Big-Data analytics and cloud computing: Theory, algorithms and applications

Book


Hill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying 2015. Big-Data analytics and cloud computing: Theory, algorithms and applications. Springer.
AuthorsHill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying
Abstract

This book reviews the theoretical concepts, leading-edge techniques and practical tools involved in the latest multi-disciplinary approaches addressing the challenges of big data. Illuminating perspectives from both academia and industry are presented by an international selection of experts in big data science. Topics and features: describes the innovative advances in theoretical aspects of big data, predictive analytics and cloud-based architectures; examines the applications and implementations that utilize big data in cloud architectures; surveys the state of the art in architectural approaches to the provision of cloud-based big data analytics functions; identifies potential research directions and technologies to facilitate the realization of emerging business models through big data approaches; provides relevant theoretical frameworks, empirical research findings, and numerous case studies; discusses real-world applications of algorithms and techniques to address the challenges of big datasets.

KeywordsBig Data analytics; Cloud computing
ISBN9783319253138
Web address (URL)http://hdl.handle.net/10545/620922
hdl:10545/620922
File
File Access Level
Open
Publication dates2015
Publication process dates
Deposited21 Nov 2016, 12:08
Year2015
PublisherSpringer
ContributorsUniversity of Derby
Permalink -

https://repository.derby.ac.uk/item/94833/big-data-analytics-and-cloud-computing-theory-algorithms-and-applications

Download files


File
license.txt
File access level: Open

  • 139
    total views
  • 0
    total downloads
  • 13
    views this month
  • 0
    downloads this month

Export as

Related outputs

Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things
Jan, S.R., Ghaleb, B., Tariq, U.U., Ali, H., Sabrina, F. and Liu, L. 2024. Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things. Electronics. 13 (9), pp. 1-17. https://doi.org/10.3390/electronics13091651
A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA
Gilani, S. Y., Anjum, A., Khan, A., Khan, A., Syed, M. H., Moqurrab, S. A. and Srivastava, G. 2024. A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA. Internet of Things. pp. 1-21. https://doi.org/10.1016/j.iot.2024.101066
A Secure and Privacy Preserved Infrastructure for VANETs based on Federated Learning with Local Differential Privacy
Batool, H., Anjum, A., Khan, A., Izzo, S., Mazzocca, C. and Jeon, G. 2023. A Secure and Privacy Preserved Infrastructure for VANETs based on Federated Learning with Local Differential Privacy. Elsevier Information Sciences. 652. https://doi.org/10.1016/j.ins.2023.119717
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning
Sikandar, H. S., Malik, S. R., Anjum, A., Khan, A. and Jeon, G. 2023. Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Generation Computer Systems. 149, pp. 518-530. https://doi.org/10.1016/j.future.2023.07.037
An Efficient and Privacy-preserving Blockchain-based Secure Data Aggregation in Smart Grids
Mahmood, A., Khan, A., Anjum, A., Maple, C. and Jeon, G. 2023. An Efficient and Privacy-preserving Blockchain-based Secure Data Aggregation in Smart Grids. Sustainable Energy Technologies and Assessments. 60, pp. 1-11. https://doi.org/10.1016/j.seta.2023.103414
Privacy Preservation in the Internet of Vehicles using Local Differential Privacy and IOTA Ledger
Iftikhar, Z., Anjum, A., Jeon, G., Shah, M. A. and Khan, A. 2023. Privacy Preservation in the Internet of Vehicles using Local Differential Privacy and IOTA Ledger. Springer Cluster Computing . pp. 1-17. https://doi.org/10.1007/s10586-023-04002-0
Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing
Amin, Z., Anjum, A., Khan, A., Ahmad, A. and Jeon, G. 2022. Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing. Electronics. 11 (8), p. 1257. https://doi.org/10.3390/electronics11081257
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
Kanwal, T., Attaullaha, H., Anjum, A., Khan, A. and Jeon, G. 2022. Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. Elsevier Digital Communications and Networks. pp. 1-16. https://doi.org/10.1016/j.dcan.2022.09.025
Explaining deep neural networks: A survey on the global interpretation methods
Saleem, R., Yuan, B., Kurugollu, F., Anjum, A. and Liu, L. 2022. Explaining deep neural networks: A survey on the global interpretation methods. Neurocomputing. 513, pp. 165-180. https://doi.org/10.1016/j.neucom.2022.09.129
A unified graph model based on molecular data binning for disease subtyping
Hassan Zada, M., Yuan, B, Khan, W., Anjum, A., Reiff-Marganiec, S. and Saleem, R. 2022. A unified graph model based on molecular data binning for disease subtyping. Journal of Biomedical Informatics. pp. 1-24. https://doi.org/10.1016/j.jbi.2022.104187
Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs)
Zada, Muhammad Sadiq Hassan, Yuan, Bo, Anjum, Ashiq, Azad, Muhammad Ajmal, Khan, Wajahat Ali and Reiff-Marganiec, Stephan 2020. Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs). IEEE. https://doi.org/10.1109/bdcat50828.2020.00028
Explaining probabilistic Artificial Intelligence (AI) models by discretizing Deep Neural Networks
Saleem, Rabia, Yuan, Bo, Kurugollu, Fatih and Anjum, Ashiq 2020. Explaining probabilistic Artificial Intelligence (AI) models by discretizing Deep Neural Networks. IEEE. https://doi.org/10.1109/ucc48980.2020.00070
NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles
Ahmad, F., Kurugollu, Fatih, Kerrache, Chaker Abdelaziz, Sezer, Sakir and Liu, Lu 2021. NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2021.3049189
Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare
Tariq, Umair Ullah, Ali, Haider, Liu, Lu, Hardy, J., Kazim, M. and Ahmed, Waqar 2021. Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare. IEEE Transactions on Green Communications and Networking. https://doi.org/10.1109/tgcn.2021.3056479
Embedded Data Imputation for Environmental Intelligent Sensing: A Case Study
Erhan, Laura, Di Mauro, Mario, Anjum, Ashiq, Bagdasar, Ovidiu, Song, Wei and Liotta, Antonio 2021. Embedded Data Imputation for Environmental Intelligent Sensing: A Case Study. Sensors. 21 (23), p. 7774. https://doi.org/10.3390/s21237774
Intelligent price alert system for digital assets - cryptocurrencies
Chhem, Sronglong, Anjum, Ashiq and Arshad, Bilal 2019. Intelligent price alert system for digital assets - cryptocurrencies. ACM Press. https://doi.org/10.1145/3368235.3368874
Congestion prediction for smart sustainable cities using IoT and machine learning approaches
Majumdar, Sharmila, Subhani, Moeez M., Roullier, Benjamin, Anjum, Ashiq and Zhu, Rongbo 2020. Congestion prediction for smart sustainable cities using IoT and machine learning approaches. Sustainable Cities and Society. 64, p. 102500. https://doi.org/10.1016/j.scs.2020.102500
An experimental online judge system based on docker container for learning and teaching assistance
Yibo, Han, Zhang, Zheng, Yuan, Bo, Bi, Haixia, Shahzad, Mohammad Nasir and Liu, Lu 2020. An experimental online judge system based on docker container for learning and teaching assistance. IEEE. https://doi.org/10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00264
A privacy-preserved probabilistic routing index model for decentralised online social networks
Yuan, Bo, Gu, Jiayan and Liu, Lu 2020. A privacy-preserved probabilistic routing index model for decentralised online social networks. IEEE. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00305
A deep reinforcement learning based homeostatic system for unmanned position control
Manning, Warren, Anjum, Ashiq, Bower, Craig and Dassanayake, Priyanthi 2019. A deep reinforcement learning based homeostatic system for unmanned position control. Association for Computing Machinery.
Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks
Liu, Xiaozhu, Zhu, Rongbo, Anjum, Ashiq, Wang, Jun, Zhang, Hao and Ma, Maode 2019. Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks. Future Generation Computer Systems. 104, pp. 1-14. https://doi.org/10.1016/j.future.2019.10.001
Fog computing-based approximate spatial keyword queries with numeric attributes in IoV
Li, Yanhong, Zhu, Rongbo, Mao, Shiwen and Anjum, Ashiq 2020. Fog computing-based approximate spatial keyword queries with numeric attributes in IoV. IEEE Internet of Things. https://doi.org/10.1109/jiot.2020.2965730
A cascade learning approach for automated detection of locomotive speed sensor using imbalanced data in ITS
Li, Bo, Zhou, Sisi, Cheng, Lifang, Zhu, Rongbo, Hu, Tao, Anjum, Ashiq, He, Zheng and Zou, Yongkai 2019. A cascade learning approach for automated detection of locomotive speed sensor using imbalanced data in ITS. IEEE Access. 7, pp. 90851-90862. https://doi.org/10.1109/access.2019.2928224
Exploring network embedding for efficient message routing in opportunistic mobile social networks
Yuan, Bo, Anjum, Ashiq, Panneerselvam, J. and Liu, Lu 2020. Exploring network embedding for efficient message routing in opportunistic mobile social networks. IEEE. https://doi.org/10.1109/ICDMW.2019.00077
Graph data modelling for genomic variants
Anjum, Ashiq and Aizad, Sanna 2019. Graph data modelling for genomic variants.
Multiclass disease predictions based on integrated clinical and genomics datasets
Anjum, Ashiq and Subhani, Moeez 2019. Multiclass disease predictions based on integrated clinical and genomics datasets. IARIA.
Improved Kalman filter based differentially private streaming data release in cognitive computing.
Wang, Jun, Luo, Jing, Liu, Xiaozhu, Li, Yongkai, Liu, Shubo, Zhu, Rongbo and Anjum, Ashiq 2019. Improved Kalman filter based differentially private streaming data release in cognitive computing. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2019.03.050
Intelligent augmented keyword search on spatial entities in real-life internet of vehicles
Li, Yanhong, Wang, Meng, Du, Xiaokun, Feng, Yuhe, Luo, Changyin, Tian, Shasha, Anjum, Ashiq and Zhu, Rongbo 2018. Intelligent augmented keyword search on spatial entities in real-life internet of vehicles. Future Generation Computer Systems. 94, pp. 697-711. https://doi.org/10.1016/j.future.2018.12.051
Language model-based automatic prefix abbreviation expansion method for biomedical big data analysis
Anjum, Ashiq 2019. Language model-based automatic prefix abbreviation expansion method for biomedical big data analysis. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2019.01.016
Machine-learning-based side-channel evaluation of elliptic-curve cryptographic FPGA processor.
Mukhtar, Naila, Mehrabi, Mohamad, Kong, Yinan and Anjum, Ashiq 2018. Machine-learning-based side-channel evaluation of elliptic-curve cryptographic FPGA processor. Applied Sciences. 9 (1), p. 64. https://doi.org/10.3390/app9010064
An efficient evolutionary user interest community discovery model in dynamic social networks for internet of people
Jiang, Liang, Shi, Leilei, Lu, Liu, Yao, Jingjing, Yuan, Bo and Zheng, Yongjun 2019. An efficient evolutionary user interest community discovery model in dynamic social networks for internet of people. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2019.2893625
Petri net-based methods for analyzing structural security in e-commerce business processes
Ding, Zhijun, Liu, Lu, Wang, Xiaoming, Crossley, Richard David, Yu, Wangyang and Wangyang, Yu 2018. Petri net-based methods for analyzing structural security in e-commerce business processes. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2018.04.090
A GRU-based prediction framework for intelligent resource management at cloud data centres in the age of 5G
Lu, Yao, Liu, Lu, Panneerselvam, J., Yuan, Bo, Gu, Jiayan and Antonopoulos, Nick 2019. A GRU-based prediction framework for intelligent resource management at cloud data centres in the age of 5G. IEEE Transactions on Cognitive Communications and Networking. 6 (2), pp. 486-498. https://doi.org/10.1109/tccn.2019.2954388
An inductive content-augmented network embedding model for edge artificial intelligence
Yuan, Bo, Panneerselvam, J., Liu, Lu, Antonopoulos, Nick and Lu, Yao 2019. An inductive content-augmented network embedding model for edge artificial intelligence. IEEE Transactions on Industrial Informatics. 15 (7), pp. 4295-4305. https://doi.org/10.1109/TII.2019.2902877
A load-balancing mechanism for distributed SDN control plane using response time.
Cui, Jie, Lu, Qinghe, Zhong, Hong, Tian, Miaomiao and Liu, Lu 2018. A load-balancing mechanism for distributed SDN control plane using response time. IEEE Transactions on Network and Service Management. https://doi.org/10.1109/TNSM.2018.2876369
Providing traceability for neuroimaging analyses.
McClatchey, Richard, Branson, Andrew, Anjum, Ashiq, Bloodsworth, Peter, Habib, Irfan, Munir, Kamran, Shamdasani, Jetendr and Soomro, Kamran 2013. Providing traceability for neuroimaging analyses. International Journal of Medical Informatics.
CMS workflow execution using intelligent job scheduling and data access strategies.
Hasham, Khawar, Delgado Peris, Antonio, Anjum, Ashiq, Evans, Dave, Gowdy, Stephen, Hernandez, José M., Huedo, Eduardo, Hufnagel, Dirk, van Lingen, Frank, McClatchey, Richard and Metson, Simon 2011. CMS workflow execution using intelligent job scheduling and data access strategies. IEEE Transactions on Nuclear Science. https://doi.org/10.1109/TNS.2011.2146276
Context-aware service utilisation in the clouds and energy conservation.
Kiani, Saad Liaquat, Anjum, Ashiq, Antonopoulos, Nick and Knappmeyer, Michael 2012. Context-aware service utilisation in the clouds and energy conservation. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-012-0131-1
Exploiting in-memory systems for gnomic data analysis.
Shah, Zeeshan Ali, El-Kalioby, Mohamed, Faquih, Tariq, Shokrof, Moustafa, Subhani, Shazia, Alnakhli, Yasser, Aljafar, Hussain, Anjum, Ashiq and Abouelhoda, Mohamed 2018. Exploiting in-memory systems for gnomic data analysis. Springer. https://doi.org/10.1007/978-3-319-78723-7_35
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.
Cui, Jie, Shao, Lili, Zhong, Hong, Xu, Yan and Liu, Lu 2017. Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-017-0581-5
Efficient service discovery in decentralized online social networks.
Yuan, Bo, Liu, Lu and Antonopoulos, Nikolaos 2017. Efficient service discovery in decentralized online social networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.04.022
A novel multilevel index model for distributed service repositories.
Xu, Zhao, Wu, Yan, Miao, Dejun and Liu, Lu 2017. A novel multilevel index model for distributed service repositories. Tsinghua Science and Technology. https://doi.org/10.23919/TST.2017.7914199
Link quality aware channel allocation for multichannel body sensor networks.
Gao, Weifeng, Zhao, Zhiwei, Min, Geyong, Cao, Yue, Duan, Hancong, Liu, Lu, Long, Yimiao and Yin, Guangqiang 2017. Link quality aware channel allocation for multichannel body sensor networks. Pervasive and Mobile Computing. https://doi.org/10.1016/j.pmcj.2017.02.004
Public auditing with privacy protection in a multi-user model of cloud-assisted body sensor networks.
Li, Song, Cui, Jie, Zhong, Hong and Liu, Lu 2017. Public auditing with privacy protection in a multi-user model of cloud-assisted body sensor networks. Sensors. https://doi.org/10.3390/s17051032
Performance formula-based optimal deployments of multilevel indices for service retrieval.
Wu, Yan, Xu, Wei, Liu, Lu and Miao, Dejun 2017. Performance formula-based optimal deployments of multilevel indices for service retrieval. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4265
Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks.
Zhong, Hong, Huang, Bo, Cui, Jie, Xu, Yan and Liu, Lu 2017. Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2782672
Energy-aware composition for wireless sensor networks as a service.
Zhou, Zhangbing, Zhao, Deng, Liu, Lu and Hung, Patrick C. K. 2017. Energy-aware composition for wireless sensor networks as a service. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.02.050
Cloud-based video analytics using convolutional neural networks.
Yaseen, M., Anjum, Ashiq, Farid, Mohsen and Antonopoulos, Nick 2018. Cloud-based video analytics using convolutional neural networks. Software Practice and Experience. https://doi.org/10.1002/spe.2636
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments.
Kazim, M., Liu, Lu, Zhu, Shao Ying and Zheng, Yongjun 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies.
Ahmad, F., Adnane, Asma, Franqueira, Virginia N. L., Kurugollu, Fatih and Liu, Lu 2018. Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies. Sensors. 18 (11), p. 4040. https://doi.org/10.3390/s18114040
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres.
Panneerselvam, J., Liu, Lu, Lu, Yao and Antonopoulos, Nikolaos 2018. An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.12.064
Deep learning hyper-parameter optimization for video analytics in clouds.
Yaseen, M., Anjum, Ashiq, Rana, Omer and Antonopoulos, Nikolaos 2018. Deep learning hyper-parameter optimization for video analytics in clouds. IEEE Transactions on Systems, Man, and Cybernetics. https://doi.org/10.1109/TSMC.2018.2840341
Edge enhanced deep learning system for large-scale video stream analytics.
Muhammad, A., Anjum, Ashiq, Yaseen, M. Usman, Zamani, A. Reza, Balouek-Thomert, Daniel, Rana, Omer and Parashar, Manish 2018. Edge enhanced deep learning system for large-scale video stream analytics. IEEE. https://doi.org/10.1109/CFEC.2018.8358733
Interest-aware content discovery in peer-to-peer social networks.
Guo, Yonghong, Liu, Lu, Wu, Yan and Hardy, J. 2018. Interest-aware content discovery in peer-to-peer social networks. ACM Transactions on Internet Technology.
An efficient indexing model for the fog layer of industrial Internet of Things.
Miao, Dejun, Liu, Lu, Xu, Rongyan, Panneerselvam, J., Wu, Yan and Xu, Wei 2018. An efficient indexing model for the fog layer of industrial Internet of Things. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2018.2799598
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments
Liu, Lu, Zhu, Shao Ying and Kazim, M. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
An approach to optimise resource provision with energy-awareness in datacentres by combating task heterogeneity.
Liu, Lu, Antonopoulos, Nikolaos and Panneerselvam, J. 2018. An approach to optimise resource provision with energy-awareness in datacentres by combating task heterogeneity. IEEE Transactions on Emerging Topics in Computing. https://doi.org/10.1109/TETC.2018.2794328
Representing variant calling format as directed acyclic graphs to enable the use of cloud computing for efficient and cost effective genome analysis
Aizad, Sanna, Anjum, Ashiq and Sakellariou, Rizos 2017. Representing variant calling format as directed acyclic graphs to enable the use of cloud computing for efficient and cost effective genome analysis. IEEE. https://doi.org/10.1109/CCGRID.2017.116
Blockchain standards for compliance and trust
Anjum, Ashiq, Sporny, Manu and Sill, Alan 2017. Blockchain standards for compliance and trust. IEEE Cloud Computing. https://doi.org/10.1109/MCC.2017.3791019
Verifiable public key encryption scheme with equality test in 5G networks
Xu, Yan, Wang, Ming, Zhong, Hong, Cui, Jie, Liu, Lu and Franqueira, Virginia N. L. 2017. Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2716971
RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing
Shao, Lu, Wang, Cheng, Liu, Lu and Jiang, Changjun 2016. RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3778
Achieving green IT using VDI in cyber physical society
Liu, Lu, DaSilva, Don-Anthony, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. Achieving green IT using VDI in cyber physical society. Journal of Internet Technology.
Big data analytics in healthcare: A cloud based framework for generating insights
Anjum, Ashiq, Aizad, Sanna, Arshad, Bilal, Subhani, Moeez, Davies-Tagg, Dominic, Abdullah, Tariq and Antonopoulos, Nikolaos 2017. Big data analytics in healthcare: A cloud based framework for generating insights. in: Springer.
Clinical and genomics data integration using meta-dimensional approach
Subhani, Moeez, Anjum, Ashiq, Koop, Andreas and Antonopoulos, Nikolaos 2016. Clinical and genomics data integration using meta-dimensional approach. Association for Computing Machinery. https://doi.org/10.1145/2996890.3007896
Deadline constrained video analysis via in-transit computational environments
Zamani, Ali Reza, Zou, Mengsong, Diaz-Montes, Javier, Petri, Ioan, Rana, Omer, Anjum, Ashiq and Parashar, Manish 2017. Deadline constrained video analysis via in-transit computational environments. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2017.2653116
Data Intensive and Network Aware (DIANA) grid scheduling
McClatchey, Richard, Anjum, Ashiq, Stockinger, Heinz, Ali, Arshad, Willers, Ian and Thomas, Michael 2007. Data Intensive and Network Aware (DIANA) grid scheduling. Journal of Grid Computing. https://doi.org/10.1007/s10723-006-9059-z
Intelligent grid enabled services for neuroimaging analysis
McClatchey, Richard, Habib, Irfan, Anjum, Ashiq, Munir, Kamran, Branson, Andrew, Bloodsworth, Peter and Kiani, Saad Liaquat 2013. Intelligent grid enabled services for neuroimaging analysis. Neurocomputing. https://doi.org/10.1016/j.neucom.2013.01.042
Event detection and user interest discovering in social media data streams
Shi, Lei-lei, Liu, Lu, Wu, Yan, Jiang, Liang and Hardy, J. 2017. Event detection and user interest discovering in social media data streams. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2675839
Collaborative actuation of wireless sensor and actuator networks for the agriculture industry.
Bai, Xingzhen, Liu, Lu, Cao, Maoyong, Panneerselvam, J., Sun, Qiao and Wang, Haixia 2017. Collaborative actuation of wireless sensor and actuator networks for the agriculture industry. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2725342
Cloud-based scalable object detection and classification in video streams
Yaseen, M., Anjum, Ashiq, Rana, Omer and Hill, Richard 2017. Cloud-based scalable object detection and classification in video streams. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.02.003
InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments.
Panneerselvam, J., Liu, Lu and Antonopoulos, Nikolaos 2017. InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.05.022
Mobilouds: An energy efficient MCC collaborative framework with extended mobile participation for next generation networks
Panneerselvam, J., Hardy, J., Liu, Lu, Yuan, Bo and Antonopoulos, Nikolaos 2017. Mobilouds: An energy efficient MCC collaborative framework with extended mobile participation for next generation networks. IEEE Access. https://doi.org/10.1109/ACCESS.2016.2602321
Modeling and analysis of a deep learning pipeline for cloud based video analytics.
Yaseen, M., Anjum, Ashiq and Antonopoulos, Nikolaos 2017. Modeling and analysis of a deep learning pipeline for cloud based video analytics. https://doi.org/10.1145/3148055.3148081
Traffic monitoring using video analytics in clouds
Abdullah, Tariq, Anjum, Ashiq, Tariq, M. Fahim, Baltaci, Yusuf and Antonopoulos, Nikolaos 2014. Traffic monitoring using video analytics in clouds. IEEE. https://doi.org/10.1109/UCC.2014.12
Guide to security assurance for cloud computing
Zhu, Shao Ying, Hill, Richard and Trovati, Marcello 2015. Guide to security assurance for cloud computing. Springer.
Analysis of HEp-2 images using MD-LBP and MAD-bagging
Schaefer, Gerald, Doshi, Niraj P., Zhu, Shao Ying and Hu, Qinghua 2014. Analysis of HEp-2 images using MD-LBP and MAD-bagging. IEEE. https://doi.org/10.1109/EMBC.2014.6944562
A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network
Whitfield, Richard and Zhu, Shao Ying 2015. A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060123
A review of solutions for SDN-Exclusive security issues
Spooner, Jakob and Zhu, Shao Ying 2016. A review of solutions for SDN-Exclusive security issues. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2016.070817
A critical comparative evaluation on DHT-based peer-to-peer search algorithms
Betts, Alexander, Liu, Lu, Li, Zhiyuan and Antonopoulos, Nikolaos 2014. A critical comparative evaluation on DHT-based peer-to-peer search algorithms. International Journal of Embedded Systems. https://doi.org/10.1504/IJES.2014.063823
Enhanced timeline analysis for digital forensic investigations
Inglot, Bartosz and Liu, Lu 2014. Enhanced timeline analysis for digital forensic investigations. Information Security Journal: A Global Perspective. https://doi.org/10.1080/19393555.2014.897401
An integrated approach to developing self-adaptive software in open environments
Mao, Xinjun, Dong, Menggao, Liu, Lu and Wang, Huaiming 2014. An integrated approach to developing self-adaptive software in open environments. Journal of Information Science and Engineering.
CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances
Li, Bo, Li, Jianxin and Liu, Lu 2015. CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3166
An investigation of security trends in personal wireless networks
Liu, Lu, Stimpson, Thomas, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. An investigation of security trends in personal wireless networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-013-1386-3
Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games
Liu, Lu, Jones, Andrew, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-013-1662-y
Virtual vignettes: the acquisition, analysis, and presentation of social network data
Howden, Chris, Liu, Lu, Li, Zhiyuan, Li, Jianxin and Antonopoulos, Nikolaos 2014. Virtual vignettes: the acquisition, analysis, and presentation of social network data. Science China Information Sciences. https://doi.org/10.1007/s11432-014-5069-9
An Efficient SDN load balancing scheme based on variance analysis for massive mobile users
Zhong, Hong, Lin, Qunfeng, Cui, Jie, Shi, Runhua and Liu, Lu 2015. An Efficient SDN load balancing scheme based on variance analysis for massive mobile users. Mobile Information Systems. https://doi.org/10.1155/2015/241732
An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games
Li, Zhiyuan, Liu, Lu, Chen, Rulong and Bi, Jun-Lei 2015. An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-015-0376-5
Cloud BI: Future of business intelligence in the Cloud
Al-Aqrabi, Hussain, Liu, Lu, Hill, Richard and Antonopoulos, Nikolaos 2014. Cloud BI: Future of business intelligence in the Cloud. Journal of Computer and System Sciences. https://doi.org/10.1016/j.jcss.2014.06.013
Toward a flexible and fine-grained access control framework for infrastructure as a service clouds
Li, Bo, Li, Jianxin, Liu, Lu and Zhou, Chao 2015. Toward a flexible and fine-grained access control framework for infrastructure as a service clouds. Security and Communication Networks. https://doi.org/10.1002/sec.1216
Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things
Li, Zhiyuan, Chen, Rulong, Liu, Lu and Min, Geyong 2015. Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2015.2451138
An adaptive multilevel indexing method for disaster service discovery
Wu, Yan, Yan, Chun Gang, Liu, Lu, Ding, Zhijun and Jiang, Changjun 2014. An adaptive multilevel indexing method for disaster service discovery. IEEE Transactions on Computers. https://doi.org/10.1109/TC.2014.2378273
A socioecological model for advanced service discovery in machine-to-machine communication networks
Liu, Lu, Antonopoulos, Nikolaos, Zheng, Minghui, Zhan, Yongzhao and Ding, Zhijun 2016. A socioecological model for advanced service discovery in machine-to-machine communication networks. ACM Transactions on Embedded Computing Systems. https://doi.org/10.1145/2811264
A cloud resource management model for the creation and orchestration of social communities
Ikram, Ahsan, Anjum, Ashiq and Bessis, Nik 2015. A cloud resource management model for the creation and orchestration of social communities. Simulation Modelling Practice and Theory. https://doi.org/10.1016/j.simpat.2014.05.003
Federated broker system for pervasive context provisioning
Kiani, Saad Liaquat, Anjum, Ashiq, Knappmeyer, Michael, Bessis, Nik and Antonopoulos, Nikolaos 2013. Federated broker system for pervasive context provisioning. Journal of Systems and Software. https://doi.org/10.1016/j.jss.2012.11.050
Adapting scientific workflow structures using multi-objective optimization strategies
Habib, Irfan, Anjum, Ashiq, Mcclatchey, Richard and Rana, Omer 2013. Adapting scientific workflow structures using multi-objective optimization strategies. ACM Transactions on Autonomous and Adaptive Systems. https://doi.org/10.1145/2451248.2451252
Video stream analysis in clouds: An object detection and classification framework for high performance video analytics
Anjum, Ashiq, Abdullah, Tariq, Tariq, M. Fahim, Baltaci, Yusuf and Antonopoulos, Nikolaos 2016. Video stream analysis in clouds: An object detection and classification framework for high performance video analytics. IEEE Transactions on Cloud Computing. https://doi.org/10.1109/TCC.2016.2517653
Towards cloud based big data analytics for smart future cities
Khan, Zaheer, Anjum, Ashiq, Tahir, Muhammad Atif and Soomro, Kamran Ahmed 2015. Towards cloud based big data analytics for smart future cities. Journal of Cloud Computing. https://doi.org/10.1186/s13677-015-0026-8
Spatial frequency based video stream analysis for object classification and recognition in clouds
Yaseen, M., Anjum, Ashiq and Antonopoulos, Nikolaos 2016. Spatial frequency based video stream analysis for object classification and recognition in clouds. IEEE.
RVLBPNN: A workload forecasting model for smart cloud computing
Lu, Yao, Panneerselvam, J., Liu, Lu and Wu, Yan 2016. RVLBPNN: A workload forecasting model for smart cloud computing. Scientific Programming. https://doi.org/10.1155/2016/5635673
CCLBR: Congestion control-based load balanced routing in unstructured P2P systems
Shen, Xiang-Jun, Chang, Qing, Liu, Lu, Panneerselvam, J. and Zha, Zheng-Jun 2016. CCLBR: Congestion control-based load balanced routing in unstructured P2P systems. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2016.2558515
An efficient algorithm for partially matched services in internet of services
Ahmed, Mariwan, Liu, Lu, Hardy, J., Yuan, Bo and Antonopoulos, Nikolaos 2016. An efficient algorithm for partially matched services in internet of services. Personal and Ubiquitous Computing. https://doi.org/10.1007/s00779-016-0917-9
High performance video processing in cloud data centres
Yaseen, M., Zafar, Muhammad Sarim, Anjum, Ashiq and Hill, Richard 2016. High performance video processing in cloud data centres. IEEE. https://doi.org/10.1109/SOSE.2016.56
An Inter-Cloud Meta-Scheduling (ICMS) simulation framework: architecture and evaluation
Sotiriadis, Stelios, Bessis, Nik, Anjum, Ashiq and Buyya, Rajkumar 2015. An Inter-Cloud Meta-Scheduling (ICMS) simulation framework: architecture and evaluation. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2015.2399312
A survey on top security threats in cloud computing
Kazim, M. and Zhu, Shao Ying 2015. A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpuf
A critical review of the routing protocols in opportunistic networks
Panneerselvam, J., Atojoko, Anthony, Smith, K., Liu, Lu and Antonopoulos, Nikolaos 2014. A critical review of the routing protocols in opportunistic networks. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. https://doi.org/10.4108/inis.1.1.e6
iMIG: Toward an adaptive live migration method for KVM virtual machines
Li, Jianxin, Zhao, Jieyu Zhao, Li, Yi, Cui, Lei, Li, Bo, Liu, Lu and Panneerselvam, J. 2014. iMIG: Toward an adaptive live migration method for KVM virtual machines. The Computer Journal. https://doi.org/10.1093/comjnl/bxu065
Achieving dynamic load balancing through mobile agents in small world P2P networks
Shen, Xiang-Jun, Liu, Lu, Zha, Zheng-Jun, Gu, Pei-Ying, Jiang, Zhong-Qiu, Chen, Ji-Ming and Panneerselvam, J. 2014. Achieving dynamic load balancing through mobile agents in small world P2P networks. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.003
Glueing grids and clouds together: a service-oriented approach
Anjum, Ashiq, Hill, Richard, McClatchey, Richard, Bessis, Nik and Branson, Andrew 2012. Glueing grids and clouds together: a service-oriented approach. International Journal of Web and Grid Services. https://doi.org/10.1504/IJWGS.2012.049169
Energy conservation in mobile devices and applications: a case for context parsing, processing and distribution in clouds
Kiani, Saad Liaquat, Anjum, Ashiq, Bessis, Nik, Hill, Richard and Knappmeyer, Michael 2013. Energy conservation in mobile devices and applications: a case for context parsing, processing and distribution in clouds. Mobile Information Systems.
Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework
Ikram, Ahsan, Anjum, Ashiq, Hill, Richard, Antonopoulos, Nikolaos, Liu, Lu and Sotiriadis, Stelios 2013. Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3131
Performance simulation of a context provisioning middleware based on empirical measurements
Reetz, Eike Steffen, Knappmeyer, Michael, Kiani, Saad Liaquat, Anjum, Ashiq, Bessis, Nik and Tönjes, Ralf 2012. Performance simulation of a context provisioning middleware based on empirical measurements. https://doi.org/10.1016/j.simpat.2012.03.002
Energy performance assessment of virtualization technologies using small environmental monitoring sensors
Liu, Lu, Masfary, Osama and Antonopoulos, Nikolaos 2012. Energy performance assessment of virtualization technologies using small environmental monitoring sensors. Sensors. https://doi.org/10.3390/s120506610
Adaptive service discovery on service-oriented and spontaneous sensor systems
Liu, Lu, Xu, Jie, Antonopoulos, Nikolaos, Li, Jianxin and Wu, Kaigu 2012. Adaptive service discovery on service-oriented and spontaneous sensor systems. Adhoc & Sensor Wireless Networks.
Dynamic service integration for reliable and sustainable capability provision
Liu, Lu, Xu, Jie, Russell, Duncan, Davies, John K., Webster, David, Luo, Zongyang and Venters, Colin 2010. Dynamic service integration for reliable and sustainable capability provision. International Journal of Systems Science. https://doi.org/10.1080/00207721003774736
Fault-tolerant peer-to-peer search on small-world networks
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Fault-tolerant peer-to-peer search on small-world networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2007.03.002
Managing peer-to-peer networks with human tactics in social interactions
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Managing peer-to-peer networks with human tactics in social interactions. The Journal of Supercomputing. https://doi.org/10.1007/s11227-007-0156-y
Distributed service integration for disaster monitoring sensor systems
Liu, Lu, Antonopoulos, Nikolaos, Xu, Jie, Webster, David and Wu, Kaigu 2011. Distributed service integration for disaster monitoring sensor systems. IET Communications. https://doi.org/10.1049/iet-com.2010.0630
CyberGuarder: a virtualization security assurance architecture for green cloud computing
Li, Jianxin, Li, Bo, Wo, Tianyu, Hu, Chunming, Huai, Jinpeng, Liu, Lu and Lam, K.P. 2012. CyberGuarder: a virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.04.012
Editorial: Special issue on dependable peer-to-peer systems
Liu, Lu and Xu, Jie 1931. Editorial: Special issue on dependable peer-to-peer systems. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-009-0065-3
Modelling and simulation of network enabled capability on service-oriented architecture
Liu, Lu, Russell, Duncan, Xu, Jie, Webster, David, Luo, Zongyang, Venters, Colin and Davies, John K. 2009. Modelling and simulation of network enabled capability on service-oriented architecture. Simulation Modelling Practice and Theory. https://doi.org/10.1016/j.simpat.2009.06.012
CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment
Li, Jianxin, Jia, Yu, Liu, Lu and Wo, Tianyu 2011. CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.08.001
Efficient resource discovery in self-organized unstructured peer-to-peer networks
Liu, Lu, Antonopoulos, Nikolaos, Mackin, Stephen, Xu, Jie and Russell, Duncan 2008. Efficient resource discovery in self-organized unstructured peer-to-peer networks. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.1329
Efficient and scalable search on scale-free P2P networks
Liu, Lu, Xu, Jie, Russell, Duncan, Townend, Paul and Webster, David 2009. Efficient and scalable search on scale-free P2P networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-008-0023-5
HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree
Li, Jianxin, Liu, Xudong, Liu, Lu, Sun, Dazhi and Li, Bo 2011. HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree. Telecommunication Systems. https://doi.org/10.1007/s11235-011-9648-4
Dynamic authentication for cross-realm SOA-based business processes
Xu, Jie, Zhang, Dacheng, Li, Xianxian and Liu, Lu 2010. Dynamic authentication for cross-realm SOA-based business processes. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2010.33
Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing
Liu, Zhenxing, Liu, Lu, Hardy, J., Anjum, Ashiq, Hill, Richard and Antonopoulos, Nikolaos 2012. Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications. https://doi.org/10.1186/2192-113X-1-3