×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [3]
THE STATE KEY LA... [1]
Faculty of Socia... [1]
INSTITUTE OF COL... [1]
Authors
SONG YONGHUA [1]
JIA WEI JIA [1]
TAM LAP MOU [1]
SIN VAI KUONG [1]
ZHOU JIANTAO [1]
TONG KWOK KIT [1]
More...
Document Type
Journal article [4]
Conference paper [1]
Date Issued
2023 [1]
2022 [1]
2020 [2]
2006 [1]
Language
英語English [5]
Source Publication
Applied Psycholo... [1]
IEEE Transaction... [1]
IET GENERATION T... [1]
Journal of Paral... [1]
Proceedings of t... [1]
Indexed By
SCIE [3]
SSCI [1]
Funding Organization
Funding Project
Macao World Valu... [1]
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-5 of 5
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption
Journal article
Tian, Jinyu, Zhou, Jiantao, Duan, Jia. Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption[J]. IEEE Transactions on Services Computing, 2023, 16(1), 343 - 355.
Authors:
Tian, Jinyu
;
Zhou, Jiantao
;
Duan, Jia
Favorite
|
TC[WOS]:
3
TC[Scopus]:
3
IF:
5.5
/
5.9
|
Submit date:2022/05/13
Cnn
Computational Modeling
Convolutional Neural Networks
Encryption
Hierarchical Service
Model Protection
Noise Reduction
Selective Encryption
Task Analysis
Training
Watermarking
Intention to maintain and willingness to stop: Applying a dual-process model to understanding the maintenance of COVID-19 preventive behaviors
Journal article
Mu He, Juliet Honglei Chen, Anise M.S. Wu, Kwok Kit Tong. Intention to maintain and willingness to stop: Applying a dual-process model to understanding the maintenance of COVID-19 preventive behaviors[J]. Applied Psychology-Health and Well Being, 2022, 15(1), 315-336.
Authors:
Mu He
;
Juliet Honglei Chen
;
Anise M.S. Wu
;
Kwok Kit Tong
Favorite
|
TC[WOS]:
6
TC[Scopus]:
6
IF:
3.8
/
4.7
|
Submit date:2022/06/30
Covid-19
Mask Wearing
Protection Motivation Theory
Prototype-willingness Model
Social Distancing
Theory Of Planned Behavior
Galerkin method-based model predictive control for mid-long term voltage stability enhancement
Journal article
Bingqing Xia, Hao Wu, Danfeng Shen, Xiang Zheng, Wen Hua, Yonghua Song. Galerkin method-based model predictive control for mid-long term voltage stability enhancement[J]. IET GENERATION TRANSMISSION & DISTRIBUTION, 2020, 14(22), 5302-5309.
Authors:
Bingqing Xia
;
Hao Wu
;
Danfeng Shen
;
Xiang Zheng
;
Wen Hua
; et al.
Favorite
|
TC[WOS]:
2
TC[Scopus]:
2
IF:
2.0
/
2.3
|
Submit date:2021/04/29
Polynomials
Galerkin Method
Power System Control
Optimisation
Power System Stability
Power System Transient Stability
Polynomial Approximation
Predictive Control
Galerkin Method-based Model Predictive Control
Mid-long Term Voltage Stability Enhancement
Slow Dynamic Elements
Protection Devices
Power System
Mpc
Voltage Stability Control
Prediction Model
Control Scheme
Galerkin Method-based Polynomial Approximation
Mid-long Term System Trajectories
Control Parameters
Polynomial Function
Prediction Accuracy
Edge-based differential privacy computing for sensor–cloud systems
Journal article
Wang, Tian, Mei, Yaxin, Jia, Weijia, Zheng, Xi, Wang, Guojun, Xie, Mande. Edge-based differential privacy computing for sensor–cloud systems[J]. Journal of Parallel and Distributed Computing, 2020, 136, 75-85.
Authors:
Wang, Tian
;
Mei, Yaxin
;
Jia, Weijia
;
Zheng, Xi
;
Wang, Guojun
; et al.
Favorite
|
TC[WOS]:
82
TC[Scopus]:
106
IF:
3.4
/
3.4
|
Submit date:2021/12/06
Data Collection
Edge-based Model
Privacy Computing
Privacy Protection
Sensor–cloud
Numerical Simulation of Atrium Fire using Two CFD Tools
Conference paper
V. K. Sin, L. M. Tam, S. K. Lao, H, F. Choi. Numerical Simulation of Atrium Fire using Two CFD Tools[C]:Tsinghua University Press and Springer, 2006.
Authors:
V. K. Sin
;
L. M. Tam
;
S. K. Lao
;
H, F. Choi
Favorite
|
|
Submit date:2019/04/16
Computational Fluid Dynamic
Fire Dynamics Simulator
National Fire Protection Association
Field Model
Computational Fluid Dynamic Code