Browsing Closed by Title

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Browsing Closed by Title

Sort by: Order: Results:

  • Pang, Y; Tao, D; Yuan, Y; Li, X (2008-08)
    Fast training and testing procedures are crucial in biometrics recognition research. Conventional algorithms, e.g., principal component analysis (PCA), fail to efficiently work on large-scale and high-resolution image data ...
  • Liu, Q; Kwoh, CK; Li, J (2013-11-25)
    Accurate determination of protein-ligand binding affinity is a fundamental problem in biochemistry useful for many applications including drug design and protein-ligand docking. A number of scoring functions have been ...
  • Mu, Y; Tao, D (Elsevier Science Bv, 2010-01)
    Using biometric resources to recognize a person has been a recent concentration on computer vision. Previously, biometric research has forced on utilizing iris, finger print, palm print, and shoe print to authenticate and ...
  • Song, D; Tao, D (2010-01)
    Biologically inspired feature (BIF) and its variations have been demonstrated to be effective and efficient for scene classification. It is unreasonable to measure the dissimilarity between two BIFs based on their Euclidean ...
  • Huang, K; Tao, D; Yuan, Y; Li, X; Tan, T (2011-02)
    Inspired by human visual cognition mechanism, this paper first presents a scene classification method based on an improved standard model feature. Compared with state-of-the-art efforts in scene classification, the newly ...
  • Mu, Y; Tao, D; Li, X; Murtagh, F (Springer, 2009-01)
    According to the research results reported in the past decades, it is well acknowledged that face recognition is not a trivial task. With the development of electronic devices, we are gradually revealing the secret of ...
  • Prade, H; Serrurier, M (2008-10)
    Bipolarity appears in information processing when positive and negative sides of what is specified are clearly distinct, but not complementary from each other. This distinction, which can be made in different representation ...
  • Feng, Y; Duan, R; Ying, M (Assoc Computing Machinery, 2012-01)
    Quantum cryptographic systems have been commercially available, with a striking advantage over classical systems that their security and ability to detect the presence of eavesdropping are provable based on the principles ...
  • Ying, M (Elsevier Science Bv, 2002-01)
    Bisimulation expresses the equivalence of processes whose external actions are identical. Sometimes we may meet two processes which are not exactly bisimilar but more or less bisimilar in the sense that whenever a process ...
  • Xiao, B; Gao, X; Tao, D; Li, X (2013-07)
    Face recognition is one of the biometric identification methods with the highest potential. The existing face recognition algorithms relying on the texture information of face images are affected greatly by the variation ...
  • Lu, J; Shambour, Q; Xu, Y; Lin, Q; Zhang, G (2010)
    Purpose: The purpose of this paper is to develop a hybrid semantic recommendation system to provide personalized government to business (G2B) e-services, in particular, business partner recommendation e-services for ...
  • Hossain, MD; Sanagavarapu, AM (IEEE, 2012-01)
    Breast cancer is a common type of cancer among women all over the world. Successful treatment and prevention of death greatly depends on early detection. Mammography is so far the gold standard for screening breast cancer. ...
  • Si, S; Tao, D; Geng, B (IEEE Computer Soc, 2010-01)
    The regularization principals [31] lead approximation schemes to deal with various learning problems, e. g., the regularization of the norm in a reproducing kernel Hilbert space for the ill-posed problem. In this paper, ...
  • Evans, J; Evans, J; Faulkhead, S; Faulkhead, S; Manaszewicz, R; Manaszewicz, R; Thorpe, KA; Thorpe, KA (Routledge Journals, Taylor & Francis LtdRoutledge Journals, Taylor & Francis Ltd, 2012-01)
    Research undertaken with one's own community can be complex and demanding. It can also be valuable and fulfilling. Those who take on this challenge must often straddle variant roles, values, and perspectives with the ...
  • Zhu, X; Wu, X; Chen, Q (Springer, 2006-01)
    To cleanse mislabeled examples from a training dataset for efficient and effective induction, most existing approaches adopt a major set oriented scheme: the training dataset is separated into two parts (a major set and a ...
  • Henderson-Sellers, B (ELSEVIER SCIENCE INC, 2011-02-01)
  • Tran, TP; Nguyen, T; Tsai, PC; Kong, X (Kluwer Academic Publishers, 2011-01)
    Detailed information on ACM DL web site: http://dl.acm.org/citation.cfm?id=1969389.1969400 "BSPNN: boosted subspace probabilistic neural network for email security"
  • Zhang, Z; Zhang, C (2007)
    Many complex problems (e.g., financial investment planning, foreign exchange trading, data mining from large/multiple databases) require hybrid intelligent systems that integrate many intelligent techniques (e.g., fuzzy ...
  • Chowdhury, GG (Wiley-Blackwell, 2012-01)
    Climate change has become a major area of concern over the past few years and consequently many governments, international bodies, businesses, and institutions are taking measures to reduce their carbon footprint. However, ...
  • Chen, H; Lam, PPY; Chan, HCB; Dillon, TS; Cao, J; Lee, RST (2007-11)
    We present MAGICS, a mobile agent-based system for supporting business-to-consumer electronic commerce (e-commerce) or mobile commerce (m-commerce) applications. To use the system, consumers first provide their buying ...