Sandeep Dhakal

Sandeep Dhakal
  • PostDoc Position at Agriculture and Food, The Commonwealth Scientific and Industrial Research Organisation

About

27
Publications
3,003
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
607
Citations
Current institution

Publications

Publications (27)
Conference Paper
Full-text available
Digital Twins (DTs), which are dynamic virtual representations of physical objects or systems across multiple stages of their lifecycle, support understanding, reasoning and decision-making about those systems (Jones et al. 2020). Inspired by their success in the management of man-made systems, there has been a recent push towards creating DTs of t...
Article
Full-text available
We present an evolutionary game model that integrates the concept of tags, trust and migration to study how trust in social and physical groups influence cooperation and migration decisions. All agents have a tag, and they gain or lose trust in other tags as they interact with other agents. This trust in different tags determines their trust in oth...
Article
Accurate identification of malicious web domains is crucial for protecting users from the risks of theft of private information, malware attack, and monetary loss. Various methods, including blacklist and machine learning-based models, have been proposed to identify malicious web domains effectively. However, maintaining an up-to-date blacklist is...
Article
Facial expression recognition (FER) is an active research area that has attracted much attention from both academics and practitioners of different fields. In this paper, we investigate an interesting and challenging issue in FER, where the training and testing samples are from a cross-domain dictionary. In this context, the data and feature distri...
Article
Financial news disclosures provide valuable information for traders and investors while making stock market investment decisions. Essential but challenging, the stock market prediction problem has attracted significant attention from both researchers and practitioners. Conventional machine learning models often fail to interpret the content of fina...
Article
Numerous studies on mental depression have found that tweets posted by users with major depressive disorder could be utilized for depression detection. The potential of sentiment analysis for detecting depression through an analysis of social media messages has brought increasing attention to this field. In this article, we propose 90 unique featur...
Article
We present an evolutionary trust game to investigate the formation of trust in sharing economy situations, where participants have a fixed provider or consumer role, and can only choose between trustworthy or untrustworthy behaviour. There are a variety of sharing economy platforms catering for differing goods and services, the properties of which...
Chapter
Over 300 million people worldwide were suffering from depression in 2017. Australia alone invests more than $9.1 billion each year on mental health related services. Traditional intervention methods require patients to first present with symptoms before diagnosis, leading to a reactive approach. A more proactive approach to this problem is highly d...
Article
Full-text available
The interior search algorithm (ISA) is an optimization algorithm inspired by esthetic techniques used for interior design and decoration. The algorithm has only one parameter, controlled by θ, and uses an evolutionary boundary constraint handling (BCH) strategy to keep itself within an admissible solution space while approaching the optimum. We app...
Article
Depression is one of the leading causes of suicide worldwide. However, a large percentage of cases of depression go undiagnosed and, thus, untreated. Previous studies have found that messages posted by individuals with major depressive disorder on social media platforms can be analysed to predict if they are suffering, or likely to suffer, from dep...
Article
The financial impact of positive reviews has prompted some fraudulent sellers to generate fake product reviews for either promoting their products or discrediting competing products. Many e-commerce portals have implemented measures to detect such fake reviews, and these measures require excellent detectors to be effective. In this work, we propose...
Article
Energy-efficient production scheduling research has received much attention because of the massive energy consumption of the manufacturing process. In this paper, we study an energy-efficient job-shop scheduling problem with sequence-dependent setup time (EJSP-SDST), aiming to minimize the makespan, total tardiness and total energy consumption simu...
Article
Full-text available
Ensemble learning is increasingly used in sentiment analysis. Determining the parameter settings of ensemble models, however, is not easy. Besides its own parameters, an ensemble model has base-predictors that have their individual parameters. Some ensemble models use a specific base-predictor and could be optimised using standard metaheuristics su...
Article
This paper presents a symbiotic organism search (SOS)-based support vector regression (SVR) ensemble for predicting the printed circuit board (PCB) cycle time of surface-mount-technology (SMT) production lines. Being able to predict the PCB cycle time accurately is essential for optimizing the SMT production schedule. Although a machine simulator c...
Article
We study the impact of climate change induced migration on the evolution of cooperation using an N-player social dilemma game. Players in the population are divided into non-overlapped groups, and they can choose to either cooperate or defect within their group. At the same time, the players are mapped to the nodes of a scale-free network, enabling...
Article
Full-text available
Due to severe congestion before the Three Gorges Dam, roll-on/roll-off and container carriers are encouraged to adopt water-land transshipment mode. Owing to high transit and road costs, however, carriers are reluctant to adopt this mode. In this paper, we study the spatial-temporal relationship between the transshipment mode and the transshipment...
Article
Purpose Despite the widespread use of mobile government (m-government) services in developed countries, the adoption and acceptance of m-government services among citizens in developing countries is relatively low. The purpose of this study is to explore the most critical determinants of acceptance and use of m-government services in a developing c...
Conference Paper
Full-text available
Migration is one of the many responses humans and societies make to ongoing demographic, economic, societal and environmental changes. In this work, we use agent-based modeling (ABM) to study the dynamics of migration flows across provinces and cities in the Mekong Delta, Vietnam. The strength of ABM is that it allows a bottom-up approach that focu...
Article
Residuary resistance prediction is an important initial step in the process of designing a sailing yacht. Being able to predict the residuary resistance accurately is crucial for calculating the required propulsive power and ensuring good performance of the sailing yacht. This paper presents a two-layer Wang-Mendel (WM) fuzzy approach to improve th...
Conference Paper
The Travelling Salesman Problem (TSP), one of the most famous combinatorial optimisation problems, has been widely studied for half a century now. The state-of-the-art solutions proposed in recent years seem to have focused on the nature-inspired algorithms. While good performance has been reported for many of these algorithms, they are considerabl...
Conference Paper
Personal Firewall is a popular and common installation choice on personal computers nowadays. It is expected to provide higher Internet security by employing Internet access controls. In this paper, we discuss the insecurity of most personal firewalls on Microsoft Windows platform and the methodologies to bypass them. We show that personal firewall...
Conference Paper
This paper presents an implementation on modelling the database security using agent-based simulation (ABS). While ABS has been widely used for social simulations since the 1990s, not many previous studies have tried simulating scenarios in more technical domains and it is the main objective of this work to fill in the gap. We develop a database se...
Conference Paper
In multi-agent systems, complex and dynamic interactions often emerge among individual agents. The ability of each agent to learn adaptively is therefore important for them to survive in such changing environment. In this paper, we consider the effects of neighbourhood structure on the evolution of cooperative behaviour in the N-Player Iterated Pri...

Network

Cited By