×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [15]
Authors
FONG SIMON JAME... [15]
SI YAIN WHAR [1]
Document Type
Journal article [15]
Date Issued
2014 [2]
2013 [4]
2012 [4]
2011 [5]
Language
英語English [14]
Source Publication
Journal of Emer... [14]
JOURNAL OF EMERG... [1]
Indexed By
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 15
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
A comprehensive study of finding copy-and-paste clones from program source codes
Journal article
Khan,Kamran, Bhutto,Shaheed Zulfiqar Ali, Rehman,Saif Ur, Aziz,Kamran, Fong,Simon. A comprehensive study of finding copy-and-paste clones from program source codes[J]. Journal of Emerging Technologies in Web Intelligence, 2014, 6(1), 111-118.
Authors:
Khan,Kamran
;
Bhutto,Shaheed Zulfiqar Ali
;
Rehman,Saif Ur
;
Aziz,Kamran
;
Fong,Simon
Favorite
|
TC[Scopus]:
0
|
Submit date:2021/03/09
A model for implementing security at application level in service oriented architecture
Journal article
Nabi,Said, Rehman,Saif Ur, Fong,Simon, Aziz,Kamran. A model for implementing security at application level in service oriented architecture[J]. Journal of Emerging Technologies in Web Intelligence, 2014, 6(1), 157-163.
Authors:
Nabi,Said
;
Rehman,Saif Ur
;
Fong,Simon
;
Aziz,Kamran
Favorite
|
TC[Scopus]:
5
|
Submit date:2021/03/09
Application Level Security In Soa
Service Oriented Architecture (Soa)
Service Oriented Computing (Soc)
Service Oriented Software (Sos)
Soa Security Policy
Web Services Architecture (Wsa)
Widespread Mobile Devices in Applications for Real-time Drafting Detection in Triathlons
Journal article
Iztok Fister, Dusan Fister, Simon Fong, Iztok Fister Jr. Widespread Mobile Devices in Applications for Real-time Drafting Detection in Triathlons[J]. Journal of Emerging Technologies in Web Intelligence, 2013, 5(3), 310-321.
Authors:
Iztok Fister
;
Dusan Fister
;
Simon Fong
;
Iztok Fister Jr
Favorite
|
TC[Scopus]:
8
|
Submit date:2019/02/13
Pervasive Computing
Real Problem
Mobile Devices
Gps
Web Services
Application Server
Triathlon
A Prediction Model for Forecasting the Trend of Macau Property Price Movements and Understanding the Influential Factors
Journal article
Simon Fong, Yap Bee Wah. A Prediction Model for Forecasting the Trend of Macau Property Price Movements and Understanding the Influential Factors[J]. Journal of Emerging Technologies in Web Intelligence, 2013, 5(2), 122-131.
Authors:
Simon Fong
;
Yap Bee Wah
Favorite
|
TC[Scopus]:
2
|
Submit date:2019/02/13
Data Mining
Svm
Neural Network
c&r Tree
Weka
Spss
Multilayer Perception Model
Design of All-in-one Distributed e-Learning System (ADES) Using Ubiquitous Files
Journal article
Youme Hoi, Simon Fong. Design of All-in-one Distributed e-Learning System (ADES) Using Ubiquitous Files[J]. Journal of Emerging Technologies in Web Intelligence, 2013, 5(2), 196-204.
Authors:
Youme Hoi
;
Simon Fong
Favorite
|
TC[Scopus]:
0
|
Submit date:2019/02/13
E-learning Model
Ubiquitous Files
Stream Mining Dynamic Data by Using iOVFDT
Journal article
Yang Hang, Simon Fong. Stream Mining Dynamic Data by Using iOVFDT[J]. Journal of Emerging Technologies in Web Intelligence, 2013, 5(1), 78-86.
Authors:
Yang Hang
;
Simon Fong
Favorite
|
TC[Scopus]:
2
|
Submit date:2019/02/13
Classification
Stream Mining
Dynamic Data
Attribute Overlap Minimization and Outlier Elimination as Dimensionality Reduction Techniques for Text Classification Algorithms
Journal article
Simon Fong, Antonio Cerone. Attribute Overlap Minimization and Outlier Elimination as Dimensionality Reduction Techniques for Text Classification Algorithms[J]. Journal of Emerging Technologies in Web Intelligence, 2012, 4(3), 259-263.
Authors:
Simon Fong
;
Antonio Cerone
Favorite
|
TC[Scopus]:
4
|
Submit date:2019/02/13
Data Stream Mining
Optimized Very Fast Decision Tree
Incremental Optimization
Trend Recalling Algorithm for Automated Online Trading in Stock Market
Journal article
Simon Fong, Jackie Tai, Pit Pichappan. Trend Recalling Algorithm for Automated Online Trading in Stock Market[J]. Journal of Emerging Technologies in Web Intelligence, 2012, 4(3), 240-251.
Authors:
Simon Fong
;
Jackie Tai
;
Pit Pichappan
Favorite
|
TC[Scopus]:
2
|
Submit date:2019/02/13
Trend Following Algorithm
Automated Stock Market Trading
Measuring Emotions from Online News and Evaluating Public Models from Netizens’ Comments: A Text Mining Approach
Journal article
Simon Fong. Measuring Emotions from Online News and Evaluating Public Models from Netizens’ Comments: A Text Mining Approach[J]. JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, 2012, 4(1), 60-66.
Authors:
Simon Fong
Favorite
|
TC[Scopus]:
3
|
Submit date:2019/05/15
Emotion Classification
Text Mining
Hierarchical Visualization
Framework of Competitor Analysis by Monitoring Information on the Web
Journal article
Simon Fong. Framework of Competitor Analysis by Monitoring Information on the Web[J]. Journal of Emerging Technologies in Web Intelligence, 2012, 4(1), 77-83.
Authors:
Simon Fong
Favorite
|
TC[Scopus]:
4
|
Submit date:2019/02/13
Competitor Analysis
Web Information
Information System Design