Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 3118.

Add to Quick Collection   All 3118 Results

Sort:
 Add All Items to Quick Collection
Date: 2017
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1249264
Description: Change management in service based business process (SBP) is a challenging issue due to the complex dependencies between business process and involved services. A change of an activity belonging to a ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1249847
Description: Background and objectives: Highly accurate classification of biomedical images is an essential task in the clinical diagnosis of numerous medical diseases identified from those images. Traditional ima ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1250634
Description: E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be acce ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1248960
Description: In a cognitive radio network (CRN), energy detection is one of the most efficient spectrum sensing techniques for the protection of legacy spectrum users, with which the presence of primary users (PUs ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1197769
Description: Given a polynomial g of positive degree over a finite field, we show that the proportion of polynomials of degree n, which can be written as h+gk, where h is an irreducible polynomial of degree n and ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1248413
Description: Calnexin (CNX) is a highly conserved endoplasmic reticulum (ER) chaperone protein. Both calnexin and the homologous ER-lumenal protein, calreticulin, bind calcium ions and participate in protein foldi ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1250731
Description: 3 page(s)
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1250645
Description: We use the terms ∞-categories and ∞-functors to mean the objects and morphisms in an ∞-cosmos : a simplicially enriched category satisfying a few axioms, reminiscent of an enriched category of fibrant ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1197725
Description: 20 page(s)
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1248673
Description: Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an intrinsic part of many modern IMDs. So, doctors ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: Thesis PhD
Identifier: http://hdl.handle.net/1959.14/1261382
Description: Theoretical thesis.
Full Text: Full Text
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1250986
Description: Dynamic systems are becoming steadily more important with the profusion of mobile and distributed computing devices. Coincidentally incremental computation is a natural approach to deal with ongoing c ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: Thesis MRes
Identifier: http://hdl.handle.net/1959.14/1261532
Description: Theoretical thesis.
Full Text: Full Text
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1250669
Description: Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have provided a survey on several intrusion detection techniques for detecting intrusions in the cloud com ... More
Reviewed: Reviewed