Skip to main content

Research Repository

Advanced Search

All Outputs (25)

Multi-Objective Evolutionary Optimisation for Prototype-Based Fuzzy Classifiers (2022)
Journal Article
Gu, X., Li, M., Shen, L., Tang, G., Ni, Q., Peng, T., & Shen, Q. (2023). Multi-Objective Evolutionary Optimisation for Prototype-Based Fuzzy Classifiers. IEEE Transactions on Fuzzy Systems, 31(5), 1703-1715. https://doi.org/10.1109/tfuzz.2022.3214241

Evolving intelligent systems (EISs), particularly, the zero-order ones have demonstrated strong performance on many real-world problems concerning data stream classification, while offering high model transparency and interpretability thanks to their... Read More about Multi-Objective Evolutionary Optimisation for Prototype-Based Fuzzy Classifiers.

Semantic-Aware Real-Time Correlation Tracking Framework for UAV Videos (2020)
Journal Article
Xue, X., Li, Y., Yin, X., Shang, C., Peng, T., & Shen, Q. (2022). Semantic-Aware Real-Time Correlation Tracking Framework for UAV Videos. IEEE Transactions on Cybernetics, 52(4), 2418-2429. https://doi.org/10.1109/tcyb.2020.3005453

Discriminative correlation filter (DCF) has contributed tremendously to address the problem of object tracking benefitting from its high computational efficiency. However, it has suffered from performance degradation in unmanned aerial vehicle (UAV)... Read More about Semantic-Aware Real-Time Correlation Tracking Framework for UAV Videos.

A tool for generating synthetic data (2018)
Presentation / Conference Contribution
Peng, T., & Telle, A. (2018). A tool for generating synthetic data. In DATA '18 Proceedings of the First International Conference on Data Science, E-learning and Information Systems. https://doi.org/10.1145/3279996.3280018

It is popular to use real-world data to evaluate data mining techniques. However, there are some disadvantages to use real-world data for such purposes. Firstly, real-world data in most domains is difficult to obtain for several reasons, such as budg... Read More about A tool for generating synthetic data.

Visualization of Online Datasets (2017)
Journal Article
Peng, T., & Downie, C. (2017). Visualization of Online Datasets. International Journal of Networked and Distributed Computing, 6(1), 11-23. https://doi.org/10.2991/ijndc.2018.6.1.2

As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, information visualization becomes even more significant as we immerse ourselves into the era of big data, leading to... Read More about Visualization of Online Datasets.

Visualization of Online Datasets (2017)
Presentation / Conference Contribution
Peng, T., & Downie, C. (2017). Visualization of Online Datasets. In Proceedings of 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Application (SERA) (239-246)

As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, an element even more significant as we immerse ourselves into the era of big data, leading to an economy heavily rel... Read More about Visualization of Online Datasets.

Towards a Synthetic Data Generator for Matching Decision Trees (2016)
Presentation / Conference Contribution
Peng, T., & Hanke, F. (2016). Towards a Synthetic Data Generator for Matching Decision Trees. In Proceedings of the 18th International Conference on Enterprise Information Systems (135-141). https://doi.org/10.5220/0005829001350141

It is popular to use real-world data to evaluate or teach data mining techniques. However, there are some disadvantages to use real-world data for such purposes. Firstly, real-world data in most domains is difficult to obtain for several reasons, suc... Read More about Towards a Synthetic Data Generator for Matching Decision Trees.

An Approach to a Laser-Touchscreen System (2016)
Book Chapter
Aizeboje, J., & Peng, T. (2016). An Approach to a Laser-Touchscreen System. In Enterprise Information Systems; Lecture Notes in Business Information Processing (476-495). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-29133-8_23

As modern day technologies advance, so have different methods in which users can interact with computers. Computers are currently being used in combination with devices like projectors for teaching and presentations, in which the mouse and the USB wi... Read More about An Approach to a Laser-Touchscreen System.

An approach to using a laser pointer as a mouse (2015)
Presentation / Conference Contribution
Aizeboje, J., & Peng, T. (2015, April). An approach to using a laser pointer as a mouse. Presented at 17th International Conference on Enterprise Information Systems

Modern technologies have evolved to present different ways users can interact with computers. Nowadays, computers and projectors are commonly used in teaching and presentations, in which the mouse and the USB wireless presenter are two of the main pr... Read More about An approach to using a laser pointer as a mouse.

Feature selection Inspired classifier ensemble reduction. (2014)
Journal Article
Diao, R., Chao, F., Peng, T., Snooke, N., & Shen, Q. (2014). Feature selection Inspired classifier ensemble reduction. IEEE Transactions on Cybernetics, 44, 1259-1268. https://doi.org/10.1109/TCYB.2013.2281820

Classifier ensembles constitute one of the main research directions in machine learning and data mining. The use of multiple classifiers generally allows better predictive performance than that achievable with a single model. Several approaches exist... Read More about Feature selection Inspired classifier ensemble reduction..

A comparison of techniques for name matching (2012)
Journal Article
Peng, T., Li, L., & Kennedy, J. (2012). A comparison of techniques for name matching. GSTF journal on computing, 2,

Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications, such as data integration, text and web mining, information retrieval, sea... Read More about A comparison of techniques for name matching.

A rule based taxonomy of dirty data. (2011)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2011). A rule based taxonomy of dirty data. GSTF journal on computing, 1(2), 140-148

There is a growing awareness that high quality of data is a key to today’s business success and that dirty data existing within data sources is one of the causes of poor data quality. To ensure high quality data, enterprises need to have a process, m... Read More about A rule based taxonomy of dirty data..

An evaluation of name matching techniques. (2011)
Presentation / Conference Contribution
Peng, T., Li, L., & Kennedy, J. (2011). An evaluation of name matching techniques. In Proceedings of 2nd Annual International Conference on Business Intelligence and Data Warehousing

Abstract—There is a growing awareness that the high quality of string matching is a key to a variety of applications, such as data integration, text and web mining, information retrieval, search engine. In such applications, matching names is one of... Read More about An evaluation of name matching techniques..

Improving data quality in data warehousing applications (2010)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2010, June). Improving data quality in data warehousing applications. Presented at Proceedings of the 12th International Conference on Enterprise Information Systems

There is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor data quality. To ensure high quality, enterprises need to have a process,... Read More about Improving data quality in data warehousing applications.

The VoIP intrusion detection through a LVQ-based neural network. (2009)
Presentation / Conference Contribution
Zheng, L., & Peng, T. (2009, November). The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions

Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existing security holes of the Internet. In this paper, a highly effective VoIP i... Read More about The VoIP intrusion detection through a LVQ-based neural network..

Towards a framework for dealing with data quality in data warehouses. (2006)
Book Chapter
Peng, T. (2006). Towards a framework for dealing with data quality in data warehouses. In P. Petratos (Ed.), Current Computing Developments in E-Commerce, Security, HCI, DB, Collaborative and Cooperative Systems (241-256). ATINER

The popularity of data warehouses (DWs) in recent years confirms the importance of data quality in today’s business success. It is estimated that as high as 75% of the effort spent on building a data warehouse can be attributed to back-end issues, su... Read More about Towards a framework for dealing with data quality in data warehouses..

Combining dimensional analysis and heuristics for causal ordering. (2006)
Book Chapter
Shen, Q., & Peng, T. (2006). Combining dimensional analysis and heuristics for causal ordering. In A. Bundy, & S. Wilson (Eds.), Rob Milne: A Tribute to a Pioneering AI Scientist, Entrepreneur and Mountaineer (39-53). IOS Press

This paper is a refined version of the work that the authors presented at the 13th International Workshop on Qualitative Reasoning, jointly with the late Dr Rob Milne. It is dedicated to Rob in recognition of his significant contribution and support... Read More about Combining dimensional analysis and heuristics for causal ordering..

Best practice for implementing a data warehouse: a review for strategic alignment. (2003)
Presentation / Conference Contribution
Weir, R., Peng, T., & Kerridge, J. (2003, September). Best practice for implementing a data warehouse: a review for strategic alignment. Presented at Design and Management of Data Warehouses (DMDW'2003) 5th International Workshop, Berlin, Germany

A review of literature pertaining to data warehouse implementations over the last eight years has been undertaken. It was found that the views of data warehouse practitioners in particular have changed over the period’s pre and post 2000, to the exte... Read More about Best practice for implementing a data warehouse: a review for strategic alignment..

Dimensional analysis based causal ordering (1999)
Presentation / Conference Contribution
Shen, Q., Peng, T., & Milne, R. (1999). Dimensional analysis based causal ordering. In Proceedings of the 13th International Workshop on Qualitative Reasoning (193-202)

This paper presents a novel approach for generating causal dependencies between system variables, from an acausal description of the system behaviour, and for identifying the end causal impact; in terms of whether a change in the value of an influenc... Read More about Dimensional analysis based causal ordering.