{"id":24,"date":"2018-06-07T20:24:12","date_gmt":"2018-06-08T03:24:12","guid":{"rendered":"https:\/\/dev-nong-ye.pantheonsite.io\/?page_id=24"},"modified":"2018-06-07T20:24:12","modified_gmt":"2018-06-08T03:24:12","slug":"publications","status":"publish","type":"page","link":"https:\/\/faculty.engineering.asu.edu\/nongye\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<h4><span style=\"color: #800080\"><u>Book Publishing<\/u><\/span><\/h4>\n<p><em>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<span style=\"color: #ff9900\"><small>\u00a0<\/small><strong> <u>Books<\/u><\/strong><\/span><\/em><span style=\"color: #ff9900\"><strong><em>:<\/em> 5<\/strong><\/span><\/p>\n<ol>\n<li><small>Ye and T. Wu, <em><a href=\"https:\/\/www.amazon.com\/Developing-Windows-Based-Web-Enabled-Information-Systems-ebook\/dp\/B00OKUG1DQ\/ref=mt_kindle?_encoding=UTF8&amp;me=\">Developing Windows-based and Web-Enabled Information Systems<\/a>, <\/em>Boca Raton, Florida: CRC Press \u2013 A Taylor &amp; Francis Company, 2014, ISBN 978-1-4398-6059-5 (578 pages).<\/small><\/li>\n<\/ol>\n<ol start=\"2\">\n<li><small>Ye, <em><a href=\"https:\/\/www.amazon.com\/Data-Mining-Theories-Algorithms-Ergonomics-ebook\/dp\/B00GM0DF7C\/ref=mt_kindle?_encoding=UTF8&amp;me=\">Data Mining: Theories, Algorithms, and Examples<\/a>,<\/em> Boca Raton, Florida: CRC Press \u2013 A Taylor &amp; Francis Company, 2013, ISBN: 978-1-4398-0838-2. (329 pages) (with the Arabic translation published in 2016 by Institute of Public Administration)<\/small><\/li>\n<\/ol>\n<ol start=\"3\">\n<li><small>Ye,<a href=\"https:\/\/www.amazon.com\/Secure-Computer-Network-Systems-Modeling\/dp\/0470023244\/ref=asap_bc?ie=UTF8\"> <em>Secure Computer and Network Systems: Modeling, Analysis and Design<\/em><\/a>, London, UK: John Wiley &amp; Sons, 2008, ISBN 978-0-470-02324-2 (336 pages).\u00a0<\/small><\/li>\n<\/ol>\n<ol start=\"4\">\n<li><small>Ye (ed.),<a href=\"https:\/\/www.amazon.com\/Handbook-Mining-Human-Factors-Ergonomics-ebook\/dp\/B000SI07K2\/ref=mt_kindle?_encoding=UTF8&amp;me=\"> <em>The <\/em><em>Handbook of Data Mining. <\/em><\/a>Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003, ISBN 0-8058-4081-8. (689 pages)\u00a0<\/small><\/li>\n<\/ol>\n<ol start=\"5\">\n<li><small>K. Bhargava, and N. Ye (eds.), <em><a href=\"https:\/\/www.amazon.com\/Computational-Modeling-Problem-Solving-Networked-ebook\/dp\/B000W25I62\/ref=sr_1_1?s=digital-text&amp;ie=UTF8&amp;qid=1528497471&amp;sr=1-1&amp;keywords=Computational+Modeling+and+Problem+Solving+in+the+Networked+World\">Computational Modeling and Problem Solving in the Networked World<\/a>. <\/em>Norwell, MA: Kluwar Academic Publishers, 2003, ISBN 1-4020-7295-3. (325 pages)<\/small><\/li>\n<\/ol>\n<p><u>\u00a0<\/u><\/p>\n<h4><span style=\"color: #800080\"><u>Refereed Archival Journal Papers<\/u><\/span><em><span style=\"color: #800080\">\u00a0\u00a0\u00a0\u00a0<\/span><br \/>\n<\/em><\/h4>\n<p><em>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/em><span style=\"color: #ff9900\"><strong><em><u>Published and Accepted Work:<\/u><\/em> 87 papers<\/strong><\/span><\/p>\n<ol>\n<li><small>Ye, T. Y. Fok, and O. Chong, \u201cLearning and Building an Energy Consumption System Model Using the Partial-Value Association Discovery Algorithm,\u201d <em>Advanced Information Sciences and Service Sciences, <\/em>in review.<\/small><\/li>\n<\/ol>\n<ol start=\"2\">\n<li><small>Ye, \u201cAnalytical techniques for anomaly detection through features, signal-noise separation and partial-value associations,\u201d <em>Proceedings of Machine Learning Research<\/em>, Vol. 77, pp. 20-32, 2017. <a href=\"http:\/\/proceedings.mlr.press\/v71\/ye18a\/ye18a.pdf\">http:\/\/proceedings.mlr.press\/v71\/ye18a\/ye18a.pdf<\/a>.<\/small><\/li>\n<\/ol>\n<ol start=\"3\">\n<li><small>Ye, \u201cThe partial-value association discovery algorithm to learn multi-layer structural system models from system data.\u201d <em>IEEE Transactions on Systems, Man, and Cybernetics: Systems, <\/em>Vol. 47, No. 12, pp. 3377-3385, 2017<\/small><\/li>\n<\/ol>\n<ol start=\"4\">\n<li><small>Ye, \u201cA reverse engineering algorithm for mining a causal system model from system data.\u201d <em>International Journal of Production Research, <\/em>Vol. 55, No. 3, pp. 828-844, 2017. Published online in July 27, 2016. Eprint link: <a href=\"http:\/\/dx.doi.org\/10.1080\/00207543.2016.1213913\">http:\/\/dx.doi.org\/10.1080\/00207543.2016.1213913<\/a>.<\/small><\/li>\n<\/ol>\n<ol start=\"5\">\n<li><small>Ye, \u201cReverse engineering: Mining structural system models from system data,\u201d <em>Information, Knowledge, Systems Management, <\/em>2015, Vol, 12, pp. 205-208.<\/small><\/li>\n<\/ol>\n<ol start=\"6\">\n<li><small>Ye, B. M. Aranda, and P. Hurley, \u201cSystem impact characteristics of cyber services, security mechanisms, and attacks and implications in cyber system survivability,\u201d <em>Information, Knowledge, Systems Management, <\/em>Vol. 12, No. 1, 2013, pp. 75-95.<\/small><\/li>\n<\/ol>\n<ol start=\"7\">\n<li><small>Ye, S. S. Yang, B. M. Aranda, \u201cThe analysis of service provider-user coordination for resource allocation in cloud computing,\u201d <em>Information, Knowledge, Systems Management.<\/em> Vol. 12, No.1, 2013, pp. 1-24.<\/small><\/li>\n<\/ol>\n<ol start=\"8\">\n<li><small>Ye, B. M. Aranda, S. Yau, D. Huang, \u201cAnalysis and modeling of service impacts on system activities, resource workloads and service performance on computer and network systems,\u201d <em>Information, Knowledge, Systems Management.<\/em> Vol. 11, No. 3, 2012, pp. 255-274.<\/small><\/li>\n<\/ol>\n<ol start=\"9\">\n<li><small>Ye, S. S. Yau, D. Huang, M. Baydogan, B. M. Aranda, A. Roontiva, and P. Hurey, \u201cModels of dynamic relations among service activities, system state and service quality on computer and network systems,\u201d <em>Information, Knowledge, Systems Management, <\/em>Vol. 9, 2010, pp. 99-116.<\/small><\/li>\n<\/ol>\n<ol start=\"10\">\n<li><small>S. Yau, N. Ye, H. Sarjoughian, D. Huang, A. Roontiva, M. G. Baydogan, and M. Quqsith, \u201cTowards development of adaptive service-based software systems,\u201d <em>IEEE Transactions on Services Computing<\/em>, Vol. 2, No. 3, 2009, pp. 247-260.<\/small><\/li>\n<\/ol>\n<ol start=\"11\">\n<li><small>Ye, X. Xu, and P. Hurley, \u201cQoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks,\u201d <em>Information, Knowledge, Systems Management, <\/em>Vol. 7, No. 4, 2008, pp. 429-451.<\/small><\/li>\n<\/ol>\n<ol start=\"12\">\n<li><small>Xu, and N. Ye, \u201cMinimization of job waiting time variance on identical parallel machines.\u201d <em>IEEE Transactions on Systems, Man, and Cybernetics, Part C, <\/em>Vol. 37, No. 5, 2007, pp. 917-927.<\/small><\/li>\n<\/ol>\n<ol start=\"13\">\n<li><small>Ye, and Q. Chen, \u201cAttack-norm separation for detecting attack-induced quality problems on computers and networks.\u201d <em>Quality and Reliability Engineering International, <\/em>Vol. 23, No. 5, 2007, pp. 545-553.<\/small><\/li>\n<\/ol>\n<ol start=\"14\">\n<li><small>Ye, X. Li, T. Farley, and X. Xu, \u201cJob scheduling methods for reducing waiting time variance.\u201d <em>Computers &amp; Operations Research, <\/em>Vol. 34, No. 10, 2007, pp. 3069-3083.<\/small><\/li>\n<\/ol>\n<ol start=\"15\">\n<li><small>Li, N. Ye, X. Xu, and R. Sawhey, \u201cInfluencing factors of job waiting time variance on a single machine.\u201d <em>European Journal of Industrial Engineering, <\/em>Vol. 1, No.1, 2007, pp. 56-73.<\/small><\/li>\n<\/ol>\n<ol start=\"16\">\n<li><small>Li, N. Ye, Tieming Liu, and Yang Sun, \u201cJob scheduling to minimize the weighted waiting time variance of jobs.\u201d <em>Computers &amp; Industrial Engineering, <\/em>Vol. 52, No. 1, 2007, pp. 41-56.<\/small><\/li>\n<\/ol>\n<ol start=\"17\">\n<li><small>Ye, T. Farley, X. Li, and B. Harish, \u201cBatch scheduled admission control for computer and network systems.\u201d <em>Information, Knowledge, Systems Management, <\/em>Vol. 5, No. 4, 2005\/2006, pp. 211-226.<\/small><\/li>\n<\/ol>\n<ol start=\"18\">\n<li><small>Ye, C. Newman, and T. Farley, \u201cA system-fault-risk framework for cyber attack classification.\u201d <em>Information, Knowledge, Systems Management,<\/em> Vol. 5, No. 2, 2005\/2006, pp. 135-151.<\/small><\/li>\n<\/ol>\n<ol start=\"19\">\n<li><small>Ye, T. Farley, and D. K. Lakshminarasimhan, &#8220;An attack-norm separation approach for detecting cyber attacks,&#8221;<em> Information Systems Frontiers<\/em>, Vol. 8, No. 3, 2006, pp. 163-177.<\/small><\/li>\n<\/ol>\n<ol start=\"20\">\n<li><small>Ye, and T. Farley, \u201cInformation sharing and control in homogeneous and heterogeneous supply networks.\u201d <em>International Journal of Modeling and Simulation, <\/em>Vol. 26, No. 2, 2006, pp. 160-168.<\/small><\/li>\n<\/ol>\n<ol start=\"21\">\n<li><small>Yang, N. Ye, and Y.-C. Lai, \u201cQoS model of a router with feedback control.\u201d <em>Quality and Reliability Engineering International, <\/em>Vol. 22, No. 4., 2006, pp. 429-444.<\/small><\/li>\n<\/ol>\n<ol start=\"22\">\n<li><small>Ye, D. Parmar, and C. M. Borror, \u201cA hybrid SPC method with the Chi-square distance monitoring procedure for large-scale, complex process data.\u201d <em>Quality and Reliability Engineering International, <\/em>Vol. 22, No. 4, 2006, pp. 393-402.<\/small><\/li>\n<\/ol>\n<ol start=\"23\">\n<li><small>Li, and N. Ye, \u201cA supervised clustering and classification algorithm for mining data with mixed variables.\u201d <em>IEEE Transactions on Systems, Man, and Cybernetics, Part A, <\/em>Vol. 36, No. 2, 2006, pp. 396-406.<\/small><\/li>\n<\/ol>\n<ol start=\"24\">\n<li><small>Ye, B. Harish, and T. Farley, \u201cAttack profiles to derive data observables, features, and characteristics of cyber attacks.\u201d <em>Information, Knowledge, Systems Management,<\/em> Vol. 5, No. 1, 2005\/2006, pp. 23-47.<\/small><\/li>\n<\/ol>\n<ol start=\"25\">\n<li><small>Ye and T. Farley, \u201cA scientific approach to cyberattack detection.\u201d <em>IEEE Computer,<\/em> Vol. 38, No. 11, 2005, pp. 55-61.<\/small><\/li>\n<\/ol>\n<ol start=\"26\">\n<li><small>Ye, Z. Yang, Y.-C. Lai, and Toni Farley, \u201cEnhancing router QoS through job scheduling with weighted shortest processing time\u2014adjusted.\u201d <em>Computers &amp; Operations Research, <\/em>Vol. 32, No. 9, 2005, pp. 2255-2269.<\/small><\/li>\n<\/ol>\n<ol start=\"27\">\n<li><small>Ye, E. Gel, X. Li, T. Farley, and Y.-C. Lai, \u201cWeb-server QoS models: Applying scheduling rules from production planning.\u201d <em>Computers &amp; Operations Research<\/em>, Vol. 32, No. 5, 2005, pp. 1147-1164.<\/small><\/li>\n<\/ol>\n<ol start=\"28\">\n<li><small>Wu, N. Ye, and D. Zhang<strong>,<\/strong>\u201cComparison of distributed methods for resource allocation.\u201d <em>International Journal of Production Research<\/em>, Vol. 43, No. 3, 2005, pp. 515-536.<\/small><\/li>\n<\/ol>\n<ol start=\"29\">\n<li><small>Li, and N. Ye, \u201cA supervised clustering algorithm for mining normal and intrusive activity patterns in computer intrusion detection.\u201d <em>Knowledge and Information Systems, <\/em>Vol. 8, No. 4, 2005, pp. 498-509.<\/small><\/li>\n<\/ol>\n<ol start=\"30\">\n<li><small>Zhao, K. Park, Y.-C. Lai, and N. Ye, <a href=\"http:\/\/chaos1.la.asu.edu\/~yclai\/papers\/PRE_05_ZPLY.pdf\">&#8220;Tolerance of scale-free networks against attack-induced cascades.&#8221; <\/a><em>Physical Review E,<\/em> Vol. 72, No. 2, 2005, pp. 025104-1 to 025104-4.<\/small><\/li>\n<\/ol>\n<ol start=\"31\">\n<li><small>Park, Y.-C. Lai, and N. Ye, \u201cSelf-organized scale-free networks.\u201d <em>Physical Review E, <\/em>Vol. 72, No. 2, 2005, pp. 026131-1 to 026131-5.<\/small><\/li>\n<\/ol>\n<ol start=\"32\">\n<li><small>Park, Y.-C. Lai, L. Zhao, and N. Ye, <a href=\"http:\/\/chaos1.la.asu.edu\/~yclai\/papers\/PRE_05_PLZY.pdf\">&#8220;Jamming in complex gradient networks.&#8221; <\/a><em>Physical Review E, <\/em>Vol. 71, No. 6, 2005, pp. 065105-1 to 065105-4.<\/small><\/li>\n<\/ol>\n<ol start=\"33\">\n<li><small>Zhao, Y.-C. Lai, K. Park, and N. Ye, \u201cOnset of traffic congestion in complex networks.\u201d <em>Physical Review E, <\/em>Vol. 71, No. 2, 2005, pp. 026125-1 to 026125-8.<\/small><\/li>\n<\/ol>\n<ol start=\"34\">\n<li><small>Ye, Q. Chen, and C. Borror, \u201cEWMA forecast of normal system activity for computer intrusion detection.\u201d <em>IEEE Transactions on Reliability<\/em>, Vol. 53, No. 4, 2004, pp. 557-566.<\/small><\/li>\n<\/ol>\n<ol start=\"35\">\n<li><small>Ye, Y. Zhang, and C. M. Borror, \u201cRobustness of the Markov-chain model for cyber-attack detection.\u201d <em>IEEE Transactions on Reliability, <\/em>Vol. 53, No. 1, 2004, pp. 116-123.<\/small><\/li>\n<\/ol>\n<ol start=\"36\">\n<li><small>Ye and O. S. Saydjari, \u201cIntroduction to special section on: quality\/reliability engineering of information systems,\u201d <em>IEEE Transactions on Reliability, <\/em>Vol. 53, No. 1, 2004, pp. 102.<\/small><\/li>\n<\/ol>\n<ol start=\"37\">\n<li><small>Ye, T. Farley, D. Aswath, \u201cData measures and collection points to detect traffic changes on large-scale computer networks.\u201d <em>Information, Knowledge, Systems Management, <\/em>Vol. 4, No. 4, 2004, pp. 215-224.<\/small><\/li>\n<\/ol>\n<ol start=\"38\">\n<li><small>Park, Y.-C. Lai, and N. Ye, \u201cCharacterization of weighted complex networks.\u201d <em>Physical Review E, <\/em>Vol. 70, No. 2, 2004, pp. 026109-1 to026109-4.<\/small><\/li>\n<\/ol>\n<ol start=\"39\">\n<li><small>Chen, T. Farley, and N. Ye, \u201cQoS requirements of network applications on the Internet.\u201d <em>Information, Knowledge, Systems Management<\/em>, Vol. 4, No.1, 2004, pp. 55-76.<\/small><\/li>\n<\/ol>\n<ol start=\"40\">\n<li><small>Ye, and Q. Chen, \u201cComputer intrusion detection through EWMA for auto-correlated and uncorrelated data.\u201d <em>IEEE Transactions on Reliability, <\/em>Vol. 52, No. 1, 2003, pp. 73-82.<\/small><\/li>\n<\/ol>\n<ol start=\"41\">\n<li><small>Ye, C. Borror, and D. Parmar, \u201cScalable chi square distance versus conventional statistical distance for process monitoring with uncorrelated data variables.\u201d <em>Quality and Reliability Engineering International, <\/em>Vol. 19, No. 6, 2003, pp. 505-515.<\/small><\/li>\n<\/ol>\n<ol start=\"42\">\n<li><small>Ye, Y.-C. Lai, and T. Farley, \u201cDependable information infrastructures as complex adaptive systems.\u201d <em>Systems Engineering,<\/em> Vol. 6, No. 4, 2003, pp.225-237.<\/small><\/li>\n<\/ol>\n<ol start=\"43\">\n<li><small>Ye, \u201cAn information processing model for human-computer integrated assembly planning systems.\u201d <em>JCIIE, <\/em>Vol. 20, No. 3, 2003, pp. 220-229.<\/small><\/li>\n<\/ol>\n<ol start=\"44\">\n<li><small>-C. Lai, Z. Liu, and N. Ye, &#8220;Infection dynamics on growing networks.&#8221; <em>International Journal of Modern Physics B<\/em>, Vol. 17, 2003, pp. 4045-4061.<\/small><\/li>\n<\/ol>\n<ol start=\"45\">\n<li><small>-C. Lai, and N. Ye, \u201cRecent developments in chaotic time series analysis.\u201d <em>International Journal of Bifurcation and Chaos, <\/em>Vol. 13, No. 6, 2003, pp. 1383-1422.<\/small><\/li>\n<\/ol>\n<ol start=\"46\">\n<li><small>Liu, Y.-C. Lai, and N. Ye, \u201cPropagation and immunization of infection on general networks with both homogeneous and heterogeneous components.\u201d <em>Physical Review E, <\/em>Vol. 67, 031911, 2003, pp. 031911-1 to 031911-5.<\/small><\/li>\n<\/ol>\n<ol start=\"47\">\n<li><small>Ye, X. Li, and T. Farley, \u201cA data mining technique for discovering distinct patterns of hand signs: Implications in User Training and Computer Interface Design.\u201d <em>Ergonomics, <\/em>Vol. 46, No. 1-3, 2002, pp. 188-196.<\/small><\/li>\n<\/ol>\n<ol start=\"48\">\n<li><small>Ye, C. Borror, and Y. Zhang, \u201cEWMA techniques for computer intrusion detection through anomalous changes in event intensity.\u201d <em>Quality and Reliability Engineering International, <\/em>Vol. 18, No. 6, 2002, pp. 443-451.<\/small><\/li>\n<\/ol>\n<ol start=\"49\">\n<li><small>Ye, S. M. Emran, Q. Chen, and S. Vilbert, \u201cMultivariate statistical analysis of audit trails for host-based intrusion detection.\u201d <em>IEEE Transactions on Computers, <\/em>Vol. 51. No. 7, 2002, pp. 810-820.<\/small><\/li>\n<\/ol>\n<ol start=\"50\">\n<li><small>Ye, and X. Li, \u201cA scalable, incremental learning algorithm for classification problems.\u201d <em>Computers &amp; Industrial Engineering Journal, <\/em>Vol. 43, No. 4, 2002, pp. 677-692.<\/small><\/li>\n<\/ol>\n<ol start=\"51\">\n<li><small>Ye, T. Ehiabor, and Y. Zhang, \u201cFirst-order versus high-order stochastic models for computer intrusion detection.\u201d <em>Quality and Reliability Engineering International, <\/em>Vol. 18, No. 3, 2002, pp. 243-250.<\/small><\/li>\n<\/ol>\n<ol start=\"52\">\n<li><small>Ye, \u201cInformation infrastructure of engineering collaboration in a distributed virtual enterprise.\u201d <em>International Journal of Computer Integrated Manufacturing,<\/em> Vol. 15, No. 3, 2002, pp. 265-273.<\/small><\/li>\n<\/ol>\n<ol start=\"53\">\n<li><small>Ye, \u201cQoS-centric stateful resource management in information systems.\u201d <em>Information Systems Frontiers, <\/em>Vol. 4, No. 2, 2002, pp. 149-160.<\/small><\/li>\n<\/ol>\n<ol start=\"54\">\n<li><small>M. Emran, and N. Ye, \u201cRobustness of chi-square and Canberra techniques in detecting intrusions into information systems.\u201d<em> Quality and Reliability Engineering International, <\/em>Vol. 18, No. 1, 2002, pp. 19-28.<\/small><\/li>\n<\/ol>\n<ol start=\"55\">\n<li><small>Li, and N. Ye, \u201cGrid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection.\u201d <em>Quality and Reliability Engineering International, <\/em>Vol. 18, No. 3, 2002, pp. 231-242.<\/small><\/li>\n<\/ol>\n<ol start=\"56\">\n<li><small>Liu, Y.-C. Lai, N. Ye, and P. Dasgupta, \u201cConnectivity distribution and attack tolerance of general networks with both preferential and random attachments.\u201d <em>Physics Letters A,<\/em> Vol. 303, 2002, pp. 337-344.<\/small><\/li>\n<\/ol>\n<ol start=\"57\">\n<li><small>Liu, Y.-C. Lai, and N. Ye, \u201cStatistical properties and attack tolerance of growing networks with algebraic preferential attachment.\u201d <em>Physical Review E, <\/em>Vol. 66, 2002, pp. 036112-1 to 036112-7.<\/small><\/li>\n<\/ol>\n<ol start=\"58\">\n<li><small>Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, \u201cProbabilistic techniques for intrusion detection based on computer audit data.\u201d <em>IEEE Transactions on Systems, Man, and Cybernetics, <\/em>Vol. 31, No. 4, 2001, pp. 266-274.<\/small><\/li>\n<\/ol>\n<ol start=\"59\">\n<li><small>Ye, V. Nguyen, and G. Runger, \u201cAssessment of operation plan performance under uncertainty.\u201d <em>IEEE Transactions on Systems, Man, and Cybernetics, <\/em>Vol. 31, No. 2, 2001, pp. 256-260.<\/small><\/li>\n<\/ol>\n<ol start=\"60\">\n<li><small>Ye, J. Giordano, and J. Feldman, \u201cA process control approach to cyber attack detection.\u201d <em>Communications of the ACM, <\/em>Vol. 44, No. 8, 2001, pp. 76-82.<\/small><\/li>\n<\/ol>\n<ol start=\"61\">\n<li><small>Ye, and Q. Chen, \u201cAn anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems.\u201d <em>Quality and Reliability Engineering International, <\/em>Vol. 17, No. 2, 2001, pp. 105 &#8211; 112.<\/small><\/li>\n<\/ol>\n<ol start=\"62\">\n<li><small>Ye, \u201cRobust intrusion tolerance for information systems.\u201d <em>Information Management and Computer Security, <\/em>Vol. 9, No. 1, 2001, pp. 38-43.<\/small><\/li>\n<\/ol>\n<ol start=\"63\">\n<li><small>Ye, \u201cA hierarchical, distributed architecture of command and control.\u201d <em>Information, Knowledge, Systems Management, <\/em>Vol. 2, No. 3, 2001, pp. 261-269.<\/small><\/li>\n<\/ol>\n<ol start=\"64\">\n<li><small>Li, and N. Ye, \u201cDecision tree classifiers for computer intrusion detection.\u201d <em>Journal of Parallel and Distributed Computing Practices, <\/em>Vol. 4, No. 2, 2001, pp. 179-190.<\/small><\/li>\n<\/ol>\n<ol start=\"65\">\n<li><small>M. Emran, and N. Ye, \u201cA system architecture for computer intrusion detection.\u201d <em>Information, Knowledge, Systems Management, <\/em>Vol. 2, No. 3, 2001, pp. 271-290.<\/small><\/li>\n<\/ol>\n<ol start=\"66\">\n<li><small>Ye, Q. Zhong, and G. Rahn, \u201cConfidence assessment of quality prediction from process measurement in sequential manufacturing processes.\u201d <em>IEEE Transactions on Electronic Packaging Manufacturing, <\/em>Vol. 23, No. 3, 2000, pp. 177-184.<\/small><\/li>\n<\/ol>\n<ol start=\"67\">\n<li><small>Ye, P. Banerjee, A. Banerjee, and F. Dech, \u201cA comparative study of assembly planning in traditional and virtual environments.\u201d <em>IEEE Transactions on Systems, Man, and Cybernetics,<\/em> Vol. 29, No. 4, 1999, pp. 546-555.<\/small><\/li>\n<\/ol>\n<ol start=\"68\">\n<li><small>Banerjee, P. Banerjee, N. Ye, and F. Dech, \u201cAssembly planning effectiveness using virtual reality.\u201d <em>Presence: Teleoperators and Virtual Environments,<\/em> Vol. 8, No. 2, 1999, pp. 204-217.<\/small><\/li>\n<\/ol>\n<ol start=\"69\">\n<li><small>Ye, \u201cThe MDS-ANAVA technique for assessing knowledge representation differences between skill groups.\u201d <em>IEEE Transactions on Systems, Man and Cybernetics, <\/em>Vol. 28, No. 5, 1998, pp. 586-600.<\/small><\/li>\n<\/ol>\n<ol start=\"70\">\n<li><small>Ye, \u201cNeural networks approach to user modeling and intelligent interface: A review and reappraisal.\u201d <em>International Journal of Human-Computer Interaction, <\/em>Vol. 9, No. 1, 1997, pp. 3-24.<\/small><\/li>\n<\/ol>\n<ol start=\"71\">\n<li><small>Ye, \u201cObjective and consistent analysis of group differences in knowledge representation.\u201d <em>International Journal of Cognitive Ergonomics, <\/em>Vol. 1, No. 2, 1997, pp. 169-187.<\/small><\/li>\n<\/ol>\n<ol start=\"72\">\n<li><small>Ye, and B. Zhao, \u201cAutomatic setting of article format through neural networks.\u201d <em>International Journal of Human-Computer Interaction, <\/em>Vol. 9, No. 1, 1997, pp. 81-100.<\/small><\/li>\n<\/ol>\n<ol start=\"73\">\n<li><small>Ye, \u201cThe presentation of knowledge and state information for system fault diagnosis.\u201d <em>IEEE Transactions on Reliability, <\/em>Vol. 45, No. 4, 1996, pp. 638-645.<\/small><\/li>\n<\/ol>\n<ol start=\"74\">\n<li><small>Ye, \u201cA hierarchy of system-oriented knowledge for diagnosis of manufacturing system faults.\u201d <em>Information and System Engineering, <\/em>Vol. 2, No. 2, 1996, pp. 79-103<em>.<\/em><\/small><\/li>\n<\/ol>\n<ol start=\"75\">\n<li><small>Ye, \u201cSelf-adapting decision support for interactive fault diagnosis of manufacturing systems.\u201d <em>International Journal of Computer Integrated Manufacturing, <\/em>Vol. 9, No. 5, 1996, pp. 392-401<em>.<\/em><\/small><\/li>\n<\/ol>\n<ol start=\"76\">\n<li><small>Ye, and D. A. Urzi, \u201cHeuristic rules and strategies of assembly planning: Experiment and Implications in the design of assembly decision support system.\u201d <em>International Journal of Production Research, <\/em>Vol. 34, No. 8, 1996, pp. 2211-2228<em>.<\/em><\/small><\/li>\n<\/ol>\n<ol start=\"77\">\n<li><small>Ye, and G. Salvendy, \u201cExpert-novice knowledge of computer programming at different levels of abstraction.\u201d <em>Ergonomics, <\/em>Vol. 39, No. 3, 1996, pp. 461-481<em>.<\/em><\/small><\/li>\n<\/ol>\n<ol start=\"78\">\n<li><small>Ye, and G. Salvendy, \u201cAn objective approach to exploring skill differences in strategies of computer program comprehension.\u201d <em>Behaviour &amp; Information Technology, <\/em>Vol. 15, No. 3, 1996, pp. 139-148.<\/small><\/li>\n<\/ol>\n<ol start=\"79\">\n<li><small>B. Swider, and N. Ye, \u201cEffect of information at different stages of users\u2019 training.\u201d <em>Perceptual and Motor Skills, <\/em>Vol. 83, 1996, pp. 747-754<em>.<\/em><\/small><\/li>\n<\/ol>\n<ol start=\"80\">\n<li><small>K. Hennings, and N. Ye, \u201cInteraction of screen distances, screen letter heights and source document distances.\u201d <em>Interacting with computers, <\/em>Vol. 8, No. 4, 1996, pp. 311-322.<\/small><\/li>\n<\/ol>\n<ol start=\"81\">\n<li><small>Ye, and B. Zhao, \u201cA hybrid intelligent system for fault diagnosis of advanced manufacturing system.\u201d <em>International Journal of Production Research, <\/em>Vol. 34, No. 2, 1996, pp. 555-576<em>.<\/em><\/small><\/li>\n<\/ol>\n<ol start=\"82\">\n<li><small>D. Caldwell, N. Ye, and D. A. Urzi, \u201cRe-engineering the product development cycle and future enhancements of the computer integrated manufacturing environment.\u201d <em>International Journal of Computer Integrated Manufacturing, <\/em>Vol. 8, No. 6, 1995, pp. 441-447<em>.<\/em><\/small><\/li>\n<\/ol>\n<ol start=\"83\">\n<li><small>Ye, and G. Salvendy, \u201cQuantitative and qualitative differences between experts and novices in chunking computer software knowledge.\u201d <em>International Journal of Human-Computer Interaction,<\/em> Vol. 6, No. 1, 1994, pp. 105-118.<\/small><\/li>\n<\/ol>\n<ol start=\"84\">\n<li><small>Ye, B. Zhao, and G. Salvendy, \u201cNeural-networks-aided fault diagnosis in supervisory control of advanced manufacturing systems.\u201d <em>International Journal of Advanced Manufacturing Technology<\/em>, Vol. 8, 1993, pp. 200-209.<\/small><\/li>\n<\/ol>\n<ol start=\"85\">\n<li><small>Ye, and G. Salvendy, \u201cCognitive engineering based knowledge representation in neural networks.\u201d <em>Behaviour &amp; Information Technology,<\/em> Vol. 10, No. 5, 1991, pp. 403-418.<\/small><\/li>\n<\/ol>\n<ol start=\"86\">\n<li><small>Zhong, and N. Ye \u201cJSD methodology in software engineering.\u201d <em>Journal of Computer Science, <\/em>No. 6, 1988, pp. 33-38.<\/small><\/li>\n<\/ol>\n<ol start=\"87\">\n<li><small>Zhong, and N. Ye, \u201cThe conceptual framework of software engineering.\u201d <em>Journal of Computer Science, <\/em>No. 1, 1988, pp. 50-56.<\/small><\/li>\n<\/ol>\n<p><small><u>\u00a0<\/u><\/small><\/p>\n<h4><span style=\"color: #800080\"><u>Conference Papers<\/u><\/span><em><span style=\"color: #800080\"><strong>\u00a0<\/strong>\u00a0\u00a0<\/span>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/em><\/h4>\n<p><em>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/em><span style=\"color: #ff9900\"><strong> 62 papers<\/strong><\/span><\/p>\n<ol>\n<li><small>Ye, T. Y. Fok, X. Wang, J. Collofello, N. Dickson, \u201cLearning partial-value variable relations for system modeling\u201d, In Proceedings of the 2018 IEEE ICCAR Conference, Auckland, New Zealand, April 20-23, 2018.<\/small><\/li>\n<\/ol>\n<ol start=\"2\">\n<li><small>Ye, T. Y. Fok, X. Wang, J. Collofello, N. Dickson, \u201cThe PVAD algorithm to learn partial-value variable associations with applications to modeling for engineering retention,\u201d In Proceedings of the Vienna International Conference on Mathematical Modeling, Vienna, Austria, February 21-23, 2018.<\/small><\/li>\n<\/ol>\n<ol start=\"3\">\n<li><small>Ye, 2017, \u201cThe partial-value association discovery algorithm to identify engineering retention and success characteristics,\u201d In <em>Proceedings of The 9<sup>th<\/sup> International Conference on Education and New Learning Technologies (EDULEARN17)<\/em>, pp. 5033-5041. Barcelona, Spain, July 3-5, 2017.<\/small><\/li>\n<\/ol>\n<ol start=\"4\">\n<li><small>Naganathan, H., Chong, W., and Ye, N., 2015, \u201cLearning energy consumption and demand models through data mining for reverse engineering,\u201d <em>The Proceedings of the International Conference on Sustainable Design, Engineering and Construction 2015<\/em> (May 10-13, 2015, Chicago).<\/small><\/li>\n<\/ol>\n<ol start=\"5\">\n<li><small>Ye, S. S. Yau, D. Huang, M. Baydogan, B. Aranda, A. Roontiva, and P. Hurley, \u201cCause-effect dynamics of computer and network systems for QoS,\u201d <em>The Proceedings of the 2010 Industrial Engineering Research Conference, <\/em>2010.<\/small><\/li>\n<\/ol>\n<ol start=\"6\">\n<li><small>Ye, and B. M. Aranda, \u201cTradeoffs of service, security and attack for cyber system survivability,\u201d The Proceedings of the 2010 Survivability Workshop, 2010.<\/small><\/li>\n<\/ol>\n<ol start=\"7\">\n<li><small>Ye, A. Roontiva and J. He, &#8220;A cluster analysis of neuronal activity in the dorsal premotor cortical area for neuroprosthetic control,&#8221; <em>\u00a0The Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, <\/em>2008, pp. 2638-2641.<\/small><\/li>\n<\/ol>\n<ol start=\"8\">\n<li><small>Zhang, N. Ye, J. He, A. Roontiva and J. Aguayo, &#8220;Two-way ANOVA to identify impacts of multiple interactive behavioral factors on the neuronal population dependency during the reaching motion,&#8221; <em>The Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society,<\/em> 2008, pp. 1335-1338.<\/small><\/li>\n<\/ol>\n<ol start=\"9\">\n<li><small>S. Yau, N. Ye, H. Sarjoughian, and D. Huang, \u201cDeveloping Service-based Software Systems with QoS Monitoring and Adaptation,\u201d<em>The Proceedings of the 12<sup>th<\/sup> IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS\u201908), <\/em>2008, pp. 74-80.<\/small><\/li>\n<\/ol>\n<ol start=\"10\">\n<li><small>Li, and N. Ye, \u201cMining normal and intrusive activity patterns for computer intrusion detection.\u201d In <em>Proceedings of 2004 ISI (Lecture Notes in Computer Science), <\/em>Vol. 3037, edited by H. Chen et al.<em>, <\/em>June 2004, pp. 226-238.<\/small><\/li>\n<\/ol>\n<ol start=\"11\">\n<li><small>Ye, Y. Chen, and T. Farley, \u201cQoS requirements of multimedia data on computer networks.\u201d In <em>Proceedings of the Second International Conference on Active Media Technology<\/em>, Chongqing, P. R. China, May 2004, pp. 183-189.<\/small><\/li>\n<\/ol>\n<ol start=\"12\">\n<li><small>Ye, E. S. Gel, X. Li, T. Farley, Y.-C. Lai, \u201cJob scheduling rules for web server QoS.\u201d In <em>Proceedings of the 2004 International Conference on Computers and Industrial Engineering, <\/em>Jeju, Korea, March 25-27, 2004, Paper No. CIE424.<\/small><\/li>\n<\/ol>\n<ol start=\"13\">\n<li><small>Ye, Y. Chen, and T. Farley, \u201cQoS requirements of multimedia data on computer networks.\u201d In <em>Proceedings of the International Computer Science Conference 2003 Active Media Technology (ICAMT2003), <\/em>2003.<\/small><\/li>\n<\/ol>\n<ol start=\"14\">\n<li><small>Ye, T. Ehiabor, and Y. Zang, \u201cFirst-order versus high-order stochastic model applications to computer intrusion detection.\u201d In <em>Proceedings of the Third IEEE SMC Information Assurance Workshop<\/em>, 2002, pp. 279-283.<\/small><\/li>\n<\/ol>\n<ol start=\"15\">\n<li><small>Ye, Q. Chen, and J.-I. Mou, \u201cUnivariate and multivariate noise cancellation for computer intrusion detection.\u201d In <em>Proceedings of the Third IEEE SMC Information Assurance Workshop<\/em>, 2002, pp. 284-291.<\/small><\/li>\n<\/ol>\n<ol start=\"16\">\n<li><small>Ye, and X. Li, \u201cA machine learning algorithm based on supervised clustering and classification.\u201d In <em>Proceedings of the Sixth International Computer Science Conference on Active Media Technology (ATM-01)<\/em>, 2001, pp. 327-334.<\/small><\/li>\n<\/ol>\n<ol start=\"17\">\n<li><small>Ye, and Y.-C. Lai, \u201cA self-organization approach to dependable information infrastructure.\u201d In <em>Proceedings of the International Conference on Pattern Formation and Self-Organization in Nonlinear Complex Systems<\/em>, 2001, pp. 100-102.<\/small><\/li>\n<\/ol>\n<ol start=\"18\">\n<li><small>Ye, S. M. Emran, X. Li, and Q. Chen, \u201cStatistical process control techniques for an intrusion detection system.\u201d In <em>Proceedings of the Second DARPA Information Survivability Conference and Exposition (DISCEX II), <\/em>2001, pp. 3-14.<\/small><\/li>\n<\/ol>\n<ol start=\"19\">\n<li><small>Ye, and X. Li, \u201cA scalable clustering technique for intrusion signature recognition.\u201d In <em>Proceedings of the Second IEEE SMC Information Assurance Workshop<\/em>, 2001, pp. 1-4.<\/small><\/li>\n<\/ol>\n<ol start=\"20\">\n<li><small>M. Emran, and Ye, N. \u201cRobustness of Canberra metric in computer intrusion detection.\u201d In <em>Proceedings of the Second IEEE SMC Information Assurance Workshop<\/em>, 2001, pp. 80-84.<\/small><\/li>\n<\/ol>\n<ol start=\"21\">\n<li><small>Ye, and Q. Chen, \u201cProfile-based information fusion for intrusion detection.\u201d In <em>Proceedings of the Second IEEE SMC Information Assurance Workshop<\/em>, 2001, pp. 227-230.<\/small><\/li>\n<li><small>M. Emran, and N. Ye, \u201cThe ISA-IDS architecture.\u201d In <em>Proceedings of the Southern Conference on Computing<\/em>, 2000, CD-ROM.<\/small><\/li>\n<li><small>Ye, Q. Chen, and S. M. Emran, \u201cComputer intrusion detection based on statistical distributions of distance metrics.\u201d In <em>Proceedings of the Southern Conference on Co<\/em>mputing, 2000, CD-ROM.\u00a0<\/small><\/li>\n<\/ol>\n<ol start=\"24\">\n<li><small>Ye, \u201cA Markov chain model of temporal behavior for anomaly detection.\u201d In <em>Proceedings of the First IEEE SMC Information Assurance and Security Workshop<\/em>, 2000, pp. 166-169. (37 citations)<\/small><\/li>\n<li><small>Ye, Q. Zhong, and M. Xu, \u201cProbabilistic networks with undirected links for anomaly detection.\u201d In <em>Proceedings of the First IEEE SMC Information Assurance and Security Workshop<\/em>, 2000, pp. 170-174.<\/small><\/li>\n<\/ol>\n<ol start=\"26\">\n<li><small>Ye, Q. Chen, and S. M. Emran, \u201cHotelling\u2019s T<sup>2<\/sup> multivariate profiling for anomaly detection.\u201d In <em>Proceedings of the First IEEE SMC Information Assurance and Security Workshop<\/em>, 2000, pp. 175-181.<\/small><\/li>\n<\/ol>\n<ol start=\"27\">\n<li><small>Ye, Q. Chen, and S. M. Emran, \u201cChi-square statistical profiling for anomaly detection.\u201d In <em>Proceedings of the First IEEE SMC Information Assurance and Security Workshop<\/em>, 2000, pp. 182-188.<\/small><\/li>\n<\/ol>\n<ol start=\"28\">\n<li><small>Ye, X. Li, and S. M. Emran, \u201cDecision trees for signature recognition and state classification.\u201d In <em>Proceedings of the First IEEE SMC Information Assurance and Security Workshop<\/em>, 2000, pp. 189-194.<\/small><\/li>\n<\/ol>\n<ol start=\"29\">\n<li><small>Ye, M. Xu, Q. Chen, and X. Li, \u201cInformation fusion for intrusion detection.\u201d In <em>Proceedings of the Third International Conference on Information Fusion (FUSION 2000),<\/em> 2000, pp. ThB3-17 \u2013 ThB3-20.<\/small><\/li>\n<\/ol>\n<ol start=\"30\">\n<li><small>Ye, and X. Li, \u201cApplication of decision tree to intrusion detection.\u201d In <em>Proceedings of the Second International Conference on Data Mining<\/em>, 2000, CD-ROM.<\/small><\/li>\n<\/ol>\n<ol start=\"31\">\n<li><small>Ye, and M. Xu, \u201cA process model based integration of intrusion detection techniques.\u201d In <em>Proceedings of the 9<sup>th<\/sup> Industrial Engineering Research Conference<\/em>, 2000, CD-ROM.<\/small><\/li>\n<\/ol>\n<ol start=\"32\">\n<li><small>Ye, V. Nguyen, and G. Runger, \u201cPlan performance assessment under uncertainty for command and control.\u201d In <em>Proceedings of the 15<sup>th<\/sup> International Conference on Computers and Their Applications<\/em>, 2000, pp. 354-357.<u><br \/>\n<\/u><\/small><\/li>\n<\/ol>\n<ol start=\"33\">\n<li><small>Choi, K. Dooley, and N. Ye, \u201cControl versus emergence in scaleable enterprise systems.\u201d In <em>Proceedings of the NSF DMII Grantees Conference<\/em>, 2000.<\/small><\/li>\n<\/ol>\n<ol start=\"34\">\n<li><small>Ye, T. Choi, K. J. Dooley, and J. K. Cochran, \u201cModeling and simulation of supply network enterprise.\u201d <em>Program of the INFORMS Annual Meeting San Antonio Fall 2000<\/em>, 2000, pp. 91.<\/small><\/li>\n<\/ol>\n<ol start=\"35\">\n<li><small>Ye, and X. Li, \u201cScalable clustering technique for quality assurance of information systems.\u201d In <em>Program of the INFORMS Annual Meeting San Antonio Fall 2000<\/em>, 2000, pp 69.<\/small><\/li>\n<\/ol>\n<ol start=\"36\">\n<li><small>Bhattacharya, and N. Ye, \u201cDesign of robust, survivable intrusion detection agent.\u201d In <em>Proceedings of the 1<sup>st<\/sup> Asia-Pacific Conference on Intelligent Agent Technology<\/em>, 1999, pp. 274-278.<\/small><\/li>\n<\/ol>\n<ol start=\"37\">\n<li><small>Ye, \u201cEnabling information technology for distributed virtual enterprises.\u201d In <em>Proceedings of the 8<sup>th<\/sup> Industrial Engineering Research Conference, <\/em>1999, CD-ROM.<\/small><\/li>\n<\/ol>\n<ol start=\"38\">\n<li><small>Ye, Q. Zhong, G. Rahn, \u201cConfidence assessment of product quality from process measurement.\u201d In <em>Proceedings of the 8<sup>th<\/sup> Industrial Engineering Research Conference, <\/em>1999, CD-ROM.<\/small><\/li>\n<\/ol>\n<ol start=\"39\">\n<li><small>Nguyen, and N. Ye, \u201cA functional model for production systems engineering.\u201d In <em>Proceedings of the 8<sup>th<\/sup> Industrial Engineering Research Conference, <\/em>1999, CD-ROM.<\/small><\/li>\n<\/ol>\n<ol start=\"40\">\n<li><small>Ye, P. Banerjee, A. Banerjee, and F. Dech, \u201cAssembly planning in traditional and virtual environments.\u201d In <em>Proceedings of the 25<sup>th<\/sup> International Conference on Computers and Industrial Engineering<\/em>, 1999.<\/small><\/li>\n<\/ol>\n<ol start=\"41\">\n<li><small>Ye, \u201cComputer-supported assembly production planning.\u201d In <em>Proceedings of the International Conference on Advanced Manufacturing Technology (ICAMT \u201999), <\/em>1999.<\/small><\/li>\n<\/ol>\n<ol start=\"42\">\n<li><small>Ye, C. Hosmer, J. Giordano, and J. Feldman, \u201cCritical information infrastructure protection through process modeling and model-based information fusion.\u201d In <em>Proceedings of the Information Survivability Workshop, <\/em>1998, pp. 197-201.<\/small><\/li>\n<\/ol>\n<ol start=\"43\">\n<li><small>Ye, J. Giordano, J. Feldman, and Q. Zhong, \u201cInformation fusion techniques for network intrusion detection.\u201d In <em>Proceedings of the 1998 Information Technology Conference<\/em>, 1998, pp. 117-120.<\/small><\/li>\n<\/ol>\n<ol start=\"44\">\n<li><small>Ye, \u201cConfidence assessment of product quality from process measurement \u2013 II.\u201d In <em>Proceedings of the Spring \u201998 Symposium of the Center for Machine Tool Systems Research, <\/em>1998.<\/small><\/li>\n<\/ol>\n<ol start=\"45\">\n<li><small>Ye, \u201cConfidence assessment of product quality from process measurement \u2013 I.\u201d In <em>Proceedings of the Fall \u201997 Symposium of the Center for Machine Tool Systems Research<\/em>, 1997.<\/small><\/li>\n<\/ol>\n<ol start=\"46\">\n<li><small>Ye, \u201cA knowledge hierarchy for diagnosis of manufacturing system faults.\u201d In <em>Proceedings of 1996 NSF Design, Manufacture and<\/em> <em>Industrial Innovations Grantees Conference, <\/em>1996<em>, <\/em>pp. 595-596.<\/small><\/li>\n<\/ol>\n<ol start=\"47\">\n<li><small>Ye, and D. A. Urzi, \u201cA protocol analysis of assembly planning rules and strategies.\u201d In <em>Proceedings of 1995 IEEE International Conference on Systems, Man and Cybernetics<\/em>, 1995, pp. 1759 &#8211; 1762.<\/small><\/li>\n<\/ol>\n<ol start=\"48\">\n<li><small>B. Swider, and N. Ye, \u201cThe effects of knowledge training on user performance in a database query task.\u201d In <em>Proceedings of 1995 Annual International Industrial Ergonomics and Safety Conference, <\/em>1995, pp. 587 &#8211; 591.<\/small><\/li>\n<\/ol>\n<ol start=\"49\">\n<li><small>K. Hennings, and N. Ye, \u201cVDT-induced visual fatigue and its relationship to viewing distances and letter heights.\u201d In <em>Proceedings of 1995 Annual International Industrial Ergonomics and Safety Conference, <\/em>1995, pp. 607 &#8211; 612.<\/small><\/li>\n<\/ol>\n<ol start=\"50\">\n<li><small>Ye, \u201cHuman knowledge and strategy for machine fault diagnosis.\u201d In <em>Proceedings of 1995 NSF Design, Manufacture and<\/em> <em>Industrial Innovations Grantees Conference<\/em>, 1995, pp. 299-300.<\/small><\/li>\n<\/ol>\n<ol start=\"51\">\n<li><small>Ye, \u201cFault diagnosis of advanced manufacturing systems: Operator strategies and performance support with neural networks.\u201d In <em>Proceedings of the Fourth International Conference on Human Aspects of Advanced Manufacturing &amp; Hybrid Automation,<\/em> 1994, pp. 445-448.<\/small><\/li>\n<\/ol>\n<ol start=\"52\">\n<li><small>Ye, \u201cA survey of on-line diagnostics on computer-controlled manufacturing equipment.\u201d In <em>Proceedings of 1994 Symposium on Human Interaction with Complex Systems, <\/em>1994, pp. 307-314.<\/small><\/li>\n<\/ol>\n<ol start=\"53\">\n<li><small>Ye, \u201cComputer simulation of manufacturing systems for exploration of human information needs and strategies in system fault diagnosis.\u201d In <em>Proceedings of 1994 IEEE International Conference on Systems, Man and Cybernetics,<\/em> 1994, pp. 2190-2194.<\/small><\/li>\n<\/ol>\n<ol start=\"54\">\n<li><small>Ye, and G. Salvendy, \u201cQuantitative and qualitative measures on knowledge chunking of computer programmers.\u201d In <em>Proceedings of the 12<sup>th<\/sup> Triennial Congress of International Ergonomics Association<\/em>, 1994, pp. 423-425.<\/small><\/li>\n<\/ol>\n<ol start=\"55\">\n<li><small>Ye, and G. Salvendy, \u201cAbstraction from the physical appearance of computer programs: A barrier to knowledge development of computer programmers.\u201d In <em>Proceedings of the 12th Triennial Congress of International Ergonomics Association,<\/em> 1994, pp. 426-428.<\/small><\/li>\n<\/ol>\n<ol start=\"56\">\n<li><small>Ye, and D. J. Brinkman, \u201cTest and evaluation of knowledge transfer between task domains.\u201d In <em>Proceedings of Human Factors and Ergonomics Society 1994 Annual Meeting,<\/em> 1994, pp. 1123-1127.<\/small><\/li>\n<\/ol>\n<ol start=\"57\">\n<li><small>L. Schneider, and N. Ye, \u201cErgonomic evaluation and improvement of sewing operations in automobile assembly production.\u201d In <em>Proceedings of &#8217;94 Industrial Ergonomics and safety Conference,<\/em> 1994, pp. 377 &#8211; 382.<\/small><\/li>\n<\/ol>\n<ol start=\"58\">\n<li><small>Ye, \u201cFault diagnosis of advanced manufacturing equipment.\u201d In <em>Proceedings of 1994 NSF Design and Manufacturing Grantees Conference,<\/em> 1994, pp. 395-396.<\/small><\/li>\n<\/ol>\n<ol start=\"59\">\n<li><small>C. Hale, and N. Ye, \u201cA fuzzy set model of vehicular guidance\u201d. In <em>Proceedings of Human Factors and Ergonomics Society 1994 Annual Meeting, <\/em>1994, pp. 968.<\/small><\/li>\n<\/ol>\n<ol start=\"60\">\n<li><small>Ye, \u201cImplementation of hypothesis-test strategy for fault diagnosis.\u201d In <em>Proceedings of the 2<sup>nd<\/sup> Industrial Engineering Research Conference,<\/em> 1993, pp. 619-623.<\/small><\/li>\n<\/ol>\n<ol start=\"61\">\n<li><small>Ye, and G. Salvendy, \u201cIntroducing problem solving Strategies of users into the interface design.\u201d In <em>Proceedings of the 5<sup>th<\/sup> International Conference on Human-Computer Interaction, <\/em>1993<em>, <\/em>pp. 873-878.<\/small><\/li>\n<\/ol>\n<ol start=\"62\">\n<li><small>Ye, and G. Salvendy, \u201cAn adaptive interface design using neural networks.\u201d In <em>Proceedings of 4<sup>th<\/sup> International Conference on Human-Computer Interaction,<\/em> 1991, pp. 435-439.<br \/>\n<\/small><\/li>\n<\/ol>\n<h4><span style=\"color: #800080\"><strong><u>Patents<\/u><u>\u00a0<\/u><\/strong><\/span><\/h4>\n<ol>\n<li><small>Ye, and X. Li, \u201cMethod for Classifying Data Using Clustering and Classification Algorithm Supervised,\u201d United State Patent No. 6907436 (US6,907,436, issued June 14, 2005), ASU Case No. M1-015.<\/small><\/li>\n<\/ol>\n<ol start=\"2\">\n<li><small>Ye, X. Li, T. Farley, and B. Harish, \u201cJob Scheduling Techniques to Reduce the Variance of Waiting Time,\u201d United State Patent Application No. 20040237087 (Patent exposure filed November 25, 2004; Patent filed May 10, 2006.), ASU Case No. M3-069 and ASU Case No. M3-080. Available at <a href=\"http:\/\/appft1.uspto.gov\/netacgi\/nph-Parser?Sect1=PTO1&amp;Sect2=HITOFF&amp;d=PG01&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsrchnum.html&amp;r=1&amp;f=G&amp;l=50&amp;s1=%2220040237087%22.PGNR.&amp;OS=DN\/20040237087&amp;RS=DN\/20040237087\">http:\/\/appft1.uspto.gov\/netacgi\/nph-Parser?Sect1=PTO1&amp;Sect2=HITOFF&amp;d=PG01&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsrchnum.html&amp;r=1&amp;f=G&amp;l=50&amp;s1=%2220040237087%22.PGNR.&amp;OS=DN\/20040237087&amp;RS=DN\/20040237087<\/a> or <a href=\"http:\/\/www.freshpatents.com\/Job-scheduling-techniques-to-reduce-the-variance-of-waiting-time-dt20041125ptan20040237087.php\">http:\/\/www.freshpatents.com\/Job-scheduling-techniques-to-reduce-the-variance-of-waiting-time-dt20041125ptan20040237087.php<\/a>.<\/small><br \/>\n<small> (N. Ye, X. Li, and T. Farley, \u201cThe Yelf Spiral: A Task Scheduling Technique to Reduce the Variance of Waiting Time for Performance Stability and Predictability,\u201d ASU Case No. M3-069.)<\/small><br \/>\n<small> (N. Ye, B. Harish, and T. Farley, \u201cBatch Scheduled Admission Control,\u201d ASU Case No. M3-080.)<\/small><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"mb-2\">Book Publishing \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Books: 5 Ye and T. Wu, Developing Windows-based and Web-Enabled Information Systems, Boca Raton, Florida: CRC Press \u2013 A Taylor &amp; Francis Company, 2014, ISBN 978-1-4398-6059-5 (578 pages). Ye, Data Mining: Theories, Algorithms, and Examples, Boca Raton, Florida: CRC Press \u2013 A Taylor &amp; Francis Company, 2013, ISBN: 978-1-4398-0838-2. (329 pages) (with&#8230;<\/p>\n","protected":false},"author":155,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-24","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/faculty.engineering.asu.edu\/nongye\/wp-json\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.engineering.asu.edu\/nongye\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.engineering.asu.edu\/nongye\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.engineering.asu.edu\/nongye\/wp-json\/wp\/v2\/users\/155"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.engineering.asu.edu\/nongye\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":0,"href":"https:\/\/faculty.engineering.asu.edu\/nongye\/wp-json\/wp\/v2\/pages\/24\/revisions"}],"wp:attachment":[{"href":"https:\/\/faculty.engineering.asu.edu\/nongye\/wp-json\/wp\/v2\/media?parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}