Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Siu-Leung Chung"'
Autor:
Siu-Leung Chung, 鍾小良
90
Taiwan has the highest physical denudation rate in the world. Chemical and isotopic compositions of river water are sensitive tracers for chemical erosion. During the last two years, we have sampled more than 100 river waters at 19 stations a
Taiwan has the highest physical denudation rate in the world. Chemical and isotopic compositions of river water are sensitive tracers for chemical erosion. During the last two years, we have sampled more than 100 river waters at 19 stations a
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/686h7q
Publikováno v:
IEICE Transactions on Information and Systems. :1848-1856
Wireless ad hoc network is one of the most suitable platforms for providing communication services to support mobile applications in public areas where no fixed communication infrastructure exists. However, due to the open nature of wireless links an
Publikováno v:
IEICE Transactions on Information and Systems. :1252-1260
In this paper, we present an efficient fingerprint classification algorithm which is an essential component in many critical security application systems e.g. systems in the e-government and e-finance domains. Fingerprint identification is one of the
Publikováno v:
Neural Computing and Applications. 14:203-211
This paper proposes a new codebook generation algorithm for image data compression using a combined scheme of principal component analysis (PCA) and genetic algorithm (GA). The combined scheme makes full use of the near global optimal searching abili
Publikováno v:
Computer Communications. 26:2052-2060
This paper describes a lightweight security mechanism for protecting electronic transactions conducted over the mobile platform. In a typical mobile computing environment, one or more of the transacting parties are based on some wireless handheld dev
Publikováno v:
Journal of Systems and Software. 33:101-108
This paper describes a technique for improving efficiency of data analysis involved in intrusion detection. Intrusion detection aims to detect security violations from abnormal patterns of system usage. It is required that user activities be monitore
Publikováno v:
IEEE Transactions on Software Engineering. 22:580-598
The effort required to service maintenance requests on a software system increases as the software system ages and deteriorates. Thus, it may be economical to replace an aged software system with a freshly written one to contain the escalating cost o
Publikováno v:
Journal of Systems and Software. 31:267-275
This article describes an intrusion detection technique that aims to enhance the security of computing systems. The idea of intrusion detection is based on the hypothesis that computer users are typically involved in specific types of activity, and t
Autor:
Rudy Setiono, Siu-Leung Chung
Publikováno v:
International Journal of High Speed Computing. :109-123
An efficient implementation of a quasi-Newton algorithm for training feed-forward neural network on a Cray Y-MP is presented. The most time-consuming step of a neural network training using the quasi-Newton algorithm is the computation of the error f
Publikováno v:
Journal of medical systems. 35(5)
Wireless body sensor network (WBSN) has gained significant interests as an important infrastructure for real-time biomedical healthcare systems, while the security of the sensitive health information becomes one of the main challenges. Due to the con