Professional Documents
Culture Documents
Download textbook Current Approaches In Applied Artificial Intelligence 28Th International Conference On Industrial Engineering And Other Applications Of Applied Intelligent Systems Iea Aie 2015 Seoul South Korea June ebook all chapter pdf
Download textbook Current Approaches In Applied Artificial Intelligence 28Th International Conference On Industrial Engineering And Other Applications Of Applied Intelligent Systems Iea Aie 2015 Seoul South Korea June ebook all chapter pdf
https://textbookfull.com/product/artificial-intelligence-in-
education-17th-international-conference-aied-2015-madrid-spain-
june-22-26-2015-proceedings-1st-edition-cristina-conati/
Current Approaches
in Applied Artificial
LNAI 9101
Intelligence
28th International Conference
on Industrial, Engineering and Other Applications
of Applied Intelligent Systems, IEA/AIE 2015
Seoul, South Korea, June 10–12, 2015, Proceedings
123
Lecture Notes in Artificial Intelligence 9101
Current Approaches
in Applied Artificial
Intelligence
28th International Conference
on Industrial, Engineering and Other Applications
of Applied Intelligent Systems, IEA/AIE 2015
Seoul, South Korea, June 10–12, 2015
Proceedings
ABC
Editors
Moonis Ali Juntae Kim
Texas State University Dongguk University
San Marcos, Texas Seoul
USA Korea, Republic of (South Korea)
Chang-Hwan Lee
Dongguk University
Seoul
Korea, Republic of (South Korea)
The International Society of Applied Intelligence (ISAI), through its annual IEA/AIE
conferences, provides a forum for the international scientific and industrial community
in the field of applied artificial intelligence to interactively participate in developing
intelligent systems that are needed to solve the 21st century’s ever-growing problems in
almost every field.
The 28th International Conference on Industrial, Engineering & Other Applications
of Applied Intelligent Systems (IEA/AIE 2015), held at COEX, Seoul, Korea from June
10 to 12, 2015, followed the IEA/AIE tradition of providing an international scientific
forum for researchers in the diverse field of applied artificial intelligence.
IEA/AIE 2015 accepted 72 papers for inclusion in these proceedings out of many
papers submitted from 36 different countries. Each paper was reviewed by at least two
members of Program Committee, thereby facilitating the selection of high-quality pa-
pers. The papers in the proceedings cover a wide range of topics in applied artificial
intelligence including reasoning, robotics, cognitive modeling, machine learning, pat-
tern recognition, optimization, text mining, social network analysis, and evolutionary
algorithms. These proceedings cover both the theory and applications of applied in-
telligent systems. Together, these papers highlight new trends and frontiers of applied
artificial intelligence and show how new research could lead to innovative applications
of considerable practical significance.
It was a great pleasure for us to organize this event. However, we could not have
done it without the valuable help of many colleagues around the world. First we would
like to thank the Organizing Committee members and Program Committee members for
their extremely hard work and the timely return of their comprehensive reports. Without
them, it would have been impossible to make decisions and to produce such high-quality
proceedings on time. Second, we would like to acknowledge the contributions of all the
authors of the papers submitted to the conference.
We also would like to thank our main sponsor, ISAI. The following cooperating
organizations deserve our gratitude: the Association for the Advancement of Artificial
Intelligence (AAAI), the Association for Computing Machinery (ACM/SIGART), the
Austrian Association for Artificial Intelligence (GAI), the Catalan Association for Ar-
tificial Intelligence (ACIA), the International Neural Network Society (INNS), the Ital-
ian Association for Artificial Intelligence (AI*IA), the Japanese Society for Artificial
Intelligence (JSAI), Korea Business Intelligence and Data Mining Society, Korean In-
formation Processing Society (KIPS)., the Lithuanian Computer Society - Artificial In-
telligence Section (LIKS-AIS), the Spanish Society for Artificial Intelligence (AEPIA),
the Society for the Study of Artificial Intelligence and the Simulation of Behaviour
(AISB), the Taiwanese Association for Artificial Intelligence (TAAI), the Taiwanese
VI Preface
Association for Consumer Electronics (TACE), and Texas State University – San Mar-
cos. We would also like to thank the keynote speakers who shared their vision on appli-
cations of intelligent systems.
Program Chairs
Juntae Kim Dongguk University Seoul, Korea
Kyoung-Jae Kim Dongguk University, Seoul, Korea
Jae. C. Oh Syracuse University, USA
Local Chairs
Byungun Yoon Dongguk University, Seoul, Korea
Mina Jung Syracuse University, USA
Finance Chair
Yung-Seop Lee Dongguk University, Seoul, Korea
Publication Chair
Seoung Bum Kim Korea University, Seoul, Korea
Web Chair
Chan-Kyoo Park Dongguk University, Seoul, Korea
Advisory Committee
Sungzoon Cho Seoul National University, Seoul, Korea
Hyunjoong Kim Yonsei University, Seoul, Korea
VIII Organization
Reviewers
Theoretical AI
Optimization
Machine Learning
Fast Online Learning to Recommend a Diverse Set from Big Data. . . . . . . . 361
Mahmuda Rahman and Jae C. Oh
Predicting SET50 Index Trend Using Artificial Neural Network and Support
Vector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Montri Inthachot, Veera Boonjing, and Sarun Intakosum
Classification
Unsupervised Learning
Logic Simulation with Jess for a Car Maintenance e-Training System . . . . . 732
Gil-Sik Park, Dae-Sung Park, and Juntae Kim
1 Introduction
The risk management is defined as a set of principles and practices whose purpose
is to identify, analyze, evaluate and treat eventual risk factors seen as events hin-
dering an organization to reach their objectives. The risk management in projects
is currently one of the main topics of interest for researchers and practitioners
working in the area of project management. In fact, it became an important
factor to ensure the integration of the three most known management systems,
namely, the Quality Management System (ISO 9001), the Environmental Man-
agement System (ISO 14001) and the Occupational Health and Safety Man-
agement System (OHSAS 18001). In fact, the same source of hazard can cause
several risks relative to Quality, Security and Environment (QSE) management
systems. This means that the risk management can be seen as a common factor
that can be used to identify and evaluate different risks with a view to achieve
different QSE objectives. In this context, we are interested by the process-based
approach proposed by Badreddine et al. [1] and particularly to implement its
plan phase aiming to identify, analyze and evaluate risks relative to each QSE
objectives.
c Springer International Publishing Switzerland 2015
M. Ali et al. (Eds.): IEA/AIE 2015, LNAI 9101, pp. 3–12, 2015.
DOI: 10.1007/978-3-319-19066-2 1
4 M. Ben Aissia et al.
risks and to take into consideration the uncertainty characterizing the different
QSE objectives.
variable X. Let M and S be its mean and standard deviation, respectively. M and
S are used as arguments of the CDF function. These parameters are presented as
fuzzy numbers and they are extracted from historical databases and/or experts
opinions. Indeed, the definition of mean and standard deviation is established
using triangular Membership Functions (TMF). Using these inputs, this phase
aims to find the estimation of probability of failure at different percentiles. Note
that Log normal distribution is used for studying the probability of events given
its capacity to take only positive argument’s value which is wide counseled dis-
tribution. Thus, the probability of failure for each value x of X is assumed to
follow a log normal distribution expressed by:
ln(x) − M
F (x, M, S 2 ) = P r (X ≤ x) = φ (1)
S
where φ ln(x)−M
S is the cumulative distribution function of a log normal dis-
tribution. This phase is composed of five steps:
– Step 1: Defines the triangular fuzzy membership function for mean μM and
standard deviation μS of the log normally distributed random variable X.
More precisely, the mean M (resp. standard deviation S) will be represented
by three values relative to its lower value M.L (resp. S.L), its most likely
value M.ML (resp. S.ML) and its upper value M.U (resp. S.U) i.e. M=[M.L
M.ML M.U] (resp. S=[S.L S.ML S.U]).
– Step 2: Since the mean and the standard deviation are fuzzy numbers, we
use α cut interval = 0.5 for discretization purpose. So, we have α= [0: 0.5:
1]. Then, for each α value, upper and lower bounds of mean and standard
deviation are represented by [M.L, M.U] and [S.L, S.U].
– Step 3: Discretizes the random variable domain (X) as x = xi ; where i = 1,
2, 3,. . . , n ∀ F(xn )= 1.
– Step 4: Computes the upper and lower bounds of interval of fuzzy function
for probability of failure for each α cut level (α) for different xi as follows:
⎧
⎨ F (xi )α ln(xi )−M.Lα
lower = φ S.U α
α,p
F (xi ) = (2)
⎩ F (xi )α ln(xi )−M.U α
upper = φ S.L α
The outputs of this phase is a set of fuzzy CDFs (One for upper and one
for lower bound) for each discretization percentile p and the correspondent
triangular membership function.
In fact, two CDFs (one for upper and one for lower bound) for α = 0 and
α = 0.5 are generated contrary to α = 1 where we have same CDF curve for
upper and lower. In the generation of CDFs for probability of failure, 5 differ-
ent combinations of mean and standard deviations are used. For each mean
and standard deviation combination, a number of Monte Carlo simulations
were conducted to generate a CDF. This means that, the total number of
CDFs is twice the number of used α cut minus 1. In our experimental study,
Uncertainty Management in Multi-leveled Risk Assessment 7
we select α ∈ [0: 0.5: 1]. So, the total number of CDFs = 5 (see Figure
2.(a)). The CDF is informative for illustrating the percentile corresponding
to a particular level of concern. For this reason, the fuzzy CDFs resulting
from this phase are discretized into percentiles p= 10%, 20%,. . . , 100% in
order to obtain the fuzzy membership function for failure probability at each
fractile. Each discretization percentile is presented graphically by an hori-
zontal line crossing the CDFs. It consists on finding the least, most likely
and highest values of the fuzzy triangular membership function of failure
probability (denoted TMF.L, TMF.ML and TMF.U, respectively) for each
discretization percentile p as illustrated graphically (see Figure 2.(b)).
Fig. 2. CDFs of failure probability at different α cut values (a) and at 60% of dis-
cretization percentile (b)
The risk manager will select the adequate percentile of risk estimation depend-
ing on the collected amount of information. He may choose a lower percentile
of risk estimates (e.g. the 5t%) as the most representative of the risk estimate if
a sufficient amount of information has been collected. Conversely, when
the risk manager believes that the risk estimates are more likely to under-
estimate true risks, or if there is considerable uncertainty in the accuracy of
the risk estimates, the risk manager may choose a higher percentile of risk
estimates (e.g. the 90%).
(resp. CE.M L, CE.L) which presents the upper (resp. most likely, lower) value
for environment consequence. This values are extracted from historical data or
expert’s opinion. Using these inputs, this phase aims to compute the fuzzy tri-
angular membership functions of QSE-consequences. This function is defined as
follows for quality consequence μCQ :
⎧
⎪ C−CQ.L
⎨ CQ.M L−CQ.U ; CQ.L ≤ C ≤ CQ.M L
μCQ = (3)
⎪
⎩ C−CQ.U ; CQ.M L ≤ C ≤ CQ.U
CQ.M L−CQ.U
Note that, the same formulation is available for security and environment to
compute μCS and μCE simply by replacing CQ by CS and CE In equation 3. As
outputs, we find discretized values of consequences for each QSE area according
to α cut values ∈ [0, 0.5, 1] (CQα .U , CQα .L, CS α .U , CS α .L, CE α .U , CE α .L).
where μR (x) is the membership function of risk R for any value x and μCG (x)
is the membership of compliance guideline CG for any value of x.
- Necessity measure N for this proposition defined by:
Both of these measures provide two different forms of information used in deci-
sion making. In fact, a possibility measure can be considered as the criteria of
an optimistic decision maker whereas the necessity measure can be thought as
a pessimistic decision maker. Several studies have used these measures in the
decision making process related to possibilistic risk assessment [2,4,5]. In our
approach, we will provide both of them namely Π and N measures for better
comparisons and decision making. In fact, the possibility measure is performed
using the left arm of the triangular membership function whereas the necessity
measure is computed using the right arm of the triangular membership func-
tion [4]. In fact, each QSE multi-leveled risk and total risk μR at each α cut and
p are compared to the same compliance guideline CG.
The main issue is to examine the acceptability of the estimated QSE-risks.
In fact, the decision maker must be aware either the risk is rejected or accepted
according to the compliance guideline in order to take earlier corrective and pre-
ventive actions. Several researches have been proposed to deal with the accept-
ability of a fuzzy risk [2]. Indeed, each fuzzy risk is evaluated with respect to a
set of guidelines. Unless, these studies deal only with total-risk estimation. Our
aim is to compare QSE-risks and relative total risk regarding the same guide-
lines. Our method proved that an accepted risk in quality context can be either
rejected or accepted according to security or environment area. For these pur-
poses, managing the acceptability of a fuzzy risk regarding QSE management
systems is more significant and precise than overall area.
4 Illustrative Example
In order to illustrate our approach, an implementation in the petroleum field in
TOTAL TUNISIA company is proposed. This company is certified in quality,
security and environment management systems. We will consider three QSE
objectives (O1 , O2 , O3 ) and three risks (R1 , R2 , R3 )1 :
– O1 : Gain market share by providing superior all round by decreasing the
product of non conformity level service to the customer
– O2 : Increase safety staff by decreasing the number of day off of employees
– O3 : Minimize the environmental waste
– R1 : A major fire and explosion on tanker truck carrying hydrocarbon
– R2 : Dispersal of products following collision between two vehicles
– R3 : Overflow tank during reception
Table 1 proposes a comparison between the three risks R1 , R2 and R3 regard-
ing QSE-objectives for α cut =1 and p= 50%, where nine fuzzy QSE-risks are
calculated. It is clear that R1 has the highest effect on quality and environment
areas while R3 is the maximum contributor in security area with the highest
value of risk which reaches 8.716E-02 for 50% percentile. Table 2 presents the
corresponding total risks R1 , R2 and R3 . It is clear that the total risk estima-
tion can not provide a detailed estimation for decision maker since it provides a
global vision.
1
For the lack of space we cannot give all the numerical data.
Uncertainty Management in Multi-leveled Risk Assessment 11
Table 2. Fuzzy total risks R1 , R2 and R3 values for p = 50% and α cut=1
hhh
hhIdentified
hhhh risks
R1 R2 R3
TMF values h
Lower 6.268253E-02 3.923893E-02 5.678007E-02
Most-likely 7.490000E-02 4.693733E-02 6.790933E-02
Upper 8.882373E-02 5.572320E-02 8.060813E-02
Clearly, the quality and security risks at α cut=0 and p=50% have not exceed
9.1E-02 for a possibility measure Π of 0.34 according to CG1 . However, they
have greater values then 4.2E-02 at α cut=0.5 and p=10% for a necessity mea-
sure N of 0.53 which according to CG2 . For example, according to CG1 , the
risk R1 is accepted on quality and security areas. However, it is rejected on envi-
ronment area. To conclude, conducting QSE-risks estimation instead of total
12 M. Ben Aissia et al.
estimation seems more adequate for better decision making. This estimation can
help decision makers to select preventive and corrective decisions according to
the acceptability of the risk regarding specific area.
5 Conclusion
This paper proposes a new approach to implement the plan phase of the process-
based approach for integrating Quality, Security and Environment management
systems that was proposed in [1]. The proposed approach is able to manage
multi-leveled risk estimation in an uncertain framework regarding QSE areas. It
is based on a combined risk assessment approach for reasoning under uncertainty.
This choice was motivated by the fact that this kind of approaches have proven
its capacities in capturing sparse and vague data. Indeed, probability theory and
fuzzy set theory have been combined to integrate both variability and uncertainty
in risk estimation. Comparison with compliance guidelines were also established
to discuss the acceptability of given estimated risks. An interesting future work
is to take into account the dependence between different risks which will give a
better fit to real problems.
References
1. Badreddine, A., Ben Romthan, T., Ben Amor, N.: A Multi-Objective Approach to
Generate an Optimal Management Plan in an IMS-QSE. Electronic Engineering
and Computing Technology 60, 335–347 (2010)
2. Kentel, E., Aral, M.M.: 2D Monte Carlo versus 2D fuzzy Monte Carlo health risk
assessment. Stochastic Environmental Research and Risk Assessment 19(1), 86–96
(2005)
3. Kentel, E., Aral, M.M.: Probabilistic-fuzzy health risk modeling. Stochastic Envi-
ronmental Research and Risk Assessment 18(5), 324–338 (2004)
4. Arunraj, N.S., Mandal, S., Maiti, J.: Modeling uncertainty in risk assessment: An
integrated approach with fuzzy set theory and Monte Carlo simulation. Accident
Analysis Prevention 55, 242–255 (2013)
5. Guyonnet, D., Bourgine, B., Dubois, D., Fargier, H., Côme, B., Chilès, J.P.: Hybrid
approach for addressing uncertainty in risk assessments. Journal of Environmental
Engineering 129(1), 68–78 (2003)
6. Schuhmacher, M., Meneses, M., Xifro, A., Domingo, J.L.: The use of Monte-Carlo
simulation techniques for risk assessment: study of a municipal waste incinerator.
Chemosphere 43(4), 787–799 (2001)
7. Ross, T.J.: Fuzzy logic with engineering applications. John Wiley & Sons (2009)
8. Dong, W.M., Shah, H.C., Wongt, F.S.: Fuzzy computations in risk and decision
analysis. Civil Engineering Systems 2(4), 201–208 (1985)
9. Do, D.: Procedure for Performing a Failure Mode, Effects and Criticality Analysis
(1980)
10. Kletz, T.A.: The origins and history of loss prevention. Process Safety and Envi-
ronmental Protection 77(3), 109–116 (1999)
11. Fullwood, R.R., Hall, R.E.: Probabilistic risk assessment in the nuclear power
industry (1988)
12. Couronneau, J.C., Tripathi, A.: Implementation of the new approach of risk anal-
ysis in france. In: 41st International Petroleum Conference, Bratislava (2003)
Implementation of Theorem Prover
of Relevant Logic
Noriaki Yoshiura(B)
1 Introduction
In classical logic, A → B is inferred from B even if A is an arbitrary formula
and has no relation with B. However, from the viewpoint of the meaning of
implication in natural languages, the inference of A → B requires some relation
between A and B. Thus, it is not reasonable to infer A → B from B for any
arbitrary formula A. In this sense, the implication in classical logic has fallacies.
Relevant logic has been studied from the viewpoint of philosophy[2]. The aim
of relevant logic is to remove the fallacies of implication from classical logic. The
formalization of human reasoning is a main issue in artificial intelligence. As a
method of formalization of knowledge reasoning, relevant logic is more suitable
than classical logic in the sense that the fallacies of implication are removed[12].
Several relevant logics have been proposed. Church[3] and Moh[6] proposed the
implication fragment logic R→ . Ackermann proposed the concept of entailment,
which is the most strict implication[1]. Anderson and Belnap proposed full logic
R, which includes R→ . They also proposed E that includes entailment. Moreover,
many other logics have been proposed[8].
R is a typical relevant logic but undecidable[9]. E is also undecidable[2]. Thus,
decidable relevant logics have been researched. The contraction rule in sequent
calculus is a problem for constructing decidable relevant logics[5]. In logics with
this rule, it is difficult to examine whether there is a proof of a formula to
c Springer International Publishing Switzerland 2015
M. Ali et al. (Eds.): IEA/AIE 2015, LNAI 9101, pp. 13–22, 2015.
DOI: 10.1007/978-3-319-19066-2 2
Another random document with
no related content on Scribd:
minuuttiakaan, pani laatikkonsa piirongin päälle ja kylmenneenä ja
tyrmistyneenä hän suuntasi kulkunsa siniseen huoneeseen seuraa
kohti.
7.
Entinen ja kiistämätön
— Sillä tavoin hän aina puristaa, aina sillä tavoin! — lausui iloisesti
ja vielä arasti hymyillen Grušenjka, joka luultavasti heti oli tullut
Mitjan ulkonäöstä vakuutetuksi, että tämä ei rupea mellastamaan, ja
katseli häntä hirveän uteliaana ja yhä vielä levottomana. Mitjassa oli
jotakin, mikä tavattomasti hämmästytti Grušenjkaa, eikä Grušenjka
ollenkaan ollut odottanut, että Mitja tämmöisellä hetkellä tulee sisälle
tuolla tavoin ja alkaa puhua noin.
Hän oli melkein läkähtyä; paljon, paljon hän tahtoi sanoa, mutta
suusta tuli vain omituisia huudahduksia. Herra katseli
liikkumattomana häntä, hänen setelitukkuansa, katseli Grušenjkaa ja
oli ilmeisesti ymmällä.
Vaikeata oli käsittää, mistä Kalganov oli niin tulistunut, mutta hän
oli vilpittömästi tulistunut. Mitja eläytyi kokonaan hänen
harrastuksiinsa.
— Herralla oli huono onni, herralla voi taas olla hyvä onni, —
huomautti häneen päin käännähtäen sohvalla istuva herra.
— Mistä Podvysotskista?
— Varsovassa pankista vastaa se, joka tulee sisälle. Tulee
Podvysotski, näkee tuhat kultarahaa, panee: va banque.
Pankinpitäjä sanoo: »Herra Podvysotski, panet kultaa, kunnianko
päälle?» »Kunniani kautta, herrat», sanoo Podvysotski. — »Sen
parempi, herra.» Pankinpitäjä jakaa kaksi korttipinkkaa, Podvysotski
ottaa tuhat kultarahaa. — »Odota, herra», sanoo pankin pitäjä, otti
esille laatikon ja antaa miljoonan: »Ota, herra, tämä on sinun
laskusi.» Se oli miljoonan pankki. — »Minä en tietänyt sitä», sanoo
Podvysotski. »Herra Podvysotski», sanoo pankinpitäjä. »Sinä panit
kunnian päälle, me teemme samoin.» Podvysotski otti miljoonan.