Modern data collection and storage results in complex and high-dimensional databases: they include a large number of variables, with a lot of interactions. At this same time, access and release of information that is, or is derived from, personal information involves complex challenges in terms of the potential for inappropriate disclosure (e.g., identification).
In this project we propose to develop a statistical methodology that can inform the evaluation of privacy assurances while preserving the statistical utility of complex, high-dimensional health data.
Distributed computing is a model in which components of a software system are shared among multiple computers to improve efficiency and performance. The growing interest in cloud computing scenarios that incorporate both distributed computing capabilities and heterogeneous hardware presents a significant opportunity for network operators. The aim of this Research is to develop a purpose-built discrete-event simulator for distributed quantum computing and identify further challenges and open problems arising from the design of a Distributed Quantum Computing ecosystem.
This research project aims to employ advanced machine learning and data science models for Developing Proprietary Natural Resource Business Models for Identification of Feedstocks Susceptible to a By-Product First Solution.
This project aims to build a new analysis toolkit for shared bikes, escooters, and cars. The method is based on a mathematical theory called complex network. Like internet and human brains, transportation system possesses network structure. To study its topological properties, we can calculate some indices that encode the information of the network. There are theoretical and empirical studies proposing and examining various models based on spatial networks structure of transportation, and especially shared mobility.
The objective of this project is to create market sentiment indicators for cryptocurrencies. Market sentiment indicators are built from text analysis of exchanges on Twitter and other sources, that may include embedded or references images (e.g., price curves) and videos. The text dataset for cryptocurrencies may have a very structure from that of traditional currencies. For example, cryptocurrency tweets may reference ‘mining’, which is a concept that does not exist for traditional currencies.
Orthognathic surgery is a procedure used to correct facial deformities and is a mainstay treatment in the oraland maxillofacial surgery field. Another common procedure in the field of oral and maxillofacial surgery is dentalimplant surgery that is used to replace missing teeth. Currently, dental implants are one of the most preferredtreatment options for recreating tooth form and function.The surgical procedure is complex and requires extensive planning and accuracy to obtain a successfuloutcome.
The Firefighter Problem is a deterministic, discrete-time model of the spread of a fire on the nodes of a graph. If a graph is a network where bank accounts are nodes, then an edge between two accounts is a transaction between one bank account and another. Imagine we have a suspicious bank account with suspicious transactions possibly tied to money laundering. We view this suspicious bank account as a place a fire breaks out. Then, those accounts that receive money from the suspicious bank account are considered suspect.
Older adults with frailty are at high-risk of declines in their health and do not bounce back as well as their non-frail counterparts. These patients are among the highest users of health care because they end up in crises and go to emergency, are hospitalized, or die. But, if frailty is detected and managed earlier, before negative events occur, it can improve patient outcomes and decrease health system costs. Currently, frailty detection relies on tools that take added time and resources that family doctors do not have.
The goal of this MITACS proposed project is to evaluate the preliminary performance and economics of the carbon dioxide capture technology using recovered waste heat from engine exhaust and utilizing the recovered heat to regenerate solvents in a small-scale carbon dioxide (CO2) capture project. This is because the regeneration of the solvents requires high energy. The combination of waste heat recovery and carbon dioxide on a single system, which overcomes this problem and provides an energy efficient solution, will be studied for use at new facilities and retrofit to existing facilities.
As financial networks grow limiting the spread of illicit funds becomes an increasingly important aspect of security. We model this spread within a network-like structure called a graph and examine how best to defend against the spread of these illicit funds. This problem has been examined in the past and we further that knowledge by restricting the defender’s ability to defend the network, thus allowing our models to behave more similarly to the real world in certain applications.