|
1
|
Evaluation of data collection tree routing protocols for wireless sensor networksIn recent years, wireless sensor networks (WSNs) have garnered significant research attention due to their versatility in supporting a range of applications, including military surveillance,... Author: Khôi Do Huy Keyword: CTP Protocol routing in WSN WSN energy saving solution WSN performance CTP in mobile
|
|
2
|
Research on Heideltime with Vietnamese language processing and experimental application development and evaluationThis paper presents software development for searching and extracting temporal information from text to help users access and understand content from electronic documents stored on organizational... Author: Ha Dien Thi Hong Keyword: Text extraction natural language processing information ex-traction Vietnamese text HeidelTime
|
|
3
|
Developing a product rating prediction model based on customer text feedback using machine learning algorithmsThis study focuses on predicting product rating scores from customer text feedback. This task combines the challenges of natural language processing (NLP) with the class imbalance phenomenon commonly... Author: Ha Dien Thi Hong Keyword: Product rating prediction customer text feedback natural language processing (NLP) machine learning models model performance evaluation
|
|
4
|
Issues in developing digital competence among primary school teachers in Ho Chi Minh city in the context of digital transformationThis study analyzes the theoretical foundations, investigates the current situation, and proposes measures for developing digital competence among primary school teachers in Ho Chi Minh City in the... Author: Phan Hiệp Thái Keyword: digital competence digital competence development primary school teachers digital transformation
|
|
5
|
Applying transformer architecture to enhance attack detection performance in intrusion detection systemsIntrusion Detection Systems (IDS) are crucial in safeguarding network security against increasingly sophisticated threats. In this study, we propose a Transformer-based intrusion detection model to... Author: Vu Phuong Thi, Ha Hoang Thi Hong, Truong Dinh Gia, Yen Tran Thi Keyword: Intrusion Detection Transformer UNSW-NB15 Cybersecurity Self-attention
|