Visualization of Online Datasets
Journal Article
Peng, T., & Downie, C. (2017)
Visualization of Online Datasets. International Journal of Networked and Distributed Computing, 6(1), 11-23. https://doi.org/10.2991/ijndc.2018.6.1.2
As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, information visualization becomes even mo...
Visualization of Online Datasets
Conference Proceeding
Peng, T., & Downie, C. (2017)
Visualization of Online Datasets. In Proceedings of 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Application (SERA). , (239-246
As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, an element even more significant as we im...
Towards a Synthetic Data Generator for Matching Decision Trees
Conference Proceeding
Peng, T., & Hanke, F. (2016)
Towards a Synthetic Data Generator for Matching Decision Trees. In Proceedings of the 18th International Conference on Enterprise Information Systems. , (135-141). https://doi.org/10.5220/0005829001350141
It is popular to use real-world data to evaluate or teach data mining techniques. However, there are some disadvantages to use real-world data for such purposes. Firstly, real...
An Approach to a Laser-Touchscreen System
Book Chapter
Aizeboje, J., & Peng, T. (2016)
An Approach to a Laser-Touchscreen System. In Enterprise Information Systems; Lecture Notes in Business Information Processing (476-495). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-29133-8_23
As modern day technologies advance, so have different methods in which users can interact with computers. Computers are currently being used in combination with devices like p...
An approach to using a laser pointer as a mouse
Conference Proceeding
Aizeboje, J., & Peng, T. (2015)
An approach to using a laser pointer as a mouse. In Proceedings of the 17th International Conference on Enterprise Information Systems Volume 2, (543-552). https://doi.org/10.5220/0005378005430552
Modern technologies have evolved to present different ways users can interact with computers. Nowadays, computers and projectors are commonly used in teaching and presentation...
Feature selection Inspired classifier ensemble reduction.
Journal Article
Diao, R., Chao, F., Peng, T., Snooke, N., & Shen, Q. (2014)
Feature selection Inspired classifier ensemble reduction. IEEE Transactions on Cybernetics, 44, 1259-1268. https://doi.org/10.1109/TCYB.2013.2281820
Classifier ensembles constitute one of the main research directions in machine learning and data mining. The use of multiple classifiers generally allows better predictive per...
An evaluation of name matching techniques.
Conference Proceeding
Peng, T., Li, L., & Kennedy, J. (2011)
An evaluation of name matching techniques. In Proceedings of 2nd Annual International Conference on Business Intelligence and Data Warehousing
Abstract—There is a growing awareness that the high quality of string matching is a key to a variety of applications, such as data integration, text and web mining, informatio...
A rule based taxonomy of dirty data.
Journal Article
Li, L., Peng, T., & Kennedy, J. (2011)
A rule based taxonomy of dirty data. GSTF journal on computing, 1(2), 140-148
There is a growing awareness that high quality of data is a key to today’s business success and that dirty data existing within data sources is one of the causes of poor data ...
Improving data quality in data warehousing applications
Conference Proceeding
Li, L., Peng, T., & Kennedy, J. (2010)
Improving data quality in data warehousing applications. In J. Filipe, & J. Cordeiro (Eds.), Proceedings of the 12th International Conference on Enterprise Information Systems, 379-382. https://doi.org/10.5220/0002903903790382
There is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor...
The VoIP intrusion detection through a LVQ-based neural network.
Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...