#### Filter Results:

- Full text PDF available (29)

#### Publication Year

1997

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- David K. Y. Yau, John C. S. Lui, Feng Liang, Yeung Yam
- IEEE/ACM Transactions on Networking
- 2005

Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is for a server under stress to install a router throttle at selected upstream routers. The throttle can be the leaky-bucket rate at which a router can forward packets destined… (More)

- Vladik Kreinovich, Hung T. Nguyen, Yeung Yam
- Int. J. Intell. Syst.
- 2000

One of the reasons why fuzzy methodology is successful is that fuzzy systems are universal approximators, i.e., that we can approximate an arbitrary continuous function within any given accuracy by a fuzzy system. In some practical applications (e.g., in control), it is desirable to approximate not only the original function, but also its derivatives (so… (More)

- Yeung Yam, Péter Baranyi, Chi Tin Yang
- IEEE Trans. Fuzzy Systems
- 1999

—This paper introduces a singular value-based method for reducing a given fuzzy rule set. The method conducts singular value decomposition of the rule consequents and generates certain linear combinations of the original membership functions to form new ones for the reduced set. The present work characterizes membership functions by the conditions of sum… (More)

- Péter Baranyi, Domonkos Tikk, Yeung Yam, Ron J. Patton
- Computers in Industry
- 2003

- Yeung Yam
- IEEE Trans. Systems, Man, and Cybernetics, Part B
- 1997

This paper introduces a new approach for fuzzy approximation of continuous function on a compact domain. The approach calls for sampling the function over a set of rectangular grid points and applying singular value decomposition to the sample matrix. The resulting quantities are then tailored to become rule consequences and membership functions via the… (More)

- Péter Baranyi, Yeung Yam
- 2000

This technical report summarises the use of SVD based reduction for applications using generalised rational form. Some practical formulas are also introduced for using piece-wise linear antecedent sets. Fuzzy algorithms form popular engineering tool to large complex systems. For large rule bases exceeding direct operation capacity an extended algorithm is… (More)

- Annie Tremblay, Bruno Lamontagne, +4 authors Sherif Abou Elela
- Molecular and cellular biology
- 2002

During rRNA biogenesis, multiple RNA and protein substrates are modified and assembled through the coordinated activity of many factors. In Saccharomyces cerevisiae, the double-stranded RNA nuclease Rnt1p and the H/ACA snoRNA pseudouridylase complex participate in the transformation of the nascent pre-rRNA transcript into 35S pre-rRNA. Here we demonstrate… (More)

- Chun Wai Lau, Bin Ma, Helen M. Meng, Yiu Sang Moon, Yeung Yam
- INTERSPEECH
- 2004

This paper presents a multi-biometric verification system that combines speaker verification, fingerprint verification with face identification. Their respective equal error rates (EER) are 4.3%, 5.1% and the range of (5.1% to 11.5%) for matched conditions in facial image capture. Fusion of the three by majority voting gave a relative improvement of 48%… (More)

| In many practical applications of fuzzy methodology, it is desirable to go beyond the interval 0; 1] and to consider more general fuzzy values: e.g., intervals, or real numbers outside the interval 0; 1]. When we increase the set of possible fuzzy values, we thus increase the number of bits necessary to store each degree, and therefore, increase the… (More)

- Yeung Yam, László T. Kóczy
- IEEE Trans. Fuzzy Systems
- 2000

—This paper introduces a new approach for fuzzy interpolation and extrapolation of sparse rule base comprising of membership functions with finite number of characteristic points. The approach calls for representing membership functions as points in high-dimensional Cartesian spaces using the locations of their characteristic points as coordinates. Hence, a… (More)