UM

Browse/Search Results:  1-10 of 442 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Real-time analysis and visualization for big data of energy consumption Conference paper
ACM International Conference Proceeding Series
Authors:  Li J.;  Song W.;  Fong S.
Favorite | View/Download:3/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Big data  CUDA  DirectX  Energy consumption  K-Means  
A 5.35 mW 10 MHz bandwidth CT third-order ΔΣ modulator with single Opamp achieving 79.6/84.5 dB SNDR/DR in 65 nm CMOS Conference paper
2017 IEEE Asian Solid-State Circuits Conference (A-SSCC), Seoul, SOUTH KOREA, November 6-8, 2017
Authors:  Wei Wang;  Yan Zhu;  Chi-Hang Chan;  Seng-Pan U.;  Rui Paulo Martins
Favorite | View/Download:21/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/11
A 5-bit 2 GS/s binary-search ADC with charge-steering comparators Conference paper
2017 IEEE Asian Solid-State Circuits Conference (A-SSCC), Seoul, SOUTH KOREA, NOV 06-08, 2017
Authors:  Chio, U-Fat;  Sin S.-W.;  Seng-Pan U.;  Maloberti F.;  Martins R.P.
Favorite | View/Download:18/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/11
Binary-search Adc  Asynchronous  Charge-steering  
Human body and face detection based anti-shoulder attack system on atm Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Liang M.;  Xiao K.;  Fong S.;  Wang Q.;  Song W.
Favorite | View/Download:7/0 | TC[WOS]:2 TC[Scopus]:0 | Submit date:2019/02/13
ATM security  Face detection  Human body detection  
A DCT-based information hiding method for network authentication Conference paper
ACM International Conference Proceeding Series
Authors:  Song W.;  Zou S.;  Tian Y.;  Li C.;  Sun S.;  Fong S.
Favorite | View/Download:3/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Discrete cosine transform  Image processing  Information hiding  Network authentication  
Facial feature based secure information transmission Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Wang Y.;  Fong S.;  Duan C.;  Song W.
Favorite | View/Download:4/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Biometric cryptosystems  Gabor features  Secret key generation  
Generating neural networks with optimal features through particle swarm optimization Conference paper
ACM International Conference Proceeding Series
Authors:  Brito R.;  Fong S.;  Zhuang Y.;  Wu Y.
Favorite | View/Download:4/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Feature selection  Generative algorithms  Neural networks  Particle Swarm Optimization (PSO)  
An implementation of VR chemistry experiment system Conference paper
ACM International Conference Proceeding Series
Authors:  Han J.;  Tian Y.;  Song W.;  Fong S.
Favorite | View/Download:9/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Head-mounted display  Leap motion  Virtual reality  Wireless sensor network  
General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT Conference paper
ACM International Conference Proceeding Series
Authors:  Wu Y.;  Fong S.;  Zhuang Y.
Favorite | View/Download:4/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Computer network security  Security threats  SME  
Big data mining algorithms for fog computing Conference paper
ACM International Conference Proceeding Series
Authors:  Fong S.
Favorite | View/Download:3/0 | TC[WOS]:1 TC[Scopus]:0 | Submit date:2019/02/13
Computer network security  Security threats  SME