Search concepts
|
Selected filters |
- 1 - 50 out of 108 results
- Export search results
Search results
-
Adaptable Term Weighting Framework for Text Classification
Hyunh, D., Tran, D., Ma, W. & Sharma, D., 2011, Internationoal Conference on Computational Linguistics and Intelligent Text Processing (CICLing 2011): Lecture Notes in Computer Science. Gelbukh, A. F. (ed.). Berlin Heidelberg: Springer Verlag, Vol. 6609. p. 254-265 12 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus) -
Advances in smart, multimedia and computer gaming technologies
Favorskaya, M., Sharma, D., Jain, L. C. & Howlett, R. J., 2015, Fusion of Smart, Multimedia and Computer Gaming Technologies: Research, Systems and Perspectives. Sharma, D., Favorskaya, M., Jain, L. C. & Howlett, R. J. (eds.). Switzerland: Springer, Vol. 84. p. 1-6 6 p. (Intelligent Systems Reference Library).Research output: A Conference proceeding or a Chapter in Book › Foreword/postscript
1 Citation (Scopus) -
A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines
Singh, L., Chetty, G. & Sharma, D., 2012, Machine Learning and Data Mining in Pattern Recognition: Lecture Notes in Computer Science. Perner, P. (ed.). Berlin: Springer, Vol. 7376. p. 660-668 9 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
2 Citations (Scopus)3 Downloads (Pure) -
Analysis of the Experimental Results for Quantum Key Distribution Cryptography in IEEE 802.11 Networks
Huang, X., Wijesekera, D. & Sharma, D., 2011, 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), 2011. Australia: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 338-343 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus) -
An analytics-based envelope neural net approach to forecasting memory leakage in an enterprise applications environment
Khosla, N. & Sharma, D., 3 Mar 2020, International Conference on Innovation in Modern Science and Technology (ICIMSAT 2019): Intelligent Techniques and Applications in Science and Technology: Learning and Analytics in Intelligent Systems. Dawn, S., Balas, V., Esposito, A. & Gope, S. (eds.). Switzerland: Springer, Vol. 12. p. 66-74 9 p. (Intelligent Techniques and Applications in Science and Technology; vol. 12).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
An approach to detect network attacks applied for network forensics
TRAN, D., MA, W. & SHARMA, D., 2014, 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014. Han, S. & Li, T. (eds.). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 655-660 6 p. 6980912. (2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
4 Citations (Scopus) -
A New Approach For Constructing Missing Feature Values
Bani Ahmad, M. A. A., Chetty, G., Tran, D. & Sharma, D., 2012, In: International Journal of Intelligent Information Processing. 3, 1, p. 110-118 9 p.Research output: Contribution to journal › Article › peer-review
-
A New Approach to Compressed File Fragment Identification
NGUYEN, K., TRAN, D., MA, W. & SHARMA, D., 2015, International Joint Conference CISIS 2015 and ICEUTE 2015: CISIS'15 and ICEUTE'15. Herrero, A., Baruque, B., Sedano, J., Quintian, H. & Corchado, E. (eds.). Cham, Switzerland: Springer, Vol. 369. p. 377-387 11 p. (Advances in Intelligent Systems and Computing; vol. 369).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
2 Citations (Scopus) -
A new approach to executable file fragment detection in network forensics
TRAN, D., MA, W. & SHARMA, D., 2014, International Conference on Network and System Security (NSS 2014). Au, M. H., Carminati, B. & Kuo, C. -C. J. (eds.). Germany: Springer, Vol. 8792. p. 510-517 8 p. (Lecture Notes in Computer Science; vol. 8792).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
A new Method for Recognition and De-noising for Middle Wave Infared Imageing
Liao, M., Huang, X., Sharma, D. & Islam, S. M. R., 2012, In: Journal of Flow Visualization Image Processing. 19, 2, p. 179-193 15 p.Research output: Contribution to journal › Article › peer-review
-
A new security model using multilayer approach for E-health services
Sulaiman, R., SHARMA, D., MA, W. & TRAN, D., 2011, In: Journal of Computer Science. 7, 11, p. 1691-1703 13 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile2 Citations (Scopus)2 Downloads (Pure) -
A new term ranking method based on relation extraction and graph model for text classification
Hyunh, D., Tran, D., Ma, W. & Sharma, D., 17 Jan 2011, ASCS '11 Proceedings of Thirty-Fourth Australasian Computer Science Conference. Reynold, M. (ed.). Darlinghurst, Australia: Australian Computer Society, Vol. 113. p. 145-152 7 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access4 Citations (Scopus)2 Downloads (Pure) -
An Incremental Approach to Solving Dynamic Constraint Satisfaction Problems
Sharma, A. & Sharma, D., 2012, An Incremental Approach to Solving Dynamic Constraint Satisfaction Problems. Huang, Tingwen, Zhigang, Z., Li, Chuandong & Leung (eds.). Berlin Heidelberg: Springer, Vol. 7665. p. 445-455 11 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
4 Citations (Scopus) -
An intelligent agent framework to manage web services security
BALACHANDRAN, B., SHARMA, D. & Peiris, C., 2012, In: Smart Innovation, Systems and Technologies. 15, p. 367-373 7 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
A Novel Algorithm for protecting from Internal Attacks of Wireless Sensor Networks
Huang, X., Ahmed, M. & Sharma, D., 2012, 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Melbourne Australia: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 344-349 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
7 Citations (Scopus) -
A novel approach to protein structure prediction using PCA based extreme learning machines and Multiple Kernels
Singh, L., Chetty, G. & Sharma, D., 2012, International Conference on Algorithms and Architecture for Parallel Processing (ICA3PP): Lecture Notes in Computer Science. Xiang, Y., Stojmenovic, I., Apduhan, B. O., Wang, G., Nakano, K. & Zomaya, A. (eds.). Berlin Heidelberg: Springer, Vol. 7440. p. 292-299 8 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution
1 Citation (Scopus) -
A Novel Approach to Protein Structure Prediction Using PCA or LDA Based Extreme Learning Machines
Singh, L., Chetty, G. & Sharma, D., 2012, Neural Information Processing. Huang, T., Zeng, Z., Li, C. & Leung, C. S. (eds.). Berlin: Springer, Vol. 7666. p. 1-6 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
2 Citations (Scopus) -
A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks
Ahmed, M., Huang, X. & Sharma, D., 2012, In: World Academy of Science, Engineering and Technology. 62, p. 396-400 4 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile7 Downloads (Pure) -
A Novel Machine Learning Approach for Detecting the Brain Abnormalities from MRI Structural Images
Singh, L., Chetty, G. & Sharma, D., 2012, Pattern Recognition in Bioinformatics. Shibuya, T., Kashima, H., Sese, J. & Ahmad, S. (eds.). Berlin Heidellberg: Springer, Vol. 7632. p. 94-105 12 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access8 Citations (Scopus) -
A novel misbehavior evaluation with dempster-shafer theory in wireless sensor networks
Ahmed, M., Huang, X. & Sharma, D., 2012, MobiHoc '12: Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Nasipuri, A., Hu, Y-C. & Shakkottai, S. (eds.). United States: Association for Computing Machinery (ACM), p. 259-260 2 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
5 Citations (Scopus) -
A Novel Parameter Refinement Approach to One Class Support Vector Machine
Tran, D., Ma, W. & Sharma, D., 2011, International Conference on Neural Information Processing (ICONIP 2011): Lecture Notes in Computer Science. Lu, B-L., Zhang, L. & Kwok, J. (eds.). Berlin Heidelberg: Springer Verlag, Vol. 7063. p. 529-536 8 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus)4 Downloads (Pure) -
A Novel Protection for Wireless Sensor Networks from Internal Attacks
Huang, X., Ahmed, M. & Sharma, D., 2012, Proceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012. Ao, S. I., Castillo, O., Douglas, C., Feng, D. D. & Lee, J. A. (eds.). Hong Kong: International Association of Engineers (IAENG), Vol. 1. p. 374-379 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access2 Citations (Scopus) -
An SVM-Fuzzy Expert System Design For Diabetes Risk Classification
Ramanathan, T. T. & Sharma, D., 2015, In: International Journal of Computer Science and Information Technologies. 6, 3, p. 2221-2226 6 p.Research output: Contribution to journal › Article › peer-review
Open Access -
An SVM-Fuzzy system design for diabetes risk classification
Ramanathan, T. T. & SHARMA, D., 2015, In: International Journal of Computer Science and Information Technologies. 6, 3, p. 2221-2226 6 p.Research output: Contribution to journal › Article › peer-review
Open Access -
A proposed approach to compound file fragment identification
TRAN, D., MA, W. & SHARMA, D., 2014, Network and System Security - 8th International Conference, NSS 2014, Proceedings: 8th International Conference, NSS 2014 Xi’an, China, October 15-17, 2014 Proceedings. Carminati, B., Au, M. H. & Kuo, C-C. J. (eds.). Cham, Switzerland: Springer, Vol. 8792. p. 493-500 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8792).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus) -
A Proposed Feature Extraction Method for EEG-based Person Identification
Tran, D., Huang, X. & Sharma, D., 2012, ICAI 2012 : Proceedings of the 2012 International Conference on Artificial Intelligence, WORLDCOMP'12 : Volume II. Arabnia, H. R. (ed.). USA: CSREA Press, Vol. 2. p. 826-831 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access42 Citations (Scopus) -
A Semi-Supervised Learning Approach to Forecast CPU Usages Under Peak Load in an Enterprise Environment
Khosla, N. & Sharma, D., 30 May 2020, p. 145-154. 10 p.Research output: Contribution to conference (non-published works) › Paper › peer-review
Open Access -
A strategic decision value model for cloud computing in Saudi Arabia's public sector
MREEA, M., MUNASINGHE, K. & SHARMA, D., 26 Jun 2016, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS). Okayama, Japan: IEEE, Institute of Electrical and Electronics Engineers, p. 101-107 7 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
5 Citations (Scopus) -
A Taxonomy of Internal Attacks in Wireless Sensor Network
Ahmed, M., Huang, X. & Sharma, D., 2012, In: World Academy of Science, Engineering and Technology. 6, 2, p. 427-430 4 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile19 Downloads (Pure) -
A triple store implementation to support tabular data
Brittliff, N. & Sharma, D., 2014, Data Mining and Analytics 2014: Proceedings of the 12th Australasian Data Mining Conference (AusDM 2014). Li, X., Liu, L., Ong, K-L. & Zhao, Y. (eds.). Australian Computer Society, Vol. 158. p. 59-67 9 p. (Conferences in Research and Practice in Information Technology Series; vol. 158).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access -
A unified model for support vector machine and support vector data description
Le, T., Tran, D., Ma, W. & Sharma, D., 2012, The 2012 International Joint Conference on Neural Networks (IJCNN). Abbass, H. (ed.). New York: IEEE, Institute of Electrical and Electronics Engineers, p. 1984-1991 8 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
7 Citations (Scopus)4 Downloads (Pure) -
Blockchain in IoT Security: A Survey
Alkurdi, F., Elgendi, I., Munasinghe, K. S., Sharma, D. & Jamalipour, A., 21 Nov 2018, 2018 28th International Telecommunication Networks and Applications Conference, ITNAC 2018. IEEE, Institute of Electrical and Electronics Engineers, p. 1-4 4 p. 8615409. (2018 28th International Telecommunication Networks and Applications Conference, ITNAC 2018).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
8 Citations (Scopus) -
Border Surveillance Framework Using Secure WSN as A new Approach to Avoid Threats
Ahmed, M., Aseeri, M., Huang, X. & Sharma, D., 2012, International Conference on Border Security. Riyadh, Saudi Arabia: ICBS, Saudi Arabia, Vol. 1. p. 59-62 4 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
C2TP: a service model for cloud
Peiris, C., Sharma, D. & Balachandran, B., 2011, Proceedings of the First International Conference on Cloud Computing, GRIDs, and Virtualization: CLOUD COMPUTING 2010. Beklen, A. (ed.). 1 ed. Switzerland: Inderscience Publishers, Vol. 1. p. 3-22 20 p. (International Journal of Cloud Computing).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
Clonal selection algorithm for classification
Sharma, A. & Sharma, D., 2011, Artificial Immune Systems: 10th International Conference, ICARIS 2011, Cambridge, UK, July 18-21, 2011. Proceedings. Liò, P., Nicosia, G. & Stibor, T. (eds.). Berlin, Germany: Springer, p. 361-370 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6825 LNCS).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
20 Citations (Scopus) -
Constraint Optimization for Timetabling Problems using a Contraint Driven Solution Model
Sharma, A. & SHARMA, D., 2013, 26th Australasian Joint Conference on Artificial Intelligence (AI 2013). Cranefield, S. & Nayak, A. (eds.). Berlin/Heidelberg: Springer, Vol. 8272. p. 196-201 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network
Ahmed, M., Huang, X. & Sharma, D., 2012, IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing. Park, J. J. (ed.). Korea: Springer, Vol. 1. p. 94-100 7 p. (Lecture Notes in Computer Science: Theoretical Computer Science and General Issues ; vol. 11783).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
3 Citations (Scopus) -
Determinants of Intention to Use Mobile Value Added Services: The Case of Women-Owned Micro Enterprises in Fiji
SATHYE, M., Prasad, B., SHARMA, D., Sharma, P. & SATHYE, S., 2015, PACIS 2015 Proceedings. Kankanhalli, A., Jones, A. B. & Teo, T. (eds.). United States: Association for Information Systems, p. 1-17 17 p. (Pacific Asia Conference on Information Systems (PACIS)).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
Deterministic Annealing Multi-sphere Support Vector Data Description
Le, T., Tran, D., Ma, W. & Sharma, D., 2012, International Conference on Neural Information Processing: Lecture Notes in Computer Science. Huang, T., Zeng, Z., Li, C. & Leung, C. S. (eds.). Berlin Heidellberg, Germany: Springer, Vol. 7665. p. 183-190 8 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus)3 Downloads (Pure) -
Development of a Multi-issue Negotiation System for E-Commerce
Balachandran, B., Gobbin, R. & Sharma, D., 2011, Intelligent Decision Technologies. Watada, J., Phillips-Wren, G., Jain, L. C. & Howlett, R. J. (eds.). Berlin Heidelberg: Springer, Vol. 10. p. 134-142 9 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
4 Citations (Scopus) -
Distributed Information Integration in Convolutional Neural Networks
Kumar., D. & Sharma., D., 2020, VISIGRAPP 2020 - Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications. Farinella, G. M., Radeva, P. & Braz, J. (eds.). Netherlands: Scitepress, Vol. 5. p. 491-498 8 p. (VISIGRAPP 2020 - Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications; vol. 5).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus) -
Dynamic window with fuzzy controller in wireless sensor networks for elliptic curve cryptography
Huang, X. & Sharma, D., 2011, IEEE International Conference on Fuzzy Systems (FUZZ), 2011. Chen, S. M. (ed.). Taiwan: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 2342-2349 8 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus) -
Eco-Inspired load optimization for LTE EUTRAN
MUNASINGHE, K., Jamalipour, A. & SHARMA, D., 2014, IEEE Wireless Communications and Networking Conference, WCNC. Koca, M. (ed.). USA: IEEE, p. 2085-2089 5 p. 6952611. (IEEE Wireless Communications and Networking Conference, WCNC).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
2 Citations (Scopus)1 Downloads (Pure) -
EEG biometric-based cryptographic key generation
Nguyen, D., Nguyen, B., Tran, D., Sharma, D. & Ma, W., 6 Dec 2016, p. 108-116. 9 p.Research output: Contribution to conference (non-published works) › Paper › peer-review
-
Efficiently Fuzzy Controlling with Dynamic Window in Elliptic Curve Cryptography Sensor Networks
Huang, X. & Sharma, D., 2011, Proceedings of The International MultiConference of Engineers and Computer Scientists 2011: Vol 1, IMECS 2011. Ao, SI., Castillo, O., Douglas, C., Feng, D. D. & Lee, J-A. (eds.). Hongkong, China: IMECS Publisher, Vol. 1. p. 642-647 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access4 Citations (Scopus) -
Elliptic Curve Cryptography Sensor Networks with Optimum Controlling
Huang, X. & Sharma, D., 2011, IAENG Transactions on Engineering Technologies Volume 7. Ao, S., Chan, A. H., Katagiri, H. & Xu, L. (eds.). 2011 ed. Singapore: World Scientific Publishing, p. 374-388 15 p.Research output: A Conference proceeding or a Chapter in Book › Chapter
-
Emotional Influences on Cryptographic Key Generation Systems using EEG signals
NGUYEN, D., TRAN, D., SHARMA, D. & MA, W., 3 Sep 2018, 22nd International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2018. Howlett, R. J., Jain, L. C., Popovic, Z., Popovic, D., Vukosavic, S., Toro, C. & Hicks, Y. (eds.). Belgrade, Serbia: Elsevier, Vol. 126. p. 703-712 10 p. (Procedia Computer Science).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open AccessFile1 Citation (Scopus)9 Downloads (Pure) -
Enhancing Security in E-Health Communications using Muti-agent System
Sulaiman, R., Sharma, D. & Ma, W., 2012, In: Journal of Computer Science. 8, 5, p. 637-647 11 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
Enhancing security in E-health services using agent
Sulaiman, R. & Sharma, D., 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011. NJ, United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-6 6 p. 6021580Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
9 Citations (Scopus) -
Experiments on Synchronous Nonlinear Features for 2-Class NIRS-Based Motor Imagery Problem
Hoang, T., Tran, D., Nguyen, P., Sharma, D., Khoa, T., Nguyen, P. & Huang, X., 2012, The 4th International Conference on the Development of Biomedical Engineering. Van Toi, V., Toan, N. B., Khoa, T. Q. D. & Phoung, T. H. L. (eds.). Vietnam: Springer, Vol. 1. p. 8-12 5 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
3 Citations (Scopus)