{"title":"Probability-based incremental association rule discovery using the normal approximation","authors":"Araya Ariya, W. Kreesuradej","doi":"10.1109/IRI.2013.6642503","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642503","url":null,"abstract":"An incremental association rules mining is one of an association rule mining research topics which finds the relation between set of item in dynamic databases. As data grows up rapidly, the co-occurrence itemset which discovered in the previous mining may be changed and the association rule will be change consequently. Incremental association rule mining research attempts to maintain that rules. Probability-based algorithm, one of an incremental algorithm, applied the principle of Bernoulli trial to predict expected frequent itemsets for reducing collected border itemsets and a number of times to rescan the original database. However, the numerical problem will occur when the algorithm deals with a large database. To manipulate with this problem, the improved probability-based incremental association rule discovery using normal approximation to estimate the probability of occurrence of expected frequent itemset is introduced in this paper. In addition, the confidence interval is applied to ensure that the collecting of expected frequent itemsets is properly kept.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128998842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Surender Reddy Yerva, Michele Catasta, Gianluca Demartini, K. Aberer
{"title":"Entity disambiguation in tweets leveraging user social profiles","authors":"Surender Reddy Yerva, Michele Catasta, Gianluca Demartini, K. Aberer","doi":"10.1109/IRI.2013.6642462","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642462","url":null,"abstract":"Pervasive web and social networks are becoming part of everyone's life. Users through their activities on these networks are leaving traces of their expertise, interests and personalities. With the advances in Web mining and user modeling techniques it is possible to leverage the user social network activity history to extract the semantics of user-generated content. In this work we explore various techniques for constructing user profiles based on the content they publish on social networks. We further show that one of the advantages of maintaining social network user profiles is to provide the context for better understanding of microposts. We propose and experimentally evaluate different approaches for entity disambiguation in social networks based on syntactic and semantic features on top of two different social networks: a general-interest network (i.e., Twitter) and a domain-specific network (i.e., StackOverflow). We demonstrate how disambiguation accuracy increases when considering enriched user profiles integrating content from both social networks.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123829496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cultural considerations for designing crossover applications for the visually impaired","authors":"A. Almurayh, S. Semwal","doi":"10.1109/IRI.2013.6642532","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642532","url":null,"abstract":"This paper reviews the overall impact of culture on the design of crossover applications, which are particularly intended to support the blind and visually impaired (B/VI) community. We believe that cultural differences have an impact on the proliferation and wide usage of any assistive technology. Therefore, cultural aspects must be considered in the design of crossover applications for the B/VI community. Comprehensive cultural vision is necessary for an innovative application to be accepted widely. In addition, there is a need to revise and periodically review the application's acceptance, and update a product based on the cultural changes that may occur to some communities especially with the vast cultural exchange. This paper reviews and highlights good design practices for assistive technology from cultural perspectives.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The FUSE domain-aware approach to user model interoperability: A comparative study","authors":"Eddie Walsh, A. O'Connor, V. Wade","doi":"10.1109/IRI.2013.6642518","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642518","url":null,"abstract":"Exchanging user information between multiple sources can potentially bring many benefits that enhance the user experience in software applications. Richer and more dynamic user models can be constructed allowing more tailoring of content and services to the specific needs of individual users. However, providing effective interoperability is a complex challenge as there can be significant heterogeneity between user models. Current generic approaches and tools offer insufficient support for the complex domain-specific nature of many user model interoperability tasks. This paper presents a comparative study of the FUSE domain-aware approach to user model interoperability. This novel approach differs from existing generic approaches by incorporating domain knowledge in new processes and tools to support complex user model interoperability tasks in multiple overlapping domains. The FUSE approach is described and compared to existing state of the art approaches using a consistent set of key issues in user model interoperability.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"496 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132800162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reinforcement of trust in DSR","authors":"Fatma Laidoui, T. Bouabana-Tebibel","doi":"10.1109/IRI.2013.6642538","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642538","url":null,"abstract":"In mobile ad hoc networks (MANETs), nodes have to cooperate in order to accomplish routing tasks. Nevertheless, they are generally composed of limited resources and may behave in a selfish way. In this paper, we propose a trust model for reactive routing in MANETs. The proposed solution is founded on a mechanism inspired by the CONFIDANT protocol to install and update trust in the network. It fits topology changes caused by the mobility of nodes. In addition, it takes into account new routes learned after the route request phase. It finally, improves the choice of the safest route towards the destination.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121234227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pol Schumacher, Mirjam Minor, Eric Schulte-Zurhausen
{"title":"Extracting and enriching workflows from text","authors":"Pol Schumacher, Mirjam Minor, Eric Schulte-Zurhausen","doi":"10.1109/IRI.2013.6642484","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642484","url":null,"abstract":"This paper is on a workflow extraction framework which allows to derive a formal representation based on workflows from textual descriptions of instructions, for instance, of aircraft repair procedures from a maintenance manual. The framework applies a pipes-and-filters architecture and uses NLP (Natural Language Processing) tools to perform information extraction steps automatically. In detail, the paper presents on the step of anaphora resolution to enrich the workflow extracted so far. We introduce a lexical approach and two further approaches based on a set of association rules which are created during a statistical analysis of a corpus of workflows. The results of the approaches are compared to each other. For the evaluation, we use 37 workflows which have been created by a human expert.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124564602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed ensemble Kalman filter for multisensor application","authors":"M. Kazerooni, F. Shabaninia, M. Vaziri, S. Vadhva","doi":"10.1109/IRI.2013.6642544","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642544","url":null,"abstract":"In this paper, a distributed ensemble Kalman filter (DEnKF) is proposed for sensor fusion in a sensor network. To solve data fusion problem in distributed sensor network, consensus filter is implemented. To estimates nodes' states, each node uses local and neighbors' information rather than the information from all nodes in the network. So, due to this property, this proposed algorithm is applicable to large scale problem. Simulation results demonstrate the effectiveness of DEnKF algorithm.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126889952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The importance of performance metrics within wrapper feature selection","authors":"Randall Wald, T. Khoshgoftaar, Amri Napolitano","doi":"10.1109/IRI.2013.6642460","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642460","url":null,"abstract":"Many important datasets are affected by the problem of high dimensionality (having a large number of attributes or features), which can result in complex and time-consuming classification models. Feature selection techniques try to identify an optimal subset of features which may show improved classification performance as well as identify important features for the application at hand. Wrapper feature selection in particular uses a classifier to discover which feature subsets are most useful. However, feature selection can be affected by another dataset problem: imbalanced data. When one class outnumbers the other class(es), the chosen features may not reflect those most important to all classes - especially when wrapper feature selection uses a performance metric which does not consider class imbalance. No previous work has examined how the choice of performance metric within wrapper-based feature selection will affect classification performance. To study this effect, in this paper we consider two high-dimensional datasets drawn from the field of Twitter profile mining, both of which exhibit class imbalance. Using the Logistic Regression learner, we perform wrapper feature selection followed by classification, using five different performance metrics both (Area Under the Receiver Operating Characteristic Curve, Area Under the Precision Recall Curve, Best Arithmetic Mean of TPR and TNR, Best Geometric Mean of TPR and TNR, and Overall Accuracy) for the wrapper and for evaluating the classification model. We find that performance metrics which take class imbalance into account, especially the Area Under the Precision-Recall Curve, are far more effective than Overall Accuracy when used within the wrapper, producing much better performance as evaluated by the metrics which consider imbalance. In fact, even when Overall Accuracy is the classification metric, it is not the best metric to use within the wrapper. In addition, we find that there is no direct connection between the metric inside the wrapper and used for classification evaluation: the metrics show similar patterns across all four balance-aware metrics (e.g., all but Overall Accuracy).","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129237943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomy requirements engineering","authors":"Emil Vassev, M. Hinchey","doi":"10.1145/2494444.2494472","DOIUrl":"https://doi.org/10.1145/2494444.2494472","url":null,"abstract":"Contemporary robotics relies on the most recent advances in automation and robotic technologies to promote autonomy and autonomic computing principles to robotized systems. However, it appears that the design and implementation of autonomous systems is an extremely challenging task. The problem is stemming from the very nature of such systems where features like environment monitoring and self-monitoring allow for awareness capabilities driving the system behavior. Moreover, changes in the operational environment may trigger self-adaptation. The first and one of the biggest challenges in the design and implementation of such systems is how to handle requirements specifically related to the autonomy of a system. Requirements engineering for autonomous systems appears to be a wide open research area with only a limited number of approaches yet considered. In this paper, we present an approach to Autonomy Requirements Engineering where goals models are merged with special generic autonomy requirements. The approach helps us identify and record the autonomy requirements of a system in the form of special self-∗ objectives and other assistive requirements, those capturing alternative objectives the system may pursue in the presence of factors threatening the achievement of the initial system goals. The paper presents a case study where autonomy requirements engineering is applied to the domain of space missions.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133964034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}