Browsing Closed by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

Browsing Closed by Title

Sort by: Order: Results:

  • Olsson, Michael (Australian Library & Information Assoc Ltd, 2009)
    This article provides a critical analysis of some of the key theories and assumptions that underpin prevailing approaches to the concept of 'information user' in contemporary information research and professional practice, ...
  • Gao, Xinbo; An, Lingling; Li, Xuelong; Tao, Dacheng (Elsevier Science Bv, 2009)
    Recently, lossless data hiding has attracted increasing interests. As a reversible watermark scheme, the host media and hidden data should be recovered without distortion. A latest lossless data hiding technique based on ...
  • Gao, Xinbo; Su, Ya; Li, Xuelong; Tao, Dacheng (IEEE-Inst Electrical Electronics Engineers Inc, 2010)
    Active appearance model (AAM) is a powerful generative method for modeling deformable objects. The model decouples the shape and the texture variations of objects, which is followed by an efficient gradient-based model ...
  • Abedin, Babak; Abedin, Behnam; Talaei-Khoei, Tala; Ghapanchi, Ahmad (Atlantis Press, 2013)
    This paper undertakes a systematic review to gain insight into existing studies on the application of Social Network Sites (SNS). Our systematic review of studies from 1995 to 2012 examines the background and trend of ...
  • Yeh, Wei-Chang (IEEE-Inst Electrical Electronics Engineers Inc, 1998)
    Many real-world systems are multistate and composed of multistate components in which the reliability can be computed in terms of the lower bound points of level d, called d-Minpaths (d-MP). Such systems (electric ...
  • Zhang, Chao; Tao, Dacheng (Microtome Publ, 2013)
    Levy processes refer to a class of stochastic processes, for example, Poisson processes and Brownian motions, and play an important role in stochastic processes and machine learning. Therefore, it is essential to study ...
  • Raza, Syeda Saleha; Haider, Sajjad; Williams, Mary-Anne (Springer, 2013)
    This study presents the application of first-order Bayesian Networks (FOBN) to model and reason in domains with complex relational and rich probabilistic structures. The FOBN framework used in this study is 'multi-entity ...
  • Williams, Mary-Anne (Springer, 2012)
    Robots are pervading human society today at an ever-accelerating rate, but in order to actualize their profound potential impact, robots will need cognitive capabilities that support the necessary social intelligence ...
  • Zhang, Peng; Zhu, Xingquan; Shi, Yong; Guo, Li; Wu, Xindong (Elsevier Science Bv, 2011)
    In this paper, we study the problem of learning from concept drifting data streams with noise, where samples in a data stream may be mislabeled or contain erroneous values. Our essential goal is to build a robust prediction ...
  • Zong, Y; Xu, Guandong; Zhang, Yc; Jiang, H; Li, Mc (Elsevier Science Bv, 2010)
    Iterative refinement clustering algorithms are widely used in data mining area, but they are sensitive to the initialization. In the past decades, many modified initialization methods have been proposed to reduce the ...
  • An, Lingling; Gao, Xinbo; Yuan, Y; Tao, Dacheng (Elsevier Science Bv, 2012)
    Lossless data hiding methods usually fail to recover the hidden messages completely when the watermarked images are attacked. Therefore, the robust lossless data hiding (RLDH), or the robust reversible watermarking technique, ...
  • Gong, Chen; Fu, Kr; Tu, Em; Yang, Jie; He, Sean (IS&T & SPIE, 2013)
    Object tracking is widely used in many applications such as intelligent surveillance, scene understanding, and behavior analysis. Graph-based semisupervised learning has been introduced to deal with specific tracking ...
  • An, Ll; Gao, Xinbo; Li, Xuelong; Tao, Dacheng; Deng, Cheng; Li, Jie (IEEE-inst Electrical Electronics Engineers Inc, 2012)
    Robust reversible watermarking (RRW) methods are popular in multimedia for protecting copyright, while preserving intactness of host images and providing robustness against unintentional attacks. However, conventional RRW ...
  • Mohd Ramli, Huda Adibah; Sandrasegaran, Kumbesan (Inderscience Publishers, 2013)
    This paper proposes a novel packet scheduling algorithm to overcome detrimental effects of channel impairments on the quality of service of delay-sensitive Guaranteed Bit Rate (GBR) services. The proposed algorithm prioritises ...
  • Soliman, Fawzy; Youssef, M (Emerald Group Publishing Ltd, 2003)
  • Veros, Vassiliki (Australian Library & Information Assoc Ltd, 2012)
    Romance fiction, romance authors and readers have been routinely marginalised, in spite of their significant role in contemporary popular culture. Sales figures for the book trade indicate that romance fiction is the most ...
  • Chen, Hm; Li, Tianrui; Ruan, Da; Lin, Jh; Hu, Cx (IEEE Computer Soc, 2013)
    Approximations of a concept by a variable precision rough-set model (VPRS) usually vary under a dynamic information system environment. It is thus effective to carry out incremental updating approximations by utilizing ...
  • Zhang, Zhiwang; Shi, Yong; Zhang, Peng; Gao, Guangxii (Elsevier, 2008)
    It is well known that data mining is a process of discovering unknown, hidden information from a large amount of data, extracting valuable information, and using the information to make important business decisions. And ...
  • Chen, Qingfeng; Zhang, Shichao; Chen, Phoebe (IOS Press, 2008)
    Security protocol analysis has been discussed for quite some time in the past few years. Although formal methods have been widely used to identify various vulnerabilities, mainly susceptibility to freshness attacks and ...
  • Zheng, Zheng; Lu, Jie; Zhang, Guangquan; He, Q (Elsevier Science, 2009)
    Bilevel decision addresses the problem in which two levels of decision makers, each tries to optimize their individual objectives under certain constraints, act and react in an uncooperative, sequential manner. As bilevel ...