Randall Wald, T. Khoshgoftaar, Alireza Fazelpour, D. Dittman
{"title":"Hidden dependencies between class imbalance and difficulty of learning for bioinformatics datasets","authors":"Randall Wald, T. Khoshgoftaar, Alireza Fazelpour, D. Dittman","doi":"10.1109/IRI.2013.6642477","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642477","url":null,"abstract":"Many bioinformatics datasets share certain problems: they have class imbalance (one class with many more instances than the remaining class(es)), or are difficult to learn from (build accurate models with). Much research has investigated these two problems, or even considered both at once. However, hidden dependencies can exist between these two problems: in a given collection of datasets, the highly imbalanced datasets may be particularly difficult or easy to learn from, and so conclusions based on the level of class imbalance may actually reflect the difficulty of learning. We present a case study with twenty-six bioinformatics datasets which exhibits this dependency, and highlights how it can result in misleading conclusions regarding the absolute and relative performance of learners and feature rankers across balance levels.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121962620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service-oriented middleware for collaborative UAVs","authors":"N. Mohamed, J. Al-Jaroodi","doi":"10.1109/IRI.2013.6642471","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642471","url":null,"abstract":"For a while, UAV (Unmanned Aerial Vehicles) use was limited to military applications, however recently UAVs are also used for a wide range of civilian applications. Some of the UAV applications may involve multiple UAVs that must cooperate to achieve a common task. This kind of applications is termed collaborative UAV applications. One of the main issues for multiple UAVs is developing an effective framework to enable the development of software systems for collaborative UAV operations. One possible approach is to rely on service-oriented computing and service-oriented middleware technologies to simplify the development and operations of such applications. This paper discusses the challenges of developing collaborative UAV applications and how the service-oriented middleware approach can help resolve some of these challenges. The paper also investigates the collaborative aspects of multiple UAVs and proposes a service-oriented middleware architecture that can satisfy the development and operations of such applications.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125790894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Bouabana-Tebibel, S. Rubin, Kadaouia Habib, S. Mellah, Lynda Allata
{"title":"A component-based language specific to complex systems modeling","authors":"T. Bouabana-Tebibel, S. Rubin, Kadaouia Habib, S. Mellah, Lynda Allata","doi":"10.1109/IRI.2013.6642475","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642475","url":null,"abstract":"The modeling and design of complex systems continues to face grand challenges in feedback and control. Existing languages and tools, either textual or graphical, bring some improvement for such purposes, but much remains to be done in order to readily insure scalability. In this paper, we propose a language, which gathers specialization and composition properties. It is our belief that the latter properties bear the necessary capabilities to overcome the difficulties raised when developing these systems. The language is designed, on one hand, in a way to be specific to complex system domains. It supports, on the other hand, a component-based structure that conforms to a user-friendly component assembly. It is conceived in the spirit of SysML concepts. Its' programs generate Internal Block Diagrams. A programming tool is built on the basis of the Eclipse framework.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127097906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luciane de Fatima Silva, L. Passos, M. S. Soares, S. Julia
{"title":"Siphon-based deadlock prevention policy for interorganizational WorkFlow net design","authors":"Luciane de Fatima Silva, L. Passos, M. S. Soares, S. Julia","doi":"10.1109/IRI.2013.6642485","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642485","url":null,"abstract":"In this paper, an approach based on Deadlock avoidance of Interorganizational WorkFlow nets is proposed to deal with Deadlock situations in interorganizational business processes. Interorganizational business processes are modeled by Interorganizational WorkFlow nets. Deadlock situations in interorganizational business processes comes generally from message ordering mismatches between several business processes. Within the Petri net theory, a Deadlock situation is characterized as a zero marking of a Siphon. After detecting and controlling the Siphon structures that lead to Deadlock situations in Interorganizational WorkFlow nets, a method for the design of Interorganizational WorkFlow nets free of Deadlock is proposed. In particular, the basic principle is to define new WorkFlow nets shared between the original workflow processes that allow one to remove the scenarios responsible for the Deadlocks.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Kazemeyni, Olaf Owe, E. Johnsen, I. Balasingham
{"title":"Learning-based routing in mobile wireless sensor networks: Applying formal modeling and analysis","authors":"F. Kazemeyni, Olaf Owe, E. Johnsen, I. Balasingham","doi":"10.1109/IRI.2013.6642512","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642512","url":null,"abstract":"Limited energy supply is one of the main concerns when dealing with wireless sensor networks (WSNs). Therefore, routing protocols should be designed with the goal of being energy efficient. In this paper, we select a routing protocol which is capable of handling both centralized and decentralized routing. Mobility, a priori knowledge of the movement patterns of the nodes is exploited to select the best routing path, using a Bayesian learning algorithm. Generally, simulation-based tools cannot prove if a protocol works correctly, but formal modeling methods are able to validate that by searching for failures through all possible behaviors of network nodes. This paper presents a formal model for a learning-based routing protocol for WSNs, based on a Bayesian learning method, using an Structural Operational Semantics (SOS) style. We use the rewriting logic tool Maude to analyze the model. Our experimental results show that decentralized approach is twice as energy-efficient as the centralized scheme. It also outperforms the power-sensitive AODV (PS-AODV) routing protocol (i.e. a non-learning efficient protocol). We use the Maude tool to validate a correctness property of the routing protocol. Our formal model of Bayesian learning integrates a real dataset which forces the model to conform to the real data. This technique seems useful beyond the case study of this paper.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123989797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shih-Hung Wu, Shan-Shun Yang, Hung-Sheng Chiu, Liang-Pu Chen, Ren-Dar Yang
{"title":"Entailment analysis for improving Chinese textual entailment system","authors":"Shih-Hung Wu, Shan-Shun Yang, Hung-Sheng Chiu, Liang-Pu Chen, Ren-Dar Yang","doi":"10.1109/IRI.2013.6642456","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642456","url":null,"abstract":"Textual Entailment (TE) is a critical issue in natural language processing (NLP); many NLP applications can be benefited from the recognition of textual entailment (RTE). In this paper we report our observation on how to improve the Chinese textual entailment system and the experiment results on the NTCIR-10 RITE-2 dataset. To complement the traditional machine learning approach, which treat every input pair equally with the same features and the same process, our system classify different entailment cases and treat them separately. The experiment results show great improvement.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115894036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A vision of education in 50 years from now position paper for the special session on education, IEEE IRI 2013","authors":"J. R. Massoud","doi":"10.1109/IRI.2013.6642467","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642467","url":null,"abstract":"In this position paper, I present a view of education in 50 years from now and how a 100 percent success rate is achievable by every high school and college student, via the use of virtual teachers and virtual psychologists, knowledge bases and artificial intelligence.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123190779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Beenish Khurshid, Mohammad Moshirpour, A. Eberlein, B. Far
{"title":"An automated ontology generation technique for an emergent behavior detection system","authors":"Beenish Khurshid, Mohammad Moshirpour, A. Eberlein, B. Far","doi":"10.1109/IRI.2013.6642496","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642496","url":null,"abstract":"Due to the lack of central control in distributed systems, design and implementation of such systems is a challenging task. Interaction of multiple autonomous components can easily result in unwanted behavior in the system. Therefore it is vital to carefully review the design of distributed systems. Manual review of software documents is too inefficient and error prone. It would therefore be beneficial to have a systematic methodology to automatically analyze software requirements and design documents. However automating the process of software analysis is a challenging task because besides the design know-how, each software system requires its own domain knowledge. Existing approaches often require a great deal of input from system engineers familiar with the domain. Such information needs to be interpreted by the designer which is a time-consuming and error prone process. This research suggests the use of a scenario-based approach to represent system requirements. Scenarios are often depicted using message sequence charts (MSCs). Due to their formal notation, MSCs can be used to analyze software requirements in a systematic manner. In an earlier paper, it was demonstrated that ontologies can be used to effectively automate the construction of domain knowledge for the system. However the construction of ontologies remained a challenging task. This paper describes a process which infers ontology from the provided message sequence charts. Furthermore this paper introduces a software tool which automates the process of domain ontology construction. This methodology is demonstrated using a case study of a fleet-management software system.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123261878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A linear filtering theory-based approach for load shedding","authors":"Lorena Chavarría-Báez, Rosaura Palma-Orozco","doi":"10.1109/IRI.2013.6642537","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642537","url":null,"abstract":"A Datastream Management System (DSMS) allows applications to query datastreams by specifying continuous queries (CQs). Unlike a traditional query in a Database Management System (DBMS), each CQ in the DSMS has to fulfill Quality of Service (QoS) requirements, such as tuple latency. In order to a CQ meets this quality parameter when the system is overloaded, it is necessary to discard some tuples, i.e., to perform a load shedding process. However, this is not an easy task since, such as reported in literature, it is essential to know when and how adjust the quality of CQs at runtime and how many tuples must be dropped. Any dynamic system is subjected to conditions of internal and external behavior that modify its operation and control. This implies that the system can be observable and controllable. In this paper we present a modern control-theory based approach to deal with some issues of load shedding in DSMSs. The results are based on the state space, described by a discrete stochastic estimator and noise characterization having a linear complexity.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131999508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of data mining techniques for credit scoring in banking","authors":"S. Huang, Min-Yuh Day","doi":"10.1109/IRI.2013.6642534","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642534","url":null,"abstract":"Credit is becoming one of the most important incomes of banking. Past studies indicate that the credit risk scoring model has been better for Logistic Regression and Neural Network. The purpose of this paper is to conduct a comparative study on the accuracy of classification models and reduce the credit risk. In this paper, we use data mining of enterprise software to construct four classification models, namely, decision tree, logistic regression, neural network and support vector machine, for credit scoring in banking. We conduct a systematic comparison and analysis on the accuracy of 17 classification models for credit scoring in banking. The contribution of this paper is that we use different classification methods to construct classification models and compare classification models accuracy, and the evidence demonstrates that the support vector machine models have higher accuracy rates and therefore outperform past classification methods in the context of credit scoring in banking.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132049507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}