|
1
|
Positioning and navigation techniques for autonomous vehicles using QR codeThis paper presents an autonomous vehicle system's design, development, and programming process utilizing QR code-based positioning and navigation technology. During system development, the STM32F407... Author: Nguyen Thu Thi Keyword: Autonomous Vehicle Positioning Navigation QR Code Microcontroller
|
|
2
|
The impact of extensive reading on EFL university students’ English language proficiencyExtensive reading has been proven effective for the development of EFL reading fluency. While previous studies have investigated the impacts of ER on reading speed, reading comprehension, and... Author: Lam Giang Nguyen Thi, Lam Giang Nguyễn Thị, Ngoc Yen Tran Thi Keyword: extensive reading English language proficiency reading fluency development EFL reading
|
|
3
|
Homonymy-related errors: a case study among English majored sophomoresHomonymy is an essential feature of the English language. It often causes confusion and miscommunication for EFL learners. This study examines common difficulties second-year English majors at the... Author: Anh Anh Thị Kim, Nguyen Lien Phuong, Vo Linh Khanh, Nguyen Vy Thi Yen Keyword: Homonymy homonyms full homonyms; homophones homographs pronunciation errors spelling errors vocabulary learning language interference.
|
|
4
|
A corpus-based study of discourse-level errors in IELTS essaysThis study explored the extent to which discourse-level errors affected band scores in IELTS Writing Task 2 essays written by Vietnamese English learners. The primary objective was to identify how... Author: Mai Hiền Thị Keyword: IELTS Writing Task discourse-level errors coherence cohesion academic writing band score analysis
|
|
5
|
Some legal issues on legal support for small and medium enterprisesThe article deals with the issue of legal support for small and medium-sized en-terprises as reflected in current legal regulations in the Law on Support for Small and Medium Enterprises 2017 and... Author: Phạm Sang Thị Huyền, Thanh Nguyen Thi Keyword: legal support small and medium sized enterprises law
|
|
6
|
Intrusion detection in network systems using transformer based approachThe growing complexity of modern network infrastructures, driven by cloud computing, IoT, and 5G, poses significant challenges for traditional Intrusion Detection Systems (IDS), which often fail to... Author: Ngo Hoa Thi Keyword: Transformer Intrusion Detection Cybersecurity Network Traffic Deep Learning Anomaly Detection
|
|
7
|
Factors affecting the effectiveness of students’ competence in using tools and instruments for learning mathematics in general education: an exploratory factor analysis (EFA)This study aims to identify the factors that influence students’ competence in using tools and means for learning mathematics in secondary schools. Survey data were collected from 252 mathematics... Author: Hang Nguyen My, Mai Trần Thị Tuyết Keyword: Tool usage skills exploratory factor analysis mathematics teachers
|
|
8
|
A proof of the factorial approximation via the exponential distributionThe factorial of a natural number n, denoted n!, is defined as the product of natural numbers from 1 to n. This is a familiar concept to students. Although this concept is defined simply, the function... Author: Phan Tuyet Thi, Pham Dung Tien, Ho Duc Cong Manh, Nguyen Ha Hoang, Nguyen Trang Thi Thuy, Dang Tuan Viet Keyword: Exponential distribution Gamma distribution factorial approximation
|
|
9
|
Group conflicts during collaborative learning: perceptions of students at a university in VietnamCollaborative learning, widely used in universities, fosters essential skills like critical thinking and teamwork through knowledge sharing. However, group conflict can hinder this process. This study... Author: Nguyen Dang Thi Keyword: Group conflict collaborative learning student’s perceptions factors challenges.
|
|
10
|
Research on techniques to en-hance DDoS attack prevention using cumulative Sum and back-propagation algorithmsThis paper focuses on enhancing DDoS attack prevention ca-pabilities through the combination of the Cumulative Sum (CUSUM) algorithm and the Backpropagation method, aiming to detect attack indicators... Author: Phuong Hoang Thi Keyword: Network attack CUSUM algorithm Backpropagation algo-rithm Anti-spoofing DDoS attack
|