Search concepts
|
Selected filters |
- 100 - 119 out of 119 results
- Export search results
Search results
-
A Novel Machine Learning Approach for Detecting the Brain Abnormalities from MRI Structural Images
Singh, L., Chetty, G. & Sharma, D., 2012, Pattern Recognition in Bioinformatics. Shibuya, T., Kashima, H., Sese, J. & Ahmad, S. (eds.). Berlin Heidellberg: Springer, Vol. 7632. p. 94-105 12 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access8 Citations (Scopus) -
A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks
Ahmed, M., Huang, X. & Sharma, D., 2012, In: World Academy of Science, Engineering and Technology. 62, p. 396-400 4 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile7 Downloads (Pure) -
A Novel Approach to Protein Structure Prediction Using PCA or LDA Based Extreme Learning Machines
Singh, L., Chetty, G. & Sharma, D., 2012, Neural Information Processing. Huang, T., Zeng, Z., Li, C. & Leung, C. S. (eds.). Berlin: Springer, Vol. 7666. p. 1-6 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
2 Citations (Scopus) -
A novel approach to protein structure prediction using PCA based extreme learning machines and Multiple Kernels
Singh, L., Chetty, G. & Sharma, D., 2012, International Conference on Algorithms and Architecture for Parallel Processing (ICA3PP): Lecture Notes in Computer Science. Xiang, Y., Stojmenovic, I., Apduhan, B. O., Wang, G., Nakano, K. & Zomaya, A. (eds.). Berlin Heidelberg: Springer, Vol. 7440. p. 292-299 8 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution
1 Citation (Scopus) -
A Novel Algorithm for protecting from Internal Attacks of Wireless Sensor Networks
Huang, X., Ahmed, M. & Sharma, D., 2012, 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Melbourne Australia: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 344-349 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
7 Citations (Scopus) -
An intelligent agent framework to manage web services security
BALACHANDRAN, B., SHARMA, D. & Peiris, C., 2012, In: Smart Innovation, Systems and Technologies. 15, p. 367-373 7 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
An Incremental Approach to Solving Dynamic Constraint Satisfaction Problems
Sharma, A. & Sharma, D., 2012, An Incremental Approach to Solving Dynamic Constraint Satisfaction Problems. Huang, Tingwen, Zhigang, Z., Li, Chuandong & Leung (eds.). Berlin Heidelberg: Springer, Vol. 7665. p. 445-455 11 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
4 Citations (Scopus) -
A new term ranking method based on relation extraction and graph model for text classification
Hyunh, D., Tran, D., Ma, W. & Sharma, D., 17 Jan 2011, ASCS '11 Proceedings of Thirty-Fourth Australasian Computer Science Conference. Reynold, M. (ed.). Darlinghurst, Australia: Australian Computer Society, Vol. 113. p. 145-152 7 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access4 Citations (Scopus)2 Downloads (Pure) -
A new security model using multilayer approach for E-health services
Sulaiman, R., SHARMA, D., MA, W. & TRAN, D., 2011, In: Journal of Computer Science. 7, 11, p. 1691-1703 13 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile2 Citations (Scopus)2 Downloads (Pure) -
A new Method for Recognition and De-noising for Middle Wave Infared Imageing
Liao, M., Huang, X., Sharma, D. & Islam, S. M. R., 2012, In: Journal of Flow Visualization Image Processing. 19, 2, p. 179-193 15 p.Research output: Contribution to journal › Article › peer-review
-
A new approach to executable file fragment detection in network forensics
TRAN, D., MA, W. & SHARMA, D., 2014, International Conference on Network and System Security (NSS 2014). Au, M. H., Carminati, B. & Kuo, C. -C. J. (eds.). Germany: Springer, Vol. 8792. p. 510-517 8 p. (Lecture Notes in Computer Science; vol. 8792).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
A New Approach to Compressed File Fragment Identification
NGUYEN, K., TRAN, D., MA, W. & SHARMA, D., 2015, International Joint Conference CISIS 2015 and ICEUTE 2015: CISIS'15 and ICEUTE'15. Herrero, A., Baruque, B., Sedano, J., Quintian, H. & Corchado, E. (eds.). Cham, Switzerland: Springer, Vol. 369. p. 377-387 11 p. (Advances in Intelligent Systems and Computing; vol. 369).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
2 Citations (Scopus) -
A New Approach For Constructing Missing Feature Values
Bani Ahmad, M. A. A., Chetty, G., Tran, D. & Sharma, D., 2012, In: International Journal of Intelligent Information Processing. 3, 1, p. 110-118 9 p.Research output: Contribution to journal › Article › peer-review
-
An approach to detect network attacks applied for network forensics
TRAN, D., MA, W. & SHARMA, D., 2014, 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014. Han, S. & Li, T. (eds.). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 655-660 6 p. 6980912. (2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
4 Citations (Scopus) -
Analysis of the Experimental Results for Quantum Key Distribution Cryptography in IEEE 802.11 Networks
Huang, X., Wijesekera, D. & Sharma, D., 2011, 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), 2011. Australia: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 338-343 6 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus) -
A machine learning approach for intrusion detection in smart cities
Elsaeidy, A., Munasinghe, K. S., Sharma, D. & Jamalipour, A., 22 Sep 2019, 2019 IEEE 90th Vehicular Technology Conference, VTC 2019 Fall - Proceedings. Wang, L-C. & Uysal, M. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-5 5 p. 8891281. (IEEE Vehicular Technology Conference; vol. 2019-September).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
-
A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines
Singh, L., Chetty, G. & Sharma, D., 2012, Machine Learning and Data Mining in Pattern Recognition: Lecture Notes in Computer Science. Perner, P. (ed.). Berlin: Springer, Vol. 7376. p. 660-668 9 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
2 Citations (Scopus)3 Downloads (Pure) -
Advances in smart, multimedia and computer gaming technologies
Favorskaya, M., Sharma, D., Jain, L. C. & Howlett, R. J., 2015, Fusion of Smart, Multimedia and Computer Gaming Technologies: Research, Systems and Perspectives. Sharma, D., Favorskaya, M., Jain, L. C. & Howlett, R. J. (eds.). Switzerland: Springer, Vol. 84. p. 1-6 6 p. (Intelligent Systems Reference Library).Research output: A Conference proceeding or a Chapter in Book › Foreword/postscript
1 Citation (Scopus) -
Adaptable Term Weighting Framework for Text Classification
Hyunh, D., Tran, D., Ma, W. & Sharma, D., 2011, Internationoal Conference on Computational Linguistics and Intelligent Text Processing (CICLing 2011): Lecture Notes in Computer Science. Gelbukh, A. F. (ed.). Berlin Heidelberg: Springer Verlag, Vol. 6609. p. 254-265 12 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
1 Citation (Scopus)