SlideShare a Scribd company logo
Probabilistic Ontology and Knowledge
Fusion for Procurement Fraud Detection
                in Brazil
    Rommel Carvalho, Kathryn Laskey, and Paulo Costa
                  George Mason University
    Marcelo Ladeira, Laécio Santos, and Shou Matsumoto
                  Universidade de Brasília

         Paper - Uncertainty Reasoning for the Semantic Web
                           URSW - ISWC
Agenda




         2
Agenda


Introduction




                        2
Agenda


Introduction
MEBN and PR-OWL




                        2
Agenda


Introduction
MEBN and PR-OWL
Procurement Fraud Detection




                              2
Agenda


Introduction
MEBN and PR-OWL
Procurement Fraud Detection
Conclusion




                              2
Introduction


Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   3
Introduction




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   4
Introduction
Brazilian Office of the Comptroller General
(CGU) primary mission
 Prevent and detect irregularities (corruption)
    Gather information from a variety of sources

    Combine the information

    Then evaluate whether further action is necessary




 Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   4
Introduction
Brazilian Office of the Comptroller General
(CGU) primary mission
 Prevent and detect irregularities (corruption)
    Gather information from a variety of sources

    Combine the information

    Then evaluate whether further action is necessary

Problem
 Information explosion
    Growing Acceleration Program (PAC)
        250 billion dollars - 1,000+ projects only in SP



 Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   4
Introduction




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   5
Introduction
MEBN
 Represent and reason with uncertainty about any
 propositions that can be expressed in first-order logic




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   5
Introduction
MEBN
 Represent and reason with uncertainty about any
 propositions that can be expressed in first-order logic
PR-OWL
 Uses MEBN logic to provide a framework for building
 probabilistic ontologies




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   5
Introduction
MEBN
 Represent and reason with uncertainty about any
 propositions that can be expressed in first-order logic
PR-OWL
 Uses MEBN logic to provide a framework for building
 probabilistic ontologies
Fraud Detection and Prevention Model
 Uses MEBN and PR-OWL
 Proof of concept

   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   5
MEBN and PR-OWL


Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   6
MEBN




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL




     Indices MFrag




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL




                     Directed Procurement by Indices MFrag




     Indices MFrag




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL
                          Procurement Directed MFrag




                     Directed Procurement by Indices MFrag




     Indices MFrag




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
MEBN
BN + FOL
   Procurement            Procurement Directed MFrag
  Fraud Detection
     MTheory




                     Directed Procurement by Indices MFrag




     Indices MFrag




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   7
PR-OWL




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   8
PR-OWL
MEBN + OWL




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   8
PR-OWL
MEBN + OWL




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   8
UnBBayes




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   9
Procurement Fraud
       Detection


Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   10
Procurement Fraud Detection




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   11
Procurement Fraud Detection

A major source of corruption is the procurement
process
 Laws attempt to ensure a competitive and fair process
 Perpetrators find ways to turn the process to their
 advantage while appearing to be legitimate




   Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   11
Procurement Fraud Detection

A major source of corruption is the procurement
process
  Laws attempt to ensure a competitive and fair process
  Perpetrators find ways to turn the process to their
  advantage while appearing to be legitimate
Specialist from CGU (Mário Spinelli)
  Structured the different kinds of procurement frauds found
  in the past years


    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   11
Procurement Fraud Detection




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   12
Procurement Fraud Detection
Types of fraud
  Characterized by criteria
    Principle of competition is violated when we have
       Owners who work as a front (usually someone with little or no education)

       Use of accounting indices that are not common




    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion     12
Procurement Fraud Detection
Types of fraud
  Characterized by criteria
    Principle of competition is violated when we have
       Owners who work as a front (usually someone with little or no education)

       Use of accounting indices that are not common


Ultimate goal
  Structure the specialist knowledge in a way that an
  automated system can reason with the evidence in a manner
  similar to the specialist
    Support current specialists

    Train new ones

    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion     12
Procurement Fraud Detection




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   13
Procurement Fraud Detection

Realistic goal (this paper)
  Proof of concept
    Selected just a few criteria

  Why Semantic Web?
  Propose an overall architecture for collecting data, reasoning
  with uncertainty (model designed), and reporting alerts
  Ask specialists to analyze results (subjective)
    No massive data used

  Show that new criteria can be easily incorporated

    Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   13
Why Semantic Web?




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?

          audits and inspections
             (Procurement)




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?

          audits and inspections
             (Procurement)           socio-economic
                                         (Person)




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?

          audits and inspections
             (Procurement)           socio-economic
                                         (Person)




                                               criminal history
                                                   (Person)




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Why Semantic Web?

          audits and inspections
             (Procurement)           socio-economic
                                         (Person)




               ?                               criminal history
            (Person)                               (Person)




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion
                                                                            14
            * AAA, open world, and nonunique naming - RIS environment
Architecture




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   15
Architecture




Public Notices - Data




              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   15
Architecture

                   Informaion Gathering




Public Notices - Data




              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data




              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data                                                           Design - UnBBayes




              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion      15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data                                                           Design - UnBBayes




                                                        Inference - Knowledge

              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion      15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data                                                           Design - UnBBayes




                Report for Decision Makers              Inference - Knowledge

              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion      15
Architecture

                   Informaion Gathering
                                                           DB - Information




Public Notices - Data                                                           Design - UnBBayes




                Report for Decision Makers              Inference - Knowledge

              Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion      15
Used Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   16
Used Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   17
Used Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   18
Results




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   19
Results




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   20
Results
Non suspect procurement:
  0.01% that the procurement was directed to a specific company by using accounting
  indices;

  0.10% that the procurement was directed to a specific company.

Suspect procurement:
  55.00% that the procurement was directed to a specific company by using accounting
  indices;

  29.77%, when the information about demanding experience in only one contract was
  omitted, and 72.00%, when it was given, that the procurement was directed to a specific
  company.




  Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion       20
Adding new Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   21
Adding new Criteria




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   22
Conclusion


Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   23
Conclusion




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   24
Conclusion
Correct conclusion for both suspicious and non-
suspicious cases
 Results are encouraging
    Suggesting that a fuller development of our proof of concept is promising

    Needs more testing, especially with real data for validating the conclusions




  Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion        24
Conclusion
Correct conclusion for both suspicious and non-
suspicious cases
 Results are encouraging
    Suggesting that a fuller development of our proof of concept is promising

    Needs more testing, especially with real data for validating the conclusions

Advantages
 Impartiality in the judgment
 Scalability
 Joint analysis of large volumes of indicators

  Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion        24
Conclusion




Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   25
Conclusion

Future work
 Choose/add new criteria
 Collect more data for validation of the model
 Will probably required fusion of data from different
 agencies
    Good for assessing the usefulness of ontologies and the SW




  Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion   25
Obrigado!




            26

More Related Content

Viewers also liked

Discovering knowledge using web structure mining
Discovering knowledge using web structure miningDiscovering knowledge using web structure mining
Discovering knowledge using web structure mining
Atul Khanna
 
Soft computing01
Soft computing01Soft computing01
Soft computing01
university of sargodha
 
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
Humanity Plus
 
Engineering Ambient Intelligence Systems using Agent Technology
Engineering Ambient Intelligence Systems using Agent TechnologyEngineering Ambient Intelligence Systems using Agent Technology
Engineering Ambient Intelligence Systems using Agent Technology
Nikolaos Spanoudakis
 
Bayesian Network Modeling using Python and R
Bayesian Network Modeling using Python and RBayesian Network Modeling using Python and R
Bayesian Network Modeling using Python and R
PyData
 
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
PyData
 
Anthropological Research and Techniques
Anthropological Research and TechniquesAnthropological Research and Techniques
Anthropological Research and Techniques
PaulVMcDowell
 
Bayesian Belief Networks for dummies
Bayesian Belief Networks for dummiesBayesian Belief Networks for dummies
Bayesian Belief Networks for dummies
Gilad Barkan
 
Transepistemic Abduction and its Application to Reflective Writing Analytics
Transepistemic Abduction and its Application to Reflective Writing AnalyticsTransepistemic Abduction and its Application to Reflective Writing Analytics
Transepistemic Abduction and its Application to Reflective Writing Analytics
Andrew Gibson
 
BIOPSY
BIOPSYBIOPSY
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
 

Viewers also liked (11)

Discovering knowledge using web structure mining
Discovering knowledge using web structure miningDiscovering knowledge using web structure mining
Discovering knowledge using web structure mining
 
Soft computing01
Soft computing01Soft computing01
Soft computing01
 
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
(Reverse) Engineering Intelligence - Noah Goodman - H+ Summit @ Harvard
 
Engineering Ambient Intelligence Systems using Agent Technology
Engineering Ambient Intelligence Systems using Agent TechnologyEngineering Ambient Intelligence Systems using Agent Technology
Engineering Ambient Intelligence Systems using Agent Technology
 
Bayesian Network Modeling using Python and R
Bayesian Network Modeling using Python and RBayesian Network Modeling using Python and R
Bayesian Network Modeling using Python and R
 
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
 
Anthropological Research and Techniques
Anthropological Research and TechniquesAnthropological Research and Techniques
Anthropological Research and Techniques
 
Bayesian Belief Networks for dummies
Bayesian Belief Networks for dummiesBayesian Belief Networks for dummies
Bayesian Belief Networks for dummies
 
Transepistemic Abduction and its Application to Reflective Writing Analytics
Transepistemic Abduction and its Application to Reflective Writing AnalyticsTransepistemic Abduction and its Application to Reflective Writing Analytics
Transepistemic Abduction and its Application to Reflective Writing Analytics
 
BIOPSY
BIOPSYBIOPSY
BIOPSY
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

More from Rommel Carvalho

Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big DataOuvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Rommel Carvalho
 
Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...
Rommel Carvalho
 
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos PúblicosProposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
Rommel Carvalho
 
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Rommel Carvalho
 
Mapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federalMapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federal
Rommel Carvalho
 
Ciência de Dados no Combate à Corrupção
Ciência de Dados no Combate à CorrupçãoCiência de Dados no Combate à Corrupção
Ciência de Dados no Combate à Corrupção
Rommel Carvalho
 
Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...
Rommel Carvalho
 
Filiação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federaisFiliação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federais
Rommel Carvalho
 
Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...
Rommel Carvalho
 
Detecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de comprasDetecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de compras
Rommel Carvalho
 
Identificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAIIdentificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAI
Rommel Carvalho
 
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
Rommel Carvalho
 
A GUI for MLN
A GUI for MLNA GUI for MLN
A GUI for MLN
Rommel Carvalho
 
URSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-inURSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-in
Rommel Carvalho
 
Integração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado FederalIntegração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado Federal
Rommel Carvalho
 
Dados Abertos Governamentais
Dados Abertos GovernamentaisDados Abertos Governamentais
Dados Abertos Governamentais
Rommel Carvalho
 
Modeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain AwarenessModeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain Awareness
Rommel Carvalho
 
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule LanguageSWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
Rommel Carvalho
 
Default Logics for Plausible Reasoning with Controversial Axioms
Default Logics for Plausible Reasoning with Controversial AxiomsDefault Logics for Plausible Reasoning with Controversial Axioms
Default Logics for Plausible Reasoning with Controversial Axioms
Rommel Carvalho
 
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description LogicsTractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
Rommel Carvalho
 

More from Rommel Carvalho (20)

Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big DataOuvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
Ouvidoria de Balcão vs Ouvidoria Digital: Desafios na Era Big Data
 
Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...Como transformar servidores em cientistas de dados e diminuir a distância ent...
Como transformar servidores em cientistas de dados e diminuir a distância ent...
 
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos PúblicosProposta de Modelo de Classificação de Riscos de Contratos Públicos
Proposta de Modelo de Classificação de Riscos de Contratos Públicos
 
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...Categorização de achados em auditorias de TI com modelos supervisionados e nã...
Categorização de achados em auditorias de TI com modelos supervisionados e nã...
 
Mapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federalMapeamento de risco de corrupção na administração pública federal
Mapeamento de risco de corrupção na administração pública federal
 
Ciência de Dados no Combate à Corrupção
Ciência de Dados no Combate à CorrupçãoCiência de Dados no Combate à Corrupção
Ciência de Dados no Combate à Corrupção
 
Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...Aplicação de técnicas de mineração de textos para classificação automática de...
Aplicação de técnicas de mineração de textos para classificação automática de...
 
Filiação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federaisFiliação partidária e risco de corrupção de servidores públicos federais
Filiação partidária e risco de corrupção de servidores públicos federais
 
Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...Uso de mineração de dados e textos para cálculo de preços de referência em co...
Uso de mineração de dados e textos para cálculo de preços de referência em co...
 
Detecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de comprasDetecção preventiva de fracionamento de compras
Detecção preventiva de fracionamento de compras
 
Identificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAIIdentificação automática de tipos de pedidos mais frequentes da LAI
Identificação automática de tipos de pedidos mais frequentes da LAI
 
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
BMAW 2014 - Using Bayesian Networks to Identify and Prevent Split Purchases i...
 
A GUI for MLN
A GUI for MLNA GUI for MLN
A GUI for MLN
 
URSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-inURSW 2013 - UMP-ST plug-in
URSW 2013 - UMP-ST plug-in
 
Integração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado FederalIntegração do Portal da Copa @ Comissão CMA do Senado Federal
Integração do Portal da Copa @ Comissão CMA do Senado Federal
 
Dados Abertos Governamentais
Dados Abertos GovernamentaisDados Abertos Governamentais
Dados Abertos Governamentais
 
Modeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain AwarenessModeling a Probabilistic Ontology for Maritime Domain Awareness
Modeling a Probabilistic Ontology for Maritime Domain Awareness
 
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule LanguageSWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language
 
Default Logics for Plausible Reasoning with Controversial Axioms
Default Logics for Plausible Reasoning with Controversial AxiomsDefault Logics for Plausible Reasoning with Controversial Axioms
Default Logics for Plausible Reasoning with Controversial Axioms
 
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description LogicsTractability of the Crisp Representations of Tractable Fuzzy Description Logics
Tractability of the Crisp Representations of Tractable Fuzzy Description Logics
 

Recently uploaded

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 

Recently uploaded (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 

URSW 2009 - Probabilistic Ontology and Knowledge Fusion for Procurement Fraud Detection in Brazil

  • 1. Probabilistic Ontology and Knowledge Fusion for Procurement Fraud Detection in Brazil Rommel Carvalho, Kathryn Laskey, and Paulo Costa George Mason University Marcelo Ladeira, Laécio Santos, and Shou Matsumoto Universidade de Brasília Paper - Uncertainty Reasoning for the Semantic Web URSW - ISWC
  • 2. Agenda 2
  • 6. Agenda Introduction MEBN and PR-OWL Procurement Fraud Detection Conclusion 2
  • 7. Introduction Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 3
  • 8. Introduction Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 4
  • 9. Introduction Brazilian Office of the Comptroller General (CGU) primary mission Prevent and detect irregularities (corruption) Gather information from a variety of sources Combine the information Then evaluate whether further action is necessary Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 4
  • 10. Introduction Brazilian Office of the Comptroller General (CGU) primary mission Prevent and detect irregularities (corruption) Gather information from a variety of sources Combine the information Then evaluate whether further action is necessary Problem Information explosion Growing Acceleration Program (PAC) 250 billion dollars - 1,000+ projects only in SP Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 4
  • 11. Introduction Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 5
  • 12. Introduction MEBN Represent and reason with uncertainty about any propositions that can be expressed in first-order logic Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 5
  • 13. Introduction MEBN Represent and reason with uncertainty about any propositions that can be expressed in first-order logic PR-OWL Uses MEBN logic to provide a framework for building probabilistic ontologies Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 5
  • 14. Introduction MEBN Represent and reason with uncertainty about any propositions that can be expressed in first-order logic PR-OWL Uses MEBN logic to provide a framework for building probabilistic ontologies Fraud Detection and Prevention Model Uses MEBN and PR-OWL Proof of concept Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 5
  • 15. MEBN and PR-OWL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 6
  • 16. MEBN Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 17. MEBN BN + FOL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 18. MEBN BN + FOL Indices MFrag Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 19. MEBN BN + FOL Directed Procurement by Indices MFrag Indices MFrag Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 20. MEBN BN + FOL Procurement Directed MFrag Directed Procurement by Indices MFrag Indices MFrag Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 21. MEBN BN + FOL Procurement Procurement Directed MFrag Fraud Detection MTheory Directed Procurement by Indices MFrag Indices MFrag Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 7
  • 22. PR-OWL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 8
  • 23. PR-OWL MEBN + OWL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 8
  • 24. PR-OWL MEBN + OWL Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 8
  • 25. UnBBayes Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 9
  • 26. Procurement Fraud Detection Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 10
  • 27. Procurement Fraud Detection Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 11
  • 28. Procurement Fraud Detection A major source of corruption is the procurement process Laws attempt to ensure a competitive and fair process Perpetrators find ways to turn the process to their advantage while appearing to be legitimate Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 11
  • 29. Procurement Fraud Detection A major source of corruption is the procurement process Laws attempt to ensure a competitive and fair process Perpetrators find ways to turn the process to their advantage while appearing to be legitimate Specialist from CGU (Mário Spinelli) Structured the different kinds of procurement frauds found in the past years Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 11
  • 30. Procurement Fraud Detection Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 12
  • 31. Procurement Fraud Detection Types of fraud Characterized by criteria Principle of competition is violated when we have Owners who work as a front (usually someone with little or no education) Use of accounting indices that are not common Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 12
  • 32. Procurement Fraud Detection Types of fraud Characterized by criteria Principle of competition is violated when we have Owners who work as a front (usually someone with little or no education) Use of accounting indices that are not common Ultimate goal Structure the specialist knowledge in a way that an automated system can reason with the evidence in a manner similar to the specialist Support current specialists Train new ones Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 12
  • 33. Procurement Fraud Detection Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 13
  • 34. Procurement Fraud Detection Realistic goal (this paper) Proof of concept Selected just a few criteria Why Semantic Web? Propose an overall architecture for collecting data, reasoning with uncertainty (model designed), and reporting alerts Ask specialists to analyze results (subjective) No massive data used Show that new criteria can be easily incorporated Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 13
  • 35. Why Semantic Web? Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 36. Why Semantic Web? Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 37. Why Semantic Web? audits and inspections (Procurement) Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 38. Why Semantic Web? audits and inspections (Procurement) socio-economic (Person) Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 39. Why Semantic Web? audits and inspections (Procurement) socio-economic (Person) criminal history (Person) Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 40. Why Semantic Web? audits and inspections (Procurement) socio-economic (Person) ? criminal history (Person) (Person) Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 14 * AAA, open world, and nonunique naming - RIS environment
  • 41. Architecture Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 42. Architecture Public Notices - Data Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 43. Architecture Informaion Gathering Public Notices - Data Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 44. Architecture Informaion Gathering DB - Information Public Notices - Data Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 45. Architecture Informaion Gathering DB - Information Public Notices - Data Design - UnBBayes Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 46. Architecture Informaion Gathering DB - Information Public Notices - Data Design - UnBBayes Inference - Knowledge Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 47. Architecture Informaion Gathering DB - Information Public Notices - Data Design - UnBBayes Report for Decision Makers Inference - Knowledge Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 48. Architecture Informaion Gathering DB - Information Public Notices - Data Design - UnBBayes Report for Decision Makers Inference - Knowledge Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 15
  • 49. Used Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 16
  • 50. Used Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 17
  • 51. Used Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 18
  • 52. Results Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 19
  • 53. Results Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 20
  • 54. Results Non suspect procurement: 0.01% that the procurement was directed to a specific company by using accounting indices; 0.10% that the procurement was directed to a specific company. Suspect procurement: 55.00% that the procurement was directed to a specific company by using accounting indices; 29.77%, when the information about demanding experience in only one contract was omitted, and 72.00%, when it was given, that the procurement was directed to a specific company. Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 20
  • 55. Adding new Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 21
  • 56. Adding new Criteria Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 22
  • 57. Conclusion Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 23
  • 58. Conclusion Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 24
  • 59. Conclusion Correct conclusion for both suspicious and non- suspicious cases Results are encouraging Suggesting that a fuller development of our proof of concept is promising Needs more testing, especially with real data for validating the conclusions Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 24
  • 60. Conclusion Correct conclusion for both suspicious and non- suspicious cases Results are encouraging Suggesting that a fuller development of our proof of concept is promising Needs more testing, especially with real data for validating the conclusions Advantages Impartiality in the judgment Scalability Joint analysis of large volumes of indicators Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 24
  • 61. Conclusion Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 25
  • 62. Conclusion Future work Choose/add new criteria Collect more data for validation of the model Will probably required fusion of data from different agencies Good for assessing the usefulness of ontologies and the SW Introduction - MEBN and PR-OWL - Procurement Fraud Detection - Conclusion 25
  • 63. Obrigado! 26

Editor's Notes