{"title":"Entity refinement using latent semantic indexing","authors":"R. Bradford","doi":"10.1109/ISI.2010.5484765","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484765","url":null,"abstract":"Automated extraction of named entities is an important text analysis task. In addition to recognizing the occurrence of entity names, it is important to be able to label those names by type. Most entity extraction techniques categorize extracted entities into a few basic types, such as PERSON, ORGANIZATION, and LOCATION. This paper presents an approach for generating more fine-grained subdivisions of entity type. The technique of latent semantic indexing (LSI) is used to provide semantic context as an indicator of likely entity subtype. Tests were carried out on a collection of 5.5 million English-language news articles. At modest levels of recall, the accuracy of sub-type assignment was comparable to the accuracy with which the gross type was assigned by a state-of-the-art commercial entity extraction software package.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tweets mining using WIKIPEDIA and impurity cluster measurement","authors":"Qing Chen, Timothy Shipper, L. Khan","doi":"10.1109/ISI.2010.5484758","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484758","url":null,"abstract":"Twitter is one of the fastest growing online social networking services. Tweets can be categorized into trends, and are related with tags and follower/following social relationships. The categorization is neither accurate nor effective due to the short length of tweet messages and noisy data corpus. In this paper, we attempt to overcome these challenges with an extended feature vector along with a semi-supervised clustering technique. In order to achieve this goal, the training set is expanded with Wikipedia topic search result, and the feature set is extended. When building the clustering model and doing the classification, impurity measurement is introduced into our classifier platform. Our experiment results show that the proposed techniques outperform other classifiers with reasonable precision and recall.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134312515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time tracking of a remote moving object by active zoom cameras","authors":"Yan Gao, Xiaolin Zhang","doi":"10.1109/ISI.2010.5484753","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484753","url":null,"abstract":"Object detecting and tracking at a distance has been a big problem in the research field of wide area security. This paper introduces a real time active vision system which can track a moving object from 1 meter to 200 meters. This visual servo system is mainly structured of three mechanical freedoms of pan, tilt and zoom. An eagle's eye mechanism is proposed to obtain a wide field of view (FOV) in high resolution. A fusion schemes that combines the results of the three separate zoom cameras for detecting and tracking a moving object at distance is also developed. A high performance pan-tilt unit and an algorithm of high frequency motor control is proposed to smooth the tracking. This system has the tracking and zooming functions to monitor an unexpected object at a long distance. The camera can zoom in to capture the high resolution detail of a pedestrian and record a series of available images while tracking. In order to demonstrate the effectiveness of the approaches adopted, an experiment of tracking a pedestrian from a distance of 100–200 meters has been carried out. Experimental results show that the proposed system is valid for tracking a pedestrian at a distance.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang
{"title":"Cross-level behavioral analysis for robust early intrusion detection","authors":"Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang","doi":"10.1109/ISI.2010.5484768","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484768","url":null,"abstract":"We anticipate future attacks would evolve to become more sophisticated to outwit existing intrusion detection techniques. Existing anomaly analysis techniques and signature-based detection practices can no longer effective. We believe intrusion detection systems (IDSs) of the future will need to be capable to detect or infer attacks based on more valuable information from the network-related properties and characteristics. We observed that even though the signatures or traffic patterns of future stealthy attacks can be modified to outwit current IDSs, certain behavioral aspects of an attack are invariant. We propose a novel approach that jointly monitors network activities at three different levels: transport layer protocols, (vulnerable) network services, and invariant anomaly behaviors (called attack symptoms). Our system, SecMon, captures the network behaviors by simultaneously performing cross-level state correlation for effective detection of anomaly behaviors. For the most part, the invariant anomaly behavior has not been fully exploited in the past. A probabilistic attack inference model is also proposed for attack assessment by correlating the observed attack symptoms to achieve the low false alarm rate. The evaluations demonstrate our prototype system is efficient and effective for sophisticated attacks, including polymorphism, stealthy, and unknown attack.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121156414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Verma, Ramyaa, S. Marru, Ye Fan, Raminderjeet Singh
{"title":"Rationalizing police patrol beats using Voronoi Tessellations","authors":"A. Verma, Ramyaa, S. Marru, Ye Fan, Raminderjeet Singh","doi":"10.1109/ISI.2010.5484750","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484750","url":null,"abstract":"Computational criminology is an emerging interdisciplinary field that applies computer science and mathematical methods to the study of criminological problems. In order to understand the nature of crime one has to comprehend not only its spatio-temporal dimensions, but also the victim-offender relationship, role of guardians and history of similar incidents. In this position paper we explore a problem in rationalizing police patrolling beats using Voronoi Tessellations which provide a powerful technique to explore variety of criminological perspectives and understand the geography of crime and its control mechanism. The paper presents a method to rationally design an equitable workload amongst the police patrol beats in order to better handle the challenge of crime.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Similarity kernels via bi-clustering for conventional intergovernmental organizations","authors":"Minh Tam Le, J. Sweeney, Edo Liberty, S. Zucker","doi":"10.1109/ISI.2010.5484732","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484732","url":null,"abstract":"Many databases provide tabular data relating objects to entities; for example, which countries belong to certain organizations. We seek to infer implicit organizational variables over such objects (countries) as a function of these properties (organizational memberships), and vice versa. If kernels existed over objects, then machine learning and non-linear dimensionality reduction techniques could be used. But this requires a similarity or distance defined over objects, which does not exist a priori. We are exploring an approach to kernel identification based on bi-clustering in which an average over randomized biclusters approximates a kernel. We claim that such kernels provide a viable alternative to other, more common kernel approaches. Experiments with a database of memberships in conventional intergovernmental organizations supports this claim.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127086591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Atkinson, Jenya Belayeva, Vanni Zavarella, J. Piskorski, Silja Huttunen, Arto Vihavainen, R. Yangarber
{"title":"News mining for border security Intelligence","authors":"M. Atkinson, Jenya Belayeva, Vanni Zavarella, J. Piskorski, Silja Huttunen, Arto Vihavainen, R. Yangarber","doi":"10.1109/ISI.2010.5484744","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484744","url":null,"abstract":"This presentation gives an overview of an effort to construct OSINT (Open-Source Intelligence) tools for Frontex, the European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union, to facilitate automating the process of extracting structured knowledge from on-line news articles on border-security related events at the EU borders and in related third countries. A particular focus is on incidents and developments which are of relevance in the context of illegal migration. This includes: (a) illegal migration incidents (e.g., illegal border crossing attempts), (b) related cross-border crime (e.g., human/arms/drug trafficking), (c) related crisis events (e.g., terrorist attacks, outbreaks of infectious disease).","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129156838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated assessment modeling of energy consumption behavior and carbon emissions","authors":"T. Sanquist, B. Shui, Heather Orr","doi":"10.1109/ISI.2010.5484734","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484734","url":null,"abstract":"This paper describes elements of an integrated modeling approach to human behavior and energy consumption. Developing a sustainable society is a key aspect of international security, and understanding the areas where consumption and carbon emissions can be reduced is essential. We employ statistical analysis of residential energy consumption in the US and other countries to describe the underlying patterns of energy use, and provide international comparisons at an aggregate level.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125771236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational knowledge and information management in veterinary epidemiology","authors":"Svitlana Volkova, W. Hsu","doi":"10.1109/ISI.2010.5484764","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484764","url":null,"abstract":"Monitoring of infectious animal diseases is an essential task for national biosecurity management and bioterrorism prevention. For this purpose, we present a system for animal disease outbreak analysis by automatically extracting relational information from online data. We aim to detect and map infectious disease outbreaks by extracting information from unstructured sources. The system crawls web sites and classifies pages by topical relevance. The information extraction component performs document analysis for animal disease related event recognition. The visualization component plots extracted events into GoogleMaps1 using geospatial information and supports timeline representation of animal disease outbreaks in SIMILE2.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130324479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Richard Frank, Andrew J. Park, P. Brantingham, J. Clare, Kathryn Wuschke, M. Vajihollahi
{"title":"Identifying high risk crime areas using topology","authors":"Richard Frank, Andrew J. Park, P. Brantingham, J. Clare, Kathryn Wuschke, M. Vajihollahi","doi":"10.1109/ISI.2010.5484782","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484782","url":null,"abstract":"Computational criminology is an area of research that joins advanced theories in criminology with theories and methods in mathematics, computing science, geography and behavioural psychology. It is a multidisciplinary approach that takes the strengths of several disciplines and, with semantic challenges, builds new methods for the analysis of crime and crime patterns. This paper presents a developing algorithm for linking the geographic and cognitive psychology sides of criminology research with a prototype topology algorithm that joins local urban areas together using rules that define similarity between adjacent small units of analysis. The approach produces irregular shapes when mapped in a Euclidean space, but which follow expectations in a non-Euclidean topological sense. There are high local concentrations or hot spots of crime but frequently there is a sharp break on one side of the hot spot and with a gradual diffusion on the other. These shapes follow the cognitive psychological way of moving from one location to another without noticing gradual changes or conversely being aware of sharp changes from one location to the next. This article presents a pattern modeling approach that uses topology to spatially identify the concentrations of crime and their crisp breaks and gradual blending into adjacent areas using the basic components: interior, boundary and exterior. This topology algorithm is used to analyze crimes in a moderate sized city in British Columbia.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}