SlideShare a Scribd company logo
1 of 63
Probabilistic Ontology and Knowledge
Fusion for Procurement Fraud Detection
                in Brazil
    Rommel Carvalho, Kathryn Laskey, and Paulo Costa
                  George Mason University
    Marcelo Ladeira, Laécio Santos, and Shou Matsumoto
                  Universidade de Brasília

         Paper - Uncertainty Reasoning for the Semantic Web
                           URSW - ISWC
Agenda




         2
Agenda


Introduction




                        2
Agenda


Introduction
MEBN and PR-OWL




                        2
Agenda


Introduction
MEBN and PR-OWL
Procurement Fraud Detection




                              2
Agenda


Introduction
MEBN and PR-OWL
Procurement Fraud Detection
Conclusion




                              2
Introduction


Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   3
Introduction




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   4
Introduction
Brazilian Office of the Comptroller General
(CGU) primary mission
 Prevent and detect irregularities (corruption)
    Gather information from a variety of sources

    Combine the information

    Then evaluate whether further action is necessary




 Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   4
Introduction
Brazilian Office of the Comptroller General
(CGU) primary mission
 Prevent and detect irregularities (corruption)
    Gather information from a variety of sources

    Combine the information

    Then evaluate whether further action is necessary

Problem
 Information explosion
    Growing Acceleration Program (PAC)
        250 billion dollars - 1,000+ projects only in SP



 Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   4
Introduction




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   5
Introduction
MEBN
 Represent and reason with uncertainty about any
 propositions that can be expressed in first-order logic




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   5
Introduction
MEBN
 Represent and reason with uncertainty about any
 propositions that can be expressed in first-order logic
PR-OWL
 Uses MEBN logic to provide a framework for building
 probabilistic ontologies




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   5
Introduction
MEBN
 Represent and reason with uncertainty about any
 propositions that can be expressed in first-order logic
PR-OWL
 Uses MEBN logic to provide a framework for building
 probabilistic ontologies
Fraud Detection and Prevention Model
 Uses MEBN and PR-OWL
 Proof of concept

   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   5
MEBN and PR-OWL


Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   6
MEBN




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL




     Indices MFrag




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL




                     Directed Procurement by Indices MFrag




     Indices MFrag




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL
                          Procurement Directed MFrag




                     Directed Procurement by Indices MFrag




     Indices MFrag




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL
   Procurement            Procurement Directed MFrag
  Fraud Detection
     MTheory




                     Directed Procurement by Indices MFrag




     Indices MFrag




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
PR-OWL




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   8
PR-OWL
MEBN + OWL




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   8
PR-OWL
MEBN + OWL




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   8
UnBBayes




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   9
Procurement Fraud
       Detection


Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   10
Procurement Fraud Detection




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   11
Procurement Fraud Detection

A major source of corruption is the procurement
process
 Laws attempt to ensure a competitive and fair process
 Perpetrators find ways to turn the process to their
 advantage while appearing to be legitimate




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   11
Procurement Fraud Detection

A major source of corruption is the procurement
process
  Laws attempt to ensure a competitive and fair process
  Perpetrators find ways to turn the process to their
  advantage while appearing to be legitimate
Specialist from CGU (Mário Spinelli)
  Structured the different kinds of procurement frauds found
  in the past years


    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   11
Procurement Fraud Detection




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   12
Procurement Fraud Detection
Types of fraud
  Characterized by criteria
    Principle of competition is violated when we have
       Owners who work as a front (usually someone with little or no education)

       Use of accounting indices that are not common




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion     12
Procurement Fraud Detection
Types of fraud
  Characterized by criteria
    Principle of competition is violated when we have
       Owners who work as a front (usually someone with little or no education)

       Use of accounting indices that are not common


Ultimate goal
  Structure the specialist knowledge in a way that an
  automated system can reason with the evidence in a manner
  similar to the specialist
    Support current specialists

    Train new ones

    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion     12
Procurement Fraud Detection




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   13
Procurement Fraud Detection

Realistic goal (this paper)
  Proof of concept
    Selected just a few criteria

  Why Semantic Web?
  Propose an overall architecture for collecting data, reasoning
  with uncertainty (model designed), and reporting alerts
  Ask specialists to analyze results (subjective)
    No massive data used

  Show that new criteria can be easily incorporated

    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   13
Why Semantic Web?




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?

          audits and inspections
             (Procurement)




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?

          audits and inspections
             (Procurement)           socio-economic
                                         (Person)




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?

          audits and inspections
             (Procurement)           socio-economic
                                         (Person)




                                               criminal history
                                                   (Person)




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?

          audits and inspections
             (Procurement)           socio-economic
                                         (Person)




               ?                               criminal history
            (Person)                               (Person)




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Architecture




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   15
Architecture




Public Notices - Data




              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   15
Architecture

                   Informaion Gathering




Public Notices - Data




              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data




              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data                                                           Design - UnBBayes




              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion      15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data                                                           Design - UnBBayes




                                                        Inference - Knowledge

              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion      15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data                                                           Design - UnBBayes




                Report for Decision Makers              Inference - Knowledge

              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion      15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data                                                           Design - UnBBayes




                Report for Decision Makers              Inference - Knowledge

              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion      15
Used Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   16
Used Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   17
Used Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   18
Results




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   19
Results




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   20
Results
Non suspect procurement:
  0.01% that the procurement was directed to a specific company by using accounting
  indices;

  0.10% that the procurement was directed to a specific company.

Suspect procurement:
  55.00% that the procurement was directed to a specific company by using accounting
  indices;

  29.77%, when the information about demanding experience in only one contract was
  omitted, and 72.00%, when it was given, that the procurement was directed to a specific
  company.




  Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion       20
Adding new Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   21
Adding new Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   22
Conclusion


Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   23
Conclusion




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   24
Conclusion
Correct conclusion for both suspicious and non-
suspicious cases
 Results are encouraging
    Suggesting that a fuller development of our proof of concept is promising

    Needs more testing, especially with real data for validating the conclusions




  Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion        24
Conclusion
Correct conclusion for both suspicious and non-
suspicious cases
 Results are encouraging
    Suggesting that a fuller development of our proof of concept is promising

    Needs more testing, especially with real data for validating the conclusions

Advantages
 Impartiality in the judgment
 Scalability
 Joint analysis of large volumes of indicators

  Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion        24
Conclusion




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   25
Conclusion

Future work
 Choose/add new criteria
 Collect more data for validation of the model
 Will probably required fusion of data from different
 agencies
    Good for assessing the usefulness of ontologies and the SW




  Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   25
Obrigado!




            26

More Related Content

Viewers also liked

Discovering knowledge using web structure mining
Discovering knowledge using web structure miningDiscovering knowledge using web structure mining
Discovering knowledge using web structure miningAtul Khanna
 
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ HarvardHumanity Plus
 
Engineering Ambient Intelligence Systems using Agent Technology
Engineering Ambient Intelligence Systems using Agent TechnologyEngineering Ambient Intelligence Systems using Agent Technology
Engineering Ambient Intelligence Systems using Agent TechnologyNikolaos Spanoudakis
 
Bayesian Network Modeling using Python and R
Bayesian Network Modeling using Python and RBayesian Network Modeling using Python and R
Bayesian Network Modeling using Python and RPyData
 
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...PyData
 
Anthropological Research and Techniques
Anthropological Research and TechniquesAnthropological Research and Techniques
Anthropological Research and TechniquesPaulVMcDowell
 
Bayesian Belief Networks for dummies
Bayesian Belief Networks for dummiesBayesian Belief Networks for dummies
Bayesian Belief Networks for dummiesGilad Barkan
 
Transepistemic Abduction and its Application to Reflective Writing Analytics
Transepistemic Abduction and its Application to Reflective Writing AnalyticsTransepistemic Abduction and its Application to Reflective Writing Analytics
Transepistemic Abduction and its Application to Reflective Writing AnalyticsAndrew Gibson
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Viewers also liked (11)

Discovering knowledge using web structure mining
Discovering knowledge using web structure miningDiscovering knowledge using web structure mining
Discovering knowledge using web structure mining
 
Soft computing01
Soft computing01Soft computing01
Soft computing01
 
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
 
Engineering Ambient Intelligence Systems using Agent Technology
Engineering Ambient Intelligence Systems using Agent TechnologyEngineering Ambient Intelligence Systems using Agent Technology
Engineering Ambient Intelligence Systems using Agent Technology
 
Bayesian Network Modeling using Python and R
Bayesian Network Modeling using Python and RBayesian Network Modeling using Python and R
Bayesian Network Modeling using Python and R
 
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
 
Anthropological Research and Techniques
Anthropological Research and TechniquesAnthropological Research and Techniques
Anthropological Research and Techniques
 
Bayesian Belief Networks for dummies
Bayesian Belief Networks for dummiesBayesian Belief Networks for dummies
Bayesian Belief Networks for dummies
 
Transepistemic Abduction and its Application to Reflective Writing Analytics
Transepistemic Abduction and its Application to Reflective Writing AnalyticsTransepistemic Abduction and its Application to Reflective Writing Analytics
Transepistemic Abduction and its Application to Reflective Writing Analytics
 
BIOPSY
BIOPSYBIOPSY
BIOPSY
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

More from Rommel Carvalho

Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big DataOuvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big DataRommel Carvalho
 
Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...Rommel Carvalho
 
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos PúblicosProposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos PúblicosRommel Carvalho
 
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...Rommel Carvalho
 
Mapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federalMapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federalRommel Carvalho
 
Ciência de Dados no Combate à Corrupção
Ciência de Dados no Combate à CorrupçãoCiência de Dados no Combate à Corrupção
Ciência de Dados no Combate à CorrupçãoRommel Carvalho
 
Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...Rommel Carvalho
 
Filiação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federaisFiliação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federaisRommel Carvalho
 
Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...Rommel Carvalho
 
Detecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de comprasDetecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de comprasRommel Carvalho
 
Identificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAIIdentificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAIRommel Carvalho
 
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...Rommel Carvalho
 
URSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-inURSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-inRommel Carvalho
 
Integração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado FederalIntegração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado FederalRommel Carvalho
 
Dados Abertos Governamentais
Dados Abertos GovernamentaisDados Abertos Governamentais
Dados Abertos GovernamentaisRommel Carvalho
 
Modeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain AwarenessModeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain AwarenessRommel Carvalho
 
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule LanguageSWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule LanguageRommel Carvalho
 
Default Logics for Plausible Reasoning with Controversial Axioms
Default Logics for Plausible Reasoning with Controversial AxiomsDefault Logics for Plausible Reasoning with Controversial Axioms
Default Logics for Plausible Reasoning with Controversial AxiomsRommel Carvalho
 
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description LogicsTractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description LogicsRommel Carvalho
 

More from Rommel Carvalho (20)

Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big DataOuvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
 
Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...
 
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos PúblicosProposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
 
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
 
Mapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federalMapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federal
 
Ciência de Dados no Combate à Corrupção
Ciência de Dados no Combate à CorrupçãoCiência de Dados no Combate à Corrupção
Ciência de Dados no Combate à Corrupção
 
Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...
 
Filiação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federaisFiliação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federais
 
Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...
 
Detecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de comprasDetecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de compras
 
Identificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAIIdentificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAI
 
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
 
A GUI for MLN
A GUI for MLNA GUI for MLN
A GUI for MLN
 
URSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-inURSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-in
 
Integração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado FederalIntegração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado Federal
 
Dados Abertos Governamentais
Dados Abertos GovernamentaisDados Abertos Governamentais
Dados Abertos Governamentais
 
Modeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain AwarenessModeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain Awareness
 
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule LanguageSWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
 
Default Logics for Plausible Reasoning with Controversial Axioms
Default Logics for Plausible Reasoning with Controversial AxiomsDefault Logics for Plausible Reasoning with Controversial Axioms
Default Logics for Plausible Reasoning with Controversial Axioms
 
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description LogicsTractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

URSW 2009 - Probabilistic Ontology and Knowledge Fusion for Procurement Fraud Detection in Brazil

  • 1. Probabilistic Ontology and Knowledge Fusion for Procurement Fraud Detection in Brazil Rommel Carvalho, Kathryn Laskey, and Paulo Costa George Mason University Marcelo Ladeira, Laécio Santos, and Shou Matsumoto Universidade de Brasília Paper - Uncertainty Reasoning for the Semantic Web URSW - ISWC
  • 2. Agenda 2
  • 6. Agenda Introduction MEBN and PR-OWL Procurement Fraud Detection Conclusion 2
  • 7. Introduction Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 3
  • 8. Introduction Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 4
  • 9. Introduction Brazilian Office of the Comptroller General (CGU) primary mission Prevent and detect irregularities (corruption) Gather information from a variety of sources Combine the information Then evaluate whether further action is necessary Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 4
  • 10. Introduction Brazilian Office of the Comptroller General (CGU) primary mission Prevent and detect irregularities (corruption) Gather information from a variety of sources Combine the information Then evaluate whether further action is necessary Problem Information explosion Growing Acceleration Program (PAC) 250 billion dollars - 1,000+ projects only in SP Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 4
  • 11. Introduction Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 5
  • 12. Introduction MEBN Represent and reason with uncertainty about any propositions that can be expressed in first-order logic Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 5
  • 13. Introduction MEBN Represent and reason with uncertainty about any propositions that can be expressed in first-order logic PR-OWL Uses MEBN logic to provide a framework for building probabilistic ontologies Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 5
  • 14. Introduction MEBN Represent and reason with uncertainty about any propositions that can be expressed in first-order logic PR-OWL Uses MEBN logic to provide a framework for building probabilistic ontologies Fraud Detection and Prevention Model Uses MEBN and PR-OWL Proof of concept Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 5
  • 15. MEBN and PR-OWL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 6
  • 16. MEBN Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 17. MEBN BN + FOL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 18. MEBN BN + FOL Indices MFrag Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 19. MEBN BN + FOL Directed Procurement by Indices MFrag Indices MFrag Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 20. MEBN BN + FOL Procurement Directed MFrag Directed Procurement by Indices MFrag Indices MFrag Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 21. MEBN BN + FOL Procurement Procurement Directed MFrag Fraud Detection MTheory Directed Procurement by Indices MFrag Indices MFrag Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 22. PR-OWL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 8
  • 23. PR-OWL MEBN + OWL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 8
  • 24. PR-OWL MEBN + OWL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 8
  • 25. UnBBayes Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 9
  • 26. Procurement Fraud Detection Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 10
  • 27. Procurement Fraud Detection Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 11
  • 28. Procurement Fraud Detection A major source of corruption is the procurement process Laws attempt to ensure a competitive and fair process Perpetrators find ways to turn the process to their advantage while appearing to be legitimate Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 11
  • 29. Procurement Fraud Detection A major source of corruption is the procurement process Laws attempt to ensure a competitive and fair process Perpetrators find ways to turn the process to their advantage while appearing to be legitimate Specialist from CGU (Mário Spinelli) Structured the different kinds of procurement frauds found in the past years Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 11
  • 30. Procurement Fraud Detection Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 12
  • 31. Procurement Fraud Detection Types of fraud Characterized by criteria Principle of competition is violated when we have Owners who work as a front (usually someone with little or no education) Use of accounting indices that are not common Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 12
  • 32. Procurement Fraud Detection Types of fraud Characterized by criteria Principle of competition is violated when we have Owners who work as a front (usually someone with little or no education) Use of accounting indices that are not common Ultimate goal Structure the specialist knowledge in a way that an automated system can reason with the evidence in a manner similar to the specialist Support current specialists Train new ones Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 12
  • 33. Procurement Fraud Detection Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 13
  • 34. Procurement Fraud Detection Realistic goal (this paper) Proof of concept Selected just a few criteria Why Semantic Web? Propose an overall architecture for collecting data, reasoning with uncertainty (model designed), and reporting alerts Ask specialists to analyze results (subjective) No massive data used Show that new criteria can be easily incorporated Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 13
  • 35. Why Semantic Web? Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 36. Why Semantic Web? Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 37. Why Semantic Web? audits and inspections (Procurement) Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 38. Why Semantic Web? audits and inspections (Procurement) socio-economic (Person) Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 39. Why Semantic Web? audits and inspections (Procurement) socio-economic (Person) criminal history (Person) Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 40. Why Semantic Web? audits and inspections (Procurement) socio-economic (Person) ? criminal history (Person) (Person) Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 41. Architecture Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 42. Architecture Public Notices - Data Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 43. Architecture Informaion Gathering Public Notices - Data Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 44. Architecture Informaion Gathering DB - Information Public Notices - Data Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 45. Architecture Informaion Gathering DB - Information Public Notices - Data Design - UnBBayes Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 46. Architecture Informaion Gathering DB - Information Public Notices - Data Design - UnBBayes Inference - Knowledge Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 47. Architecture Informaion Gathering DB - Information Public Notices - Data Design - UnBBayes Report for Decision Makers Inference - Knowledge Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 48. Architecture Informaion Gathering DB - Information Public Notices - Data Design - UnBBayes Report for Decision Makers Inference - Knowledge Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 49. Used Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 16
  • 50. Used Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 17
  • 51. Used Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 18
  • 52. Results Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 19
  • 53. Results Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 20
  • 54. Results Non suspect procurement: 0.01% that the procurement was directed to a specific company by using accounting indices; 0.10% that the procurement was directed to a specific company. Suspect procurement: 55.00% that the procurement was directed to a specific company by using accounting indices; 29.77%, when the information about demanding experience in only one contract was omitted, and 72.00%, when it was given, that the procurement was directed to a specific company. Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 20
  • 55. Adding new Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 21
  • 56. Adding new Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 22
  • 57. Conclusion Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 23
  • 58. Conclusion Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 24
  • 59. Conclusion Correct conclusion for both suspicious and non- suspicious cases Results are encouraging Suggesting that a fuller development of our proof of concept is promising Needs more testing, especially with real data for validating the conclusions Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 24
  • 60. Conclusion Correct conclusion for both suspicious and non- suspicious cases Results are encouraging Suggesting that a fuller development of our proof of concept is promising Needs more testing, especially with real data for validating the conclusions Advantages Impartiality in the judgment Scalability Joint analysis of large volumes of indicators Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 24
  • 61. Conclusion Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 25
  • 62. Conclusion Future work Choose/add new criteria Collect more data for validation of the model Will probably required fusion of data from different agencies Good for assessing the usefulness of ontologies and the SW Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 25
  • 63. Obrigado! 26

Editor's Notes