• Title/Summary/Keyword: rete algorithm

Search Result 10, Processing Time 0.026 seconds

An Analysis of Existing Studies on Parallel and Distributed Processing of the Rete Algorithm (Rete 알고리즘의 병렬 및 분산 처리에 관한 기존 연구 분석)

  • Kim, Jaehoon
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.7
    • /
    • pp.31-45
    • /
    • 2019
  • The core technologies for intelligent services today are deep learning, that is neural networks, and parallel and distributed processing technologies such as GPU parallel computing and big data. However, for intelligent services and knowledge sharing services through globally shared ontologies in the future, there is a technology that is better than the neural networks for representing and reasoning knowledge. It is a knowledge representation of IF-THEN in RIF or SWRL, which is the standard rule language of the Semantic Web, and can be inferred efficiently using the rete algorithm. However, when the number of rules processed by the rete algorithm running on a single computer is 100,000, its performance becomes very poor with several tens of minutes, and there is an obvious limitation. Therefore, in this paper, we analyze the past and current studies on parallel and distributed processing of rete algorithm, and examine what aspects should be considered to implement an efficient rete algorithm.

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

A Light-Weight Rule Engine for Context-Aware Services (상황 인지 서비스를 위한 경량 규칙 엔진)

  • Yoo, Seung-Kyu;Cho, Sang-Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.2
    • /
    • pp.59-68
    • /
    • 2016
  • Context-aware services recognize the context of situation environments of users and provide useful services according to the context for users. Usual rule-based systems can be used for context-aware services with the specified rules that express context information and operations. This paper proposes a light-weight rule engine that minimizes memory consumption for resource-constrained smart things. The rule engine manages rules at the minimum condition level, removes memories for intermediate rule matching results, and uses hash tables to store rules and context information efficiently. The implemented engine is verified using a rule set of a mouse training system and experiment results shows the engines consumes very little memory compared to the existing Rete algorithm with some sacrifice of execution time.

Development of Forward chaining inference engine SMART-F using Rete Algorithm in the Semantic Web (차세대 웹 환경에서의 Rete Algorithm을 이용한 정방향 추론엔진 SMART - F 개발)

  • Jeong, Kyun-Beom;Hong, June-Seok;Kim, Woo-Ju;Lee, Myung-Jin;Park, Ji-Hyoung;Song, Yong-Uk
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.3
    • /
    • pp.17-29
    • /
    • 2007
  • Inference engine that performs the brain of software agent in next generation's web with various standards based on standard language of the web, XML has to understand SWRL (Semantic Web Rule Language) that is a language to express the rule in the Semantic Web. In this research, we want to develop a forward inference engine, SMART-F (SeMantic web Agent Reasoning Tools-Forward chaining inference engine) that uses SWRL as a rule express method, and OWL as a fact express method. In the traditional inference field, the Rete algorithm that improves effectiveness of forward rule inference by converting if-then rules to network structure is often used for forward inference. To apply this to the Semantic Web, we analyze the required functions for the SWRL-based forward inference, and design the forward inference algorithm that reflects required functions of next generation's Semantic Web deducted by Rete algorithm. And then, to secure each platform's independence and portability in the ubiquitous environment and overcome the gap of performance, we developed management tool of fact and rule base and forward inference engine. This is compatible with fact and rule base of SMART-B that was developed. So, this maximizes a practical use of knowledge in the next generation's Web environment.

  • PDF

Improving Performance of a Plan-Based Agent System Utilizing the RETE Algorithm (RETE 알고리즘을 이용한 계획기반 에이전트 시스템의 실행 성능 향상)

  • 이재호;김남형;송남훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.184-186
    • /
    • 2004
  • 최근에 이르러 온톨로지 (Ontology) 및 시맨틱 웹 (Semantic Web) (1) 에 대한 연구가 활발히 진행됨에 따라 이들을 처리할 수 있는 에이전트 시스템의 중요성 또한 부각되고 있다. 이러한 에이전트 시스템은 규칙(Rule)을 기반으로 하여 해당 조건을 만족시키는 경우에 규칙에 정의된 행동을 실행하도록 설계된다. 하지만 이러한 시스템이 않은 양의 규칙과 조건을 처리하는 경우 특정한 조건에 맞는 규칙을 검사하는 과정에서 많은 오버헤드가 걸리게 된다. 이러한 시스템의 단점을 보완하고자 사용되는 것이 RETE 알고리즘으로서 각 조건과 규칙들을 빠르게 검색할 수 있는 네트워크를 구성하고 특정 조건이 만족되는 경우 이를 창조하는 규칙들의 목록을 즉시 얻어낼 수 있게 된다. 본 논문에서는 JAM 에이전트 시스템에 RETE 알고리즘을 적용시키고 이를 통해 더욱 효율적인 에이전트 시스템을 구성하고자 한다.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

RDFS Rule based Parallel Reasoning Scheme for Large-Scale Streaming Sensor Data (대용량 스트리밍 센서데이터 환경에서 RDFS 규칙기반 병렬추론 기법)

  • Kwon, SoonHyun;Park, Youngtack
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.686-698
    • /
    • 2014
  • Recently, large-scale streaming sensor data have emerged due to explosive supply of smart phones, diffusion of IoT and Cloud computing technology, and generalization of IoT devices. Also, researches on combination of semantic web technology are being actively pushed forward by increasing of requirements for creating new value of data through data sharing and mash-up in large-scale environments. However, we are faced with big issues due to large-scale and streaming data in the inference field for creating a new knowledge. For this reason, we propose the RDFS rule based parallel reasoning scheme to service by processing large-scale streaming sensor data with the semantic web technology. In the proposed scheme, we run in parallel each job of Rete network algorithm, the existing rule inference algorithm and sharing data using the HBase, a hadoop database, as a public storage. To achieve this, we implement our system and evaluate performance through the AWS data of the weather center as large-scale streaming sensor data.

A Parallel Matching in AI Production Systems (인공지능 생성시스템에서의 병렬 매칭)

  • 강승일;윤종민;정규식
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.32B no.3
    • /
    • pp.89-99
    • /
    • 1995
  • One of the hardest problems that limit real application of production system is its slowness. One way to overcome this problem is to speed up the matching operation which occupies more than 90% of the total execution time. In this paper, we try to speed up the matching operation with parallel execution of a typical pattern matching algorithm, RETE, in a multiprocessor environment, This requires not only to make partitions of the rules but also to allocate the partitioned rules to processors, respectively. A partition strategy is proposed to make groups of similar rules by evaluating the similarity of rules according to the number of common conditions between rules. An allocation strategy is proposed to make the load of each processor even by assigning the different priority to the group of rules according to the expected amount of time required for matching operation. To compare with the existing methods, we perform simulation using OPS5 sample programs. The simulation results show that the proposed methods can improve the performance of production system.

  • PDF

Abnormal Behavior Pattern Identifications of One-person Households using Audio, Vision, and Dust Sensors (음성, 영상, 먼지 센서를 활용한 1인 가구 이상 행동 패턴 탐지)

  • Kim, Si-won;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.95-103
    • /
    • 2019
  • The number of one person households has grown steadily over the recent past and the population of lonely and unnoticed death are also observed. The phenomenon of one person households has been occurred. In the dark side of society, the remarkable number of lonely and unnoticed death are reported among different age-groups. We propose an unusual event detection method which may give a remarkable solution to reduce the number of the death rete for people dying alone and remaining undiscovered for a long period of time. The unusual event detection method we suggested to identify abnormal user behavior in their lives using vision pattern, audio pattern, and dust pattern algorithms. Individually proposed pattern algorithms have disadvantages of not being able to detect when they leave the coverage area. We utilized a fusion method to improve the accuracy performance of each pattern algorithm and evaluated the technique with multiple user behavior patterns in indoor areas.