Author of the publication

Health literacy and functional health status in Korean older adults

. Journal of Clinical Nursing, 18 (16): 2337--2343 (August 2009)PMID: 19583664.
DOI: 10.1111/j.1365-2702.2008.02739.x

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT device security based on proxy re-encryption., and . J. Ambient Intell. Humaniz. Comput., 9 (4): 1267-1273 (2018)Design and implementation of interoperable IoT healthcare system based on international standards., , , and . CCNC, page 119-124. IEEE, (2016)Improvement of speaker recognition system by individual information weighting., , and . INTERSPEECH, page 1017-1020. ISCA, (2000)Hierarchical Multimodal Fusion of Deep-Learned Lesion and Tissue Integrity Features in Brain MRIs for Distinguishing Neuromyelitis Optica from Multiple Sclerosis., , , , , , , , and . MICCAI (3), volume 10435 of Lecture Notes in Computer Science, page 480-488. Springer, (2017)Data Refinement and Channel Selection for a Portable E-Nose System by the Use of Feature Feedback., , , and . Sensors, 10 (11): 10387-10400 (2010)Health literacy and functional health status in Korean older adults. Journal of Clinical Nursing, 18 (16): 2337--2343 (August 2009)PMID: 19583664.Norm-referenced Criteria for Strength of the Upper Limbs for the Korean High School Baseball Players Using Computer Assisted Isokinetic Equipment., and . BCD (selected papers), volume 844 of Studies in Computational Intelligence, page 115-126. Springer, (2019)CoAP-Based Mobility Management for the Internet of Things., , and . Sensors, 15 (7): 16060-16082 (2015)Design and implementation of an interoperable messaging system for IoT healthcare services., , , and . CCNC, page 45-52. IEEE, (2017)Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop., and . Entropy, 16 (8): 4185-4198 (2014)