Dharmendra Sharma

Orcid: 0000-0002-9856-4685

Affiliations:
  • University of Canberra, Faculty of Science and Technology, Australia


According to our database1, Dharmendra Sharma authored at least 172 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cognitive Reframing via Large Language Models for Enhanced Linguistic Attributes.
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024

2023
Feature Map Augmentation to Improve Scale Invariance in Convolutional Neural Networks.
J. Artif. Intell. Soft Comput. Res., 2023

2022
Do Religious Values Influence the Decision of Saudi Arabian Public Sector Employees to Adopt Government Resource Planning Systems?
IEEE Access, 2022

2021
Feature Map Upscaling to Improve Scale Invariance in Convolutional Neural Networks.
Proceedings of the 16th International Joint Conference on Computer Vision, 2021

Global-first Training Strategy with Convolutional Neural Networks to Improve Scale Invariance.
Proceedings of the Computer Vision, Imaging and Computer Graphics Theory and Applications, 2021

2020
Impact of Users' Socio-Cultural and Religious Orientation on Government Resource Planning (GRP) Systems Usage in Saudi Arabia.
IEEE Access, 2020

Distributed Information Integration in Convolutional Neural Networks.
Proceedings of the 15th International Joint Conference on Computer Vision, 2020

A Study on the Impact of Alcoholism on EEG-based Cryptographic Key Generation Systems.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Multi-modal Information Extraction and Fusion with Convolutional Neural Networks.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Feature Map Augmentation to Improve Rotation Invariance in Convolutional Neural Networks.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2020

2019
Intrusion detection in smart cities using Restricted Boltzmann Machines.
J. Netw. Comput. Appl., 2019

A Machine Learning Approach for Intrusion Detection in Smart Cities.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Enhanced Waters 2D Muscle Model for Facial Expression Generation.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019

Deep Learning in Gene Expression Modeling.
Proceedings of the Handbook of Deep Learning Applications., 2019

2018
Factors influencing the intention to use of mobile value-added services by women-owned microenterprises in Fiji.
Electron. J. Inf. Syst. Dev. Ctries., 2018

On the Study of Impacts of Brain Conditions on EEG-based Cryptographic Key Generation Systems.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

Emotional Influences on Cryptographic Key Generation Systems using EEG signals.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

Blockchain in IoT Security: A Survey.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

Investigating the Factors Affecting the Adoption of Cloud Computing in SMEs: A Case Study of Saudi Arabia.
Proceedings of the Information Systems, 2018

2017
Traffic Offloading 3-Tiered SDN Architecture for DenseNets.
IEEE Netw., 2017

Mobile Value Added Services in Fiji: Institutional Drivers, Industry Challenges, and Adoption by Women Micro Entrepreneurs.
J. Glob. Inf. Manag., 2017

Random Number Generators Basedon EEG Non-linear and ChaoticCharacteristics.
J. Cyber Secur. Mobil., 2017

Decision tree algorithms for image data type identification.
Log. J. IGPL, 2017

Three-Tier SDN Architecture for 5G: A Novel OpenFlow Switch or Traditional.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

On The Study of EEG-based Cryptographic Key Generation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Investigating The Impact Of Epilepsy On EEG-based Cryptographic Key Generation Systems.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

A smart city cyber security platform for narrowband networks.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Investigating Cloud Adoption Model using Analytics: A Case Study of Saudi Government Agencies.
Proceedings of the CLOSER 2017, 2017

Cloud Computing Financial and Cost Analysis: A Case Study of Saudi Government Agencies.
Proceedings of the CLOSER 2017, 2017

2016
Traffic offloading techniques for 5G cellular: a three-tiered SDN architecture.
Ann. des Télécommunications, 2016

A strategic decision value model for cloud computing in Saudi Arabia's public sector.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
A CCII-based wide frequency range square/triangular wave generator.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

Determinants of Intention to Use Mobile Value Added Services: The Case of Women-Owned Micro Enterprises in Fiji.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

A New Approach to Compressed File Fragment Identification.
Proceedings of the International Joint Conference, 2015

2014
Semantic Similarity Measure Using Relational and Latent Topic Features.
Int. J. Comput. Linguistics Appl., 2014

Eco-inspired load optimization for LTE EUTRAN.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Mobile Value Added Services for Inclusive growth: a Study of women micro-Entrepreneurs in Fiji.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

A New Approach to Executable File Fragment Detection in Network Forensics.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Proposed Approach to Compound File Fragment Identification.
Proceedings of the Network and System Security - 8th International Conference, 2014

Multi-agents based data mining for intelligent decision support systems.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

The impact of data fragment sizes on file type recognition.
Proceedings of the 10th International Conference on Natural Computation, 2014

An approach to detect network attacks applied for network forensics.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

The Potential Use of Multi-agent and Hybrid Data Mining Approaches in Social Informatics for Improving e-Health Services.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

A Triple Store Implementation to support Tabular Data.
Proceedings of the Twelfth Australasian Data Mining Conference, AusDM 2014, Brisbane, 2014

The Schema Last Approach to Data Fusion.
Proceedings of the Twelfth Australasian Data Mining Conference, AusDM 2014, Brisbane, 2014

2013
Proximity multi-sphere support vector clustering.
Neural Comput. Appl., 2013

Protecting wireless sensor networks from internal attacks based on uncertain decisions.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Constraint Optimization for Timetabling Problems Using a Constraint Driven Solution Model.
Proceedings of the AI 2013: Advances in Artificial Intelligence, 2013

2012
A Novel Machine Learning Approach for Detecting the Brain Abnormalities from MRI Structural Images.
Proceedings of the Pattern Recognition in Bioinformatics, 2012

Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

A novel misbehavior evaluation with dempster-shafer theory in wireless sensor networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012

Wavelet based denoising algorithm of the ECG signal corrupted by WGN and Poisson noise.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Human identification with electroencephalogram (EEG) signal processing.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Resiliency Controlling of Wireless Sensor Networks for the Protecting from Internal Attacks.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

A unified model for support vector machine and support vector data description.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Using Hybrid Neural Networks for Identifying the Brain Abnormalities from MRI Structural Images.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

A Novel Approach to Protein Structure Prediction Using PCA or LDA Based Extreme Learning Machines.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

An Incremental Approach to Solving Dynamic Constraint Satisfaction Problems.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Solving Dynamic Constraint Optimization Problems Using ICHEA.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Real-Valued Constraint Optimization with ICHEA.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

ICHEA - A Constraint Guided Search for Improving Evolutionary Algorithms.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Deterministic Annealing Multi-Sphere Support Vector Data Description.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Maximal Margin Approach to Kernel Generalised Learning Vector Quantisation for Brain-Computer Interface.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Time Domain Parameters for Online Feedback fNIRS-Based Brain-Computer Interface Systems.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Hybrid Approach for Diagnosing Thyroid, Hepatitis, and Breast Cancer Based on Correlation Based Feature Selection and Naïve Bayes.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Protecting an WSN from internal attack based on epistemic uncertainties.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Quantum cryptography based key distribution in WiFi networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

Timing control for protecting from internal attacks in wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

A Novel Approach to Protein Structure Prediction Using PCA Based Extreme Learning Machines and Multiple Kernels.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

People Identification with RMS-Based Spatial Pattern of EEG Signal.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

Fuzzy Multi-sphere Support Vector Data Description.
Proceedings of the FUZZ-IEEE 2012, 2012

ICHEA for Discrete Constraint Satisfaction Problems.
Proceedings of the AI 2012: Advances in Artificial Intelligence, 2012

2011
C2TP: a service model for cloud.
Int. J. Cloud Comput., 2011

Performance analysis of QKD based key distribution for IEEE 802.11 networks.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Multiple Distribution Data Description Learning Algorithm for Novelty Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Grammatical Dependency-Based Relations for Term Weighting in Text Classification.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Quantum cryptography based Key Distribution in IEEE 802.11 networks - analysis on reconciliation phase.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Investigations for the simulations of a quantum key distribution in WiFi.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Multiple distribution data description learning method for novelty detection.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

Multi-Sphere Support Vector Clustering.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

A Novel Parameter Refinement Approach to One Class Support Vector Machine.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Generalised Support Vector Machine for Brain-Computer Interface.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Enhancing security in E-health services using agent.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011

Clonal Selection Algorithm for Classification.
Proceedings of the Artificial Immune Systems - 10th International Conference, 2011

Dynamic window with fuzzy controller in wireless sensor networks for elliptic curve cryptography.
Proceedings of the FUZZ-IEEE 2011, 2011

Analysis of the Experimental Results for Quantum Key Distribution Cryptography in IEEE 802.11 Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

Protecting from Inside Attacks in Wireless Sensor Networks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Adaptable Term Weighting Framework for Text Classification.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2011

A New Term Ranking Method based on Relation Extraction and Graph Model for Text Classification.
Proceedings of the Thirty-Fourth Australasian Computer Science Conference, 2011

2010
Enhancing Performance of SVM-Based Brain-Computer Interface Systems.
Aust. J. Intell. Inf. Process. Syst., 2010

Australian Accent-Based Speaker Classification.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

Automatic Speech-Based Classification of Gender, Age and Accent.
Proceedings of the Knowledge Management and Acquisition for Smart Systems and Services, 2010

Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Fuzzy support vector machines for age and gender classification.
Proceedings of the 11th Annual Conference of the International Speech Communication Association, 2010

An optimal sphere and two large margins approach for novelty detection.
Proceedings of the International Joint Conference on Neural Networks, 2010

Quantum Cryptography based Key Distribution in Wi-Fi Networks - Protocol Modifications in IEEE 802.11.
Proceedings of the ICSOFT 2010, 2010

A Theoretical Framework for Multi-sphere Support Vector Data Description.
Proceedings of the Neural Information Processing. Models and Applications, 2010

Fuzzy feature weighting techniques for vector quantisation.
Proceedings of the FUZZ-IEEE 2010, 2010

A new support vector machine method for medical image classification.
Proceedings of the 2nd European Workshop on Visual Information Processing, 2010

A practical study on shape space and its occupancy in negative selection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Fuzzy Subspace Hidden Markov Models for Pattern Recognition.
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009

A Multi-agent Security Architecture.
Proceedings of the Third International Conference on Network and System Security, 2009

Fuzzy Switching Controller for the Security in 802.11 Networks.
Proceedings of the First International Conference on Networks and Communications, 2009

Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009

Multi-Agent Systems in Quantum Security for Modern Wireless Networks.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

The Role of Ontology in Modelling Autonomous Agent-Based Systems.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

Evaluating security risks based on intelligent systems and attack graphs.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009

Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

E-health Services with Secure Mobile Agent.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

Novel Protocol and Its Implementation QKD in Wi-Fi Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Automated network feature weighting-based intrusion detection systems.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

An Intelligent Multi Agent Design in Healthcare Management System.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

An Agent-Oriented Dynamic Adaptive Threshold Transmission for XML Data on Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

An Agent Based Multifactor Biometric Security System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Automated network feature weighting-based anomaly detection.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

A study on the feature selection of network traffic for intrusion detection purpose.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Remote multimodal biometric authentication using bit priority-based fragile watermarking.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Negative Selection with Antigen Feedback in Intrusion Detection.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008

A Multi-agents Approach to Knowledge Discovery.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

RFID Technology and Crowded Event Management.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

Extending Prometheus with Agent Cooperation.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

Artificial Intelligence and Data Mining Techniques in Medicine - Success Stories.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Handwriting Recognition Applications for Tablet PCs.
J. Adv. Comput. Intell. Intell. Informatics, 2007

Fuzzy Observable Markov Models for Pattern Recognition.
J. Adv. Comput. Intell. Intell. Informatics, 2007

A Multiagent Based Vehicle Engine Fault Diagnosis.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Multi-agent Security Framework for e-Health Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Using Tuple Space to Coordinate Multiagent Activities.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Multi-agent Architecture for RFID Taxonomy.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Multi-agent Processing for Query Camouflage Via Data Perturbation in Online Medical Surveys.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Comparison of Three Agent-Oriented Software Development Methodologies: ROADMAP, Prometheus, and MaSE.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Synthetic Method for Wafer Character Recognition.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Fast Matching Method for Fingerprints with Less Than Two Global Singular Points.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Fuzzy Normalisation Methods for Typist Verification.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

On Extendable Software Architecture for Spam Email Filtering.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A New Efficient Transmission for XML Data on Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Password Less System Security Using Multimodal Biometric Fusion.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

The Application of Multi-sensors Fusion in Vehicle Transmission System Fault Diagnosis.
Proceedings of the Third International Conference on Natural Computation, 2007

Possibility Theory-Based Approach to Spam Email Detection.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Fuzzy Vector Quantization for Network Intrusion Detection.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

A Dynamic Adaptive Threshold Transmission for XML Data on Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
A Novel Approach to Programming: Agent Based Software Engineering.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Personalisation of Web Search: An Agent Based Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Investigating Security in Multi-tree Based Technique in RFID Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Dynamic Threshold Technique for XML Data Transmission on Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Distributed Face Recognition: A Multiagent Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Detecting Image Based Spam Email.
Proceedings of the Advances in Hybrid Information Technology, 2006

Image Noise Removal in Nakagami Fading Channels via Bayesian Estimator.
Proceedings of the Third IEEE International Workshop on Electronic Design, 2006

2005
A Multi-agent Framework for .NET.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

On an IT Security Framework.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Hybrid Decision Tree - Artificial Neural Networks Ensemble Approach for Kidney Transplantation Outcomes Prediction.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Evaluating the Size of the SOAP for Integration in B2B.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Smart Clients and Small Business Model.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Multiple Agents Based Intrusion Detection System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Personalised Search on Electronic Information.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

MEDADVIS: A Medical Advisory System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
New Background Speaker Models and Experiments on the ANDOSL Speech Corpus.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Dynamic Scheduling Using Multiagent Architecture.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Use of Artificial Neural Networks in the Prediction of the Kidney Transplant Outcomes.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

A Study of the Radial Basis Function Neural Network Classifiers Using Known Data of Varying Accuracy and Complexity.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Multi-agents for Decision Support.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

2002
UniLR: An Automated Fuzzy Legal Reasoner.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002

2000
An Evolutionary Approach to Constraint-Based Timetabling.
Proceedings of the Advances in Artificial Intelligence. PRICAI 2000 Workshop Reader, Four Workshops held at PRICAI 2000, Melbourne, Australia, August 28, 2000


  Loading...