2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)最新文献

筛选
英文 中文
Hidden dependencies between class imbalance and difficulty of learning for bioinformatics datasets 生物信息学数据集的班级不平衡和学习难度之间隐藏的依赖关系
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642477
Randall Wald, T. Khoshgoftaar, Alireza Fazelpour, D. Dittman
{"title":"Hidden dependencies between class imbalance and difficulty of learning for bioinformatics datasets","authors":"Randall Wald, T. Khoshgoftaar, Alireza Fazelpour, D. Dittman","doi":"10.1109/IRI.2013.6642477","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642477","url":null,"abstract":"Many bioinformatics datasets share certain problems: they have class imbalance (one class with many more instances than the remaining class(es)), or are difficult to learn from (build accurate models with). Much research has investigated these two problems, or even considered both at once. However, hidden dependencies can exist between these two problems: in a given collection of datasets, the highly imbalanced datasets may be particularly difficult or easy to learn from, and so conclusions based on the level of class imbalance may actually reflect the difficulty of learning. We present a case study with twenty-six bioinformatics datasets which exhibits this dependency, and highlights how it can result in misleading conclusions regarding the absolute and relative performance of learners and feature rankers across balance levels.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121962620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Service-oriented middleware for collaborative UAVs 面向服务的协同无人机中间件
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642471
N. Mohamed, J. Al-Jaroodi
{"title":"Service-oriented middleware for collaborative UAVs","authors":"N. Mohamed, J. Al-Jaroodi","doi":"10.1109/IRI.2013.6642471","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642471","url":null,"abstract":"For a while, UAV (Unmanned Aerial Vehicles) use was limited to military applications, however recently UAVs are also used for a wide range of civilian applications. Some of the UAV applications may involve multiple UAVs that must cooperate to achieve a common task. This kind of applications is termed collaborative UAV applications. One of the main issues for multiple UAVs is developing an effective framework to enable the development of software systems for collaborative UAV operations. One possible approach is to rely on service-oriented computing and service-oriented middleware technologies to simplify the development and operations of such applications. This paper discusses the challenges of developing collaborative UAV applications and how the service-oriented middleware approach can help resolve some of these challenges. The paper also investigates the collaborative aspects of multiple UAVs and proposes a service-oriented middleware architecture that can satisfy the development and operations of such applications.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125790894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A component-based language specific to complex systems modeling 一种特定于复杂系统建模的基于组件的语言
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642475
T. Bouabana-Tebibel, S. Rubin, Kadaouia Habib, S. Mellah, Lynda Allata
{"title":"A component-based language specific to complex systems modeling","authors":"T. Bouabana-Tebibel, S. Rubin, Kadaouia Habib, S. Mellah, Lynda Allata","doi":"10.1109/IRI.2013.6642475","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642475","url":null,"abstract":"The modeling and design of complex systems continues to face grand challenges in feedback and control. Existing languages and tools, either textual or graphical, bring some improvement for such purposes, but much remains to be done in order to readily insure scalability. In this paper, we propose a language, which gathers specialization and composition properties. It is our belief that the latter properties bear the necessary capabilities to overcome the difficulties raised when developing these systems. The language is designed, on one hand, in a way to be specific to complex system domains. It supports, on the other hand, a component-based structure that conforms to a user-friendly component assembly. It is conceived in the spirit of SysML concepts. Its' programs generate Internal Block Diagrams. A programming tool is built on the basis of the Eclipse framework.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127097906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Siphon-based deadlock prevention policy for interorganizational WorkFlow net design 组织间工作流网络设计中基于虹吸的死锁预防策略
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642485
Luciane de Fatima Silva, L. Passos, M. S. Soares, S. Julia
{"title":"Siphon-based deadlock prevention policy for interorganizational WorkFlow net design","authors":"Luciane de Fatima Silva, L. Passos, M. S. Soares, S. Julia","doi":"10.1109/IRI.2013.6642485","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642485","url":null,"abstract":"In this paper, an approach based on Deadlock avoidance of Interorganizational WorkFlow nets is proposed to deal with Deadlock situations in interorganizational business processes. Interorganizational business processes are modeled by Interorganizational WorkFlow nets. Deadlock situations in interorganizational business processes comes generally from message ordering mismatches between several business processes. Within the Petri net theory, a Deadlock situation is characterized as a zero marking of a Siphon. After detecting and controlling the Siphon structures that lead to Deadlock situations in Interorganizational WorkFlow nets, a method for the design of Interorganizational WorkFlow nets free of Deadlock is proposed. In particular, the basic principle is to define new WorkFlow nets shared between the original workflow processes that allow one to remove the scenarios responsible for the Deadlocks.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Learning-based routing in mobile wireless sensor networks: Applying formal modeling and analysis 移动无线传感器网络中基于学习的路由:应用形式化建模和分析
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642512
F. Kazemeyni, Olaf Owe, E. Johnsen, I. Balasingham
{"title":"Learning-based routing in mobile wireless sensor networks: Applying formal modeling and analysis","authors":"F. Kazemeyni, Olaf Owe, E. Johnsen, I. Balasingham","doi":"10.1109/IRI.2013.6642512","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642512","url":null,"abstract":"Limited energy supply is one of the main concerns when dealing with wireless sensor networks (WSNs). Therefore, routing protocols should be designed with the goal of being energy efficient. In this paper, we select a routing protocol which is capable of handling both centralized and decentralized routing. Mobility, a priori knowledge of the movement patterns of the nodes is exploited to select the best routing path, using a Bayesian learning algorithm. Generally, simulation-based tools cannot prove if a protocol works correctly, but formal modeling methods are able to validate that by searching for failures through all possible behaviors of network nodes. This paper presents a formal model for a learning-based routing protocol for WSNs, based on a Bayesian learning method, using an Structural Operational Semantics (SOS) style. We use the rewriting logic tool Maude to analyze the model. Our experimental results show that decentralized approach is twice as energy-efficient as the centralized scheme. It also outperforms the power-sensitive AODV (PS-AODV) routing protocol (i.e. a non-learning efficient protocol). We use the Maude tool to validate a correctness property of the routing protocol. Our formal model of Bayesian learning integrates a real dataset which forces the model to conform to the real data. This technique seems useful beyond the case study of this paper.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123989797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Entailment analysis for improving Chinese textual entailment system 改进汉语文本蕴涵系统的蕴涵分析
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642456
Shih-Hung Wu, Shan-Shun Yang, Hung-Sheng Chiu, Liang-Pu Chen, Ren-Dar Yang
{"title":"Entailment analysis for improving Chinese textual entailment system","authors":"Shih-Hung Wu, Shan-Shun Yang, Hung-Sheng Chiu, Liang-Pu Chen, Ren-Dar Yang","doi":"10.1109/IRI.2013.6642456","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642456","url":null,"abstract":"Textual Entailment (TE) is a critical issue in natural language processing (NLP); many NLP applications can be benefited from the recognition of textual entailment (RTE). In this paper we report our observation on how to improve the Chinese textual entailment system and the experiment results on the NTCIR-10 RITE-2 dataset. To complement the traditional machine learning approach, which treat every input pair equally with the same features and the same process, our system classify different entailment cases and treat them separately. The experiment results show great improvement.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115894036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A vision of education in 50 years from now position paper for the special session on education, IEEE IRI 2013 未来50年的教育展望,2013年IEEE IRI教育特别会议意见书
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642467
J. R. Massoud
{"title":"A vision of education in 50 years from now position paper for the special session on education, IEEE IRI 2013","authors":"J. R. Massoud","doi":"10.1109/IRI.2013.6642467","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642467","url":null,"abstract":"In this position paper, I present a view of education in 50 years from now and how a 100 percent success rate is achievable by every high school and college student, via the use of virtual teachers and virtual psychologists, knowledge bases and artificial intelligence.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123190779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An automated ontology generation technique for an emergent behavior detection system 面向紧急行为检测系统的本体自动生成技术
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642496
Beenish Khurshid, Mohammad Moshirpour, A. Eberlein, B. Far
{"title":"An automated ontology generation technique for an emergent behavior detection system","authors":"Beenish Khurshid, Mohammad Moshirpour, A. Eberlein, B. Far","doi":"10.1109/IRI.2013.6642496","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642496","url":null,"abstract":"Due to the lack of central control in distributed systems, design and implementation of such systems is a challenging task. Interaction of multiple autonomous components can easily result in unwanted behavior in the system. Therefore it is vital to carefully review the design of distributed systems. Manual review of software documents is too inefficient and error prone. It would therefore be beneficial to have a systematic methodology to automatically analyze software requirements and design documents. However automating the process of software analysis is a challenging task because besides the design know-how, each software system requires its own domain knowledge. Existing approaches often require a great deal of input from system engineers familiar with the domain. Such information needs to be interpreted by the designer which is a time-consuming and error prone process. This research suggests the use of a scenario-based approach to represent system requirements. Scenarios are often depicted using message sequence charts (MSCs). Due to their formal notation, MSCs can be used to analyze software requirements in a systematic manner. In an earlier paper, it was demonstrated that ontologies can be used to effectively automate the construction of domain knowledge for the system. However the construction of ontologies remained a challenging task. This paper describes a process which infers ontology from the provided message sequence charts. Furthermore this paper introduces a software tool which automates the process of domain ontology construction. This methodology is demonstrated using a case study of a fleet-management software system.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123261878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A linear filtering theory-based approach for load shedding 基于线性滤波理论的减载方法
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642537
Lorena Chavarría-Báez, Rosaura Palma-Orozco
{"title":"A linear filtering theory-based approach for load shedding","authors":"Lorena Chavarría-Báez, Rosaura Palma-Orozco","doi":"10.1109/IRI.2013.6642537","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642537","url":null,"abstract":"A Datastream Management System (DSMS) allows applications to query datastreams by specifying continuous queries (CQs). Unlike a traditional query in a Database Management System (DBMS), each CQ in the DSMS has to fulfill Quality of Service (QoS) requirements, such as tuple latency. In order to a CQ meets this quality parameter when the system is overloaded, it is necessary to discard some tuples, i.e., to perform a load shedding process. However, this is not an easy task since, such as reported in literature, it is essential to know when and how adjust the quality of CQs at runtime and how many tuples must be dropped. Any dynamic system is subjected to conditions of internal and external behavior that modify its operation and control. This implies that the system can be observable and controllable. In this paper we present a modern control-theory based approach to deal with some issues of load shedding in DSMSs. The results are based on the state space, described by a discrete stochastic estimator and noise characterization having a linear complexity.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131999508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative study of data mining techniques for credit scoring in banking 银行业信用评分数据挖掘技术的比较研究
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642534
S. Huang, Min-Yuh Day
{"title":"A comparative study of data mining techniques for credit scoring in banking","authors":"S. Huang, Min-Yuh Day","doi":"10.1109/IRI.2013.6642534","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642534","url":null,"abstract":"Credit is becoming one of the most important incomes of banking. Past studies indicate that the credit risk scoring model has been better for Logistic Regression and Neural Network. The purpose of this paper is to conduct a comparative study on the accuracy of classification models and reduce the credit risk. In this paper, we use data mining of enterprise software to construct four classification models, namely, decision tree, logistic regression, neural network and support vector machine, for credit scoring in banking. We conduct a systematic comparison and analysis on the accuracy of 17 classification models for credit scoring in banking. The contribution of this paper is that we use different classification methods to construct classification models and compare classification models accuracy, and the evidence demonstrates that the support vector machine models have higher accuracy rates and therefore outperform past classification methods in the context of credit scoring in banking.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132049507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信