UM

Browse/Search Results:  1-10 of 14 Help

Selected(0)Clear Items/Page:    Sort:
Physical literacy-based intervention for older adults: a cluster randomized controlled trial study protocol Journal article
SUM RAYMOND KIM WAI, Yang Yijian, CHOI SIU MING, Michael J. Duncan, LI MINGHUI. Physical literacy-based intervention for older adults: a cluster randomized controlled trial study protocol[J]. Frontiers in Sports and Active Living, 2024, 6, 1392270.
Authors:  SUM RAYMOND KIM WAI;  Yang Yijian;  CHOI SIU MING;  Michael J. Duncan;  LI MINGHUI
Adobe PDF | Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2024/08/08
Physical Literacy  Older Adults  Randomized Clinical Trial  Study Protocol  Hong Kong  
Dynamic-Encoding-Based Sliding Mode Control Under Round-Robin Protocol Conference paper
Zhang, Pengcheng, Cao, Zhiru, Zhu, Kaiqun. Dynamic-Encoding-Based Sliding Mode Control Under Round-Robin Protocol[C]:Institute of Electrical and Electronics Engineers Inc., 2024, 556-561.
Authors:  Zhang, Pengcheng;  Cao, Zhiru;  Zhu, Kaiqun
Favorite | TC[Scopus]:0 | Submit date:2024/09/03
Dynamic Encoding-decoding Scheme  Round-robin Protocol  Sliding Mode Control  
Event-Triggered Disturbance Rejection Control for Brain-Actuated Mobile Robot: An SSA-Optimized Sliding Mode Approach Journal article
Zhu, Ziming, Song, Jun, He, Shuping, Liu, Jason J.R., Lam, Hak Keung. Event-Triggered Disturbance Rejection Control for Brain-Actuated Mobile Robot: An SSA-Optimized Sliding Mode Approach[J]. IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2024.
Authors:  Zhu, Ziming;  Song, Jun;  He, Shuping;  Liu, Jason J.R.;  Lam, Hak Keung
Favorite | TC[WOS]:1 TC[Scopus]:2  IF:6.1/6.2 | Submit date:2024/08/27
Brain-computer Interface (Bci)  Disturbance Observer  Event-triggering Protocol  Sliding Mode Control (Smc)  Sparrow Search Algorithm (Ssa)  
Optimization of LEACH Routing Protocol Algorithm Conference paper
Siwen Chen, Yuhan Chen, Yinghao Huang, Wei Wei. Optimization of LEACH Routing Protocol Algorithm[C], 2023, 1105-1108.
Authors:  Siwen Chen;  Yuhan Chen;  Yinghao Huang;  Wei Wei
Favorite | TC[Scopus]:2 | Submit date:2023/08/03
Leach Protocol  Cluster Head  Dead Nodes  Wireless Sensor Networks  Distance Threshold  
Efficacy of psychotherapy in subthreshold depression patients: A protocol for an overview of systematic reviews and meta-analyses Journal article
Xu Han, Jiaxin Li, Yajie Yang, Jiaxin Liu, Jinzi Zhang, Xiao Han, Abudurousuli Reyila, Zhizhong Liu, Pu Ge. Efficacy of psychotherapy in subthreshold depression patients: A protocol for an overview of systematic reviews and meta-analyses[J]. Frontiers in Public Health, 2022, 10, 1017907.
Authors:  Xu Han;  Jiaxin Li;  Yajie Yang;  Jiaxin Liu;  Jinzi Zhang; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:3.0/3.6 | Submit date:2023/01/30
Subthreshold Depression  Psychotherapy  Meta-analyses  Systematic Reviews  Protocol  
Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks Journal article
Li, Sheng, Zou, Wencheng, Guo, Jian, Xiang, Zhengrong. Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks[J]. IEEE Systems Journal, 2022, 16(3), 4423-4432.
Authors:  Li, Sheng;  Zou, Wencheng;  Guo, Jian;  Xiang, Zhengrong
Favorite | TC[WOS]:24 TC[Scopus]:23  IF:4.0/3.9 | Submit date:2022/05/13
Actuators  Consensus Protocol  Cyber Attacks  Cyberattack  Denial-of-service Attack  Fault Tolerant Systems  Fault-tolerant Consensus  Multiagent Systems (Mas)  Security Control  Switched Systems  Switches  Topology  
Performance Benchmarking and Optimization for Blockchain Systems: A Survey Conference paper
Rui Wang, Kejiang Ye, Cheng-Zhong Xu. Performance Benchmarking and Optimization for Blockchain Systems: A Survey[C], 2019, 171-185.
Authors:  Rui Wang;  Kejiang Ye;  Cheng-Zhong Xu
Favorite | TC[WOS]:17 TC[Scopus]:26 | Submit date:2021/09/18
Blockchain  Protocol  Benchmark  Performance Analysis  Performance Optimization  
Protocol-level attacks against Tor Journal article
Ling Z., Luo J., Yu W., Fu X., Jia W., Zhao W.. Protocol-level attacks against Tor[J]. Computer Networks, 2013, 57(4), 869-886.
Authors:  Ling Z.;  Luo J.;  Yu W.;  Fu X.;  Jia W.; et al.
Favorite | TC[WOS]:19 TC[Scopus]:30  IF:4.4/4.4 | Submit date:2019/02/11
Anonymity  Mix Networks  Protocol-level Attacks  Tor  
Scheduling Measurements and Controls Over Networks - Part I: Rollout Strategies for Protocol Design Conference paper
Antunes, D, Heemels, M, Hespanha, J, Silvestre, C. Scheduling Measurements and Controls Over Networks - Part I: Rollout Strategies for Protocol Design[C], Piscataway, NJ:The Institute of Electrical and Electronics Engineers (IEEE), 2012, 2036-2041.
Authors:  Antunes, D;  Heemels, M;  Hespanha, J;  Silvestre, C
Favorite | TC[WOS]:9 TC[Scopus]:10 | Submit date:2022/08/26
Controls Over Networks  Scheduling  Rollout Strategies For Protocol Design  
Scheduling Measurements and Controls Over Networks - Part II: Rollout Strategies for Simultaneous Protocol and Controller Design Conference paper
Antunes, D, Heemels, M, Hespanha, J, Silvestre, C. Scheduling Measurements and Controls Over Networks - Part II: Rollout Strategies for Simultaneous Protocol and Controller Design[C], Piscataway, NJ:The Institute of Electrical and Electronics Engineers (IEEE), 2012, 2042-2047.
Authors:  Antunes, D;  Heemels, M;  Hespanha, J;  Silvestre, C
Favorite | TC[WOS]:9 TC[Scopus]:11 | Submit date:2022/08/26
Controls Over Networks  Scheduling  Rollout Strategies For Protocol Design