Semi-automated Exploration and Extraction of Data in Scientific TablesElsevier
Ron Daniel and Corey Harper of Elsevier Labs present at the Columbia University Data Science Institute: https://www.elsevier.com/connect/join-us-as-elsevier-data-scientists-present-at-columbia-university
In computer science, artificial intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and animals. - Wikipedia
Semi-automated Exploration and Extraction of Data in Scientific TablesElsevier
Ron Daniel and Corey Harper of Elsevier Labs present at the Columbia University Data Science Institute: https://www.elsevier.com/connect/join-us-as-elsevier-data-scientists-present-at-columbia-university
In computer science, artificial intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and animals. - Wikipedia
Rulelog is in process of industry standardization via RuleML and W3C:
RIF-Rulelog specification, version of of May 24, 2013, Michael Kifer, ed. RIF-Rulelog is a powerful dialect of W3C Rule Interchange Format (RIF) that is in draft as a submission from RuleML to W3C.
Several industry standards in the areas are based heavily on our team’s contributions to the authoring/editing of the specifications and conducting the underlying research and earlier-phase standards design. These include most notably the two most important industry standards on rules knowledge:
W3C Rule Interchange Format (RIF), which is primarily based on the RuleML standards design (semantic web rules)
W3C OWL 2 RL Profile (rule-based web ontologies)
The team has also contributed to the development of W3C SPARQL and ISO Common Logic, and been strongly involved in other related standardization efforts at OMG and Oasis.
A presentation on a special category of databases called Deductive Databases. It is an attempt to merge logic programming with relational database. Other types include Object-oriented databases, Graph databases, XML databases, Multi-model databases, etc.
Artificial Intelligence lecture notes. AI summarized notes for expert systems, inference mechanisms and so on, this is reading and may be for self-learning, I think.
Rulelog is in process of industry standardization via RuleML and W3C:
RIF-Rulelog specification, version of of May 24, 2013, Michael Kifer, ed. RIF-Rulelog is a powerful dialect of W3C Rule Interchange Format (RIF) that is in draft as a submission from RuleML to W3C.
Several industry standards in the areas are based heavily on our team’s contributions to the authoring/editing of the specifications and conducting the underlying research and earlier-phase standards design. These include most notably the two most important industry standards on rules knowledge:
W3C Rule Interchange Format (RIF), which is primarily based on the RuleML standards design (semantic web rules)
W3C OWL 2 RL Profile (rule-based web ontologies)
The team has also contributed to the development of W3C SPARQL and ISO Common Logic, and been strongly involved in other related standardization efforts at OMG and Oasis.
A presentation on a special category of databases called Deductive Databases. It is an attempt to merge logic programming with relational database. Other types include Object-oriented databases, Graph databases, XML databases, Multi-model databases, etc.
Artificial Intelligence lecture notes. AI summarized notes for expert systems, inference mechanisms and so on, this is reading and may be for self-learning, I think.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
2. Knowledge engineering (KE)
• KE is the process of building a knowledge base through
extracting the knowledge from the human expert.
• Knowledge engineering is the process of
–Extracting the knowledge from the human expert.
–Choose knowledge representation formalism
–Choose reasoning and problem solving strategy.
• A knowledge engineer is someone who investigates a
particular domain, determines what concepts are important in
that domain, and creates a formal representation of the
objects and relations in the domain.
–A KE has to decide what objects and relations are worth representing,
and which relations hold among which objects
Interview
human expert
Knowledge
acquisition
(Extract the
knowledge)
Knowledge
Representation
(choose KR Method &
reasoning strategy)
3. The two main tasks of KE
•Knowledge acquisition: The knowledge engineer
interview the real human experts to be educated
about the domain and to elicit the required
knowledge, in a process called knowledge acquisition
•Knowledge Representation techniques such as
logic are a powerful tool for KR and reasoning.
However, such techniques consists of only the
syntax, semantics and proof theory.
–KR techniques do not offer any guidance as to what facts
should be expressed, nor what vocabulary should be used to
express them
•Knowledge base is used to store facts and rules.
4. Database vs. knowledgebase
•Database is a collection of stored facts that needs to be
accessed. A DBMS is a system designed to manipulate and
maintain control of any database.
–DBMS are concerned with the storage, manipulation, and retrieval of data
facts available in the system in explicit form.
–Features: The information does not appear as natural language text but
is available instead in the form of specific data elements stored in tables.
•Knowledge base is a collection of rules and facts about domain
knowledge.
–knowledge base is simply a type of database. It differs from most
databases in that it contains rules about facts rather than just facts which
makes it an intelligent database. Knowledge-based systems are designed
that reason over extensive knowledge base. KBSs:
• have more intelligence
• initiate itself for learning
Example: while a database might be able to tell us whether an inventory
item has reached its reorder point, KB could help us decide what the
reorder point should be. Similarly, a database may tell us whether a
student has got ‘A’ this semester, but KB suggests alternative course of
action to be taken if the student's grade-point average is below a C
5. Properties of Good KB
• A KB should be clear, correct, expressive, concise, context-
insensitive and effective.
–The relations that matter should be defined, and the irrelevant details
should be suppressed
• Separate the KB from inference procedure.
–This allows the KE (creator of the KB) to focus on the content of the KB,
and not about how it will be used by the inference procedure
• Define a generally applicable KB.
–Every KB has two potential consumers: human readers and inference
procedure
–A common mistake is to choose predicate names that are meaningful to
the human readers, and then assume that the name is somehow
meaningful to the inference procedure as well
E.g. consider the sentence: BearOfVerySmallBrain(Lilly)
Will the Inference procedure be able to infer from this sentence:
Lilly is a bear or Lilly has a very small brain; that he has a
brain at all
–Such very long names do not scale up well
– In a properly designed KB, facts that were entered for one situation
should be used in new situations as well
6. Most general KB design
•In a good KB, BearOfVerySmallBrain(Lilly) would
be replaced by the following
–Lilly is a bear; bears are animals; animals are physical things
•Bear(Lilly)
•x bear(x) animal(x)
•y animal(y) physicalThing(y)
–Lilly has a very small brain
•relativeSize(BrainOf(Lilly), BrainOf(typicalBear)) = very(small)
–All animals have a brain, which is a part of the animal
•z animal(z) brain(brainOf(z))
•x partOf(brainOf(x),x)
–If something is part of a physical thing, then it is also a
physical thing
•x,y part-of(x,y) ^ physicalThing(y) physicalThing(x)
7. Expert Systems
•An expert system is a computer program that simulates the
reasoning of a human expert in a certain domain.
–Expert systems perform specific tasks almost as well as human experts
•The aim was to develop an expert systems that capture
specialist human expertise, so the system could be deployed
where experts were unavailable (or in short supply). Example,
–Medical expertise
–Computer configuration expertise.
–Oil exploration expertise.
•Provide access in a natural language setting.
–User questions may be received in natural language from, and system
responses may also be furnished as natural language form.
•The task of the expert system consists in (i) analyzing the user
query, (ii) comparing the analyzed query with the stored
knowledge (rules and facts), and (iii) assembling a suitable
response from the apparently relevant facts
8. But what is expertise?
• Much more than just facts..
• Includes
– knowledge of procedures, and when different procedures apply.
– strategies for finding solutions to problems.
– “Rules of thumb” based on experience, allowing experts to rapidly
home in on likely solutions.
– Knowledge of which unknown information we can easily find the
answer to.
• Hard to extract
Designing an expert system
• Only a fairly small range of problems are appropriate
– Cost of knowledge acquisition and cost of interaction with experts,
users and customers are bigger than benefit of expert system.
– No problems require physical skill
– No problems which require common-sense knowledge
• If simple methods will do, don’t use expert systems
10. Expert System Architecture
•Knowledge base: The system uses a KB containing facts, and rules
–Common approach is to have knowledge represented as if-then rules.
•Inference Engine: carries out reasoning using its knowledge to
solve problems, generate new facts and make decisions
–Use Reasoning strategy such as forward or backward chaining.
•User Interface
–It is a way for an expert system to interact with users; such that users
query the system, supply information, receive advice, etc.
–It enables users to communicate with the system in natural language form.
•Explanation facilities
–We can ask the system “Why” it asks certain questions & “How” it arrived
at a certain conclusion.
–Assume we type “Why?” after the question of the alarm:
•SYSTEM: “I’m trying to prove that there has been a cold.
•Knowledge base editors and other instruments
–Methods for building and updating the KB. System building tools acquire,
encode, debug and learn knowledge within the KB
–Such tools include sensors, KB editors, debugger, compilers, …
11. Knowledge Representation
• Logic can be used for representing knowledge. But it lacked
some facilities:
– Packaging of data and procedures into KB
– Built-in inheritance
• There are other methods which are less general, but more
natural, and arguably easier to work with:
– Semantic Nets
– Frames
– Production rules
• To some extent modern OOP has superceded the first two,
with the ability to represent knowledge in the object structures
of your programming language.
• Semantic nets and frames allow you to define relations
between objects, including class relations (X is-a Y).
• Only restricted inference supported by the methods –
basically based on inheritance.
Example: Fido is a dog, dogs have 4 legs, so Fido has 4 legs.
12. Semantic networks (SNs)
•SNs capture knowledge as association of concepts in a
hierarchical manner.
•Basic Components
–Nodes: Each node in SN represents objects, concepts, or situations.
Nodes can be instances (individual objects) or classes (generic nodes)
–Edge: Each edge represent relationships: the relationships contain the
structural information of the knowledge to be represented. without
relationships, knowledge is an unrelated collection of facts. This allows
the generation of meaningful new knowledge through reasoning, i.e.
generation of new facts and new relationships
•Relations used: IS A, IS PART OF, CAUSE OF, MEASURES, CO-OCCURS,…
–Labels for nodes and arcs: the label indicates the type of relationship.
age
Girma 5
Hirut
age
mother
mother(Hirut, Girma)
age(Girma,5)
wife(Hirut,Peter)
age(Peter,34)
...
34
father
Peter
age
Knowledge is
represented as a
network or
directed graph.
13. Example
•A semantic network is a simple representation scheme that
uses a graph of labeled nodes and labeled, directed arcs to
encode knowledge.
Example:
A bird is a kind of animal
Flying is the normal moving method of birds
An albatross is a bird
Albert is an albatross, and so is Ross
Directionality:
the direction of
the arrows
matters
14. Non - Unary Predicates
• A predicate can specify the relationship between 2 objects (or
groups of objects), for example, in the sentence:
weight(John, 180) weight(Bill, 100) Greater(John,Bill)
• Changing predicates symbols (like weight) into object
constants is called reification.
– We can always go back to reification (converting predicates to objects)
– Some arcs define new entities, some relate existing entities.
– We can create new nodes to support relationships between the
attributes of 2 entities.
John
180
value
W1 W2
Bill
weight
weight
greater-than
15. Another Example
• Build a semantic net that represents the following
knowledge:
Man(Marcus)
Married(Marcus, Madonna)
GaveTo(Madonna, Marcus, Measles)
Madonna
Measles G17
Marcus
Man
instance married
getter
giver
Thing given
16. Inferences with Semantic Nets
CAN-FLY
BIRD
property
YELLOW
CANARY
colour
is-A
SYLVESTER
TWEETY
owns
is-A
TWEETY is YELLOW
CAN-FLY (CANARY )
CAN-FLY (TWEETY)
SYLVESTER owns a CANARY
SYLVESTER owns a BIRD
SYLVESTER owns Something
that can fly
•Facts can be either explicitly stated in the SN or inherited.
•Semantic networks differ in how they handle the case of
inheriting multiple different values.
•Semantic networks are typically used with a special set of
accessing procedures which perform “reasoning”
• A typical built-in principle of inference is inheritance of values and
relationships
Example: Birds fly
An albatross is a bird
Therefore: Is albatrosses fly ?
17. Inference more example
•BUT: Meaning of SNs was not always well defined.
–Are all Elephants large, or just typical elephants?
–Do all Elephants live in the “same” Africa?
–Do all animals have the same head?
•For machine processing these things must be defined clearly.
Animal
Reptile
Elephant
Nellie
Mammal
apples
large
head
is-a is-a
has-part
is-a
is-a
likes
size
Africa
livesin
By traversing
network we can
find that :
• Nellie has a head
(by inheritance)
• certain concepts
related in certain
ways (e.g., apples
and elephants).
18. Frame system
•Frames provide a method of combining declarations and
procedures within KR environment.
•Frames are a way of organizing as well as packaging
knowledge
–Frames are organized into hierarchies or networks to ease inheritance of
information
–Frames package both data and procedures into knowledge structures
•A frame is a lot like the notion of an object in OOP
–Frames can be used to implement much of the functionality of objects.
Knowledge is represented by a set of objects, their attributes, and
relationships between objects.
–A frame system is a collection of objects. Each object contains a number of
slots. A slot represents an attribute or a relation to another frame (or value).
–The essential feature of a frame is containing slots that can be filled with
values.
•The structure of frames consists of:
–The frame name: provides label
–The parents of the frame
–Frame slot: slot name (a unique name for each slot) and slot value
•Since slots are local to frames, different frames may have the same slot name
19. Inference Processes in Frames
•Frames are organized using
hierarchy or network
–allows the use of inheritance: each
element at a lower level inheriting
the properties of the elements at a
higher level
–a frame inherits the properties of its
parents. Given an object that
contains an Instance of subclass
slot:-
•The properties of the objects of the
named parent class are inherited.
•Each frame inherit all slots of all its
ancestors
Example: John inherits the value male
(sex) from its parent Man
Frame: person
Parent: thing
Slot: Age value:
Slot: sex value:
Frame: man
Parent: Person
Slot: sex value: male
Frame: woman
Parent: Person
Slot: sex value: Female
Frame: John
Parent: Man
Slot: Age value: 25
20. More Example on Inference
Frame: Car
Parent: Vehicle
Slot: Engine Type value: Gas-Powered
Frame: Ford
Parent: Car
Slot: Wheels value: 4
Frame: Auto
Parent: Car
Slot: Wheels value: 3
Frame: Mustang
Parent: Ford
Slot: Price value: 15000
Query:
X = (Engine Type of Ford) ?
X = (Wheels of Mustang) ?
X = (Engine Type of Mustang) ?
21. Multiple Inheritance
• Each frame may have more than one parent as a result of
which a frame may inherit slots, and related values from
multiple parents.
• The main question is:-
–What happened if two parents include the same slot name ?
–The issue of which parent should be inherited first is decided by the
designer of the system: select the first slot found or ignore incase of
multiple inheritance happen
Exceptions
• For instance, all birds fly
–But there are a number of species of birds that do not fly
• Frames provide exception handling by allowing redefinition of
the value of an inherited slot
Frame: Bird
Parent: Living Creature
Slot: Has wings value: yes
Slot: Flies value: yes
Frame: Penguin
Parent: Bird
Slot: Flies value: no
22. Rule-Based Systems (Production rules)
•Frequently used to formulate the knowledge in expert systems
•In Logic (and frames) we represent knowledge in a
declarative, static way, as some facts and rules that are true.
–Rules in logic say what is TRUE given some conditions
•Knowledge is represented in rule based systems as a series
of If - then rules:
IF premise P THEN conclusion C
IF condition S THEN action A
IF proposition p1 and proposition p2 are true THEN proposition p3 is true
Rule-based System Architecture
E.g. Fire
Condition-Action Rules
R1: IF hot AND smoky THEN ADD fire
R2: IF alarm_beeps THEN ADD smoky
R3: IF fire THEN ADD switchOnCooler
Facts
alarm_beeps
hot
Inference Mechanism (Reasoning)
23. Reasoning with Rule based systems
•Rule-based systems provide way of reasoning on
knowledge based on if-then rules.
Two Basic Ways of Reasoning/Inference:
•Backward chaining (goal-driven inference): starts with the
goal, and looks for rules that will help in answering it.
Reason from the then-part to the if-part
1. Start with a hypothesis
2. Reason backwards, according to the rules in the KB
•Forward chaining (data-driven inference): starts with the
facts, and sees what rules apply (and hence what should be
done).
Reason from the if-part to the then-part
1. Start with some confirmed findings (rules and facts)
2.Reason forwards and infer the conclusion
24. Forward chaining Example
Algorithm:
–Repeat Until no rules can fire, or “halt” symbol added to working memory
•Find all rules which have satisfied conditions given facts in working memory.
•Choose one, using conflict resolution strategies.
•Perform actions in conclusion, probably modifying working memory.
Example: “fire” from earlier:
–Working memory initially contains: alarm_beeps, hot
•Following the algorithm: First cycle:
–Find all rules with satisfied conditions: R2
–Choose one (R2), and Perform actions: ADD smoky.
–Working memory now contains: alarm_beeps, hot, smoky
•Next cycle:
–Find all rules with conditions satisfied: R1
–Choose one and apply action: ADD fire
–Working memory now contains alarm_beeps, hot, smoky, fire.
•Then:
–Rules with conditions satisfied: R3
–apply action: ADD switchOnCooler
25. Backward Chaining Example
Basic algorithm: (Start with possible hypothesis)
•To prove goal G:
–If G is in the initial facts, it is proven.
–Otherwise, find a rule which can be used to conclude G, and try to prove
each of that rule’s conditions.
Example: Should we switch on the cooler? Set as a goal.
•G1: switchOnCooler
–Is it in initial facts? No.
–Is there a rule which adds this as a conclusion? Yes, R3
–Set condition of R3 as new goal to prove: G2: fire
•G2: fire.
–Is it in initial facts? No.
–Is there Rule? Yes, R1
–Set conditions as new goals: G3: hot, G4: smoky.
•G3: hot. In initial facts.
•G4: smoky. Conclusion of rule
•G5: alarm_beeps. In initial facts, so all done
Proved hypothesis switchOnCooler
26. Example
Conclude that ‘A fire hazard is present’ from the given KB
Fine cutlery contains silver
Radiator coolant contains Ethylene-Glycol
Silver interacts with Ethylene-Glycol
Fine cutlery comes in contact with Radiator coolant
R1: If ‘x’ contains ‘A’ and ‘y’ contains ‘B’ and ‘A’ interacts with ‘B’
Then ‘x’,’y’ are a flammable mixture
R2: If ‘x’,’y’ are a flammable mixture and ‘x’ comes in contact with ‘y’
Then A fire hazard is present
27. Example
Suppose that we have the following facts and rules. Use either
backward or forward chaining that suits: (i) to update facts
and (ii) to conclude “Investor invests in Silver”
Facts:
Broker-A recommends Gold
Broker-B recommends Silver
Broker-B recommends Gold
Gold is overpriced
Silver is undervalued
R1: Investor invests in ‘x’
If Broker-A recommends ‘x’
and Broker-B recommends ‘x’
and not ‘x’ is overpriced
R2: Investor invests in ‘x’
If Broker-A recommends ‘x’
and not ‘x’ is undervalued
28. Expert Systems Applications
MYCIN : The MYCIN system was designed for diagnosis and therapy
recommendation for infectious diseases.
– It is an early and simple system which used a backward chaining rule-based
system is MYCIN.
– Helped physicians diagnose bacterial infections.
The medical knowledge is represented as a set of production rules.
For example
IF: The infection is primary-bacteremia
The site of the culture is one of the sterile sites
The suspected portal of entry of the organism is the gastrointestinal tract
THEN there is a suggestive evidence (0.7) that the identity of the organism is
bacteroides.
When trying to prove a goal through backward chaining, system could ask
user certain things. This results in following style of dialogue:
• MYCIN: Has the patient had neurosurgery?
USER: No.
MYCIN: Is the patient a burn patient?
USER: No
• MYCIN: It could be Diplococcus..
29. • PROSPECTOR system has been developed to
assist geologists in mineral exploration.
– It matches given data against internal models describing
important types of ore deposits.
– Like MYCIN, it can reason with uncertain and incomplete
data. It is capable of explaining its reasoning processes.
– The geological knowledge is represented in semantic
networks. New knowledge is acquired through the KAS
knowledge acquisition system.
• MACSYMA: The MACSYMA system has been
designed for solving mathematical problems.
– For example integration, differentiation, solution of
equations and systems of equations, vector algebra and
matrix operations.
Expert Systems Applications