VIEW ARTICLE (25)
STTDetail
1

Evaluation of data collection tree routing protocols for wireless sensor networks

In recent years, wireless sensor networks (WSNs) have garnered significant research attention due to their versatility in supporting a range of applications, including military surveillance,...

Author: Khôi Do Huy

Keyword: CTP Protocol routing in WSN WSN energy saving solution WSN performance CTP in mobile

2

Research on Heideltime with Vietnamese language processing and experimental application development and evaluation

This paper presents software development for searching and extracting temporal information from text to help users access and understand content from electronic documents stored on organizational...

Author: Ha Dien Thi Hong

Keyword: Text extraction natural language processing information ex-traction Vietnamese text HeidelTime

3

Developing a product rating prediction model based on customer text feedback using machine learning algorithms

This study focuses on predicting product rating scores from customer text feedback. This task combines the challenges of natural language processing (NLP) with the class imbalance phenomenon commonly...

Author: Ha Dien Thi Hong

Keyword: Product rating prediction customer text feedback natural language processing (NLP) machine learning models model performance evaluation

4

Issues in developing digital competence among primary school teachers in Ho Chi Minh city in the context of digital transformation

This study analyzes the theoretical foundations, investigates the current situation, and proposes measures for developing digital competence among primary school teachers in Ho Chi Minh City in the...

Author: Phan Hiệp Thái

Keyword: digital competence digital competence development primary school teachers digital transformation

5

Applying transformer architecture to enhance attack detection performance in intrusion detection systems

Intrusion Detection Systems (IDS) are crucial in safeguarding network security against increasingly sophisticated threats. In this study, we propose a Transformer-based intrusion detection model to...

Author: Vu Phuong Thi, Ha Hoang Thi Hong, Truong Dinh Gia, Yen Tran Thi

Keyword: Intrusion Detection Transformer UNSW-NB15 Cybersecurity Self-attention

Vinh University journal of science

Tạp chí khoa học Trường Đại học Vinh

ISSN: 1859 - 2228

Governing body: Vinh University

  • Address: 182 Le Duan - Vinh City - Nghe An province
  • Phone: (+84) 238.3855.452 - Fax: (+84) 238.3855.269
  • Email: vinhuni@vinhuni.edu.vn
  • Website: https://vinhuni.edu.vn

 

License: 163/GP-BTTTT issued by the Minister of Information and Communications on May 10, 2023

Open Access License: Creative Commons CC BY NC 4.0

 

CONTACT

Editor-in-Chief: Assoc. Prof., Dr. Tran Ba Tien
Email: tientb@vinhuni.edu.vn

Deputy editor-in-chief: Assoc. Prof., Dr. Phan Van Tien
Email: vantienkxd@vinhuni.edu.vn

Sub-Editor: Dr. Do Mai Trang
Email: domaitrang@vinhuni.edu.vn

Editorial assistant: Msc. Le Tuan Dung, Msc. Phan The Hoa, Msc. Pham Thi Quynh Nga, Msc. Tran Thi Thai

  • Address: 4th Floor, Executive Building, No. 182, Le Duan street, Vinh city, Nghe An province.
  • Phone: (+84) 238-385-6700 | Hotline: (+84) 97-385-6700
  • Email: editors@vujs.vn
  • Website: https://vujs.vn

img