Nabil Adam

Nabil Adam
Rutgers, The State University of New Jersey | Rutgers · Institute for Data Science, Learning, and Applications

About

233
Publications
18,155
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,742
Citations
Introduction
Nabil Adam has co-authored/co-edited eleven books and over 200 publications covering such topics as clinical/healthcare informatics, information security and privacy, machine learning, data mining, Web services, workflow, and modeling & simulation. Papers appeared in refereed journals and conference proceedings including, Cancer Epidemiology, Annals of the New York Academy of Sciences, Journal of Cancer, IEEE Transactions on Big Data, IEEE Transactions on Service Computing, IEEE Transactions on Software Engineering, IEEE Transactions on Knowledge and Data Engineering, ACM Computing Surveys, Communications of the ACM, Transportation Research Part C. His research work has been supported by over $22 million from several agencies, including: DHS; NSF; NSA; EPA; DoD; NASA; NIH; NOAA; and NAS.
Additional affiliations
July 1975 - present
Rutgers, The State University of New Jersey
Position
  • Professor (Full)
Education
May 1970 - May 1975
Columbia University
Field of study
  • Engineering

Publications

Publications (233)
Article
Purpose Users on Social Media (SM) platforms make many decisions related to content sharing, such as whether to create or reuse content, whether to label for easy access by an interest group or not, and whether to disseminate to targeted individuals or broadcast to general audiences. In this study, we investigated if these content-related strategie...
Article
An emergency response process outlines the workflow of different activities that need to be performed in response to an emergency. Effective emergency response requires communication and coordination with the operational systems belonging to different collaborating organizations. Therefore, it is necessary to establish information sharing and syste...
Article
Purpose This paper reviews existing business process (BP) modeling languages that are widely used in the industry as well as recent research work on modeling and analysis of BPs in the service-oriented environment and Internetware-based software paradigm. BPs in such environment are different from traditional BPs due to loose coupling of partner se...
Article
Full-text available
Background: African American women have not benefited equally from recently improved breast cancer survival. We investigated if this was true for all subsets. Methods: We identified 395,170 patients with breast adenocarcinoma from the SEER database from 1990 to 2011 with designated race, age, stage, grade, ER and PR status, marital status and later...
Conference Paper
Social media is a popular platform for daily communication. It is the fastest medium to get real-time information about any event. Event identification and finding relations between them is important for information retrieval, which can be useful in many situations. For example, in case of disaster management this information can be helpful in bett...
Conference Paper
This project investigates the feasibility of using machine learning techniques, specifically neural networks, to make prediction on criminal behavior based on the history of the arrest bookings. The experiment will have to handle imbalanced data frequencies. To combat the challenge, data augmentation and weighted loss function is being developed to...
Book
Smart city (SC) has emerged during the last 2 decades to a broad scientific domain and a dominant industrial market, which attract an interdisciplinary attention. All the scientific fields -from the information and communications technologies (ICT) to the economics and environmental studies or even the humanities- and all the industries -from the I...
Chapter
During large-scale manmade or natural disasters, such as Superstorm Sandy and Hurricanes Harvey and Irma, collaborations among government agencies, NGOs, and businesses need to be coordinated to provide necessary resources to respond to emergency events. However, resources from citizens themselves are underutilized, such as their equipment or exper...
Chapter
While government agencies, NGOs, and even commercial entities immediately swing into action to help out, in the case of large disasters, one of the biggest resources – citizens themselves – are underutilized. The rise of social media creates an opportunity for the citizen participation for disaster response management. By harnessing the power of ci...
Presentation
http://cimic.rutgers.edu/camp/camp2017/people.html
Presentation
http://cimic.rutgers.edu/camp/camp2015/people.html
Presentation
http://cimic.rutgers.edu/camp/camp2014/
Presentation
Cybersecurity Challenges Around the World: Initiatives and Challenges
Article
We hope that this collection of articles will provide digital government researchers, students and government practitioners with an opportunity to reflect on the ways in which evidence-based government depends on data generated and consumed through the data-driven transformation value chain. The data and data products have the power to accomplish t...
Conference Paper
An emergency response process is a plan that outlines the workflow of different activities that need to be performed in response to an emergency situation. Effective response planning requires inter-operability among systems belonging to different organizations. Unlike typical e-government processes that are well structured and have a well-defined...
Article
Outlier detection is one of the most important data analytics tasks and is used in numerous applications and domains. The goal of outlier detection is to find abnormal entities that are significantly different from the remaining data. Often, the underlying data is distributed across different organizations. If outlier detection is done locally, the...
Conference Paper
Full-text available
Business Process (BP) development is a challenging task for small and medium organizations who do not have sufficient resources for design, coding, and management of their BPs. Cloud infrastructure and service-oriented middleware can be leveraged for rapid development and deployment of BPs of such organizations. BP development in the cloud-based en...
Chapter
During large-scale manmade or natural disasters, such as Superstorm Sandy and Hurricanes Harvey and Irma, collaborations among government agencies, NGOs, and businesses need to be coordinated to provide necessary resources to respond to emergency events. However, resources from citizens themselves are underutilized, such as their equipment or exper...
Article
Full-text available
Big data coupled with precision medicine has the potential to significantly improve our understanding and treatment of complex disorders, such as cancer, diabetes, depression, etc. However, the essential problem is that data are stuck in silos, and it is difficult to precisely identify which data would be relevant and useful for any particular type...
Article
Development of a Business Process (BP) is a challenging task for small and medium enterprises (SMEs) which often do not have adequate resources for design, coding, and management of their BPs. Knowledge of existing BPs of related organizations can be exploited for collaborative BP development. However, syntactic and semantic heterogeneity among the...
Article
Introduction: Due to its increasing incidence and its major contribution to healthcare costs, cancer is a major public health problem in the United States. The impact across different services is not well documented and utilization of emergency departments (ED) by cancer patients is not well characterized. The aim of our study was to identify fact...
Article
The last decade has seen an unprecedented increase in the volume and variety of electronic data related to research and development, health records, and patient self-tracking, collectively referred to as Big Data. Properly harnessed, Big Data can provide insights and drive discovery that will accelerate biomedical advances, improve patient outcomes...
Article
Full-text available
Purpose A social media user behavior model is presented as a function of different user types, i.e. light and heavy users. The users’ behaviors are analyzed in terms of knowledge creation, framing and targeting. Design/methodological approach Data consisting of 160,000 tweets by nearly 40,000 twitter users in the city of Newark (NJ, USA) were co...
Conference Paper
Social media platform allow users to exercise their communication strategies for knowledge creation, sharing and dissemination, which can be use by government agencies as an opportunity to better serve their citizens. In this study, we examine the users' perspective of the Social Media User Behavior Model allowing investigating the social media-bas...
Conference Paper
Given the morass of available data, ranking and best match queries are often used to find records of interest. As such, k-NN queries, which give the k closest matches to a query point, are of particular interest, and have many applications. We study this problem in the context of the financial sector, wherein an investment portfolio database is que...
Article
Traffic evacuation is a critical task in disaster management. Planning its evacuation in advance requires taking many factors into consideration such as the destination shelter locations and numbers, the number of vehicles to clear, the traffic congestions as well as traffic road configurations. A traffic evacuation simulation tool can provide the...
Article
Comorbidity greatly increases the complexity of managing disease in patients. Approximately 27% of the US population have two or more concurrent comorbid conditions. Traditional models for assessing the impact of patient demographic and comorbidity burden on patient health outcomes, represented comorbidity conditions by Charlson Comorbidity Index....
Article
Full-text available
BACKGROUND: African American race negatively impacts survival from localized breast cancer but co-variable factors confound the impact. METHODS: Data sets were analyzed from the Surveillance, Epidemiology and End Results (SEER) directories from 1973 to 2011 consisting of patients with designated diagnosis of breast adenocarcinoma, race as White or...
Conference Paper
Full-text available
Social media provides platforms to communicate with large populations and creates a favorable environment exploit the benefit of having access to millions of users. Despite the broad interest, there is insufficient research on aspects of social media use, and very limited empirical research examining the social media within the public sector. In th...
Conference Paper
One of the challenges governments and communities face to achieve smart city goals is dealing with enormous amount of data available - sensors, devices, social media, Web activities and commerce, tracking devices, all generate enormous amount of data, so called Big Data. Our goal is to empower the city government and its citizens to create a safer...
Conference Paper
Data processing/analysis in emergency management is a typical big data scenario. This workshop will bring together researchers and practitioners in big data management, cloud computing, parallel algorithms, internet of things, spatial database, complex event detection, optimization theory, intelligent transportation systems and social networks to s...
Conference Paper
The objective of this paper is to enable organizations to generate an executable business process from high level design specifications. The basic idea is to exploit the knowledge of the existing business processes of related organizations to generate an executable business process for the given organization based on its requirements. However, this...
Article
While government agencies, NGOs, and even commercial entities immediately swing into action to help out, in the case of large disasters, one of the biggest resources-citizens themselves-are underutilized. The rise of social media creates an opportunity for the citizen participation for disaster response management. By harnessing the power of citize...
Article
In this paper, we investigate ways that social media platforms can enhance the responsiveness of branches of local government that deal primarily in performing tasks on the behalf of citizens or interacting with them. More specifically, we utilize the Twitter platform (on the web and capable smartphones) to provide a two way communications channel...
Patent
Full-text available
A modeling tool may be configured to generate a diagrammatic representation of a service-based process, expressed using a diagrammatic modeling language. A model converter may be configured to convert the diagrammatic representation into a formal model of the service-based process, and a model verifier configured to apply constraints to the formal...
Conference Paper
This paper explores the idea of government emergency response and disaster management through the lens of popular social media services. One of the traditional challenges to effective emergency response and disaster management is communication between the government and its constituents. As a consequence of this lack of communication, organization...
Article
Full-text available
How to mitigate a cyber-physical attack that disables the transportation network and releases a cloud of chlorine gas.
Conference Paper
Full-text available
This paper presents the positions of seven international experts regarding current and future grand challenges for modeling and simulation (M&S) supporting the defense and security domain. Topics addressed include new interoperability issues, real-time analysis challenges, evolving military and training exercises, the future role and importance of...
Article
The growing trend of using smartphones and other GPS-enabled devices has provided new opportunities for developing spatial computing applications and technologies in unanticipated and unprecedented ways. Some capabilities of today's smartphones highlight the potential of citizen sensors to enable the next generation of geoinformatics. One promising...
Conference Paper
The maximum-flow problem arises in a wide variety of applications such as financial transactions and logistics collaboration networks, where the data can be modeled as a directed graph. In many such applications, the graph data is actually distributed across several organizations where each owns a portion of the overall graph. Due to privacy concer...
Conference Paper
Full-text available
Virtualized service models are now emerging and redefining the way information technology is delivered. Managing these services efficiently over the cloud is an open challenge. We are developing a policy-based integrated framework for automating acquisition and consumption of Cloud services. We have developed a tool, Smart Cloud Services tool, to a...
Conference Paper
Full-text available
Graph structured data can be found in many domains and applications. Analysis of such data can give valuable insights. Frequent subgraph discovery, the problem of finding the set of subgraphs that is frequent among the underlying database of graphs, has attracted a lot of recent attention. Many algorithms have been proposed to solve this problem. H...
Article
Full-text available
A vast majority of Web Services exist without explicit associated semantic descriptions. As a result many services that are relevant to a specific user service request may not be considered during service discovery. In this paper, we address the issue of Web Service discovery given non-explicit service description semantics that match a specific se...
Article
Full-text available
Graph structured data can be ubiquitously found in the real world. For example, social networks can easily be represented as graphs where the graph connotes the complex sets of relationships between members of social systems. While their analysis could be beneficial in many aspects, publishing certain types of social networks raises significant pri...
Conference Paper
Social media, such as blogs, Twitter, and information portals, have emerged as the dominant communication mechanism of society. Exploiting such input to gain awareness of an incident is a critical direction for research in effective emergency management. In this paper we present an overview of the SMART-C system, which is part of the social media i...
Conference Paper
Full-text available
A business process can be developed as a composition of Web services provided by different service providers. These service providers may have their own policies and constraints for service provisioning and collaboration. In this paper, we focus on secure composition of services, specifically from the perspective of service enactment. Service enact...
Chapter
For health care related research studies the medical records of patients may need to be retrieved from multiple sites with different regulations on the disclosure of health information. Given the sensitive nature of health care information, privacy is a major concern when patients’ health care data is used for research purposes. In this paper, the...
Article
Full-text available
Disasters, whether environmental or manmade, have catastrophic impacts that require both quick action and long-term interventions. Mitigating the effects of those disasters requires knowledge about similar events and advanced disaster planning. Major challenges in disaster planning and intervention include a lack of up-to-date information on situat...
Conference Paper
DHS has recently established the Analytic Capability Development Working Group (ACDWG) whose aim is to reduce the lifecycle and capital investment costs of analytic efforts while continually enhancing the ability to inform decision-makers within mandated timeframes. Specifically, the working group is helping to develop a common analytic frameworks...
Article
Full-text available
Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables. Indeed, due to their simplicity and ease, they are one of the first methods used to analyze gathered data. Typically, the construction of contingency tables from source data is considered straightforward since all da...
Chapter
Cloud computing has many attractive countenance, because of those countenance; it has become much easier to store large amount of data on it. Hence, preserving the data on cloud helps user to access the data from any place whenever it is needed. Thus due to the vast data, a very big concern emerges i.e. security and privacy. Encryption helps user t...
Article
For an effective and timely acquisition, deployment, and distribution of needed drugs in emergencies, it is crucial to provide the end-to-end visibility of the pharmaceutical supply chain (PSC) to the involved parties. Recently, the Science and Technology Directorate of the U.S. Department of Homeland Security has developed a standard-based framewo...
Conference Paper
Full-text available
Many real world phenomena can be naturally modeled as graph structures whose nodes representing entities and whose edges representing interactions or relationships between entities. The analysis of the graph data have many practical implications. However, the release of the data often poses considerable privacy risk to the individuals involved. In...
Article
Success of anomaly detection, similar to other spatial data mining techniques, relies on neighborhood definition. In this paper, we argue that the anomalous behavior of spatial objects in a neighborhood can be truly captured when both (a) spatial autocorrelation (similar behavior of nearby objects due to proximity) and (b) spatial heterogeneity (di...
Conference Paper
Distributed and open environments require flexible, scalable and extendible trust verification mechanisms to access resources. To address this, the use of digital credentials as a means for making access decisions has been promoted. The resource owner needs to verify if the requester's credentials satisfy the security policy of the owner. However,...
Chapter
One of the major challenges facing a data warehouse is to improve the query response time while keeping the maintenance cost to a minimum. Recent solutions to tackle this problem suggest to selectively materialize certain views and compute the remaining views on-the-fly, so that the cost is optimized. Unfortunately, in the case of a spatial data wa...
Article
Full-text available
Given its importance, the problem of object discovery in High-Resolution Remote-Sensing (HRRS) imagery has received a lot of attention in the literature. De- spite the vast amount of expert endeavor spent on this problem, more efforts have been expected to discover and utilize hidden semantics of images for object detection. To that end, in this pa...
Conference Paper
Following a year-long architecture development project, the Department of Homeland Security, Directorate of Science and Technology awarded a Phase II contract to prototype and pilot the Unified Incident Command and Decision Support (UICDS) middleware framework. UICDS is an initiative to architect, develop, and deploy a ldquomiddlewarerdquo foundati...
Conference Paper
Full-text available
Link discovery is a process of identifying association(s) a mong dif- ferent entities included in a complex network structure. These association(s) may represent any interaction among entities, for example between people or even bank accounts. The need for link discovery arises in many applications including law enforcement, counter-terrorism, soci...
Conference Paper
Full-text available
User search query logs have proven to be very useful, but have vast potential for misuse. Several incidents have shown that simple removal of identifiers is insufficient to protect the identity of users. Publishing such inadequately anonymized data can cause severe breach of privacy. While significant effort has been expended on coming up with anon...