Abstract
The problem addressed, in this chapter, pertains to how to represent and apply knowledge to best facilitate its extension and use in problem solving. Unlike deductive logics (e.g., the predicate calculus), an inherent degree of error is allowed for so as to greatly enlarge the inferential space. This allowance, in turn, implies the application of heuristics (e.g., multiple analogies) to problem solving as well as their indirect use in inferring the heuristics themselves. This chapter is motivated by the science of inductive inference. Examples of state-space search, linguistic applications, and a focus methodology for generating novel knowledge (components) for wartime engagement for countering (cyber) threats (WAMS) are provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Feigenbaum, E.A., McCorduck, P.: The Fifth Generation. Addison-Wesley Publishing Co., Reading, MA (1983)
Stilwell, A.: SAS and Elite Forces Guide Special Forces in Action. Lyons Press, Guilford, CN (2012)
Shi, L-X., Peng, W-L., Zhang, W-N.: Research on reusable design information of shoes based on CBR. In: 2012 International Conference on Solid State Devices and Materials Science. Physics Procedia—Elsevier, vol. 25 pp. 2089–2095 (2012)
Fan, Z-P., Li, Y-H., Wang, X., Liu, Y.: Hybrid similarity measure for case retrieval in CBR and its application to emergency response towards gas explosion. Expert Syst. Appl. 41, 2526–2534 (2014) (Elsevier)
Khanuma, A., Muftib, M., Javeda, M.Y., Shafiqa, M.Z.: Fuzzy case-based reasoning for facial expression recognition. Fuzzy Sets Syst. 160, 231–250 (2009)
Sampaio, L.N., Tedesco, P.C.A.R., Monteiro, J.A.S., Cunha, P.R.F.: A knowledge and collaboration-based CBR process to improve network performance-related support activities. Expert Syst. Appl. 41, 5466–5482 (2014)
Lao, S.I., Choy, K.L., Ho, G.T.S., Yam, R.C.M., Tsim, Y.C., Poon, T.C.: Achieving quality assurance functionality in the food industry using a hybrid case-based reasoning and fuzzy logic approach. Expert Syst. Appl. 39, 5251–5261 (2012)
Kumar, Y.J., Salim, N., Abuobieda, A., Albaham, A.T.: Multi document summarization based on news components using fuzzy cross-document relations. Appl. Soft Comput. 21, 265–279 (2014)
Rubin, S.H.: Case-based generalization (CBG) for increasing the applicability and ease of access to case-based knowledge for predicting COAs. NC No. 101366 (2011)
Rubin, S.H.: Multilevel constraint-based randomization adapting case-based learning to fuse sensor data for autonomous predictive analysis. NC 101614 (2012)
Chaitin, G.J.: Randomness and mathematical proof. Sci. Am. 232(5), 47–52 (1975)
Rubin, S.H.: On randomization and discovery. Inform. Sci. 177(1), 170–191 (2007)
Solomonoff, R.: A new method for discovering the grammars of phrase structure languages. In: Proceedings of International Conference Information Processing, pp. 285–290. UNESCO Publishing House, Paris, France (1959)
Solomonoff, R.: A formal theory of inductive inference. Inform. Contr. 7, 1–22 and 224–254 (1964)
Honavar, V., Slutzki, G. (eds.): Grammatical inference. In: Proceedings of Lecture Notes in Artificial Intelligence, vol. 1433. Springer, Berlin, Germany (1998)
Fu, K.S.: Syntactic Pattern Recognition and Applications. Prentice-Hall Advances in Computing Science and Technology Series, Englewood Cliffs, NJ (1982)
Uspenskii, V.A.: Gödel’s Incompleteness Theorem. Ves Mir Publishers, Russian, Moscow (1987)
Rubin, S.H.: Computing with words. IEEE Trans. Syst. Man Cybern. Part B 29(4), 518–524 (1999)
Bouabana-Tebibel, T., Rubin, S.H. (eds.): Integration of Reusable Systems. Springer International Publishing, Switzerland (2014)
Nilsson, N.J.: Principles of Artificial Intelligence. Tioga Pub. Co., Palo Alto, CA (1980)
The U.S. Army Field Manual No. 3–24: Marine Corps Counterinsurgency Field Manual No. 3–33.5. The University of Chicago Press, Chicago (2007)
Bilinski, M.: Compiler Techniques as a Defense Against Cyber Attacks. Machine Learning Series, SSC-PAC (2014)
Deitel, H.M.: An Introduction to Operating Systems. Prentice Hall, Inc., Upper Saddle River, NJ (1984)
Rubin, S.H., Lee, G., Chen, S.C.: A Case-Based Reasoning Decision Support System for Fleet Maintenance. Naval Engineers J., NEJ-2009-05-STP-0239. R1, 1–10 (2009)
Rubin, S.H.: Multi-Level Segmented Case-Based Learning Systems for Multi-Sensor Fusion. NC No. 101451 (2011)
Minton, S.: Learning Search Control Knowledge: An Explanation Based Approach, vol. 61. Kluwer International Series in Engineering and Computer Science, New York (1988)
Rubin, S.H.: Is the kolmogorov complexity of computational intelligence bounded above? In: Proceedings of the 2011 IEEE International Conference on Information Reuse and Integration (IRI), pp. 455–461. Las Vegas, NV (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix I: The 3-2-1 Skew
The 3-2-1 skew is a simple (fast) methodology for assigning knowledge relative weights on the basis of Denning’s principle of temporal locality [23]. More recent knowledge tends to be proportionately more valuable. This skew is used to increase the likelihood of solving a problem by taking full advantage of the current operational domain profile (Fig. 3.3).
Knowledge is acquired at the logical head and moved there when fired. It is also expunged from the logical tail when necessary to release space. The selection of a particular skew is domain specific. For example, the rate of radioactive decay is known to be proportional to how much radioactive material is left (excluding the presence of certain metals). The nuclear decay equation may be used as a skew for various radioactive materials and is given by \(A(t) = A_{0} e^{ - \lambda t}\). Here, A(t) is the quantity of radioactive material at time t, and A0 = A(0) is the initial quantity. \(\lambda\) (lambda) is a positive number (i.e., the decay constant) defining the rate of decay for the particular radioactive material. A countably infinite number of other skews may be applicable.
In the following assignment of skew-weights, the skew vector, S, favors the logical head of the case base in keeping with temporal locality. Cases, which were most-recently acquired or fired, and thus appear at or nearer to the logical head of a case-base, are proportionately more heavily weighted under the 3-2-1 skew. Of course, this differs from a uniform skew. The closer a case is to the top of its linked list, the greater its weight or importance. A heuristic scheme (i.e., the 3-2-1 skew) for achieving this with a dependency category consisting of d rules is to assign the head case a weight of \(\frac{2d}{d(d + 1)}\). The map just below the head map has a weight of \(\frac{2(d - 1)}{d(d + 1)}\).
Finally, the tail map of the segmented case base has a weight of \(\frac{2}{d(d + 1)}\). The ith map from the head has a weight of \(\frac{2(d - i + 1)}{d(d + 1)}\), for i = 1, 2, …, d. For example, using a vector of four weights, the 3-2-1 skew (S) is S = (0.4, 0.3, 0.2, 0.1)T. There are a countably infinite number of possible skews, such that \(\sum {s_{k} } = 1.0\).
The evaluation of the members of a dependency category is the contiguous weighted sum of its constituent elements. A 3-2-1 skew is defined where the ith map from the head has a weight of \(\frac{2(d - i + 1)}{d(d + 1)}\), for i = 1, 2, …, d; where, d specifies the number of terms in the skew. The use of the 3-2-1 skew is optional (i.e., in comparison with uniform weighting) and is useful for domains where the value of the data deteriorates in linear proportion to its time of collection—valuing more recent data, more highly [27]. The use of additional time-dependent weights, depending on whether there is an additional time dependency of the value of the knowledge, is also possible.
Appendix II: Performer Capabilities
Stuart H. Rubin, PI, received a Ph.D. in Computer and Information Science from Lehigh University in 1988. He was previously an ONT Post-Doctoral Fellow, at NOSC, for 3 years and a tenured associate professor of computer science at Central Michigan University. He has over 30 Assigned Navy Patents, over 287 Refereed Publications, and received SSC-PAC’s Publication of the Year Awards in 2007, 2009, 2010, and 2011. He is a SIRI Fellow and serves in leadership roles in numerous IEEE technical societies.
Thouraya Bouabana Tebibel received a Ph.D. in Computer Science from USTHB University (Algeria) in collaboration with Pierre & Marie Curie University (France) in 2007. She has been an engineer/researcher for eight years and is now a full professor of computer science at Ecole Nationale Supérieure d’Informatique in Algeria. She has over 80 refereed publications and a book edited by Editions Universitaires Européennes. She has successfully conducted numerous research projects and supervised 30 BS, 17 MS, and 4 Ph.D. theses.
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rubin, S.H., Bouabana-Tebibel, T. (2016). Naval Intelligent Authentication and Support Through Randomization and Transformative Search. In: Nakamatsu, K., Kountchev, R. (eds) New Approaches in Intelligent Control. Intelligent Systems Reference Library, vol 107. Springer, Cham. https://doi.org/10.1007/978-3-319-32168-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-32168-4_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32166-0
Online ISBN: 978-3-319-32168-4
eBook Packages: EngineeringEngineering (R0)