skip to main content
research-article

Techniques for knowledge acquisition in dynamically changing environments

Published:04 May 2012Publication History
Skip Abstract Section

Abstract

Intelligent agents often have the same or similar tasks and sometimes they cooperate to solve a given problem. These agents typically know how to observe their local environment and how to react on certain observations, for instance, and this knowledge may be represented in form of rules. However, many environments are dynamic in the sense that from time to time novel rules are required or old rules become obsolete. In this article we propose and investigate new techniques for knowledge acquisition by novelty detection and reaction as well as obsoleteness detection and reaction that an agent may use for self-adaptation to new situations. For that purpose we consider classifiers based on probabilistic rules. Premises of new rules are learned autonomously while conclusions are either obtained from human experts or from other agents which have learned appropriate rules in the past. By means of knowledge exchange, agents will efficiently be enabled to cope with situations they were not confronted with before. This kind of collaborative intelligence follows the human archetype: Humans are able to learn from each other by communicating learned rules. We demonstrate some properties of the knowledge acquisition techniques using artificial data as well as data from the field of intrusion detection.

References

  1. Aggarwal, C. C., Han, J., Wang, J., and Yu, P. S. 2003. A framework for clustering evolving data streams. In Proceedings of the 29th International Conference on Very Large Data Bases. 81--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Andrade, D., Horeis, T., and Sick, B. 2008. Knowledge fusion using Dempster-Shafer theory and the imprecise Dirichlet model. In Proceedings of the IEEE Conference on Soft Computing in Industrial Applications (SMCia). 142--148.Google ScholarGoogle Scholar
  3. Bishop, C. M. 2006. Pattern Recognition and Machine Learning. Springer, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Buchtala, O., Hofmann, A., and Sick, B. 2003. Fast and efficient training of RBF networks. In Artificial Neural Networks and Neural Information Processing -- ICANN/ICONIP 2003 (Joint International Conference), O. Kaynak, E. Alpaydin, E. Oja, and L. Xu, Eds. Lecture Notes in Computer Science, vol. 2714. Springer, 43--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Buchtala, O. and Sick, B. 2007. Functional knowledge exchange within an intelligent distributed system. In Architecture of Computing Systems -- ARCS 2007, P. Lukowicz, L. Thiele, and G. Tröster, Eds. Lecture Notes in Computer Science, vol. 4415. Springer, 126--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cateni, S., Colla, V., and Vannucci, M. 2008. Outlier detection methods for industrial applications. In Advances in Robotics, Automation and Control, J. Aramburo and A. R. Trevino, Eds. IN-TECH, 265--282.Google ScholarGoogle Scholar
  7. Clifton, D., Bannister, P., and Tarassenko, L. 2007. A framework for novelty detection in jet engine vibration data. Key Engin. Mater. 347, 305--312.Google ScholarGoogle ScholarCross RefCross Ref
  8. Costantini, S. and Tocchio, A. 2005. Learning by knowledge exchange in logical agents. In 6th AI*IA/TABOO Joint Workshop “From Objects to Agents”. 1--8.Google ScholarGoogle Scholar
  9. Declercq, A. and Piater, J. H. 2008. Online learning of gaussian mixture models: A two-level approach. In Proceedings of the 3rd International Conference on Computer Vision Theory and Applications. Vol. 1. 605--611.Google ScholarGoogle Scholar
  10. Duda, R. O., Hart, P. E., and Stork, D. G. 2001. Pattern Classification. John Wiley & Sons, Chichester, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fisch, D., Hofmann, A., Hornik, V., Dedinski, I., and Sick, B. 2008. A framework for large-scale simulation of collaborative intrusion detection. In Proceedings of the IEEE Conference on Soft Computing in Industrial Applications. 125--130.Google ScholarGoogle Scholar
  12. Fisch, D., Hofmann, A., and Sick, B. 2010a. On the versatility of radial basis function neural networks: A case study in the field of intrusion detection. Inf. Sci. 180, 12, 2421--2439. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Fisch, D., Jänicke, M., Kalkowski, E., and Sick, B. 2009. Learning by teaching versus learning by doing: Knowledge exchange in organic agent systems. In Proceedings of the IEEE Symposium on Intelligent Agents (IA '09). 31--38.Google ScholarGoogle Scholar
  14. Fisch, D., Kühbeck, B., Sick, B., and Ovaska, S. 2010b. So near and yet so far: New insight into the relationship between some well-known classifier paradigms. Inf. Sci. 180, 18, 3381--3401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Fisch, D. and Sick, B. 2009. Training of radial basis function classifiers with resilient propagation and variational Bayesian inference. In Proceedings of the International Joint Conference on Neural Networks (IJCNN '09). 838--847. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hettich, S. and Bay, S. D. 1999. The UCI KDD archive. http://kdd.ics.uci.edu.Google ScholarGoogle Scholar
  17. Hickinbotham, S. J. and Austin, J. 2000. Neural networks for novelty detection in airframe strain data. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN). Vol. 6. 375--380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Hofmann, A. and Sick, B. 2010. On-Line intrusion alert aggregation with generative data stream modeling. IEEE Trans. Depend. Secure Comput. http://doi.ieeecomputersociety.org/10.1109/TDSC.2009.36). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jakob, M., Tozicka, J., and Pechoucek, M. 2007. Collaborative learning with logic-based models. In Adaptive Agents and Multi-Agents Systems, K. Tuyls, A. Nowe, Z. Guessoum, and D. Kudenko, Eds., Lecture Notes in Computer Science, vol. 4865. Springer, 102--116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Lauer, M. 2001. A mixture approach to novelty detection using training data with outliers. In Proceedings of the 12th European Conference on Machine Learning (EMCL), L. D. Raedt and P. Flach, Eds. 300--311. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Lee, H.-j. and Roberts, S. 2008. On-Line novelty detection using kalman filters and extreme value theory. In Proceedings of the 19th International Conference on Pattern Recognition (ICPR '08). 1--4.Google ScholarGoogle Scholar
  22. Markou, M. and Singh, S. 2003a. Novelty detection: A review -- Part 1: Statistical approaches. Signal Process. 83, 12, 2481--2497. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Markou, M. and Singh, S. 2003b. Novelty detection: A review -- Part 2: Neural network based approaches. Signal Process. 83, 12, 2499--2521. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Mnif, M. and Müller-Schloer, C. 2006. Quantitative emergence. In Proceedings of the IEEE Mountain Workshop on Adaptive and Learning Systems. 78--84.Google ScholarGoogle Scholar
  25. Pollard, D. 2002. A User's Guide to Measure Theoretic Probability. Cambridge University Press.Google ScholarGoogle Scholar
  26. Roberts, S. 1999. Novelty detection using extreme value statistics. IEEE Proc. Vis. Image Signal Process. 146, 3, 124--129.Google ScholarGoogle ScholarCross RefCross Ref
  27. Song, M. and Wang, H. 2005. Highly efficient incremental estimation of gaussian mixture models for online data stream clustering. In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, K. L. Priddy, Ed. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series Series, vol. 5803. 174--183.Google ScholarGoogle Scholar
  28. Stauffer, C. and Grimson, W. 1999. Adaptive background mixture models for real-time tracking. In Proceedings IEEE Computer Society Conference on Computer Vision and Pattern. Vol. 2. 246--252.Google ScholarGoogle Scholar
  29. Tan, M. 1997. Multi-Agent reinforcement learning: Independent vs. cooperative agents. Read. Agents, 487--494. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Weiss, C. and Zell, A. 2008. Novelty detection and online learning for vibration-based terrain classification. In Proceedings of the 10th International Conference on Intelligent Autonomous Systems (IAS). 16--25.Google ScholarGoogle Scholar
  31. Würtz, R. P., Ed. 2008. Organic Computing. Understanding Complex Systems. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Yamanishi, K., Takeuchi, J.-I., Williams, G., and Milne, P. 2004. On-Line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Min. Knowl. Discov. 8, 3, 275--300. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Zhou, A., Cao, F., Yan, Y., Sha, C., and He, X. 2007. Distributed data stream clustering: A fast em-based approach. In Proceedings of the IEEE 23rd International Conference on Data Engineering. 736--745.Google ScholarGoogle Scholar

Index Terms

  1. Techniques for knowledge acquisition in dynamically changing environments

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Autonomous and Adaptive Systems
      ACM Transactions on Autonomous and Adaptive Systems  Volume 7, Issue 1
      Special section on formal methods in pervasive computing, pervasive adaptation, and self-adaptive systems: Models and algorithms
      April 2012
      365 pages
      ISSN:1556-4665
      EISSN:1556-4703
      DOI:10.1145/2168260
      Issue’s Table of Contents

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 May 2012
      • Accepted: 1 November 2010
      • Revised: 1 September 2010
      • Received: 1 January 2010
      Published in taas Volume 7, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader