Search

Your search keyword '"Dawei Zhao"' showing total 90 results

Search Constraints

Start Over You searched for: Author "Dawei Zhao" Remove constraint Author: "Dawei Zhao" Topic computer science Remove constraint Topic: computer science
90 results on '"Dawei Zhao"'

Search Results

1. Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph

2. An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography

3. Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service

4. Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification

5. Diffusion and economic growth fuzzy intelligent system based on DSGE model

6. Multi-objective optimization strategy of multi-sources power system operation based on fuzzy chance constraint programming and improved analytic hierarchy process

7. Attentional Graph Neural Network for Parking-Slot Detection

8. The Feedback Vertex Set Problem of Multiplex Networks

9. Photovoltaic generator model for power system dynamic studies

10. Dismantling and Vertex Cover of Network Through Message Passing

11. Joint label completion and label-specific features for multi-label learning algorithm

12. Clutter Cancellation Based on Frequency Domain Analysis in Passive Bistatic Radar

13. A Novel Clutter Suppression Method Based on Sparse Bayesian Learning for Airborne Passive Bistatic Radar with Contaminated Reference Signal

14. A coordinated control strategy of reactive power compensation for offshore wind power system with AC transmission

15. An Auto-focus Method for Microscopic Images Based on QSOM Neural Network

16. Multi-label learning with kernel extreme learning machine autoencoder

17. Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation

18. Construction of an example system for AC/DC hybrid power grid with high‐proportion renewable energy

19. Study on the method of fault set for AC/DC system operation considering wind power

20. Research on primary frequency regulation of grid integrated concentrating solar power plant

21. Second-order Cone Relaxation based Optimization Method of Optimal Operation of Distribution Systems with Integrated Energy

22. Flexible Load Active Management Method in Optimization Operation of Distribution Networks

23. The Suppression of Epidemic Spreading Through Minimum Dominating Set

24. Opportunities, Risks, and Breakdowns Brought by AI to Commercial Banks

25. Robo-advisor and Expert Advisor

26. A Chaotic-Map-Based Password-Authenticated Key Exchange Protocol for Telecare Medicine Information Systems

27. The Representation of Dynamic Factor Marine Element Structure Upgrading Model Based on Two Kinds of DSGE Models

28. Study on coordinated control strategy of wind farm’s frequency regulation based on multi-layer hierarchical structure

29. KPI-based real-time situational awareness for power systems with high proportion of renewable energy sources

30. Analysis on application of a current-source based DFIG wind generator model

31. Scalable generation of large-scale unstructured meshes by a novel domain decomposition approach

32. Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation

33. Time Delay Estimation of AIS Signal Based on Three-Order Cumulant

34. An Improved Gaussian Filter for Dynamic Positioning Ships With Colored Noises and Random Measurements Loss

35. A weighted network community detection algorithm based on deep learning

36. Domain decomposition approach for parallel improvement of tetrahedral meshes

37. Modelling and validating photovoltaic power inverter model for power system stability analysis

38. DMCTOP: Topology Prediction of Alpha-Helical Transmembrane Protein Based on Deep Multi-Scale Convolutional Neural Network

39. Suppression of epidemic spreading process on multiplex networks via active immunization

40. Real-time Hand Gesture Recognition Based on Deep Learning in Complex Environments

41. Review on modeling of photovoltaic power generation systems

42. Review on modeling of wind power generation systems

43. The Design of a Cloud Forensics Middleware System Base on Memory Analysis

44. SSO analysis and SSDC parameter optimisation based on the wind farm connected to HVDC transmission system

45. Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks

46. Two-step multi-view and multi-label learning with missing label via subspace learning

47. Enhancing the power grid robustness against cascading failures under node-based attacks

48. PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints

49. Functional immunization of networks based on message passing

50. Missing multi-label learning with non-equilibrium based on classification margin

Catalog

Books, media, physical & digital resources