非规范知识的获取与融合技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
目前,大部分的知识系统都只能处理那些具有良好的结构、封闭的范围、协调的内涵、明确的外延、完整的内容等特征的规范知识,一旦出现超出系统边界的问题或稍稍违背这些特征的知识,系统就可能崩溃,表现出其极端的脆弱性。由于实际应用的迫切需要,计算机科学的研究发生了许多重大的变化。人们从注重研究对象的形式转向研究对象的内容;从注重研究良性结构问题转向研究病构问题;从注重研究封闭性世界转向研究开放性世界;从研究内涵完整协调和精确的问题转向研究内涵不完整、不协调和不精确的问题。这些趋势在知识处理的研究中表现为一个过去研究得较少的十分困难的课题,即非规范知识处理。
     所谓知识的非规范性,是指知识内涵的难处理性,包括知识的不确定性(模糊、不确定、随机和不精确的知识),或知识的不完整性(内容不完整的知识和结构不完整的知识),或知识的不协调性(含矛盾的知识、带噪音的知识和含冗余的知识),或知识的非恒常性(时变知识和启发式知识)。
     非规范知识处理的最典型应用领域是因特网上知识的处理。因特网上的知识大部分是非结构或半结构的,它们以各种媒体形式存在,以自然语言为载体,分布在几亿个网页上,每天以百万网页的数量级在增长、消失或改变内容,它充满了各种矛盾的事实、数据和观点。因特网的快速发展与广泛应用要求在开放、动态环境下实现灵活的、可信的、协同的、深层次的知识共享和利用,这个目标的实现在很大程度上依赖于非规范知识处理技术的进步。盾构隧道工程等大型工程是一个具有明显多变量、非线性、不确定性和时滞特征的复杂系统,涉及到海量的实时数据。从这些海量数据中发现(非规范)知识是另一个典型的应用领域。这些海量的实时数据需要用多种方法和数学模型去刻画,任意单一模型的使用效果均有局限,各种模型所得结果的综合是一大问题。这又提出了各种非规范知识的融合问题。本文以因特网和盾构隧道施工风险知识管理中的知识处理为主要背景,围绕非规范知识获取和融合问题,探索和研究了若干关键技术,并把它们应用于实际问题的解决中。
     本文首先介绍了非规范知识的定义,综述了非规范知识处理在基础研究和应用研究方面的研究现状。
     第二章基于粗糙集理论,研究了内容不完整的非规范知识的获取。提出了基于属性扩展的规则抽取算法(AEA)和基于粗糙集的近似序列决策规则挖掘算法(ASDREA)。AEA算法选择原始决策表中的最重要属性形成优化属性表,从该表中抽取的规则一般是不一致的,通过添加新的属性就可消除这种不一致。ASDREA算法处理粗糙边界数据,按用户需求挖掘出边界区域中的全部知识或满足特定要求的知识。
     第三章基于神经网络及神经网络集成,研究了带噪音的非规范知识的获取。提出了从以阶跃函数作为激活函数的多层感知机神经网络模型(SAMLP)中获取规则的方法和基于SAMLP模型的网络集成及集成网络规则获取算法。提出了一种混合粗糙集和神经网络方法的决策规则挖掘模型,直接从内容不完整的和带噪音的信息表中获取规则。
     第四章基于信念修正理论,研究了矛盾知识的融合。提出了一种基于群体信念协商的矛盾知识融合模型,讨论了该模型的公理系统和模型的实现。研究了可能逻辑语义下的知识融合方法。根据被融合资源是否一致、矛盾、冗余或独立,研究了多种融合操作符,设计了一个融合知识的框架。
     第五章研究了非恒常知识的融合。基于信息过滤技术,将非恒常知识转换为用概率论、证据理论和可能性理论表示的不确定结构化知识。提出了融合同种类型的不确定结构化知识和不同类型的不确定结构化知识的方法。
     第六章开展了非规范知识获取和融合技术在隧道施工风险控制知识中的应用研究。将本文的研究成果应用到《盾构施工风险控制知识管理系统》项目中,建立了一个盾构施工风险知识管理的示范性平台。该平台实现了从风险辨识、风险评估、风险预警、风险控制以及风险后处理的风险管理流程,从全新的视角,重新思考和探索盾构隧道工程风险控制的技术和策略,促进风险控制技术的创新。
At present,most of the knowledge system can only deal with canonical knowledge which has the characteristics of well structure,enclosed area,coordinated content,clear extension and integrity content.If a system encounters the issues which are slightly beyond or slightly contrary to the knowledge of these features,it may face collapse,and show its extreme vulnerability.Due to the urgent need of practical applications,the research of computer science has had many tremendous changes.The people change the research from the problem of object-oriented to content-oriented;from the problem of well structure to ill structure;from the closed-oriented world to open world;from the problems of consistent and precise content to incomplete, inaccurate and inconsistent content.These trends in the knowledge processing research show an extremely difficult topics which was less studied in the past,namely non-canonical knowledge processing.
     The non-canonical knowledge is refers to the intractability of knowledge connotation, including the uncertainty knowledge(fuzzy and uncertain knowledge,random and imprecise knowledge),or the incomplete knowledge(contents incomplete knowledge and structure incomplete knowledge) or the non-consistent knowledge(contradiction knowledge,noise and redundant knowledge) or the non-permanent knowledge(time-varying knowledge and heuristic knowledge).
     The most typical application of the non.canonical knowledge is the knowledge processing on the Internet.However,the most knowledge on the internet is non-structural or semi-structural, and it exists in various forms.The knowledge takes natural language as the carrier and locates in the hundreds of millions of pages,which are increased,disappeared or changed by one million of magnitude per day,and are fraught with contradictions of the facts,data and viewpoints.The internet's rapid development and wide application require a knowledge sharing and utilization with flexible,credible,concerted,in-depth way in an open,dynamic environment.Therefore,the realization of this goal to a great extent depends on the advancements in non-canonical knowledge processing technology.The tunnel project and other large projects are the significantly complex systems which have more variable,non-linear,uncertainty and delay characteristics.There is a huge of real-time data in these projects.Extracting non-canonical knowledge from these data is another typical application area.These data need to use various methods and the mathematical model to be described.The effects of using an arbitrary single model is limited,the results synthesis of all model is a big problem,so that the problem of canonical knowledge integration is proposed.The dissertation takes the knowledge processing of the Internet and the Shield Construction Risk Control Knowledge Management as the main background,circles the non-canonical knowledge extraction and fusing issues to explore and research a number of key technologies,and applies them in the solution of practical problems.
     The dissertation firstly introduces the definition of non-canonical knowledge,and then summarizes non-canonical knowledge processing research status in basic aspect and applied aspect.
     The second chapter of the dissertation studies the extraction of the content incomplete knowledge based on rough sets.We proposed an Attribute Extension Algorithm of irregular decision table(AEA) and an Extraction Algorithm of Approximate Sequence Decision Rules (EAASDR).AEA selects the important attributes from the original decision table and forms an optimal decision table.The rule extracts from this optimized table is possibly inconsistent and adds new attributes can eliminate such inconsistencies.EAASDR can extract complete knowledge or the knowledge met the specific request from the boundary region of decision information systems.
     The third chapter of the dissertation researches extraction of the noise knowledge based on neural networks and neural network ensemble.We propose the Staircase Activation function Multi-Layer Perceptron(SAMLP) using a step function as the activation function and extract rules from the SAMLP.We also propose an ensemble SAMLP and use it to extract rules.We present a Hybrid Model based on Rough sets and Neural networks(HMRN) extracting rules from the incomplete and sound information table.
     The forth chapter of the dissertation researches fusion the contradictions knowledge based on belief revision.We study a model of fusing inconsistency knowledge based on social belief negotiation and consider both a postulational and a procedural approach to social contraction. We also study the knowledge fusion method in the possible logical semantics.According to whether or not the information resources are consistent,contradictory,redundant or independent, we study each kind of fusion operator and design a fusion knowledge frame based on the standard possible logic and explain the frame implementation with an example.
     The fifth chapter of the dissertation researches fusion non-permanent knowledge.Based on the information filtering technology,non-permanent knowledge is converted into uncertainty structure knowledge expressed with three kinds of types(probability theory,evidence theory and possible theory).The dissertation introduces the method to fuse homogeneous type uncertain structure knowledge and the heterogeneous type uncertain structure knowledge.
     In the sixth chapter we have launched an application research of extraction and fusing non-canonical knowledge in the project of Shield Construction Risk Control Knowledge Management System.With the extracting and fusing technology of non-canonical knowledge, the project has established a model platform of Shield Construction risk knowledge management. The platform realizes the risk management process from the risk identification,risk assessment, risk warning,risk control and risk post-processing.The platform offers a new angle to rethink and explore shield tunnel project risk control techniques and strategies,and to promote risk-control technology innovation.
引文
[1].知识科学及前沿研究 陆汝钤http://www.iipl.fudan.edu.cn/nsfck/background
    [2]Feigenbam,E.A.,The art of artificial intelligence,themes and case studies in knowledge engineering IJCAI 5,1014-1029
    [3]陆汝钤(主编)世纪之交的知识工程与知识科学,清华大学出版社,2001
    [4]C.E.Shannon.A mathematical theory of communication Bell Sys.Tech.Journal,1948,27:353-389,623-656
    [5]M.Hennesy,H.Lin.Symbolic Bisimulations.Theoretical Computer Science,1999,138:(2)353-389
    [6]R.Milner,Communicating and mobile systems:the p-calculus,Cambridge university press,1999.
    [7]Cardelli I.,Gordon A D.,Mobile Ambients,in:M.Nivat,editor,Foundations of Software science and computational structures,LNCS No.1378,Springer Verlag,1998,140-145
    [8]Vitek J.,Castagna G.,A calculus of secure mobile computations,in:Proc.Of the IEEE Workshop on internet programming languages,1998
    [9]Zhaohui zhu,Rong Zhang and Shan Lu A characterization theorem for injective model classes axiomatized by general rules Int J Theoretical computer sciences 2006,360:147-171
    [10]Yongjian Li.Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocols Software verification track 22nd annual ACM symposium on applied computing 2007
    [11]李明,P.M.B.威塔涅,描述复杂性,科学出版社,1998
    [12]蔡进一 葛启 朱洪 计算复杂性理论部分进展简述 中国计算机学会通讯 第一卷第2期 2005 27-37
    [13]Jin yicai Hong zhu Process in computational complexity theory JCST 6(20) 2005 735-750
    [14]陈志德,朱洪 n取m不经意传输协议构造研究 小型微型计算机系统 2006,27(3):466-468
    [15]Zhi de chen Hong zhu Li xu Oblivious computation proxy 计算机科学33(8)2006 98-101
    [16]林作诠 李未,超协调逻辑(Ⅰ)(Ⅱ)(Ⅲ)(Ⅳ),计算机科学,1994,N.5,N.6,1995,N.1
    [17]波普儿,猜测与反驳,科学知识的增长,1963
    [18]李未,开放逻辑:一个关于形式系统序列和极限的理论,在[3]中,197-226
    [19]Jie Wang,Shier Ju Chunnian Liu Agent oriented probabilistic logic programming journal of computer science and technology vol(21) 412-417
    [20]Joohyung Lee Fangzhen Lin Loop formulas for circumscription Artificial Intelligence 2006,170(2):160-185
    [21]zhangang Lin Yue ma Zuoquan Lin A fault-tolerant default logic the l0th Eruopean conference on logics in artificial intelligence LNCS 2006
    [22]Kaile Su,Qingliang Chen Xizhong zhen Weiya Yue Reasoning about knowledge by SAT solving in:Porc of CIS 2006 IEEE Press 2006
    [23]Han Lin,Kaile Su Exploiting Inference rules to compute lower bounds for MAX-SAT Solving in:Proc of IJCAI-07
    [24]Mingsheng Ying Linguistic quantifiers modeled by Sugeno integrals.Artificial Intelligence 2006,170:581-606
    [25]Mingsheng Ying Topology in process calculus:Approximate correctness and infinite evolution in concurrent programs,Springer Verlag.2004,400-420
    [26]夏佩肃,量子计算,中科院计算所技术报告,2001
    [27]McCarthy J.,Formalizing Commonsense:papers by John McCarthy,Ablex Publishing Corporation,1990.1997
    [28]McCarthy J.Programs with common sense,Proc.Symp.Mechan.Of Thought proc,in Strfik,M.J.et al.,Aritficial intelligence,1993,V61,N.1
    [29]Lenat,D.B.Guha,P.V.,Building large knowledge based systems:representation and inference in the CYC project,Addison Wesley,1990
    [30]陆汝钤 石纯一 章松懋等,面向Agent的常识知识库,中国科学(E),V30,N5,453-463
    [31]Fangzhen Lin Yi zhou From Answer set logic programming to circumscription via logic of GK IJCAI-2007 441-446
    [32]李德毅等 不确定性人工智能 国防工业出版社(北京)2005
    [33]石纯一,张伟 基于agent的计算 清华大学出版社 2006年10月
    [34]Lu Ruqian,New approaches to knowledge acquisition,World Scientific pub.,1994
    [35]Wielinga,B.,Schreiber A.T.,Breuker J.A.KADS:A modeling approach to knowledge engineering.Knowledge Acquisition,1992,4(1):5-53
    [36]Lu Ruqian,automatic knowledge acquisition by understanding pseudo-natural language,theory and praxis of machine learning,Dagstuhl seminal report 1994,91(9426):11-12
    [37].YiXin Zhong A Cognitive Approach to AI Keynote speech to the IEEE International Conference on Cognitive Informatics,the Proceeding 90-100 July 16-18 Beijing China
    [38].YiXin Zhong Knowledge theory and artificial intelligence Plenary speech to the International Conference on Rough sets and knowledge technology,LNAI 4062,50-56
    [39].YiXin Zhong An investigation on the theory of information-knowledge-intelligence Frontiers of Electrical and Electronic Engineering in China 2006,Vol.1,No.3
    [40]Stefik,M.J.et al.,Artificial Intelligence,1993,V.61,N.1
    [41]吴建敏,专家系统解题模型分类研究,中国科学院数学研究所博士论文,1993年
    [42]Genesereth M.R.,Fikes R.E.,Knowledge Interchange Format,Version 3.0 Reference Manual,Computer Science Department,Stanford University,1992
    [43]Labrou,Y.,Finin,T.,A Proposal for New KQML Specification,TR CS-97-03,UMBC 1997
    [44]杨芙清 邵维忠 梅宏,面向对象的CASE环境青鸟Ⅱ型系统的设计与实现,中国科学(A辑),1995,25(5):533-542
    [45]Lu Ruqian.Jin Zhi.Wan Ronglin,Requirement Specification in Pseudo-Natural Language in PROMIS,Proc.Of 19th COMPSAC 1995,96-101
    [46]Lu Ruqian.Jin Zhi.Wan Ronglin,A knowledge-based approach for automatically prototyping management information systems,AVIGNON 94
    [47]Kedian Mu,Zhi Jin,Ruqian Lu,Yan Peng Handling non-canonical software requirements,knowledge and information system:An international Journal 2006 DOI 10.1007/s 10115-006-0021-y
    [48]Ruqian Lu,Towards a software/knowledge co-engineering.Invited talk KSEM 06 LNAI 4092,2006,23-32
    [49]He Hu,Xiaoyong Du,ConAnnotator:Ontology-aided collaborative annotation system,In Proc.Of the 10th international conference on CSCW in design(CSCWD 06) IEEE Press Nanjing China 2006,850-855
    [50]Pan Yu Cun Gencao Yue Fei Sui A logic of believable Agents in Proceedings of fifth IEEE International Conference on Cognitive Informatics IEEE 2006 185-194
    [51]Cun Gencao Yue Fei Sui Pan Yu logical connections of statements in Ontologies in:Proceedings of fifth IEEE International Conference on Cognitive Informatics IEEE 2006440-446
    [52]Suqin Tang Cungen Cao A framework for automated test generation in Intelligent Tutoring Systems in:J.Lang Fi Lin and Wang(eds) proceedings of KSEM 2006 LNAI 4092
    [53]Songmao Zhang Olivier Bodenreider Law and order:Assessing and enforcing compliance with ontological modeling principles Computes in Biology and Medical Ontologies(publication available:http://dx.doi.org/10.1016j.compbiomed 2005.04.07
    [54]Pei Bing-zhen,Chen xiao-rong,Hu yi,lu ru-zhan A novel algorithm of establishing chinese ontology taxonomic relation 哈尔滨工业大学学报(英文版)2006
    [55]Chungong Yu,Yu Lin,Shiwei Sun,Jinjin Cai,Dongbo Bu A stochastic model to predict theoretical MSMS Spectrum JBCB
    [56]王飞,刘大有 基于遗传算法的Bayesian网结构增量学习研究 计算机研究与发展2005年9期
    [57]Ruqian Lu,Calyan Jia,Shaofang Zhang,Lusheng Chen,Hongyu zhang,An exact data mining method for finding center strings and all their instances IEEE Transaction on knowledge and data engineering.
    [58]娄跃荣 张伟 一种基于agent的元搜索引擎模型IMSA计算机研究与发展 2006(8)
    [59]Aoying zhou,Linhao Xu,Chenyun Dai,Adaptive probabilistic search over unstructured peer-to-peer computing systems,WWW journal in 2006
    [60]He juzhen,Wang xiaoling,Zhou aoying An efficient co-operative framework for multi-query processing over compressed XML data DASFAA 2006 Singapore
    [61]Jun Zhang Zhao hui Peng Shan Wang HuiJin Nie Si-seeker:ontology-based semantic search over databases The first international Conference on Knowledge Science,Engineering and Management(KSEM 2006) Guilin Citing 599-611
    [62]MC Cai,XT Deng,ZF Li,Computation of Arbitrage in a Financial Market with Various Types of Frictions LNCS 2005,4041:270-280
    [63]P Li,H Chen,X Deng,S.Zhang On default correlation and pricing of collateralized debt obligation by copula functions International Journal of information technology and decision making 2006,vol 5,No.3:483-493
    [64]ZF Li,HL Yang,XT Deng Optimal Dynamic Portfolio Selection with Earning-at-Risk Journal of optimization theory and applications 2006
    [65]Z.-H Zhou M.Li Tri-training:exploiting unlabeled data using three classifiers.IEEE Transaction on knowledge and data engineering 2005 17(11) 1529-1541
    [66]Z.-H Zhou M-L Zhang solving multi-instance problems with classifiers ensemble based on constructive clustering Knowledge and information systems
    [67]X.Geng Z-H Zhou image region selection and ensemble for face recognition Journal of Computer Science&Technology 2006 21(1) 116-125
    [68]Shichao Zhang Mohammed J.Zaki Mining multiple data sources:local pattern analysis.Data mining and knowledge discovery 12(2-3) 2006 121-125
    [69]Longbin Cao Dan Luo Chengqi Zhang Fuzzy genetic algorithms for pairs mining PRICAI 2006 711-720
    [70]Shichao Zhang Rifeng Wang Yanping Guo efficient computation of multi-feature data cubes.KSEM 2006 612-624
    [71]张文修,梁怡,吴伟志 信息系统与知识发现 北京科学出版社 2003
    [72]Pawlak.Z.Rough set-Theoretical aspects of reasoning about data.Boston Kluwer Academic Publisher 1991
    [73]Zdzislaw Pawlak,Andrzej Skowron.Rudiments of rough sets:Information Sciences 2007,177:3-27
    [74]Zdzislaw Pawlak,Andrzej Skowron.Rough sets:Some extensions:Information Sciences 2007,177:28-40
    [75]Zdzislaw Pawlak,Andrzej Skowron.Rough sets and Boolean reasoning:Information Sciences 2007,177:41-73
    [76]王珏 第1章 关于机器学习的讨论 王珏,周志华,周傲英主编 机器学习及其应用 清华大学出版社2006年1-31
    [77]Ziako.W.Variable precision rough set model.Journal of Computer and System Sciences 1993,46:39-59
    [78]Ju-Sheng Mi,Wei-Zhi Wu,Wen-Xiu Zhang.Approaches to knowledge reduction based on variable precision rough set model Information Science 2004,159:255-272
    [79]Maleolm Beynon.Theory and methodology reducts with the variable precision rough sets model:A further investigation European Journal of Operational Research 2001,134:592-605
    [80]Yee Leung,Deye Li.Maximal consistent block technique for rule acquisition in incomplete information systems:Information Sciences 2003,153:85-106
    [81]Tzung-Pei Hong Li-Huei Tseng Shyue-liang Wang Learning rules from incomplete training examples by rough sets.Expert Systems with Applications 2002,22:285-293
    [82]Yee Leung Wei-Zhi Wu Wen-Xiu Zhang.Knowledge acquisition in incomplete information systems:A rough set approach.European Journal of Operational Research 168(2006) 164-180
    [83]15 Grzymala-Busse,J and H.Ming A comparison of several approaches to missing attribute values in data mining in:Ziarko,W and Yao Y.eds,,RSCTC 2000,LANI2005(2001) 378-385
    [84]Marzena Kryszkiewicz.Rough set approach to incomplete information system Information Sciences 112(1998) 39-49
    [85]Marzena Kryszkiewicz.Rules in incomplete information systems:Information Sciences 113(1999) 271-292
    [86]王珏,陶卿 第4章Rough Set理论与统计机器学习理论.陆汝钤主编 知识科学与计算科学 清华大学出版社2003年 49-76
    [87]李道国、苗夺谦等 粒度计算研究综述 计算机科学(2005) Vol.32 No.9 1-12
    [88]王树锋、吴耿锋等 一种从决策信息系统中挖掘全部决策规则的算法 《计算机工程》(录用)
    [89]王树锋、吴耿锋、潘建国 一种从海量的不完备决策表中抽取规则的方法 《计算机工程》(录用)
    [90]王树锋、吴耿锋、潘建国 基于粗糙集的知识粒度及粒度关系研究 《计算机工程与应用》(2007)Vol.36 No.14 234-241
    [91]周志华 专题10.神经网络规则抽取 p321-342 神经网络及其应用 周志气华,曹存根主编
    [92]Henrik Jacobsson.Rule Extraction from Recurrent Neural Networks:A Taxonomy and Review:Technical report:HS-LKI-TR-04-002 School of Humanities and Informatics University of Skovde.Sweden.
    [93]Yoichi Hayashi,Rudy Setion,Katsumi Yoshida.A comparison between two neural network rule extraction techniques for the diagnosis of hepatobiliary disorders:Artificial Intelligence in Medicine 20(2000)205-216
    [94]A.S.d Avila Garcea.K.Broda,D.M.Gabbay.Symbolic knowledge extraction from trained neural networks:a sound approach:Artificial Intelligence 125(2001) 155-207
    [95]Geoffrey G.Towell,Jude W.shavlik.Extracting Refined rules from knowledge-based neural networks
    [96]Mark Craven,Jude Shavlik.Rule extraction:where do we go from here?
    [97]R.Andrews,J.Diederich,A.B.Tickle,Survey and critique of techniques for extracting rules from trained artificial neural networks,Knowledge Based System 8(6)(1995) 373-389
    [98]Alan B.Tickle,Robert Andrews.Mostefa Golea,Jocchim Diederich.The Truth will come to light.Directions and Challenges in Extracting the Knowledge Embedded within Trained Artificial neural networks:IEEE Transations on neural networks vol 9.No.6 1998 1057-1067
    [99].Guido Bologna.A model for single and multiple knowledge based networks:Artificial Intelligence in Medicine 28(2003) 141-163
    [100]Lars Kai Hansen,Peter Salamon.Neural network ensembles:IEEE transactions on pattern analysis and machine intelligence vol 12 no.10 October 1990 993 - 1001
    [101]刘悦,《神经网络集成及其在地震预报中的应用研究》 上海大学博士论文 2005
    [102].Pedro Doming.Knowledge Discovery Via Multiple Models.
    [103].Robert Wall,Padraig Cunningham,Paul Walsh Stephen Byrne.Explaining the output of ensembles in medical decision support on a case by case basic:Artificial Intelligence in Medicine 28(2003)191-206
    [104]Zhou Z-H,Wu J.Tang W.Ensembling neural networks:many could be better than all?:Artificial Intelligence 2002.137(1-2):239-263
    [105]Zhi-Hua Zhou,Yuan Jiang and Shi-Fu Chen.Extracting symbolic rules from trained neural network ensembles
    [106]Robert Wall,Dagraig Cunningham.Exploring the potential for rules extraction from ensembles of neural networks
    [107]Mark W.Craven,Jude W.Shavlik using neural networks for data mining Future generation computer system 13(1997) 211-229
    [108]Guido Bologna.Is it worth generating rules from neural network ensembles?:Journal of applied logic 2(2004) 325-348
    [109]Roman W.Swiniarski,Larry Hargis.Rough sets as a front end of neural-networks texture classifiers:Neurocompting 36(2001) 85-102
    [110]R.Yasdi,Combining rough sets learning and neural network learning method to deal with uncertain and imprecise information,Neurocomputing 7(1)(1995) 61-84
    [111]B.S.Ahn,S.S.cho,C.Y.Kim.The integrated methodology of rough set theory and artificial neural network for business failure predication:Expert systems with Applications 18(2000)65-74
    [112]J.Jelonek,K,Krawiec,R.Stowinski,Rough set reduction of attributes and their domains for neural networks.Computational Intelligence 11(2)(1995) 339-347
    [113]Renpu Li,Zheng-ou Wang.Mining classification rules using rough sets and neural networks:European Journal of Operational Research 157(2004) 439-448
    [114]R.Setiono,H,Liu,Neural-network feature selector,IEEE Transactions on Neural Networks 8(3)(1997) 554-662
    [115]Wang shufeng,Wu gengfeng,Pan jianguo A hybrid rule extraction method using rough sets and neural networks ISNN2007 LNCS 4492:352-361
    [116]C.E.Alchourro'n,P.Ga"rdenfors,D.Makinson,On the logic of theory change:partial meet contraction and revision functions,Journal of Symbolic Logic 50(1985) 510-530.
    [117]S.Benferhat,D.Dubois,S.Kaci,H.Prade,Possibilistic merging and distance-based fusion of propositional information,Annnals of Mathematics and Artificial Intelligence 34(1-3)(2002)217-252.
    [118]S.Benferhat,D.Dubois,S.Kaci,H.Prade,Bipolar possibility theory in preference modeling:Representation,fusion and optimal solutions,Information Fusion 7(1)(2006) 135-150.
    [119]S.Benferhat,S.Kaci,Fusion of possibilistic knowledge bases from a postulate point of view,International Journal of Approximate Reasoning 33(3)(2003) 255-285.
    [120]R.Booth,A negotiation-style framework for non-prioritised revision,in:Proceedings of the Eighth Conference on Theoretical Aspects of Rationality and Knowledge(TARK_O1),2001,pp.137-150.
    [121]R.Booth,Social contraction and belief negotiation,Information Fusion 7(1)(2006) 19-34.
    [122]J.L.Chacon,R.Pino Pe'rez,Merging operators:beyond the finite case,Information Fusion 7(1)(2006) 41-60.
    [123]L.Cholvy,Data merging:theory of evidence vs.knowledge-bases merging operators,in:Proceedings of the Sixth European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty(ECSQARU_01),2001,pp.478-487.
    [124]S.Chopra,A.Ghose,T.Meyer,Social choice theory,belief merging and strategy-proofness,Information Fusion 7(1)(2006) 61-79.
    [125]M.Dalai,Investigations into a theory of knowledge base revision:preliminary report,in:Proceedings of the Seventh American National Conference on Artificial Intelligence(AAAI_88),1988,475-479.
    [126]D.Dubois,J.Lang,H.Prade,Possibilistic logic,Handbook of Logic in Artificial Intelligence and Logic Programming 3(1994) 439-513.
    [127]D.Dubois,H.Prade,Possibility theory in information fusion,in:Proceedings of the International Workshop on Non-Monotonic Reasoning(NMR_02),2002,pp.103-116.
    [128]P.Everaere,S.Konieczny,P.Marquis,On merging strategyproofness,in:Proceedings of the Ninth International Conference on Principles of Knowledge Representation and Reasoning (KR_04),2004,357-367.
    [129]E.Gre'goire,Extension of a distance-based fusion framework,in:Proceedings of the Eighth International Conference on Sensor Fusion:Architectures,Algorithms and Applications,2004,282-286.
    [130]E.Gre'goire,An unbiased approach to iterated fusion by weakening,Information Fusion 7(1)(2006) 35-40.
    [131] S.O. Hansson, Revision of belief sets and belief bases, Handbook of Defeasible Reasoning and Uncertainty Management Systems 3 (1998)17-75.
    
    [132] T. Hunter, W. Liu, Fusion rules for merging uncertain information, Information Fusion 7 (1) (2006)97-134.
    
    [133] H. Katsuno, A.O. Mendelzon, On the difference between updating a knowledge base and revising it, in: Proceedings of the Second International Conference on Principles of Knowledge Representation and Reasoning (KR_91), 1991,387-394.
    
    [134] H. Katsuno, A.O. Mendelzon, Propositional knowledge base revision and minimal change, Artificial Intelligence 52 (1991) 263-294.
    
    [135] S. Konieczny, On the difference between merging knowledge bases and combining them, in: Proceedings of the Seventh International Conference on Principles of Knowledge Representation and Reasoning (KR_OO), 2000,135-144.
    
    [136] S. Konieczny, Belief base merging as a game, Journal of Applied Non-Classical Logics 14 (3) (2004) 275-294.
    
    [137] S. Konieczny, J. Lang, P. Marquis, DA2 merging operators, Artificial Intelligence 157 (2004) 49-79.
    
    [138] S. Konieczny, R. Pino Pe'rez, On the logic of merging, in: Proceedings of the Sixth International Conference on Principles of Knowledge Representation and Reasoning (KR_98), 1998,488-498.
    
    [139] S. Konieczny, R. Pino Pe'rez, Merging with integrity constraints, in: Proceedings of the Fifth European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU _99), LNAI 1638,1999, 233-244.
    
    [140] S. Konieczny, R. Pino Pe'rez, Merging information under constraints: a qualitative framework, Journal of Logic and Computation 12 (5) (2002) 773-808.
    
    [141] S. Konieczny, R. Pino Pe'rez, On the frontier between arbitration and majority, in:Proceedings of the Eighth International Conference on Principles of Knowledge Representation and Reasoning (KR_02), 2002,109-118.
    
    [142] J. Lin, A.O. Mendelzon, Knowledge base merging by majority, in: Dynamic Worlds: From the Frame Problem to Knowledge Management, Kluwer, 1999.
    
    [143] T. Meyer, On the semantics of combination operations, Journal of Applied Non-Classical Logics 11 (1-2) (2001) 59-84.
    
    [144] T. Meyer, N. Foo, D. Zhang, R. Kwok, Logical foundations of negotiation: strategies and preferences, in: Proceedings of the Ninth International Conference on Principles of Knowledge Representation and Reasoning (KR_04), 2004, 311-318.
    
    [145] B. Nebel, A knowledge level analysis of belief revision, in: Proceedings of the First International Conference on the Principles of Knowledge Representation and Reasoning (KR_89), 1989,301-311.
    
    [146] B. Nebel, Belief revision and default reasoning: syntax-based approaches, in: Proceedings of the Second International Conference on the Principles of Knowledge Representation and Reasoning(KR_91),1991,417-428.
    [147]N.Rescher,R.Manor,On inference from inconsistent premises,Theory and Decision 1(1970) 179-219.
    [148]W.Spohn,Ordinal conditional functions:a dynamic theory of epistemic states,in:W.L.Harper,B.Skyrms(Eds.),Causation in Decision,Belief Change,and Statistics,vol.2,Kluwer,Dordrecht,1987,105-134.
    [149]D.Zhang,N.Foo,T.Meyer,R.Kwok,Negotiation as mutual belief revision,in:Proceedings of the Nineteenth American National Conference on Artificial Intelligence (AAAI_04),2004,317-322.
    [150]王树锋、吴耿锋、潘建国 一种基于群体信念协商的矛盾知识处理模型 《计算机科学》 第34卷第8期p155-158
    [151]A.Ayoun,Ph.Smets,Data association in multi-target detection using the transferable belief model,International Journal of Intelligent Systems 16(10)(2001) 1167-1182.
    [152]S.Bergamaschi,S.Castano,M.Vincini,D.Beneventano,Semantic integration of heterogeneous information sources,Data and Knowledge Engineering 36(2001) 215-249.
    [153]S.Benferhat,D.Dubois,H.Prade,From semantic to syntactic approach to information combination in possibilitic logic,in:B.Bouchon-Meunier(Ed.),Aggregation and Fusion of Imperfect Information,Physica-Verlag,1997,141-151.
    [154]L.Cholvy,Reasoning with data provided by federated databases,Journal of Intelligent Information Systems 10(1998) 49-80.
    [155]J.Cowie,W.Lehnert,Information extraction,Communications of the ACM 39(1996)81-91.
    [156]L.Cholvy,S.Moral,Merging databases:problems and examples,International Journal of Intelligent Systems 10(2001) 1193-1221.
    [157]W.Cohen,A web-based information system that reasons with structured collections of text,in:Proceedings of Autonomous Agents_98,1998,400-407.
    [158]D.Dubois,H.Prade,The principle of minimum specificity as a basis for evidential reasoning,in:B.Bouchon,R.Yager(Eds.),Uncertainty in Knowledge-based Systems,Springer-Verlag,1987,75-84.
    [159]D.Dubois,H.Prade,Possibility Theory:an Approach to the Computerized Processing of Uncertainty,Plenum Press,1988.
    [160]D.Dubois,H.Prade,Representation and combination of uncertainty with belief functions and possibility measures,Computational Intelligence 4(1988) 244-264.
    [161]D.Dubois,H.Prade,Possibility theory:qualitative and quantitative aspects,in:D.Gabbay,Ph.Smets(Eds.),Handbook of Defeasible Reasoning and Uncertainty Management Systems,vol.1,Kluwer Academic Publ.,Dordrecht,1998,169-226.
    [162]D.Dubois,H.Nguyen,H.Prade,Possibility theory,probability and fuzzy sets,Misunderstandings,bridges and gaps,in:D.Dubois,H.Prade(Eds.),Fundamentals of Fussy Sets,The Handbooks of Fuzzy Sets Series,2000,Chapter 7,343-438.
    [163]A.Hunter,W.Liu,Logical reasoning with multiple granularities of uncertainty in semi-structured information,in:Proceedings of the International Conference on Information Processing and Management of Uncertainty,2004,1009-1016.
    [164]A.Hunter,W.Liu,Measuring the quality of inconsistent uncertain information and quality of fusion,in:Proceedings of the 10th International Conference of Information Processing and Management of Uncertainity in Knowlegde Based Systems(IPMU _04),Universita degli Studi di Perugia,2004,1009-1016.
    [165]A.Hunter,W.Liu,Measuring the quality of inconsistent uncertain information and quality of fusion.Technical Report,Department of Computer Science,UCL,2004.
    [166]A.Hunter,R.Summerton,Propositional fusion rules,in:Symbolic and Quantitative Approaches to Reasoning with Uncertainty,LNCS,vol.2711,Springer,2003,502-514.
    [167]A.Hunter,Merging potentially inconsistent items of structured text,Data and Knowledge Engineering 34(2000) 305-332.
    [168]A.Hunter,Logical fusion rules for merging structured news reports,Data and Knowledge Engineering 42(2002) 23-56.
    [169]A.Hunter,Evaluating the significance of inconsistency,in:Proceedings of the 18th International Joint Conference on Artificial Intelligence(IJCAI_03),2003,468-473.
    [170]S.Konieczny,J.Lang,P.Marquis,Quantifying information and contradiction in propositional logic through epistemic actions,in:Proceedings of the 18th International Joint Conference on Artificial Intellignce(IJCAI_03),2003,106-111.
    [171]A.Nierman,H.Jagadish,ProTDB:Probabilistic data in XML,in:Proceedings of the International Conference on Very Large Databases(VLDB_02),LNCS,vol.2590,Springer,2002,646-657.
    [172]A.Preece,K.Hui,A.Gray,P.Marti,T.Bench-Capon,D.Jeans,Z.Cui,The KRAFT architecture for knowledge fusion and transformation,in:Research and Development in Intelligence Systems,XVI,Springer,1999,23-38.
    [173]盾构法隧道施工技术及应用 周文波编著 中国建筑工业出版社 2004年11月
    [174]国际工程风险管理与保险 雷胜强等编著 中国建筑工业出版社 2002年11月
    [175]《城市软土盾构施工期风险分析与评估研究》陈龙 同济大学博士论文 2004年9月
    [176]Rudi Studer et Knowledge Engineer:Principles and methods.Data & Knowledge Engineer 25(1998) 161-197
    [177]盾构叠交施工地层移动的数学模型 周文波,胡珉 地下工程与隧道 2000.4
    [178]盾构法隧道施工引起地面沉降GMF预报系统 周文波,胡珉 地下工程与隧道 1996.1
    [179]外滩观光隧道施工技术(上、下) 周文波,吴惠明.上海建筑科技 2000.5
    [180]《盾构施工风险控制知识管理系统》技术报告 王树锋 等 上海大学、上海盾构分公司 2007年6月

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700