David Chek Ling Ngo
According to our database1,
David Chek Ling Ngo
authored at least 68 papers
between 2000 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
2018
Proceedings of the INNS Conference on Big Data and Deep Learning 2018, 2018
2017
J. Multim. Inf. Syst., 2017
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017
2016
Int. J. Comput. Sci. Eng., 2016
2015
Text mining of news-headlines for FOREX market prediction: A Multi-layer Dimension Reduction Algorithm with semantics and sentiment.
Expert Syst. Appl., 2015
Proceedings of the Advances in Swarm and Computational Intelligence, 2015
2014
2008
2007
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization.
EURASIP J. Adv. Signal Process., 2007
2006
IEEE Trans. Circuits Syst. Video Technol., 2006
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs.
IEEE Trans. Pattern Anal. Mach. Intell., 2006
IEICE Electron. Express, 2006
Comput. Vis. Image Underst., 2006
J. Res. Pract. Inf. Technol., 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the Advances in Biometrics, International Conference, 2006
Proceedings of the Advances in Biometrics, International Conference, 2006
Proceedings of the Ninth International Conference on Control, 2006
Proceedings of the Ninth International Conference on Control, 2006
Proceedings of the Third International Conference on Computer Graphics, 2006
Proceedings of the Third International Conference on Computer Graphics, 2006
2005
Pattern Recognit. Lett., 2005
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2005), 2005
Fusion of Locally Linear Embedding and Principal Component Analysis for Face Recognition (FLLEPCA).
Proceedings of the Pattern Recognition and Image Analysis, 2005
Comparing the Performance of Principal Component Analysis and RBF Network for Face Recognition using Locally Linear Embedding.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability.
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005
2004
Biohashing: two factor authentication featuring fingerprint data and tokenised random number.
Pattern Recognit., 2004
Pattern Anal. Appl., 2004
An efficient fingerprint verification system using integrated wavelet and Fourier-Mellin invariant transform.
Image Vis. Comput., 2004
IEICE Electron. Express, 2004
Palmprint Verification with Moments.
Proceedings of the 12-th International Conference in Central Europe on Computer Graphics, 2004
An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number.
Proceedings of the Biometric Authentication, First International Conference, 2004
Proceedings of the Biometric Authentication, First International Conference, 2004
Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data.
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004
Bio-discretization: Biometrics Authentication Featuring Face Data and Tokenised Random Number.
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004
An Efficient Method for Human Face Recognition Using Wavelet Transform and Zernike Moments.
Proceedings of the 2004 International Conference on Computer Graphic, 2004
2003
J. Object Technol., 2003
Inf. Softw. Technol., 2003
An expert screen design and evaluation assistant that uses knowledge-based backtracking.
Inf. Softw. Technol., 2003
Integrated Wavelet and Fourier-Mellin invariant feature in fingerprint verification system.
Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, 2003
Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, 2003
Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.
Proceedings of the Communications and Multimedia Security, 2003
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.
Proceedings of the Communications and Multimedia Security, 2003
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.
Proceedings of the Communications and Multimedia Security, 2003
Proceedings of the Communications and Multimedia Security, 2003
Fingerprint Images Segmentation Using Two Stages Coarse to Fine Discrimination Technique.
Proceedings of the AI 2003: Advances in Artificial Intelligence, 2003
Automatic Fingerprint Center Point Determination by Using Modified Directional Field and Morphology.
Proceedings of the AI 2003: Advances in Artificial Intelligence, 2003
2002
Finalizing the reason of the inconsistency of fuzzy inference templates based on triangular fuzzy relational compositions: a generic case.
Proceedings of the 2002 IEEE International Conference on Fuzzy Systems, 2002
2001
Comput. Hum. Behav., 2001
A Dynamic Gridding System for Web Page Design Tools.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001
Evaluating Multimedia and Web based Screen Design with Dynamic Symmetry.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001
2000