- Crime Patterns and Interventions
- Web Data Mining and Analysis
- Data Management and Algorithms
- Text and Document Classification Technologies
- Urban Design and Spatial Analysis
- Parallel Computing and Optimization Techniques
- Machine Learning and Algorithms
- Crime, Illicit Activities, and Governance
- Caching and Content Delivery
- Information Retrieval and Search Behavior
- Machine Learning in Bioinformatics
- Distributed and Parallel Computing Systems
- Advanced Database Systems and Queries
- Data Visualization and Analytics
- Image Retrieval and Classification Techniques
- Complex Network Analysis Techniques
- Algorithms and Data Compression
- Wildlife Conservation and Criminology Analyses
- Rough Sets and Fuzzy Logic
- Biomedical Text Mining and Ontologies
- Traffic and Road Safety
- Gambling Behavior and Treatments
- Advanced Clustering Algorithms Research
- Gene expression and cancer classification
- Cloud Computing and Resource Management
University of Michigan
2024
Simon Fraser University
2013-2022
Inha University
2011-2021
Cranbrook Institute of Science
2021
Tufts University
2020
Intel (United Kingdom)
2008-2014
Intel (United States)
2004-2010
Cancer vaccines have been increasingly studied and developed to prevent or treat various types of cancers. To systematically survey analyze different reported cancer vaccines, we CanVaxKB (https://violinet.org/canvaxkb), the first web-based vaccine knowledgebase that compiles over 670 therapeutic preventive experimentally verified be effective at stages. Vaccine construction host response data are also included. These against such as melanoma, hematological cancer, prostate cancer. has...
Criminologists have long-known that different locations varying levels of risk for criminal victimization. Based on the geometry crime and its corresponding generators attractors, edges (boundaries between relatively homogeneous neighborhoods) are with an elevated In this article, we investigate importance edges. We find victimization rates 2–3 times edge compared to elsewhere. However, effect decreases very quickly moving away from these locations, gone at 40 meters. This general is...
As a new data processing era like Big Data, Cloud Computing, and Internet of Things approaches, the amount being collected in databases far exceeds ability to reduce analyze these without use automated analysis techniques, mining. importance mining has grown, one critical issues emerge is how scale techniques larger complex so that it particularly imperative for computationally intensive tasks such as identifying natural clusters instances. In this paper, we suggest an optimized...
Eskine, Kacinik, and Prinz’s (2011) influential experiment demonstrated that gustatory disgust triggers a heightened sense of moral wrongness. We report large-scale multisite direct replication this study conducted by labs in the Collaborative Replications Education Project. Subjects each sample were randomly assigned to one three beverage conditions: bitter (disgusting), control (neutral), or sweet. Then, subjects made series judgments about wrongness behavior depicted six vignettes. In...
Future Exascale systems are projected to require tens of megawatts. While facilities must provision sufficient power realize peak performance, limited availability will capping. Current approaches for capping limit CPU state and agnostic workload characteristics. Injudicious use such mechanisms in HPC system can impose a devastating impact on performance. We propose integrating limiting into job scheduler. describe power-aware scheduler that monitors consumption, distributes the budget each...
Real-world workloads rarely saturate multi-core processor. CPU C-states can be used to reduce power consumption during processor idle time. The key unsolved problem is: when and how use which C-state. We propose a machine learning prediction method usage model. evaluate this model with traces collected on dual-core quad-core processor, find well predict CPU's activity pattern at the error level not exceeding 4%. Compared existing OS C-state policy, it results in 12% additional saving 2%...
Due to its popularity, influence propagation model has been recently exploited in several social network applications. However, there are some limitations applying the network, which negative information is propagated. In this paper, we present an effective overcome these limitations. Our minimum cost flow effectively propagates influences neighbouring nodes with costs each path of network. The removes noise associated marketing and without overlapping nodes.
Patents have been considered as key enablers for many knowledge- and information-centric companies well institutes. The higher the required patent capability, more important is need an effective efficient search system. Many conventional systems produce unsatisfactory results queries because inherent come from traditional keyword-based models, which inevitably lead to too unrelated items in results. Consequently, these cost experts lots of time iteratively refine manually. In this paper, we...
The exploration of cancer vaccines has yielded a multitude studies, resulting in diverse collection information. heterogeneity vaccine data significantly impedes effective integration and analysis. While CanVaxKB serves as pioneering database for over 670 manually annotated vaccines, it is important to distinguish that database, on its own, does not offer the structured relationships standardized definitions found an ontology. Recognizing this, we expanded Vaccine Ontology (VO) include those...
Crime Pattern Theory offers a theoretical framework for micro level explanation of the dynamics crime in an urban environment. The research focuses on novel use concept boundaries or edges to analyze differences various neighborhoods. Edges are identified where there is dissimilarity between adjacent areas. more likely occur along edges. can be physical, social, temporal and economical product these dimensions. This study compares data from Municipality Burnaby British Columbia, Canada with...
In this paper we present a new approach in the analysis of crime patterns by creating formal framework for merging concepts attractors and pull certain locations on offender movement. This directionality, inherent to city infrastructure, underlies decision processes offenders when choosing movement paths towards attractors. We explore aggregate within six municipalities metropolitan Vancouver. particular, research focuses relationship between multiple strong attractors, formation ridges. use...
Abstract Background The 10th and 9th revisions of the International Statistical Classification Diseases Related Health Problems (ICD10 ICD9) have been adopted worldwide as a well-recognized norm to share codes for diseases, signs symptoms, abnormal findings, etc. international Consortium Clinical Characterization COVID-19 by EHR (4CE) website stores diagnosis disease data using ICD10 ICD9 codes. However, ICD systems are difficult decode due their many shortcomings, which can be addressed...
Within spatial analysis, the decision-making process of individuals involves six interconnected and fundamental elements: current location, destination, distances, directions, time budgets type activity, all which influence movement people in their environment. In this paper we develop a visualization technique allowing for display aggregate travel paths offenders order to identify patterns with it. We show that follows major routes within area is centered locations city-hubs. Results also...
Sporting events can attract large crowds who are capable of spurring on their teams. Emotionally charged have a potential to become violent and disruptive, damaging destroying public properties. Managing controlling riotous is an important responsibility for police officers keep order safety. Devising optimizing crowd management strategies difficult without the knowledge scale situations in advance. This paper presents three-dimensional (3D) simulation framework that simulates riot response...
As the overall size of social networks has been exponentially expanding, technological advance efficient search can flourish in academic sphere, business corporations, and public institutions. Additionally, facing environmental upheaval field information fusion consilience, an effective development various network searches is gaining significance. In this research, we propose use Maximum Reliable Tree algorithm that newly developed based on a graph-based method, as generic technique which...
Single nucleotide polymorphisms (SNPs) is subtle variation in a genomic DNA sequence of individuals the same species. It plays key role pharmaceutical industry to understand variations drug treatment responses between at molecular level. Discovering patterns around SNPs loci very important for better understanding possible origin evolution. Bayesian network has been applied this problem and got promising results. Since based pattern analysis demonstrates high computational complexity, we...