CONTROL CONFIGURATION OF THE LARGE MARINE INFORMATION SYSTEM OF KNOWLEDGE BASES IN THE DEVELOPMENT OF THE CONCEPT OF E-NAVIGATION

2021 ◽  
pp. 123-127
Author(s):  
A. Troeglazov ◽  
V. Popov
Author(s):  
Safia Laaziz ◽  
Younes Zeboudj ◽  
Salem Benferhat ◽  
Faiza Haned Khellaf

The problem of belief change is considered as a major issue in managing the dynamics of an information system. It consists in modifying an uncertainty distribution, representing agents’ beliefs, in the light of a new information. In this paper, we focus on the so-called multiple iterated belief revision or C-revision, proposed for conditioning or revising uncertain distributions under uncertain inputs. Uncertainty distributions are represented in terms of ordinal conditional functions. We will use prioritized or weighted knowledge bases as a compact representation of uncertainty distributions. The input information leading to a revision of an uncertainty distribution is also represented by a set of consistent weighted formulas. This paper shows that C-revision, defined at a semantic level using ordinal conditional functions, has a very natural representation using weighted knowledge bases. We propose simple syntactic methods for revising weighted knowledge bases, that are semantically meaningful in the frameworks of possibility theory and ordinal conditional functions. In particular, we show that the space complexity of the proposed syntactic C-revision is linear with respect to the size of initial weighted knowledge bases.


1993 ◽  
Vol 19 (3-4) ◽  
pp. 223-234
Author(s):  
Hiroshi Sakai

A framework for Logic Programming with Incomplete Information is proposed. Recently, an important problem has been much discussed in the field of knowledge bases, logic programming and AI, namely how effectively we use information which may have incompleteness, especially disjunctive information. In order to express disjunctive information, we use the predicate symbol orm, where the superscript m implies its arity, and as arguments we put every disjunctive information in orm, which we call an or-type atom. Based on or-type atoms, we define a new language called or-type language. Logic Program with Incomplete Information(LPII) is a subset of the or-type language. First, in a special case our framework is reduced to that of near-Horn prolog by Loveland and disjunctive logic programming by Minker. Then, we consider a general case, which is seen as an advancement from Lipski’s incomplete information system. In this case, we show the model intersection property, fixpoint theorem, the soundness and the completeness of a resolution which we call Box-resolution.


2021 ◽  
pp. 016-023
Author(s):  
Y.S. Rodin ◽  
◽  
I.P. Sinitsyn ◽  

The tasks of modelling and the components of the basic model of applied task protection of a distributed information system have been considered. The measurement and relationship of security parameters, protection, new and reference attacks, anomalies, and threat environments have been proposed. The conditions of threats, attacks and, consequently, inconsistencies in the results of applied tasks are proved. At the beginning of the article the concept of a distributed information system, system of applied tasks, modern trends of zero-trust architecture in building information security systems are discussed. Further, it gives an overview of existing methods of detection and counteraction to attacks based on reference knowledge bases. To improve the level of security it is proposed to analyze the causes of attacks, namely hazards and threats to the system. Attacks, hazards and threats are considered as structured processes that affect the internal and external environment of the system of the applied tasks with a further impact on the output of these tasks. The concepts of security level and security level of a distributed information system are introduced, as well as the concepts of applied task, environment, and user contradictions. As the logical metrics of discrepancy detection the apparatus of semantic analysis is proposed, which (based on the reference knowledge base, the apparatus of text transformations) should be applied at the stage of loading of applied task and describe the input and output data, requirements to the environment of the task solution. The result of the research is the proposed method for identifying additional data about hazards, threats, attacks, countermeasures to attacks, applied task-solving. This data is generated from the reference and augmented textual descriptions derived from the proposed contradictions. By building additional reference images of threats, attacks, countermeasures, it becomes possible to prevent the activation of new attacks on the distributed information system.


Author(s):  
M.V. Vinogradova ◽  
A.S. Larionov ◽  
V.M. Chernenky

Currently, most modern manufacturing companies use automated information systems to account for resources and plan their activities. The functionality of these systems often becomes very extensive and actively changes over time. It is required to maintain the competence of employees when working with them, for which enterprise knowledge bases are created, which, however, themselves require significant labor costs to build. This paper describes methods and tools for collecting and analyzing information about the actions of users in an automated enterprise management system, which allows you to identify problems in its business processes and the most frequent mistakes of employees. Under the basic information system of the enterprise we mean the software complexes for resource management and control of production activities. One of the most common samples are products based on 1C: Enterprise platform. These systems include advanced functionality of the accounting of user actions, where the type and time of events is recorded, as well as instances of related objects. Common intelligent systems for automating the filling of knowledge bases concentrate on the generation of materials directly from the data structure of the main information system, or analysis of already existing documents in natural language. The approach we propose is not aimed at completely replacing a human expert, but at providing him with up-to-date information about the needs of users in the order of compiling knowledge base materials. The information system of an enterprise is represented by a discrete dynamic system, whose elements change state as a result of user actions. Users' interactions with the information system are recorded as time-ordered sequences of elementary events, which are stored in a special logbook. The subject area structure and business processes of the core information system are described in a knowledge base in the form of a graph structure. Its elements include human-readable materials and a set of metadata, allowing their analysis by algorithmic methods. Based on the results of the work, an approach to identify the most relevant materials for the composition of the knowledge base materials is developed. It is based on algorithmic analysis of the actions of users of the basic information system and the calculation of the amount of time that users spend to eliminate emerging problems. To assess the effectiveness of the proposed approach developed a simulation model and conducted experiments to estimate the downtime of users, depending on the method of filling the knowledge base.


2006 ◽  
Vol 05 (04) ◽  
pp. 269-277 ◽  
Author(s):  
Nabie Y. Conteh ◽  
Guisseppi Forgionne ◽  
William D. Schulte ◽  
Kevin J. O'Sullivan

This paper advances the argument that, a knowledge base, rather than playing a crucial role in expediting the delivery of knowledge, obscures the process. The paper therefore offers an alternative strategy by way of the Just-In-Time knowledge delivery concept. The concept's benefits are demonstrated empirically, and the results are used to recommend strategies for maximising the benefits from the use of knowledge bases. The results of this study confirm that focussed and timely delivery of knowledge through a Just-in-Time Knowledge Management (JITKM) concept may be more effective than traditional decision support systems for decision-making support. This paper offers a novel and innovative information system, the Intelligent Just-in-Time Decision-Making Support System (IJDSS) to implement the JITKM concept in practice. The study also shows that simulation can be used to generate quality data for information system testing and evaluation. Moreover, this study suggests that simulation can be used to replace a subject-based empirical approach. As census studies, the results from such evaluations should be more generalisable in comparison to sample studies that use limited samples of subjects. Adaptations of these simulation models could also be used in diverse sectors.


Sign in / Sign up

Export Citation Format

Share Document