuong Doan, MD, Thuy Dung Pham, MD, Duy Duan Nguyen, MD, Dac Hong An Ngo, MD, Trong Binh Le, MD, PhD, Thanh Thao Nguyen, MD, PhD
Publikováno v:
Radiology Case Reports, Vol 18, Iss 3, Pp 1121-1126 (2023)
We reported a case of a 48-year-old female patient admitted to the hospital due to balance disorder which progressed rapidly within 1 week. Cerebral magnetic resonance imaging showed significant atrophy and hyperintensities at the middle cerebellar p
Externí odkaz:
https://doaj.org/article/7c3abca91923485e923d7538a13e428d
Autor:
Cong, Le Thanh, Ngoc Lam, Nguyen Thi, Van Thuong, Doan, Ha, Ngo Ngoc, Dung, Nguyen Duc, Anh Dung, Dang Viet, Giang, Ho Truong, Vu, Xuan Thang
Publikováno v:
In Optical Materials November 2021 121
Publikováno v:
International Journal of Secure Software Engineering. 1:1-19
Access control models are often an orthogonal activity when designing, implementing, and deploying software applications. Role-based access control (RBAC) which targets privileges based on responsibilities within an application and mandatory access c
Publikováno v:
TEACHING Exceptional Children. 36:8-16
Access control models are often an orthogonal activity when designing, implementing, and deploying software applications. Role-based access control (RBAC) which targets privileges based on responsibilities within an application and mandatory access c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6a532d59b8bda95419a900f64d60aade
https://doi.org/10.4018/978-1-4666-1580-9.ch005
https://doi.org/10.4018/978-1-4666-1580-9.ch005
Middleware security encompasses a wide range of potential considerations, ranging from the ability to utilize the security capabilities of middleware solutions (for example, CORBA, .NET, J2EE, DCE, and so forth) directly out-of-the-box in support of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3c24798ea6e6f3f1431c86ab6ee732eb
https://doi.org/10.4018/978-1-59904-937-3.ch119
https://doi.org/10.4018/978-1-59904-937-3.ch119
Autor:
Sanguthevar Rajasekaran, L. He, Ian R. Greenshields, Steven A. Demurjian, Reda A. Ammar, Thuong Doan
Publikováno v:
2006 IEEE Aerospace Conference.
Data reduction is a critical problem for counter-terrorism; large collections of documents must be analyzed and processed, raising issues related to performance, lossless reduction, polysemy (the meaning of individual words being influenced by their
Publikováno v:
IFIP International Federation for Information Processing ISBN: 1402081278
In software construction, analysis investigates system requirements and design captures system functionality. To facilitate analysis and design, one popular technique is the unified modeling language, UML. In UML, there are use-case diagrams for the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b5bf49ae6eeec871d11678165d83f5b4
https://doi.org/10.1007/1-4020-8128-6_13
https://doi.org/10.1007/1-4020-8128-6_13
Publikováno v:
Middleware for Communications
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5cbd7806effba6b456299f0f2b625458
https://doi.org/10.1002/0470862084.ch9
https://doi.org/10.1002/0470862084.ch9
Autor:
M. Song, Reda A. Ammar, Thuong Doan, Sanguthevar Rajasekaran, Steven A. Demurjian, Amal Abdel-raouf, Ian R. Greenshields, J. Lian, Abdulghani Mohamed
Publikováno v:
2005 IEEE Aerospace Conference.
In this paper we present a survey of techniques and strategies that can be utilized to process high-volumes of data in support of counter-terrorism. Data reduction is a critical problem for counter-terrorism; there are large collections of documents