Search

Your search keyword '"Xiaorong Cheng"' showing total 28 results

Search Constraints

Start Over You searched for: Author "Xiaorong Cheng" Remove constraint Author: "Xiaorong Cheng" Topic business Remove constraint Topic: business
28 results on '"Xiaorong Cheng"'

Search Results

1. Excellent surface enhanced Raman properties of titanate nanotube-dopamine-Ag triad through efficient substrate design and LSPR matching

2. Study on Intelligent Wiper Based on STC89C51 Microcontroller

3. Analysis and Improvement on Routing Protocols for Wireless Sensor Networks

4. Plasmonic enhanced Cu2O-Au-BFO photocathodes for solar hydrogen production

5. Analysis of Suzhou’s Ecological Environment Construction Measures Based on Caohu’s Experience and Achievements

6. A credibility measurement method of smart grid data

7. The photocathodic properties of a Pb(Zr0.2Ti0.8)O3 wrapped CaFe2O4 layer on ITO coated quartz for water splitting

8. Is elapsing time really recoded into spatial linear representation in working memory?

9. Application Research of Improved FUP Algorithm in Network Security Linkage System

10. Application of Network Topology Visualization for Power Communication Resource Management

11. The Risk Assessment Quantitative Research of WAMS Communications Network

12. Nano-Au and Ferroelectric Polarization Mediated Si/ITO/BiFeO3Tandem Photocathode for Efficient H2Production

13. Research on Network Security Situation Assessment and Prediction

14. The Research on Dynamic Risk Assessment Based on Hidden Markov Models

15. Research of routing optimization based on improved PSO algorithm in power communication network

16. A real-time hybrid intrusion detection system based on Principle Component Analysis and Self Organizing Maps

17. Risk assessment of information system using the shell theory and attack graph

18. Name agreement in picture naming: An ERP study

19. PSO Algorithm Combined with Neural Network Training Study

20. The research of PSO algorithm in web information filtering

21. A Quantitative Risk Assessment Approach Based on VPRS and Group Decision-Making Theory

22. Network security risk assessment based on association rules

23. Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform

24. Risk Rules Mining of Information System Based on Variable Precision Rough Set

25. A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System

26. Personalized Services Research Based on Web Data Mining Technology

27. Application of MPSO-Based Neural Network Model in Chinese Word Segmentation

Catalog

Books, media, physical & digital resources