Now showing items 1-20 of 39

    • Supervised learning-based tagSNP selection for genome-wide disease classifications 

      Liu, Qingzhong; Sung, Andrew H.; Chen, Zhongxue; Yang, Mary Qu; Huang, Xudong; Yang, Jack (BIomed Central, 2007-07-25)
      Comprehensive evaluation of common genetic variations through association of single nucleotide polymorphisms (SNPs) with complex human diseases on the genome-wide scale is an active area in human genome research. One of ...
    • A Logic Approach to Granular computing 

      Bing, Zhou; Yiyu, Yao (International Journal of Cognitive Informatics and Natural Intelligence, 2008-04)
      Granular computing is an emerging field of study that attempts to formalize and explore methods and heuristics of human problem solving with multiple levels of granularity and abstraction. A fundamental issue of granular ...
    • Independent component analysis of Alzheimer's DNA microarray gene expression data 

      Liu, Qingzhong; Chen, Zhongxue; Vanderburg, Charles R; Rogers, Jack T.; Huang, Xudong; Mou, Xiaoyang; Wei, Kong (Molecular Neurodegeneration, 2009-01-28)
      Background: Gene microarray technology is an effective tool to investigate the simultaneous activity of multiple cellular pathways from hundreds to thousands of genes. However, because data in the colossal amounts generated ...
    • Comparison of feature selection and classification for MALDI-MS data 

      Liu, Qingzhong; Sung, Andrew H.; Chen, Zhongxue; Yang, Jack Y; Qiao, Mengyu; Yang, Mary Qu; Huang, Xudong; Deng, Youping (BMC Genomics, 2009-07-07)
      Introduction: In the classification of Mass Spectrometry (MS) proteomics data, peak detection, feature selection, and learning classifiers are critical to classification accuracy. To better understand which methods are ...
    • Feature Selection and Classification of MAQC-II Breast Cancer and Multiple Myeloma Microarray Gene Expression Data 

      Liu, Qingzhong; Sung, Andrew H.; Chen, Zhongxue; Huang, Xudong; Deng, Youpin; Liu, Jianzhong (PLoS ONE, 2009-12-11)
      Microarray data has a high dimension of variables but available datasets usually have only a small number of samples, thereby making the study of such datasets interesting and challenging. In the task of analyzing microarray ...
    • A gene selection method for GeneChip array data with small sample sizes 

      Chen, Zhongxue; Liu, Qingzhong; McGee, Monnie; Kong, Megan; Huang, Xudong; Deng, Youpin; Scheuermann, Richard H. (2010-07)
      In microarray experiments with small sample sizes, it is a challenge to estimate p-values accurately and decide cutoff p-values for gene selection appropriately. Although permutation-based methods have proved to have ...
    • Gene selection and classification for cancer microarray data based on machine learning and similarity measures 

      Liu, Qingzhong; Sung, Andrew H.; Chen, Zhongxue; Liu, Jianzhong; Chen, Lei; Deng, Youpin; Wang, Zhaohui; Huang, Xudong; Qiao, Mengyu (BMC Genomics, 2011)
      Background: Microarray data have a high dimension of variables and a small sample size. In microarray data analyses, two important issues are how to choose genes, which provide reliable and good prediction for disease ...
    • In Search of Effective Granulization with DTRS for Ternary Classification 

      Bing, Zhou; Yiyu, Yao (International Journal of Cognitive Informatics and Natural Intelligence, 2011)
      Decision-Theoretic Rough Set (DTRS) model provides a three-way decision approach to classification problems, which allows a classifier to make a deferment decision on suspicious examples, rather than being forced to make ...
    • Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics 

      Grispos, George; Storer, Tim; Glisson, William Bradley (International Journal of Digital Crime and Forensics, 2012-04)
      Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy, and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying ...
    • Assessment of gene order computing methods for Alzheimer’s disease 

      Liu, Qingzhong; Hu, Benqiong; Pang, Chaoyang; Wang, Shipend; Chen, Zhongxue; Vanderburg, Charles R; Rogers, Jack T.; Deng, Youping; Huang, Xudong; Jiang, Gang (BMC Medical Genomics, 2013-01-23)
      Background: Computational genomics of Alzheimer disease (AD), the most common form of senile dementia, is a nascent field in AD research. The field includes AD gene clustering by computing gene order which generates higher ...
    • Influence of Machine Learning vs. Ranking Algorithm on the Critical Dimension 

      Sung, Andrew H.; Liu, Qingzhong; Suryakumar, Divya (International Journal of Future Computer and Communication, 2013-06)
      The critical dimension is the minimum number of features required for a learning machine to perform with “high” accuracy, which for a specific dataset is dependent upon the learning machine and the ranking algorithm. ...
    • “Meta Cloud Discovery” Model: An Approach to Integrity Monitoring for Cloud-Based Disaster Recovery Planning 

      Wilbert, Brittany M.; Liu, Qingzhong (International Journal of Information and Education Technology, 2013-10)
      A structure is required to prevent the malicious code from leaking onto the system. The use of sandboxes has become more advance, allowing for investigators to access malicious code while minimizing the risk of infecting ...
    • Web Engineering Security (WES) Methodology 

      Glisson, William Bradley; Welland, Ray (Communications of the Association for Information Systems, 2014)
      The impact of the World Wide Web on basic operational economical components in global information-rich civilizations is significant. The repercussions force organizations to provide justification for security from a ...
    • A new statistical approach to combining p-values using gamma distribution and its application to genome-wide association study 

      Liu, Qingzhong; Chen, Zhongxue; Yang, William; Yang, Jack Y; Li, Jing; Yang, Mary Qu (BMC Bioinformatics, 2014-12-16)
      Background: Combining information from different studies is an important and useful practice in bioinformatics, including genome-wide association study, rare variant data analysis and other set-based analyses. Many statistical ...
    • A Method to Detect AAC Audio Forgery 

      Zhang, Jing; Liu, Qingzhong; Yang, Ming; Sung, Andrew H.; Liu, Yanxin; Chen, Lei; Chen, Zhongxue (Endorsed Transactions on Security and Safety, 2015-05-25)
      Advanced Audio Coding (AAC), a standardized lossy compression scheme for digital audio, which was designed to be the successor of the MP3 format, generally achieves better sound quality than MP3 at similar bit rates. ...
    • Mobile Watermarking against Geometrical Distortions 

      Liu, Qingzhong; Zhang, Jing; Su, Yuting; Zhi, Meili (EAI Endorsed Transactions on Security and Safety, 2015-05-25)
      Mobile watermarking robust to geometrical distortions is still a great challenge. In mobile watermarking, efficient computation is necessary because mobile devices have very limited resources due to power consumption. In ...
    • In-The-Wild Residual Data Research and Privacy 

      Glisson, William Bradley; Storer, Tim; Blyth, Andrew; Grispos, George; Campbell, Matt (Journal of Digital Forensics, Security and Law, 2016)
      As the world becomes increasingly dependent on technology, researchers in industry and academia endeavor to understand how technology is used, the impact it has on everyday life, the artifact life-cycle and overall ...
    • Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices 

      Luckett, Patrick; McDonald, J. Todd; Glisson, William Bradley (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
      The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used ...
    • Implications of Malicious 3D Printer Firmware 

      Moore, Samuel Bennett; Glisson, William Bradley; Yampolskiy, Mark (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
      The utilization of 3D printing technology within the manufacturing process creates an environment that is potentially conducive to malicious activity. Previous research in 3D printing focused on attack vector identification ...
    • Exploitation and Detection of a Malicious Mobile Application 

      Nguyen, Thanh; McDonald, J. Todd; Glisson, William Bradley (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
      Mobile devices are increasingly being embraced by both organizations and individuals in today’s society. Specifically, Android devices have been the prominent mobile device OS for several years. This continued amalgamation ...