UM

Browse/Search Results:  1-10 of 18 Help

Selected(0)Clear Items/Page:    Sort:
AIE-active luminogen for highly sensitive and selective detection of picric acid in water samples: Pyridyl as an effective recognition group Journal article
DYES AND PIGMENTS, 2019,Volume: 163,Page: 1-8
Authors:  Yuqing Ma;  Yuyang Zhang;  Xiaojun Liu;  Qiong Zhang;  Lin Kong;  Yupeng Tian;  Gang Li;  Xuanjun Zhang;  Jiaxiang Yang
Favorite | View/Download:7/0 | TC[WOS]:11 TC[Scopus]:0 | Submit date:2020/05/26
1,4-dihydropyrrolo[3,2-b)Pyrrole  Picric Acid  Aggregation-induced Emission  Pyridyl Group  
Standing out from the crowd – An investigation of the signal attributes of Airbnb listings Journal article
International Journal of Contemporary Hospitality Management, 2019,Volume: 32
Authors:  Bin Yao;  Richard T.R. Qiu;  Daisy X.F. Fan;  Anyu Liu;  Dimitrios Buhalis
View | Adobe PDF | Favorite | View/Download:248/13 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/09/10
Signaling Theory  Big Data  Airbnb  Binomial Logistic Model  Booking Probability  Sequential Bayesian Updating  Sharing Economy  
High-performance solid-state flexible supercapacitor based on reduced graphene oxide/hierarchical core-shell Ag nanowire@NiAl layered double hydroxide film electrode Journal article
CHEMICAL ENGINEERING JOURNAL, 2018,Volume: 348,Page: 338-349
Authors:  Li, Lei;  Hui, Kwan San;  Hui, Kwun Nam;  Zhang, Tengfei;  Fu, Jianjian;  Cho, Young-Rae
Favorite | View/Download:38/0 | TC[WOS]:21 TC[Scopus]:0 | Submit date:2018/10/30
Silver nanowire  Layered double hydroxide  Reduced graphene oxide  Hybrid film  All-solid-state supercapacitor  
Rice food security in the Pearl River Delta, China: A case study Book chapter
出自: Food Security: Threat Factors, Policies and Challenges:Nova Science Publishers, Inc., 2017, 页码: 97-114
Authors:  Junhui Li;  Lin Zhang;  Ying Lu;  Chongjian Jia;  Hojae Shim
Favorite | View/Download:7/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/07/01
Arsenic  Fertilization Management  Food Safety  Megacity  Pearl River Delta  Rice  
A Review of Compressive Sensing in Information Security Field Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:  YUSHU ZHANG;  LEO YU ZHANG;  JIANTAO ZHOU;  LICHENG LIU;  FEI CHEN;  XING HE
Favorite | View/Download:9/0 | TC[WOS]:83 TC[Scopus]:0 | Submit date:2019/04/16
Compressive Sensing  Theoretical Security  Application Security  Image Cipher  Chaos  Optics  
Dual-encryption based on facilely synthesized supra-(carbon nanodots) with water-induced enhanced luminescence Journal article
RSC Advances, 2016,Volume: 6,Issue: 83,Page: 79620-79624
Authors:  Zhang X.;  Li D.;  Zhou D.;  Jing P.;  Ji W.;  Shen D.;  Qu S.
Favorite | View/Download:6/0 | TC[WOS]:6 TC[Scopus]:0 | Submit date:2019/04/08
Information security display via uncrowded window Conference paper
2014 IEEE Visual Communications and Image Processing Conference, VCIP 2014, Valletta, MALTA, DEC 07-10, 2014
Authors:  Gao Z.;  Zhai G.;  Zhou J.;  Min X.;  Hu C.
Favorite | View/Download:6/0 | TC[WOS]:1 TC[Scopus]:0 | Submit date:2018/12/22
Display Technology  Eye Tracking  Information Security  Uncrowded Window  
On malware leveraging the Android accessibility framework Conference paper
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Tokyo, Japan, 122, 2013 - 124, 2013
Authors:  Kraunelis, Joshua;  Chen, Yinjie;  Ling, Zhen;  Fu, Xinwen;  Zhao, Wei
Favorite | View/Download:5/0 | TC[WOS]:2 TC[Scopus]:0 | Submit date:2018/11/06
A network access security scheme for virtual machine Conference paper
Lecture Notes in Electrical Engineering, Shanghai, China, 7 20, 2013 - 7 21, 2013
Authors:  Xu, Mingkun;  Dong, Wenyuan;  Shuo, Cheng
Favorite | View/Download:7/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/11/06
A model for implementing security at application level in service oriented architecture Conference paper
Journal of Emerging Technologies in Web Intelligence
Authors:  Nabi S.;  Rehman S.U.;  Fong S.;  Aziz K.
Favorite | View/Download:6/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Application Level Security in SOA  Service Oriented Architecture (SOA)  Service Oriented Computing (SOC)  Service Oriented Software (SOS)  SOA security policy  Web Services Architecture (WSA)