Power graphs: a survey J Abawajy, A Kelarev, M Chowdhury Electronic Journal of Graph Theory and Applications (EJGTA) 1 (2), 125-147, 2013 | 230 | 2013 |
RFID-based real-time smart waste management system B Chowdhury, MU Chowdhury 2007 Australasian telecommunication networks and applications conference …, 2007 | 210 | 2007 |
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, AA Alelaiwi, F Li Future Generation Computer Systems 86, 836-850, 2018 | 209 | 2018 |
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments Z Zhou, F Li, H Zhu, H Xie, JH Abawajy, MU Chowdhury Neural Computing and Applications 32, 1531-1541, 2020 | 199 | 2020 |
Multistage approach for clustering and classification of ECG data JH Abawajy, AV Kelarev, M Chowdhury Computer methods and programs in biomedicine 112 (3), 720-730, 2013 | 103 | 2013 |
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy A Stranieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, HF Jelinek Artificial intelligence in medicine 58 (3), 185-193, 2013 | 94 | 2013 |
Border surveillance with WSN systems in a distributed manner H Mostafaei, MU Chowdhury, MS Obaidat IEEE Systems Journal 12 (4), 3703-3712, 2018 | 91 | 2018 |
Scalable RFID security framework and protocol supporting Internet of Things BR Ray, J Abawajy, M Chowdhury Computer Networks 67, 89-103, 2014 | 83 | 2014 |
A survey of active and passive defence mechanisms against DDoS attacks X Yang, W Zhou, M Chowdhury Deakin University, School of Information Technology, 2004 | 77 | 2004 |
Large iterative multitier ensemble classifiers for security of big data JH Abawajy, A Kelarev, M Chowdhury IEEE Transactions on Emerging Topics in Computing 2 (3), 352-363, 2014 | 71 | 2014 |
Fine-grained energy consumption model of servers based on task characteristics in cloud data center Z Zhou, JH Abawajy, F Li, Z Hu, MU Chowdhury, A Alelaiwi, K Li IEEE access 6, 27080-27090, 2017 | 67 | 2017 |
Secure object tracking protocol for the Internet of Things BR Ray, MU Chowdhury, JH Abawajy IEEE Internet of things Journal 3 (4), 544-553, 2016 | 65 | 2016 |
Image semantic classification by using SVM 万华林 Journal of software 14 (11), 1891-1899, 2003 | 62 | 2003 |
The challenges of cloud technology adoption in e-government MA Aziz, J Abawajy, M Chowdhury 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 61 | 2013 |
Acoustic features extraction for emotion recognition J Rong, YPP Chen, M Chowdhury, G Li 6th IEEE/ACIS International Conference on Computer and Information Science …, 2007 | 61 | 2007 |
A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV) MS Haque, MU Chowdhury Security and Privacy in Communication Networks: SecureComm 2017 …, 2018 | 56 | 2018 |
UAV swarm mission planning in dynamic environment using consensus-based bundle algorithm Y Zhang, W Feng, G Shi, F Jiang, M Chowdhury, SH Ling Sensors 20 (8), 2307, 2020 | 48 | 2020 |
A comparison survey study on RFID based anti-counterfeiting systems G Khalil, R Doss, M Chowdhury Journal of Sensor and Actuator Networks 8 (3), 37, 2019 | 48 | 2019 |
Universal and secure object ownership transfer protocol for the Internet of Things BR Ray, J Abawajy, M Chowdhury, A Alelaiwi Future Generation Computer Systems 78, 838-849, 2018 | 44 | 2018 |
A novel RFID-based anti-counterfeiting scheme for retail environments G Khalil, R Doss, M Chowdhury IEEE Access 8, 47952-47962, 2020 | 41 | 2020 |