UM

Browse/Search Results:  1-6 of 6 Help

Selected(0)Clear Items/Page:    Sort:
Exploring the heterogeneous effects of zonal factors on bicycle injury severity: latent class clustering analysis and partial proportional odds models Journal article
Wang, Shunchao, Ma, Jingfeng, Ding, Hongliang, Lu, Yuhuan. Exploring the heterogeneous effects of zonal factors on bicycle injury severity: latent class clustering analysis and partial proportional odds models[J]. Journal of Transportation Safety and Security, 2023, 15(9), 918 - 942.
Authors:  Wang, Shunchao;  Ma, Jingfeng;  Ding, Hongliang;  Lu, Yuhuan
Favorite | TC[WOS]:3 TC[Scopus]:4  IF:2.4/2.4 | Submit date:2023/01/30
Bicycle Safety  Injury Severity  Latent Class Clustering  Partial Proportional Odds Models  Zonal Factors  
Prison victimization among Taiwanese male inmates: an application of importation, deprivation, and routine activities theories Journal article
Kuo, Shih Ya. Prison victimization among Taiwanese male inmates: an application of importation, deprivation, and routine activities theories[J]. Security Journal, 2020, 33(4), 602-621.
Authors:  Kuo, Shih Ya
Favorite | TC[WOS]:4 TC[Scopus]:5  IF:1.2/1.2 | Submit date:2021/12/07
Deprivation  Importation  Male Inmates  Prison Victimization  Routine Activities  
East Asia's Enduring Rivalries: Ripe for Abatement? Journal article
Chan, S, Hu, WX. East Asia's Enduring Rivalries: Ripe for Abatement?[J]. Journal of Asian Security and International Affairs, 2015, 2(2), 133-153.
Authors:  Chan, S;  Hu, WX
Favorite | TC[WOS]:0 TC[Scopus]:1  IF:0.8/0.9 | Submit date:2020/10/14
Enduring Rivalries  Empirical Puzzles  Us Pivotal Role  Rivalry Persistence And Termination  
Internet of things' authentication and access control Journal article
Liu J., Xiao Y., Chen C.L.P.. Internet of things' authentication and access control[J]. International Journal of Security and Networks, 2012, 7(4), 228-241.
Authors:  Liu J.;  Xiao Y.;  Chen C.L.P.
Favorite | TC[Scopus]:32 | Submit date:2019/02/11
Access Control  Authentication  Iot  Rfid  Security  
Geometrically invariant image watermarking based on feature extraction and Zernike transform Journal article
Yuan X.-C., Pun C.-M.. Geometrically invariant image watermarking based on feature extraction and Zernike transform[J]. International Journal of Security and its Applications, 2012, 6(2), 217-222.
Authors:  Yuan X.-C.;  Pun C.-M.
Favorite | TC[WOS]:4 TC[Scopus]:5 | Submit date:2019/02/14
Adaptive Harris Detector  Feature Extraction  Geometric Invariant  Inverse Zernike Transform  Local Zernike Transform  
Research on the strategy of role management based on grid environment Journal article
Liu, Yi He, Qin, Yu Ping, Zhang, Shuang. Research on the strategy of role management based on grid environment[J]. International Journal of Security and its Applications, 1905, 10(2), 85-94.
Authors:  Liu, Yi He;  Qin, Yu Ping;  Zhang, Shuang
Favorite | TC[WOS]:1 TC[Scopus]:1 | Submit date:2018/11/06