Now showing items 1-20 of 499

    • Integration design of supply chain hybrid simulation 

      Tan, Wen Jun; Cai, Wentong; Zhang, Allan NengSheng (2017)
      A supply chain (SC) consists of multiple entities representing the retailers, manufacturers, distributors or suppliers. A firm can be one of the entities within the whole SC. To study the external effects on its internal ...
    • Surrogate assisted calibration framework for crowd model calibration 

      Yi, Wenchao; Zhong, Jinghui; Tan, Singkuang; Cai, Wentong; Hu, Nan (2017)
      Surrogate models are commonly used to approximate the multivariate input or output behavior of complex systems. In this paper, surrogate assisted calibration frameworks are proposed to calibrate the crowd model. To integrate ...
    • The NNi Vietnamese speech recognition system for mediaeval 2016 

      Wang, Lei; Ni, Chongjia; Leung, Cheung-Chi; You, Changhuai; Xie, Lei; Xu, Haihua; Xiao, Xiong; Nwe, Tin Lay; Chng, Eng Siong; Ma, Bin; Li, Haizhou (2016)
      This paper provides an overall description of the Vietnamese speech recognition system developed by the joint team for MediaEval 2016. The submitted system consisted of 3 subsystems, and adopted different deep neural ...
    • Entropy-based graph clustering - a simulated annealing approach 

      Oggier, Frédérique; Phetsouvanh, Silivanxay; Datta, Anwitaman (2018)
      We revisit a Renyi entropy based measure introduced originally for image clustering [1], and study its application to graph clustering. To effectuate Renyi entropy based graph clustering, we propose a simulated annealing ...
    • Entropic centrality for non-atomic flow networks 

      Oggier, Frédérique; Phetsouvanh, Silivanxay; Datta, Anwitaman (2018)
      Given a graph, the notion of entropic centrality was introduced by Tutzauer to characterize vertices which are important in the sense that there is a high uncertainty about the destination of an atomic flow starting at ...
    • Revisiting public reputation calculation in a personalized trust model 

      Cohen, Robin; Wang, Peng Fei; Hu, Zehong (2018)
      In this paper, we present a strategy for agents to predict the trustworthiness of other agents based on reports from peers, when the public reputation reflected by majority opinion may be suspect. We ground our discussion ...
    • A comprehensive exploration to the machine learning techniques for diabetes identification 

      Wei, Sidong; Zhao, Xuejiao; Miao, Chunyan (2018)
      Diabetes mellitus, known as diabetes, is a group of metabolic disorders and has affected hundreds of millions of people. The detection of diabetes is of great importance, concerning its severe complications. There have ...
    • Protecting block ciphers against differential fault attacks without re-keying 

      Baksi, Anubhab; Bhasin, Shivam; Breier, Jakub; Khairallah, Mustafa; Peyrin, Thomas (2018)
      In this article, we propose a new method to protect block cipher implementations against Differential Fault Attacks (DFA). Our strategy, so-called “Tweak-in-Plaintext”, ensures that an uncontrolled value ('tweak-in') is ...
    • Comparison between ternary and binary Gray-code based phase unwrapping methods 

      Zheng, Dongliang; Kemao, Qian; Da, Feipeng; Seah, Hock Soon (2017)
      Phase-shifting profilometry using binary patterns with projector defocusing has been widely used for high-speed 3D measurement. Recently, a ternary Gray-code based phase unwrapping method has been proposed, which enables ...
    • Application of EMD in fringe analysis: new developments 

      Wang, Chenxing; Kemao, Qian; Da, Feipeng; Gai, Shaoyan (2017)
      Empirical mode decomposition (EMD) based methods have been widely used in fringe pattern analysis, including denoising, detrending, normalization, etc. The common problem of using EMD and Bi-dimensional EMD is the mode ...
    • A review of sensing technologies for small and large-scale touch panels 

      Qian, Kemao; Kakarala, Ramakrishna; Akhtar, Humza (2017)
      A touch panel is an input device for human computer interaction. It consists of a network of sensors, a sampling circuit and a micro controller for detecting and locating a touch input. Touch input can come from either ...
    • WFF-BM3D : a hybrid denoising scheme for fringe patterns 

      Zhao, Ming; Qian, Kemao (2015)
      Fringe patterns are widely used in the optical interferometry. The captured fringe patterns usually have noises, and thus a filtering process for fringe patterns is necessary. The windowed Fourier filtering (WFF) algorithm ...
    • Visual pattern degradation based image quality assessment 

      Wu, Jinjian; Li, Leida; Shi, Guangming; Lin, Weisi; Wan, Wenfei (2015)
      In this paper, we introduce a visual pattern degradation based full-reference (FR) image quality assessment (IQA) method. Researches on visual recognition indicate that the human visual system (HVS) is highly adaptive to ...
    • Modeling autobiographical memory in human-like autonomous agents 

      Wang, Di; Tan, Ah-Hwee; Miao, Chunyan (2016)
      Although autobiographical memory is an important part of the human mind, there has been little effort on modeling autobiographical memory in autonomous agents. With the motivation of developing human-like intelligence, in ...
    • Leveraging the trade-off between accuracy and interpretability in a hybrid intelligent system 

      Wang, Di; Quek, Chai; Tan, Ah-Hwee; Miao, Chunyan; Ng, Geok See; Zhou, You (2017)
      Neural Fuzzy Inference System (NFIS) is a widely adopted paradigm to develop a data-driven learning system. This hybrid system has been widely adopted due to its accurate reasoning procedure and comprehensible inference ...
    • Spoofing detection from a feature representation perspective 

      Tian, Xiaohai; Wu, Zhizheg; Xiao, Xiong; Chng, Eng Siong; Li, Haizhou (2016)
      Spoofing detection, which discriminates the spoofed speech from the natural speech, has gained much attention recently. Low-dimensional features that are used in speaker recognition/verification are also used in spoofing ...
    • Detecting synthetic speech using long term magnitude and phase information 

      Tian, Xiaohai; Du, Steven; Xiao, Xiong; Xu, Haihua; Chng, Eng Siong; Li, Haizhou (2015)
      Synthetic speech is speech signals generated by text-to-speech (TTS) and voice conversion (VC) techniques. They impose a threat to speaker verification (SV) systems as an attacker may make use of TTS or VC to synthesize a ...
    • Towards intelligent caring agents for Aging-In-Place : issues and challenges 

      Wang, Di; Subagdja, Budhitama; Kang, Yilin; Tan, Ah-Hwee; Zhang, Daqing (2014)
      The aging of the world's population presents vast societal and individual challenges. The relatively shrinking workforce to support the growing population of the elderly leads to a rapidly increasing amount of technological ...
    • MyLife : an online personal memory album 

      Wang, Di; Tan, Ah-Hwee (2015)
      In this demo, we illustrate the formation, retrieval, and playback of autobiographical memory in an online personal memory album named MyLife. The memory in MyLife consists of pictorial snapshots of one's life together ...
    • Non-intrusive robust human activity recognition for diverse age groups 

      Wang, Di; Tan, Ah-Hwee; Zhang, Daqing (2015)
      Many elderly prefer to live independently at their own homes. However, how to use modern technologies to ensure their safety presents vast challenges and opportunities. Being able to non-intrusively sense the activities ...