Filter
Chapter (peer-reviewed)

Search results

  • 2016

    Strategies and practice of cloud-based learning environment implementation

    Masud, A. H. & Huang, X., 2016, Handbook of research on cloud-based STEM education for improved learning outcomes. Chao, L. (ed.). Hershey, PA: IGI Global, p. 42-63 22 p. (Advances in Educational Technologies and Instructional Design (AETID)).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • Student learning processes in classroom and remote laboratory settings

    Treagust, D. F., Carter, D. J., Lindsay, E., Zadnik, M. G., Mocerino, M. & Lucey, A. D., 2016, Science education research and practical work : A collection of invited papers inspired by the 23rd Symposium on Chemistry and Science education held at the TU Dortmund University, MAY 26-28, 2016. Eilks, I., Markic, S. & Ralle, B. (eds.). Germany: Shaker Verlag, p. 49-60 12 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • What next in designing personalized visualization of web information

    Saleheen, S., Lai, W., Huang, X., Huang, W. & Huang, M. L., 2016, Cooperative design, visualization, and engineering: 13th International Conference, CDVE 2016, NSW, Australia, October 24–27, 2016, Proceedings. Luo, Y. (ed.). Switzerland: Springer, p. 134-141 8 p. (Lecture Notes in Computer Science; vol. 9929).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2015

    A Bayesian reweighting technique for small area estimation

    Rahman, A. & Upadhyay, S. K., 2015, Current trends in Bayesian methodology with applications. Singh, U., Loganathan, A., Upadhyay, S. K. & Dey, D. K. (eds.). 1st ed. Boca Raton, USA: CRC Press, p. 503-519 17 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    7 Citations (Scopus)
  • Artificial insect algorithms for routing in wireless sensor systems

    Ang, L-M., Zungeru, A. M., Seng, K. P. & Habibi, D., 2015, Emerging research on Swarm intelligence and algorithm optimization. Shi, Y. & Jioatong, X. (eds.). Hershey, Pennsylvania, USA: IGI Global, p. 191-213 23 p. (Advances in Computational Intelligence and Robotics (ACIR) Book Series).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
    2 Downloads (Pure)
  • Assistive navigation systems for the visually impaired

    Lim, K. L., Yeong, L. S., Seng, K. P. & Ang, L-M., 2015, Encyclopedia of information science and technology. Khosrow-Pour, M. (ed.). 3rd ed. United States: IGI Global, p. 315-327 13 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Downloads (Pure)
  • Automated technology integrations for customer satisfaction assessment

    Ooi, C. S., Seng, K. P. & Ang, L-M., 2015, Handbook of research on managing and influencing consumer behavior. Ruediger Kaufmann, H. (ed.). 1st ed. Hersey, PA: IGI Global, p. 606-620 15 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
    9 Downloads (Pure)
  • Bioclimatic modelling: A machine learning perspective

    Bhattacharya, M., 2015, Innovations and advances in computing, informatics, systems sciences, networking and engineering. Sobh, T. & Elleithy, K. (eds.). 50 ed. Springer-Verlag London Ltd., Vol. 313. p. 413-421 9 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • MIMO antenna design for future 5G wireless communication systems

    Khan, M., Islam, MD. R. & Aziz-ul-Haq, M., 2015, Software engineering, artificial intelligence, networking and parallel / distributed computing 2015. Lee, R. (ed.). Switzerland: Springer, p. 175-183 9 p. (Studies in Computational Intelligence; vol. 653).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)
  • On forensic use of biometrics

    Arbab-Zavar, B., Wei, X., Bustard, J. D., Nixon, M. S. & Li, C-T., 2015, Handbook of digital forensics of multimedia data and devices. Ho, A. T. S. & Li, S. (eds.). West Sussex, UK: Wiley-IEEE Press, p. 1-31 31 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    5 Downloads (Pure)
  • 2014

    SocioPlatform: A platform for social context-aware applications

    Kabir, M. A., Colman, A. & Han, J., 2014, Context in computing: A cross-disciplinary approach for modeling the real world. Brezillon, P. & Gonzalez, A. J. (eds.). Heidelberg, Germany: Springer, p. 291-308 18 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Stereo vision-based object matching, detection, and tracking: A review

    Saifuddin, M., Yeong, L. S., Seng, K. P. & Ang, L-M., 2014, Research developments in Biometrics and video processing techniques. Srivastava, R., Singh, S. K. & Shukla, K. K. (eds.). 1st ed. Hershey, PA: IGI Global, p. 91-117 27 p. (Advances in information security, privacy, and ethics book series; no. 58463).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Technological social inclusion of rural and regional seniors and well-being

    Burmeister, O., 2014, Rural lifestyles, community well-being and social change: Lessons from country Australia for global citizens. Ragusa, A. T. (ed.). Sharjah, UAE: Bentham Science Publishers, p. 338-379 42 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Downloads (Pure)
  • The realization of customer satisfaction with technology integrations

    Ooi, C. S., Seng, K. P. & Ang, L-M., 2014, Cases on consumer-centric marketing management. Jham, V. & Puri, S. (eds.). Hershey, PA: IGI Global, p. 39-52 14 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
    7 Downloads (Pure)
  • Use of information technology in engineering education

    Madhavan, K. & Lindsay, E. D., 2014, Cambridge handbook of engineering education research. Johri, A. & Olds, B. M. (eds.). New York, NY, USA: Cambridge University Press, p. 633-654 22 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    10 Citations (Scopus)
  • 2013

    An efficient attribute-based signature with application to secure attribute-based messaging system

    Yang, P. & Zia, T., 2013, Theory and practice of cryptography solutions for secure information systems. Elci, A., Pieprzyk, J., Chefranov, A., Orgun, M., Wang, H. & Shankaran, R. (eds.). 1st ed. United States: Information Science Reference, p. 159-177 18 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • An improved fingerprinting algorithm for detection of video frame duplication forgery

    Hu, Y., Wang, Y., Li, C. T. & Liu, B. B., 31 May 2013, Emerging digital forensics applications for crime detection, prevention, and security. Li, C-T. (ed.). Hershey, PA: Information Science Reference, p. 64-76 13 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Downloads (Pure)
  • Audio and visual speech recognition recent trends

    Wei, L. H., Seng, K. P. & Ang, L-M., 2013, Intelligent image and video interpretation: Algorithms and applications. Tian, J. & Chen, L. (eds.). Hershey, PA: Information Science Reference, p. 42-86 45 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • Business benefits from keeping codes of ethics up to date

    Bowern, M. & Burmeister, O., 2013, Professionalism in the information and communication technology industry. Weckert, J. & Lucas, R. (eds.). Canberra, Australia: ANU E Press, p. 295-311 17 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    Open Access
    File
    96 Downloads (Pure)
  • Computer vision-aided video coding

    Paul, M. & Lin, W., 2013, Advanced video communications over wireless networks. Zhu, C. & Li, Y. (eds.). Boca Raton, FL: CRC Press, p. 57-84 28 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Downloads (Pure)
  • Correlation mining in graph databases with a new measure

    Samiullah, M., Ahmed, C. F., Nishi, M. A., Fariha, A., Abdullah, S. M. & Islam, MD. R., 2013, Web technologies and applications: 15th Asia-Pacific Web Conference, APWeb 2013, Sydney, Australia, April 4-6, 2013 proceedings . Ishikawa, Y., Li, J., Wang, W., Zhang, R. & Zhang, W. (eds.). Berlin : Springer-Verlag London Ltd., Vol. 7808. p. 88-95 8 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
    7 Downloads (Pure)
  • Exploring timeline-based Malware classification

    Islam, MD. R., Altas, I. & Islam, S., 2013, Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings . Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Germany: Springer, p. 1-13 13 p. (IFIP advances in information and communication technology; vol. 405).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
    6 Downloads (Pure)
  • Implementation of biological inspired components in embedded vision systems

    Ngau, C. W. H., Ang, L-M. & Seng, K. P., 2013, Developing and applying biologically-inspired vision systems: Interdisciplinary concepts. Pomplun, M. & Suzuki, J. (eds.). United States: IGI Global, p. 307-345 39 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • Low complexity minimal instruction set computer design using Anubis cipher for wireless identification and sensing platform

    Kong, J. H., Ang, L. -M. & Seng, KP., 2013, Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Lopez, P. P., Hernandez-Castro, J. C. & Li, T. (eds.). Hershey PA: IGI Global, p. 144-171 28 p. (Premier reference source ).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Security concerns and remedy in a cloud based e-learning system

    Masud, M., Islam, MD. R. & Abawajy, J., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers . Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). United States: Springer, Vol. 127. p. 356-366 11 p. (Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 127).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)
  • 2012

    3D face recognition using an adaptive non uniform face mesh

    Chew, W. J., Seng, K. P. & Ang, L-M., 2012, Depth map and 3D imaging applications : Algorithms and technologies. Malik, A. S., Choi, T. S. & Nisar, H. (eds.). 1st ed. Hershey, Pa.: IGI Global, p. 562-573 12 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Downloads (Pure)
  • A comparative study of malware family classification

    Islam, MD. R. & Altas, I., 2012, Information and communications security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Chim, T. W. & Yuen, T. H. (eds.). Berlin, Germany: Springer, p. 488-496 9 p. (Lecture Notes in Computer Science; vol. 7618).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Citations (Scopus)
  • Audio-visual speech processing for human computer interaction

    Chin, S. W., Seng, K. P. & Ang, L-M., 2012, Advances in robotics and virtual reality. Gulrez, T. & Hassanien, A. E. (eds.). 1 ed. Berlin, Heidelberg: Springer, Vol. 26. p. 135-165 31 p. (Intelligent Systems Reference Library; vol. 26).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    13 Citations (Scopus)
    4 Downloads (Pure)
  • Audio visual system for large scale people authentication and recognition over internet protocol (IP)

    Ch'ng, S. I., Ong, F. T., Seng, K. P. & Ang, L-M., 2012, Information assurance and security technologies for risk assessment and threat management: Advances. Chou, T-S. (ed.). 1st ed. Hershey, PA: IGI Global, p. 183-203 21 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Downloads (Pure)
  • FPGA technology for implementation in visual sensor networks

    Chia, W. C., Ngau, W. H., Ang, L-M., Seng, K. P., Chew, L. W. & Yeong, L. S., 2012, Visual Information processing in wireless sensor networks : Technology, trends, and applications . Ang, L-M. & Seng, K. P. (eds.). 1st ed. Hershey, PA: IGI Global, p. 293-324 32 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Improved energy-efficient ant-based routing algorithm in wireless sensor networks

    Zungeru, A. M., Ang, L-M., Prabaharan, S. R. S. & Seng, K. P., Jan 2012, Wireless sensor networks and energy efficiency: Protocols, routing and management. Zaman, N., Ragab, K. & Abdullah, A. B. (eds.). 1st ed. Hershey, PA: IGI Global, p. 420-444 25 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Citations (Scopus)
  • Labshare: Towards cross-institutional laboratory sharing

    Lowe, D., Conlon, S., Murray, S., Weber, L., de la Villefromoy, M., Lindsay, E., Nafalski, A., Nageswaran, W. & Tang, T., 2012, Internet accessible remote laboratories: Scalable E-Learning tools for engineering and science disciplines. Azad, A. K. M., Auer, M. E. & Harward, V. J. (eds.). Hershey, PA: IGI Global, p. 453-467 15 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    17 Citations (Scopus)
  • Low complexity processor designs for energy-efficient security and error correction in wireless sensor networks

    Kong, J. H., Ong, J. J., Ang, L-M. & Seng, K. P., 2012, Wireless sensor networks and energy efficiency : Protocols, routing, and management . Zaman, N., Ragab, K. & Abdullah, A. B. (eds.). 1 ed. Hershey, PA: IGI Global, p. 348-366 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Radio frequency energy harvesting and management for wireless sensor networks

    Zungeru, A. M., Ang, L-M., Prabaharan, S. & Seng, K. P., 2012, Green mobile devices and networks: Energy optimization and scavenging techniques. Venkataraman, H. & Muntean, G-M. (eds.). Boca Raton, FL: CRC Press, p. 341-367 27 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Downloads (Pure)
  • Starting the revolution: Implementing an identity management architecture

    White, P., 2012, Digital identity and access management: Technologies and frameworks. Gupta, M. G. M. (ed.). Hershey PA: Information Science Reference, p. 148-167 20 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2011

    Designing simulations for professional skill development in distance education: A holistic approach for blended learning

    Murdoch, D., Bushell, C. & Jarratt, S., 2011, Professional education using e-simulations: Benefits of blended learning design. Holt, D., Segrave, S. & Cybulski, J. L. (eds.). 1 ed. United States: IGI Global, p. 121-140 20 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Detecting unwanted email using VAT

    Islam, MD. R. & Chowdhury, M. U., 2011, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011. Lee, R. (ed.). Berlin Heidelberg: Springer, p. 113-126 14 p. (Studies in computational intelligence; vol. 368).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Meta-learning of instance selection for data summarization

    Smith-Miles, K. A. & Islam, MD. R., 2011, Meta-learning in computational intelligence. Norbert, J., Duch, W. & Krzysztof, G. (eds.). Berlin: Springer-Verlag London Ltd., p. 77-95 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
  • 2005

    An Adaptive Two-Dimensional Mesh Refinement Method for the Problems in Fluid Engineering

    Li, Z., 2005, An Adaptive Two-Dimensional Mesh Refinement Method for the Problems in Fluid Engineering. p. 118-123

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • A structural similarity based image fusion algorithm for night vision applications,

    Ul-Haq, A., 2005, A structural similarity based image fusion algorithm for night vision applications,: , In Proc. IEEE International Conference on Systems, Signals and Image Processing.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2004

    Simplifications of An Existing Mass Conservative Streamline Tracking Method for 2D CFD Velocity Fields

    Li, Z., 2004, Simplifications of An Existing Mass Conservative Streamline Tracking Method for 2D CFD Velocity Fields. p. 269-275

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2003

    Fuzzy Calculus by RBF Neural Networks

    Li, Z. & Kecman, V., 2003, Advances in soft computing: Neural Networks and Soft Computing. Rutkowski, L. & Kacprzyk, J. (eds.). Springer Heidelberg, Vol. 19. p. 516-522

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • The Fluid Flow Visualisations Based on Space Curve Theory

    Li, Z., 2003, Curves and Surface Design: Saint-Malo 2002. Nashboro Press, p. 283-291

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2002

    A Linear Genetic Programming Approach for Modelling Electricity Demand Prediction in Victoria

    Bhattacharya, M., Abraham, A. & Nath, B., 2002, Hybrid Information Systems. Abraham, A. & Köppen, M. (eds.). Heidelberg: Physica, Vol. 14. p. 379-393 15 p. (Advances in Soft Computing).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2001

    Genetic Programming: A Review of Some Concerns

    Bhattacharya, M. & Nath, B., 2001, Computational Science. Alexandrov, V. N. . D. J. J., Juliano, B. A., Renner, R. S. & Tan, C. J. K. (eds.). Springer Heidelberg, Vol. 2074. p. 1031 1040 p. (Lecture Notes in Computer Science).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)