Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Face recognition using a face-only database: A new approach

    In this paper, a coarse-to-fine, LDA-based face recognition system is proposed. Through careful implementation, we found that the databases adopted by two state-of-the-art face recognition systems[1,2] were in...

    Hong-Yuan Mark Liaot, Chin-Chuan Hant, Gwo-Joug Yut in Computer Vision — ACCV'98 (1997)

  2. No Access

    Chapter and Conference Paper

    Learning from Hierarchical Attribute Values by Rough Sets

    The rough-set theory has been widely used in dealing with data classification problems. Most of the previous studies on rough sets focused on deriving certain rules and possible rules on the single concept lev...

    Tzung-Pei Hong, Chun-E Lin, Jiann-Horng Lin in Intelligent Systems Design and Applications (2003)

  3. No Access

    Chapter and Conference Paper

    Maintenance of Discovered Functional Dependencies: Incremental Deletion

    The discovery of functional dependencies (FDs) in relational databases is an important data-mining problem. Most current work assumes that the database is static, and a database update requires rediscovering a...

    Shyue-Liang Wang, Wen-Chieh Tsou in Intelligent Systems Design and Applications (2003)

  4. No Access

    Chapter

    A Time-Completeness Tradeoff on Fuzzy Web-Browsing Mining

    World-wide-web applications have grown very rapidly and have made a significant impact on computer systems. Among them, web browsing for useful information may be most commonly seen. Due to its tremendous amou...

    Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang in Fuzzy Logic and the Internet (2004)

  5. No Access

    Chapter and Conference Paper

    Solving Job-Shop Scheduling Problems by a Novel Artificial Immune System

    The optimization of job-shop scheduling is very important because of its theoretical and practical significance. This paper proposes an efficient scheduling method based on artificial immune systems. In the pr...

    Hong-Wei Ge, Liang Sun, Yan-Chun Liang in AI 2005: Advances in Artificial Intelligence (2005)

  6. No Access

    Chapter and Conference Paper

    A Hidden Markov Model and Immune Particle Swarm Optimization-Based Algorithm for Multiple Sequence Alignment

    Multiple sequence alignment (MSA) is a fundamental and challenging problem in the analysis of biologic sequences. In this paper, an immune particle swarm optimization (IPSO) is proposed, which is based on the ...

    Hong-Wei Ge, Yan-Chun Liang in AI 2005: Advances in Artificial Intelligence (2005)

  7. No Access

    Chapter

    Discovery of Fuzzy Multiple-Level Web Browsing Patterns

    Web usage mining is the application of data mining techniques to discover usage patterns from web data. It can be used to better understand web usage and better serve the needs of rapidly growing web–based app...

    Shyue-Liang Wang, Wei-Shuo Lo in Classification and Clustering for Knowledg… (2005)

  8. No Access

    Chapter and Conference Paper

    Hiding Predictive Association Rules on Horizontally Distributed Data

    In this work, we propose two approaches of hiding predictive association rules where the data sets are horizontally distributed and owned by collaborative but non-trusting parties. In particular, algorithms to...

    Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong in Next-Generation Applied Intelligence (2009)

  9. No Access

    Chapter and Conference Paper

    The Classification of Wine Based on PCA and ANN

    The qualitative identification of different wine through electronic nose is introduced. Principal component analysis (PCA) and artificial neural network (ANN) are adopted to realize the identification. An impr...

    Deng-feng Chen, Qi-chun Ji, Liang Zhao in Fuzzy Information and Engineering Volume 2 (2009)

  10. No Access

    Chapter

    Probabilistic Analysis of Information Center Insecurity

    Information security has become a top priority for many organizations due to a growing number of computer threats. Modeling information system security has been studied extensively in recent years and many tec...

    Shyue-Liang Wang, Jyun-Da Chen in Opportunities and Challenges for Next-Gene… (2009)

  11. No Access

    Chapter and Conference Paper

    Virtual Container Based Consistent Cluster Checkpoint

    Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent ...

    **ao-jia **ang, Hong-liang Yu, Ji-wu Shu in Control and Automation (2009)

  12. No Access

    Chapter and Conference Paper

    Fuzzy Fatigue Reliability Design Considering Model Uncertainty

    In engineering, fatigue failure is one of the main failure modes of actual structures. It is very important in theory and practice to analyze the structural reliability under fatigue loading. The fatigue failu...

    Xu-liang Wang, Hong Nie, Cai-jun Xue in Fuzzy Information and Engineering Volume 2 (2009)

  13. No Access

    Chapter and Conference Paper

    An English Letter Recognition Algorithm Based Artificial Immune

    In the study of letter recognition, the recognition accuracy is impacted by fonts and styles, which is the main bottleneck that the technology is applied. In order to enhance the accuracy, a letter recognition...

    Chunlin Liang, Lingxi Peng, Yindie Hong in Advances in Neural Networks – ISNN 2009 (2009)

  14. No Access

    Chapter and Conference Paper

    Document Classification with Multi-layered Immune Principle

    Automatic document classification is helpful in both organizing and finding information on huge resources. A novel multi-layered immune based document classification algorithm is presented. First, we represent...

    Chunlin Liang, Yindie Hong, Yuefeng Chen, Lingxi Peng in Advances in Swarm Intelligence (2010)

  15. No Access

    Chapter and Conference Paper

    An Integrated Hierarchical Gaussian Mixture Model to Estimate Vigilance Level Based on EEG Recordings

    Effective vigilance level estimation can be used to prevent disastrous accident occurred frequently in high-risk tasks. Brain Computer Interface(BCI) based on ElectroEncephalo-Graph(EEG) is a relatively reliab...

    **g-Nan Gu, Hong-Jun Liu, Hong-Tao Lu, Bao-Liang Lu in Neural Information Processing (2011)

  16. No Access

    Chapter and Conference Paper

    Heuristic Evolutionary Approach for Weighted Circles Layout

    In order to improve lack of GA, we combined it with case-based reasoning(CBR) and constructing non-isomorphic layout pattern (NILP) to solve layout problem in this paper. Its basic idea includes 2 components: ...

    Zi-qiang Li, Hong-liang Zhang, **-hua Zheng, Meng-juan Dong in Information and Automation (2011)

  17. No Access

    Chapter and Conference Paper

    Automated Detection of Major Thoracic Structures with a Novel Online Learning Method

    This paper presents a novel on-line learning method for automatically detecting anatomic structures in medical images. Conventional off-line learning requires collecting all representative samples before the c...

    Nima Tajbakhsh, Hong Wu, Wenzhe Xue, Jianming Liang in Machine Learning in Medical Imaging (2011)

  18. No Access

    Chapter and Conference Paper

    A Heuristic Data-Sanitization Approach Based on TF-IDF

    Data mining technology can help extract useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. In this paper, ...

    Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang in Modern Approaches in Applied Intelligence (2011)

  19. No Access

    Chapter and Conference Paper

    Anonymizing Shortest Paths on Social Network Graphs

    Social networking is gaining enormous popularity in the past few years. However, the popularity may also bring unexpected consequences for users regarding safety and privacy concerns. To prevent privacy being ...

    Shyue-Liang Wang, Zheng-Ze Tsai in Intelligent Information and Database Syste… (2011)

  20. No Access

    Chapter and Conference Paper

    A Smart-Phone-Based Health Management System Using a Wearable Ring-Type Pulse Sensor

    In this paper, a mobile e-health-management system is presented which extends authors’ previous works on mobile physiological signal monitoring. This system integrates a wearable ring-type pulse monitoring sen...

    Yu-Chi Wu, Wei-Hong Hsu, Chao-Shu Chang in Mobile and Ubiquitous Systems: Computing, … (2012)

previous disabled Page of 4