Research - Selected Journal Articles

2012

  • Abawajy, J. and Kelarev, A.V. (2012) Classification systems based on combinatorial semigroups, Semigroup forum, pp. 1-10, Springer, New York, N.Y.
  • Bedregal, Benjamin, Beliakov, Gleb, Bustince, Humberto, Calvo, Tomasa, Mesiar, Radko and Paternain, Daniel (2012) A class of fuzzy multisets with a fixed number of memberships, Information sciences, vol. 189, pp. 1-17, Elsevier, Philadelphia, Pa.
  • Beliakov, G., Johnstone, M. and Nahavandi, S. (2012) Computing of high breakdown regression estimators without sorting on graphics processing units, Computing, vol. 94, no. 5, pp. 433-447, Springer-Verlag, Wien, Austria.
  • Beliakov, Gleb and Li, Gang (2012) Improving the speed and stability of the k-nearest neighbors method, Pattern recognition letters, vol. 33, no. 10, pp. 1296-1301, Elsevier BV, Amsterdam, Netherlands.
  • Beliakov, Gleb, Bustince, Humberto, James, Simon, Calvo, Tomasa and Fernandez, Javier (2012) Aggregation for Atanassov's intuitionistic and interval valued fuzzy sets: the median operator, IEEE transactions on fuzzy systems, vol. 20, no. 3, pp. 487-498, IEEE, Piscataway, N.J.
  • Beliakov, Gleb, Bustince, Humbeto and Paternain, Daniel (2012) Image reduction using means on discrete product lattices, IEEE transactions on image processing, vol. 21, no. 3, pp. 1070-1083, IEEE, Piscataway, N. J.
  • Beliakov, Gleb, Johnstone, Michael, Creighton, Doug and Wilkin, Tim (2012) An efficient implementation of Bailey and Borwein's algorithm for parallel random number generation on graphics processing units, Computing, pp. 1-18, Springer Wien, Wein, Austria.
  • Beliakov, Gleb, Yearwood, John and Kelarev, Andrei (2012) Application of rank correlation, clustering and classification in information security, Journal of networks, vol. 7, no. 6, pp. 935-945, Academy Publisher, Oulu, Finland.
  • Beloglazov, Anton, Abawajy, Jemal and Buyya, Rajkumar (2012) Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing, Future generation computer systems, vol. 28, no. 5, pp. 755-768, Elsevier BV, Amsterdam, Netherlands.
  • Church, Phillip C., Goscinski, Andrzej and Lefevre, Christophe (2012) EXP-PAC : providing comparative analysis and storage of next generation gene expression data, Genomics, vol. 100, no. 1, pp. 8-13, Academic Press, Maryland Heights, MO.
  • Cui, Yongrui, Li, Mingchu, Xiang, Yang, Ren, Yizhi and Cesare, Silvio (2012) A QoS-based fine-grained reputation system in the grid environment, Concurrency computation : practice and experience, vol. 24, no. 17, pp. 1990-2006, John Wiley & Sons, Chichester, England.
  • Doss, Robin, Zhou, Wanlei, Sundaresan, Saravanan, Yu, Shui and Gao, Longxiang (2012) A minimum disclosure approach to authentication and privacy in RFID systems, Computer networks, vol. 56, no. 15, pp. 3401-3416, Elsevier BV, Amsterdam, The Netherlands.
  • Gao, Longxiang, Li, Ming, Bonti, Alessio, Zhou, Wanlei and Yu, Shui (2012) M-Dimension : multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models, Journal of network and computer applications, vol. 35, no. 4, pp. 1285-1296, Elsevier, Amsterdam, The Netherlands.
  • Hou, Jingyu and Chi, Xiaoxiao (2012) Predicting protein functions from PPI networks using functional aggregation, Mathematical biosciences, vol. 240, no. 1, pp. 63-69, Elsevier, Philadelphia, Pa.
  • Islam, Rafiqul, Tian, Ronghua, Moonsamy, Veelasha and Batten, Lynn (2012) A comparison of the classification of disparate malware collected in different time periods, Journal of networks, vol. 7, no. 6, pp. 946-955, Academy Publisher, Oulu, Finland.
  • Javadi, Bahman, Abawajy, Jemal and Buyya, Rajkumar (2012) Failure-aware resource provisioning for hybrid cloud infrastructure, Journal of parallel and distributed computing, vol. 72, no. 10, pp. 1318-1331, Academic Press, Maryland Heights, Mo.
  • Jiang, Jiao Jiao, Zhanga, Hai Bin and Yu, Shui (2012) An interior point trust region method for nonnegative matrix factorization, Neurocomputing, vol. 97, pp. 309-316, Elsevier BV, Amsterdam, The Netherlands.
  • Khayyam, Hamid, Abawajy, Jemal and Jazar, Reza N. (2012) Intelligent energy management control of vehicle air conditioning system coupled with engine, Applied thermal engineering, vol. 48, pp. 211-224, Pergamon, Oxford, England.
  • Khayyam, Hamid, Ranjbarzadeh, Hassan and Marano, Vincenzo (2012) Intelligent control of vehicle to grid power, Journal of power sources, vol. 201, pp. 1-9, Elsevier S.A., Lausanne, Switzerland.
  • Kumar, Amit, Wong, Adam K.L., Tizard, Mark L., Moore, Robert J. and Lefevre, Christophe (2012) miRNA_targets : a database for miRNA target predictions in coding and non-coding regions of mRNAs, Genomics, vol. 100, no. 6, pp. 352-356, Elsevier, Amsterdam, The Netherlands.
  • Li, Peng, Guo, Song, Xiang, Yong and Jin, Hai (2012) Unicast and broadcast throughput maximization in amplify-and-forward relay networks, IEEE transactions on vehicular technology, vol. 61, no. 6, pp. 2768-2776, IEEE, Piscataway, N. J.
  • Liu, Xinwang and Yu, Shui (2012) On the stress function-based OWA determination method with optimization criteria, IEEE transactions on systems, man, and cybernetics part b : cybernetics, vol. 42, no. 1, pp. 246-257, IEEE, Piscataway, N. J.
  • Liu, Xinwang, Pan, Yuwen, Xu, Yejun and Yu, Shui (2012) Least square completion and inconsistency repair methods for additively consistent fuzzy preference relations, Fuzzy sets and systems, vol. 198, pp. 1-19, Elsevier BV, Amsterdam, Netherlands.
  • Mason, L.R., Mak-Hau, Vicky H. and Ernst, A.T. (2012) An exact method for minimizing the total treatment time in intensity-modulated radiotherapy, Journal of the operational research society, vol. 63, no. 10, pp. 1447-1456, Palgrave MacMillan, London, England.
  • Natgunanathan, Iynkaran, Xiang, Yong, Rong, Yue, Zhou, Wanlei and Guo, Song (2012) Robust patchwork-based embedding and decoding scheme for digital audio watermarking, IEEE transactions on audio, speech and language processing, vol. 20, no. 8, pp. 2232-2239, Institute of Electrical and Electronics Engineers, Piscataway, N. J.
  • Patterson, Nicholas C. and Hobbs, Michael (2012) Virtual world security inspection, Journal of networks, vol. 7, no. 6, pp. 895-907, Academy Publisher, Oulu, Finland.
  • Peng, Dezhong, Yi, Zhang, Xiang, Yong and Zhang, Haixian (2012) A globally convergent MC algorithm with an adaptive learning rate, IEEE transactions on neural networks and learning systems, vol. 23, no. 2, pp. 359-365, IEEE, Piscataway, N. J.
  • Pradera, Ana, Beliakov, Gleb and Bustince, Humberto (2012) Aggregation functions and contradictory information, Fuzzy sets and systems, vol. 191, pp. 41-61, Elsevier BV, Amsterdam, Netherlands.
  • Rong, Jia, Vu, Huy Quan, Law, Rob and Li, Gang (2012) A behavioral analysis of web sharers and browsers in Hong Kong using targeted association rule mining, Tourism management, vol. 33, no. 4, pp. 731-740, Pergamon, Oxford, U. K.
  • Rong, Yue, Khandaker, Muhammad R. A. and Xiang, Yong (2012) Channel estimation of dual-hop MIMO relay system via parallel factor analysis, IEEE transactions on wireless communications, vol. 11, no. 6, pp. 2224-2233, IEEE, Piscataway, N. J.
  • Tang, Feilong, You, Ilsun, Tang, Can and Yu, Sui (2012) A profiling based task scheduling approach for multicore network processors, Concurrency computation : practice and experience, pp. 1-15, John Wiley & Sons, London, England.
  • Tang, Feilong, You, Ilsun, Yu, Shui, Wang, Cho-Li, Guo, Minyi and Liu, Wenlong (2012) An efficient deadlock prevention approach for service oriented transaction processing, Computers and mathematics with applications, vol. 63, pp. 458-468, Pergamon, Oxford, England.
  • Van den Bergh, Norbert, Carminati, John, Karimian, Hamid Reza and Huf, Peter (2012) Shear-free perfect fluids with a solenoidal electric curvature, Classical and quantum gravity, vol. 29, no. 10, pp. 1-9, Institute of Physics Publishing, Bristol, England.
  • Vu, Huy Quan, Liu, Shaowu, Yang, Xinghua, Li, Zhi and Ren, Yongli (2012) Identifying microphone from noisy recordings by using representative instance one class-classification approach, Journal of networks, vol. 7, no. 6, pp. 908-917, Academy Publisher, Oulu, Finland.
  • Vu, Huy, Quan, Li, Gang, Sukhorukova, Nadezda, S., Beliakov, Gleb, Liu, Shaowu, Philippe, Carole, Amiel, Helene and Ugon, Adrien (2012) K-Complex Detection Using a Hybrid-Synergic Machine Learning Method, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. PP, no. 99, pp. 1-13, Institute of Electrical and Electronics Engineers, Piscataway, NJ.
  • Vu, K.T., Jefferson, G. F. and Carminati, J. (2012) Finding higher symmetries of differential equations using the MAPLE package DESOLVII, Computer physics communications, vol. 183, no. 4, pp. 1044-1054, Elsevier, Amsterdam, The Netherlands.
  • Wang, Yu, Xiang, Yang, Zhou, Wanlei and Yu, Shunzheng (2012) Generating regular expression signatures for network traffic classification in trusted network management, Journal of network and computer applications, vol. 35, no. 3, pp. 992-1000, Academic Press, London, U. K.
  • Wells, Jason, Barry, Robert Mathie and Spence, Aaron (2012) Using video tutorials as a carrot-and-stick approach to learning, IEEE transactions on education, vol. 55, no. 4, pp. 453-458, IEEE, Piscataway, N.J.
  • Wen, Sheng, Zhou, Wei, Wang, Yini, Zhou, Wanlei and Xiang, Yang (2012) Locating defense positions for thwarting the propagation of topological worms, IEEE Communications Letters, vol. 16, no. 4, pp. 560-563, IEEE, Piscataway, N.J.
  • Wen, Sheng, Zhou, Wei, Xiang, Yang and Zhou, Wanlei (2012) CAFS : a novel lightweight cache-based scheme for large-scale intrusion alert fusion, Concurrency computation : practice and experience, vol. 24, no. 10, pp. 1137-1153, John Wiley & Sons Ltd, West Sussex, U. K.
  • Xiang, Yong, Natgunanathan, Iynkaran, Peng, Dezhong, Zhou, Wanlei and Yu, Shui (2012) A dual-channel time-spread echo method for audio watermarking, IEEE transactions on information forensics and security, vol. 7, no. 2, pp. 383-392, IEEE Signal Processing Society, Piscataway, N.J.
  • Xie, Shengli, Yang, Liu, Yang, Jun-Mei, Zhou, Guoxu and Xiang, Yong (2012) Time-frequency approach to underdetermined blind source separation, IEEE transactions on neural networks and learning systems, vol. 23, no. 2, pp. 306-316, IEEE, Piscataway, N. J.
  • Yang, Zuyuan, Xiang, Yong, Xie, Shengli, Ding, Shuxue and Rong, Yue (2012) Nonnegative blind source separation by sparse component analysis based on determinant measure, IEEE transactions on neural networks and learning systems, vol. 23, no. 10, pp. 1601-1610, IEEE, Piscataway, N. J.
  • Yu, Shui, Zhao, Guofeng, Dou, Wanchun and James, Simon (2012) Predicted packet padding for anonymous web browsing against traffic analysis attacks, IEEE transactions on information forensics and security, vol. 7, no. 4, pp. 1381-1393, IEEE, Piscataway, N. J.
  • Yu, Shui, Zhou, Wanlei, Jia, Weijia and Hu, Jiankun (2012) Attacking anonymous web browsing at local area networks through browsing dynamics, Computer journal, vol. 55, no. 4, pp. 410-421, Oxford University Press, Oxford, England.
  • Yu, Shui, Zhou, Wanlei, Jia, Weijia, Guo, Song, Xiang, Yong and Tang, Feilong (2012) Discriminating DDoS attacks from flash crowds using flow correlation coefficient, IEEE transactions on parallel and distributed systems, vol. 23, no. 6, pp. 1073-1080, IEEE, Piscataway, N. J.
  • Yu, Yanli, Li, Kequi, Zhou, Wanlei and Li, Ping (2012) Trust mechanisms in wireless sensor networks : attack analysis and countermeasures, Journal of network and computer applications, vol. 35, no. 3, pp. 867-880, Elsevier, Amsterdam, The Netherlands.
  • Zhang, Taiping, Tang, Yuan Yan, Fang, Bin and Xiang, Yong (2012) Document clustering in correlation similarity measure space, IEEE transactions on knowledge and data engineering, vol. 24, no. 6, pp. 1002-1013, IEEE, Piscataway, N. J.
  • Zhu, Wei, Hou, Jingyu and Chen, Yi-Ping Phoebe (2012) Exploiting multi-layered information to iteratively predict protein functions, Mathematical biosciences, vol. 236, no. 2, pp. 108-116, Elsevier, Philadelphia, Pa.

Return to top


Back to top