Your selections:
Transitioning regional Australia to circular bioeconomy : a case for the latrobe valley
Trusted autonomous vehicle : measuring trust using on-board unit data
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
Verification of latency and delays related to a digital topology based on IEC 61850
- Kumar, Shantanu, Das, Narottam, Islam, Syed, Abu-Siada, Ahmed
A kernel-based approach for content-based image retrieval
- Karmakar, Priyabrata, Teng, Shyh, Lu, Guojun, Zhang, Dengsheng
A novel perceptual dissimilarity measure for image retrieval
- Shojanazeri, Hamid, Zhang, Dengsheng, Teng, Shyh, Aryal, Sunil, Lu, Guojun
A patient agent to manage blockchains for remote patient monitoring
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
A server side solution for detecting webInject : A machine learning approach
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal, Brown, Simon
Alignment-free cancellable template generation for fingerprint based authentication
- Nazmul, Rumana, Islam, Rafiqul, Chowdhury, Ahsan
Alignment-free fingerprint template protection technique based on minutiae neighbourhood information
- Nazmul, Rumana, Islam, Rafiqul, Chowdhury, Ahsan
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
An Improved algorithm for moving object tracking based on EKF
- Hou, Leichao, Qu, Junsuo, Zhang, Ruijun, Wang, Ting, Ting, KaiMing
- Zhalehjoo, Negin, Tolooiyan, Ali, Mackay, Rae, Bodin, Didier
Classifier-free extraction of power line wires from point cloud data
- Awrangjeb, Mohammad, Gao, Yongsheng, Lu, Guojun
- Kulkarni, Pradnya, Stranieri, Andrew
Cyclically strained grade 800 and 1200 steel tube materials
- Javidan, Fatemeh, Heidarpour, Amin, Zhao, Xiao-Ling, Fallahi, Hossein
Data analytics to select markers and cut-off values for clinical scoring
- Stranieri, Andrew, Yatsko, Andrew, Venkatraman, Sitalakshmi, Jelinek, Herbert
Deep user modeling for content-based event recommendation in event-based social networks
- Wang, Zhibo, Zhang, Yongquan, Chen, Honglong, Li, Zhetao, Xia, Feng
Detecting intrusion in the traffic signals of an intelligent traffic system
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Saha, Tapash
Detection of four-node motif in complex networks
- Ning, Zhaolong, Liu, Lei, Yu, Shuo, Xia, Feng
Are you sure you would like to clear your session, including search history and login status?