Data Science Research Unit

Filter
Chapter (peer-reviewed)

Search results

  • 2015

    Serious games and gaming

    Bossomaier, T., 2015, Digital games and mathematics learning: Potential, promises and pitfalls. Lowrie, T. & Jorgensen, R. (eds.). 1st ed. Netherlands: Springer-Verlag London Ltd., p. 201-232 32 p. (Mathematics education in the digital era; vol. 4).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • The role of serious games in robot exoskeleton-assisted rehabilitation of stroke patients

    Cornforth, D. J., Koenig, A., Riener, R., August, K., Khandoker, A. H., Karmakar, C., Palaniswami, M. & Jelinek, H., 2015, Serious games analytics: Methodologies for performance measurement, assessment, and improvement. Sheng, Y., Ifenthaler, D. & Loh, C. S. (eds.). 1st ed. Switzerland: Springer, p. 233-254 22 p. ( Advances in game-based learning; no. 73893).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    7 Citations (Scopus)
  • 2014

    SocioPlatform: A platform for social context-aware applications

    Kabir, M. A., Colman, A. & Han, J., 2014, Context in computing: A cross-disciplinary approach for modeling the real world. Brezillon, P. & Gonzalez, A. J. (eds.). Heidelberg, Germany: Springer, p. 291-308 18 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Technological social inclusion of rural and regional seniors and well-being

    Burmeister, O., 2014, Rural lifestyles, community well-being and social change: Lessons from country Australia for global citizens. Ragusa, A. T. (ed.). Sharjah, UAE: Bentham Science Publishers, p. 338-379 42 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Downloads (Pure)
  • 2013

    An efficient attribute-based signature with application to secure attribute-based messaging system

    Yang, P. & Zia, T., 2013, Theory and practice of cryptography solutions for secure information systems. Elci, A., Pieprzyk, J., Chefranov, A., Orgun, M., Wang, H. & Shankaran, R. (eds.). 1st ed. United States: Information Science Reference, p. 159-177 18 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
  • Box-counting and multifractal analysis in neuronal and glial classification

    Jelinek, H., Milosevic, N. T., Karperien, A. & Krstonosic, B., 2013, Advances in intelligent control systems and computer science. Dumitrache, I. (ed.). Berlin: Springer-Verlag London Ltd., p. 177-189 13 p. (Advances in Intelligent Systems and Computing; vol. 187).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    12 Citations (Scopus)
  • Business benefits from keeping codes of ethics up to date

    Bowern, M. & Burmeister, O., 2013, Professionalism in the information and communication technology industry. Weckert, J. & Lucas, R. (eds.). Canberra, Australia: ANU E Press, p. 295-311 17 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    Open Access
    File
    113 Downloads (Pure)
  • Computer vision-aided video coding

    Paul, M. & Lin, W., 2013, Advanced video communications over wireless networks. Zhu, C. & Li, Y. (eds.). Boca Raton, FL: CRC Press, p. 57-84 28 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Downloads (Pure)
  • Correlation mining in graph databases with a new measure

    Samiullah, M., Ahmed, C. F., Nishi, M. A., Fariha, A., Abdullah, S. M. & Islam, MD. R., 2013, Web technologies and applications: 15th Asia-Pacific Web Conference, APWeb 2013, Sydney, Australia, April 4-6, 2013 proceedings . Ishikawa, Y., Li, J., Wang, W., Zhang, R. & Zhang, W. (eds.). Berlin : Springer-Verlag London Ltd., Vol. 7808. p. 88-95 8 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
    7 Downloads (Pure)
  • Exploring timeline-based Malware classification

    Islam, MD. R., Altas, I. & Islam, S., 2013, Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings . Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Germany: Springer, p. 1-13 13 p. (IFIP advances in information and communication technology; vol. 405).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
    6 Downloads (Pure)
  • Retinopathy of prematurity: Fractal analysis of images in different stages of the disease

    Milosevic, N. T., Olujic, M., Oros, A. & Jelinek, H., 2013, Advances in intelligent control systems and computer science. Dumitrache, I. (ed.). Berlin, Heidelberg: Springer-Verlag London Ltd., p. 91-100 10 p. (Advances in intelligent systems and computing; vol. 187).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
  • Security concerns and remedy in a cloud based e-learning system

    Masud, M., Islam, MD. R. & Abawajy, J., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers . Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). United States: Springer, Vol. 127. p. 356-366 11 p. (Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 127).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)
  • 2012

    A comparative study of malware family classification

    Islam, MD. R. & Altas, I., 2012, Information and communications security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Chim, T. W. & Yuen, T. H. (eds.). Berlin, Germany: Springer, p. 488-496 9 p. (Lecture Notes in Computer Science; vol. 7618).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Citations (Scopus)
  • Fractal analysis in clinical screening and investigation

    Jelinek, H. & Cornforth, D., 2012, Classification and application of fractals: New research. Mitchell, E. W. & Murray, S. R. (eds.). 1 ed. New York: Nova Publishers, p. 277-301 25 p. (Mathematics research developments ).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • Image processing in the analysis of neuronal dentritic branching patterns: Does structure follow function across different species?

    Jelinek, H., Milosevic, N. T., Ristanovic, D. & Cornforth, D., Sept 2012, Image processing: Methods, applications and challenges. Carvalho, V. H. (ed.). Hauppauge, N.Y: Nova Science Publishers, p. 163-178 16 p. (Computer science, technology and applications).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Starting the revolution: Implementing an identity management architecture

    White, P., 2012, Digital identity and access management: Technologies and frameworks. Gupta, M. G. M. (ed.). Hershey PA: Information Science Reference, p. 148-167 20 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2011

    Detecting unwanted email using VAT

    Islam, MD. R. & Chowdhury, M. U., 2011, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011. Lee, R. (ed.). Berlin Heidelberg: Springer, p. 113-126 14 p. (Studies in computational intelligence; vol. 368).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Meta-learning of instance selection for data summarization

    Smith-Miles, K. A. & Islam, MD. R., 2011, Meta-learning in computational intelligence. Norbert, J., Duch, W. & Krzysztof, G. (eds.). Berlin: Springer-Verlag London Ltd., p. 77-95 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
  • Monofractal and multifractal analysis for interpretation of function-structure relationships in finite size biological material

    Cornforth, D. J. & Jelinek, H., 2011, Classification and application of fractals: New research. Mitchell, E. W. & Murray, S. R. (eds.). 1st ed. New York: Nova Publishers, p. 1-22 22 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2010

    Introduction

    Jelinek, H. & Cree, M. J., 2010, Automated Image Detection of Retinal Pathology. Jelinek, H. F. & Cree, M. J. (eds.). 1st ed. New York: CRC Press, p. 1-13 13 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2005

    An Adaptive Two-Dimensional Mesh Refinement Method for the Problems in Fluid Engineering

    Li, Z., 2005, An Adaptive Two-Dimensional Mesh Refinement Method for the Problems in Fluid Engineering. p. 118-123

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • A structural similarity based image fusion algorithm for night vision applications,

    Ul-Haq, A., 2005, A structural similarity based image fusion algorithm for night vision applications,: , In Proc. IEEE International Conference on Systems, Signals and Image Processing.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2004

    Simplifications of An Existing Mass Conservative Streamline Tracking Method for 2D CFD Velocity Fields

    Li, Z., 2004, Simplifications of An Existing Mass Conservative Streamline Tracking Method for 2D CFD Velocity Fields. p. 269-275

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2003

    Fuzzy Calculus by RBF Neural Networks

    Li, Z. & Kecman, V., 2003, Advances in soft computing: Neural Networks and Soft Computing. Rutkowski, L. & Kacprzyk, J. (eds.). Springer Heidelberg, Vol. 19. p. 516-522

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • The Fluid Flow Visualisations Based on Space Curve Theory

    Li, Z., 2003, Curves and Surface Design: Saint-Malo 2002. Nashboro Press, p. 283-291

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2002

    A Linear Genetic Programming Approach for Modelling Electricity Demand Prediction in Victoria

    Bhattacharya, M., Abraham, A. & Nath, B., 2002, Hybrid Information Systems. Abraham, A. & Köppen, M. (eds.). Heidelberg: Physica, Vol. 14. p. 379-393 15 p. (Advances in Soft Computing).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2001

    Genetic Programming: A Review of Some Concerns

    Bhattacharya, M. & Nath, B., 2001, Computational Science. Alexandrov, V. N. . D. J. J., Juliano, B. A., Renner, R. S. & Tan, C. J. K. (eds.). Springer Heidelberg, Vol. 2074. p. 1031 1040 p. (Lecture Notes in Computer Science).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)