• Publications
  • Influence
Robust Speaker Identification and Verification
We introduce a speaker identification/verification system based on a subspace-based enhancement technique and probabilistic support vector machines. Expand
  • 34
  • 2
NIS04-6: A Time- and Memory- Efficient String Matching Algorithm for Intrusion Detection Systems
We propose an efficient string matching algorithm (named ACM) with compact memory as well as high worst-case performance that enables cost-effective and efficient IDSs. Expand
  • 9
An Interactively Application of Fairy Tales for Preschool Children
There are many classics fairy tales, the Grimm's Fairy Tales, Hans Christian Andersen fairy tale, Arabian Nights, etc. which are well known by every child across the world. These stories not only areExpand
Subspace-Based Speech Enhancement with Perceptual Filterbank and SNR-Aware Technique
In this paper, a new subspace-based speech enhancement algorithm is presented. First, we construct a perceptual filterbank from psycho-acoustic model and incorporate it with the subspace-basedExpand
PLC and Its Applications : A Wireless and Automatic Pet-Feeding System for Rabbits
In this paper we design a Supervisory Control and Data Acquisition system, which includes newly designed feeding device, programmable logic controller, a graphical human machine interface programmed with Visual Basic, plus, the Internet communication module. Expand