Dharmendra Sharma
Orcid: 0000-0002-9856-4685Affiliations:
- University of Canberra, Faculty of Science and Technology, Australia
According to our database1,
Dharmendra Sharma
authored at least 172 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024
2023
Feature Map Augmentation to Improve Scale Invariance in Convolutional Neural Networks.
J. Artif. Intell. Soft Comput. Res., 2023
2022
Do Religious Values Influence the Decision of Saudi Arabian Public Sector Employees to Adopt Government Resource Planning Systems?
IEEE Access, 2022
2021
Proceedings of the 16th International Joint Conference on Computer Vision, 2021
Global-first Training Strategy with Convolutional Neural Networks to Improve Scale Invariance.
Proceedings of the Computer Vision, Imaging and Computer Graphics Theory and Applications, 2021
2020
Impact of Users' Socio-Cultural and Religious Orientation on Government Resource Planning (GRP) Systems Usage in Saudi Arabia.
IEEE Access, 2020
Proceedings of the 15th International Joint Conference on Computer Vision, 2020
A Study on the Impact of Alcoholism on EEG-based Cryptographic Key Generation Systems.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Feature Map Augmentation to Improve Rotation Invariance in Convolutional Neural Networks.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2020
2019
J. Netw. Comput. Appl., 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Proceedings of the 14th International Joint Conference on Computer Vision, 2019
Proceedings of the Handbook of Deep Learning Applications., 2019
2018
Factors influencing the intention to use of mobile value-added services by women-owned microenterprises in Fiji.
Electron. J. Inf. Syst. Dev. Ctries., 2018
On the Study of Impacts of Brain Conditions on EEG-based Cryptographic Key Generation Systems.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018
Investigating the Factors Affecting the Adoption of Cloud Computing in SMEs: A Case Study of Saudi Arabia.
Proceedings of the Information Systems, 2018
2017
Mobile Value Added Services in Fiji: Institutional Drivers, Industry Challenges, and Adoption by Women Micro Entrepreneurs.
J. Glob. Inf. Manag., 2017
J. Cyber Secur. Mobil., 2017
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Investigating The Impact Of Epilepsy On EEG-based Cryptographic Key Generation Systems.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Investigating Cloud Adoption Model using Analytics: A Case Study of Saudi Government Agencies.
Proceedings of the CLOSER 2017, 2017
Cloud Computing Financial and Cost Analysis: A Case Study of Saudi Government Agencies.
Proceedings of the CLOSER 2017, 2017
2016
Ann. des Télécommunications, 2016
A strategic decision value model for cloud computing in Saudi Arabia's public sector.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016
2015
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015
Determinants of Intention to Use Mobile Value Added Services: The Case of Women-Owned Micro Enterprises in Fiji.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015
Proceedings of the International Joint Conference, 2015
2014
Int. J. Comput. Linguistics Appl., 2014
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014
Mobile Value Added Services for Inclusive growth: a Study of women micro-Entrepreneurs in Fiji.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the 2nd International Conference on Systems and Informatics, 2014
Proceedings of the 10th International Conference on Natural Computation, 2014
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
The Potential Use of Multi-agent and Hybrid Data Mining Approaches in Social Informatics for Improving e-Health Services.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
A Triple Store Implementation to support Tabular Data.
Proceedings of the Twelfth Australasian Data Mining Conference, AusDM 2014, Brisbane, 2014
The Schema Last Approach to Data Fusion.
Proceedings of the Twelfth Australasian Data Mining Conference, AusDM 2014, Brisbane, 2014
2013
Protecting wireless sensor networks from internal attacks based on uncertain decisions.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Constraint Optimization for Timetabling Problems Using a Constraint Driven Solution Model.
Proceedings of the AI 2013: Advances in Artificial Intelligence, 2013
2012
A Novel Machine Learning Approach for Detecting the Brain Abnormalities from MRI Structural Images.
Proceedings of the Pattern Recognition in Bioinformatics, 2012
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
A novel misbehavior evaluation with dempster-shafer theory in wireless sensor networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012
A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012
Wavelet based denoising algorithm of the ECG signal corrupted by WGN and Poisson noise.
Proceedings of the International Symposium on Communications and Information Technologies, 2012
Proceedings of the International Symposium on Communications and Information Technologies, 2012
Resiliency Controlling of Wireless Sensor Networks for the Protecting from Internal Attacks.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
Using Hybrid Neural Networks for Identifying the Brain Abnormalities from MRI Structural Images.
Proceedings of the Neural Information Processing - 19th International Conference, 2012
A Novel Approach to Protein Structure Prediction Using PCA or LDA Based Extreme Learning Machines.
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Maximal Margin Approach to Kernel Generalised Learning Vector Quantisation for Brain-Computer Interface.
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Time Domain Parameters for Online Feedback fNIRS-Based Brain-Computer Interface Systems.
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Hybrid Approach for Diagnosing Thyroid, Hepatitis, and Breast Cancer Based on Correlation Based Feature Selection and Naïve Bayes.
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the 18th IEEE International Conference on Networks, 2012
Proceedings of the 2012 International Conference on Information Networking, 2012
Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012
Proceedings of the 2012 International Conference on Information Networking, 2012
A Novel Approach to Protein Structure Prediction Using PCA Based Extreme Learning Machines and Multiple Kernels.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012
Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012
Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012
Proceedings of the FUZZ-IEEE 2012, 2012
Proceedings of the AI 2012: Advances in Artificial Intelligence, 2012
2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011
Quantum cryptography based Key Distribution in IEEE 802.11 networks - analysis on reconciliation phase.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011
Proceedings of the Artificial Immune Systems - 10th International Conference, 2011
Dynamic window with fuzzy controller in wireless sensor networks for elliptic curve cryptography.
Proceedings of the FUZZ-IEEE 2011, 2011
Analysis of the Experimental Results for Quantum Key Distribution Cryptography in IEEE 802.11 Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2011
A New Term Ranking Method based on Relation Extraction and Graph Model for Text Classification.
Proceedings of the Thirty-Fourth Australasian Computer Science Conference, 2011
2010
Aust. J. Intell. Inf. Process. Syst., 2010
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010
Proceedings of the Knowledge Management and Acquisition for Smart Systems and Services, 2010
Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography.
Proceedings of the Fourth International Conference on Network and System Security, 2010
Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange.
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the 11th Annual Conference of the International Speech Communication Association, 2010
Proceedings of the International Joint Conference on Neural Networks, 2010
Quantum Cryptography based Key Distribution in Wi-Fi Networks - Protocol Modifications in IEEE 802.11.
Proceedings of the ICSOFT 2010, 2010
Proceedings of the Neural Information Processing. Models and Applications, 2010
Proceedings of the FUZZ-IEEE 2010, 2010
Proceedings of the 2nd European Workshop on Visual Information Processing, 2010
Proceedings of the IEEE Congress on Evolutionary Computation, 2010
Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the First International Conference on Networks and Communications, 2009
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009
Evaluating security risks based on intelligent systems and attack graphs.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Remote multimodal biometric authentication using bit priority-based fragile watermarking.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008
2007
J. Adv. Comput. Intell. Intell. Informatics, 2007
J. Adv. Comput. Intell. Intell. Informatics, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Multi-agent Processing for Query Camouflage Via Data Perturbation in Online Medical Surveys.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
A Comparison of Three Agent-Oriented Software Development Methodologies: ROADMAP, Prometheus, and MaSE.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
A Synthetic Method for Wafer Character Recognition.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
A Fast Matching Method for Fingerprints with Less Than Two Global Singular Points.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Fuzzy Normalisation Methods for Typist Verification.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
On Extendable Software Architecture for Spam Email Filtering.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
A New Efficient Transmission for XML Data on Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Password Less System Security Using Multimodal Biometric Fusion.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007
The Application of Multi-sensors Fusion in Vehicle Transmission System Fault Diagnosis.
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Advances in Hybrid Information Technology, 2006
Proceedings of the Third IEEE International Workshop on Electronic Design, 2006
2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
A Hybrid Decision Tree - Artificial Neural Networks Ensemble Approach for Kidney Transplantation Outcomes Prediction.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
Use of Artificial Neural Networks in the Prediction of the Kidney Transplant Outcomes.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
A Study of the Radial Basis Function Neural Network Classifiers Using Known Data of Varying Accuracy and Complexity.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
2002
UniLR: An Automated Fuzzy Legal Reasoner.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002
2000
Proceedings of the Advances in Artificial Intelligence. PRICAI 2000 Workshop Reader, Four Workshops held at PRICAI 2000, Melbourne, Australia, August 28, 2000