Sciweavers

ACSC
2015
IEEE
10 years 1 days ago
An Evaluation of POS Tagging for Tweets Using HMM Modelling
Recently there has been an increased demand for natural language processing tools that work well on unstructured and noisy texts such as texts from Twitter messages. It has been s...
Parma Nand, Rivindu Perera
ACSC
2015
IEEE
10 years 1 days ago
Visualising Moving Clusters using Cluster Flow Diagrams
Moving clusters represent groups of objects that move together, for instance, groups of people evacuating a building. However, because moving clusters are composed of lists of clu...
Jason Thompson, Torab Torabi
ACSC
2015
IEEE
10 years 1 days ago
Image Reconstruction based on Block-based Compressive Sensing
The data of interest are assumed to be represented as Ndimensional real vectors, and these vectors are compressible in some linear basis B, implying that the signals can be recons...
Hanxu You, Jie Zhu
ACSC
2015
IEEE
10 years 1 days ago
A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology
Protecting software copyright has been an issue since the late 1970’s, and software license validation has been a primary method employed in an attempt to minimise software pira...
Jeff Herbert, Alan Litchfield
ACSC
2015
IEEE
10 years 1 days ago
A New Extension of Kernel Principal Component Analysis for Finger Vein Authentication
In this paper, we introduce a new method of data transformation for finger vein recognition system. Our proposed method uses kernel mapping functions to map the data before perfor...
Sepehr Damavandinejadmonfared, Vijay Varadharajan