Yi-Fei Tan
Multimedia University
SteganographyImage compressionNetwork packetQueuePixelLossy compressionPattern recognitionWavelet transformComputer networkComputer visionMathematicsComputer scienceWaveletQuality of serviceAnomaly detectionData compressionLossless compressionColor Cell CompressionDimensioningData compression ratio
26Publications
5H-index
53Citations
Publications 20
Newest
#1Yi-Fei Tan (MMU: Multimedia University)H-Index: 1
#1Yi-Fei Tan (MMU: Multimedia University)H-Index: 5
Last. Soon-Chang Poh (MMU: Multimedia University)H-Index: 1
view all 3 authors...
The population of elderly is growing and is projected to outnumber the youth in the future. Many researches on elderly assisted living technology were carried out. One of the focus areas is activity monitoring of the elderly. AReM dataset is a time series activity recognition dataset for seven different types of activities, which are bending 1, bending 2, cycling, lying, sitting, standing and walking. In the original paper, the author used a many-to-many Recurrent Neural Network for activity rec...
Source
#1Nour Eddin Tabbakha (MMU: Multimedia University)H-Index: 1
#2Chee-Pun Ooi (MMU: Multimedia University)H-Index: 5
Last. Yi-Fei Tan (MMU: Multimedia University)H-Index: 1
view all 4 authors...
Source
#1Soon-Chang PohH-Index: 1
#2Yi-Fei TanH-Index: 5
view all 9 authors...
Source
#1Soon-Chang PohH-Index: 1
#2Yi-Fei TanH-Index: 5
Last. Wooi-Haw TanH-Index: 8
view all 5 authors...
Source
#1Soon-Chang Poh (MMU: Multimedia University)H-Index: 1
#2Yi-Fei Tan (MMU: Multimedia University)H-Index: 5
Last. Wooi-Haw Tan (MMU: Multimedia University)H-Index: 8
view all 5 authors...
The world population of the elderly is expected to have a continuous growth and the number of elderly living in solitude is also expected to increase in the coming years. As our health decline with age, early detection of possible deterioration in health becomes important. Behavioral changes in in-home activities can be used as an indicator of health decline. For example, changes in routine of in-home activities. Past research mainly focused on detecting anomalies in routine of each type of in-h...
Source
#1Xiaoning Guo (MMU: Multimedia University)H-Index: 1
#2Yi-Fei Tan (MMU: Multimedia University)H-Index: 5
Last. Shariar Mohsin Shohan (MMU: Multimedia University)
view all 4 authors...
This paper proposes a steganographic method that would improve transfer security and allow user customizable options, with no size restrictions for the secret image being transferred. It compares the secret image with multiple directionally scanned Least Significant Bits of the cover image for similarity in varied length of segments. the result of the comparison will form the basis of generating the key. A varied comparison segment of 2, 4, 6, 8 and 10 bits in binary was used in this paper to as...
Source
#1Yi-Fei TanH-Index: 5
#1Yi-Fei TanH-Index: 1
Last. Wooi-King SooH-Index: 1
view all 4 authors...
4 CitationsSource
#1Thiaw Seng Ng (MMU: Multimedia University)H-Index: 1
#2Teong Chee Chuah (MMU: Multimedia University)H-Index: 15
Last. Yi Fei Tan (MMU: Multimedia University)H-Index: 1
view all 3 authors...
Applications of video streaming and real-time gaming, which generate large amounts of real-time traffic in the network, are expected to gain considerable popularity in Long Term Evolution networks. Maintaining the QoS such as packet delay, packet loss ratio, median, and cell border throughput requirements in networks dominated by real time traffic, is critical. The existing dimensioning methodology does not consider QoS parameters of real-time traffic in network dimensioning. Moreover, exhaustiv...
10 CitationsSource
#1Siew Khew Koh (UTAR: Universiti Tunku Abdul Rahman)
view all 3 authors...
Consider the single server queue in which the system capacity is infinite and the customers are served on a first come, first served basis. Suppose the probability density function and the cumulative distribution function of the interarrival time are such that the rate tends to a constant as , and the rate computed from the distribution of the service time tends to another constant. When the queue is in a stationary state, we derive a set of equations for the probabilities of the queue length an...
Source
#1Wooi-Nee Tan (MMU: Multimedia University)H-Index: 5
#2Racheal Sem (MMU: Multimedia University)H-Index: 1
Last. Yi Fei Tan (MMU: Multimedia University)H-Index: 1
view all 3 authors...
This paper introduces the concept of eigenvalues in describing the shape features of blooming flowers, and implements the idea in recognizing the blooming flowers automatically. The input images of blooming flowers are taken from natural scene in the form of RGB images. The proposed method first segments and crops the targeted flower object, then calculates four shape features to form a 2 × 2 matrix. Eigenvalues of the matrix computed from the testing set are then used to compare with those eige...
5 CitationsSource