Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter and Conference Paper

    Face recognition using a face-only database: A new approach

    In this paper, a coarse-to-fine, LDA-based face recognition system is proposed. Through careful implementation, we found that the databases adopted by two state-of-the-art face recognition systems[1,2] were in...

    Hong-Yuan Mark Liaot, Chin-Chuan Hant, Gwo-Joug Yut in Computer Vision — ACCV'98 (1997)

  2. No Access

    Chapter and Conference Paper

    Learning from Hierarchical Attribute Values by Rough Sets

    The rough-set theory has been widely used in dealing with data classification problems. Most of the previous studies on rough sets focused on deriving certain rules and possible rules on the single concept lev...

    Tzung-Pei Hong, Chun-E Lin, Jiann-Horng Lin in Intelligent Systems Design and Applications (2003)

  3. No Access

    Chapter and Conference Paper

    Maintenance of Discovered Functional Dependencies: Incremental Deletion

    The discovery of functional dependencies (FDs) in relational databases is an important data-mining problem. Most current work assumes that the database is static, and a database update requires rediscovering a...

    Shyue-Liang Wang, Wen-Chieh Tsou in Intelligent Systems Design and Applications (2003)

  4. No Access

    Article

    Multi-cue-based face and facial feature detection on video segments

    An approach is presented to detect faces and facial features on a video segment based on multi-cues, including gray-level distribution, color, motion, templates, algebraic features and so on. Faces are first d...

    Zhen Yun Peng, HaiZhou Ai, Wei Hong in Journal of Computer Science and Technology (2003)

  5. No Access

    Chapter

    A Time-Completeness Tradeoff on Fuzzy Web-Browsing Mining

    World-wide-web applications have grown very rapidly and have made a significant impact on computer systems. Among them, web browsing for useful information may be most commonly seen. Due to its tremendous amou...

    Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang in Fuzzy Logic and the Internet (2004)

  6. No Access

    Chapter and Conference Paper

    Solving Job-Shop Scheduling Problems by a Novel Artificial Immune System

    The optimization of job-shop scheduling is very important because of its theoretical and practical significance. This paper proposes an efficient scheduling method based on artificial immune systems. In the pr...

    Hong-Wei Ge, Liang Sun, Yan-Chun Liang in AI 2005: Advances in Artificial Intelligence (2005)

  7. No Access

    Chapter and Conference Paper

    A Hidden Markov Model and Immune Particle Swarm Optimization-Based Algorithm for Multiple Sequence Alignment

    Multiple sequence alignment (MSA) is a fundamental and challenging problem in the analysis of biologic sequences. In this paper, an immune particle swarm optimization (IPSO) is proposed, which is based on the ...

    Hong-Wei Ge, Yan-Chun Liang in AI 2005: Advances in Artificial Intelligence (2005)

  8. No Access

    Chapter

    Discovery of Fuzzy Multiple-Level Web Browsing Patterns

    Web usage mining is the application of data mining techniques to discover usage patterns from web data. It can be used to better understand web usage and better serve the needs of rapidly growing web–based app...

    Shyue-Liang Wang, Wei-Shuo Lo in Classification and Clustering for Knowledg… (2005)

  9. No Access

    Article

    Integrating mRNA Decay Information into Co-Regulation Study

    Absolute or relative transcript amounts measured through high-throughput technologies (e.g., microarrays) are now commonly used in bioinformatics analysis, such as gene clustering and DNA binding motif finding...

    Liang Chen, Hong-Yu Zhao in Journal of Computer Science and Technology (2005)

  10. No Access

    Article

    Mining fuzzy sequential patterns from quantitative transactions

    Many researchers in database and machine learning fields are primarily interested in data mining because it offers opportunities to discover useful information and important relevant patterns in large database...

    Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang in Soft Computing (2006)

  11. No Access

    Article

    Hiding collaborative recommendation association rules

    The concept of Privacy-Preserving has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. For example, through data mining, se...

    Shyue-Liang Wang, Dipen Patel, Ayat Jafari, Tzung-Pei Hong in Applied Intelligence (2007)

  12. No Access

    Chapter and Conference Paper

    Hiding Predictive Association Rules on Horizontally Distributed Data

    In this work, we propose two approaches of hiding predictive association rules where the data sets are horizontally distributed and owned by collaborative but non-trusting parties. In particular, algorithms to...

    Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong in Next-Generation Applied Intelligence (2009)

  13. No Access

    Chapter and Conference Paper

    The Classification of Wine Based on PCA and ANN

    The qualitative identification of different wine through electronic nose is introduced. Principal component analysis (PCA) and artificial neural network (ANN) are adopted to realize the identification. An impr...

    Deng-feng Chen, Qi-chun Ji, Liang Zhao in Fuzzy Information and Engineering Volume 2 (2009)

  14. No Access

    Chapter

    Probabilistic Analysis of Information Center Insecurity

    Information security has become a top priority for many organizations due to a growing number of computer threats. Modeling information system security has been studied extensively in recent years and many tec...

    Shyue-Liang Wang, Jyun-Da Chen in Opportunities and Challenges for Next-Gene… (2009)

  15. No Access

    Chapter and Conference Paper

    Virtual Container Based Consistent Cluster Checkpoint

    Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent ...

    **ao-jia **ang, Hong-liang Yu, Ji-wu Shu in Control and Automation (2009)

  16. No Access

    Chapter and Conference Paper

    Fuzzy Fatigue Reliability Design Considering Model Uncertainty

    In engineering, fatigue failure is one of the main failure modes of actual structures. It is very important in theory and practice to analyze the structural reliability under fatigue loading. The fatigue failu...

    Xu-liang Wang, Hong Nie, Cai-jun Xue in Fuzzy Information and Engineering Volume 2 (2009)

  17. No Access

    Chapter and Conference Paper

    An English Letter Recognition Algorithm Based Artificial Immune

    In the study of letter recognition, the recognition accuracy is impacted by fonts and styles, which is the main bottleneck that the technology is applied. In order to enhance the accuracy, a letter recognition...

    Chunlin Liang, Lingxi Peng, Yindie Hong in Advances in Neural Networks – ISNN 2009 (2009)

  18. No Access

    Article

    A new type of solution method for the generalized linear complementarity problem over a polyhedral cone

    This paper addresses the generalized linear complementarity problem (GLCP) over a polyhedral cone. To solve the problem, we first equivalently convert the problem into an affine variational inequalities proble...

    Hong-Chun Sun, Yan-Liang Dong in International Journal of Automation and Computing (2009)

  19. No Access

    Article

    ArchSim: A System-Level Parallel Simulation Platform for the Architecture Design of High Performance Computer

    High performance computer (HPC) is a complex huge system, of which the architecture design meets increasing difficulties and risks. Traditional methods, such as theoretical analysis, component-level simulation...

    Yong-Qin Huang, Hong-Liang Li, **ang-Hui **e in Journal of Computer Science and Technology (2009)

  20. No Access

    Chapter and Conference Paper

    Document Classification with Multi-layered Immune Principle

    Automatic document classification is helpful in both organizing and finding information on huge resources. A novel multi-layered immune based document classification algorithm is presented. First, we represent...

    Chunlin Liang, Yindie Hong, Yuefeng Chen, Lingxi Peng in Advances in Swarm Intelligence (2010)

previous disabled Page of 6