This study develops a novel model, GA-SVR, for parameters optimization in support vector regression and implements this new model in a problem forecasting maximum electrical daily load. The real-valued genetic algorithm (RGA) was adapted to search the optimal parameters of support vector regression (SVR) to increase the accuracy of SVR. The proposed model was tested on a complicated electricity load forecasting competition announced on the EUNITE network. The results illustrated that the new GA-SVR model outperformed previous models. Specifically, the new GA-SVR model can successfully identify the optimal values of parameters of SVR with the lowest prediction error values, MAPE and maximum error, in electricity load forecasting.
{"title":"Dynamically Optimizing Parameters in Support Vector Regression: An Application of Electricity Load Forecasting","authors":"Chin-Chia Hsu, Chih H. Wu, Shi Chen, K. Peng","doi":"10.1109/HICSS.2006.132","DOIUrl":"https://doi.org/10.1109/HICSS.2006.132","url":null,"abstract":"This study develops a novel model, GA-SVR, for parameters optimization in support vector regression and implements this new model in a problem forecasting maximum electrical daily load. The real-valued genetic algorithm (RGA) was adapted to search the optimal parameters of support vector regression (SVR) to increase the accuracy of SVR. The proposed model was tested on a complicated electricity load forecasting competition announced on the EUNITE network. The results illustrated that the new GA-SVR model outperformed previous models. Specifically, the new GA-SVR model can successfully identify the optimal values of parameters of SVR with the lowest prediction error values, MAPE and maximum error, in electricity load forecasting.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guided by knowledge transfer (KT) literature and Channel Expansion Theory (CET), we explore the relationship between the KT process, role-based experiences and media perceptions in a multiple media environment. The results of our experiment suggest that in an asymmetric KT context, while senders and receivers may have different experiences they still converge in their perceptions of the utility of the available media. Our results provide preliminary evidence that expansion in media richness perceptions are nonlinear and may reach some maximum value over time. Finally, our results provide preliminary evidence that perceptions of the richness of one media may be related to richness perceptions of another media. All this suggests that in a role-oriented asymmetric KT context, experiences may not be of equal importance to perceived expansions of media richness.
{"title":"Experiences and Media Perceptions of Senders and Receivers in Knowledge Transfer: An Exploratory Study","authors":"Bryan K. Hasty, Anne P. Massey, Susan A. Brown","doi":"10.1109/HICSS.2006.171","DOIUrl":"https://doi.org/10.1109/HICSS.2006.171","url":null,"abstract":"Guided by knowledge transfer (KT) literature and Channel Expansion Theory (CET), we explore the relationship between the KT process, role-based experiences and media perceptions in a multiple media environment. The results of our experiment suggest that in an asymmetric KT context, while senders and receivers may have different experiences they still converge in their perceptions of the utility of the available media. Our results provide preliminary evidence that expansion in media richness perceptions are nonlinear and may reach some maximum value over time. Finally, our results provide preliminary evidence that perceptions of the richness of one media may be related to richness perceptions of another media. All this suggests that in a role-oriented asymmetric KT context, experiences may not be of equal importance to perceived expansions of media richness.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114625459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes how we manage the interaction between different heterogeneous web services through choreographies within IRS-III. IRS-III is a framework and platform for developing WSMO based semantic web services. Our choreography framework is based on the KADS system-client co-operation model that represents communication through two dimensions: the message direction and which actor has the initiative. Our formalism is state based and is thus compliant with Abstract State Machine (ASM) model used within WSMO. In addition to describing our approach in this paper we provide a formal semantics for IRS Choreography and a full implementation which we illustrate through an example application.
{"title":"The Choreography Model for IRS-III","authors":"J. Domingue, S. Galizia, L. Cabral","doi":"10.1109/HICSS.2006.454","DOIUrl":"https://doi.org/10.1109/HICSS.2006.454","url":null,"abstract":"This paper describes how we manage the interaction between different heterogeneous web services through choreographies within IRS-III. IRS-III is a framework and platform for developing WSMO based semantic web services. Our choreography framework is based on the KADS system-client co-operation model that represents communication through two dimensions: the message direction and which actor has the initiative. Our formalism is state based and is thus compliant with Abstract State Machine (ASM) model used within WSMO. In addition to describing our approach in this paper we provide a formal semantics for IRS Choreography and a full implementation which we illustrate through an example application.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114907020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce solutions. The span of control of e-government and its impact across a community defines a system that is more than a sum of just single systems. To test security issues across the entire system requires a new method of analysis, a community based cyber security exercise. Results from recent community based exercises have provided insight into opportunities for improvement and has demonstrated the value of these events. Information gained from community based exercises permits local governmental entities to better prepare their e-government systems to serve their citizens needs. Although some actions discovered in the exercise may be difficult and resource intensive, numerous low-hanging fruit opportunities for improvement can be discovered and used to improve e-government systems.
{"title":"e-Government and Cyber Security: The Role of Cyber Security Exercises","authors":"W. A. Conklin, G. White","doi":"10.1109/HICSS.2006.133","DOIUrl":"https://doi.org/10.1109/HICSS.2006.133","url":null,"abstract":"e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce solutions. The span of control of e-government and its impact across a community defines a system that is more than a sum of just single systems. To test security issues across the entire system requires a new method of analysis, a community based cyber security exercise. Results from recent community based exercises have provided insight into opportunities for improvement and has demonstrated the value of these events. Information gained from community based exercises permits local governmental entities to better prepare their e-government systems to serve their citizens needs. Although some actions discovered in the exercise may be difficult and resource intensive, numerous low-hanging fruit opportunities for improvement can be discovered and used to improve e-government systems.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117297593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An online software agent that helps smokers quit was designed and tested. We created a library of categorized smoking cessation messages using meta-data corresponding to the Stages of Change Theory. A feedback process was developed that used individual participant’s relevance ratings and a message similarity search algorithm. A pilot study of university students who smoke or had recently quit was performed. Participants were randomly assigned to one of three groups: one received generic, non-tailored messages; another received tailored messages based on their answers to questions about their smoking and quitting behavior; and another received messages selected through tailoring and feedback. In the feedback-driven group, participants reported relevance of the messages received averaged higher than the other two groups. There was also a highly significant correlation in this group between relevance and social presence, which indicates the "feeling" of interacting in an interpersonal manner.
{"title":"Increasing Relevance of Smoking Cessation Messages in an Online Software Agent Environment","authors":"T. Shimoda, L. Stapel","doi":"10.1109/HICSS.2006.219","DOIUrl":"https://doi.org/10.1109/HICSS.2006.219","url":null,"abstract":"An online software agent that helps smokers quit was designed and tested. We created a library of categorized smoking cessation messages using meta-data corresponding to the Stages of Change Theory. A feedback process was developed that used individual participant’s relevance ratings and a message similarity search algorithm. A pilot study of university students who smoke or had recently quit was performed. Participants were randomly assigned to one of three groups: one received generic, non-tailored messages; another received tailored messages based on their answers to questions about their smoking and quitting behavior; and another received messages selected through tailoring and feedback. In the feedback-driven group, participants reported relevance of the messages received averaged higher than the other two groups. There was also a highly significant correlation in this group between relevance and social presence, which indicates the \"feeling\" of interacting in an interpersonal manner.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nonaka’s modes of knowledge were used to ground an exploratory study of knowledge creation opportunities in the data mining process. A two-phased research study, including 49 interviews with data analysts and decision makers, was completed. Results support the idea that multiple knowledge creation opportunities exist throughout the data mining process. Prior research has defined a data warehouse as a support system for transforming explicit knowledge into new explicit knowledge by merging, categorizing, reclassifying, and synthesizing data [1]. By expanding the research scope from technology to the process, evidence was found that data analysts convert tacit knowledge to new tacit knowledge through social interaction, tacit knowledge to explicit knowledge through evaluation of data mining results, and explicit knowledge to new tacit knowledge through learning from deployment of a decision. This paper explains how one organization implemented a knowledge-oriented data mining process; results of the implementation are presented.
{"title":"Knowledge Creation Opportunities in the Data Mining Process","authors":"M. Brohman","doi":"10.1109/HICSS.2006.238","DOIUrl":"https://doi.org/10.1109/HICSS.2006.238","url":null,"abstract":"Nonaka’s modes of knowledge were used to ground an exploratory study of knowledge creation opportunities in the data mining process. A two-phased research study, including 49 interviews with data analysts and decision makers, was completed. Results support the idea that multiple knowledge creation opportunities exist throughout the data mining process. Prior research has defined a data warehouse as a support system for transforming explicit knowledge into new explicit knowledge by merging, categorizing, reclassifying, and synthesizing data [1]. By expanding the research scope from technology to the process, evidence was found that data analysts convert tacit knowledge to new tacit knowledge through social interaction, tacit knowledge to explicit knowledge through evaluation of data mining results, and explicit knowledge to new tacit knowledge through learning from deployment of a decision. This paper explains how one organization implemented a knowledge-oriented data mining process; results of the implementation are presented.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123961875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose a new methodology for obtaining a quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.
{"title":"Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System","authors":"M. McQueen, W. F. Boyer, M. Flynn, G. Beitel","doi":"10.1109/HICSS.2006.405","DOIUrl":"https://doi.org/10.1109/HICSS.2006.405","url":null,"abstract":"We propose a new methodology for obtaining a quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increasing availability of web services necessitates efficient discovery and execution framework. The use of xml at various levels of web services standards poses challenges to the above process. OWL-S is a service ontology and language, whose semantics are based on OWL. The semantics provided by OWL support greater automation of service selection, invocation, translation of message content between heterogeneous services, and service composition. The development and consumption of an OWL-S based web service is time consuming and error prone. OWL-S IDE assists developers in the semantic web service development, deployment and consumption processes. In order to achieve this the OWL-S IDE uses and extends existing web service tools. In this paper we will look in detail at the support for discovery for semantic web services. We also present the matching schemes, the implementation and the results of performance evaluation.
{"title":"Semantic Web Service Discovery in the OWL-S IDE","authors":"N. Srinivasan, M. Paolucci, K. Sycara","doi":"10.1109/HICSS.2006.431","DOIUrl":"https://doi.org/10.1109/HICSS.2006.431","url":null,"abstract":"The increasing availability of web services necessitates efficient discovery and execution framework. The use of xml at various levels of web services standards poses challenges to the above process. OWL-S is a service ontology and language, whose semantics are based on OWL. The semantics provided by OWL support greater automation of service selection, invocation, translation of message content between heterogeneous services, and service composition. The development and consumption of an OWL-S based web service is time consuming and error prone. OWL-S IDE assists developers in the semantic web service development, deployment and consumption processes. In order to achieve this the OWL-S IDE uses and extends existing web service tools. In this paper we will look in detail at the support for discovery for semantic web services. We also present the matching schemes, the implementation and the results of performance evaluation.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129704189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pathology ordering by General Practitioners (GPs) is a significant contributor to rising health care costs both in Australia and worldwide. A thorough understanding of the nature and patterns of pathology utilization is an essential requirement for addressing the issues of appropriate pathology orderings and possible over-utilization. This paper describes how Kohonen’s Self-Organizing Maps are used to discover the most typical patterns in pathology orderings for different patient groups. Test ordering data from a pathology company in Australia is analyzed; homogenous clusters of patients with similar ordering patterns are discovered and investigated, and possible management implications are discussed. The novelty of this approach is in using data mining techniques on pathology ordering data in order to provide a patient oriented perspective for understanding the nature of ordering patterns.
{"title":"Uncovering the Patterns in Pathology Ordering by Australian General Practitioners: A Data Mining Perspective","authors":"Zoe Yan Zhuang, L. Churilov, K. Sikaris","doi":"10.1109/HICSS.2006.513","DOIUrl":"https://doi.org/10.1109/HICSS.2006.513","url":null,"abstract":"Pathology ordering by General Practitioners (GPs) is a significant contributor to rising health care costs both in Australia and worldwide. A thorough understanding of the nature and patterns of pathology utilization is an essential requirement for addressing the issues of appropriate pathology orderings and possible over-utilization. This paper describes how Kohonen’s Self-Organizing Maps are used to discover the most typical patterns in pathology orderings for different patient groups. Test ordering data from a pathology company in Australia is analyzed; homogenous clusters of patients with similar ordering patterns are discovered and investigated, and possible management implications are discussed. The novelty of this approach is in using data mining techniques on pathology ordering data in order to provide a patient oriented perspective for understanding the nature of ordering patterns.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128586485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces an exploratory research program on different types of hybrid classes to answer those and other questions around its efficacy and applicability for training and education. Our objective is to develop and perform an initial test of a new model designed to trace the influence of individual and technical characteristics on learning outcomes through their effect on in-class and computer training phases of knowledge and skills acquisition and testing. The overall research question is: "Which and how much do CBT, individual student, class, instructor, and CBA factors affect student learning outcomes?" This paper proposes a research model based upon the Leidner and Jarvenpaa (2001) work where they introduce a research model that helps instructors determine the best teaching method depending on course content, available technology, an individual instructor, and student factors. Thirty-six questions were posed to over 400 students with direct and current experience using CBT and CBA for course credit. The findings show that there is a strong potential for student as well as corporate benefits in training using online assessment tools. Online assessment effectiveness should be given further research study given the explosive jump in reported learning.
{"title":"Computer-Based Training and Assessments: An Exploratory Study of Social Factors","authors":"Scott L. Schneberger, D. Amoroso, Antonina Durfee","doi":"10.1109/HICSS.2006.92","DOIUrl":"https://doi.org/10.1109/HICSS.2006.92","url":null,"abstract":"This paper introduces an exploratory research program on different types of hybrid classes to answer those and other questions around its efficacy and applicability for training and education. Our objective is to develop and perform an initial test of a new model designed to trace the influence of individual and technical characteristics on learning outcomes through their effect on in-class and computer training phases of knowledge and skills acquisition and testing. The overall research question is: \"Which and how much do CBT, individual student, class, instructor, and CBA factors affect student learning outcomes?\" This paper proposes a research model based upon the Leidner and Jarvenpaa (2001) work where they introduce a research model that helps instructors determine the best teaching method depending on course content, available technology, an individual instructor, and student factors. Thirty-six questions were posed to over 400 students with direct and current experience using CBT and CBA for course credit. The findings show that there is a strong potential for student as well as corporate benefits in training using online assessment tools. Online assessment effectiveness should be given further research study given the explosive jump in reported learning.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129311512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}