Breadcrumb Links:

2009 Publications

Journal Articles (22)

Tier A* (4)

Q.-L. Han, "A discrete delay decomposition approach to stability of linear retarded and neutral systems," Automatica, vol. 45, no. 2, pp. 517-524, February 2009.
Q.-L. Han, "Improved stability criteria and controller design for linear neutral systems," Automatica, vol. 45, no. 8, pp. 1948-1952, August 2009.
Y. Xiang, W. Zhou, and M. Guo, "Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 4, pp. 567-580, 2009.
X.-M. Zhang and Q.-L. Han, "New Lyapunov-Krasovskii functionals for global asymptotic stability of delayed neural networks," IEEE Transactions on Neural Networks, vol. 20, no. 3, pp. 533-539, March 2009.

Tier A (8)

Q.-L. Han, D. Mehdi, and D. Han, "Master-slave synchronization of Lur'e systems with general sector-bounded nonlinearities," International Journal of Bifurcation and Chaos, vol. 19, no. 2, pp. 517-529, February 2009.
M. Zhong and Q.-L. Han, "Fault tolerant master-slave synchronization for Lur'e systems using time-delay feedback control," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 56, no. 7, pp. 1391-1404, July 2009.
X.-M. Zhang and Q.-L. Han, "A delay decomposition approach to delay-dependent stability for linear systems with time-varying delays," International Journal of Robust and Nonlinear Control, vol. 19, no. 17, pp. 1922-1930, November 2009 (Published Online: Mar 27 2009 6:38AM DOI: 10.1002/rnc.1413).
X.-M. Zhang and Q.-L. Han, "A less conservative method for designing filters for linear time-delay systems," International Journal of Robust and Nonlinear Control, vol. 19, no. 12, pp. 1376-1396, August 2009.
W. Zhou, and Y. Xiang, "Network and System Security," Journal of Network and Computer Applications (Elsevier), vol. 32, no. 2, pp. 345-346, 2009.
Y. Xiang, and W. Zhou, "Multi-core Supported Network and System Security," Concurrency and Computation: Practice and Experience (Wiley), vol. 21, no. 10, pp. 1251-1253, 2009.
R. Islam, W. Zhou, Y. Xiang and A.N Mahmood, "Spam Filtering for Network Traffic Security on a Multi-core Environment," Concurrency and Computation: Practice and Experience (Wiley), vol. 21, no. 10, pp. 1307-1320, 2009.
R. Islam, W. Zhou, M. Guo and Y. Xiang, "An Innovative Analyser for Email Classification Based on Grey List Analysis," Journal of Network and Computer Applications (Elsevier), vol. 32, no. 2, pp. 357-366, 2009.

Tier B (7)

X. Fan, and B. Verma, Selection and Fusion of Facial Features for Face Recognition, Expert Systems with Applications, vol. 36, pp. 7157-7159, Elsevier Science, 2009.
W. W. Guo, M.M. Li, G. Whymark and Z.X. Li, Mutual complement between statistical and neural network approaches for rock magnetism data analysis. Expert Systems with Applications, 36, 9678-9682, 2009.
X.-M. Zhang and Q.-L. Han, "A new stability criterion for a partial element equivalent circuit model of neutral type," IEEE Transactions on Circuits and Systems -II: Express Briefs, vol. 56, no. 10, pp. 798-802, October 2009.
X.-M. Zhang and Q.-L. Han, "A delay decomposition approach to control of networked control systems," European Journal of Control, vol. 15, no. 5, pp. 523-533, September 2009.
M. Li, W. Guo, B. Verma, K. Tickle and J. O'Connor, "Intelligent methods for solving inverse problems of backscattering spectra with noise: a comparison between neural networks and simulated annealing" Neural Computing and Applications, Vol.18, p423-430, 2009.
T.H.E. Meuwissen, T.R.Solberg, R. Shepherd and J.A.W. Woolliams, A fast algorithm for Bayes B type prediction of genome-wide estimates of genetic value. Genetics Selection Evolution. 41:2. (doi:10.1186/1297-9686-41-2), 2009.
Y. Xiang, "Managing Email Overload with an Automatic Nonparametric Clustering System," The Journal of Supercomputing, vol. 48, no. 3, pp. 227-242, 2009.

Tier C (1)

D. Tian, Y. Liu, and Y. Xiang, "Large-scale Network Intrusion Detection Based on Distributed Learning Algorithm," International Journal of Information Security (Springer), vol. 8, no. 1, pp. 25-35, 2009.

Unranked (2)

A. Chonka, W. Zhou, L. Ngo, Y. Xiang et al., "Ubiquitous Multicore (UM) Methodology for Multimedia," International Journal of Multimedia and Ubiquitous Engineering, vol. 4, no. 2, pp. 145-156, 2009.
Y. Xiang, X. Fan, and W. T. Zhu, "Propagation of Active Worms: A Survey," International Journal of Computer Systems Science & Engineering, vol. 24, no. 2, pp. 157-172, 2009.

Conference Papers (18)

A. Chonka, W. Zhou, and Y. Xiang, "Defending Grid Web Services from XDoS attacks by SOTA," in Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications, 2009.
S. Ali and D. Pun, "Electrofused Magnesium Oxide Classification Using Digital Image Processing and Machine Learning Techniques", Proceeding of The IEEE International Conference on Industrial Technology (ICIT 2009), 10-13 February 2009, Australia.
A. Jeeva, and W.W. Guo, Determining supply chain flexibility using statistics and neural networks: a comparative study. Proceedings of the Third International Conference on Network and System Security, pp. 506-509, 2009.
W.W. Guo, L.D. Li, and G. Whymark, Statistics and neural networks for approaching nonlinear relations between wheat plantation and production in Queensland of Australia. Proceedings of the IEEE International Conference on Industrial Technology (ICIT), pp. 1366-1369, 2009.
L.D. Li, X.H. Yu, X.D. Li and W.W. Guo, A modified PSO algorithm for constrained multi-objective optimization. Proceedings of the Third International Conference on Network and System Security, pp. 462-467, 2009.
Ke Ding and Qing-Long Han, "Synchronization criteria for Lur'e complex dynamical networks with coupling delays", Proceedings of the joint 48th IEEE Conference on Decision and Control and the 28th Chinese Control Conference, Shanghai, P. R. China, December 16-18, 2009, pp. 2754-2759.
R. K. Shepherd , T. H. E. Meuwissen and J. A. W. Woolliams, "Genomic selection using a fast EM algorithm 2. Analysis of simulated data". Proceedings of the 18th Conference of the Association for the Advancement of Animal Breeding and Genetics Adelaide, September, 2009. pp. 80-83. AAABG.
R. K. Shepherd and Woolliams JAW (2009). "Genomic selection using a fast EM algorithm 1. Understanding the methodology". Proceedings of the 18th Conference of the Association for the Advancement of Animal Breeding and Genetics Adelaide, September, 2009. pp. 84-87. AAABG.
J. Nahar, K. Tickle, S. Ali and P. Chen, "Diagnosis Heart Disease Using An Association Rule Discovery Approach" in Computational Intelligence (CI 2009) The Fourth IASTED International Conference on Computational Intelligence, August 17 - 19, 2009, Honolulu, Hawaii, USA, 2009. ACTA Press.
Verma, B. (2009). "Impact of Multiple Clusters on Neural Classification of ROIs in Digital Mammograms", in Proceedings of the 2009 International Joint Conference on Neural Networks, Atlanta, Georgia, USA., pp. 2532-2535. IEEE Press.
Lee, H. and Verma, B. (2009). "Binary Segmentation with Neural Validation for Cursive Handwriting Recognition", in Proceedings of the 2009 International Joint Conference on Neural Networks, Atlanta, Georgia, USA., pp. 2620-2625. IEEE Press.
Verma, B., Lee, H. and Zakos, J. (2009). "An Automatic Intelligent Language Classifier", in LNCS Vol. 5507: Advances in Neuro-Information Processing: 15th International Conference, ICONIP 2008, Auckland, New Zealand, November 25-28, 2008, Revised Selected Papers, pp. 639-636. Springer-Verlag.
S.A. Wasimi, Sustainability in large-scale water resources project planning. Proceedings of the Central Region Engineering Conference, CREC 2009. Engineers Australia and CQ University. 14-15 August 2009. Paper No. 9.
S. Wasimi, 'Climate change trends in Bangladesh ' in Saleh, Abul (eds.) Proceedings of the Second International Conference on Water and Flood Management. Dhaka, Bangladesh, 15-17 March 2009, pp. 203-210.
X. Fan, and Y. Xiang, "Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation," in 6th IFIP International Conference on Network and Parallel Computing (NPC 2009), 2009, pp. 182-189.
W. T. Zhu, and Y. Xiang, "Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks," in 6th International Conference on Autonomic and Trusted Computing (ATC 2009), Springer LNCS 5586, 2009, pp. 164-178.
Y. Zhang, K. Wang, K. Li, W. Qu, and Y. Xiang., "A Time-decay Based P2P Trust Model," in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009, pp. 235-238.
Xian-Ming Zhang, Qing-Long Han, and Dongsheng Han, "Effects of small time-delays on dynamic output feedback control of offshore steel jacket structure subject to wave-induced forces", Proceedings of the joint 48th IEEE Conference on Decision and Control and the 28th Chinese Control Conference, Shanghai, P. R. China, December 16-18, 2009, pp. 1812-1817.

Book Chapters (4)

S. Ali, , 'Support vector machine: itself an intelligent systems' in M Syed and S Syed (eds), Handbook of Research on Modern Systems Analysis and Design Technologies and Applications, IGI Global, Hershey PA, 2009.
Rönnquist, R and Jarvis, D. (2009), "Interoperability with Goal-Oriented Teams (GORITE)", in Fischer, K., Müller, J.P., Odell, J. and Berre, A. J. (Eds.) Agent-Based Technologies and Applications for Enterprise Interoperability International Workshops, ATOP 2005 Utrecht, The Netherlands, July 25-26, 2005, and ATOP 2008, Estoril, Portugal, May 12-13, 2008, Revised Selected Papers, Lecture Notes in Business Information Processing, Vol. 25, pp.118-128. Springer 2009.
Z. Hassan, Z. and B. Verma, "Hybrid data mining approach for medical applications," Handbook of Research on Modern Systems Analysis and Design Technologies and Applications, Information Science Reference, New York, USA, 2009.
Yang Xiang, and Daxin Tian, "Multi-core Supported Deep Packet Inspection", The Handbook of Research on Scalable Computing Technologies, K.-C. Li, C.-H. Hsu, L. T. Yang et al., eds., pp. 858-873, IGI Global, 2009.

Edited Conference Proceedings (1)

Ali, S. and Xiang, Y. (Eds.) (2009) Dynamic and Advanced Data Mining for Progressing Technological Development: Innovations and Systemic Approaches, IGI Global, USA, ISBN: 978-1-60566-908-3, 2009.