Jiexun Li

Jiexun Li
  • Oregon State University

About

44
Publications
11,261
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,303
Citations
Current institution
Oregon State University

Publications

Publications (44)
Chapter
Diabetic Retinopathy (DR) is one of the principal sources of blindness due to diabetes mellitus. It can be identified by lesions of the retina, namely, microaneurysms, hemorrhages, and exudates. DR can be effectively prevented or delayed if discovered early enough and well-managed. Prior image processing studies on diabetic retinopathy typically ex...
Article
Our objective was to apply neural network methodology to determine whether adding coded chief complaint (CCC) data to triage information would result in an improved hospital admission prediction model than one without CCC data. We carried out a retrospective derivation and validation cohort study of all adult emergency department visits to a single...
Article
Online communities have become popular knowledge sources for both individuals and organizations. Computer-mediated communication research shows that communication patterns play an important role in the collaborative efforts of online knowledge-sharing activities. Existing research is mainly focused on either user egocentric positions in communicati...
Conference Paper
Full-text available
Online discussion forums have become a popular knowledge source for sharing information or solving problems. This study is an attempt to apply business process modeling and mining techniques to analyzing online knowledge sharing activities. Traditional process mining techniques have little consideration on social interactions, which are rich in onl...
Article
With the tremendous popularity of social networking sites (SNS) in this era of Web 2.0, enterprises have begun to explore the feasibility of using SNS as platforms to conduct targeted marking and reputation management. Given huge number of users on SNS, how to choose appropriate users as the targets is the key for enterprises to conduct cost-effect...
Article
Full-text available
With the rapid outstripping of limited health care resources by the demands on hospital care, it is of critical importance to find more effective and efficient methods of managing care. Our research addresses the problem of emergency department (ED) crowding by building classification models using various types of pre-admission information to help...
Article
With the tremendous popularity of social networking sites in this era of Web 2.0, increasingly more users are contributing their comments and opinions about products, people, organizations, and many other entities. These online comments often have direct influence on consumers’ buying decisions and the public’s impressions of enterprises. As a resu...
Conference Paper
As an alternative to traditional face-to-face counseling and support group, social media has become a new venue for health intervention programs. Different online intervention channels have their own characteristics and advantages. This study focuses on comparing two types of online intervention channels, i.e., forum and Facebook page, for smoking...
Article
Full-text available
The elements of clinical databases are usually named after the clinical terms used in various design artifacts. These terms are instinctively supplied by the users, and hence, different users often use different terms to describe the same clinical concept. This term diversity makes future database integration and analysis a huge challenge. In this...
Article
User-generated content on the Web has become an extremely valuable source for mining and analyzing user opinions on any topic. Recent years have seen an increasing body of work investigating methods to recognize favorable and unfavorable sentiments toward specific subjects from online text. However, most of these efforts focus on English and there...
Article
We propose a criminal identity resolution technique that utilizes both personal identity and social identity information. Guided by existing identity theories, we examine three types of identity features, namely personal identity attributes, social behavior attributes, and social relationship attributes. We also explore three matching strategies, n...
Article
Competitive Intelligence is one of the key factors for enterprise risk management and decision support. However, the functions of Competitive Intelligence are often greatly restricted by the lack of sufficient information sources about the competitors. With the emergence of Web 2.0, the large numbers of customer-generated product reviews often cont...
Article
Identity verification is essential in our mission to identify potential terrorists and criminals. It is not a trivial task because terrorists reportedly assume multiple identities using either fraudulent or legitimate means. A national identification card and biometrics technologies have been proposed as solutions to the identity problem. However,...
Conference Paper
With the increasing popularity of social networking sites and Web 2.0, people are building social relationships and expressing their opinions in the cyberspace. In this study, we introduce several novel methods to identify online communities with similar sentiments in online social networks. Our preliminary experiment on a real-world dataset demons...
Conference Paper
With the popularity of social networking sites (SNS) in this era of Web 2.0, increasingly more users are contributing their opinions about products and organizations. These online comments often have direct influence on consumers' buying decisions and the public's impressions of enterprises. As a result, enterprises have begun to use SNS to conduct...
Article
Many organizations use business policies to govern their business processes, often resulting in huge amounts of policy documents. As new regulations arise such as Sarbanes-Oxley, these business policies must be modified to ensure their correctness and consistency. Given the large amounts of business policies, manually analyzing policy documents to...
Article
Full-text available
Predicting gene functions is a challenge for biologists in the postgenomic era. Interactions among genes and their products compose networks that can be used to infer gene functions. Most previous studies adopt a linkage assumption, i.e., they assume that gene interactions indicate functional similarities between connected genes. In this study, we...
Conference Paper
With the rapid outstripping of healthcare resources by the demands on hospital care, it is important to find more effective and efficient ways for managing care. This research is aimed at developing new admission prediction models using various pre-hospital variables to help hospital estimate the patients to be admitted. We developed a framework of...
Article
Full-text available
Knowledge management is essential to modern organizations. Due to the information overload problem, managers are facing critical challenges in utilizing the data in organizations. Although several automated tools have been applied, previous applications often deem knowledge items independent and use solely contents, which may limit their analysis a...
Article
Full-text available
Visualizing the intellectual structure of scientific domains using co-cited units such as references or authors has become a routine for domain analysis. In previous studies, paper-reference matrices are usually transformed into reference-reference matrices to obtain co-citation relationships, which are then visualized in different representations,...
Conference Paper
Full-text available
Understanding customers is crucial to companies’ decision-making. With the advent of Web 2.0, more and more people choose to express their feelings and articulate their attitudes th rough online social communities such as blogs and web forums. These new sources of information offer the potential to obtain large quantities of customer feedback using...
Conference Paper
Identity management is critical for many intelligence and security applications. Identity information is not reliable due to the problems of unintentional errors and intentional deception by the criminals. Most of existing identity matching techniques consider personal identity features only. In this article we propose a PRM-based identity matching...
Article
Relation extraction is the process of scanning text for rela- tionships between named entities. Recently, significant studies have focused on automatically extracting rela- tions from biomedical corpora. Most existing biomedical relation extractors require manual creation of biomedi- cal lexicons or parsing templates based on domain knowl- edge. In...
Conference Paper
Many organizations use business policies to govern their business processes. For complex business processes, this results in huge amount of policy documents. Given the large volume of policies, manually analyzing policy documents to discover process information imposes excessive cognitive load. In order to provide a solution to this problem, we hav...
Article
Full-text available
This paper presents an approach for integrating multiple sources of semantics for the creating metadata. A new framework is proposed to define topics and themes with both manually and automatically generated terms. The automatically generated terms include: terms from a semantic analysis of the collections and terms from previous user's queries. An...
Conference Paper
Full-text available
Prediction of gene functions is a major challenge to biologists in the post-genomic era. Interactions between genes and their products compose networks and can be used to infer gene functions. Most previous studies used heuristic approaches based on either local or global information of gene interaction networks to assign unknown gene functions. In...
Article
Full-text available
Complex problems like drug crimes often involve a large number of variables interacting with each other. A complex problem may be solved by breaking it into parts (i.e., sub-problems), which can be tackled more easily. The identity matching problem, for example, is a part of the problem of drug and other types of crimes. It is often encountered dur...
Article
We present two algorithms for learning large-scale gene regulatory networks from microarray data: a modified information-theory-based Bayesian network algorithm and a modified association rule algorithm. Simulation-based evaluation using six datasets indicated that both algorithms outperformed their unmodified counterparts, especially when analyzin...
Article
Full-text available
High dimensionality has been a major problem for gene array-based cancer classification. It is critical to identify marker genes for cancer diagnoses. We developed a framework of gene selection methods based on previous studies. This paper focuses on optimal search-based subset selection methods because they evaluate the group performance of genes...
Conference Paper
Full-text available
Classifying and organizing documents in repositories is an active research topic in digital library studies. Manually classifying the large volume of patents and patent applications managed by patent offices is a labor-intensive task. Many previous studies have employed patent contents for patent classification with the aim of automating this proce...
Article
Many organizations use digitized policy manuals to help govern their business operations. However, many business processes are often not synchronized in a timely manner with the business policies because of the high costs of redesigning business process models in the face of frequent policy changes. As such, there is a great need for more efficient...
Article
Full-text available
One of the most important goals of biological investigation is to uncover gene functional relations. In this study we propose a framework for extraction and integration of gene functional relations from diverse biological data sources, including gene expression data, biological literature and genomic sequence information. We introduce a two-layered...
Article
Writeprint-based identification is getting very popular in crime investigations due to increasing cybercrime incidents, and unavailability of fingerprints in cybercrime. Writeprint is composed of multiple features, such as vocabulary richness, length of sentence, use of function words, layout of paragraphs, and keywords. These writeprint features c...
Article
With the rapid proliferation of Internet technologies and applications, misuse of online messages for inappropriate or illegal purposes has become a major concern for society. The anonymous nature of online-message distribution makes identity tracing a critical problem. We developed a framework for authorship identification of online messages to ad...
Conference Paper
Full-text available
Identity management is critical to various organizational practices ranging from citizen services to crime investigation. The task of searching for a specific identity is difficult because multiple identity representations may exist due to issues related to unintentional errors and intentional deception. In this study we propose a probabilistic rel...
Conference Paper
Full-text available
To access the content of digital texts efficiently, it is necessary to provide more sophisticated access than keyword based searching. Genescene provides biomedical researchers with research findings and background relations automatically extracted from text and experimental data. These provide a more detailed overview of the information available....
Article
Full-text available
To access the content of digital texts efficiently, it is necessary to provide more sophisticated access than keyword based searching. Genescene provides biomedical researchers with research findings and background relations automatically extracted from text and experimental data. These provide a more detailed overview of the information available....
Conference Paper
Association rule mining is one of the most important fields in data mining and knowledge discovery in databases (KDD). This paper introduces the notion of association rules with degrees of support and implication (ARsi) from quantitative datasets. Several properties of fuzzy implication operators (FIOs) and the notion of Simple ARsi (SARsi) are dis...
Conference Paper
Association rule mining is one of the most important fields in data mining. Rules explosion is a problem of concern, as conventional mining algorithms often produce too many rules for decision makers to digest. This paper discusses how to mine interesting rules with the antecedent constraint being positively associated with the consequent. Notions...
Conference Paper
Full-text available
Discusses the issues of interestingness in association rule mining. First, a rule is possibly redundant or misleading even if it possesses high degrees of confidence and support. Second, association rules do not reflect the effect of negatively influential facts. Such problems are related to confidence deviation. In the paper, therefore, two new me...
Article
Full-text available
Advances in microarray technologies have enabled simultaneous measurement of expression levels of thousands of genes, creating new opportunities and challenges for gene expression data analysis. Several recent studies have proposed to extract gene regulatory relations from microarray data with a wide range of techniques. However, because of the dim...
Article
Full-text available
Complex problems like drug crimes often involve a large number of variables interacting with each other. A complex problem may be solved by breaking it into parts (i.e., sub-problems), which can be tackled more easily. The identity matching problem, for example, is a part of the problem of drug and other types of crimes. It is often encountered dur...

Network

Cited By