default search action
Ajit Narayanan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Zahra Roozbehi, Ajit Narayanan, Mahsa Mohaghegh, Samaneh-Alsadat Saeedinia:
Dynamic-Structured Reservoir Spiking Neural Network in Sound Localization. IEEE Access 12: 24596-24608 (2024) - [j37]Steven M. Goodman, Erin Buehler, Patrick Clary, Andy Coenen, Aaron Donsbach, Tiffanie N. Horne, Michal Lahav, Robert MacDonald, Rain Breaw Michaels, Ajit Narayanan, Mahima Pushkarna, Joel Riley, Alex Santana, Lei Shi, Rachel Sweeney, Phil Weaver, Ann Yuan, Meredith Ringel Morris:
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models. Commun. ACM 67(9): 80-89 (2024) - [j36]Chengran Li, Ajit Narayanan, Akbar Ghobakhlou:
Overlapping Shoeprint Detection by Edge Detection and Deep Learning. J. Imaging 10(8): 186 (2024) - [j35]Mohammad Mahfuzul Haque, Akbar Ghobakhlou, Ajit Narayanan:
Multi-Tracking Sensor Architectures for Reconstructing Autonomous Vehicle Crashes: An Exploratory Study. Sensors 24(13): 4194 (2024) - [c60]Emma Dixon, Xiang Xiao, Rain Breaw Michaels, Yu Zhong, Ajit Narayanan, Erin Buehler:
Investigating the Potential of User Interface Shortcuts and Control Panes to Support Mobile Phone Use by People with Mild Dementia - a Diary Study. CHI Extended Abstracts 2024: 208:1-208:7 - 2023
- [j34]Ajit Narayanan, Wendy L. Magee, Richard J. Siegert:
Machine learning and network analysis for diagnosis and prediction in disorders of consciousness. BMC Medical Informatics Decis. Mak. 23(1): 41 (2023) - [c59]Upeka De Silva, Samaneh Madanian, John Michael Templeton, Christian Poellabauer, Sandy Schneider, Ajit Narayanan:
Design Concept of a Mental Health Monitoring Application with Explainable Assessments. ACIS 2023 - [c58]Rujia Chen, Akbar Ghobakhlou, Ajit Narayanan, Matías Pérez, Roberto Orlano Chavez Oyanadel, Renato Borras-Chavez:
Semi-Supervised Deep Learning for Estimating Fur Seal Numbers. IVCNZ 2023: 1-5 - [i5]Shanqing Cai, Subhashini Venugopalan, Katie Seaver, Xiang Xiao, Katrin Tomanek, Sri Jalasutram, Meredith Ringel Morris, Shaun K. Kane, Ajit Narayanan, Robert L. MacDonald, Emily Kornman, Daniel E. Vance, Blair Casey, Steve M. Gleason, Philip Q. Nelson, Michael P. Brenner:
Using Large Language Models to Accelerate Communication for Users with Severe Motor Impairments. CoRR abs/2312.01532 (2023) - 2022
- [j33]Dhvani Shah, Ajit Narayanan, Josafath Israel Espinosa Ramos:
Utilizing the Neuronal Behavior of Spiking Neurons to Recognize Music Signals Based on Time Coding Features. IEEE Access 10: 37317-37329 (2022) - [j32]Christopher Burns, Barbara Bollard, Ajit Narayanan:
Machine-Learning for Mapping and Monitoring Shallow Coral Reef Habitats. Remote. Sens. 14(11): 2666 (2022) - [c57]Steven M. Goodman, Erin Buehler, Patrick Clary, Andy Coenen, Aaron Donsbach, Tiffanie N. Horne, Michal Lahav, Robert MacDonald, Rain Breaw Michaels, Ajit Narayanan, Mahima Pushkarna, Joel Riley, Alex Santana, Lei Shi, Rachel Sweeney, Phil Weaver, Ann Yuan, Meredith Ringel Morris:
LaMPost: Design and Evaluation of an AI-assisted Email Writing Prototype for Adults with Dyslexia. ASSETS 2022: 24:1-24:18 - [c56]Emma Dixon, Rain Michaels, Xiang Xiao, Yu Zhong, Patrick Clary, Ajit Narayanan, Robin N. Brewer, Amanda Lazar:
Mobile Phone Use by People with Mild to Moderate Dementia: Uncovering Challenges and Identifying Opportunities: Mobile Phone Use by People with Mild to Moderate Dementia. ASSETS 2022: 38:1-38:16 - [c55]Shanqing Cai, Subhashini Venugopalan, Katrin Tomanek, Ajit Narayanan, Meredith Ringel Morris, Michael P. Brenner:
Context-Aware Abbreviation Expansion Using Large Language Models. NAACL-HLT 2022: 1261-1275 - [i4]Shanqing Cai, Subhashini Venugopalan, Katrin Tomanek, Ajit Narayanan, Meredith Ringel Morris, Michael P. Brenner:
Context-Aware Abbreviation Expansion Using Large Language Models. CoRR abs/2205.03767 (2022) - [i3]Steven M. Goodman, Erin Buehler, Patrick Clary, Andy Coenen, Aaron Donsbach, Tiffanie N. Horne, Michal Lahav, Robert MacDonald, Rain Breaw Michaels, Ajit Narayanan, Mahima Pushkarna, Joel Riley, Alex Santana, Lei Shi, Rachel Sweeney, Phil Weaver, Ann Yuan, Meredith Ringel Morris:
LaMPost: Design and Evaluation of an AI-assisted Email Writing Prototype for Adults with Dyslexia. CoRR abs/2207.02308 (2022) - 2021
- [c54]Sabeeha Mehtab, Wei Qi Yan, Ajit Narayanan:
3D Vehicle Detection Using Cheap LiDAR and Camera Sensors. IVCNZ 2021: 1-6 - 2020
- [j31]William Liu, Farhaan Mirza, Ajit Narayanan, Seng Souligna:
Is it possible to cure Internet addiction with the Internet? AI Soc. 35(1): 245-255 (2020) - [c53]Lia Carrari, Rain Michaels, Ajit Narayanan, Lei Shi, Xiang Xiao:
Action Blocks: Making Mobile Technology Accessible for People with Cognitive Disabilities. ASSETS 2020: 90:1-90:4 - [c52]Ajit Narayanan:
Can Lethal Autonomous Robots Learn Ethics? Australasian Conference on Artificial Intelligence 2020: 230-240 - [c51]Alvaro Gunawan, Ji Ruan, Michael Thielscher, Ajit Narayanan:
Exploring a Learning Architecture for General Game Playing. Australasian Conference on Artificial Intelligence 2020: 294-306 - [c50]Krishnam Gupta, Jaiprasad, Monu Krishnan, Ajit Narayanan, Nikhil S. Narayan:
Dual Stream Network with Selective Optimization for Skin Disease Recognition in Consumer Grade Images. ICPR 2020: 5262-5269 - [c49]Ajit Narayanan, Koz Ross, Kenneth Johnson:
Zero-error rule induction using a memetic algorithm. SSCI 2020: 647-654
2010 – 2019
- 2019
- [c48]Ajit Narayanan:
Ethical judgement in intelligent control systems for autonomous vehicles. ANZCC 2019: 231-236 - [c47]Monish Kaul, Nikhil S. Narayan, Ajit Narayanan:
Siamese bayesian networks for AI based differential diagnosis. HP3C 2019: 45-49 - [c46]Vijay Naidu, Ajit Narayanan, Manoranjan Mohanty:
Using Amino Acids of Images for Identifying Pornographic Images. MIPR 2019: 9-14 - [i2]Ajit Narayanan:
When is it right and good for an intelligent autonomous vehicle to take over control (and hand it back)? CoRR abs/1901.08221 (2019) - 2018
- [j30]Waseem Ahmad, Ajit Narayanan:
Time series data analysis using Artificial Immune System. Intell. Decis. Technol. 12(2): 119-135 (2018) - 2017
- [c45]Abhimanyu Singh Garhwal, Wei Qi Yan, Ajit Narayanan:
Image phylogeny for simulating multiple print-scan. IVCNZ 2017: 1-6 - 2016
- [j29]Ajit Narayanan, Michael Greco:
Patient Experience of Australian General Practices. Big Data 4(1): 31-46 (2016) - [c44]Vijay Naidu, Ajit Narayanan:
Using different substitution matrices in a string-matching technique for identifying viral polymorphic malware variants. CEC 2016: 2903-2910 - [c43]Vijay Naidu, Ajit Narayanan:
Needleman-Wunsch and Smith-Waterman Algorithms for Identifying Viral Polymorphic Malware Variants. DASC/PiCom/DataCom/CyberSciTech 2016: 326-333 - [c42]Vijay Naidu, Ajit Narayanan:
A Syntactic Approach for Detecting Viral Polymorphic Malware Variants. PAISI 2016: 146-165 - [c41]Mee-Loong Yang, Ajit Narayanan, Dave Parry, Xiumin Wang:
A lightweight authentication scheme for transport system farecards. RFID-TA 2016: 150-155 - 2015
- [j28]Aminu Bello, William Liu, Quan Bai, Ajit Narayanan:
Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective. Int. J. Inf. Secur. Priv. 9(2): 13-30 (2015) - [c40]Aminu Bello, William Liu, Quan Bai, Ajit Narayanan:
Revealing the Role of Topological Transitivity in Efficient Trust and Reputation System in Smart Metering Network. DSDIS 2015: 337-342 - [c39]Aminu Bello, William Liu, Quan Bai, Ajit Narayanan:
Exploring the Role of Structural Similarity in Securing Smart Metering Infrastructure. DSDIS 2015: 343-349 - [c38]Waseem Ahmad, Ajit Narayanan:
Artificial Immune System: An Effective Way to Reduce Model Overfitting. ICCCI (1) 2015: 316-327 - 2014
- [c37]Ajit Narayanan, Edward C. Keedwell:
An evolutionary computational approach to phase and synchronization in biological circuits. ICNC 2014: 419-424 - [c36]Ahmad F. Wedyan, Ajit Narayanan:
Solving capacitated vehicle routing problem using intelligent water drops algorithm. ICNC 2014: 469-474 - [c35]Vijay Naidu, Ajit Narayanan:
Further experiments in biocomputational structural analysis of malware. ICNC 2014: 605-610 - [c34]Fan Liu, Ajit Narayanan:
Intelligent Collision Avoidance between Autonomous Agents Using Adaptive Local Views. PRIMA 2014: 190-205 - [c33]Subana Shanmuganathan, Ajit Narayanan, Maryati Mohamed, Rosziati Ibrahim, Haron Khalid:
A Hybrid Approach to Modelling the Climate Change Effects on Malaysia's Oil Palm Yield at the Regional Scale. SCDM 2014: 335-345 - 2013
- [j27]Ajit Narayanan:
Society under threat... but not from AI. AI Soc. 28(1): 87-94 (2013) - [j26]Ajit Narayanan, Michael Greco, Helen Powell, Louise Coleman:
The Reliability of Big "Patient Satisfaction" Data. Big Data 1(3): 141-151 (2013) - [j25]Ed Keedwell, Ajit Narayanan:
Gene expression rule discovery and multi-objective ROC analysis using a neural-genetic hybrid. Int. J. Data Min. Bioinform. 7(4): 376-396 (2013) - [c32]Fan Liu, Ajit Narayanan:
Roundabout collision avoidance for multiple robots based on minimum enclosing rectangle. AAMAS 2013: 1375-1376 - [c31]Fan Liu, Ajit Narayanan:
A Human-Inspired Collision Avoidance Method for Multi-robot and Mobile Autonomous Robots. PRIMA 2013: 181-196 - [i1]Ajit Narayanan, Yi Chen:
Bio-inspired data mining: Treating malware signatures as biosequences. CoRR abs/1302.3668 (2013) - 2012
- [j24]Waseem Ahmad, Ajit Narayanan:
Outlier Detection Using humoral-Mediated Clustering (HAIS). Int. J. Comput. Intell. Appl. 11(1) (2012) - [j23]Waseem Ahmad, Ajit Narayanan:
Humoral Artificial Immune System (HAIS) for Supervised Learning. Int. J. Comput. Intell. Appl. 11(1) (2012) - [c30]Fan Liu, Ajit Narayanan, Quan Bai:
Effective methods for generating collision free paths for multiple robots based on collision type (demonstration). AAMAS 2012: 1459-1460 - [c29]Yi Chen, Ajit Narayanan, Shaoning Pang, Ban Tao:
Malicioius Software Detection Using Multiple Sequence Alignment and Data Mining. AINA 2012: 8-14 - [c28]Ajit Narayanan, Yi Chen, Shaoning Pang, Ban Tao:
The Effects of Different Representations on Malware Motif Identification. CIS 2012: 86-90 - [c27]Yi Chen, Ajit Narayanan, Shaoning Pang, Ban Tao:
Multiple sequence alignment and artificial neural networks for malicious software detection. ICNC 2012: 261-265 - 2011
- [c26]Subana Shanmuganathan, Ana Perez Kuroki, Ajit Narayanan, Philip Sallis:
Modelling the seasonal climate variability and its effects on vintage wines from Marlborough, NZ. FSKD 2011: 2074-2079 - [c25]Waseem Ahmad, Ajit Narayanan:
Principles and Methods of Artificial Immune System Vaccination of Learning Systems. ICARIS 2011: 268-281 - [c24]Waseem Ahmad, Ajit Narayanan:
Population-Based Artificial Immune System Clustering Algorithm. ICARIS 2011: 348-360 - [c23]Waseem Ahmad, Ajit Narayanan, Muhammad Anjum Javeed:
Quantum jump clustering. ICNC 2011: 1326-1331 - [c22]Subana Shanmuganathan, Ajit Narayanan, Nick Robison:
A cellular automaton framework for within-field vineyard variance and grape production simulation. ICNC 2011: 1430-1435 - [c21]Fan Liu, Ajit Narayanan:
Real time replanning based on A* for collision avoidance in multi-robot systems. URAI 2011: 473-479 - 2010
- [c20]Ed Keedwell, Ajit Narayanan:
Gene expression rule discovery with a multi-objective neural-genetic hybrid. BIBM 2010: 649-656 - [c19]Waseem Ahmad, Ajit Narayanan:
Humoral-mediated clustering. BIC-TA 2010: 1471-1481 - [c18]Subana Shanmuganathan, Philip Sallis, Ajit Narayanan:
Data Mining Techniques for Modelling Seasonal Climate Effects on Grapevine Yield and Wine Quality. CICSyN 2010: 84-89 - [c17]Subana Shanmuganathan, Philip Sallis, Ajit Narayanan:
Data Mining Techniques for Modelling the Influence of Daily Extreme Weather Conditions on Grapevine, Wine Quality and Perennial Crop Yield. CICSyN 2010: 90-95 - [c16]Waseem Ahmad, Ajit Narayanan:
Humoral artificial immune system (HAIS) For supervised learning. NaBIC 2010: 37-44 - [c15]Waseem Ahmad, Ajit Narayanan:
Outlier detection using humoral-mediated clustering (HAIS). NaBIC 2010: 45-52
2000 – 2009
- 2007
- [j22]Ajit Narayanan:
AI and Accountability. AI Soc. 21(4): 669-671 (2007) - [c14]Ed Keedwell, Ajit Narayanan:
Gene finding and rule discovery with a multi-objective neural-genetic hybrid. GECCO 2007: 428 - 2005
- [j21]Ed Keedwell, Ajit Narayanan:
Discovering Gene Networks with a Neural-Genetic Hybrid. IEEE ACM Trans. Comput. Biol. Bioinform. 2(3): 231-242 (2005) - [c13]Thorhildur Juliusdottir, David Corne, Ed Keedwell, Ajit Narayanan:
Two-Phase EA/k-NN for Feature Selection and Classification in Cancer Microarray Datasets. CIBCB 2005: 1-8 - [c12]A. Krishna, Ajit Narayanan, Ed Keedwell:
Neural Networks and Temporal Gene Expression Data. EvoWorkshops 2005: 64-73 - 2004
- [j20]Ajit Narayanan, Ed Keedwell, Jonas Gamalielsson, S. Tatineni:
Single-layer artificial neural networks for gene expression analysis. Neurocomputing 61: 217-240 (2004) - [c11]Ajit Narayanan, Evangelia Nana, Ed Keedwell:
Analyzing gene expression data for childhood medulloblastoma survival with artificial neural networks. CIBCB 2004: 9-16 - 2003
- [c10]Ed Keedwell, Ajit Narayanan:
Genetic Algorithms for Gene Expression Analysis. EvoWorkshops 2003: 76-86 - 2002
- [j19]Kim Laurio, Fredrik Linåker, Ajit Narayanan:
Regular biosequence pattern matching with cellular automata. Inf. Sci. 146(1-4): 89-101 (2002) - [j18]Ajit Narayanan, T. Shaman:
Iconic SQL: Practical Issues in the Querying of Databases through Structured Iconic Expressions. J. Vis. Lang. Comput. 13(6): 623-647 (2002) - [c9]Ajit Narayanan:
All There Is to the Mind Is to Have the Right Genes, or, Consciousness as a Form of Genetic Engineering. AICS 2002: 78-86 - [c8]Ajit Narayanan, Xikun Wu, Zheng Rong Yang:
Mining viral protease data to extract cleavage knowledge. ISMB 2002: 5-13 - [c7]Kim Laurio, Fredrik Linåker, Ajit Narayanan:
Recognizing PROSITE Patterns with Cellular Automata. JCIS 2002: 1174-1179 - 2001
- [j17]Ajit Narayanan, Sharon Hibbin:
Can animations be safely used in court? Artif. Intell. Law 9(4): 271-294 (2001) - 2000
- [j16]Ed Keedwell, Ajit Narayanan, Dragan A. Savic:
Creating rules from trained networks using genetic algorithms. Int. J. Comput. Syst. Signals 1(1): 30-42 (2000) - [j15]Ajit Narayanan, Tammy Menneer:
Quantum artificial neural network architectures and components. Inf. Sci. 128(3-4): 231-255 (2000) - [c6]Dan Lundh, Ajit Narayanan:
On Synaptic Plasticity: Modelling Molecular Kinases involved in Transmitter Release. ANNIMAB 2000: 277-282 - [c5]Ed Keedwell, Ajit Narayanan, Dragan A. Savic:
Evolving rules from neural networks trained on continuous data. CEC 2000: 639-645 - [c4]Ed Keedwell, Florian Bessler, Ajit Narayanan, Dragan A. Savic:
From data mining to rule refining A new tool for post data mining rule optimisation. ICTAI 2000: 82-85
1990 – 1999
- 1999
- [c3]Ajit Narayanan:
Quantum computing for beginners. CEC 1999: 2231-2238 - 1997
- [e1]Dan Lundh, Björn Olsson, Ajit Narayanan:
Biocomputing and emergent computation: Proceedings of BCEC97. World Scientific 1997, ISBN 981-02-3262-4 [contents] - 1996
- [j14]Ajit Narayanan:
Revisable knowledge discovery in databases. Int. J. Intell. Syst. 11(2): 75-96 (1996) - [c2]Ajit Narayanan, Mark Moore:
Quantum Inspired Genetic Algorithms. International Conference on Evolutionary Computation 1996: 61-66 - 1995
- [j13]Ajit Narayanan, Darrel Manuel, Lindsey Ford, Daniel James Tallis, Masoud Yazdani:
Language Visualisation: Applications and Theoretical Foundations of a Primitive-Based Approach. Artif. Intell. Rev. 9(2-3): 215-235 (1995) - 1993
- [j12]Ajit Narayanan, Lama Hashem:
Finite-state abstractions on Arabic morphology. Artif. Intell. Rev. 7(6): 373-399 (1993) - [c1]Ajit Narayanan, Lama Hashem:
On Abstract Finite-State Morphology. EACL 1993: 297-304 - 1992
- [j11]Ajit Narayanan:
Law, computers and AI. Artif. Intell. Rev. 6(2): 127-128 (1992) - 1991
- [j10]Hyacinth S. Nwana, Tony Drapkin, Tony Dodd, Leonard Bolc, Alan F. Smeaton, Ajit Narayanan:
Book reviews. Artif. Intell. Rev. 5(3): 205-234 (1991) - [j9]Ajit Narayanan:
Book review. Artif. Intell. Rev. 5(4): 287-297 (1991) - [j8]Brian Lings, Nat Adablah, Lou Foster, Yuanping Jin, Ajit Narayanan:
On a Human-Centred Approach to Database Systems. AI Soc. 5(2): 128-141 (1991)
1980 – 1989
- 1989
- [j7]Blay Whitby, John Rosbottom, Richard S. Forsyth, S. C. Hand, Janice Clausen, Leonard Bolc, Steve Hedges, John Wolstencroft, Simon Ross, J. Garwood, Tony Dodd, Stephen J. Maskell, A. S. Bavan, Andrew Eliasz, Richard F. E. Sutcliffe, Ajit Narayanan:
Book reviews. Artif. Intell. Rev. 3(4): 281-326 (1989) - 1988
- [j6]Stephen J. Maskell, R. A. Cobley, Leonard Bolc, Ajit Narayanan, G. H. Hall, Richard S. Forsyth, Tony Dodd:
Book reviews. Artif. Intell. Rev. 2(1): 45-65 (1988) - [j5]Ajit Narayanan:
Editorial. Artif. Intell. Rev. 2(3): 141-142 (1988) - [j4]Ajit Narayanan:
Fodor and Pylyshyn on connectionism: an extended review and brief critique. Artif. Intell. Rev. 2(3): 195-213 (1988) - [j3]S. G. Langford, Ajit Narayanan, Richard S. Forsyth, Jon Nichol, Barbara Gorayska, Colin Beardon:
Book reviews. Artif. Intell. Rev. 2(3): 215-227 (1988) - 1987
- [j2]Ajit Narayanan:
AI and Accountability. AI Soc. 1(1): 60-62 (1987) - 1986
- [j1]Ajit Narayanan:
Slip intoLISP: How to choose aLISP interpreter. Artif. Intell. Rev. 1(1): 53-68 (1986) - 1985
- [b1]Ajit Narayanan, Noel E. Sharkey:
Introduction to LISP. Ellis Horwood series in computers and their applications, Ellis Horwood 1985, ISBN 978-0-13-485913-2, pp. 1-227
Coauthor Index
aka: Edward C. Keedwell
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint