Search concepts
|
Selected filters |
- 100 - 121 out of 121 results
- Export search results
Search results
-
Conference contribution
Quantum Cryptography Based Key Distribution in WiFi Networks
Huang, X., Wijesekera, D. & Sharma, D., 2012, Proceeding of the International Conference on Information Networking (ICOIN 2012). Kim, K-H. & Yoo, M. (eds.). Korea: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 251-256 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution
-
Real-Valued Constraint Optimization with ICHEA
Sharma, A. & Sharma, D., 2012, International Conference on Neural Information Processing (ICONIP 2012): Lecture Notes in Computer Science. Huang, T., Zhigang, Z., Li, C. & Leung, C. S. (eds.). Germany: Springer, Vol. 7665. p. 406-416 11 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
4 Citations (Scopus) -
Resiliency Controlling of Wireless Sensor Networks for Protecting from Internal Attacks
Huang, X. & Sharma, D., 2012, 2012 IEEE 26th International, Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW 2012). Werner, B. (ed.). USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1256-1262 7 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus) -
Secure Wireless Sensor Networks with Dynamic Window for Elliptic Curve Cryptography
Huang, X., Sharma, D., Aseeri, M. & Almorqi, S., 2011, Proceedings of Saudi International Electronic, Communications and Photonics Conference. Al-Ghamdi, A. A. (ed.). USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1-5 5 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
6 Citations (Scopus) -
Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks
Huang, X., Sharma, D. & Ahmed, M., 2012, Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012. Xiang, Y., Stojmenovic, I., Apduhan, B. O., Wang, G., Nakano, K. & Zomaya, A. (eds.). Japan: Springer, Vol. 1. p. 16-29 14 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
Semi-supervised Neural Net Approach to Forecast Unpredictable CPU Load in an Enterprise Applications Environment
Khosla, N. & Sharma, D., 21 Dec 2019, Proceedings of 5th International Conference on Software Security (ICSS 2019). Meghanatha, N. (ed.). AIRCC Publishing Corporation, p. 89-95 7 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution
Open Access -
Senior Health Monitoring Using Kinect
Tran, D., Ma, W. & Sharma, D., 2012, The 4th International Conference on Communications Electronics (ICCE). Quynh, N. X., Park, J. & Graglia, R. D. (eds.). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 309-312 4 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
43 Citations (Scopus) -
Solving Dynamic Constraint Optimization Problems Using ICHEA
Sharma, A. & Sharma, D., 2012, International Conference on Neural Information Processing (ICONIP 2012): Lecture Notes in Computer Science. Huang, T., Zeng, Z., Li, C. & Leung, C. S. (eds.). Berlin: Springer, Vol. 7665. p. 434-444 11 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
4 Citations (Scopus) -
The impact of data fragment sizes on file type recognition
TRAN, D., MA, W. & SHARMA, D., 2014, 2014 10th International Conference on Natural Computation, ICNC 2014. Han, S. & Li, T. (eds.). China: IEEE, Institute of Electrical and Electronics Engineers, p. 748-752 5 p. 6975930. (2014 10th International Conference on Natural Computation, ICNC 2014).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus) -
The Potential Use of Multi-Agent and Hybrid Data Mining Approaches in Social Informatics for Improving E-Health
SHARMA, D. & Shadabi, F., 3 Dec 2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. Chen, J. & Yang, L. T. (eds.). Sydney, NSW: IEEE, Institute of Electrical and Electronics Engineers, p. 350-354 5 p. (Proceedings - 4th IEEE International Conference on Big Data and Cloud Computing, BDCloud 2014 with the 7th IEEE International Conference on Social Computing and Networking, SocialCom 2014 and the 4th International Conference on Sustainable Computing and Communications, SustainCom 2014).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
3 Citations (Scopus) -
The schema last approach to data fusion
Brittliff, N. & Sharma, D., 2014, Twelfth Australasian Data Mining Conference (AusDM14): Proceedings of the 12th Australasian Data Mining Conference, AusDM 2014. Li, X., Liu, L., Ong, K-L. & Zhao, Y. (eds.). Brisbane, Australia: Australian Computer Society, Vol. 158. p. 51-58 8 p. (Conferences in Research and Practice in Information Technology Series; vol. 158).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open AccessFile4 Downloads (Pure) -
Three-Tier SDN Architecture for 5G: A Novel OpenFlow Switch or Traditional
Elgendi, I., Munasinghe, K. S., Jamalipour, A. & Sharma, D., 14 Nov 2017, 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings. Sydney, Australia: IEEE, Institute of Electrical and Electronics Engineers, p. 1-5 5 p. 8108544Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus) -
Time Domain Parameters for Online Feedback fNIRS-Based Brain-Computer Interface Systems
Hoang, T., Tran, D., Khoa, T., Le, T., Huang, X., Sharma, D. & Van, T., 2012, International Conference on Neural Information Processing (ICONIP 2012): Lecture Notes in Computer Science. Huang, T., Zeng, Z., Li, C. & Leung, C. S. (eds.). Germany: Springer Verlag, Vol. 7664. p. 192-201 10 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks
Huang, X., Ahmed, M. & Sharma, D., 2012, Proceeding of the International Conference on Information Networking 2012 (ICOIN 2012). Kim, K-H. & Yoo, M. (eds.). Korea: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 7-12 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
9 Citations (Scopus) -
Using Hybrid Neural Networks for Identifying the Brain Abnormalities from MRI Structural Images
Singh, L., Chetty, G. & Sharma, D., 2012, International conference on Neural Information Processing (ICONIP 2012): Lecture Notes in Computer Science. Huang, T., Zeng, Z., Li, C. & Leung, C. S. (eds.). Germany: Springer, Vol. 7667. p. 465-472 8 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
4 Citations (Scopus) -
Wavelet based denoising algorithm of the ECG signal corrupted by WGN and Poisson noise
Islam, S. M. R., Huang, X. & Sharma, D., 2012, 2012 International Symposium on Communications and Information Technologies. Bouzerdoum, S., Heimlich, M. & Liu, R. P. (eds.). Australia: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 165-168 4 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
6 Citations (Scopus) -
Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory
Ahmed, M., Huang, X., Sharma, D. & Shutao, L., 2012, International Conference on Algorithms and Architectures for Parallel Processing: ICA3PP 2012. Xiang, Y., Stojmenovic, I., Apduhan, B. O., Wang, G., Nakano, K. & Zomaya, A. (eds.). Japan: Springer, p. 255-263 9 p. (Lecture Notes in Computer Science - LNCS; vol. 7440).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
12 Citations (Scopus) -
Edited Book
Handbook of Deep Learning Applications
Balas, V. E., Roy, S. S., Sharma, D. & Samui, P., 2019, 1 ed. Springer - Adis. 383 p. (Smart Innovation, Systems and Technologies; vol. 136)Research output: Book/Report › Edited Book
-
Foreword/postscript
Advances in smart, multimedia and computer gaming technologies
Favorskaya, M., Sharma, D., Jain, L. C. & Howlett, R. J., 2015, Fusion of Smart, Multimedia and Computer Gaming Technologies: Research, Systems and Perspectives. Sharma, D., Favorskaya, M., Jain, L. C. & Howlett, R. J. (eds.). Switzerland: Springer, Vol. 84. p. 1-6 6 p. (Intelligent Systems Reference Library).Research output: A Conference proceeding or a Chapter in Book › Foreword/postscript
1 Citation (Scopus) -
Paper
A Semi-Supervised Learning Approach to Forecast CPU Usages Under Peak Load in an Enterprise Environment
Khosla, N. & Sharma, D., 30 May 2020, p. 145-154. 10 p.Research output: Contribution to conference (non-published works) › Paper › peer-review
Open Access -
EEG biometric-based cryptographic key generation
Nguyen, D., Nguyen, B., Tran, D., Sharma, D. & Ma, W., 6 Dec 2016, p. 108-116. 9 p.Research output: Contribution to conference (non-published works) › Paper › peer-review