


default search action
David Chek Ling Ngo
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j34]Yoke Leng Yong
, Yunli Lee
, David Chek Ling Ngo:
Adaptive detection of FOREX repetitive chart patterns. Pattern Anal. Appl. 23(3): 1277-1292 (2020)
2010 – 2019
- 2018
- [c34]Yoke Leng Yong
, Yunli Lee
, Xiaowei Gu
, Plamen P. Angelov
, David Chek Ling Ngo, Elnaz Shafipour:
Foreign currency exchange rate prediction using neuro-fuzzy systems. INNS Conference on Big Data 2018: 232-238 - 2017
- [j33]Yoke Leng Yong
, Shang Qin Lieu, David Chek Ling Ngo, Yunli Lee:
FOREX Web-Based Trading Platform with E-Learning Features. J. Multim. Inf. Syst. 4(4): 271-278 (2017) - [c33]Yoke Leng Yong
, David Chek Ling Ngo, Yunli Lee
:
Detection of Repetitive Forex Chart Patterns. ICSI (2) 2017: 395-402 - 2016
- [j32]Leslie Ching Ow Tiong, David Chek Ling Ngo, Yunli Lee:
Forex prediction engine: framework, modelling techniques and implementations. Int. J. Comput. Sci. Eng. 13(4): 364-377 (2016) - 2015
- [j31]Arman Khadjeh Nassirtoussi, Saeed Reza Aghabozorgi, Ying Wah Teh
, David Chek Ling Ngo:
Text mining of news-headlines for FOREX market prediction: A Multi-layer Dimension Reduction Algorithm with semantics and sentiment. Expert Syst. Appl. 42(1): 306-324 (2015) - [c32]Yoke Leng Yong
, David Chek Ling Ngo, Yunli Lee
:
Technical Indicators for Forex Forecasting: A Preliminary Study. ICSI (3) 2015: 87-97 - 2014
- [j30]Arman Khadjeh Nassirtoussi, Saeed Reza Aghabozorgi
, Ying Wah Teh
, David Chek Ling Ngo:
Text mining for market prediction: A systematic review. Expert Syst. Appl. 41(16): 7653-7670 (2014)
2000 – 2009
- 2008
- [j29]Thian Song Ong, Andrew Teoh Beng Jin, David Chek Ling Ngo:
Application-Specific Key Release Scheme from Biometrics. Int. J. Netw. Secur. 6(2): 127-133 (2008) - 2007
- [j28]Wai Kuan Yip, Andrew Beng Jin Teoh
, David Chek Ling Ngo:
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization. EURASIP J. Adv. Signal Process. 2007 (2007) - [j27]Ying-Han Pang
, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
Two-Factor Cancelable Biometrics Authenticator. J. Comput. Sci. Technol. 22(1): 54-59 (2007) - 2006
- [j26]Ying-Han Pang, Andrew Beng Jin Teoh, David Chek Ling Ngo:
A Discriminant Pseudo Zernike Moments in Face Recognition. J. Res. Pract. Inf. Technol. 38(2): 197-212 (2006) - [j25]Chong Siew Chin, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
High security Iris verification system based on random secret integration. Comput. Vis. Image Underst. 102(2): 169-177 (2006) - [j24]Wai Kuan Yip, Andrew Beng Jin Teoh
, David Chek Ling Ngo:
Replaceable and securely hashed keys from online signatures. IEICE Electron. Express 3(18): 410-416 (2006) - [j23]Andrew Teoh Beng Jin
, Tee Connie
, David Ngo Chek Ling:
Remarks on BioHash and its mathematical foundation. Inf. Process. Lett. 100(4): 145-150 (2006) - [j22]Andrew Teoh Beng Jin
, Alwyn Goh, David Ngo Chek Ling:
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28(12): 1892-1901 (2006) - [j21]David Ngo Chek Ling, Andrew Teoh Beng Jin
, Alwyn Goh:
Biometric hash: high-confidence face recognition. IEEE Trans. Circuits Syst. Video Technol. 16(6): 771-775 (2006) - [c31]Michael Kah Ong Goh
, Tee Connie
, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
A Fast Palm Print Verification System. CGIV 2006: 168-172 - [c30]Bee Yan Hiew, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
Automatic Digital Camera Based Fingerprint Image Preprocessing. CGIV 2006: 182-189 - [c29]Bee Yan Hiew, Andrew Beng Jin Teoh
, David Chek Ling Ngo:
Preprocessing of Fingerprint Images Captured with a Digital Camera. ICARCV 2006: 1-6 - [c28]Andrew Beng Jin Teoh
, David Chek Ling Ngo:
Biophasor: Token Supplemented Cancellable Biometrics. ICARCV 2006: 1-5 - [c27]Siew Chin Chong, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Iris Authentication Using Privatized Advanced Correlation Filter. ICB 2006: 382-388 - [c26]Wai Kuan Yip, Alwyn Goh, David Ngo Chek Ling, Andrew Teoh Beng Jin:
Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures. ICB 2006: 509-515 - [c25]Thian Song Ong
, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
A Novel Key Release Scheme from Biometrics. ISI 2006: 764-765 - 2005
- [j20]David Chek Ling Ngo, Eugene Ch'ng
:
Screen design with dynamic symmetry: A discovery. Comput. Hum. Behav. 21(2): 307-322 (2005) - [j19]Ying-Han Pang
, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Enhanced pseudo Zernike moments in face recognition. IEICE Electron. Express 2(3): 70-75 (2005) - [j18]Tze Yuang Chong, Andrew Teoh Beng Jin
, David Ngo Chek Ling, Michael Kah Ong Goh
:
Multi-space random mapping for speaker identification. IEICE Electron. Express 2(7): 226-231 (2005) - [j17]Chong Siew Chin, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Tokenised discretisation in iris verification. IEICE Electron. Express 2(11): 349-355 (2005) - [j16]Tee Connie
, Andrew Teoh Beng Jin
, Michael Kah Ong Goh
, David Ngo Chek Ling:
PalmHashing: a novel approach for cancelable biometrics. Inf. Process. Lett. 93(1): 1-5 (2005) - [j15]Tee Connie
, Andrew Teoh Beng Jin
, Michael Kah Ong Goh
, David Ngo Chek Ling:
An automated palmprint recognition system. Image Vis. Comput. 23(5): 501-515 (2005) - [j14]David Chek Ling Ngo, Alwyn Goh, Andrew Beng Jin Teoh
:
Recognition using robust bit extraction. J. Electronic Imaging 14(4): 043016 (2005) - [j13]Andrew Teoh Beng Jin
, David Ngo Chek Ling:
Cancellable biometerics featuring with tokenised random number. Pattern Recognit. Lett. 26(10): 1454-1460 (2005) - [c24]Ying-Han Pang
, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
A Robust Face Recognition System. Australian Conference on Artificial Intelligence 2005: 1217-1220 - [c23]Wai Kuan Yip, Alwyn Goh, David Ngo Chek Ling, Andrew Teoh Beng Jin
:
Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability. AutoID 2005: 27-32 - [c22]Ying-Han Pang
, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
Binarized Revocable Biometrics in Face Recognition. CIS (2) 2005: 788-795 - [c21]Eimad Eldin Abusham, David Ngo Chek Ling, Andrew Teoh Beng Jin:
Comparing the Performance of Principal Component Analysis and RBF Network for Face Recognition using Locally Linear Embedding. IASSE 2005: 78-82 - [c20]Eimad Eldin Abusham, David Ngo Chek Ling, Andrew Teoh Beng Jin:
Fusion of Locally Linear Embedding and Principal Component Analysis for Face Recognition (FLLEPCA). ICAPR (2) 2005: 326-333 - [c19]Han Foon Neo, Andrew Beng Jin Teoh, David Chek Ling Ngo:
A Novel Spatially Confined Non-Negative Matrix Factorization for Face Recognition. MVA 2005: 502-505 - 2004
- [j12]Andrew Teoh Beng Jin
, David Ngo Chek Ling, Alwyn Goh:
Personalised cryptographic key generation based on FaceHashing. Comput. Secur. 23(7): 606-614 (2004) - [j11]Ying-Han Pang
, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Face authentication system using pseudo Zernike moments on wavelet subband. IEICE Electron. Express 1(10): 275-280 (2004) - [j10]Andrew Teoh Beng Jin
, David Ngo Chek Ling, Thian Song Ong
:
An efficient fingerprint verification system using integrated wavelet and Fourier-Mellin invariant transform. Image Vis. Comput. 22(6): 503-513 (2004) - [j9]Tee Connie
, Andrew Teoh Beng Jin
, Michael Kah Ong Goh
, David Ngo Chek Ling:
PalmHashing: a novel approach for dual-factor authentication. Pattern Anal. Appl. 7(3): 255-268 (2004) - [j8]Andrew Teoh Beng Jin
, David Ngo Chek Ling, Alwyn Goh:
Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11): 2245-2255 (2004) - [c18]Han Foon Neo, Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling:
An Efficient Method for Human Face Recognition Using Wavelet Transform and Zernike Moments. CGIV 2004: 65-69 - [c17]Han Foon Neo, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Bio-discretization: Biometrics Authentication Featuring Face Data and Tokenised Random Number. Australian Conference on Artificial Intelligence 2004: 64-73 - [c16]Han Foon Neo, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Face Recognition Using Wavelet Transform and Non-negative Matrix Factorization. Australian Conference on Artificial Intelligence 2004: 192-202 - [c15]Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data. Australian Conference on Artificial Intelligence 2004: 227-236 - [c14]Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh:
An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number. ICBA 2004: 117-123 - [c13]David Ngo Chek Ling, Andrew Teoh Beng Jin, Alwyn Goh:
Eigenspace-Based Face Hashing. ICBA 2004: 195-199 - [c12]Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling, Fu San Hiew:
Palmprint Verification with Moments. WSCG 2004: 325-332 - 2003
- [j7]Toufik Taibi, David Ngo Chek Ling:
Formal specification of design pattern combination using BPSL. Inf. Softw. Technol. 45(3): 157-170 (2003) - [j6]David Ngo Chek Ling:
An expert screen design and evaluation assistant that uses knowledge-based backtracking. Inf. Softw. Technol. 45(6): 293-304 (2003) - [j5]David Ngo Chek Ling, Lian Seng Teo, John G. Byrne:
Modelling interface aesthetics. Inf. Sci. 152: 25-46 (2003) - [j4]Toufik Taibi, David Ngo Chek Ling:
Formal Specification of Design Patterns - A Balanced Approach. J. Object Technol. 2(4): 127-140 (2003) - [c11]Thian Song Ong
, Andrew Teoh Beng Jin, David Ngo Chek Ling, Y. W. Sek:
Fingerprint Images Segmentation Using Two Stages Coarse to Fine Discrimination Technique. Australian Conference on Artificial Intelligence 2003: 624-633 - [c10]Andrew Teoh Beng Jin, Thian Song Ong
, David Ngo Chek Ling, Y. W. Sek:
Automatic Fingerprint Center Point Determination by Using Modified Directional Field and Morphology. Australian Conference on Artificial Intelligence 2003: 633-640 - [c9]Alwyn Goh, David Ngo Chek Ling:
Computation of Cryptographic Keys from Face Biometrics. Communications and Multimedia Security 2003: 1-13 - [c8]Alwyn Goh, David Ngo Chek Ling:
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection. Communications and Multimedia Security 2003: 27-39 - [c7]Alwyn Goh, Wai Kuan Yip, David Ngo Chek Ling:
Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage. Communications and Multimedia Security 2003: 181-193 - [c6]Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling:
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. Communications and Multimedia Security 2003: 239-251 - [c5]Andrew Beng Jin Teoh, David Chek Ling Ngo:
Integrated Wavelet and Fourier-Mellin invariant feature in fingerprint verification system. WBMA@MM 2003: 82-88 - [c4]Michael Kah Ong Goh
, Tee Connie
, Andrew Teoh Beng Jin, David Ngo Chek Ling:
A single-sensor hand geometry and palmprint verification system. WBMA@MM 2003: 100-106 - 2002
- [j3]David Ngo Chek Ling, Lian Seng Teo, John G. Byrne:
Evaluating Interface Esthetics. Knowl. Inf. Syst. 4(1): 46-79 (2002) - [c3]Nasreddine Hallam, David Chek Ling Ngo, Johara Benyamina:
Finalizing the reason of the inconsistency of fuzzy inference templates based on triangular fuzzy relational compositions: a generic case. FUZZ-IEEE 2002: 110-115 - 2001
- [j2]David Chek Ling Ngo, John G. Byrne:
Application of an aesthetic evaluation model to data entry screens. Comput. Hum. Behav. 17(2): 149-185 (2001) - [c2]Eugene Ch'ng, David Chek Ling Ngo:
Evaluating Multimedia and Web based Screen Design with Dynamic Symmetry. IMSA 2001: 133-137 - [c1]Eugene Ch'ng, David Chek Ling Ngo:
A Dynamic Gridding System for Web Page Design Tools. IMSA 2001: 138-142 - 2000
- [j1]David Ngo Chek Ling, Azman Samsudin, Rosni Abdullah:
Aesthetic Measures for Assessing Graphic Screens. J. Inf. Sci. Eng. 16(1): 97-116 (2000)
Coauthor Index
aka: Andrew Teoh Beng Jin

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-25 17:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint