Skip to main content

Notes on Knowledge Representation

1.Intruduction

The paper (John Molopoulos,1981) is a brief overview of terminology and related issues on knowledge representation.

Knowledge Representation is a central problem in Artificial Intelligence (AI) today. Its importance stems from the fact that the current design paradigm for "intelligent" systems stresses the need for expert knowledge in the system along with associated knowledge-handling facilities.

The basic problem of KR is the development of a sufficiently precise notation for representing knowledge. We shall refer to any such notation as a (knowledge) representation scheme. Using such a scheme one can specify a knowledge base consisting of facts.

2.A Taxonomy of Representation Schemes

Representation schemes have been classified into declarative and procedural ones . The paper subdivide declarative schemes into logical and (semantic) network ones.

2.1

Logical Representation schemes is such schemes employ the notions of constant, variable, function, predicate, logical connective and quantifier to represent facts as logical formulas in some logic (First or Higher Order/Multi- valued/Modal/Fuzzy etc.). A knowledge base, accord- ing to this view, is a collection of logical formulas which provides a partial description of a world.

The advantages of logical representaton schemes is 1) the availability of inference rules in terms of which one can define proof procedures. 2) It's an availability of a clean, well-understood and well-accepted formal semantics. 3)the simplicity of the notation employed which leads to knowledge base descriptions that are understandable.

The main drawbacks logical representation schemes is 1)A major drawback of logical schemes is the lack of organizational principles for the facts con-stituting a knowledge base. 2) A second drawback is the difficulty in repre- senting procedural and heuristic knowledge.

2.2

Semantic network representation schemes, attempt to describe a world in terms of objects (nodes) and binary associations (labelled edge). According to a network representational view, a knowledge base is a collection of objects and asso- ciations, or a directed labelled graph, and modifications to the knowledge base occur through the insertion/deletion of objects and the manipulation of associations.

Due to its nature, network schemes address directly issues of information retrieval since associations can be used to define access paths for traversing a network knowledge base. Another impor- tant feature of network schemes is the potential use of primitive association types for the organization of a knowledge base. A third advantage is the obvious graphical representation of network knowledge bases which enhances their understandability.

A major drawback of network schemes has been the lack of a formal semantics and a standard terminology.

2.3

Procedural schemes view a knowledge base as a collection of procedures expressed in some language.

Procedural schemes allow the specification of direct interactions between facts thus eliminating the need for wasteful searching. On the other hand, a procedural knowledge base, like a program, is difficult to understanding and modify.

2.4

A frame is a complex data structure for representing a stereotypical situation such as being in a certain kind of living room or going to a child's birthday party. The frame has slots for the objects that play a role in the stereotypical situation as well as relations between these objects. Attached to each frame are different kinds of information such as how to use the frame, what to do if something unexpected happens, default values for its slots etc.

3. Distinguishing Features of Representation Schemes

3.1 Mutiple Use of Facts

There are some operations could be performed on konwledge bases. They are Inference, Access and Matching. Inference is to deduce new facts from known facts. Access is to finish a questioning -answering applications on knowledge base. Matching is a operation on the relationship set of knowledge for different purposes and in different forms.

3.2 The Incompleteness of Knowledge Base

The knowledge base is always incompleteness though it is always been improved.

3.3 Self Knowledge

Facts which describe the form or allowable configurations of other facts (e.g. type definitions) are an important kind of self knowledge.

A second kind of self knowledge involves the ability of a system to answer elementary questions about its actions, or about the strategies it uses to perform some task.

Comments

Popular posts from this blog

A simple implementation of DTW(Dynamic Time Warping) in C#/python

DTW(Dynamic Time Warping) is a very useful tools for time series analysis. This is a very simple (but not very efficient) c# implementation of DTW, the source code is available at  https://gist.github.com/1966342  . Use the program as below: double[] x = {9,3,1,5,1,2,0,1,0,2,2,8,1,7,0,6,4,4,5}; double[] y = {1,0,5,5,0,1,0,1,0,3,3,2,8,1,0,6,4,4,5}; SimpleDTW dtw = new SimpleDTW(x,y); dtw.calculateDTW(); The python implementation is available at  https://gist.github.com/3265694  . from python-dtw import Dtw import math dtw = Dtw([1, 2, 3, 4, 6], [1, 2, 3, 5],           distance_func=lambda x, y: math.fabs(x - y)) print dtw.calculate() #calculate the distance print dtw.get_path() #calculate the mapping path

Change the default user when start a docker container

When run(start) a docker container from an image, we can specify the default user by passing -u option in command line(In https://docs.docker.com/engine/reference/run/#user ). For example docker run -i -t -u ubuntu ubuntu:latest /bin/bash We can also use the USER instruction in DOCKERFILE to do the same thing(In https://docs.docker.com/engine/reference/builder/#user), note that the option in command line will override the one in the DOCKERFILE. And there is actually another way to start a container with neither DOCKERFILE nor -u option, just by a command like: docker run -i -t ubuntu:latest /bin/bash # with ubuntu as the default user This happens when your start the container from an image committed by a container with ubuntu as the default user. Or in detail: Run a container from some basic images, create ubuntu user inside it, commit the container to CUSTOM_IMAGE:1 . Run a container from CUSTOM_IMAGE:1 with "-u ubuntu" option, and commit the container to CUSTOM...

Notes on Sequential Pattern Mining (2) -- Partial Order Pattern Mining and Contrast Mining

1. In , the authors induce TEIRESIAS algorithms to mining combinatorial patterns with gap constraints in biological sequences. The patterns TEIRESIAS mined is similiar with the common sequential patterns, but it could contain "." the wild card which is also in the alphbel of the sequences database standing for any other item available, for example pattern "A..B" is a length-4 pattern, with two arbitrary items between the first A and the last B. Patterns "AC.B", "AADB" are all said to be more specific than pattern "A..B". TEIRESIAS mining all the maximal patterns () with a support over a min threshold K. There some key points of TEIRESIAS algorithms: 1)The growth of the patterns The growth of the patterns is accomplished by convolute current pattern by a short length pattern. Pattern A and pattern B are convolutable if the last L(very small) characters of pattern A is the same as the first L characters of pattern B, then ...