Browsing 08 Information and Computing Sciences by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

  • >
  • >

Browsing 08 Information and Computing Sciences by Title

Sort by: Order: Results:

  • Al-Ani, Ahmed; Atiya, Amir (Springer, 2010)
    Penalized likelihood is a well-known theoretically justified approach that has recently attracted attention by the machine learning society. The objective function of the Penalized likelihood consists of the log likelihood ...
  • Jamdagni, Aruna; Liu, Ren Ping; Nanda, Priyadarsi; Tan, Thomas; He, Sean (CSIRO, 2010)
    The universal use of the Internet has made it more difficult to achieve high security. Attackers target web applications instead of Telnet ports. Cyber-attacks and breaches of information security are increasing in ...
  • Feng, Ml; Dong, Gz; Li, Jinyan; Tan, Yp; Wong, L (Wiley-blackwell, 2010)
    This article addresses the incremental and decremental maintenance of the frequent pattern space. We conduct an in-depth investigation on how the frequent pattern space evolves under both incremental and decremental updates. ...
  • Byrne, Alex. (2004-02-16)
  • Liu, Xiao; Song, Mingli; Zhang, Luming; Tao, Dacheng; Bu, Jiajun; Chen, Chun (IEEE, 2012)
    Pedestrian detection is one of the fundamental tasks of an intelligent transportation system. Differences in illumination, posture and point of view make pedestrian detection confront with great challenges. In this paper, ...
  • Wu, Qiang; Du, Chunhua; Yang, Jie; Chen, Yan; He, Sean (IEEE, 2008)
    A novel approach for walking people detection is proposed in this paper, which is inspired by the idea of gait energy image (GEI). Unlike most of common human detection methods where usually a trained detector scans a ...
  • Raban, Ryszard; Litchfield, Andrew (Uniserve Science, 2006)
  • Atiya, Amir; Al-Ani, Ahmed (Elsevier, 2009)
    Penalized likelihood is a general approach whereby an objective function is defined, consisting of the log likelihood of the data minus some term penalizing non-smooth solutions. Subsequently, this objective function is ...
  • Stanton, Christopher; Ratanasena, Edward; Haider, Sajjad; Williams, Mary-Anne (Springer, 2012)
    We present a method for enabling an Aldebaran Nao humanoid robot to perceive bumps and touches caused by physical contact forces. Dedicated touch, tactile or force sensors are not used. Instead, our approach involves the ...
  • Jacobs, Betty; Scanlon, Clare (Australasian Association of Engineering Education, 2002)
  • Tang, Zhenjun; Dai, Yumin; Zhang, Xianquan; Zhang, Shichao (Springer, 2012)
    Image hashing is an emerging technology for the need of, such as image authentication, digital watermarking, image copy detection and image indexing in multimedia processing, which derives a content-based compact representation, ...
  • Liang, Jie; Huang, Mao Lin; Nguyen, Quang Vinh (IEEE, 2012)
    Space-filling visualization techniques have proved their capability in visualizing large hierarchical structured data. However, most existing techniques restrict their partitioning process in vertical and horizontal ...
  • Chen, Jiaxin; Guo, Youguang; Zhu, Jianguo; Jin, Jianxun (IEEE, 2007)
    This paper presents the performance analysis of a high-speed surface mounted permanent magnet (PM) brushless DC motor by using an improved phase variable model. Magnetic field finite element analyses are conducted to ...
  • Basukala, Riyaj; Mohd Ramli, Huda Adibah; Sandrasegaran, Kumbesan (IEEE, 2009)
    This paper investigates the performance of exponential/proportional fair (EXP/PF) and maximum-largest weighted delay first (M-LWDF) scheduling algorithms in the third generation partnership project long term evolution (3GPP ...
  • Cavali, Fabio; Cucchiara, Rita; Piccardi, Massimo; Prati, Andrea (IEEE, 2002)
  • Xue, Minjie; Sandrasegaran, Kumbesan; Mohd Ramli, Huda Adibah; Lin, Cheng-Chung (IEEE Computer Society, 2010)
    This paper evaluates the performance of two simple packet scheduling algorithms for real-time traffic in the third generation partnership project long term evolution (3GPP LTE) system. These algorithms, known as Algorithm ...
  • Lee, Samson; Leaney, John; O'Neill, Tim; Hunter, Mark (ACM/IEEE/SCS, 2005)
    Simulation of large-scale networks requires enormous amounts of memory and processing time. One way of speeding up these simulations is to distribute the model over a number of connected workstations. However, this introduces ...
  • Reisenfeld, Sam (IEEE, 2009)
    Detect and Avoid (DAA) is a Cognitive Radio technique for a primary user and secondary users sharing the same spectrum. The DAA spectral sensing system must provide both low decision delay and highly reliable decisions ...
  • Paisitkriangkrai, S; Shen, C; Zhang, Jian (The Institution of Engineering and Technology, 2008)
    Detecting pedestrians accurately is the first fundamental step for many computer vision applications such as video surveillance, smart vehicles, intersection traffic analysis and so on. The authors present an experimental ...