SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013
pp. 361–372, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3641
SELF LEARNING REAL TIME EXPERT SYSTEM
Latha B. Kaimal1
, Abhir Raj Metkar2
, and Rakesh G3
1,2,3
Control & Instrumentation Group, C-DAC,Thiruvanathapuram
1
latha@cdac.in, 2
ametkar@cdac.in, 3
rakeshg@cdac.in
ABSTRACT
In a Power plant with a Distributed Control System ( DCS ), process parameters are
continuously stored in databases at discrete intervals. The data contained in these databases
may not appear to contain valuable relational information but practically such a relation exists.
The large number of process parameter values are changing with time in a Power Plant. These
parameters are part of rules framed by domain experts for the expert system. With the changes
in parameters there is a quite high possibility to form new rules using the dynamics of the
process itself. We present an efficient algorithm that generates all significant rules based on the
real data. The association based algorithms were compared and the best suited algorithm for
this process application was selected. The application for the Learning system is studied in a
Power Plant domain. The SCADA interface was developed to acquire online plant data.
KEYWORDS
Machine learning, Data Mining, Root cause analysis, Inference Engine, Tertius algorithm
1. INTRODUCTION
Machine Learning Technique is a scientific discipline that is concerned with the design and
development of algorithms that allow computers to evolve behaviors based on empirical data,
such as from sensor data or databases. A major focus of machine learning research is to
automatically learn to recognize complex patterns and make intelligent decisions based on data;
the difficulty lies in the fact that the set of all possible behaviors given all possible inputs is too
large to be covered by the set of observed examples (training data). Hence the learner must
generalize from the given examples, so as to be able to produce a useful output in new
cases[1][2].
Knowledge Based System (KBS) has an important role to play, particularly in fault diagnosis of
process plants, which involve lot of challenges starting from commonly occurring malfunctions to
rarely occurring emergency situations.
Machine Learning is discovering new knowledge from large databases (Data Mining). The field
of machine learning is concerned with methods that can automatically learn from experience. The
experience is usually given in the form of learning examples from which machine learning
methods can automatically learn a model. Sometimes it is very important that the learned model
can be read by human, and one of the most understandable types of models are rule sets[3][4].
Expert systems are Knowledge-Based Systems(KBS) in which The Knowledge Base(KB) holds
information and logical rules for performing inference between facts. The KBS approach is
promising as it captures efficient problem-solving of experts, guides the human operator in rapid
fault detection, explains the line of reasoning to the human operator, and supports modification
362 Computer Science & Information Technology (CS & IT)
and refinement of the process knowledge as experience is gained. Real time Expert System Shell
is a software development environment containing the basic components of expert systems. The
Shell Toolkit can be used to develop Intelligent System for Diagnosis and Root Cause Analysis
and operator guidance in process plants etc. The Expert System when enhanced with Learning
Engine, updates the KB with new learned rules & thus improves the efficiency of the system in
root cause analysis of faults.
Figure. 1 Expert System Components
2. KNOWLEDGE REPRESENTATION
Knowledge Base (KB): The system uses a Hybrid Knowledge base, the main components of
which are Meta Rules, Rules & Frames. The Knowledge Base can be built with Domain specific
information using the web based, user friendly Knowledge Base Editor GUI. A web based
Knowledge Base Editor (KBE) provides facility to input different rules of an application by the
domain expert using user-friendly GUI. Rules and other application specific attributes will be
represented using Frames and Production rules.
Knowledge base consists of domain specific information that is fed into the system through GUI.
This information is used to interpret and diagnose real-time data received from controllers and
sensors. The structures used to store knowledge consist of:
Meta-rule: Structure - If Complaint Then Hypothesis
Meta-Rules are the supervisory rules to categorize Sub-rules in broad areas or nodes. Meta rules
decide what domain rules should be applied next or in what order they should be applied. Rules:
Structure - If Condition Then Action
Rules are basic components of the ‘Knowledge base’. The condition and action parts of the rules
are defined as parameters. The condition and action parts can have more than one parameter
separated by logical operators. The parameters are specific data variables, which are configurable
by the user.
Frames: Frames are general data structure holding the static information about any equipment or
unit.
3. INFERENCE ENGINE
The Inference Engine is the heart of the expert system. Since the expert system is intended for
diagnosis of faults, a Backward Chaining inference strategy is preferred. This inference engine
will use knowledge stored in Production Rules and Frames for arriving at a conclusion or a goal
while performing a fault diagnosis using backward reasoning method
Computer Science & Information Technology (CS & IT) 363
Figure. 2 Internal Block Diagram of Inference Engine
Working Principle of Inference Engine: The critical alarms are made as Meta-rules and sub-
causes are depicted as rules in the knowledgebase. When the critical alarm occurs in the system,
the relevant meta-rule will be fired; consequently the rules having the condition part true will get
fired in sequence till the final root cause of the failure is reached. The inference engine algorithms
is as follows:
Backward reasoning: Backward chaining involves, working back from possible conclusions of
the system to the evidence, using the rules and frames. Thus backward chaining behaves in a
goal-driven manner. One needs to know which possible conclusions of the system one wishes to
test for. In frame based systems rules play an auxiliary role. Frames represent here a major source
of knowledge both ‘methods’ and ‘demons’ are used to add actions to the frames. Goal can be
established either in a method or in a demon.
Inference Manager is used for processing of all rules based on the user input or SCADA input.
Meta Rule Interpreter search through the Meta Rule set for finding out the complaints part
(antecedent) which matches the user defined complaint/Alarm. Inference Manager gets the
hypothesis list (in the consequent part of Meta Rule) and Load it into the Working memory. Then
Inference Manager will process hypothesis based on the certainty factor one by one (Hypothesis
with the highest CF processed first).Then Inference Manager searches through the Rule set for
finding out the action part which matches the hypothesis (THEN) part of the Meta rule. Rule
Interpreter gets the condition part of Rule and evaluate each parameter in it. For this Parameter
Interpreter checks the parameter type. Parameter can be database type or (within the working
memory) or frame type or GUI or Computed. Evaluated parameters are added to working
memory. This process is repeated till all rules are evaluated. Fired rules and parameters evaluated
are logged into the database for generating explanation by the Explanation module
4. LEARNING ENGINE DEVELOPMENT FOR ENHANCING EXPERT
SYSTEM
The Learning Engine is an extension of the Expert systems where new rules have to be learned by
the shell for any domain. For this we need to do data preprocessing and data mining of the
historic Data. The new rules generated have to be validated by the expert and then can be updated
to the knowledge base. In our work we used Association based Learning methods for generating
new rules from data[5].
To enhance the inferencing capability of Real time Expert System Shell new rules have to be
found from the historic data. The parameter name and values from the historic data are used as
Production
Memory
Get Initial
Status
Working
Memory
Meta Rule
Interpreter
Rule
Interpreter
Frame
Interpreter
KB/
DB
GUI/CDI
Inference
Manager
Parameter
Interpreter
364 Computer Science & Information Technology (CS & IT)
input for Learning Engine. For learning, the association between parameters at different time has
to be found. The major Machine Learning Techniques are as below:
Classification – Supervised data mining. Forms unseen classification.
Numerical prediction – Subgroup of Classifier. Formed outcome is a numeric quantity and not a
discrete class or classifier.
Clustering – Unsupervised learning.
Association – Any association of one or more than one attribute at a time.
Figure 3: Architecture Diagram of Expert System with Learning Engine
The output of Machine Learning algorithms can be of the form of Decision tables, Decision trees,
Association rules, Clustering Diagrams etc. Association rule learning (Dependency modeling) -
Searches for relationships between variables. Thus we have studied and compared the Association
algorithms.
4.1 Association rule learning
Association Mining is finding frequent patterns, associations, correlations or causal structures
among sets of items or objects in transaction databases and other information repositories. When
given a set of transactions, this will find rules that will predict the occurrence of an item based on
the occurrences of other items in the transaction.
Association rules are usually required to satisfy a user-specified minimum support and a user-
specified minimum confidence at the same time. Association rule generation is usually split up
into two separate steps:
1. First, minimum support is applied to find all frequent item sets in a database.
2. These frequent item sets and the minimum confidence constraint are used to form rules.
In Association rule learning following algorithms were compared & results summarized:
1. Apriori
2. Predictive Apriori
3. FPGrowth
4. Tertius
Computer Science & Information Technology (CS & IT) 365
4.1.1 Apriori
In computer science and data mining, Apriori is a classic algorithm for learning association rules.
Apriori is designed to operate on databases containing transactions (for example, collections of
items bought by customers, or details of a website frequentation).
Apriori uses a "bottom up" approach, where frequent subsets are extended one item at a time (a
step known as candidate generation), and groups of candidates are tested against the data. The
algorithm Apriori, suffers from a number of inefficiencies or trade-offs, which have spawned
other algorithms. Candidate generation generates large numbers of subsets (the algorithm
attempts to load up the candidate set with as many as possible before each scan). Bottom-up
subset exploration (essentially a breadth-first traversal of the subset lattice) finds any maximal
subset S only after all 2 | S | − 1 of its proper subsets.
4.1.2 Predictive Apriori
It searches with an increasing support threshold for the best 'n' rules concerning a support-based
corrected confidence value. When evaluating association rules, rules that differ in both support
and confidence have to be compared; a larger support has to be traded against a higher
confidence.
The constraint of Predictive Apriori is that it also creates transaction database before rule making
and the time required for rule making was much high compared to other algorithms.
4.1.3 FP Growth
FP Growth allows frequent itemset discovery without candidate itemset generation. It has two
step approach:
Step 1: Build a compact data structure called the FP-tree
Built using 2 passes over the data-set.
Step 2: Extracts frequent itemsets directly from the FP-tree
Traversal through FP-Tree
FP-Tree is an efficient algorithm for finding frequent patterns in transaction databases
• A compact tree structure is used
• Mining based on the tree structure is significantly more efficient than Apriori transaction
databases
The constraint of FP Tree is that it supports only binary attributes and also creates transaction
database before rule making.
4.1.4 Tertius
Tertius uses a top-down search algorithm when creating the association rules. The search first
starts with an empty rule. Next, Tertius iteratively refines the rule by adding new-attribute values.
Tertius continues to refine the rule as long as such refinements increase the confidence value.
Finally, Tertius adds the rule and restarts the search to create new rules. Tertius ends when no
additional rules can be created with sufficient confidence values. Afterwards, it returns the set of
rules along with their confidence values.
366 Computer Science & Information Technology (CS & IT)
Tertius does not create itemset and transaction databases. It starts directly from creating rules thus
the algorithm implementation of Tertius requires less memory compared to the other association
algorithms.
4.2 The Learning Module Implementation: Working Principle
Knowledge discovery in databases is the process of identifying valid, novel, potentially useful,
and ultimately understandable patterns or models in data. Data mining is a step in the knowledge
discovery process consisting of particular data mining algorithms that, under some acceptable
computational efficiency limitations, find patterns or models in data. This Learning Engine was
developed as an enhancement module to the Real Time Expert System for Root Cause Analysis
of alarms in Plants. The development is done using Java and Flex languages and uses MySql
database. In power plants application we have to take into consideration the historic data, online
data for updating the knowledge base with the new knowledge acquired. Figure 4 shows the
general architecture of the Learning Engine Module.
The Learning Engine Module mainly consists of the following sub modules:
User Interface
Preprocessor
Algorithm implementer
Post processor
Rule Validator
Figure 4: Block Architecture Diagram of Learning Engine
The administrator/user can initiate the Learning process from the GUI. The data has to be selected
from the history by configuring the start time/date to end time/date for Learning Engine. Figure 5
shows the start/end date and parameter selection configuaration.
Computer Science & Information Technology (CS & IT) 367
4.2.1 Preprocessor
This data in the historian data base has to be preprocessed and the suitable output structure has to
be created before feeding to the Learning algoritm model to get the output.
The history data preprocessing involves the following methods.
1. Data cleaning - The historic data contains the field ‘Quality’ with data 1(good) and 0
(bad). Filter out or discard instances with quality attribute value 0.
2. Data transformation- Data Transformation involves conversion of the data value
(Parameter Value) using alarm code mapping to corresponding nominal values
3. Data reduction –The unwanted columns in the historic data are to be removed.
The historic data after preprocessing has to be fed to the Learning algorithms.
Figure 5: Learning Engine- Prepocessor
4.2.2 Algorithm Implementer
The pre-processed learning data table in database is the input to Algorithm Implementer module.
This module is using Tertius algorithm as found most suitable among the association algorithms
for this domain of application. Tertius does a complete top-down A* search over the space of
possible rules. If you have ‘A’ attributes with on the average ‘V’ values and search for rules with
up to ‘n’ literals, the number of possible rules is of the order (AV)n. The output is the set of rules
from the Rule generator block. The parameters which are configurable for Tertius algorithm are
Confirmation Threshold and Frequency Threshold whose default values are set as 0.3 and 0.1
respectively.
368 Computer Science & Information Technology (CS & IT)
Figure 6: Learning Engine- New rules formation
4.2.3 Post processor Module
The input to this module is the set of rules generated from the rule generator(Algorithm
Implementer) module. The rules generated have to be post processed so that it is in the same
format as the Knowledge Base(KB) Rules. The rules with normal conditions (in both head and
body) have to be discarded as only rules for alarm conditions are present in Knowledge Base.
The duplicate rules have to be removed as part of post processing i.e with literals reverse in head
and body. The rules shall be in the if-then format as in the KB. Post processor module converts
the rules generated to if-then format.
4.2.4 Rule Validator
The input to the Rule Validator module is the Postprocessor module output rules. The Rule
Validator compares the input rules with the existing Knowledge Base Rules. If the rule already
exists in Knowledge Base, it is discarded. The new rules are output to the GUI. After
confirmation from domain expert, the Knowledge Base. is updated with the new rules.
Figure 7: Learning Engine- Rule added to Knowledgebase
Computer Science & Information Technology (CS & IT) 369
5. APPLICATION
The data used for the testing is generated from a Plant Test Setup using Analog and Digital Input
cards connected to suitable sources. The interface between Plant Distributed Control System
(DCS) and Expert System is via OPC DA. The alarm “MS Header Temp LO” is considered for
testing. This is an actual alarm studied from NTPC Plant.
Figure 8: Fault Tree for Alarm: MS Header Temp low
Historic data is read from database and analog values are converted to nominal type for inputting
to association algorithms. Here 13 attributes (6 analog and 7 digital) and 70 instances are used for
testing. The test data is given as shown below.
attribute 1- AI-3 {LO,NORMAL} attribute 2- AI-2 {LO,NORMAL}
attribute 3- DI-7 {TRUE,FALSE}attribute 4- DI-6 {TRUE,FALSE}
attribute 5- DI-5 {TRUE,FALSE}attribute 6- DI-4 {TRUE,FALSE}
attribute 7- DI-3 {TRUE,FALSE}attribute 8- DI-2 {TRUE,FALSE}
attribute 9- DI-1 {TRUE,FALSE}attribute 10-AI-7 {LO,NORMAL}
attribute 11-AI-6 {LO,NORMAL}attribute 12-AI-5 {LO,NORMAL}
attribute 13-AI-4 {HI,NORMAL}
Existing Knowledge Base Rules
If AI-3<30(LO) OR DI-1=True OR AI-7<45(LO) OR DI-4=True Then AI-2<50(LO)
If AI-4>25(HI) OR AI-6<20(LO) OR DI-4=TRUE Then AI-3<30(LO)
FWtemp at
econI/L
low?(AI-5<
28)
MSheader
temperature
low? (AI-
2<50)
L/Rsystem
temperature
control on
Manual? (DI-1)
CV position
difference from
control signal?
(AI-7< 45)
L/Rspray
CVclosed?
(AI-3< 30)
Oxygen in
FG
low?(AI-6<
20)
No fault
System temperature
control on manual
(DI-2)
Control Valve Stuck
(DI-3)SHTubes soot deposit/
Running Burners trip (DI-
4)
RH/SH Soot
deposit(DI-7)
FW Htrs
Problems(DI-
6)
FWdiff
tempacross
econ
high?(AI-
4< 25)
Low excess
air (DI-5)
No
Yes
No
No
No
No
Yes
Yes
No
Yes
Yes
Yes
Yes
370 Computer Science & Information Technology (CS & IT)
If AI-5 < 28(LO) OR DI-7 = True Then AI-4>25(HI)
If DI-6 = True Then AI-5<28(LO)
If DI-5 = True Then AI-6<20(LO)
If DI-2 = True Then DI-1=True
If DI-3 = True Then AI-7<45(LO)
Algorithm Run Outputs
1. Apriori
Configuration
No of rules=100000 , Minimum support: 0.25 (17 instances)
confidence: 0.1, Instances: 70, Attributes: 13
AI-3, AI-2, DI-7, DI-6, DI-5, DI-4, DI-3, DI-2, DI-1, AI-7, AI-6, AI-5, AI-4
Best rules found:
Seven best rules are found using Apriori algorithm. One sample rule is shown below
AI-3=LO 40 ==> AI-2=LO 40 conf:(1)
2. Predictive Apriori
Configuration
No of rules=100000, Instances: 70, Attributes: 13
AI-3, AI-2, DI-7, DI-6, DI-5, DI-4, DI-3, DI-2, DI-1, AI-7, AI-6, AI-5, AI-4
Best rules found:
Twenty three best rules are found using Predictive Apriori algorithm. One sample rule is shown
below
AI-4=HI 20 ==> AI-3=LO AI-2=LO 20 acc:(0.99454)
3. FPGrowth
Configuration, No of rules=100000, Minimum support: 0.25 (17 instances)
Minimum confidence: 0.1, Instances: 70, Attributes: 13
AI-3, AI-2, DI-7, DI-6, DI-5, DI-4, DI-3, DI-2, DI-1, AI-7, AI-6, AI-5, AI-4
FPGrowth found 47458 rules
Rules without NORMAL and FALSE attribute values are only displayed and no such rules are
found
FPGrowth supports only binary attribute values.
4. Tertius
Instances: 70, Attributes: 13
AI-3, AI-2, DI-7, DI-6, DI-5, DI-4, DI-3, DI-2, DI-1, AI-7, AI-6, AI-5, AI-4
Thirty two best rules are found using Tertius algorithm. Some sample rules is shown below.
AI-4 = HI ==> DI-7 = TRUE or DI-6 = TRUE
AI-5 = LO ==> AI-4 = HI
AI-4 = HI ==> DI-7 = TRUE
AI-4 = HI ==> DI-6 = TRUE
AI-4 = HI ==> AI-5 = LO
Highlighted rules are existing KB rules.
Computer Science & Information Technology (CS & IT) 371
Number of hypotheses considered: 73507
Number of hypotheses explored: 38490
6. COMPARISON OF ASSOCIATION ALGORITHMS
Comparison of Machine learning Association algorithms was required to find the pros and cons
of each algorithm. The Table 1 shows that out of these four algorithms Apriori and Tertius give
satisfactory results with respect to this application. The Apriori Association Algorithm requires
more time and memory if the number of attributes are high (more than 20 attributes). The
FPGrowth Association Algorithm supports only binary attribute values. The Predictive
Association Algorithm takes more time and will not work with more attributes. Tertius
Association Algorithm has been tested up to 250 attributes and got acceptable results. So it is
concluded that Tertius Association Algorithm is more suitable for our application as it can
support quite high number of attributes with highest number of valid results.
Table 1: Association Algorithms output comparison
7. CONCLUSIONS
The Learning Engine enhances the Expert System by forming new rules dynamically. The new
rules formed are validated by the domain expert and then the rules are updated to the
knowledgebase. The association based learning algorithms are compared and it was found that the
Tertius Algorithm is most suitable for this process application as it generates maximum number
of valid rules in shortest possible time. Hence this algorithm has been used for implementing the
Learning Engine.
ACKNOWLEDGEMENTS
Our special thanks to NTPC’s Rajiv Gandhi Combined Cycle Power Project (RGCCPP) at
Kayamkulam, Kerala for offering their domain expertise in developing the Expert System and
the Learning Engine for Operator Guidance and for allowing us to implement this system in the
plant.
Aprio ri F P Gro wth
Predictive
A prio ri
Tertius
No of attrib utes 1 3 1 3 1 3 1 3
No o f in stances 7 0 7 0 7 0 7 0
Tim e L ess than 1 min L ess than 1 m in M o re th an 5 h rs L ess th an 1 m in
Prop erties
M in CF =0. 1 M in CF =0. 1 M in CF =0. 1
M in sup p ort=0. 25 M in s up p ort=0.2 5 M in sup po rt=0.2 5
M ax su pp ort=1 M ax su pp ort=1 M ax su pp ort=1
Nu m rules=1 05 Nu m rules=1 05 N u m rules=1 05
No of rules
generated
7 0 2 3 3 2
Ex isting KB rules 4 0 0 9
372 Computer Science & Information Technology (CS & IT)
REFERENCES
[1] Peter Flach, Valentina Maraldi, Fabrizio Riguzzi. Algorithms for Efficiently and Effectively Using
Background Knowledge in Tertius.
[2] Rakesh Agrawal, Tomasz Imielinski, Arun Swami. 1993 Mining Association Rules between Sets of
Items in Large Databases. ACM
[3] Tom M. Mitchell. July 2006 The Discipline of Machine Learning
[4] Peter a. Flach, Nicolas Lachiche. Kluwer Academic Publishers, Boston. Manufactured in The
Netherlands.
[5] Confirmation-guided discovery of first-order rules with Tertius.
[6] Randall W. Pack, Paul M. Lazar, Renata V. Schmidt, Catherine D. Gaddy. Expert systems for
plant operations training and assistance.
[7] T. S. Dahl. March 1999. Background Knowledge in the Tertius First Order Knowledge Discovery
Tool. University of Bristol.
Authors
Abhir Raj Metkar obtained his bachelor's degree in Instrumentation Engineering in 1999
and Master's degree in Process Control Engineering in 2001. Currently he is working as a
Senior Engineer in Control and Instrumentation Group of CDAC Trivandrum.
Latha B Kaimal Graduated in Electronics and Communication Engineering from the
College of Engineering, Trivandrum in 1977. Joined the Digital Electronics R&D Group of
the State owned KELTRON group of companies in 1978 as Development Engineer. Was a
key member of the Computer and Communication Group in Electronics Research and
Development Centre of India (ER&DCI). Joined the Control & Instrumentation
Group(CIG) in 1994 and involved in the implementation of Distribution Automation
Project for Thiruvananthapuram city.Presently Associate Director in CIG in CDAC(T) and
working as the Project leader of “Development of Real Time Expert System Shell” project
Rakesh G obtained his bachelor's degree in Computer Engineering in 2005.Currently he is
working as a Senior Engineer in control and instrumentation group of CDAC Trivandrum
Involved in the design and development of "Real Time Expert System Shell” project under
the Automation Systems Technologies Programme ( ASTeC - “Learning” domain).

Weitere ähnliche Inhalte

Was ist angesagt?

Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...IRJET Journal
 
Classification of physiological diseases using eeg signals and machine learni...
Classification of physiological diseases using eeg signals and machine learni...Classification of physiological diseases using eeg signals and machine learni...
Classification of physiological diseases using eeg signals and machine learni...eSAT Journals
 
Network security situational awareness
Network security situational awarenessNetwork security situational awareness
Network security situational awarenessHuda Seyam
 
New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection Systemijsrd.com
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Drjabez
 
Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)ijdmtaiir
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tameSAT Journals
 
IRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-SurveyIRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-SurveyIRJET Journal
 
Genetic fuzzy process metric measurement system for an operating system
Genetic fuzzy process metric measurement system for an operating systemGenetic fuzzy process metric measurement system for an operating system
Genetic fuzzy process metric measurement system for an operating systemijcseit
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueIRJET Journal
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...idescitation
 
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...IRJET Journal
 
CBM Fault Detection by Carl Byington
CBM Fault Detection by Carl ByingtonCBM Fault Detection by Carl Byington
CBM Fault Detection by Carl ByingtonCarl Byington
 
IRJET- Pattern Recognition Process, Methods and Applications in Artificial In...
IRJET- Pattern Recognition Process, Methods and Applications in Artificial In...IRJET- Pattern Recognition Process, Methods and Applications in Artificial In...
IRJET- Pattern Recognition Process, Methods and Applications in Artificial In...IRJET Journal
 
A Survey on Machine Learning Algorithms
A Survey on Machine Learning AlgorithmsA Survey on Machine Learning Algorithms
A Survey on Machine Learning AlgorithmsAM Publications
 

Was ist angesagt? (18)

Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
 
Classification of physiological diseases using eeg signals and machine learni...
Classification of physiological diseases using eeg signals and machine learni...Classification of physiological diseases using eeg signals and machine learni...
Classification of physiological diseases using eeg signals and machine learni...
 
M43016571
M43016571M43016571
M43016571
 
Network security situational awareness
Network security situational awarenessNetwork security situational awareness
Network security situational awareness
 
New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection System
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools
 
Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tam
 
IRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-SurveyIRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-Survey
 
Genetic fuzzy process metric measurement system for an operating system
Genetic fuzzy process metric measurement system for an operating systemGenetic fuzzy process metric measurement system for an operating system
Genetic fuzzy process metric measurement system for an operating system
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...
 
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
 
CBM Fault Detection by Carl Byington
CBM Fault Detection by Carl ByingtonCBM Fault Detection by Carl Byington
CBM Fault Detection by Carl Byington
 
IRJET- Pattern Recognition Process, Methods and Applications in Artificial In...
IRJET- Pattern Recognition Process, Methods and Applications in Artificial In...IRJET- Pattern Recognition Process, Methods and Applications in Artificial In...
IRJET- Pattern Recognition Process, Methods and Applications in Artificial In...
 
A Survey on Machine Learning Algorithms
A Survey on Machine Learning AlgorithmsA Survey on Machine Learning Algorithms
A Survey on Machine Learning Algorithms
 
G046024851
G046024851G046024851
G046024851
 

Ähnlich wie SELF LEARNING REAL TIME EXPERT SYSTEM

Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesAnalysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesIRJET Journal
 
Decision Making and Autonomic Computing
Decision Making and Autonomic ComputingDecision Making and Autonomic Computing
Decision Making and Autonomic ComputingIOSR Journals
 
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...IRJET Journal
 
Citadel training on context awareness solution
Citadel training on context awareness solutionCitadel training on context awareness solution
Citadel training on context awareness solutionRamnGonzlezRuiz2
 
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningIRJET Journal
 
A Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
A Review on Reasoning System, Types, and Tools and Need for Hybrid ReasoningA Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
A Review on Reasoning System, Types, and Tools and Need for Hybrid ReasoningBRNSSPublicationHubI
 
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEMGENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEMijcseit
 
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEMGENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEMijcseit
 
STOCK MARKET PREDICTION USING NEURAL NETWORKS
STOCK MARKET PREDICTION USING NEURAL NETWORKSSTOCK MARKET PREDICTION USING NEURAL NETWORKS
STOCK MARKET PREDICTION USING NEURAL NETWORKSIRJET Journal
 
IRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big DataIRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big DataIRJET Journal
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10Dhairya Joshi
 
Expert Systems
Expert SystemsExpert Systems
Expert Systemsnvtagle
 
Deep Learning Vocabulary.docx
Deep Learning Vocabulary.docxDeep Learning Vocabulary.docx
Deep Learning Vocabulary.docxjaffarbikat
 
Literature Survey
Literature SurveyLiterature Survey
Literature Surveybutest
 
Self learning computer
Self learning computerSelf learning computer
Self learning computerijaia
 

Ähnlich wie SELF LEARNING REAL TIME EXPERT SYSTEM (20)

Active database
Active databaseActive database
Active database
 
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesAnalysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
 
Decision Making and Autonomic Computing
Decision Making and Autonomic ComputingDecision Making and Autonomic Computing
Decision Making and Autonomic Computing
 
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
 
Citadel training on context awareness solution
Citadel training on context awareness solutionCitadel training on context awareness solution
Citadel training on context awareness solution
 
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine Learning
 
.doc
.doc.doc
.doc
 
.doc
.doc.doc
.doc
 
A Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
A Review on Reasoning System, Types, and Tools and Need for Hybrid ReasoningA Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
A Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
 
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEMGENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
 
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEMGENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
GENETIC-FUZZY PROCESS METRIC MEASUREMENT SYSTEM FOR AN OPERATING SYSTEM
 
STOCK MARKET PREDICTION USING NEURAL NETWORKS
STOCK MARKET PREDICTION USING NEURAL NETWORKSSTOCK MARKET PREDICTION USING NEURAL NETWORKS
STOCK MARKET PREDICTION USING NEURAL NETWORKS
 
IRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big DataIRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big Data
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Deep Learning Vocabulary.docx
Deep Learning Vocabulary.docxDeep Learning Vocabulary.docx
Deep Learning Vocabulary.docx
 
Literature Survey
Literature SurveyLiterature Survey
Literature Survey
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Self learning computer
Self learning computerSelf learning computer
Self learning computer
 
EXECUTION OF ASSOCIATION RULE MINING WITH DATA GRIDS IN WEKA 3.8
EXECUTION OF ASSOCIATION RULE MINING WITH DATA GRIDS IN WEKA 3.8EXECUTION OF ASSOCIATION RULE MINING WITH DATA GRIDS IN WEKA 3.8
EXECUTION OF ASSOCIATION RULE MINING WITH DATA GRIDS IN WEKA 3.8
 

Mehr von cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

Mehr von cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Kürzlich hochgeladen

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Kürzlich hochgeladen (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

SELF LEARNING REAL TIME EXPERT SYSTEM

  • 1. Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013 pp. 361–372, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3641 SELF LEARNING REAL TIME EXPERT SYSTEM Latha B. Kaimal1 , Abhir Raj Metkar2 , and Rakesh G3 1,2,3 Control & Instrumentation Group, C-DAC,Thiruvanathapuram 1 latha@cdac.in, 2 ametkar@cdac.in, 3 rakeshg@cdac.in ABSTRACT In a Power plant with a Distributed Control System ( DCS ), process parameters are continuously stored in databases at discrete intervals. The data contained in these databases may not appear to contain valuable relational information but practically such a relation exists. The large number of process parameter values are changing with time in a Power Plant. These parameters are part of rules framed by domain experts for the expert system. With the changes in parameters there is a quite high possibility to form new rules using the dynamics of the process itself. We present an efficient algorithm that generates all significant rules based on the real data. The association based algorithms were compared and the best suited algorithm for this process application was selected. The application for the Learning system is studied in a Power Plant domain. The SCADA interface was developed to acquire online plant data. KEYWORDS Machine learning, Data Mining, Root cause analysis, Inference Engine, Tertius algorithm 1. INTRODUCTION Machine Learning Technique is a scientific discipline that is concerned with the design and development of algorithms that allow computers to evolve behaviors based on empirical data, such as from sensor data or databases. A major focus of machine learning research is to automatically learn to recognize complex patterns and make intelligent decisions based on data; the difficulty lies in the fact that the set of all possible behaviors given all possible inputs is too large to be covered by the set of observed examples (training data). Hence the learner must generalize from the given examples, so as to be able to produce a useful output in new cases[1][2]. Knowledge Based System (KBS) has an important role to play, particularly in fault diagnosis of process plants, which involve lot of challenges starting from commonly occurring malfunctions to rarely occurring emergency situations. Machine Learning is discovering new knowledge from large databases (Data Mining). The field of machine learning is concerned with methods that can automatically learn from experience. The experience is usually given in the form of learning examples from which machine learning methods can automatically learn a model. Sometimes it is very important that the learned model can be read by human, and one of the most understandable types of models are rule sets[3][4]. Expert systems are Knowledge-Based Systems(KBS) in which The Knowledge Base(KB) holds information and logical rules for performing inference between facts. The KBS approach is promising as it captures efficient problem-solving of experts, guides the human operator in rapid fault detection, explains the line of reasoning to the human operator, and supports modification
  • 2. 362 Computer Science & Information Technology (CS & IT) and refinement of the process knowledge as experience is gained. Real time Expert System Shell is a software development environment containing the basic components of expert systems. The Shell Toolkit can be used to develop Intelligent System for Diagnosis and Root Cause Analysis and operator guidance in process plants etc. The Expert System when enhanced with Learning Engine, updates the KB with new learned rules & thus improves the efficiency of the system in root cause analysis of faults. Figure. 1 Expert System Components 2. KNOWLEDGE REPRESENTATION Knowledge Base (KB): The system uses a Hybrid Knowledge base, the main components of which are Meta Rules, Rules & Frames. The Knowledge Base can be built with Domain specific information using the web based, user friendly Knowledge Base Editor GUI. A web based Knowledge Base Editor (KBE) provides facility to input different rules of an application by the domain expert using user-friendly GUI. Rules and other application specific attributes will be represented using Frames and Production rules. Knowledge base consists of domain specific information that is fed into the system through GUI. This information is used to interpret and diagnose real-time data received from controllers and sensors. The structures used to store knowledge consist of: Meta-rule: Structure - If Complaint Then Hypothesis Meta-Rules are the supervisory rules to categorize Sub-rules in broad areas or nodes. Meta rules decide what domain rules should be applied next or in what order they should be applied. Rules: Structure - If Condition Then Action Rules are basic components of the ‘Knowledge base’. The condition and action parts of the rules are defined as parameters. The condition and action parts can have more than one parameter separated by logical operators. The parameters are specific data variables, which are configurable by the user. Frames: Frames are general data structure holding the static information about any equipment or unit. 3. INFERENCE ENGINE The Inference Engine is the heart of the expert system. Since the expert system is intended for diagnosis of faults, a Backward Chaining inference strategy is preferred. This inference engine will use knowledge stored in Production Rules and Frames for arriving at a conclusion or a goal while performing a fault diagnosis using backward reasoning method
  • 3. Computer Science & Information Technology (CS & IT) 363 Figure. 2 Internal Block Diagram of Inference Engine Working Principle of Inference Engine: The critical alarms are made as Meta-rules and sub- causes are depicted as rules in the knowledgebase. When the critical alarm occurs in the system, the relevant meta-rule will be fired; consequently the rules having the condition part true will get fired in sequence till the final root cause of the failure is reached. The inference engine algorithms is as follows: Backward reasoning: Backward chaining involves, working back from possible conclusions of the system to the evidence, using the rules and frames. Thus backward chaining behaves in a goal-driven manner. One needs to know which possible conclusions of the system one wishes to test for. In frame based systems rules play an auxiliary role. Frames represent here a major source of knowledge both ‘methods’ and ‘demons’ are used to add actions to the frames. Goal can be established either in a method or in a demon. Inference Manager is used for processing of all rules based on the user input or SCADA input. Meta Rule Interpreter search through the Meta Rule set for finding out the complaints part (antecedent) which matches the user defined complaint/Alarm. Inference Manager gets the hypothesis list (in the consequent part of Meta Rule) and Load it into the Working memory. Then Inference Manager will process hypothesis based on the certainty factor one by one (Hypothesis with the highest CF processed first).Then Inference Manager searches through the Rule set for finding out the action part which matches the hypothesis (THEN) part of the Meta rule. Rule Interpreter gets the condition part of Rule and evaluate each parameter in it. For this Parameter Interpreter checks the parameter type. Parameter can be database type or (within the working memory) or frame type or GUI or Computed. Evaluated parameters are added to working memory. This process is repeated till all rules are evaluated. Fired rules and parameters evaluated are logged into the database for generating explanation by the Explanation module 4. LEARNING ENGINE DEVELOPMENT FOR ENHANCING EXPERT SYSTEM The Learning Engine is an extension of the Expert systems where new rules have to be learned by the shell for any domain. For this we need to do data preprocessing and data mining of the historic Data. The new rules generated have to be validated by the expert and then can be updated to the knowledge base. In our work we used Association based Learning methods for generating new rules from data[5]. To enhance the inferencing capability of Real time Expert System Shell new rules have to be found from the historic data. The parameter name and values from the historic data are used as Production Memory Get Initial Status Working Memory Meta Rule Interpreter Rule Interpreter Frame Interpreter KB/ DB GUI/CDI Inference Manager Parameter Interpreter
  • 4. 364 Computer Science & Information Technology (CS & IT) input for Learning Engine. For learning, the association between parameters at different time has to be found. The major Machine Learning Techniques are as below: Classification – Supervised data mining. Forms unseen classification. Numerical prediction – Subgroup of Classifier. Formed outcome is a numeric quantity and not a discrete class or classifier. Clustering – Unsupervised learning. Association – Any association of one or more than one attribute at a time. Figure 3: Architecture Diagram of Expert System with Learning Engine The output of Machine Learning algorithms can be of the form of Decision tables, Decision trees, Association rules, Clustering Diagrams etc. Association rule learning (Dependency modeling) - Searches for relationships between variables. Thus we have studied and compared the Association algorithms. 4.1 Association rule learning Association Mining is finding frequent patterns, associations, correlations or causal structures among sets of items or objects in transaction databases and other information repositories. When given a set of transactions, this will find rules that will predict the occurrence of an item based on the occurrences of other items in the transaction. Association rules are usually required to satisfy a user-specified minimum support and a user- specified minimum confidence at the same time. Association rule generation is usually split up into two separate steps: 1. First, minimum support is applied to find all frequent item sets in a database. 2. These frequent item sets and the minimum confidence constraint are used to form rules. In Association rule learning following algorithms were compared & results summarized: 1. Apriori 2. Predictive Apriori 3. FPGrowth 4. Tertius
  • 5. Computer Science & Information Technology (CS & IT) 365 4.1.1 Apriori In computer science and data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by customers, or details of a website frequentation). Apriori uses a "bottom up" approach, where frequent subsets are extended one item at a time (a step known as candidate generation), and groups of candidates are tested against the data. The algorithm Apriori, suffers from a number of inefficiencies or trade-offs, which have spawned other algorithms. Candidate generation generates large numbers of subsets (the algorithm attempts to load up the candidate set with as many as possible before each scan). Bottom-up subset exploration (essentially a breadth-first traversal of the subset lattice) finds any maximal subset S only after all 2 | S | − 1 of its proper subsets. 4.1.2 Predictive Apriori It searches with an increasing support threshold for the best 'n' rules concerning a support-based corrected confidence value. When evaluating association rules, rules that differ in both support and confidence have to be compared; a larger support has to be traded against a higher confidence. The constraint of Predictive Apriori is that it also creates transaction database before rule making and the time required for rule making was much high compared to other algorithms. 4.1.3 FP Growth FP Growth allows frequent itemset discovery without candidate itemset generation. It has two step approach: Step 1: Build a compact data structure called the FP-tree Built using 2 passes over the data-set. Step 2: Extracts frequent itemsets directly from the FP-tree Traversal through FP-Tree FP-Tree is an efficient algorithm for finding frequent patterns in transaction databases • A compact tree structure is used • Mining based on the tree structure is significantly more efficient than Apriori transaction databases The constraint of FP Tree is that it supports only binary attributes and also creates transaction database before rule making. 4.1.4 Tertius Tertius uses a top-down search algorithm when creating the association rules. The search first starts with an empty rule. Next, Tertius iteratively refines the rule by adding new-attribute values. Tertius continues to refine the rule as long as such refinements increase the confidence value. Finally, Tertius adds the rule and restarts the search to create new rules. Tertius ends when no additional rules can be created with sufficient confidence values. Afterwards, it returns the set of rules along with their confidence values.
  • 6. 366 Computer Science & Information Technology (CS & IT) Tertius does not create itemset and transaction databases. It starts directly from creating rules thus the algorithm implementation of Tertius requires less memory compared to the other association algorithms. 4.2 The Learning Module Implementation: Working Principle Knowledge discovery in databases is the process of identifying valid, novel, potentially useful, and ultimately understandable patterns or models in data. Data mining is a step in the knowledge discovery process consisting of particular data mining algorithms that, under some acceptable computational efficiency limitations, find patterns or models in data. This Learning Engine was developed as an enhancement module to the Real Time Expert System for Root Cause Analysis of alarms in Plants. The development is done using Java and Flex languages and uses MySql database. In power plants application we have to take into consideration the historic data, online data for updating the knowledge base with the new knowledge acquired. Figure 4 shows the general architecture of the Learning Engine Module. The Learning Engine Module mainly consists of the following sub modules: User Interface Preprocessor Algorithm implementer Post processor Rule Validator Figure 4: Block Architecture Diagram of Learning Engine The administrator/user can initiate the Learning process from the GUI. The data has to be selected from the history by configuring the start time/date to end time/date for Learning Engine. Figure 5 shows the start/end date and parameter selection configuaration.
  • 7. Computer Science & Information Technology (CS & IT) 367 4.2.1 Preprocessor This data in the historian data base has to be preprocessed and the suitable output structure has to be created before feeding to the Learning algoritm model to get the output. The history data preprocessing involves the following methods. 1. Data cleaning - The historic data contains the field ‘Quality’ with data 1(good) and 0 (bad). Filter out or discard instances with quality attribute value 0. 2. Data transformation- Data Transformation involves conversion of the data value (Parameter Value) using alarm code mapping to corresponding nominal values 3. Data reduction –The unwanted columns in the historic data are to be removed. The historic data after preprocessing has to be fed to the Learning algorithms. Figure 5: Learning Engine- Prepocessor 4.2.2 Algorithm Implementer The pre-processed learning data table in database is the input to Algorithm Implementer module. This module is using Tertius algorithm as found most suitable among the association algorithms for this domain of application. Tertius does a complete top-down A* search over the space of possible rules. If you have ‘A’ attributes with on the average ‘V’ values and search for rules with up to ‘n’ literals, the number of possible rules is of the order (AV)n. The output is the set of rules from the Rule generator block. The parameters which are configurable for Tertius algorithm are Confirmation Threshold and Frequency Threshold whose default values are set as 0.3 and 0.1 respectively.
  • 8. 368 Computer Science & Information Technology (CS & IT) Figure 6: Learning Engine- New rules formation 4.2.3 Post processor Module The input to this module is the set of rules generated from the rule generator(Algorithm Implementer) module. The rules generated have to be post processed so that it is in the same format as the Knowledge Base(KB) Rules. The rules with normal conditions (in both head and body) have to be discarded as only rules for alarm conditions are present in Knowledge Base. The duplicate rules have to be removed as part of post processing i.e with literals reverse in head and body. The rules shall be in the if-then format as in the KB. Post processor module converts the rules generated to if-then format. 4.2.4 Rule Validator The input to the Rule Validator module is the Postprocessor module output rules. The Rule Validator compares the input rules with the existing Knowledge Base Rules. If the rule already exists in Knowledge Base, it is discarded. The new rules are output to the GUI. After confirmation from domain expert, the Knowledge Base. is updated with the new rules. Figure 7: Learning Engine- Rule added to Knowledgebase
  • 9. Computer Science & Information Technology (CS & IT) 369 5. APPLICATION The data used for the testing is generated from a Plant Test Setup using Analog and Digital Input cards connected to suitable sources. The interface between Plant Distributed Control System (DCS) and Expert System is via OPC DA. The alarm “MS Header Temp LO” is considered for testing. This is an actual alarm studied from NTPC Plant. Figure 8: Fault Tree for Alarm: MS Header Temp low Historic data is read from database and analog values are converted to nominal type for inputting to association algorithms. Here 13 attributes (6 analog and 7 digital) and 70 instances are used for testing. The test data is given as shown below. attribute 1- AI-3 {LO,NORMAL} attribute 2- AI-2 {LO,NORMAL} attribute 3- DI-7 {TRUE,FALSE}attribute 4- DI-6 {TRUE,FALSE} attribute 5- DI-5 {TRUE,FALSE}attribute 6- DI-4 {TRUE,FALSE} attribute 7- DI-3 {TRUE,FALSE}attribute 8- DI-2 {TRUE,FALSE} attribute 9- DI-1 {TRUE,FALSE}attribute 10-AI-7 {LO,NORMAL} attribute 11-AI-6 {LO,NORMAL}attribute 12-AI-5 {LO,NORMAL} attribute 13-AI-4 {HI,NORMAL} Existing Knowledge Base Rules If AI-3<30(LO) OR DI-1=True OR AI-7<45(LO) OR DI-4=True Then AI-2<50(LO) If AI-4>25(HI) OR AI-6<20(LO) OR DI-4=TRUE Then AI-3<30(LO) FWtemp at econI/L low?(AI-5< 28) MSheader temperature low? (AI- 2<50) L/Rsystem temperature control on Manual? (DI-1) CV position difference from control signal? (AI-7< 45) L/Rspray CVclosed? (AI-3< 30) Oxygen in FG low?(AI-6< 20) No fault System temperature control on manual (DI-2) Control Valve Stuck (DI-3)SHTubes soot deposit/ Running Burners trip (DI- 4) RH/SH Soot deposit(DI-7) FW Htrs Problems(DI- 6) FWdiff tempacross econ high?(AI- 4< 25) Low excess air (DI-5) No Yes No No No No Yes Yes No Yes Yes Yes Yes
  • 10. 370 Computer Science & Information Technology (CS & IT) If AI-5 < 28(LO) OR DI-7 = True Then AI-4>25(HI) If DI-6 = True Then AI-5<28(LO) If DI-5 = True Then AI-6<20(LO) If DI-2 = True Then DI-1=True If DI-3 = True Then AI-7<45(LO) Algorithm Run Outputs 1. Apriori Configuration No of rules=100000 , Minimum support: 0.25 (17 instances) confidence: 0.1, Instances: 70, Attributes: 13 AI-3, AI-2, DI-7, DI-6, DI-5, DI-4, DI-3, DI-2, DI-1, AI-7, AI-6, AI-5, AI-4 Best rules found: Seven best rules are found using Apriori algorithm. One sample rule is shown below AI-3=LO 40 ==> AI-2=LO 40 conf:(1) 2. Predictive Apriori Configuration No of rules=100000, Instances: 70, Attributes: 13 AI-3, AI-2, DI-7, DI-6, DI-5, DI-4, DI-3, DI-2, DI-1, AI-7, AI-6, AI-5, AI-4 Best rules found: Twenty three best rules are found using Predictive Apriori algorithm. One sample rule is shown below AI-4=HI 20 ==> AI-3=LO AI-2=LO 20 acc:(0.99454) 3. FPGrowth Configuration, No of rules=100000, Minimum support: 0.25 (17 instances) Minimum confidence: 0.1, Instances: 70, Attributes: 13 AI-3, AI-2, DI-7, DI-6, DI-5, DI-4, DI-3, DI-2, DI-1, AI-7, AI-6, AI-5, AI-4 FPGrowth found 47458 rules Rules without NORMAL and FALSE attribute values are only displayed and no such rules are found FPGrowth supports only binary attribute values. 4. Tertius Instances: 70, Attributes: 13 AI-3, AI-2, DI-7, DI-6, DI-5, DI-4, DI-3, DI-2, DI-1, AI-7, AI-6, AI-5, AI-4 Thirty two best rules are found using Tertius algorithm. Some sample rules is shown below. AI-4 = HI ==> DI-7 = TRUE or DI-6 = TRUE AI-5 = LO ==> AI-4 = HI AI-4 = HI ==> DI-7 = TRUE AI-4 = HI ==> DI-6 = TRUE AI-4 = HI ==> AI-5 = LO Highlighted rules are existing KB rules.
  • 11. Computer Science & Information Technology (CS & IT) 371 Number of hypotheses considered: 73507 Number of hypotheses explored: 38490 6. COMPARISON OF ASSOCIATION ALGORITHMS Comparison of Machine learning Association algorithms was required to find the pros and cons of each algorithm. The Table 1 shows that out of these four algorithms Apriori and Tertius give satisfactory results with respect to this application. The Apriori Association Algorithm requires more time and memory if the number of attributes are high (more than 20 attributes). The FPGrowth Association Algorithm supports only binary attribute values. The Predictive Association Algorithm takes more time and will not work with more attributes. Tertius Association Algorithm has been tested up to 250 attributes and got acceptable results. So it is concluded that Tertius Association Algorithm is more suitable for our application as it can support quite high number of attributes with highest number of valid results. Table 1: Association Algorithms output comparison 7. CONCLUSIONS The Learning Engine enhances the Expert System by forming new rules dynamically. The new rules formed are validated by the domain expert and then the rules are updated to the knowledgebase. The association based learning algorithms are compared and it was found that the Tertius Algorithm is most suitable for this process application as it generates maximum number of valid rules in shortest possible time. Hence this algorithm has been used for implementing the Learning Engine. ACKNOWLEDGEMENTS Our special thanks to NTPC’s Rajiv Gandhi Combined Cycle Power Project (RGCCPP) at Kayamkulam, Kerala for offering their domain expertise in developing the Expert System and the Learning Engine for Operator Guidance and for allowing us to implement this system in the plant. Aprio ri F P Gro wth Predictive A prio ri Tertius No of attrib utes 1 3 1 3 1 3 1 3 No o f in stances 7 0 7 0 7 0 7 0 Tim e L ess than 1 min L ess than 1 m in M o re th an 5 h rs L ess th an 1 m in Prop erties M in CF =0. 1 M in CF =0. 1 M in CF =0. 1 M in sup p ort=0. 25 M in s up p ort=0.2 5 M in sup po rt=0.2 5 M ax su pp ort=1 M ax su pp ort=1 M ax su pp ort=1 Nu m rules=1 05 Nu m rules=1 05 N u m rules=1 05 No of rules generated 7 0 2 3 3 2 Ex isting KB rules 4 0 0 9
  • 12. 372 Computer Science & Information Technology (CS & IT) REFERENCES [1] Peter Flach, Valentina Maraldi, Fabrizio Riguzzi. Algorithms for Efficiently and Effectively Using Background Knowledge in Tertius. [2] Rakesh Agrawal, Tomasz Imielinski, Arun Swami. 1993 Mining Association Rules between Sets of Items in Large Databases. ACM [3] Tom M. Mitchell. July 2006 The Discipline of Machine Learning [4] Peter a. Flach, Nicolas Lachiche. Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. [5] Confirmation-guided discovery of first-order rules with Tertius. [6] Randall W. Pack, Paul M. Lazar, Renata V. Schmidt, Catherine D. Gaddy. Expert systems for plant operations training and assistance. [7] T. S. Dahl. March 1999. Background Knowledge in the Tertius First Order Knowledge Discovery Tool. University of Bristol. Authors Abhir Raj Metkar obtained his bachelor's degree in Instrumentation Engineering in 1999 and Master's degree in Process Control Engineering in 2001. Currently he is working as a Senior Engineer in Control and Instrumentation Group of CDAC Trivandrum. Latha B Kaimal Graduated in Electronics and Communication Engineering from the College of Engineering, Trivandrum in 1977. Joined the Digital Electronics R&D Group of the State owned KELTRON group of companies in 1978 as Development Engineer. Was a key member of the Computer and Communication Group in Electronics Research and Development Centre of India (ER&DCI). Joined the Control & Instrumentation Group(CIG) in 1994 and involved in the implementation of Distribution Automation Project for Thiruvananthapuram city.Presently Associate Director in CIG in CDAC(T) and working as the Project leader of “Development of Real Time Expert System Shell” project Rakesh G obtained his bachelor's degree in Computer Engineering in 2005.Currently he is working as a Senior Engineer in control and instrumentation group of CDAC Trivandrum Involved in the design and development of "Real Time Expert System Shell” project under the Automation Systems Technologies Programme ( ASTeC - “Learning” domain).