06.03.2013 Views

Artificial Intelligence and Soft Computing: Behavioral ... - Arteimi.info

Artificial Intelligence and Soft Computing: Behavioral ... - Arteimi.info

Artificial Intelligence and Soft Computing: Behavioral ... - Arteimi.info

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

control of data <strong>and</strong> knowledge is unique, depending on their position in the<br />

program.<br />

21.4.4 Maintaining Security in Knowledge<br />

Based Systems<br />

‘Security’ [5], like other software, is equally useful in expert systems. It<br />

prevents unauthentic use / change of system resources. For instance, if there is<br />

no password check, anyone can change the knowledge base. A clever<br />

programmer may also affect the inference engine. Thus while updating<br />

knowledge, maintaining the security is a fundamental requirement in expert<br />

systems technology.<br />

21.5 Conclusions<br />

Performance evaluation of knowledge base systems is a fundamental issue of<br />

knowledge management. In this chapter we discuss different means for<br />

verifying the knowledge base. The key issues of knowledge verification are to<br />

keep the knowledge base free from incompleteness <strong>and</strong> inconsistency. For<br />

verifying non-monotonic systems the most important issue is to rank the level<br />

of the ab predicates in the same knowledge base. In my opinion, here the<br />

binary logic fails to yield a stable inference. In fact, multi-level logic may be<br />

used to overcome this difficulty of non-monotonic systems. Currently, special<br />

emphasis is given on the maintenance of the knowledge-based systems. This<br />

is useful as every year around 800-1000 new pieces of knowledge [7] are<br />

being added to expert systems. While augmenting the knowledge base,<br />

checking for inconsistency should be carried out to keep the system running<br />

smoothly over several years. Security of knowledge based systems should<br />

also be maintained to prohibit the unauthorized access to the system<br />

resources.<br />

Exercises<br />

1. Given the following knowledge base R, determine which of the rules in<br />

set R is dangling. R = {IF A, B THEN C, IF C THEN D}, Database =<br />

{A, C}.<br />

2. Which is the useless conclusion in problem 1? Is there any isolated rule in<br />

the above system?<br />

3. Determine the type of inconsistencies in the following knowledge bases<br />

(KB)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!