
Jiexun Li- Oregon State University
Jiexun Li
- Oregon State University
About
44
Publications
11,261
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,303
Citations
Introduction
Current institution
Publications
Publications (44)
Diabetic Retinopathy (DR) is one of the principal sources of blindness due to diabetes mellitus. It can be identified by lesions of the retina, namely, microaneurysms, hemorrhages, and exudates. DR can be effectively prevented or delayed if discovered early enough and well-managed. Prior image processing studies on diabetic retinopathy typically ex...
Our objective was to apply neural network methodology to determine whether adding coded chief complaint (CCC) data to triage information would result in an improved hospital admission prediction model than one without CCC data.
We carried out a retrospective derivation and validation cohort study of all adult emergency department visits to a single...
Online communities have become popular knowledge sources for both individuals and organizations. Computer-mediated communication research shows that communication patterns play an important role in the collaborative efforts of online knowledge-sharing activities. Existing research is mainly focused on either user egocentric positions in communicati...
Online discussion forums have become a popular knowledge source for sharing information or solving problems. This study is an attempt to apply business process modeling and mining techniques to analyzing online knowledge sharing activities. Traditional process mining techniques have little consideration on social interactions, which are rich in onl...
With the tremendous popularity of social networking sites (SNS) in this era of Web 2.0, enterprises have begun to explore the feasibility of using SNS as platforms to conduct targeted marking and reputation management. Given huge number of users on SNS, how to choose appropriate users as the targets is the key for enterprises to conduct cost-effect...
With the rapid outstripping of limited health care resources by the demands on hospital care, it is of critical importance to find more effective and efficient methods of managing care. Our research addresses the problem of emergency department (ED) crowding by building classification models using various types of pre-admission information to help...
With the tremendous popularity of social networking sites in this era of Web 2.0, increasingly more users are contributing their comments and opinions about products, people, organizations, and many other entities. These online comments often have direct influence on consumers’ buying decisions and the public’s impressions of enterprises. As a resu...
As an alternative to traditional face-to-face counseling and support group, social media has become a new venue for health intervention programs. Different online intervention channels have their own characteristics and advantages. This study focuses on comparing two types of online intervention channels, i.e., forum and Facebook page, for smoking...
The elements of clinical databases are usually named after the clinical terms used in various design artifacts. These terms are instinctively supplied by the users, and hence, different users often use different terms to describe the same clinical concept. This term diversity makes future database integration and analysis a huge challenge. In this...
User-generated content on the Web has become an extremely valuable source for mining and analyzing user opinions on any topic. Recent years have seen an increasing body of work investigating methods to recognize favorable and unfavorable sentiments toward specific subjects from online text. However, most of these efforts focus on English and there...
We propose a criminal identity resolution technique that utilizes both personal identity and social identity information. Guided by existing identity theories, we examine three types of identity features, namely personal identity attributes, social behavior attributes, and social relationship attributes. We also explore three matching strategies, n...
Competitive Intelligence is one of the key factors for enterprise risk management and decision support. However, the functions of Competitive Intelligence are often greatly restricted by the lack of sufficient information sources about the competitors. With the emergence of Web 2.0, the large numbers of customer-generated product reviews often cont...
Identity verification is essential in our mission to identify potential terrorists and criminals. It is not a trivial task
because terrorists reportedly assume multiple identities using either fraudulent or legitimate means. A national identification
card and biometrics technologies have been proposed as solutions to the identity problem. However,...
With the increasing popularity of social networking sites and Web 2.0, people are building social relationships and expressing their opinions in the cyberspace. In this study, we introduce several novel methods to identify online communities with similar sentiments in online social networks. Our preliminary experiment on a real-world dataset demons...
With the popularity of social networking sites (SNS) in this era of Web 2.0, increasingly more users are contributing their opinions about products and organizations. These online comments often have direct influence on consumers' buying decisions and the public's impressions of enterprises. As a result, enterprises have begun to use SNS to conduct...
Many organizations use business policies to govern their business processes, often resulting in huge amounts of policy documents.
As new regulations arise such as Sarbanes-Oxley, these business policies must be modified to ensure their correctness and
consistency. Given the large amounts of business policies, manually analyzing policy documents to...
Predicting gene functions is a challenge for biologists in the postgenomic era. Interactions among genes and their products compose networks that can be used to infer gene functions. Most previous studies adopt a linkage assumption, i.e., they assume that gene interactions indicate functional similarities between connected genes. In this study, we...
With the rapid outstripping of healthcare resources by the demands on hospital care, it is important to find more effective and efficient ways for managing care. This research is aimed at developing new admission prediction models using various pre-hospital variables to help hospital estimate the patients to be admitted. We developed a framework of...
Knowledge management is essential to modern organizations. Due to the information overload problem, managers are facing critical challenges in utilizing the data in organizations. Although several automated tools have been applied, previous applications often deem knowledge items independent and use solely contents, which may limit their analysis a...
Visualizing the intellectual structure of scientific domains using co-cited units such as references or authors has become a routine for domain analysis. In previous studies, paper-reference matrices are usually transformed into reference-reference matrices to obtain co-citation relationships, which are then visualized in different representations,...
Understanding customers is crucial to companies’ decision-making. With the advent of Web 2.0, more and more people choose to express their feelings and articulate their attitudes th rough online social communities such as blogs and web forums. These new sources of information offer the potential to obtain large quantities of customer feedback using...
Identity management is critical for many intelligence and security applications. Identity information is not reliable due to the problems of unintentional errors and intentional deception by the criminals. Most of existing identity matching techniques consider personal identity features only. In this article we propose a PRM-based identity matching...
Relation extraction is the process of scanning text for rela- tionships between named entities. Recently, significant studies have focused on automatically extracting rela- tions from biomedical corpora. Most existing biomedical relation extractors require manual creation of biomedi- cal lexicons or parsing templates based on domain knowl- edge. In...
Many organizations use business policies to govern their business processes. For complex business processes, this results in huge amount of policy documents. Given the large volume of policies, manually analyzing policy documents to discover process information imposes excessive cognitive load. In order to provide a solution to this problem, we hav...
This paper presents an approach for integrating multiple sources of semantics for the creating metadata. A new framework is proposed to define topics and themes with both manually and automatically generated terms. The automatically generated terms include: terms from a semantic analysis of the collections and terms from previous user's queries. An...
Prediction of gene functions is a major challenge to biologists in the post-genomic era. Interactions between genes and their products compose networks and can be used to infer gene functions. Most previous studies used heuristic approaches based on either local or global information of gene interaction networks to assign unknown gene functions. In...
Complex problems like drug crimes often involve a large number of variables interacting with each other. A complex problem may be solved by breaking it into parts (i.e., sub-problems), which can be tackled more easily. The identity matching problem, for example, is a part of the problem of drug and other types of crimes. It is often encountered dur...
We present two algorithms for learning large-scale gene regulatory networks from microarray data: a modified information-theory-based Bayesian network algorithm and a modified association rule algorithm. Simulation-based evaluation using six datasets indicated that both algorithms outperformed their unmodified counterparts, especially when analyzin...
High dimensionality has been a major problem for gene array-based cancer classification. It is critical to identify marker genes for cancer diagnoses. We developed a framework of gene selection methods based on previous studies. This paper focuses on optimal search-based subset selection methods because they evaluate the group performance of genes...
Classifying and organizing documents in repositories is an active research topic in digital library studies. Manually classifying the large volume of patents and patent applications managed by patent offices is a labor-intensive task. Many previous studies have employed patent contents for patent classification with the aim of automating this proce...
Many organizations use digitized policy manuals to help govern their business operations. However, many business processes are often not synchronized in a timely manner with the business policies because of the high costs of redesigning business process models in the face of frequent policy changes. As such, there is a great need for more efficient...
One of the most important goals of biological investigation is to uncover gene functional relations. In this study we propose a framework for extraction and integration of gene functional relations from diverse biological data sources, including gene expression data, biological literature and genomic sequence information. We introduce a two-layered...
Writeprint-based identification is getting very popular in crime investigations due to increasing cybercrime incidents, and unavailability of fingerprints in cybercrime. Writeprint is composed of multiple features, such as vocabulary richness, length of sentence, use of function words, layout of paragraphs, and keywords. These writeprint features c...
With the rapid proliferation of Internet technologies and applications, misuse of online messages for inappropriate or illegal purposes has become a major concern for society. The anonymous nature of online-message distribution makes identity tracing a critical problem. We developed a framework for authorship identification of online messages to ad...
Identity management is critical to various organizational practices ranging from citizen services to crime investigation. The task of searching for a specific identity is difficult because multiple identity representations may exist due to issues related to unintentional errors and intentional deception. In this study we propose a probabilistic rel...
To access the content of digital texts efficiently, it is necessary to provide more sophisticated access than keyword based searching. Genescene provides biomedical researchers with research findings and background relations automatically extracted from text and experimental data. These provide a more detailed overview of the information available....
To access the content of digital texts efficiently, it is necessary to provide more sophisticated access than keyword based searching. Genescene provides biomedical researchers with research findings and background relations automatically extracted from text and experimental data. These provide a more detailed overview of the information available....
Association rule mining is one of the most important fields in data mining and knowledge discovery in databases (KDD). This paper introduces the notion of association rules with degrees of support and implication (ARsi) from quantitative datasets. Several properties of fuzzy implication operators (FIOs) and the notion of Simple ARsi (SARsi) are dis...
Association rule mining is one of the most important fields in data mining. Rules explosion is a problem of concern, as conventional mining algorithms often produce too many rules for decision makers to digest. This paper discusses how to mine interesting rules with the antecedent constraint being positively associated with the consequent. Notions...
Discusses the issues of interestingness in association rule
mining. First, a rule is possibly redundant or misleading even if it
possesses high degrees of confidence and support. Second, association
rules do not reflect the effect of negatively influential facts. Such
problems are related to confidence deviation. In the paper, therefore,
two new me...
Advances in microarray technologies have enabled simultaneous measurement of expression levels of thousands of genes, creating new opportunities and challenges for gene expression data analysis. Several recent studies have proposed to extract gene regulatory relations from microarray data with a wide range of techniques. However, because of the dim...
Complex problems like drug crimes often involve a large number of variables interacting with each other. A complex problem may be solved by breaking it into parts (i.e., sub-problems), which can be tackled more easily. The identity matching problem, for example, is a part of the problem of drug and other types of crimes. It is often encountered dur...