Follow

Submissions from 2021

Link

A novel deep neuroevolution-based image classification method to diagnose coronavirus disease (COVID-19), Sajad Ahmadian, Seyed Mohammad Jafar Jalali, Syed Mohammed Shamsul Islam, Abbas Khosravi, Ebrahim Fazli, and Saeid Nahavandi

Link

ECU-IoHT: A dataset for analyzing cyberattacks in Internet of health things, Mohiuddin Ahmed, Surender Byreddy, Anush Nutakki, Leslie F. Sikos, and Paul Haskell-Dowland

Link

A blockchain-based emergency message transmission protocol for cooperative VANET, Mohiuddin Ahmed, Nour Moustafa, A. F. M. S. Akhter, Imran Razzak, Ehsanuzzaman Surid, Adnan Anwar, A. F. M. S. Shah, and Ahmet Zengin

PDF

Deep learning versus spectral techniques for frequency estimation of single tones: Reduced complexity for software-defined radio and iot sensor communications, Hind R. Almayyali and Zahir M. Hussain

PDF

Deep learning control for digital feedback systems: Improved performance with robustness against parameter change, Nuha A. S. Alwan and Zahir M. Hussain

PDF

Frequency estimation from compressed measurements of a sinusoid in moving‐average colored noise, Nuha A. S. Alwan and Zahir M. Hussain

PDF

Infrequent pattern detection for reliable network traffic analysis using robust evolutionary computation, A. N. M. Bazlur Rashid, Mohiuddin Ahmed, and Al-Sakib K. Pathan

Link

Cultural regulation of disruptive technologies: Lessons from orthodox religious communities, Tracey Dowdeswell and Nachshon (Sean) Goltz

Link

Oriented to human autonomy Indian ethics, artificial intelligence, and driverless vehicles, Robert Geraci and Nachshon (Sean) Goltz

Link

Indoor semantic scene understanding using 2D-3D fusion, Muraleekrishna Gopinathan, Giang Truong, and Jumana Abu-Khalaf

Link

A new ensemble reinforcement learning strategy for solar irradiance forecasting using deep optimized convolutional neural network models, Seyed Mohammad J. Jalali, Mahdi Khodayar, Sajad Ahmadian, Miadreza Shafie-Khah, Abbas Khosravi, Syed Mohammed S. Islam, Saeid Nahavandi, and Joao P. S. Catalao

Link

A fuzzy supply chain risk assessment approach using real-time disruption event data from Twitter, Naeem K. Janjua, Falak Nawaz, and Daniel D. Prior

Link

Image aesthetics classification using deep features and image category, Hira Maqbool and Martin Masek

Link

A genetic programming framework for novel behaviour discovery in air combat scenarios, Martin Masek, Chiou Peng Lam, Luke Kelly, Lyndon Benke, and Michael Papasimeon

PDF

Discovering optimal strategy in tactical combat scenarios through the evolution of behaviour trees, Martin Masek, Chiou Peng Lam, Luke Kelly, and Martin Wong

PDF

The open maritime traffic analysis dataset, Martin Masek, Chiou Peng Lam, Travis Rybicki, Jacob Snell, Daniel Wheat, Luke Kelly, damion Glassborow, and Cheryl Smith-Gander

Link

3D morphable ear model: A complete pipeline from ear segmentation to statistical modeling, Md Mursalin, Syed Mohammed Shamsul Islam, and Syed Zulqarnain Gilani

Link

Can i trust you? incorporating supplier trustworthiness into supplier selection criteria, Daniel D. Prior, Morteza Saberi, Naeem Khalid Janjua, and Ferry Jie

Link

The negative impact of smartphone usage on nursing students: An integrative literature review, Lucie M. Ramjan, Yenna Salamonson, Sharryn Batt, Ariana Kong, Belinda McGrath, Gina Richards, David Roach, Peter Wall, and Ruth Crawford

Link

Cooperative co-evolution and mapreduce: A review and new insights for large-scale optimisation, A. N.M.Bazlur Rashid and Tonmoy Choudhury

PDF

An evolutionary approach to balancing and disrupting real-time strategy games, Jacob Snell, Martin Masek, and Chiou Peng Lam

PDF

A secured message transmission protocol for vehicular ad hoc networks, A. F. M. Suaib Akhter, A. F. M. Shahen Shah, Mohiuddin Ahmed, Nour Moustafa, Unal Çavuşoğlu, and Ahmet Zengin

Link

Machine learning based cybersecurity defense at the age of Industry 4.0, Sourabh K. Vishavnath, Adnan Anwar, and Mohiuddin Ahmed

Submissions from 2020

Link

Deep learning: Hope or hype, Mohiuddin Ahmed and A. K. M. Najmul Islam

Link

Blockchain: Can it be trusted?, Mohiuddin Ahmed and Al-Sakib Khan Pathan

PDF

False data injection attack (FDIA): An overview and new metrics for fair evaluation of its countermeasure, Mohiuddin Ahmed and Al-Sakib Khan Pathan

Link

Improving data management and decision support systems in agriculture, Leisa Armstrong (Ed.)

Link

Advances in artificial intelligence (AI) for more effective decision making in agriculture, Leisa Armstrong, N. Gandhi, P. Taechatanasat, and Dean Diepeveen

Link

Deep learning meets malware detection: An investigation, Biozid Bostami and Mohiuddin Ahmed

PDF

The clash of empires: Regulating technological threats to civil society, Tracey Leigh Dowdeswell and Nachshon Goltz

PDF

From the tree of knowledge and the golem of Prague to kosher autonomous cars: The ethics of artificial intelligence through jewish eyes, Nachshon Goltz, John Zeleznikow, and Tracey Dowdeswell

Link

A progressive weighted average weight optimisation ensemble technique for fruit and vegetable classification, Khurram Hameed, Douglas Chai, and Alexander Rassau

PDF

A sample weight and adaboost CNN-based coarse to fine classification of fruit and vegetables at a supermarket self-checkout, Khurram Hameed, Douglas Chai, and Alexander Rassau

PDF

Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, and Arafat Al-Dhaqm

PDF

Performances of the LBP based algorithm over CNN models for detecting crops and weeds with similar morphologies, Vi Nguyen Thanh Le, Selam Ahderom, and Kamal Alameh

Link

Simulation of biomedical signals and images using Monte Carlo methods for training of deep learning networks, Navid Mavaddat, Selam Ahderom, Valentina Tiporlini, and Kamal Alameh

PDF

SAM-SoS: A stochastic software architecture modeling and verification approach for complex System-of-Systems, Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, and Muhammad Ali Babar

Link

Model synthesis and stochastic automated verification of systems-of-systems dynamic architectures, Ahmad Mohsin, Naeem K. Janjua, Martin Masek, and Valdemar V. G. Neto

Link

From evidence to proof: Social network analysis in Italian criminal courts of justice, Roberto Musotto

Link

The online crime-terror nexus: Using booter services (stressers) to weaponize data?, Roberto Musotto and David S. Wall

Link

Dynamic QoS-aware cloud service selection using best-worst method and timeslot weighted satisfaction scores, Falak Nawaz and Naeem K. Janjua

Link

Taxonomy of Industry 4.0 research: Mapping scholarship and industry insights, Dashi Nazarov and Anton Klarin

Link

Detecting deviations from activities of daily living routines using kinect depth maps and power consumption data, Hossein Pazhoumand-Dar, Leisa J. Armstrong, and Amiya Kumar Tripathy

PDF

Quantifiable isovist and graph-based measures for automatic evaluation of different area types in virtual terrain generation, Andrew Pech, Chiou Peng Lam, and Martin Masek

Link

Facial soft tissue norms in Caucasians using an innovative three-dimensional approach, Anand Ponnusamy, Mithran S. Goonewardene, Ajmal Mian, Peter Eastwood, Alethea Rea, and Syed Islam

Link

Making the Information Technology (IT) business alignment works: a framework of IT-based competitive strategy, Ira Puspitasari and Ferry Jie

PDF

A novel penalty-based wrapper objective function for feature selection in big data using cooperative co-evolution, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, and Paul Haskell-Dowland

PDF

Cooperative co-evolution for feature selection in big data with random feature grouping, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, and Paul Haskell-Dowland

Link

Vision to language: Methods, metrics and datasets, Naeha Sharif, Uzair Nadeem, Syed A. A. Shah, Mohammed Bennamoun, and Wei Liu

Link

Knowledge representation to support partially automated honeypot analysis based on Wireshark packet capture files, Leslie F. Sikos

Link

Data science in cybersecurity and cyberthreat intelligence, Leslie F. Sikos and Kim-Kwang Raymond Choo

PDF

Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp

Submissions from 2019

Link

Intelligent big data summarization for rare anomaly detection, Mohiuddin Ahmed

Link

Trust in Computational Intelligence systems: A case study in public perceptions, Keeley Crockett, Sean Goltz, Matt Garratt, and Annabel Latham

Link

A machine learning case study with limited data for prediction of carbon fiber mechanical properties, Gelayol Golkarnarenji, Minoo Naebe, Khashayar Badii, Abbas S. Milani, Reza N. Jazar, and Hamid Khayyam

Link

A survey of the general public’s views on the ethics of using AI in education, Annabel Latham and Sean Goltz

Link

Evolving behaviour trees for automated discovery of novel combat strategy in real-time strategy wargames, Martin Masek, Chiou Peng Lam, Luke Kelly, and Martin Wong

Link

The influence of extrinsic and intrinsic variables on children’s reading frequency and attitudes: An exploration using an artificial neural network, Saiyidi Mat Roni and Margaret Kristin Merga

Link

Proactive management of SLA violations by capturing relevant external events in a Cloud of Things environment, Falak Nawaz, Omar Hussain, Farookh Khadeer Hussain, Naeem Khalid Janjua, Morteza Saberi, and Elizabeth Chang

Link

PERCEPTUS: Predictive complex event processing and reasoning for IoT-enabled supply chain, Falak Nawaz, Naeem Khalid Janjua, and Omar Khadeer Hussain

Link

Service description languages in cloud computing: State-of-the-art and research issues, Falak Nawaz, Ahmad Mohsin, and Naeem Khalid Janjua

Link

Demonstration of optical wireless communications using spatial modulation with signal space diversity, Tingting Song, Ke Wang, Ampalavanapillai Nirmalathas, Christina Lim, Elaine Wong, and Kamal Alameh

Link

Superpixel-guided two-view deterministic geometric model fitting, Guobao Xiao, Hanzi Wang, Yan Yan, and David Suter