Knowledge Representation (II)

Size: px
Start display at page:

Download "Knowledge Representation (II)"

Transcription

1 Knowledge Representation (II) Martin Molina Department of Artificial Intelligence Technical University of Madrid

2 Constraints Representation The knowledge base is a collection constraints. Each constraint represents an equilibrium relation for the values of qualitative variables. Inference Constraint satisfaction algorithms are applied. For example, the Waltz algorithm progressively refines domains of variables to reach steady states. VARIABLES X1 = {a1, a2, a3,...} X2 = {b1, b2, b3,...}... Xn = {c1, c2, c3,...} CONSTRAINTS R1: X1 + X2 = X5 R2: X2 < X3 * X4... Rm: X2 > X4 + X5 + X6 Advantages and disadvantages + It is a concise representation + It does not impose direction on the reasoning - Efficiency - Must be completed with modularization Martin Molina Technical University of Madrid 2

3 Example Behavior of a chemical reactor: VARIABLES: Inputs to the chemical reactor: tendency of ammonia: dnh3 {+,0,-} tendency of propylene: dc3h6 {+,0,-} tendency f the air: daire {+,0,-} Internal state of the reactor: tendency of the temperature: dq {+,0,-} Outputs of the reactor: tendency of oxygen: do2 {+,0,-} tendency of carbon monoxide: dco {+,0,-} tendency of cyanide: dcnh {+,0,-} CONSTRAINTS: R1: do2 = dair + dnh3 R2: dcnh = dair - dc3h6 R3: dco = dc3h6 - dnh3 R4: dq = dair * dnh3 OPERATORS: ? ? - - Air NH 3 C 3 H 6 O 2 CO CNH Martin Molina Technical University of Madrid Q 3

4 Approximate reasoning In the real world, people usually solve problems using approximate statements such as: It is almost certain that at 8:00 you will meet a traffic jam at the entrance to the city. Normally, the inflammation of the gums is due to a lack of vitamins. The approach provided by the bi-valuated logic handles only two values (true and false) and it is not appropriate in these situations. Models for approximate reasoning in AI: - Empirical models: MYCIN, Prospector, Dempster and Shafer - Probability-based: Bayesian Networks - Logic-based: Fuzzy logic Martin Molina Technical University of Madrid 4

5 MYCIN Representation Inference Certainty factor CF(h) between -1 and +1. h1 Certainty of composite formulas: CF(A & B) = min(cf(a), CF(B)) CF(A o B) = max(cf(a), CF(B)) Propagation: CF(h,E) = CF(h,e). max(0,cf(e,e)) r1 CF(h1, e) r2 CF(h1, e) h2 h3 h4 CF(h4) Accumulation: CF1,CF2 > 0 CF=CF1+CF2-CF1.CF2 CF1,CF2 < 0 CF=CF1+CF2+CF1.CF2 CF1.CF2 < 0 CF=(CF1+CF2)/(1-min( CF1, CF2 )) CF(h2) r1 CF(h1, e) Advantages h5 CF(h5) h6 CF(h6) Intuitive, easy knowledge acquisition Simple and efficient computation. Unique value for the unknown CF = 0. (distinguishes uncertainty from ignorance). Martin Molina Technical University of Madrid 5

6 MYCIN rule base # RISK ASSESSMENT FOR BANK LOANS # client image # IF (client) financial group = interesting,(client) seniority in the bank = old THEN [1.00] (client) image = positive IF (client) financial group = interesante,(client) seniority in the bank = medium THEN [1.00] (client) image = positive IF (client) financial group = interesting,(client) seniority in the bank = recent THEN [0.75] (client) image = positive IF (client) financial group = acceptable,(client) seniority in the bank = old THEN [0.75] (client) image = positive IF (client) financial group = acceptable,(client) seniority in the bank = recent THEN [0.50] (client) image = positive IF (client) financial group = non-existent,(client) seniority in the bank = old THEN [0.75] (client) image = positive IF (client) financial group = non-existent,(client) seniority in the bank = recent THEN [0.25] (client) image = positive IF (client) financial group = rejectable,(client) seniority in the bank = NON - recent THEN [0.25] (client) image = positive Martin Molina Technical University of Madrid 6

7 Remaining problems Low level: The system to be build initially is described in terms not directly transferable to representations. Progressive refinement is needed to achieve the required detail. Uniformity: The use of a uniform tecnique (as rules) can hide the different types of knowledge involved in the system. Need for combination: The combined use of various techniques of representation (when the system is complex) requires proper organization and structure. Martin Molina Technical University of Madrid 7

8 Traditional solutions for structuring Contexts Multiple representation Meta-rules Agendas Blackboard Problem spaces Generic tasks Martin Molina Technical University of Madrid 8

9 Contexts The management of contexts is a partition in the knowledge base according to a division in knowledge areas of phases of reasoning. They are usually associated with production rules. Knowledge base: Context 1 R0: If Then - R1: If - Then - R2: If - Then - R3: If - Then - R4: If - Then - Context 2 R5: If - Then - R6: If - Then - R7: If - Then - R8: If - Then - R9: If - Then - Context 3 R10: If - Then - R11: If - Then - R12: If - Then - R13: If - Then - R14: If - Then - They facilitate the understanding of the organization of the knowledge base and improve the efficiency of the inference process. In general, contexts have a flat structure, even though recent approaches raise the possibility of using hierarchical organizations with heritage management. Martin Molina Technical University of Madrid 9

10 Multiple representation This method adds various representation tecniques into a single knowledge base. For example: Rules+ Restrictions+ Frames+ MYCIN The combined use of these representations can help select the best representation for each case. It can introduce an improvement in the organization, given that one representation (such as frames) may facilitate the structuring of another (such as rules). However, this method itself does not provide a context appropriate to carry out an appropriate organization. It can lead to heterogeneous databases with a high degree of complexity. Martin Molina Technical University of Madrid 10

11 Meta-rules The meta-rules are based on the idea of formulating knowledge about knowledge (metaknowledge). They are rules that make statements about elements of the knowledge base. Example: IF the culture of the current body was not in vain and there are rules that relate the current body with possible previous infections, THEN such rules should not be considered In general the meta-rules represent strategies of the use of domain knowledge (control knowledge). Meta-rules are formulated at a higher level of abstraction, which facilitates a more structured vision of the knowledge base. However, the use of meta-rules usually does not provide a clear separation between domain knowledge and control, which can lead to complex databases difficult to maintain. Martin Molina Technical University of Madrid 11

12 Agenda The agenda is a first step in the explicit presentation of a dynamic component of control. The agenda follows the intuitive idea of explicit formulation of the tasks that are pending to be realized, organized by various degrees of priority, which is updated dynamically during the process of reasoning. The agenda considers the existence of tasks to perform which may correspond to sets of rules. Sample format: Priority 1: Task 1, Task 2, Task 3 Priority 2: Task 4, Task 5 Priority 3: Task 6, Task 7, Task 8 Priority 4: Task 9, Task 10 Each task can include information such as: <Precondition,Action,Insertion,Elimination,etc.> The agenda focuses more on aspects of control in the modular organization of knowledge, but is a step ahead in the separation of control knowledge from the domain knowledge. Martin Molina Technical University of Madrid 12

13 Blackboard The blackboard is a more evolved control structure that separates the control knowledge and provides the possibility to modularize the knowledge in different areas. It includes the following components: Blackboard Pizarra Control Fuente Knowledge de Conocimiento source Fuente Knowledge de Conocimiento source Fuente Knowledge de Conocimiento source Fuente Knowledge de Conocimiento source This is a model that does not always coincide with the perception of problems by experts, so it is seen more as a computing solution than a description of a form of reasoning. Martin Molina Technical University of Madrid 13

14 Problem spaces The problem areas organize knowledge based on goals to be achieved at different levels of depth. They basically follows the following process of reasoning: 1. Each problem space develops a local search using an area of modular knowledge to achieve a particular goal. 2. When for a given space it is not possible to find the solution, there is a sub-goal which is analyzed in a space problem of greater depth. sub-goaling Space Problem sub-goaling Space Problem Space Problem sub-goaling Space Problem This tecnique provides a modularization of knowledge at different levels of depth with ability to apply learning tecniques. Martin Molina Technical University of Madrid 14

15 Generic tasks A generic task is a module that associates to a class of problems (for ex. design) a knowledge representation and an inference strategy. Generic Task KB Inference Generic Task Generic Task KB Inference KB Inference Generic Task KB Inference The arquitecture of a final system is seen as structured collection of instances of these tasks in a particular domain. One of the main contributions of this concept is that the system presents a modularization of components with their own methods of inference and knowledge bases. The resulting sysem provides an organization to a higher level of abstraction in classes of tasks. Martin Molina Technical University of Madrid 15

16 Limitations The previous structuring techniques represent a major step in the modular organization of knowledge to build complex systems. However, they are solutions which are close to a model of computing in general, following a computable model instead of a close imitation of a process of reasoning. Consequently, the resulting architectures do not necessarily follow the steps in solving the problem that the experts handle. It is necessary to have models that focus more on making an overall process of reasoning and the role that plays the knowledge in that process in more abstract terms. Martin Molina Technical University of Madrid 16

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

Topic 2: Structure of Knowledge-Based Systems

Topic 2: Structure of Knowledge-Based Systems Engineering (Ingeniería del Conocimiento) Escuela Politécnica Superior, UAM Course 2007-2008 Topic 2: Structure of -Based Systems Contents 2.1 Components according to the Final User 2.2 Components according

More information

IAI : Expert Systems

IAI : Expert Systems IAI : Expert Systems John A. Bullinaria, 2005 1. What is an Expert System? 2. The Architecture of Expert Systems 3. Knowledge Acquisition 4. Representing the Knowledge 5. The Inference Engine 6. The Rete-Algorithm

More information

Appendix B Data Quality Dimensions

Appendix B Data Quality Dimensions Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational

More information

COMPUTATIONAL METHODS FOR A MATHEMATICAL THEORY OF EVIDENCE

COMPUTATIONAL METHODS FOR A MATHEMATICAL THEORY OF EVIDENCE COMPUTATIONAL METHODS FOR A MATHEMATICAL THEORY OF EVIDENCE Jeffrey A. Barnett USC/lnformation Sciences Institute ABSTRACT: Many knowledge-based expert systems employ numerical schemes to represent evidence,

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

CpSc810 Goddard Notes Chapter 7. Expert Systems

CpSc810 Goddard Notes Chapter 7. Expert Systems CpSc810 Goddard Notes Chapter 7 Expert Systems Expert systems are designed to provide expert quality performance on domainspecific problems. In this chapter we look at the structure of expert systems focusing

More information

Fourth generation techniques (4GT)

Fourth generation techniques (4GT) Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some

More information

KSE Comp. support for the writing process 2 1

KSE Comp. support for the writing process 2 1 KSE Comp. support for the writing process 2 1 Flower & Hayes cognitive model of writing A reaction against stage models of the writing process E.g.: Prewriting - Writing - Rewriting They model the growth

More information

Improving Knowledge-Based System Performance by Reordering Rule Sequences

Improving Knowledge-Based System Performance by Reordering Rule Sequences Improving Knowledge-Based System Performance by Reordering Rule Sequences Neli P. Zlatareva Department of Computer Science Central Connecticut State University 1615 Stanley Street New Britain, CT 06050

More information

Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015

Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015 Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students

More information

Implementation of hybrid software architecture for Artificial Intelligence System

Implementation of hybrid software architecture for Artificial Intelligence System IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.1, January 2007 35 Implementation of hybrid software architecture for Artificial Intelligence System B.Vinayagasundaram and

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley

More information

Mapping an Application to a Control Architecture: Specification of the Problem

Mapping an Application to a Control Architecture: Specification of the Problem Mapping an Application to a Control Architecture: Specification of the Problem Mieczyslaw M. Kokar 1, Kevin M. Passino 2, Kenneth Baclawski 1, and Jeffrey E. Smith 3 1 Northeastern University, Boston,

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Integrating Cognitive Models Based on Different Computational Methods

Integrating Cognitive Models Based on Different Computational Methods Integrating Cognitive Models Based on Different Computational Methods Nicholas L. Cassimatis ([email protected]) Rensselaer Polytechnic Institute Department of Cognitive Science 110 8 th Street Troy, NY 12180

More information

Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track)

Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track) Study Plan for the Master Degree In Industrial Engineering / Management (Thesis Track) Plan no. 2005 T A. GENERAL RULES AND CONDITIONS: 1. This plan conforms to the valid regulations of programs of graduate

More information

A Knowledge Base Representing Porter's Five Forces Model

A Knowledge Base Representing Porter's Five Forces Model A Knowledge Base Representing Porter's Five Forces Model Henk de Swaan Arons ([email protected]) Philip Waalewijn ([email protected]) Erasmus University Rotterdam PO Box 1738, 3000 DR Rotterdam,

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment,

Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, Uncertainty Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, E.g., loss of sensory information such as vision Incorrectness in

More information

Topic 4. 4.3 Dempster-Shafer Theory

Topic 4. 4.3 Dempster-Shafer Theory Topic 4 Representation and Reasoning with Uncertainty Contents 4.0 Representing Uncertainty 4.1 Probabilistic methods 4.2 Certainty Factors (CFs) 4.3 Dempster-Shafer theory 4.4 Fuzzy Logic Dempster-Shafer

More information

Artificial Intelligence & Knowledge Management

Artificial Intelligence & Knowledge Management Artificial Intelligence & Knowledge Management Nick Bassiliades, Ioannis Vlahavas, Fotis Kokkoras Aristotle University of Thessaloniki Department of Informatics Programming Languages and Software Engineering

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

8. KNOWLEDGE BASED SYSTEMS IN MANUFACTURING SIMULATION

8. KNOWLEDGE BASED SYSTEMS IN MANUFACTURING SIMULATION - 1-8. KNOWLEDGE BASED SYSTEMS IN MANUFACTURING SIMULATION 8.1 Introduction 8.1.1 Summary introduction The first part of this section gives a brief overview of some of the different uses of expert systems

More information

22C:22 (CS:2820) Object-Oriented Software Development

22C:22 (CS:2820) Object-Oriented Software Development The University of Iowa 22C:22 (CS:2820) Object-Oriented Software Development Fall 2012 Software Complexity by Cesare Tinelli Complexity Software systems are complex artifacts Failure to master this complexity

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated

More information

Multi-ultrasonic sensor fusion for autonomous mobile robots

Multi-ultrasonic sensor fusion for autonomous mobile robots Multi-ultrasonic sensor fusion for autonomous mobile robots Zou Yi *, Ho Yeong Khing, Chua Chin Seng, and Zhou Xiao Wei School of Electrical and Electronic Engineering Nanyang Technological University

More information

Hierarchical Judgement Composition: Revisiting the Structural Credit Assignment Problem

Hierarchical Judgement Composition: Revisiting the Structural Credit Assignment Problem Hierarchical Judgement Composition: Revisiting the Structural Credit Assignment Problem Joshua Jones, Ashok Goel College of Computing Georgia Institute of Technology Atlanta, USA 30332 {jkj, goel}@cc.gatech.edu

More information

Optimal Replacement of Underground Distribution Cables

Optimal Replacement of Underground Distribution Cables 1 Optimal Replacement of Underground Distribution Cables Jeremy A. Bloom, Member, IEEE, Charles Feinstein, and Peter Morris Abstract This paper presents a general decision model that enables utilities

More information

Knowledge Engineering (Ingeniería del Conocimiento)

Knowledge Engineering (Ingeniería del Conocimiento) Knowledge Engineering (Ingeniería del Conocimiento) Escuela Politécnica Superior, UAM Course 2007-2008 Topic 1: Introduction to Knowledge-Based Systems (KBSs) 1 Topic 1: Introduction to Knowledge- Based

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

CSC384 Intro to Artificial Intelligence

CSC384 Intro to Artificial Intelligence CSC384 Intro to Artificial Intelligence What is Artificial Intelligence? What is Intelligence? Are these Intelligent? CSC384, University of Toronto 3 What is Intelligence? Webster says: The capacity to

More information

How To Make Sense Of Data With Altilia

How To Make Sense Of Data With Altilia HOW TO MAKE SENSE OF BIG DATA TO BETTER DRIVE BUSINESS PROCESSES, IMPROVE DECISION-MAKING, AND SUCCESSFULLY COMPETE IN TODAY S MARKETS. ALTILIA turns Big Data into Smart Data and enables businesses to

More information

Agenda. Overview. Federation Requirements. Panlab IST034305 Teagle for Partners

Agenda. Overview. Federation Requirements. Panlab IST034305 Teagle for Partners Agenda Panlab IST034305 Teagle for Partners Sebastian Wahle, [email protected] Overview Testbed Federation Requirements Panlab Roles Federation Architecture Functional Components of Teagle

More information

COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES

COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES JULIA IGOREVNA LARIONOVA 1 ANNA NIKOLAEVNA TIKHOMIROVA 2 1, 2 The National Nuclear Research

More information

Maximization versus environmental compliance

Maximization versus environmental compliance Maximization versus environmental compliance Increase use of alternative fuels with no risk for quality and environment Reprint from World Cement March 2005 Dr. Eduardo Gallestey, ABB, Switzerland, discusses

More information

Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine

Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine 99 Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine Faculty of Computers and Information Menufiya University-Shabin

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT. March 2013 EXAMINERS REPORT. Knowledge Based Systems

BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT. March 2013 EXAMINERS REPORT. Knowledge Based Systems BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT March 2013 EXAMINERS REPORT Knowledge Based Systems Overall Comments Compared to last year, the pass rate is significantly

More information

Knowledge Management

Knowledge Management Knowledge Management Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents

More information

Chapter 20: Data Analysis

Chapter 20: Data Analysis Chapter 20: Data Analysis Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Chapter 20: Data Analysis Decision Support Systems Data Warehousing Data Mining Classification

More information

Engineering Process Software Qualities Software Architectural Design

Engineering Process Software Qualities Software Architectural Design Engineering Process We need to understand the steps that take us from an idea to a product. What do we do? In what order do we do it? How do we know when we re finished each step? Production process Typical

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

VoiceXML-Based Dialogue Systems

VoiceXML-Based Dialogue Systems VoiceXML-Based Dialogue Systems Pavel Cenek Laboratory of Speech and Dialogue Faculty of Informatics Masaryk University Brno Agenda Dialogue system (DS) VoiceXML Frame-based DS in general 2 Computer based

More information

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database

More information

RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch

RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch RUP Design RUP Artifacts and Deliverables RUP Purpose of Analysis & Design To transform the requirements into a design of the system to-be. To evolve a robust architecture for the system. To adapt the

More information

Chapter 6 Notes. Chemical Composition

Chapter 6 Notes. Chemical Composition Chapter 6 Notes Chemical Composition Section 6.1: Counting By Weighing We can weigh a large number of the objects and find the average mass. Once we know the average mass we can equate that to any number

More information

Logic gates. Chapter. 9.1 Logic gates. MIL symbols. Learning Summary. In this chapter you will learn about: Logic gates

Logic gates. Chapter. 9.1 Logic gates. MIL symbols. Learning Summary. In this chapter you will learn about: Logic gates Chapter 9 Logic gates Learning Summary In this chapter you will learn about: Logic gates Truth tables Logic circuits/networks In this chapter we will look at how logic gates are used and how truth tables

More information

Portfolio Risk Management. Module 8

Portfolio Risk Management. Module 8 Portfolio Risk Management Module 8 Rural Finance Module 8 Agenda Block 1 Introduction Risk analysis of agriculture and rural loan portfolio: the art of risk analysis Type of risks Portfolio risk management

More information

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012 Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about

More information

IF The customer should receive priority service THEN Call within 4 hours PCAI 16.4

IF The customer should receive priority service THEN Call within 4 hours PCAI 16.4 Back to Basics Backward Chaining: Expert System Fundamentals By Dustin Huntington Introduction Backward chaining is an incredibly powerful yet widely misunderstood concept, yet it is key to building many

More information

15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms

15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms 15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms Maxim Likhachev Robotics Institute Carnegie Mellon University AI Architecture from Artificial Intelligence for Games by

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful

More information

GOAL-BASED INTELLIGENT AGENTS

GOAL-BASED INTELLIGENT AGENTS International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798

More information

Bank Customers (Credit) Rating System Based On Expert System and ANN

Bank Customers (Credit) Rating System Based On Expert System and ANN Bank Customers (Credit) Rating System Based On Expert System and ANN Project Review Yingzhen Li Abstract The precise rating of customers has a decisive impact on loan business. We constructed the BP network,

More information

Semantic Variability Modeling for Multi-staged Service Composition

Semantic Variability Modeling for Multi-staged Service Composition Semantic Variability Modeling for Multi-staged Service Composition Bardia Mohabbati 1, Nima Kaviani 2, Dragan Gašević 3 1 Simon Fraser University, 2 University of British Columbia, 3 Athabasca University,

More information

EC 331: Research in Applied Economics

EC 331: Research in Applied Economics EC 331: Research in Applied Economics Terms 1 & 2: Thursday, 1-2pm, S2.133 Vera E. Troeger Office: S0.75 Email: [email protected] Office hours: Friday 9.30 11.30 am Principal Aims To give students

More information

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.

More information

SureSense Software Suite Overview

SureSense Software Suite Overview SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense

More information

Chapter 13: Knowledge Management In Nutshell. Information Technology For Management Turban, McLean, Wetherbe John Wiley & Sons, Inc.

Chapter 13: Knowledge Management In Nutshell. Information Technology For Management Turban, McLean, Wetherbe John Wiley & Sons, Inc. Chapter 13: Knowledge Management In Nutshell Information Technology For Management Turban, McLean, Wetherbe John Wiley & Sons, Inc. Objectives Define knowledge and describe the different types of knowledge.

More information

DATA MINING FOR THE MANAGEMENT OF SOFTWARE DEVELOPMENT PROCESS

DATA MINING FOR THE MANAGEMENT OF SOFTWARE DEVELOPMENT PROCESS International Journal of Software Engineering and Knowledge Engineering Vol. 0, No. 0 (1994) 000 000 c World Scientific Publishing Company DATA MINING FOR THE MANAGEMENT OF SOFTWARE DEVELOPMENT PROCESS

More information

Requirements Ontology and Multi representation Strategy for Database Schema Evolution 1

Requirements Ontology and Multi representation Strategy for Database Schema Evolution 1 Requirements Ontology and Multi representation Strategy for Database Schema Evolution 1 Hassina Bounif, Stefano Spaccapietra, Rachel Pottinger Database Laboratory, EPFL, School of Computer and Communication

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

Position Paper for Cognition and Collaboration Workshop: Analyzing Distributed Community Practices for Design

Position Paper for Cognition and Collaboration Workshop: Analyzing Distributed Community Practices for Design Position Paper for Cognition and Collaboration Workshop: Analyzing Distributed Community Practices for Design Jean Scholtz, Michelle Steves, and Emile Morse National Institute of Standards and Technology

More information

IAI : Knowledge Representation

IAI : Knowledge Representation IAI : Knowledge Representation John A. Bullinaria, 2005 1. What is Knowledge? 2. What is a Knowledge Representation? 3. Requirements of a Knowledge Representation 4. Practical Aspects of Good Representations

More information

School of Computer Science

School of Computer Science School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human

More information

A Capability Maturity Model (CMM)

A Capability Maturity Model (CMM) Software Development Life Cycle (SDLC) and Development Methods There are some enterprises in which a careful disorderliness is the true method. Herman Melville Capability Maturity Model (CMM) A Capability

More information

NON-PROBABILITY SAMPLING TECHNIQUES

NON-PROBABILITY SAMPLING TECHNIQUES NON-PROBABILITY SAMPLING TECHNIQUES PRESENTED BY Name: WINNIE MUGERA Reg No: L50/62004/2013 RESEARCH METHODS LDP 603 UNIVERSITY OF NAIROBI Date: APRIL 2013 SAMPLING Sampling is the use of a subset of the

More information

In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999

In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999 In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999 A Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka

More information

The SPES Methodology Modeling- and Analysis Techniques

The SPES Methodology Modeling- and Analysis Techniques The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München [email protected] Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT

More information

Molecular Formula Determination

Molecular Formula Determination Molecular Formula Determination Classical Approach Qualitative elemental analysis Quantitative elemental analysis Determination of empirical formula Molecular weight determination Molecular formula determination

More information

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet

More information

Jairson Vitorino. PhD Thesis, CIn-UFPE February 2009. Supervisor: Prof. Jacques Robin. Ontologies Reasoning Components Agents Simulations

Jairson Vitorino. PhD Thesis, CIn-UFPE February 2009. Supervisor: Prof. Jacques Robin. Ontologies Reasoning Components Agents Simulations CHROME: A Model-Driven Component- Based Rule Engine Jairson Vitorino PhD Thesis, CIn-UFPE February 2009 Supervisor: Prof. Jacques Robin Ontologies Reasoning Components Agents Simulations Contents 1. Context

More information

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,

More information

Data Validation with OWL Integrity Constraints

Data Validation with OWL Integrity Constraints Data Validation with OWL Integrity Constraints (Extended Abstract) Evren Sirin Clark & Parsia, LLC, Washington, DC, USA [email protected] Abstract. Data validation is an important part of data integration

More information

General syllabus for third-cycle courses and study programmes in

General syllabus for third-cycle courses and study programmes in ÖREBRO UNIVERSITY This is a translation of a Swedish document. In the event of a discrepancy, the Swedishlanguage version shall prevail. General syllabus for third-cycle courses and study programmes in

More information

Inferred ph in Steam Plant Water Chemistry Monitoring

Inferred ph in Steam Plant Water Chemistry Monitoring Application Data Sheet ADS 4900-87/rev.B January 2009 Power Industry Inferred ph in Steam Plant Water Chemistry Monitoring INTRODUCTION Inferred ph means ph calculated from straight and cation conductivity.

More information

Test Automation Framework

Test Automation Framework Test Automation Framework Rajesh Popli Manager (Quality), Nagarro Software Pvt. Ltd., Gurgaon, INDIA [email protected] ABSTRACT A framework is a hierarchical directory that encapsulates shared resources,

More information

A Detailed Price Discrimination Example

A Detailed Price Discrimination Example A Detailed Price Discrimination Example Suppose that there are two different types of customers for a monopolist s product. Customers of type 1 have demand curves as follows. These demand curves include

More information

Graduate Certificate in Systems Engineering

Graduate Certificate in Systems Engineering Graduate Certificate in Systems Engineering Systems Engineering is a multi-disciplinary field that aims at integrating the engineering and management functions in the development and creation of a product,

More information

Software Metrics. Lord Kelvin, a physicist. George Miller, a psychologist

Software Metrics. Lord Kelvin, a physicist. George Miller, a psychologist Software Metrics 1. Lord Kelvin, a physicist 2. George Miller, a psychologist Software Metrics Product vs. process Most metrics are indirect: No way to measure property directly or Final product does not

More information

IST639 Enterprise Technologies Course Syllabus Spring 2014

IST639 Enterprise Technologies Course Syllabus Spring 2014 Location: Hinds Hall 117 Wednesday Nights 5:15 PM to 8:05 PM Doug Taber 315-558-2359 [email protected] Office Hours: By Appointment Course Overview IST639 builds the basic understanding of the technical

More information

INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS

INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS R. Sarala 1, M.Kayalvizhi 2, G.Zayaraz 3 1 Associate Professor, Computer Science and Engineering, Pondicherry Engineering

More information

Extracted from Strategic Planning for Political Parties: A Practical Tool International Institute for Democracy and Electoral Assistance 2013.

Extracted from Strategic Planning for Political Parties: A Practical Tool International Institute for Democracy and Electoral Assistance 2013. Extracted from Strategic Planning for Political Parties: A Practical Tool International Institute for Democracy and Electoral Assistance 2013. International IDEA, Strömsborg, 103 34 Stockholm, Sweden Phone

More information