Improving Knowledge-Based System Performance by Reordering Rule Sequences
|
|
|
- Alexina Casey
- 9 years ago
- Views:
Transcription
1 Improving Knowledge-Based System Performance by Reordering Rule Sequences Neli P. Zlatareva Department of Computer Science Central Connecticut State University 1615 Stanley Street New Britain, CT Abstract In this paper, we argue that KBS validation should not be limited to testing functional properties of the system, such as its input - output behavior, but must also address its dynamic properties, such as its run-time performance. We describe an automated procedure, which under certain limitations can recognize relations between rules, typically expressed as meta-rules or control heuristics and hardwired in the KBS s control strategy. The presented procedure takes as an input the operational version of the knowledge base theory generated by a CTMS-based verification tool, and returns a reordered set of rules which when applied to a specific problem generates possible solutions of that problem in order according to a specified criterion, for example the length of the path leading to the solution. We show an example to illustrate the proposed procedure. Introduction Knowledge-Based System (KBS) validation aims to evaluate and improve system performance. The two most important performance measures are predictive accuracy and run-time efficiency. Predictive accuracy is typically defined by running test cases with known solutions once the system is proved to be structurally correct. A KBS is considered valid if it correctly solves all test cases, and there is evidence that it will Copyright 2001, American Association for Artificial Intelligence ( All rights reserved. correctly solve any other case presented to the system. Being valid is a required property of a KBS; however, it is rarely a sufficient one (except in small toy domains). In most cases, KBSs encounter intractable computational tasks where a run-time efficiency is essential for system acceptability. In such applications, another dimension must be added to the V&V process, namely assuring the maximum efficiency of the computation process. This aspect of KBS validation has not been sufficiently studied yet, in part because it was believed that a run-time efficiency is a property of the control strategy that utilizes domaindependent knowledge to guide the reasoning process [Fenzel & Straatman, 1998]. Examples of such knowledge include the order in which observations are obtained during the diagnostic process, the order in which components are configured during the design process, etc. Acquiring control knowledge from domain experts, however, is the most difficult component of the knowledge acquisition process. It is unrealistic to expect that experts can generalize case-dependent heuristics or define the certainty value of a single rule in isolation. This is why it is essential to equip the validation tool with an automated procedure, which can recognize problem-dependent relations between rules and reorder rule sequences according to these relations so that to guarantee the maximum efficiency of the computation process.
2 In this paper, we present a method for rule reordering, which can be easily performed as part of the validation process. Similar idea is discussed in [Terano & Kobayashi, 1995], where a method based on a genetic algorithm is proposed to improve system performance by changing certainty values associated with the rules. These changes require test cases, which are used as oracles in the refinement process. Our method does not require test cases, although it assumes that the system has undergone structural and functional testing, and all detected anomalies have been removed from the knowledge base. We first discuss the motivation for this research and related work, and then outline the basic algorithm for computing and reordering rule sequences. An example is included to illustrate the proposed method. We conclude with some preliminary results and discuss our plans for future work. Problem definition, motivation and practical justification As stated in [Groot, ten Teije & van Harmelen, 1999], there are two separate although related tasks in KBS validation: 1. Validation of functional properties, which is concerned with the input output behavior of the system. 2. Validation of dynamic properties, which is concerned with the computation process itself. Functional validation deals with how the solution is computed, while dynamic validation deals with what counts as a solution. The authors suggest that dynamic validation is a refinement of functional validation, because two systems with the same dynamic properties have necessarily the same input output behavior, whereas two implementations with the same input output behavior may have different computational models. To illustrate the difference between functional and dynamic properties of a KBS, consider a medical application where the goal of the KBS is to find the best way to prove a certain diagnosis relative to a specific environment. Because the environment can be different, the system is expected to contain alternative computational models and apply them selectively. The extended example presented below can be interpreted as a representation of a relation between an observation, S, intermediate tests A through I, some of which are mutually exclusive, and the final diagnosis, F. There are four possible ways to compute F. The shortest solution, which in many cases may be the preferred one, utilizes R8, R11, and R12. In some cases, however, some tests (I, for example) may not be available or possible, which is why the KBS must identify R1 R7 R9 R10 as an alternative path to the goal. Functional validation is intended to show that the system satisfies the input output specification (i.e. given S, F can be proved), while dynamic validation evaluates the computation process itself and recognizes R8 R11 R12 as the shortest solution of the stated problem. Recognizing the two sides of the validation process is essential for developing tools intended to improve the dynamic properties of a KBS. Run-time efficiency is the most important dynamic property, which depends on the order in which rules fire in the problem-solving process. This order, in turn, is dependent on many factors: the chaining method, the conflict resolution strategy, whether or not a non-monotonicity is incorporated into the knowledge model, etc. (see [Boswell & Craw, 1999] for discussion and examples on how these factors influence the problem-solving process and can be accounted for in knowledge refinement). Under certain limitations, however, forward and backward chaining methods produce exactly the same results. In such cases, the only difference in the
3 generated outcome comes from the way the goal of a KBS is defined, i.e. whether the system is expected to generate the shortest, the first, or all solutions to the presented problem. In many applications, the user is interested not only in the shortest solution, but also in the time in which this solution is reached and the resources needed for its implementation. In both cases, the system is expected to find the most efficient solution (i.e. the solution with the minimum number of the rules fired in the computation process), and upon request offer alternative solutions in decreasing order of their desirability. We discuss next how the system s dynamic behavior can be evaluated and refined as part of the validation process. Computation and reordering of rule sequences One of the advantages of a production rules model is that rules can be entered in the knowledge base as they arrive, because their order is irrelevant to the predictive accuracy of the KBS. This may considerably ease the knowledge acquisition process, but even for small-scale applications may lead to an intractable problem-solving process. If there exist problem-dependent relations between rules (control knowledge), instead of relying on domain experts to formulate and formalize such relations in a form of control rules (thus complicating not only the knowledge acquisition process, but also the control strategy), the validation tool may automatically recognize such relations and suggest changes in rule order to improve the run-time performance of the KBS. Because this process is viewed as part of the validation framework, the system must have undergone structural and functional testing beforehand. For that purpose, we use a CTMSbased tool, the VVR system [Zlatareva, 1994]. One advantage of the CTMS-based tool is that all potential solutions are explicated during structural verification, and can be used as an input for the proposed dynamic validation procedure. The desired output of that procedure is a reordered set of rules, which generates the solutions of a presented problem in the order of their desirability (according to a specified criterion, for example the length of a rule sequence). This is exactly the opposite of what the so-called anytime algorithms [Russell & Zilberstain, 1991] aim to achieve. Any-time algorithms gradually approach the perfect solution; the more time the algorithm has, the more are its chances to find it. Our intension is to make it possible for a KBS to identify the best with respect to the existing context solution early in the computation process by recognizing and implementing problem-dependent relations between rules, which guide the computation process towards it. The proposed dynamic validation procedure utilizes the following algorithm. The input is an operational theory produced by a CTMS-based verification tool, the initial rule set and a specific problem for which the input output specification is provided, and the output is a reordered rule set which embodies an implicit control forcing the KBS s inference engine to generate problem solutions in order according to their length. We assume that KBS inference method is forward or backward chaining, and no explicit control strategy forces rules to fire outof-order (i.e. rules that come first, fire first). 1. Using the operational theory produced by a CTMS-based verification tool, identify all potential solutions of a given problem. A solution is a rule chain leading from initial facts to a specified final hypothesis. 2. Sort rules into levels corresponding to the steps of the operationalization process at which a given rule was applied (see the example below). 3. Identify alternative paths to intermediate and final hypotheses and compute their length counting the number of rules in each path.
4 4. For each alternative path starting with the shortest one, move the end-rule after all lower-level rules. We illustrate this algorithm on an example presented next. Example Consider the following set of rules. Let S be the input, and F be the final hypothesis. R1: S A R2: S B R3: B H R4: H E R5: A E R6: E I R7: A D R8: S C R9: D J R10: J F R11: C I R12: I F Forward chaining and backward chaining, both, generate the same solution: R1, R7, R9, R10, and R10, R9, R7, R1, respectively. A shorter path to the final hypothesis, F, however, is R8, R11, R12. To get this shorter solution, rules must be reordered as described in the previous section. 1. Identification of alternative solutions. Intermediate results of the operationalization process produced by a CTMS-based verification tool are given below. It is easy to see that there are alternative paths to intermediate hypotheses E and I, and to the final hypothesis, F, respectively. Step 1 A: (S, R1) B: (S, R2) C: (S, R8) Step 2 H: (B, R3) E: (A, R5) D: (A, R7) I: (C, R11) Step 3 E: (H, R4) I: (E, R6) J: (D, R9) F: (I, R12) Step 4 F: (J, R10) 2. Sorting rules into levels according to the step at which each rule was applied in the operationalization process. Level 1: R1, R2, R8 Level 2: R3, R5, R7, R11 Level 3: R4, R6, R9, R12 Level 4: R10 3 & 4. Identification of alternative paths. For each alternative path starting with the shortest one, move the end-rule after all lower level rules. Alternative paths to E: o P1: S R1 A R5 E o P2: S R2 B R3 H R4 E To find the shortest path to E, the inference engine must fire R5 before R3. R5 however must follow R2, because R2 is a lower-level rule. Alternative paths to I: o P1: S R1 A R5 E R6 o P2: S! R2 " B # R3 $ H % R4 & E ' R6 ( I o P3: S ) R8 * C + R11, I Because the length of the path, P3, is less then the length of P1, R11 must be moved before R5 to ensure that P3 is generated first. Alternative paths to F: o P1: S - R1. A / R5 0 E 1 R6 2 I 3 R12 4 F I
5 D o P2: S 5 R2 6 B 7 R3 8 H 9 R4 : E ; R6 < I = R12 > F o P3: S? C A R11 B I C R12 F o P4: S E R1 F A G R7 H D I R9 J J K R10 L F Here the length of P3 is less than the length of P4. Therefore, R12 must fire before R9, but after R7, because R7 is a lower-lever rule. After introducing all changes, the reordered rule sequence becomes: R1, R2, R8, R11, R5, R3, R7, R12, R4, R6, R9, R10. Now the shortest solution, R8 M R11 N R12, will be generated first in just one pass through the rule set. If alternative solutions are requested, R1 O R7 P R9 Q R10 will be generated next also in just one pass. The other two solutions, R1 R R5 S R6 T R12 and R2 U R3 V R4 W R6 X R12, require two passes through the rule set and will be generated last. Conclusion We have argued in this paper that KBS validation should not be limited to assuring functional properties of the system, such as its input - output behavior, but must also address its dynamic properties, such as its run-time performance. We have shown that under certain limitations, an automated procedure can recognize relations between rules, which are typically expressed as meta-rules or control heuristics and hardwired in the KBS s control strategy. One advantage of having such a procedure in place is that the knowledge acquisition process will be simplified, because acquiring control knowledge from domain experts is the most subjective and difficult task. At present, the proposed procedure was applied to small examples, but we believe that it will be of practical interest for real-world applications. More work remains to be done to see to what extend dynamic validation can substitute for traditional methods for acquiring control knowledge. References Craw, S.; Boswell, R Representing Problem Solving for Knowledge Refinement. In Proceedings of the 16-th National Conference on Artificial Intelligence (AAAI 99), AAAI Press. Fenzel, D.; Straatman, R The Essence of Problem-Solving Methods: Making Assumptions for Gaining Efficiency. International Journal of Human-Computer Studies, 48(2), pages Groot P.; ten Teije A.; van Harmelen, A Formally Verifying Dynamic Properties of Knowledge Based Systems. In Proceedings of the 11-th European Workshop on Knowledge Acquisition, Modeling and Management (EKAW 99). Lecture Notes in AI, Springer Verlag. Russell, S.; Zilberstain, S Composing Real-Time Systems. In Proceedings of the 12-th International Joint Conferences on Artificial Intelligence (IJCAI 91), Boston, pages Terano, T; Kobayashi. K Changing the Traces: Refining a Rule Base by Genetic Algorithm. In Proceedings of the IJCAI 95 Workshop on Validation and Verification of Knowledge-Based Systems. Montreal, Canada. Zlatareva, N A Framework for Verification, Validation and Refinement of Knowledge Bases: the VVR System. International Journal of Intelligent Systems, 9(8), pages
Topic 2: Structure of Knowledge-Based Systems
Engineering (Ingeniería del Conocimiento) Escuela Politécnica Superior, UAM Course 2007-2008 Topic 2: Structure of -Based Systems Contents 2.1 Components according to the Final User 2.2 Components according
IAI : Expert Systems
IAI : Expert Systems John A. Bullinaria, 2005 1. What is an Expert System? 2. The Architecture of Expert Systems 3. Knowledge Acquisition 4. Representing the Knowledge 5. The Inference Engine 6. The Rete-Algorithm
KNOWLEDGE FACTORING USING NORMALIZATION THEORY
KNOWLEDGE FACTORING USING NORMALIZATION THEORY J. VANTHIENEN M. SNOECK Katholieke Universiteit Leuven Department of Applied Economic Sciences Dekenstraat 2, 3000 Leuven (Belgium) tel. (+32) 16 28 58 09
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
MONITORING AND DIAGNOSIS OF A MULTI-STAGE MANUFACTURING PROCESS USING BAYESIAN NETWORKS
MONITORING AND DIAGNOSIS OF A MULTI-STAGE MANUFACTURING PROCESS USING BAYESIAN NETWORKS Eric Wolbrecht Bruce D Ambrosio Bob Paasch Oregon State University, Corvallis, OR Doug Kirby Hewlett Packard, Corvallis,
Chapter 11. Managing Knowledge
Chapter 11 Managing Knowledge VIDEO CASES Video Case 1: How IBM s Watson Became a Jeopardy Champion. Video Case 2: Tour: Alfresco: Open Source Document Management System Video Case 3: L'Oréal: Knowledge
A Scala DSL for Rete-based Runtime Verification
A Scala DSL for Rete-based Runtime Verification Klaus Havelund Jet Propulsion Laboratory California Institute of Technology, California, USA Abstract. Runtime verification (RV) consists in part of checking
High-Mix Low-Volume Flow Shop Manufacturing System Scheduling
Proceedings of the 14th IAC Symposium on Information Control Problems in Manufacturing, May 23-25, 2012 High-Mix Low-Volume low Shop Manufacturing System Scheduling Juraj Svancara, Zdenka Kralova Institute
Demonstrating WSMX: Least Cost Supply Management
Demonstrating WSMX: Least Cost Supply Management Eyal Oren 2, Alexander Wahler 1, Bernhard Schreder 1, Aleksandar Balaban 1, Michal Zaremba 2, and Maciej Zaremba 2 1 NIWA Web Solutions, Vienna, Austria
The Optimality of Naive Bayes
The Optimality of Naive Bayes Harry Zhang Faculty of Computer Science University of New Brunswick Fredericton, New Brunswick, Canada email: hzhang@unbca E3B 5A3 Abstract Naive Bayes is one of the most
VALENS: A Knowledge Based Tool to Validate and Verify an Aion Knowledge Base
VALENS: A Knowledge Based Tool to Validate and Verify an Aion Knowledge Base Silvie Spreeuwenberg, Rik Gerrits, Margherita Boekenoogen * Abstract. We present VALENS (VALid Engineering Support) for the
Chapter Managing Knowledge in the Digital Firm
Chapter Managing Knowledge in the Digital Firm Essay Questions: 1. What is knowledge management? Briefly outline the knowledge management chain. 2. Identify the three major types of knowledge management
Course Description Bachelor in Management Information Systems
Course Description Bachelor in Management Information Systems 1605215 Principles of Management Information Systems (3 credit hours) Introducing the essentials of Management Information Systems (MIS), providing
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
A Knowledge Based System towards Identifying Problems and Getting Instant Solutions about Our Personal Vehicles
Volume 2, No.2, March - April 2013 Shah Murtaza Rashid Al Masud, International Journal of Advanced Trends in Computer Science and Engineering, 2(2), March April 2013, 15-20 International Journal of Advanced
Expert Systems : AI Course Lecture 35 36, notes, slides www.myreaders.info/, RC Chakraborty, e-mail rcchak@gmail.
Expert Systems : AI Course Lecture 35 36, notes, slides www.myreaders.info/, RC Chakraborty, e-mail [email protected], June 01, 2010 www.myreaders.info/html/artificial_intelligence.html www.myreaders.info
Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
Checking for Dimensional Correctness in Physics Equations
Checking for Dimensional Correctness in Physics Equations C.W. Liew Department of Computer Science Lafayette College [email protected] D.E. Smith Department of Computer Science Rutgers University [email protected]
Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach
Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University
HELPDESK EXPERT. Abstract
HELPDESK EXPERT Pradit Songsangyos Rajamangala University of Technology Suvarnabhumi Title Lecturer Postal Address 19 Ou-tong road, Pranakhon Si Ayutthaya 13000, Thailand E-mail: [email protected] Wararat
Introduction. Chapter 1
Chapter 1 Introduction The area of fault detection and diagnosis is one of the most important aspects in process engineering. This area has received considerable attention from industry and academia because
Overview of the TACITUS Project
Overview of the TACITUS Project Jerry R. Hobbs Artificial Intelligence Center SRI International 1 Aims of the Project The specific aim of the TACITUS project is to develop interpretation processes for
THE DEVELOPMENT OF AN EXPERT CAR FAILURE DIAGNOSIS SYSTEM WITH BAYESIAN APPROACH
Journal of Computer Science 9 (10): 1383-1388, 2013 ISSN: 1549-3636 2013 doi:10.3844/jcssp.2013.1383.1388 Published Online 9 (10) 2013 (http://www.thescipub.com/jcs.toc) THE DEVELOPMENT OF AN EXPERT CAR
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
Towards Rule-based System for the Assembly of 3D Bricks
Universal Journal of Communications and Network 3(4): 77-81, 2015 DOI: 10.13189/ujcn.2015.030401 http://www.hrpub.org Towards Rule-based System for the Assembly of 3D Bricks Sanguk Noh School of Computer
Factoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
OVERVIEW HIGHLIGHTS. Exsys Corvid Datasheet 1
Easy to build and implement knowledge automation systems bring interactive decision-making expertise to Web sites. Here s proven technology that provides customized, specific recommendations to prospects,
Developing an IT Help Desk Troubleshooter Expert System for diagnosing and solving IT Problems
Developing an IT Help Desk Troubleshooter Expert System for diagnosing and solving IT Problems Mostafa Al-Emran The British University in Dubai Dubai, UAE [email protected] Hani Al Chalabi The
Automated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
Knowledge-based systems and the need for learning
Knowledge-based systems and the need for learning The implementation of a knowledge-based system can be quite difficult. Furthermore, the process of reasoning with that knowledge can be quite slow. This
Activity Mining for Discovering Software Process Models
Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de
Software Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
Dimensioning an inbound call center using constraint programming
Dimensioning an inbound call center using constraint programming Cyril Canon 1,2, Jean-Charles Billaut 2, and Jean-Louis Bouquard 2 1 Vitalicom, 643 avenue du grain d or, 41350 Vineuil, France [email protected]
Case-Based Reasoning for General Electric Appliance Customer Support
Case-Based Reasoning for General Electric Appliance Customer Support William Cheetham General Electric Global Research, One Research Circle, Niskayuna, NY 12309 [email protected] (Deployed Application)
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
A Knowledge Base Representing Porter's Five Forces Model
A Knowledge Base Representing Porter's Five Forces Model Henk de Swaan Arons ([email protected]) Philip Waalewijn ([email protected]) Erasmus University Rotterdam PO Box 1738, 3000 DR Rotterdam,
Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine
Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine 99 Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine Faculty of Computers and Information Menufiya University-Shabin
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
Information Need Assessment in Information Retrieval
Information Need Assessment in Information Retrieval Beyond Lists and Queries Frank Wissbrock Department of Computer Science Paderborn University, Germany [email protected] Abstract. The goal of every information
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
Knowledge Representation (II)
Knowledge Representation (II) Martin Molina Department of Artificial Intelligence Technical University of Madrid Constraints Representation The knowledge base is a collection constraints. Each constraint
Computational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
8. KNOWLEDGE BASED SYSTEMS IN MANUFACTURING SIMULATION
- 1-8. KNOWLEDGE BASED SYSTEMS IN MANUFACTURING SIMULATION 8.1 Introduction 8.1.1 Summary introduction The first part of this section gives a brief overview of some of the different uses of expert systems
The Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net
Appl. Math. Inf. Sci. 6-3S, No. 3, 943-949 (2012) 943 Applied Mathematics & Information Sciences An International Journal The Analysis Method about Change Domain of Business Process Model Based on the
Introduction to Learning & Decision Trees
Artificial Intelligence: Representation and Problem Solving 5-38 April 0, 2007 Introduction to Learning & Decision Trees Learning and Decision Trees to learning What is learning? - more than just memorizing
Integration of an open source rule engine to enhance the IHTSDO Workbench testing
Integration of an open source rule engine to enhance the IHTSDO Workbench testing Dr. Guillermo Reynoso Dr. Alejandro Lopez Osornio termmed IT Buenos Aires, Argentina 2009 termmed SA Terminology maintenance
PROJECT MANAGEMENT PLAN CHECKLIST
PROJECT MANAGEMENT PLAN CHECKLIST The project management plan is a comprehensive document that defines each area of your project. The final document will contain all the required plans you need to manage,
Umbrella: A New Component-Based Software Development Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Umbrella: A New Component-Based Software Development Model Anurag Dixit and P.C.
Integrating Cognitive Models Based on Different Computational Methods
Integrating Cognitive Models Based on Different Computational Methods Nicholas L. Cassimatis ([email protected]) Rensselaer Polytechnic Institute Department of Cognitive Science 110 8 th Street Troy, NY 12180
CS 565 Business Process & Workflow Management Systems
CS 565 Business Process & Workflow Management Systems Professor & Researcher Department of Computer Science, University of Crete & ICS-FORTH E-mail: [email protected], [email protected] Office: K.307,
Mathematics Cognitive Domains Framework: TIMSS 2003 Developmental Project Fourth and Eighth Grades
Appendix A Mathematics Cognitive Domains Framework: TIMSS 2003 Developmental Project Fourth and Eighth Grades To respond correctly to TIMSS test items, students need to be familiar with the mathematics
On Intuitive Dialogue-based Communication and Instinctive Dialogue Initiative
On Intuitive Dialogue-based Communication and Instinctive Dialogue Initiative Daniel Sonntag German Research Center for Artificial Intelligence 66123 Saarbrücken, Germany [email protected] Introduction AI
Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities
Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Oscar Kipersztok Mathematics and Computing Technology Phantom Works, The Boeing Company P.O.Box 3707, MC: 7L-44 Seattle, WA 98124
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Software Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
STSG Methodologies and Support Structure
STSG Methodologies and Support Structure STSG Application Life Cycle Management STSG utilizes comprehensive lifecycle tools that are fully integrated and provide capabilities for most of the roles in its
A very short history of networking
A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the
Learning is a very general term denoting the way in which agents:
What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);
User Studies of an Interdependency-Based Interface for Acquiring Problem-Solving Knowledge
User Studies of an Interdependency-Based Interface for Acquiring Problem-Solving Knowledge Jihie Kim and Yolanda Gil USC/Information Sciences Institute 4676 Admiralty Way Marina del Rey, CA 99 {jihie,gil}@isi.edu
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
Rules and Business Rules
OCEB White Paper on Business Rules, Decisions, and PRR Version 1.1, December 2008 Paul Vincent, co-chair OMG PRR FTF TIBCO Software Abstract The Object Management Group s work on standards for business
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
Online Optimization and Personalization of Teaching Sequences
Online Optimization and Personalization of Teaching Sequences Benjamin Clément 1, Didier Roy 1, Manuel Lopes 1, Pierre-Yves Oudeyer 1 1 Flowers Lab Inria Bordeaux Sud-Ouest, Bordeaux 33400, France, [email protected]
Ontological Representations of Software Patterns
Ontological Representations of Software Patterns Jean-Marc Rosengard and Marian F. Ursu University of London http://w2.syronex.com/jmr/ Abstract. This paper 1 is based on and advocates the trend in software
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Compression algorithm for Bayesian network modeling of binary systems
Compression algorithm for Bayesian network modeling of binary systems I. Tien & A. Der Kiureghian University of California, Berkeley ABSTRACT: A Bayesian network (BN) is a useful tool for analyzing the
Improving Decision Making and Managing Knowledge
Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,
Conclusion and Future Directions
Chapter 9 Conclusion and Future Directions The success of e-commerce and e-business applications depends upon the trusted users. Masqueraders use their intelligence to challenge the security during transaction
VEHICLE ROUTING PROBLEM
VEHICLE ROUTING PROBLEM Readings: E&M 0 Topics: versus TSP Solution methods Decision support systems for Relationship between TSP and Vehicle routing problem () is similar to the Traveling salesman problem
Scheduling 101 CPM Basics. Phoenix Project Management Systems, LLC www.phoenixcpm.com
Scheduling 101 CPM Basics Phoenix Project Management Systems, LLC www.phoenixcpm.com Scheduling 101 CPM Basics Getting Started with CPM This guide is intended as an introduction to the Critical Path Method
Solving Three-objective Optimization Problems Using Evolutionary Dynamic Weighted Aggregation: Results and Analysis
Solving Three-objective Optimization Problems Using Evolutionary Dynamic Weighted Aggregation: Results and Analysis Abstract. In this paper, evolutionary dynamic weighted aggregation methods are generalized
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: [email protected] October 17, 2015 Outline
How to Find the Right Simulation Consultant A Practical Guide for Consumers of Simulation Services
How to Find the Right Simulation Consultant A Practical Guide for Consumers of Simulation Services ORMS Today April 1998 by Jerry Banks, Randall R. Gibson and Van B. Norman IN THE BOOK, "DANGEROUS COMPANY,"
