Search Results - "Horng, Shi Jinn"
-
1
Deep Air Quality Forecasting Using Hybrid Deep Learning Framework
Published in IEEE transactions on knowledge and data engineering (01-06-2021)“…Air quality forecasting has been regarded as the key problem of air pollution early warning and control management. In this article, we propose a novel deep…”
Get full text
Journal Article -
2
Dynamic Fusion of Multisource Interval-Valued Data by Fuzzy Granulation
Published in IEEE transactions on fuzzy systems (01-12-2018)“…Information fusion is capable of fusing and transforming multiple data derived from different sources to provide a unified representation for centralized…”
Get full text
Journal Article -
3
An Identity-Based and Revocable Data-Sharing Scheme in VANETs
Published in IEEE transactions on vehicular technology (01-12-2020)“…Ensuring data confidentiality in a vehicular ad hoc network (VANET) is an increasingly important issue. Message confidentiality, user privacy and access…”
Get full text
Journal Article -
4
A Robust Multilabel Feature Selection Approach Based on Graph Structure Considering Fuzzy Dependency and Feature Interaction
Published in IEEE transactions on fuzzy systems (01-12-2023)“…The performance of multilabel learning depends heavily on the quality of the input features. A mass of irrelevant and redundant features may seriously affect…”
Get full text
Journal Article -
5
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs
Published in IEEE transactions on vehicular technology (01-04-2017)“…Vehicular ad hoc networks (VANETs) can significantly improve traffic safety and efficiency. The basic idea is to allow vehicles to send traffic information to…”
Get full text
Journal Article -
6
Contrast in Haze Removal: Configurable Contrast Enhancement Model Based on Dark Channel Prior
Published in IEEE transactions on image processing (01-05-2019)“…Conventional haze-removal methods are designed to adjust the contrast and saturation, and in so doing enhance the quality of the reconstructed image…”
Get full text
Journal Article -
7
An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization
Published in IEEE transactions on multimedia (01-08-2008)“…This paper proposes a blind watermarking algorithm based on the significant difference of wavelet coefficient quantization for copyright protection. Every…”
Get full text
Journal Article -
8
A Hybrid Method for Traffic Flow Forecasting Using Multimodal Deep Learning
Published in International journal of computational intelligence systems (2020)“…Traffic flow forecasting has been regarded as a key problem of intelligent transport systems. In this work, we propose a hybrid multimodal deep learning method…”
Get full text
Journal Article -
9
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET
Published in IEEE transactions on information forensics and security (01-11-2013)“…The security and privacy preservation issues are prerequisites for vehicular ad hoc networks. Recently, secure and privacy enhancing communication schemes…”
Get full text
Journal Article -
10
Graph Regularized Sparse Non-Negative Matrix Factorization for Clustering
Published in IEEE transactions on computational social systems (01-06-2023)“…The graph regularized nonnegative matrix factorization (GNMF) algorithms have received a lot of attention in the field of machine learning and data mining, as…”
Get full text
Journal Article -
11
Recognizing Very Small Face Images Using Convolution Neural Networks
Published in IEEE transactions on intelligent transportation systems (01-03-2022)“…Face recognition can be installed in a surveillance system so that it can be used for monitoring, tracking and access control. An excellent, intelligent…”
Get full text
Journal Article -
12
Recognizing Palm Vein in Smartphones Using RGB Images
Published in IEEE transactions on industrial informatics (01-09-2022)“…Recently, demand for biometric access controls and online payments in smartphones increased, necessitating further investigation and development in this area…”
Get full text
Journal Article -
13
LAWNet: A Lightweight Attention-Based Deep Learning Model for Wrist Vein Verification in Smartphones Using RGB Images
Published in IEEE transactions on instrumentation and measurement (2023)“…The wrist vein is one robust and reliable biometric for research and applications in automatic human verification; however, the existing wrist vein recognition…”
Get full text
Journal Article -
14
A Group Incremental Reduction Algorithm with Varying Data Values
Published in International journal of intelligent systems (01-09-2017)“…Attribute reduction based on rough set theory has attracted much attention recently. In real‐life applications, many decision tables may vary dynamically with…”
Get full text
Journal Article -
15
Cost Analysis of Movement-Based Location Management in PCS Networks: An Embedded Markov Chain Approach
Published in IEEE transactions on vehicular technology (01-05-2014)“…In this paper, we develop an approach of embedded Markov chain to analyze the signaling cost of a movement-based location management (MBLM) scheme. This…”
Get full text
Journal Article -
16
Clustering-Based Outlier Detection Technique Using PSO-KNN
Published in Journal of Applied Science and Engineering (01-01-2023)“…In this work, we present an unsupervised machine learning algorithm for outlier detection by integrating Particle Swarm Optimization (PSO) and the K-nearest…”
Get full text
Journal Article -
17
Multivariate time series forecasting via attention-based encoder–decoder framework
Published in Neurocomputing (Amsterdam) (07-05-2020)“…Time series forecasting is an important technique to study the behavior of temporal data and forecast future values, which is widely applied in many fields,…”
Get full text
Journal Article -
18
An efficient flow-shop scheduling algorithm based on a hybrid particle swarm optimization model
Published in Expert systems with applications (01-04-2009)“…In this paper, a new hybrid particle swarm optimization model named HPSO that combines random-key (RK) encoding scheme, individual enhancement (IE) scheme, and…”
Get full text
Journal Article -
19
A Novel Anti-Collision Algorithm in RFID Systems for Identifying Passive Tags
Published in IEEE transactions on industrial informatics (01-02-2010)“…Radio frequency identification has been developed and used in many applications in the real world. Due to the shared wireless channel between tags and the…”
Get full text
Journal Article -
20
A Decision-Theoretic Rough Set Approach for Dynamic Data Mining
Published in IEEE transactions on fuzzy systems (01-12-2015)“…Uncertainty and fuzziness generally exist in real-life data. Approximations are employed to describe the uncertain information approximately in rough set…”
Get full text
Journal Article