Jeffrey J. P. Tsai

ORCID: 0000-0003-0473-5170
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Software Engineering Methodologies
  • Real-Time Systems Scheduling
  • Formal Methods in Verification
  • Bioinformatics and Genomic Networks
  • Service-Oriented Architecture and Web Services
  • Software Engineering Research
  • Model-Driven Software Engineering Techniques
  • Petri Nets in System Modeling
  • Blockchain Technology Applications and Security
  • RNA and protein synthesis mechanisms
  • Gene expression and cancer classification
  • Network Security and Intrusion Detection
  • Semantic Web and Ontologies
  • IoT and Edge/Fog Computing
  • Parallel Computing and Optimization Techniques
  • Software Reliability and Analysis Research
  • Embedded Systems Design Techniques
  • Genomics and Phylogenetic Studies
  • Computational Drug Discovery Methods
  • AI-based Problem Solving and Planning
  • Biomedical Text Mining and Ontologies
  • Software Testing and Debugging Techniques
  • Software System Performance and Reliability
  • Distributed systems and fault tolerance
  • Machine Learning in Bioinformatics

Asia University
2014-2023

Asia University
2010-2023

National Nuclear Energy Agency of Indonesia
2022

Vrije Universiteit Amsterdam
2019-2021

University of California, Irvine
2019-2021

University of L'Aquila
2021

National University of Singapore
2019-2021

Intel (Taiwan)
2018-2020

Palm Springs General Hospital
2020

Free University of Bozen-Bolzano
2020

This paper proposes a blockchain platform architecture for clinical trial and precision medicine discusses various design aspects provides some insights in the technology requirements challenges. We identify 4 new system components that are required to be built on top of traditional discuss their challenges our platform: (a) based general distributed parallel computing paradigm component devise study methodology big data analytics, (b) application management integrity, integration,...

10.1109/icdcs.2017.61 article EN 2017-06-01

Health Information Exchange (HIE) exhibits remarkable benefits for patient care such as improving healthcare quality and expediting coordinated care. The Office of the National Coordinator (ONC) Technology is seeking patient-centric HIE designs that shift data ownership from providers to patients. There are multiple barriers in current system, security privacy concerns, inconsistency, timely access right records across facilities. After investigating workflow HIE, this paper provides a...

10.1109/jbhi.2020.2993072 article EN cc-by IEEE Journal of Biomedical and Health Informatics 2020-05-08

Improved insight into molecular mechanism of head and neck squamous cell carcinoma (HNSCC) is required to predict prognosis develop a new therapeutic strategy for targeted genes. The aim this study identify significant genes associated with HNSCC further analyze its prognostic significance. In our study, the cancer genome atlas (TCGA) database gene expression profiles GSE6631 from Gene Expression Omnibus (GEO) were used explore differential co-expression in compared normal tissues. A total...

10.3389/fonc.2020.00681 article EN cc-by Frontiers in Oncology 2020-05-22

Breast cancer is one of the most common malignancies. However, molecular mechanisms underlying its pathogenesis remain to be elucidated. The present study aimed identify potential prognostic marker genes associated with progression breast cancer. Weighted gene coexpression network analysis was used construct free-scale networks, evaluate associations between sets and clinical features, candidate biomarkers. expression profiles GSE48213 were selected from Gene Expression Omnibus database....

10.3390/jcm8081160 article EN Journal of Clinical Medicine 2019-08-02

A noninterference monitoring and replay mechanism using the recorded execution history of a program to control behavior guarantee reproduction its errors is presented. Based on this approach, architecture has been developed collect data target real-time software system without affecting execution. designed as well examination states The implemented Motorola 68000 computer in Unix environment. An example used illustrate how detects timing systems.< <ETX...

10.1109/32.57626 article EN IEEE Transactions on Software Engineering 1990-01-01

Cognitive informatics (CI) is the transdisciplinary enquiry of cognitive and information sciences that investigates into internal processing mechanisms processes brain natural intelligence, their engineering applications via an interdisciplinary approach. CI develops a coherent set fundamental theories denotational mathematics, which form foundation for most knowledge based science disciplines such as computer science, neuropsychology, systems cybernetics, software engineering, computational...

10.3233/fi-2009-0015 article EN Fundamenta Informaticae 2009-01-01

We propose and analyze a 3-tier cloud-cloudlet-device hierarchical trust-based service management protocol called IoT-HiTrust for large-scale mobile cloud Internet of Things (IoT) systems. Our allows an IoT customer to report its experiences query subjective trust score toward provider following scalable report-and-query design. conduct formal scalability analysis along with ns-3 simulation performance demonstrating that not only achieves without compromising accuracy, convergence,...

10.1109/tnsm.2018.2886379 article EN IEEE Transactions on Network and Service Management 2018-12-12

We present timing constraint Petri nets (or TCPN's for short) and describe how to use them model a real-time system specification determine whether the is schedulable with respect imposed constraints. The strength of over other time-related in modeling analysis conflict structures. Schedulability conducted three steps: modeling, reachability simulation, analysis. First, we by transforming its along constraints into TCPN; call this net N/sub s/. Then simulate s/ verify marking, M/sub n/,...

10.1109/32.341845 article EN IEEE Transactions on Software Engineering 1995-01-01

The authors describe a model of real-time distributed computing systems, making the simplifying assumption that system is dedicated. They present hardware architecture, operation and implementation noninvasive monitoring which consists two major components: interface module development module. can be considered as front end system. host computer for their approach to demonstrate how it used support testing debugging systems. Essentially, supports different abstraction levels according...

10.1109/2.50269 article EN Computer 1990-03-01

In the era of post-genomics, almost all genes have been sequenced and enormous amounts data generated. Hence, to mine useful information from these is a very important topic. this paper we propose new approach for finding potential motifs in regions located -2000 bp upstream +1000 downstream transcription start site (TSS). This developed based on genetic algorithm (GA). The mutation GA performed by using position weight matrices reserve completely conserved positions. crossover implemented...

10.1109/bibe.2004.1317378 article EN 2004-11-30

Some security protocols or mechanisms have been designed for wireless sensor networks (WSNs). However, an intrusion detection system (IDS) should always be deployed on critical applications to defense in depth. Due the resource constraints, traditional network cannot used directly WSNs. Several schemes proposed detect intrusions networks. But most of them aim some specific attacks (e.g. selective forwarding) particular layers, such as media access layer routing layer. In this paper, we...

10.1109/sutc.2008.39 article EN 2008-06-01

An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, relies on extensive knowledge of experts, particular, their familiarity with the computer be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for detection. IDS usually working dynamically changing environment, which forces continuous tuning model, order maintain sufficient performance. The...

10.1109/tsmcb.2006.885306 article EN IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics) 2007-03-16

This paper provides a vision and proposes mechanisms to transform the blockchain duplicated computing into distributed parallel architecture by transforming smart contract which features data driven from ground up support moving native strategy. new can be employed build large size of set various hosted medical sets might consist personal electronic record (EMR) data. will enable researchers jump start deep learning research for domain. Distributed management, sharing, are core in...

10.1109/icdcs.2018.00129 article EN 2018-07-01

We propose a context-aware trust management model called CATrust for service-oriented ad hoc networks such as peer-to-peer and Internet of Things wherein node can be service requester or provider. The novelty our design lies in the use logistic regression to dynamically estimate trustworthiness provider based on its behavior patterns response context environment changes. develop recommendation filtering mechanism effectively screen out dishonest recommendations even extremely hostile...

10.1109/tsc.2016.2587259 article EN publisher-specific-oa IEEE Transactions on Services Computing 2016-07-07

An interdisciplinary effort is needed for solving the fake news crisis, because solutions depend not only on AI, but also social mechanisms. In this paper, we propose an AI blockchain platform to build a strong collaboration among researchers and media advance research fighting against news. This will provide journalists with crowd-sourced validated factual data emerging gather traced tools that can pointers original sources, propagation path, analyzed experts consult given topic. cheaper...

10.1109/icdcs.2019.00160 article EN 2019-07-01

An intrusion detection system (IDS) is a security layer to detect ongoing intrusive activities in computer systems and networks. Current IDS have two main problems: The first problem that typically so many alarms are generated as overwhelm the operator, of these being false alarms. second continuous tuning model required order maintain sufficient performance due dynamically changing nature monitored system. This manual process relies on operators work out updated solution integrate it into...

10.1145/1380422.1380425 article EN ACM Transactions on Autonomous and Adaptive Systems 2008-08-01

Abstract Knowledge sharing in computer supported collaborative learning (CSCL) requires intensive social interactions among participants, typically the form of annotations. An annotation refers to an explicit expression knowledge that is attached a document reveal conceptual meanings annotator's implicit thoughts. In this research, we develop Semantic Web and services-supported multimedia tool facilitate context CSCL. Our experimental results demonstrate our can improve participating...

10.1080/10494820.2011.528881 article EN Interactive Learning Environments 2011-01-01

Dipeptidyl peptidase-4 (DPP-4) is the vital enzyme that responsible for inactivating intestinal peptides glucagon like peptide-1 (GLP-1) and Gastric inhibitory polypeptide (GIP), which stimulates a decline in blood glucose levels. The aim of this study was to explore inhibition activity small molecule inhibitors DPP-4 following computational strategy based on docking studies molecular dynamics simulations. thorough protocol we applied allowed us derive good correlation parameters between...

10.3390/ijms17060920 article EN International Journal of Molecular Sciences 2016-06-13

Security system architecture governs the composition of components in security systems and interactions between them. It plays a central role design software that ensure secure access to distributed resources networked environment. In particular, must consistently assure policies it is supposed enforce. However, there currently no rigorous systematic way predict such critical properties design. A approach introduced address problem. We present methodology for modeling verifying whether...

10.1109/tkde.2003.1232267 article EN IEEE Transactions on Knowledge and Data Engineering 2003-09-01

The problem of identifying and counting blood cells within the smear is both theoretical practical interest. differential provides invaluable information to pathologist for diagnosis treatment many diseases. In this paper we propose an efficient hierarchical cell image identification classification method based on multi-class support vector machine. automated process, segmentation are most important stages. We segment stained in digital microscopic images extract geometric features each...

10.1109/ism.2011.29 article EN 2011-12-01

Molecular networks are the basis of biological processes. Such can be decomposed into smaller modules, also known as network motifs. These motifs show interesting dynamical behaviors, in which co-operativity effects between motif components play a critical role human diseases. We have developed motif-searching algorithm, is able to identify common types from cancer and signal transduction (STNs). Some interconnected merged together form more complex structures, so-called coupled structures...

10.1186/1752-0509-9-s1-s5 article EN BMC Systems Biology 2015-01-21
Coming Soon ...