This document discusses different types of knowledge and methods for knowledge acquisition. It describes declarative and procedural knowledge, as well as the knowledge acquisition paradox where experts have difficulty verbalizing their knowledge. Various knowledge acquisition methods are outlined, including observation, problem discussion, and protocol analysis. Knowledge representation techniques like rules, semantic networks, frames, and predicate logic are also introduced.
Presentation on "Knowledge acquisition & validation"Aditya Sarkar
Presentation on "Knowledge acquisition and validation made and presented by Aditya Sarkar, I took the help of different sources available on internet to make all understand how a knowledge is acquired?. I hope this presentation will help everyone.
This presentation is an introduction to artificial intelligence: knowledge engineering. Topics covered are the following: knowledge engineering, requirements of expert systems (ES), functional requirements of ES, structural requirements of ES, components of ES/KBS, knowledge base, inference engine, working memory, expert system, explanation facility, user interface, will ES work for my problem.
Presentation on "Knowledge acquisition & validation"Aditya Sarkar
Presentation on "Knowledge acquisition and validation made and presented by Aditya Sarkar, I took the help of different sources available on internet to make all understand how a knowledge is acquired?. I hope this presentation will help everyone.
This presentation is an introduction to artificial intelligence: knowledge engineering. Topics covered are the following: knowledge engineering, requirements of expert systems (ES), functional requirements of ES, structural requirements of ES, components of ES/KBS, knowledge base, inference engine, working memory, expert system, explanation facility, user interface, will ES work for my problem.
Knowledge representation In Artificial IntelligenceRamla Sheikh
facts, information, and skills acquired through experience or education; the theoretical or practical understanding of a subject.
Knowledge = information + rules
EXAMPLE
Doctors, managers.
In the field of artificial intelligence (AI), planning refers to the process of developing a sequence of actions or steps that an intelligent agent should take to achieve a specific goal or solve a particular problem. AI planning is a fundamental component of many AI systems and has applications in various domains, including robotics, autonomous systems, scheduling, logistics, and more. Here are some key aspects of planning in AI:
Definition of Planning: Planning involves defining a problem, specifying the initial state, setting a goal state, and finding a sequence of actions or a plan that transforms the initial state into the desired goal state while adhering to certain constraints.
State-Space Representation: In AI planning, the problem is often represented as a state-space, where each state represents a snapshot of the system, and actions transform one state into another. The goal is to find a path through this state-space from the initial state to the goal state.
Search Algorithms: AI planning typically relies on search algorithms to explore the state-space efficiently. Uninformed search algorithms, such as depth-first search and breadth-first search, can be used, as well as informed search algorithms, like A* search, which incorporates heuristics to guide the search.
Heuristics: Heuristics are used in planning to estimate the cost or distance from a state to the goal. Heuristic functions help inform the search algorithms by providing an estimate of how close a state is to the solution. Good heuristics can significantly improve the efficiency of the search.
Plan Execution: Once a plan is generated, the next step is plan execution, where the agent carries out the actions in the plan to achieve the desired goal. This often requires monitoring the environment to ensure that the actions are executed as planned.
Temporal and Hierarchical Planning: In more complex scenarios, temporal planning deals with actions that have temporal constraints, and hierarchical planning involves creating plans at multiple levels of abstraction, making planning more manageable in complex domains.
Partial and Incremental Planning: Sometimes, it may not be necessary to create a complete plan from scratch. Partial and incremental planning allows agents to adapt and modify existing plans to respond to changing circumstances.
Applications: Planning is used in a wide range of applications, from manufacturing and logistics (e.g., scheduling production and delivery) to robotics (e.g., path planning for robots) and game playing (e.g., chess and video games).
Challenges: Challenges in AI planning include dealing with large search spaces, handling uncertainty, addressing resource constraints, and optimizing plans for efficiency and performance.
AI planning is a critical component in creating intelligent systems that can autonomously make decisions and solve complex problems.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
Knowledge representation In Artificial IntelligenceRamla Sheikh
facts, information, and skills acquired through experience or education; the theoretical or practical understanding of a subject.
Knowledge = information + rules
EXAMPLE
Doctors, managers.
In the field of artificial intelligence (AI), planning refers to the process of developing a sequence of actions or steps that an intelligent agent should take to achieve a specific goal or solve a particular problem. AI planning is a fundamental component of many AI systems and has applications in various domains, including robotics, autonomous systems, scheduling, logistics, and more. Here are some key aspects of planning in AI:
Definition of Planning: Planning involves defining a problem, specifying the initial state, setting a goal state, and finding a sequence of actions or a plan that transforms the initial state into the desired goal state while adhering to certain constraints.
State-Space Representation: In AI planning, the problem is often represented as a state-space, where each state represents a snapshot of the system, and actions transform one state into another. The goal is to find a path through this state-space from the initial state to the goal state.
Search Algorithms: AI planning typically relies on search algorithms to explore the state-space efficiently. Uninformed search algorithms, such as depth-first search and breadth-first search, can be used, as well as informed search algorithms, like A* search, which incorporates heuristics to guide the search.
Heuristics: Heuristics are used in planning to estimate the cost or distance from a state to the goal. Heuristic functions help inform the search algorithms by providing an estimate of how close a state is to the solution. Good heuristics can significantly improve the efficiency of the search.
Plan Execution: Once a plan is generated, the next step is plan execution, where the agent carries out the actions in the plan to achieve the desired goal. This often requires monitoring the environment to ensure that the actions are executed as planned.
Temporal and Hierarchical Planning: In more complex scenarios, temporal planning deals with actions that have temporal constraints, and hierarchical planning involves creating plans at multiple levels of abstraction, making planning more manageable in complex domains.
Partial and Incremental Planning: Sometimes, it may not be necessary to create a complete plan from scratch. Partial and incremental planning allows agents to adapt and modify existing plans to respond to changing circumstances.
Applications: Planning is used in a wide range of applications, from manufacturing and logistics (e.g., scheduling production and delivery) to robotics (e.g., path planning for robots) and game playing (e.g., chess and video games).
Challenges: Challenges in AI planning include dealing with large search spaces, handling uncertainty, addressing resource constraints, and optimizing plans for efficiency and performance.
AI planning is a critical component in creating intelligent systems that can autonomously make decisions and solve complex problems.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
Lec 3 knowledge acquisition representation and inferenceEyob Sisay
Artificial Intelligence lecture notes. AI summarized notes for knowledge reasoning and knowledge representation, its for you in order for reading and may be for self-learning, I think.
The rise of NoSQL is characterized with confusion and ambiguity; very much like any fast-emerging organic movement in the absence of well-defined standards and adequate software solutions. Whether you are a developer or an architect, many questions come to mind when faced with the decision of where your data should be stored and how it should be managed. The following are some of these questions: What does the rise of all these NoSQL technologies mean to my enterprise? What is NoSQL to begin with? Does it mean "No SQL"? Could this be just another fad? Is it a good idea to bet the future of my enterprise on these new exotic technologies and simply abandon proven mature Relational DataBase Management Systems (RDBMS)? How scalable is scalable? Assuming that I am sold, how do I choose the one that fit my needs best? Is there a middle ground somewhere? What is this Polyglot Persistence I hear about? The answers to these questions and many more is the subject of this talk along with a survey of the most popular of NoSQL technologies. Be there or be square.
Deep Learning: Towards General Artificial IntelligenceRukshan Batuwita
For the past several years Deep Learning methods have revolutionized the areas in Pattern Recognition, namely, Computer Vision, Speech Recognition, Natural Language Processing etc. These techniques have been mainly developed by academics, closely working with tech giants such as Google, Microsoft and Facebook where the research outcomes have been successfully integrated into commercial products such as Google image and voice search, Google Translate, Microsoft Cortana, Facebook M and many more interesting applications that are yet to come. More recently, Google DeepMind Technologies has been working on Artificial General Intelligence using Deep Reinforcement Learning methods, where their AlphaGo system beat the world champion of the complex Chinese game 'Go' in March 2016. This talk will present a thorough introduction to major Deep Learning techniques, recent breakthroughs and some exciting applications.
Machine learning (ML) and natural language processing (NLP)Nikola Milosevic
Short introduction on natural language processing (NLP) and machine learning (ML). Speaks about sub-areas of artificial inteligence and then mainly focuses on the sub-areas of machine learning and natural language processing. Explains the process of data mining from high perspective
A short presentation for beginners on Introduction of Machine Learning, What it is, how it works, what all are the popular Machine Learning techniques and learning models (supervised, unsupervised, semi-supervised, reinforcement learning) and how they works with various Industry use-cases and popular examples.
Artificial Intelligence: Artificial Neural NetworksThe Integral Worm
This presentation covers artificial neural networks for artificial intelligence. Topics covered are as follows: artificial neural networks, basic representation, hidden units, exclusive OR problem, backpropagation, advantages of artificial neural networks, properties of artificial neural networks, and disadvantages of artificial neural networks.
This presentation covers data mining within artificial intelligence. Topics covered are as follows: motivation, synonym, process of data mining, operation of data mining, data mining techniques, business application, application selection, and current issues.
This presentation covers agent technology for artificial intelligence. Topics covered are as follows: expert systems, overcoming expert systems limitations, agent, what is an agent, definition of an agent, agents versus expert systems, how is an agent different from other software, types of agents, deliberate versus reactive, interface versus information, mobile versus stationary, and why a mobile agent.
Artificial Intelligence: Case-based & Model-based ReasoningThe Integral Worm
This presentation covers case-based and model-based reasoning for artificial intelligence. Topics covered are as follows: case-based reasoning, case-based reasoning components; case base, retriever, adapter, refiner, executor, and evalutator; and model-based reasoning.
Artificial Intelligence: The Nine Phases of the Expert System Development Lif...The Integral Worm
This presentation is an introduction to Artificial Intelligence: The Nine Phases of the Expert System Development Lifecycle (ESDLC). Topics covered are the following: problem identification phase, feasibility study phase, project planning phase, knowledge acquisition phase, knowledge representation phase, knowledge implementation phase, verification and validation, installation/transition/ training, operation/evaluation/maintenance.
This presentation is an introduction to artificial intelligence: expert systems components. Topics covered are the following: defining artificial intelligence; expert systems key terms; expert systems requirements; expert systems components; and selecting appropriate problems for expert systems.
Best Practices for Effective Written CorrespondenceThe Integral Worm
This presentation discusses best practices for composing effective written correspondence. Topics discussed I this presentation are as follows: preparing correspondence; choosing technical level; level of technical expertise; elements of style; standard parts of a letter; structure of business letters, letter patterns--space pattern, changing perspective pattern; explanations, analyses, evaluations, personal disclosures, adjustments, causal pattern, proportional pattern; writing effective memos, language for correspondence, you attitude --reader awareness; memo format and parts; memo structure, memo--succeeding paragraphs, memo—conclusion, memo--good news/bad news; and effective email messages.
Ethical Considerations in Technical Writing and the WorkplaceThe Integral Worm
Description
This presentation outlines ethical issues in technical writing and the workplace. The subject matter covered is as follows:
* The levels of response to persuasion
* Three strategies for connectivity with an audience
* Every writing situation poses its own constraints
* Workplace pressures can influence ethical values
* Groupthink can be a handy hiding place
* Some legal lies in the workplace
* Reasonable criteria for ethical judgement
* An ethical checklist for communicators
Best Practices for Creating Definitions in Technical Writing and EditingThe Integral Worm
This presentation describes best practices for creating and documenting definitions in technical writing and editing. Topics covered are the following: effective definitions, multiple meanings, defining technical nomenclature, defining symbols, formal definitions, and informal definitions, and placement of definitions.
Best Practices for Using Visuals in Technical WritingThe Integral Worm
This presentation outlines industry best practices for using visuals in technical writing. Appropriate visuals should be used only as needed to aid the user in understanding of the task at hand. Visuals are more specific, reduce processing time, and are more quickly understood than text. Visuals should make sense standing alone but also may be used to illustrate, explain, demonstrate, verify, and/or provide support. Use a verbal table to show problems with analyses and solutions for a trouble-shooting section. Visuals are easier to understand than prose in paragraphs. “A picture is worth a 1,000 words…” or at least a couple of hundred. Make sure the number of visuals is appropriate to the audience need and subject matter at hand. Adapt visuals to audience level without dumbing down the subject matter. If there are more than 5 independent visuals within the document, create a List of Figures/Tables. Place visuals as close as possible following (after) the text reference. Surround the visual with white space to separate from text of document. Avoid overuse of decorative color and too much color this only creates confusion for the user in meaning-making. A good example of the use of color are geographical maps and metropolitan train maps.
Best Practices and Guidelines for Collaboration in Workplace CommunicationsThe Integral Worm
This presentation outlines industry best practices for collaboration in workplace communications. The discussion includes the following: why we collaborate, benefits of collaboration, potential problems in collaboration, how to effectively collaborate, types of collaboration, and how to ensure successful collaboration.
Best Practices and Guidelines for Writing Analytical ReportsThe Integral Worm
This presentation outlines various types of reports and best practices and industry standards for writing persuasive analytical reports. Types of reports covered include but are not limited to: task reports, activity reports, progress reports, meeting minutes, trip and conference reports, and to file reports.
Best Practices for Writing and Editing User/Instruction ManualsThe Integral Worm
This presentation outlines industry best practices in writing/editing “user friendly” instruction/user manuals. Instruction/user manuals are written for the purpose of helping the end-user complete a task. These documents must be clear about its purpose. The technical writer must take into consideration the user’s attitude, education, and experience when composing such documents. Methods of organization include a table of contents, pagination, previews and reviews, cross references, glossary, and Index - alphabetical list and page numbers - for longer docs for ease of use. Warnings, cautions, and dangers should also be used throughout the text where appropriate. Appropriate visuals should be used only as needed to aid the user in understanding of the task at hand.
The Good, the bad, and the ugly of Thin Client/Server ComputingThe Integral Worm
This presentation discusses the features, benefits, advantages and disadvantages of using Thin Client/Server technology as an IT Security strategy. The full discussion of Thin Client/Server technology as a security solution may be found at http://www.theintegralworm.com/security.html .
Legal Aspects of Information Systems: State of Maryland vs. CyberSmoke.The Integral Worm
This presentation is part of a collaborative study in UMBC’s Legal Aspects of Information Systems providing a summary of our findings. The full study may be found at http://www.theintegralworm.com/legalaspects.html CyberSmoke is a fictitious company that sells tobacco products on the Internet. The study describes CyberSmoke’s business practices and the case brought against it by the State of Maryland outlining several illegal and unethical business practices. The study concludes with the court’s review of the case and its decision.
Rolling credits/Presenters are as follows: Christopher Paul, Nancy Nguyen, Gennadiy Vekker, Tim Baldwin, Christopher Brune
The Test Subject Simulation of the "Cyberpeople Jack Implant" ArtifactThe Integral Worm
The Test Subject Simulation of the “Cyberpeople Jack Implant” slide show is NOT meant to be understood as a “Stand Alone” document. This slide show is a fragment of a larger communication, a multi-modal argument, and cannot be understood unless the user reads through the entire Theory of Communication and Technology Communicative Objective # 1: The “Cyberpeople” Re-patent, which may be found at http://www.theintegralworm.com/patentreadexplaination.html . This link provides an explanation of how to read and proceed though the communication.
The Test Subject Simulation of the “Cyberpeople Jack Implant” is a segment of the URCAD 2007, 11th Undergraduate Research and Creative Achievement Day at UMBC, my presentation of a Three-dimensional Multi-Modal/Multi-Media Argument, “The Cyberpeople Jack Implant: A Study of Remediation, Ethics, and Technology.” This slide show played in an infinite loop at a rate of one slide per second on a laptop during the presentation.
UMBC Information Systems Project Management Group Project Presentation. "Playground Development Project for University of Maryland, Baltimore County Day Care" by The Orange Zone Construction Company.
Best communication design practices when using “Shape Tools” for visual prese...The Integral Worm
This presentation is a summary of L. L. Lohr's Creating Graphics for Learning Performance: Lessons in Visual Literacy, Chapter 5 -- "Shape Tools." This slide show outlines best practices in visual literacy illustrating the use of shapes in presentations for delivering communications. The show discusses when to use particular shapes, where the shapes should be used, how the shapes should be used, and why particular shapes are used.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
2. Types of Knowledge
• Declarative Knowledge - tells us the facts
– Facts, knowledge about objects and relationships
– Descriptive representation of knowledge
– It is often shallow knowledge
· Procedural Knowledge - tells us what to do
– Knowledge about procedures involved in solving
problems
· Declarative Knowledge - tells us facts and
procedural knowledge tells us what to do
3. Knowledge Acquisition Paradox
· The more competent a Domain Expert (DE)
becomes, the less able they are to describe
the knowledge they use to solve problems
· Don’t be your own expert
· Don’t believe everything experts say
4. Difficulties of Knowledge Acquisition
• Difficulty in verbalizing
– Reasoning process too broad
– Use of combined and compiled knowledge
– Unaware of the individual steps taken to reach a
solution
• Difficulties in transferring to a machine
– Machine works at a more basic level, but the
expert seldom operates at a basic level
5. Difficulties of Knowledge Acquisition
• Difficulties in structuring knowledge
– Losing a significant amount of knowledge
when structuring implicit knowledge
• Domain Expert’s unwillingness
– Unavailable
– Uncooperative
– No knowledge of computers and Expert
Systems
6. Knowledge Acquisition Methods 1
· On-site observation
· Watch the expert solving real problems on the
job
• We are not the experts, so we research the particular
area BEFORE sitting down with the Domain
Expert(s)
• Ex: Sometimes a Doctor brings a Student with
them/Student learns from the Expert
7. Knowledge Acquisition Methods 2
· Problem discussion - observe at first
· Explore the kinds of data, knowledge, and procedures
needed to solve specific problems
· How does the problem differ from prototypical problems in
the domain?
· How is this problem different from others?
· What different approach do you use?
· Types of data required and kinds of solutions adequate for
the problem?
· What kinds of knowledge are needed to solve the problem?
· What constitutes an adequate explanation or justification of
a problem solution?
8. Knowledge Acquisition Methods 3
· Problem Description
· Have the expert describe a prototypical problem
for each category of answer in the domain
· Protocol Analysis (Problem Analysis)
· Present the expert with a series of realistic
problems to solve aloud, probing for the rationale
behind the reasoning steps (solve the problem
verbally)
· Widely used in psychology
· Ex: Dermatology-Psoriasis
· Expert Syst. to diagnose Psoriasis
· Color?
· How long rash lasts?
· Where is the rash?
9. Knowledge Acquisition Methods 4
• Repertory Grid Analysis
– Identify important objects
– Identify important attributes
• Specific objects
– Example: Rash/Color/Duration/Level of itching/Local
or whole body?
– For each attributes, establish a bipolar
scale with differentiable characteristics and
their opposites
– Ex: Computer Language
10. Repertory Grid Analysis
• Assisting in selecting a computer language
– Identify objectives
• LISP, C (Procedural Lang), C++(OOP Lang)
– Attributes
• Availability, Ease of Programming, Training
Time
• Orientation
– Traits
• high, low, symbolic, numeric
11. Reasoning Methods
• Deductive Reasoning
• Inductive Reasoning
• Forward Reasoning (Chaining)
– Reasoning starts with raw facts
• Backward Reasoning (Chaining)
– Reasoning starts with hypothesis as in
statistics, them moves to prove or disprove
hypothesis
12. RGA Input for Selecting a Computer
Language
Attributes: Trait or Opposite
Availability: Widely Available or Not Available
Ease of Programming: High or Low
(C++) (C)
Training Time: Low or High
Orientation: Symbolic or Numeric
Example: The Animal Problem – Done in LISP – “Symbol Oriented
Can store colors – Red/Blue/Orange/Green
1 variable can be 26 Char long/1 char long
13. Automatic Knowledge Acquisition
Techniques
• Methods
– Rule Induction - DE provides some examples
similar to Data Mining, then apply
Statistical/Mathematical Techniques such as
Multivariate Regression
– Artificial Neural Net (ANN) - Qualitative
Approach-Statistical & Mathematical
Methods/Dev. Intelligent Machine/Data Mining
14. Automatic Knowledge Acquisition
Techniques
• Methods
– Case-based Reasoning - asking DE to provide
case/Law - Attorney
• Work by previous cases/Dev. argument from
previous cases
• Use previous as base argument
– Example: Help Desk
» Printer not functioning
» Refer to previous case from “n” weeks ago
15. Automatic Knowledge Acquisition
Techniques
• Methods
– Model-based Reasoning
• Applicable to design of an engineering application
• Give me specifications of some hardware
• Used often in NASA
• Build a model using DE knowledge
16. Knowledge Representation
• Logic is used heavily in AI
– Prepositional Logic
– Predicate Logic
– Rules (easiest to represent)
– Semantic Nets
– Frame
– Object
17. Propositional Logic
• It is raining
– RAINING
• Proposition/Propositional Logic - Is this true or
false? Is it raining now?
• It is sunny
• We can deduce whether a certain
proposition (fact) is true or false
18. Proposition Logic
• Propositional logic cannot drive the
association
• Socrates is a man (true or false)
– SOCRATESMAN
• Plato is a man (true or false)
• We can not draw any conclusions about
similarities between Socrates and Plato
– By separate propositional logic cannot
reach a conclusion
• Variable = Substituting a value
• Constant = Have to assign value
19. Predicate Logic
• More like a variable/can hold different values
• Socrates is a man (true or false)
– PREDICATE(VALUE)
• Socrates is a man
– MAN(SOCRATES)
• Plato is a man
– MAN(PLATO)
• Now the structure of representation reflects
the structure of knowledge itself
20. Predicate Logic
• Marcus is a man
– MAN(Marcus)
• Marcus is a Pompeian
– POMPEIAN (Marcus)
• All Pompeians were Romans
– Vx POMPEIAN(x) -> ROMAN(x)
21. Predicate Logic
• All Romans were either loyal to Caesar
or hated him
• Vx ROMAN(x) -> loyalto (x, Caesar) v hate (x, Caesar)
• It is difficult to represent knowledge in predicate logic
23. Semantic Networks (Nets)
• Semantic net is a knowledge presentation
method based on a network structure
• It consists of
– points called nodes connected by
– links called arcs
• Nodes – object, concepts, events
• Arcs - relationships between nodes
24. Semantic Nets
• Common arcs used for representing
hierarchies include isa and has-part
• Processing Natural Language
– Example: Text Mining
• Uses Natural Language for summarizing article
or newspaper
25. Example:
The Queen Mary is an ocean liner
Every ocean liner is a ship
Ship
isa
Ocean Liner
isa
Queen Mary
26. SHIP
Isa (hierarchical relationship)
Ocean Liner Oil Tanker Engine Hull
Swimming Queen Mary Liver Pool Boiler
Pool
Has-part (component relationship)
isa
27. Bill gives Judy a gift
Judy
Give
(verb)
Gift
Bill
Recieves
Object
Gives
Node
Node
28. Bill told Laura that he gave Judy a gift
Judy
Give
(verb)
Gift
Bill
Recieves
Object
Gives
Tell
Laura
Speaker
Listener
Time
Past
29. Frame 1
• Similar to Object
• Hierarchical Representation
– Introduce details as necessary
– Polymorphism
– Multi-inheritance
• A data structure for representing a stereotyped
situation
• A network of nodes and relations organized in a
hierarchy
• The topmost nodes - general concepts (abstract
class)
• The lower nodes - more specific instances (more
specific classes)
30. Frame 2
• The concepts at each node is described by a
set of attributes and values of those attributes
• Attributes are called slots
• Each slot can have procedures (codes)
• Typical procedures
– if added procedure
– if deleted procedure
– if needed procedure
31. Frame 3
• OOP
– Class
– Attribute
– Method
• AI
– Node
– Slots
– Procedures
32. Report
isa isa
Progress Report Technical Report
isa
DSS Project Process Report
33. A Node in a Frame System
Value 1
Slot 1
Slot 2 Value 2
Value 3
Slot 3
Procedure 1
Procedure 2
Procedure 3
34. Comparisons of KR Methods
• Rules
• When get too large become unmanageable
– IF… THEN… ELSE
– Advantage
• Simple syntax, easy to understand, simple
interpreter, high modularity, flexible
– Disadvantage
• Hard to follow hierarchies, inefficient for large
systems, not all knowledge can be expressed
as rules
35. Comparisons of KR Methods
• Semantic Nets
– Advantage
• Easy to follow hierarchy, easy to trace
association, flexible
– Disadvantage
• Meaning attached to nodes might be
ambiguous
• Exception handling is difficult
• Difficult to program
36. Comparisons of KR Methods
• Frames
– Advantage
• Expressive power, easy to set up slots for new
properties and relations
• Easy to create specialized procedures
• Easy to include default information and detect
missing values
– Disadvantage
• Difficult to program
• Difficult for inference