DaMRG - Data Mining Research Group

Filter
Chapter (peer-reviewed)

Search results

  • 2021

    Mental health and sensing

    Tushar, A. K., Kabir, A. & Ahmed, S. I., 2021, Signal Processing Techniques for Computational Health Informatics. Ahad, M. A. R. & Ahmed, M. U. (eds.). 1st ed. Springer, p. 247-260 14 p. ( Intelligent Systems Reference Library).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2020

    Associated risk factors for acute malnutrition among rural Bangladeshi children: A cross-sectional analysis

    Rahman, M. A., Rahman, M. S. & Rahman, A., May 2020, Malnutrition: Prevalence, Risk Factors and Outcomes. Rahman, A. (ed.). 1 ed. NY, USA: Nova Science Publishers, Vol. 1. p. 73-93 21 p. (Nutrition and Diet Research Progress).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Comparing machine learning algorithms to predict topic keywords of student comments

    Liu, F., Huang, X. & Huang, W., 16 Oct 2020, Cooperative Design, Visualization, and Engineering. Luo, Y. (ed.). Springer, p. 178-183 6 p. (Lecture Notes in Computer Science; vol. 12341).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • 2018

    Cybersecurity: Timeline malware analysis and classification

    Islam, MD. R., Apr 2018, Information security: Foundations, technologies and applications. Awad, A. I. & Fairhurst, M. (eds.). 1st ed. United Kingdom: Institution of Engineering and Technology (IET), p. 215-239 25 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Image provenance inference through content-based device fingerprint analysis

    Lin, X. & Li, C-T., 2018, Information Security: Foundations, technologies and applications. Awad, A. I. & Fairhurst, M. (eds.). 1st ed. London, United Kingdom: Institution of Engineering and Technology (IET), p. 279-310 (IET security series; vol. 1).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2016

    Strategies and practice of cloud-based learning environment implementation

    Masud, A. H. & Huang, X., 2016, Handbook of research on cloud-based STEM education for improved learning outcomes. Chao, L. (ed.). Hershey, PA: IGI Global, p. 42-63 22 p. (Advances in Educational Technologies and Instructional Design (AETID)).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • What next in designing personalized visualization of web information

    Saleheen, S., Lai, W., Huang, X., Huang, W. & Huang, M. L., 2016, Cooperative design, visualization, and engineering: 13th International Conference, CDVE 2016, NSW, Australia, October 24–27, 2016, Proceedings. Luo, Y. (ed.). Switzerland: Springer, p. 134-141 8 p. (Lecture Notes in Computer Science; vol. 9929).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2015

    A Bayesian reweighting technique for small area estimation

    Rahman, A. & Upadhyay, S. K., 2015, Current trends in Bayesian methodology with applications. Singh, U., Loganathan, A., Upadhyay, S. K. & Dey, D. K. (eds.). 1st ed. Boca Raton, USA: CRC Press, p. 503-519 17 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • MIMO antenna design for future 5G wireless communication systems

    Khan, M., Islam, MD. R. & Aziz-ul-Haq, M., 2015, Software engineering, artificial intelligence, networking and parallel / distributed computing 2015. Lee, R. (ed.). Switzerland: Springer, p. 175-183 9 p. (Studies in Computational Intelligence; vol. 653).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
  • 2014

    SocioPlatform: A platform for social context-aware applications

    Kabir, M. A., Colman, A. & Han, J., 2014, Context in computing: A cross-disciplinary approach for modeling the real world. Brezillon, P. & Gonzalez, A. J. (eds.). Heidelberg, Germany: Springer, p. 291-308 18 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2013

    Correlation mining in graph databases with a new measure

    Samiullah, M., Ahmed, C. F., Nishi, M. A., Fariha, A., Abdullah, S. M. & Islam, MD. R., 2013, Web technologies and applications: 15th Asia-Pacific Web Conference, APWeb 2013, Sydney, Australia, April 4-6, 2013 proceedings . Ishikawa, Y., Li, J., Wang, W., Zhang, R. & Zhang, W. (eds.). Berlin : Springer-Verlag London Ltd., Vol. 7808. p. 88-95 8 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
    7 Downloads (Pure)
  • Exploring timeline-based Malware classification

    Islam, MD. R., Altas, I. & Islam, S., 2013, Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings . Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Germany: Springer, p. 1-13 13 p. (IFIP advances in information and communication technology; vol. 405).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
    6 Downloads (Pure)
  • Security concerns and remedy in a cloud based e-learning system

    Masud, M., Islam, MD. R. & Abawajy, J., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers . Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). United States: Springer, Vol. 127. p. 356-366 11 p. (Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 127).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
  • 2012

    A comparative study of malware family classification

    Islam, MD. R. & Altas, I., 2012, Information and communications security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Chim, T. W. & Yuen, T. H. (eds.). Berlin, Germany: Springer, p. 488-496 9 p. (Lecture Notes in Computer Science; vol. 7618).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    5 Citations (Scopus)
  • 2011

    Detecting unwanted email using VAT

    Islam, MD. R. & Chowdhury, M. U., 2011, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011. Lee, R. (ed.). Berlin Heidelberg: Springer, p. 113-126 14 p. (Studies in computational intelligence; vol. 368).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Meta-learning of instance selection for data summarization

    Smith-Miles, K. A. & Islam, MD. R., 2011, Meta-learning in computational intelligence. Norbert, J., Duch, W. & Krzysztof, G. (eds.). Berlin: Springer-Verlag London Ltd., p. 77-95 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)