Professor Joarder Kamruzzaman
Director, Centre of Smart Analytics (CSA)
Campus
Biography
Professor Joarder Kamruzzaman is Professor of information technology at Federation University Australia. Dr Kamruzzaman’s research interests include sensor networks, Internet of Things, machine learning and cybersecurity.
Joarder has published over 250 peer-reviewed publications, mostly in top-ranked journals and conferences in his field. He has served in leadership capacities for numerous international conferences, and since 2012 has been Editor of the Elsevier Journal of Network and Computer Applications. He was the founding Program Co-Chair of the first International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys), China in 2015.
Joarder has received several prestigious awards for his research, and secured millions of dollars in competitive research funding, including the highly prestigious Australian Research Council grant and Collaborative Research Centre grant.
Joarder obtained his PhD in Information Systems from Muroran Institute of Technology, Japan in 1993.
Find me on
- Publications
Energy Conservation in Passive Optical Networks: A Tutorial and Survey
- Journals
- DOI reference: 10.1109/COMST.2024.3397690
Trustworthiness of IoT Images Leveraging with Other Modal Sensor's Data
- Journals
- DOI reference: 10.1109/JIOT.2024.3459477
Enhancing IoT security: Assessing instantaneous communication trust to detect man-in-the-middle attacks
- Journals
- DOI reference: 10.1016/j.future.2025.107714
Cross-Domain Fake News Detection Through Fusion of Evidence from Multiple Social Media Platforms
- Journals
- DOI reference: 10.3390/fi17020061
An Approach to Determine Cluster in Tensor-Based K-Means Clustering for Disease Diagnosis
- Conference Proceedings
- DOI reference: 10.1007/978-981-96-6960-8_20
Secure Electric Vehicle Charging Infrastructure in Smart Cities: A Blockchain-Based Smart Contract Approach
- Journals
- DOI reference: 10.3390/smartcities8010033
Tensor Mutual Information for Similarity Measurement of High-Dimensional Data: An Image Classification Perspective
- Conference Proceedings
- DOI reference: 10.1007/978-981-96-6606-5_19
International Conference on Maintenance and Intelligent Asset Management: December 2023: Peer Reviewed Conference Papers
Life Cycle Cost Modelling and Analysis for life extension decisions of long-life assets with limited data
A novel soft gripper for baby broccoli robotic harvesting
- Journals
- DOI reference: 10.1016/j.atech.2025.101303
Regional-Level Disaggregation of EV Uptake Energy Consumption using Bottom-up Approach
- Journals
- DOI reference: 10.1109/TTE.2025.3609147
A Temporal Deep Q Learning for Optimal Load Balancing in Software-Defined Networks
- Journals
- DOI reference: 10.3390/s24041216
Special Section Guest Editorial: Real-Time Image Steganography and Steganalysis
- Journals
- DOI reference: 10.1117/1.JEI.33.1.011001
Weighted Rank Difference Ensemble: A New Form of Ensemble Feature Selection Method for Medical Datasets
- Journals
- DOI reference: 10.3390/biomedinformatics4010027
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
- Journals
- DOI reference: 10.1145/3627536
Enhancing Telemarketing Success Using Ensemble-Based Online Machine Learning
- Journals
- DOI reference: 10.26599/BDMA.2023.9020041
Wireless Underground Sensor Communication Using Acoustic Technology
- Journals
- DOI reference: 10.3390/s24103113
A Novel Dataset for Baby Broccoli Identification by using YOLOv8 Model
- Conference Proceedings
- DOI reference: 10.1109/ISIE54533.2024.10595795
Work-in-Progress Paper: Synergizing YOLOv8 and PCA for Size Estimation of Baby Broccoli
- Conference Proceedings
- DOI reference: 10.1109/ISIE54533.2024.10595693
Device Identification Method for Internet of Things Based on Spatial-Temporal Feature Residuals
- Journals
- DOI reference: 10.1109/TSC.2024.3440013
Task offloading strategies for mobile edge computing: A survey
- Journals
- DOI reference: 10.1016/j.comnet.2024.110791
Large Language Models and Sentiment Analysis in Financial Markets: A Review, Datasets, and Case Study
- Journals
- DOI reference: 10.1109/ACCESS.2024.3445413
An Evidence Theoretic Approach for Traffic Signal Intrusion Detection
- Journals
- DOI reference: 10.3390/s23104646
Quantum Particle Swarm Optimization for Task Offloading in Mobile Edge Computing
- Journals
- DOI reference: 10.1109/TII.2022.3225313
A Novel Dynamic Software-Defined Networking Approach to Neutralize Traffic Burst
- Journals
- DOI reference: 10.3390/computers12070131
REER-H: A Reliable Energy Efficient Routing Protocol for Maritime Intelligent Transportation Systems
- Journals
- DOI reference: 10.1109/TITS.2023.3293155
Cancer Classification Utilizing Voting Classifier with Ensemble Feature Selection Method and Transcriptomic Data
- Journals
- DOI reference: 10.3390/genes14091802
Applications of Machine Learning and Deep Learning in Antenna Design, Optimization and Selection: A Review
- Journals
- DOI reference: 10.1109/ACCESS.2023.3317371
Deep Learning and Federated Learning for Screening COVID-19: A Review
- Journals
- DOI reference: 10.3390/biomedinformatics3030045
Decentralized content sharing in mobile ad-hoc networks: A survey
- Journals
- DOI reference: 10.1016/j.dcan.2022.07.002
UDTN-RS: a New Underwater Delay Tolerant Network Routing Protocol for Coastal Patrol and Surveillance
- Journals
- DOI reference: 10.1109/ACCESS.2023.3334638
Blockchain technology and application: an overview
- Journals
- DOI reference: 10.7717/peerj-cs.1705
Process Reliability Analysis Applied for Continual Improvement of Large-Scale Alumina Refineries
- Conference Proceedings
- DOI reference: 10.1007/978-3-031-39619-9_49
Software-Defined Access Control in Smart Grids
- Conference Proceedings
- DOI reference: 10.1109/AUPEC59354.2023.10502520
Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G
- Conference Proceedings
- DOI reference: 10.1007/978-981-99-7032-2_12
Detecting Fake News of Evolving Events using Machine Learning: Case of Russia-Ukraine War
Detecting Fake News of Evolving Events using Machine Learning: Case of Russia-Ukraine War
RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment
- Journals
- DOI reference: 10.1186/s42400-022-00136-7
Security of Internet of Things Devices: Ethical Hacking a Drone and its Mitigation Strategies
- Conference Proceedings
- DOI reference: 10.1109/CSDE56538.2022.10089255
False Data Detection in a Clustered Smart Grid Using Unscented Kalman Filter
- Journals
- DOI reference: 10.1109/ACCESS.2022.3193781
Failure analysis of Slurry Pump assets in refinery for reduction of risks and costs
- Conference Proceedings
- DOI reference: 10.1109/ICMIAM56779.2022.10146963
Identification of Fake News: A Semantic Driven Technique for Transfer Domain
- Conference Proceedings
- DOI reference: 10.1007/978-981-99-1645-0_47
A Low-Level Hybrid Intrusion Detection System Based on Hardware Performance Counters
- Book Chapters
- DOI reference: 10.1201/9781003194538-9
Measuring Trustworthiness of Smart Meters Leveraging Household Energy Consumption Profile
- Journals
- DOI reference: 10.1109/JESTIE.2022.3144966
Vulnerability Assessment framework for a Smart Grid
- Conference Proceedings
- DOI reference: 10.1109/GPECOM55404.2022.9815621
Spam Email Categorization with NLP and Using Federated Deep Learning
- Conference Proceedings
- DOI reference: 10.1007/978-3-031-22137-8_2
Cyber Resilience Modelling for the Operations of Hybrid Network
- Conference Proceedings
- DOI reference: 10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9928023
Fuzzy-Based Operational Resilience Modelling
- Conference Proceedings
- DOI reference: 10.1109/DSAA54385.2022.10032400
Iris feature extraction using three-level Haar wavelet transform and modified local binary pattern
- Book Chapters
- DOI reference: 10.1016/B978-0-12-823978-0.00005-8
A tree-based stacking ensemble technique with feature selection for network intrusion detection
- Journals
- DOI reference: 10.1007/s10489-021-02968-1
Sensitivity Analysis for Vulnerability Mitigation in Hybrid Networks
- Journals
- DOI reference: 10.3390/electronics11020238
Remote reconfiguration of FPGA-based wireless sensor nodes for flexible Internet of Things
- Journals
- DOI reference: 10.1016/j.compeleceng.2022.107935
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications
- Journals
- DOI reference: 10.1016/j.cose.2022.102783
Green Underwater Wireless Communications Using Hybrid Optical-Acoustic Technologies
- Journals
- DOI reference: 10.1109/ACCESS.2021.3088467
A novel ofdm format and a machine learning based dimming control for lifi
- Journals
- DOI reference: 10.3390/electronics10172103
State estimation within ied based smart grid using kalman estimates
- Journals
- DOI reference: 10.3390/electronics10151783
Assessing Reliability of Smart Grid Against Cyberattacks using Stability Index
- Conference Proceedings
- DOI reference: 10.1109/AUPEC52110.2021.9597708
Churn Prediction in Telecom Industry using Machine Learning Ensembles with Class Balancing
- Conference Proceedings
- DOI reference: 10.1109/CSDE53843.2021.9718498
Malware detection in edge devices with fuzzy oversampling and dynamic class weighting
- Journals
- DOI reference: 10.1016/j.asoc.2021.107783
Trustworthiness of Self-Driving Vehicles for Intelligent Transportation Systems in Industry Applications
- Journals
- DOI reference: 10.1109/TII.2020.2987431
How Much i Can Rely on You: Measuring Trustworthiness of a Twitter User
- Journals
- DOI reference: 10.1109/TDSC.2019.2929782
Editorial to special issue on resource management for edge intelligence
- Journals
- DOI reference: 10.1016/j.sysarc.2021.102186
Assessing Trust Level of a Driverless Car Using Deep Learning
- Journals
- DOI reference: 10.1109/TITS.2021.3059261
A Smart Priority-Based Traffic Control System for Emergency Vehicles
- Journals
- DOI reference: 10.1109/JSEN.2020.3023149
Attacks on self-driving cars and their countermeasures: A survey
- Journals
- DOI reference: 10.1109/ACCESS.2020.3037705
A machine learning approach for prediction of pregnancy outcome following IVF treatment
- Journals
- DOI reference: 10.1007/s00521-018-3693-9
Robust Malware Defense in Industrial IoT Applications Using Machine Learning with Selective Adversarial Samples
- Journals
- DOI reference: 10.1109/TIA.2019.2958530
Vulnerability Modelling for Hybrid Industrial Control System Networks
- Journals
- DOI reference: 10.1007/s10723-020-09528-w
Cyberattacks detection in iot-based smart city applications using machine learning techniques
- Journals
- DOI reference: 10.3390/ijerph17249347
Low-Power Wide-Area Networks: Design Goals, Architecture, Suitability to Use Cases and Research Challenges
- Journals
- DOI reference: 10.1109/ACCESS.2020.2968057
Friendly Jammer against an Adaptive Eavesdropper in a Relay-aided Network
- Conference Proceedings
- DOI reference: 10.1109/IWCMC48107.2020.9148476
A robust forgery detection method for copy–move and splicing attacks in images
- Journals
- DOI reference: 10.3390/electronics9091500
A Survey on Behavioral Pattern Mining from Sensor Data in Internet of Things
- Journals
- DOI reference: 10.1109/ACCESS.2020.2974035
Mobile malware detection with imbalanced data using a novel synthetic oversampling strategy and deep learning
- Conference Proceedings
- DOI reference: 10.1109/WiMob50308.2020.9253433
API Based Discrimination of Ransomware and Benign Cryptographic Programs
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-63833-7_15
State Estimation in the Presence of Cyber Attacks Using Distributed Partition Technique
Performance Enhancement of Intrusion detection System Using Bagging Ensemble Technique with Feature Selection
- Conference Proceedings
- DOI reference: 10.1109/CSDE50874.2020.9411608
Cyber Attacks Detection from Smart City Applications Using Artificial Neural Network
- Conference Proceedings
- DOI reference: 10.1109/CSDE50874.2020.9411606
IoT Sensor Numerical Data Trust Model Using Temporal Correlation
- Journals
- DOI reference: 10.1109/JIOT.2019.2957201
A survey on context awareness in big data analytics for business applications
- Journals
- DOI reference: 10.1007/s10115-020-01462-3
Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone
- Journals
- DOI reference: 10.1016/j.jnca.2020.102698
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Journals
- DOI reference: 10.3390/electronics9010173
One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features
- Conference Proceedings
- DOI reference: 10.1109/TrustCom/BigDataSE.2019.00108
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Journals
- DOI reference: 10.3390/electronics8111210
Measuring trustworthiness of IoT image sensor data using other sensors' complementary multimodal data
- Conference Proceedings
- DOI reference: 10.1109/TrustCom/BigDataSE.2019.00112
Trusted autonomous vehicle: Measuring trust using on-board unit data
- Conference Proceedings
- DOI reference: 10.1109/TrustCom/BigDataSE.2019.00114
Selective adversarial learning for mobile malware
- Conference Proceedings
- DOI reference: 10.1109/TrustCom/BigDataSE.2019.00044
Enhancing branch predictors using genetic algorithm
- Conference Proceedings
- DOI reference: 10.1109/ICMSAO.2019.8880435
Generative malware outbreak detection
- Conference Proceedings
- DOI reference: 10.1109/ICIT.2019.8754939
Mobile malware detection: An analysis of deep learning model
- Conference Proceedings
- DOI reference: 10.1109/ICIT.2019.8755048
Vulnerability modelling for hybrid IT systems
- Conference Proceedings
- DOI reference: 10.1109/ICIT.2019.8755005
Survey of intrusion detection systems:techniques, datasets and challenges
- Journals
- DOI reference: 10.1186/s42400-019-0038-7
An efficient RANSAC hypothesis evaluation using sufficient statistics for RGB-D pose estimation
- Journals
- DOI reference: 10.1007/s10514-018-9801-y
Opinion Formation in Online Social Networks: Exploiting Predisposition, Interaction, and Credibility
- Journals
- DOI reference: 10.1109/TCSS.2019.2914264
A dynamic content distribution scheme for decentralized sharing in tourist hotspots
- Journals
- DOI reference: 10.1016/j.jnca.2018.12.011
Sliding Window-based Regularly Frequent Patterns Mining over Sensor Data Streams
- Conference Proceedings
- DOI reference: 10.1109/CSDE48274.2019.9162413
Assessing transformer oil quality using deep convolutional networks
- Conference Proceedings
- DOI reference: 10.1109/AUPEC48547.2019.211896
Instruction Cognitive One-Shot Malware Outbreak Detection
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-36808-1_84
The Co-Evolution of Cloud and IoT Applications: Recent and Future Trends
- Book Chapters
- DOI reference: 10.4018/978-1-5225-7335-7.ch011
Passive detection of splicing and copy-move attacks in image forgery
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-04212-7_49
Influence of clustering on the opinion formation dynamics in online social networks
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-04224-0_13
Mobile malware detection - An analysis of the impact of feature categories
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-04212-7_43
Detecting Splicing and Copy-Move Attacks in Color Images
- Conference Proceedings
- DOI reference: 10.1109/DICTA.2018.8615874
Acoustic sensor networks in the Internet of Things applications
- Journals
- DOI reference: 10.1016/j.future.2018.05.019
Significance level of a big data query by exploiting business processes and strategies
Detecting intrusion in the traffic signals of an intelligent traffic system
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-01950-1_41
Breast Density Classification for Cancer Detection Using DCT-PCA Feature Extraction and Classifier Ensemble
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-76348-4_68
Modelling majority and expert influences on opinion formation in online social networks
- Journals
- DOI reference: 10.1007/s11280-017-0484-7
An efficient data delivery mechanism for AUV-based Ad hoc UASNs
- Journals
- DOI reference: 10.1016/j.future.2017.10.025
Survey of recent cyber security attacks on robotic systems and their mitigation approaches
- Book Chapters
- DOI reference: 10.4018/978-1-5225-2154-9.ch019
Dynamic content distribution for decentralized sharing in tourist spots using demand and supply
- Conference Proceedings
- DOI reference: 10.1109/IWCMC.2017.7986611
Periodic associated sensor patterns mining from wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-70139-4_25
A rule based inference model to establish strategy-process relationship
Exploiting Evolving Trust Relationships in the Modelling of Opinion Formation Dynamics in Online Social Networks
- Conference Proceedings
- DOI reference: 10.1109/AINA.2017.140
Impact of friendly jammers on secrecy multicast capacity in presence of adaptive eavesdroppers
- Conference Proceedings
- DOI reference: 10.1109/GLOCOMW.2017.8269226
Dependable large scale behavioral patterns mining from sensor data using Hadoop platform
- Journals
- DOI reference: 10.1016/j.ins.2016.06.036
Decentralized content sharing among tourists in visiting hotspots
- Journals
- DOI reference: 10.1016/j.jnca.2016.11.010
Exclusive Use Spectrum Access Trading Models in Cognitive Radio Networks: A Survey
- Journals
- DOI reference: 10.1109/COMST.2017.2725960
Gene Selection and Classification of Human Lymphoma from Microarray Data
- Conference Proceedings
- DOI reference: 10.1007/11573067_38
An architecture combining Bayesian segmentation and neural network ensembles for protein secondary structure prediction
- Conference Proceedings
- DOI reference: 10.1109/cibcb.2005.1594960
PRADD: A path reliability-aware data delivery protocol for underwater acoustic sensor networks
- Journals
- DOI reference: 10.1016/j.jnca.2015.11.021
Who are convincing? An experience based opinion formation dynamics in online social networks
Object analysis with visual sensors and RFID
- Book Chapters
- DOI reference: 10.4018/978-1-4666-3994-2.ch073
Wireless sensor network protocols applicable to RFID system
- Book Chapters
- DOI reference: 10.4018/978-1-4666-1616-5.ch013
Security and privacy in RFID systems
- Book Chapters
- DOI reference: 10.4018/978-1-4666-2080-3.ch002
Hidden Markov models Incorporating fuzzy measures and integrals for protein sequence identification and alignment
- Journals
- DOI reference: 10.1016/S1672-0229(08)60025-X
Combining segmental semi-Markov models with neural networks for protein secondary structure prediction
Predicting protein protein interfaces as clusters of Optimal Docking Area points
An environment-aware mobility model for wireless ad hoc network
- Journals
- DOI reference: 10.1016/j.comnet.2009.12.005
A hybrid of multiobjective Evolutionary Algorithm and HMM-Fuzzy model for time series prediction
- Journals
- DOI reference: 10.1016/j.neucom.2011.09.012
Inchoate Fault Detection Framework: Adaptive Selection of Wavelet Nodes and Cumulant Orders
- Journals
- DOI reference: 10.1109/TIM.2011.2172112
Application of artificial intelligence to improve quality of service in computer networks
- Journals
- DOI reference: 10.1007/s00521-011-0622-6
Energy-Balanced Transmission Policies for Wireless Sensor Networks
- Journals
- DOI reference: 10.1109/TMC.2010.238
Machine health monitoring based on stationary wavelet transform and fourth-order cumulants
- Journals
- DOI reference: 10.7158/E10-860.2012.9.1
Multi-step support vector regression and optimally parameterized wavelet packet transform for machine residual life prediction
- Journals
- DOI reference: 10.1177/1077546311435349
A HMM-based adaptive fuzzy inference system for stock market forecasting
- Journals
- DOI reference: 10.1016/j.neucom.2012.09.017
Social-connectivity-aware vertical handover for heterogeneous wireless networks
- Journals
- DOI reference: 10.1016/j.jnca.2013.01.010
Weighted soft decision for cooperative sensing in cognitive radio networks
Asynchronous variable hop size transmission with stochastic data model for sensor networks
A framework for collaborative multi class heterogeneous wireless sensor networks
Energy efficient and hop constraint intra-cluster transmission for heterogeneous sensor networks
Carry me if you can: A utility based forwarding scheme for content sharing in tourist destinations
- Conference Proceedings
- DOI reference: 10.1109/APCC.2016.7581432
Performance analysis of m-retry BEB based DCF under unsaturated traffic condition
- Conference Proceedings
- DOI reference: 10.1109/WCNC.2010.5506236
Voice over multi-channel multi-radio WLANs with power capture and imperfect channel
- Conference Proceedings
- DOI reference: 10.1109/WCNC.2010.5506561
LACAR: Location aided congestion aware routing in wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/WCNC.2010.5506713
VoIP service over multihop 802.11 networks with power capture and channel noise
- Conference Proceedings
- DOI reference: 10.1109/ICC.2010.5502139
Agile spectrum evacuation in cognitive radio networks
- Conference Proceedings
- DOI reference: 10.1109/ICC.2010.5502711
CAM: Congestion avoidance and mitigation in wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/VETECS.2010.5494190
Efficient utilization of WLAN networks in the next-generation heterogeneous environments
- Conference Proceedings
- DOI reference: 10.1109/HPCC.2010.57
Diversified adaptive frequency rolling to mitigate self and static interferences
- Conference Proceedings
- DOI reference: 10.1109/HPCC.2010.59
Coexistence mechanism for industrial automation network
- Conference Proceedings
- DOI reference: 10.1109/HPCC.2010.58
A contender-aware backoff algorithm for CSMA based MAC protocol for wireless sensor network
- Conference Proceedings
- DOI reference: 10.1109/APCC.2010.5679777
Performance analysis of PCF based WLANs with imperfect channel and failure retries
- Conference Proceedings
- DOI reference: 10.1109/GLOCOM.2010.5684268
QoS-centric collision window shaping for CSMA-CA MAC protocol
- Conference Proceedings
- DOI reference: 10.1109/GLOCOM.2010.5684236
Increasing voice capacity over IEEE 802.11 WLAN using virtual access points
- Conference Proceedings
- DOI reference: 10.1109/GLOCOM.2010.5683542
Query processing over distributed heterogeneous sensor networks in Future Internet: Scalable architecture and challenges
- Conference Proceedings
- DOI reference: 10.1109/AFIN.2010.21
QoS support in event detection in WSN through optimal k-coverage
- Conference Proceedings
- DOI reference: 10.1016/j.procs.2011.04.052
Dynamic dwell timer for hybrid vertical handover in 4G coupled networks
- Conference Proceedings
- DOI reference: 10.1109/VETECS.2011.5956636
A new resource distribution model for improved QoS in an integrated WiMAX/WiFi architecture
- Conference Proceedings
- DOI reference: 10.1109/IWCMC.2011.5982544
Maximizing the concurrent transmissions in cognitive radio ad hoc networks
- Conference Proceedings
- DOI reference: 10.1109/IWCMC.2011.5982578
Dynamic sensor selection for target tracking in wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/VETECF.2011.6092942
Severity invariant machine fault diagnosis
- Conference Proceedings
- DOI reference: 10.1109/ICIEA.2011.5975544
Cross layer modeling of contention-based MAC and deterministic routing protocols in multi-hop WSNs
- Conference Proceedings
- DOI reference: 10.1109/ICOIN.2011.5723137
CODAR: Congestion and delay aware routing to detect time critical events in WSNs
- Conference Proceedings
- DOI reference: 10.1109/ICOIN.2011.5723128
Hybrid in-network query processing framework for wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/icc.2011.5962797
Spectrum allocation framework for multiuser cognitive radio systems
- Conference Proceedings
- DOI reference: 10.1109/icc.2011.5962448
Dynamic resource allocation for improved QoS in WiMAX/WiFi integration
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-22288-7_12
Dynamic bandwidth access to cognitive radio ad hoc networks through pricing modeling
- Conference Proceedings
- DOI reference: 10.1109/APCC.2011.6152751
Dual-channel based energy efficient event clustering and data gathering in WSNs
- Conference Proceedings
- DOI reference: 10.1109/APCC.2011.6152812
I-MAC: Energy efficient intelligent MAC protocol for wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/APCC.2011.6152792
Resonant frequency band estimation using adaptive wavelet decomposition level selection
- Conference Proceedings
- DOI reference: 10.1109/ICMA.2011.5985687
Machine fault severity estimation based on adaptive wavelet nodes selection and SVM
- Conference Proceedings
- DOI reference: 10.1109/ICMA.2011.5986279
Dynamic event coverage in hybrid wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/NCA.2011.62
Quality adjustable query processing framework for wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/NCA.2011.63
Optimally parameterized wavelet packet transform for machine residual life prediction
Envelope-wavelet packet transform for machine condition monitoring
Multiple-points fault signature's dynamics modeling for bearing defect frequencies
Optimally parameterized wavelet packet transform for incipient machine fault diagnosis
Delay-aware query routing tree for wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/NCA.2012.39
Realistic pricing modeling for dynamic spectrum access network
- Conference Proceedings
- DOI reference: 10.1109/ICC.2012.6363924
Priority sensitive event detection in hybrid wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/ICCCN.2012.6289220
Dynamic sensors collaboration to balance the accuracy-lifetime trade-off in multiple-target tracking
- Conference Proceedings
- DOI reference: 10.1109/PIMRC.2012.6362870
Dynamic clusters graph for detecting moving targets using WSNs
- Conference Proceedings
- DOI reference: 10.1109/VTCFall.2012.6399265
Dynamic sensors selection for overlapped multiple-target tracking using eagerness
- Conference Proceedings
- DOI reference: 10.1109/VTCFall.2012.6399266
A novel vertical handover scheme for diminution in social network traffic
- Conference Proceedings
- DOI reference: 10.1109/WCNC.2012.6214216
Impact characterization of multiple-points-defect on machine fault diagnosis
- Conference Proceedings
- DOI reference: 10.1109/CoASE.2012.6386411
Regularly frequent patterns mining from sensor data stream
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-42042-9_52
Mining associated sensor patterns for data stream of wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1145/2512840.2512853
ACSP-tree: A tree structure for mining behavioral patterns from wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/LCN.2013.6761312
Hierarchical adaptive location service protocol for mobile ad hoc network
An Adaptive Self-Configuration Scheme for Severity Invariant Machine Fault Diagnosis
- Journals
- DOI reference: 10.1109/TR.2012.2222612
Abrasion Modeling of Multiple-Point Defect Dynamics for Machine Condition Monitoring
- Journals
- DOI reference: 10.1109/TR.2013.2241231
Self and static interference mitigation scheme for coexisting wireless networks
- Journals
- DOI reference: 10.1016/j.compeleceng.2013.04.007
An Analytical Approach for Voice Capacity Estimation Over WiFi Network Using ITU-T E-Model
- Journals
- DOI reference: 10.1109/TMM.2013.2291212
Reputation and User Requirement Based Price Modeling for Dynamic Spectrum Access
- Journals
- DOI reference: 10.1109/TMC.2013.78
An opportunistic message forwarding protocol for underwater acoustic sensor networks
- Conference Proceedings
- DOI reference: 10.1109/APCC.2013.6765937
An intelligent model to control preemption rate of instantaneous request calls in networks with book- ahead reservation
- Conference Proceedings
- DOI reference: 10.1109/ATNAC.2008.4783348
A technique for parallel share-frequent sensor pattern mining from wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1016/j.procs.2014.05.012
A novel algorithm for mining behavioral patterns from wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2014.6889737
MPDF: Movement predicted data forwarding protocol for Underwater Acoustic Sensor Networks
- Conference Proceedings
- DOI reference: 10.1109/APCC.2014.7091613
An adaptive approach to opportunistic data forwarding in underwater acoustic sensor networks
- Conference Proceedings
- DOI reference: 10.1109/NCA.2014.41
Dynamic adjustment of sensing range for event coverage in wireless sensor networks
- Journals
- DOI reference: 10.1016/j.jnca.2014.07.025
A comprehensive spectrum trading scheme based on market competition, reputation and buyer specific requirements
- Journals
- DOI reference: 10.1016/j.comnet.2015.04.004
An efficient data extraction framework for mining wireless sensor networks
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-46675-0_54
Distinctive Phenotype Identification for Breast Cancer Genotypes Among Hereditary Breast Cancer Mutated Genes
- Journals
- DOI reference: 10.2174/157489361001150309121435
Mining Associated Patterns from Wireless Sensor Networks
- Journals
- DOI reference: 10.1109/TC.2014.2349515
Consistency driven opinion formation modelling in presence of external sources
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2015.7280844
Opinion formation dynamics under the combined influences of majority and experts
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-26555-1_76
Search and tracking algorithms for swarms of robots: A survey
- Journals
- DOI reference: 10.1016/j.robot.2015.08.010
Share-Frequent Sensor Patterns Mining from Wireless Sensor Network Data
- Journals
- DOI reference: 10.1109/TPDS.2014.2377713
A new convergence rate estimation of general artificial immune algorithm
- Journals
- DOI reference: 10.3233/IFS-151559
Modeling multiuser spectrum allocation for cognitive radio networks
- Journals
- DOI reference: 10.1016/j.compeleceng.2015.10.006
A data mining approach for machine fault diagnosis based on associated frequency patterns
- Journals
- DOI reference: 10.1007/s10489-016-0781-3
Content sharing among visitors with irregular movement patterns in visiting hotspots
- Conference Proceedings
- DOI reference: 10.1109/NCA.2015.16
Business context in big data analytics
- Conference Proceedings
- DOI reference: 10.1109/ICICS.2015.7459846
A mapreduce based technique for mining behavioral patterns from sensor data
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-26561-2_18
An efficient pose estimation for limited-resourced MAVs using sufficient statistics
- Conference Proceedings
- DOI reference: 10.1109/IROS.2015.7353900
Condition monitoring through mining fault frequency from machine vibration data
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2015.7280569
Content exchange among mobile tourists using users' interest and place-centric activities
- Conference Proceedings
- DOI reference: 10.1109/ICICS.2015.7459881
Sensor selection for tracking multiple groups of targets
- Journals
- DOI reference: 10.1016/j.jnca.2014.07.023
Guest editorial- Journal of Networks Vol 7
- Journals
- DOI reference: 10.4304/jnw.7.12.1909-1911
Forecasting of currency exchange rates using ANN: A case study
- Conference Proceedings
- DOI reference: 10.1109/ICNNSP.2003.1279395
Guest editorial-Journal of Networks Vol 7
- Journals
- DOI reference: 10.4304/jnw.7.3.409-411
Evaluation of fuzzy measures in profile hidden Markov models for protein sequences
- Conference Proceedings
- DOI reference: 10.1007/11573067_36
An incremental constructive layer neural network based power system stabiliser
Guest editorial - Journal of Networks Vol 6
- Journals
- DOI reference: 10.4304/jnw.6.1.1-3
Support vector machines and other pattern recognition approaches to the diagnosis of cerebral palsy gait
- Journals
- DOI reference: 10.1109/TBME.2006.883697
Bayesian segmentation using residue proximity for secondary structure and contact prediction
- Conference Proceedings
- DOI reference: 10.1109/CIBCB.2006.331015
Reactive load control of parallel transformer operations using neural networks
- Journals
- DOI reference: 10.1007/3-540-48035-8_79
Fuzzy profile Hidden Markov models for protein sequence analysis
- Conference Proceedings
- DOI reference: 10.1109/cibcb.2005.1594950
