Skip to main content

Research Repository

Advanced Search

Outputs (17)

A Comparison of the Efficiencies of various Structured and Semi- Structured Data Formats in Data Analysis and Big Data Analytic Development (2024)
Presentation / Conference Contribution
Peng, T., & Graham, H. (2024, July). A Comparison of the Efficiencies of various Structured and Semi- Structured Data Formats in Data Analysis and Big Data Analytic Development. Presented at DATA 2024: 13th International Conference on Data Science, Techno

As data volumes grow, so too does our need and ability to analyse it. Cloud computing technologies offer a wide variety of options for analysing big data and make this ability available to anyone. However, the monetary implications for doing this in... Read More about A Comparison of the Efficiencies of various Structured and Semi- Structured Data Formats in Data Analysis and Big Data Analytic Development.

Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas (2023)
Presentation / Conference Contribution
Josephe, A. O., Chrysoulas, C., Peng, T., El Boudani, B., Iatropoulos, I., & Pitropakis, N. (2023). Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas. In 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET

Web applications are popular in our world today and every organization or individual either build or access at least one each day. It’s important for every application user to continue accessing contents of a web application irrespective of the netwo... Read More about Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas.

A tool for generating synthetic data (2018)
Presentation / Conference Contribution
Peng, T., & Telle, A. (2018). A tool for generating synthetic data. In DATA '18 Proceedings of the First International Conference on Data Science, E-learning and Information Systems. https://doi.org/10.1145/3279996.3280018

It is popular to use real-world data to evaluate data mining techniques. However, there are some disadvantages to use real-world data for such purposes. Firstly, real-world data in most domains is difficult to obtain for several reasons, such as budg... Read More about A tool for generating synthetic data.

Visualization of Online Datasets (2017)
Presentation / Conference Contribution
Peng, T., & Downie, C. (2017). Visualization of Online Datasets. In Proceedings of 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Application (SERA) (239-246)

As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, an element even more significant as we immerse ourselves into the era of big data, leading to an economy heavily rel... Read More about Visualization of Online Datasets.

Towards a Synthetic Data Generator for Matching Decision Trees (2016)
Presentation / Conference Contribution
Peng, T., & Hanke, F. (2016). Towards a Synthetic Data Generator for Matching Decision Trees. In Proceedings of the 18th International Conference on Enterprise Information Systems (135-141). https://doi.org/10.5220/0005829001350141

It is popular to use real-world data to evaluate or teach data mining techniques. However, there are some disadvantages to use real-world data for such purposes. Firstly, real-world data in most domains is difficult to obtain for several reasons, suc... Read More about Towards a Synthetic Data Generator for Matching Decision Trees.

An approach to using a laser pointer as a mouse (2015)
Presentation / Conference Contribution
Aizeboje, J., & Peng, T. (2015, April). An approach to using a laser pointer as a mouse. Presented at 17th International Conference on Enterprise Information Systems

Modern technologies have evolved to present different ways users can interact with computers. Nowadays, computers and projectors are commonly used in teaching and presentations, in which the mouse and the USB wireless presenter are two of the main pr... Read More about An approach to using a laser pointer as a mouse.

An evaluation of name matching techniques. (2011)
Presentation / Conference Contribution
Peng, T., Li, L., & Kennedy, J. (2011). An evaluation of name matching techniques. In Proceedings of 2nd Annual International Conference on Business Intelligence and Data Warehousing

Abstract—There is a growing awareness that the high quality of string matching is a key to a variety of applications, such as data integration, text and web mining, information retrieval, search engine. In such applications, matching names is one of... Read More about An evaluation of name matching techniques..

A rule based taxonomy of dirty data. (2011)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2011). A rule based taxonomy of dirty data. GSTF journal on computing, 1(2), 140-148

There is a growing awareness that high quality of data is a key to today’s business success and that dirty data existing within data sources is one of the causes of poor data quality. To ensure high quality data, enterprises need to have a process, m... Read More about A rule based taxonomy of dirty data..

Improving data quality in data warehousing applications (2010)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2010). Improving data quality in data warehousing applications. In J. Filipe, & J. Cordeiro (Eds.), Proceedings of the 12th International Conference on Enterprise Information Systems (379-382). https://doi.org/10.5220/0002

There is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor data quality. To ensure high quality, enterprises need to have a process,... Read More about Improving data quality in data warehousing applications.

The VoIP intrusion detection through a LVQ-based neural network. (2009)
Presentation / Conference Contribution
Zheng, L., & Peng, T. (2009, November). The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions

Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existing security holes of the Internet. In this paper, a highly effective VoIP i... Read More about The VoIP intrusion detection through a LVQ-based neural network..

Best practice for implementing a data warehouse: a review for strategic alignment. (2003)
Presentation / Conference Contribution
Weir, R., Peng, T., & Kerridge, J. (2003). Best practice for implementing a data warehouse: a review for strategic alignment. In Design and Management of Data Warehouses 2003: Proceedings of the 5th Intl. Workshop DMDW'2003, Berlin, Germany, September 8,

A review of literature pertaining to data warehouse implementations over the last eight years has been undertaken. It was found that the views of data warehouse practitioners in particular have changed over the period’s pre and post 2000, to the exte... Read More about Best practice for implementing a data warehouse: a review for strategic alignment..

Dimensional analysis based causal ordering (1999)
Presentation / Conference Contribution
Shen, Q., Peng, T., & Milne, R. (1999). Dimensional analysis based causal ordering. In Proceedings of the 13th International Workshop on Qualitative Reasoning (193-202)

This paper presents a novel approach for generating causal dependencies between system variables, from an acausal description of the system behaviour, and for identifying the end causal impact; in terms of whether a change in the value of an influenc... Read More about Dimensional analysis based causal ordering.

Towards causal ordering based on dimensional analysis. (1998)
Presentation / Conference Contribution
Shen, Q., & Peng, T. (1998). Towards causal ordering based on dimensional analysis. In Proc. of The ECAI-98 Workshop on Model-based systems and qualitative reasoning (27-33)

Representing temporal relationships between events and their effects. (1997)
Presentation / Conference Contribution
Ma, J., Knight, B., & Peng, T. (1997). Representing temporal relationships between events and their effects. In Proc. of the 4th Workshop on Temporal Representation and Reasoning (148-152). https://doi.org/10.1109/TIME.1997.600796

Temporal relationships between events and their effects are complex. As the ejjects of a given event, a proposition may change its truth value immediately after the occurrence of the event and remain true until some other events occur, while anot... Read More about Representing temporal relationships between events and their effects..