Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics最新文献

筛选
英文 中文
A decomposition approach to imbalanced classification 一种不平衡分类的分解方法
A. Shrivastava, Junjie Cao
{"title":"A decomposition approach to imbalanced classification","authors":"A. Shrivastava, Junjie Cao","doi":"10.1109/ISI.2011.5984093","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984093","url":null,"abstract":"An important characteristic of many modern systems is the availability of large amounts of event data, collected through various sensors. Certain events occur very rarely among these, but may be critical to a successfully functioning system. Examples of these include faulty products, credit card frauds, among others. In this paper, we propose a framework for solving this problem, of detecting rare events, when modeled as a supervised learning task. Specifically, we consider an imbalanced 2-class classification problem. We overcome the challenge of class imbalance by decomposing the original learning task into many simpler learning tasks. A useful feature of the proposed algorithm is that the decision rule is simple enough to infer the importance of individual covariates in rare event detection. We present performance results on some public datasets to demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lessons from method: A successful Electronic Medical Record (EMR) system implementation 经验教训:一个成功的电子病历(EMR)系统的实施
Yun Wan, William Perry
{"title":"Lessons from method: A successful Electronic Medical Record (EMR) system implementation","authors":"Yun Wan, William Perry","doi":"10.1109/ISI.2011.5984091","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984091","url":null,"abstract":"This is a case study on Electronic Medical Record (EMR) system implementation by a major hospital system in the United States. From initial planning to final implementation, the whole process was illustrated in details. Important lessons from this implementation effort were being discussed.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A theoretical model to minimize the operational cost for canary-equipped electronic system's health management 金丝雀电子系统健康管理运行成本最小化的理论模型
Wenbin Wang, Yifang Liu, M. Pecht
{"title":"A theoretical model to minimize the operational cost for canary-equipped electronic system's health management","authors":"Wenbin Wang, Yifang Liu, M. Pecht","doi":"10.1109/ISI.2011.5984088","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984088","url":null,"abstract":"The earlier warning of electronic systems failure provided by canaries attached to them can effectively reduce system life cycle operational costs with respect to spare parts and replacement decisions. This paper presents a theoretical model for the derivation of the expected total cost per unit time in terms of the order interval and maximum allowable stock level.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133694849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web content mining for alias identification: A first step towards suspect tracking 用于别名识别的Web内容挖掘:嫌疑犯跟踪的第一步
Tarique Anwar, M. Abulaish, K. Alghathbar
{"title":"Web content mining for alias identification: A first step towards suspect tracking","authors":"Tarique Anwar, M. Abulaish, K. Alghathbar","doi":"10.1109/ISI.2011.5984000","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984000","url":null,"abstract":"In this paper, we present the design of a web content mining system to identify and extract aliases of a given entity from the Web in an automatic way. Starting with a pattern-based information extraction process, the system applies n-gram technique to extract candidate aliases. Thereafter, various statistical measures are applied to identify feasible aliases from them. The extracted aliases can be used to generate profiles of suspects and keep track of their movements on the Web using different identities.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133654226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The spatio-temporal generalized additive model for criminal incidents 犯罪事件的时空广义加性模型
Xiaofeng Wang, Donald E. Brown
{"title":"The spatio-temporal generalized additive model for criminal incidents","authors":"Xiaofeng Wang, Donald E. Brown","doi":"10.1109/ISI.2011.5984048","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984048","url":null,"abstract":"Law enforcement agencies need to model spatio-temporal patterns of criminal incidents. With well developed models, they can study the causality of crimes and predict future criminal incidents, and they can use the results to help prevent crimes. In this paper, we described our newly developed spatio-temporal generalized additive model (S-T GAM) to discover underlying factors related to crimes and predict future incidents. The model can fully utilize many different types of data, such as spatial, temporal, geographic, and demographic data, to make predictions. We efficiently estimated the parameters for S-T GAM using iteratively re-weighted least squares and maximum likelihood and the resulting estimates provided for model interpretability. In this paper we showed the evaluation of S-T GAM with the actual criminal incident data from Charlottesville, Virginia. The evaluation results showed that S-T GAM outperformed the previous spatial prediction models in predicting future criminal incidents.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130511843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Enabling dynamic linkage of linguistic census data at Statistics Canada (extended abstract) 启用加拿大统计局语言普查数据的动态链接(扩展摘要)
A. Casteigts, Marie-Hélène Chomienne, L. Bouchard, Guy-Vincent Jourdan
{"title":"Enabling dynamic linkage of linguistic census data at Statistics Canada (extended abstract)","authors":"A. Casteigts, Marie-Hélène Chomienne, L. Bouchard, Guy-Vincent Jourdan","doi":"10.1109/ISI.2011.5984777","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984777","url":null,"abstract":"Research in population health consists in studying the impact of various factors (determinants) on health, with the longterm objective of yielding better policies, programs, and services. Researchers of Official Language Minority Communities (OLMCs) focus specifically on determinants related to speaking a minority language, such as English in Quebec, or French in the rest of Canada. Investigations of this type require the possibility of associating health data to linguistic information. Unfortunately, the largest health databases in Ontario, held at the Institute for Clinical Evaluative Sciences (ICES), do not contain usable linguistic variables to date. High-quality language variables however exist at Statistics Canada (2006 Census), and we are interested in enabling its linkage to ICES health data in a dynamic way. The linkage we consider is intrinsically transient and aggregated: it consists in allowing ICES to learn interactively how many Francophones are present in a given sample of individuals (sum queries). We suggest two possible privacy-preserving mechanisms to enable dynamic sum queries: 1) by constraining the dataflow itself; 2) by adapting recent results ([1]) to characterize what leakage is at play in our scenario and what parameters impact the tradeoff between leakage and utility. We rely on these results to argue that a safe exposition of linguistic data could indeed be envisioned, and beyond, that similar techniques could be used to enrich provincial health databases in general with a range of federal census data, making it possible to perform fine-grained community-based studies in Canada.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114275096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A reliability integrated acceptance test plan for series systems whose components following exponential distributions 对组件服从指数分布的串联系统的可靠性综合验收试验计划
Xuejing Li, Dan Yu
{"title":"A reliability integrated acceptance test plan for series systems whose components following exponential distributions","authors":"Xuejing Li, Dan Yu","doi":"10.1109/ISI.2011.5984110","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984110","url":null,"abstract":"For the series systems whose components follow the exponential distribution, we put forward the reliability integrated acceptance test plan based on the components' information. Finally, we will provide a simulation example to demonstrate our method.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121941225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LanguageNet: A novel framework for processing unstructured text information LanguageNet:一个处理非结构化文本信息的新框架
Abdul Rasool Qureshi, N. Memon, U. Wiil
{"title":"LanguageNet: A novel framework for processing unstructured text information","authors":"Abdul Rasool Qureshi, N. Memon, U. Wiil","doi":"10.1109/ISI.2011.5984057","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984057","url":null,"abstract":"In this paper we present LanguageNet—a novel framework for processing unstructured text information from human generated content. The state of the art information processing frameworks have some shortcomings: modeled in generalized form, trained on fixed (limited) data sets, and leaving the specialization necessary for information consolidation to the end users. The proposed framework is the first major attempt to address these shortcomings. LanguageNet provides extended support of graphical methods contributing added value to the capabilities of information processing. We discuss the benefits of the framework and compare it with the available state of the art. We also describe how the framework improves the information gathering process and contribute towards building systems with better performance in the domain of Open Source Intelligence.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Al Qaeda terrorist financing and technologies to track the finance network 追踪基地组织恐怖分子融资和技术的金融网络
I. Sakharova
{"title":"Al Qaeda terrorist financing and technologies to track the finance network","authors":"I. Sakharova","doi":"10.1109/ISI.2011.5984044","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984044","url":null,"abstract":"In this paper, we have analyzed terrorist financing. In particular, we have examined the financing of the Al Qaeda finance network and determined how information technologies may be used to extract information from this network.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121604045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A tamper-proof software watermark using code encryption 使用代码加密的防篡改软件水印
Zhanyong Tang, Dingyi Fang
{"title":"A tamper-proof software watermark using code encryption","authors":"Zhanyong Tang, Dingyi Fang","doi":"10.1109/ISI.2011.5983991","DOIUrl":"https://doi.org/10.1109/ISI.2011.5983991","url":null,"abstract":"Utilizing a modified PPCT structure, a tamper-proof software watermark solution with code-based encryption is proposed. The General Chinese Remainder Theorem is exploited to split the watermark which is represented as a big number into pieces to enhance stealth. Changes to the source and object code are made to embed the watermark, and according to certain policies some parts of object code are encrypted with an en/decryption key which is highly coupled with object code to increase robustness and tamper-proof capability.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信