期刊文献+

电信资费优惠规则知识表示、冲突检测与实现 被引量:2

Knowledge expression,conflict detection and implementation of telecom tariff discount policies
下载PDF
导出
摘要 目前电信运营商资费优惠规则(俗称套餐)采用自然语言来描述,不仅容易产生歧义而且不能用计算机来进行重复套餐的自动冲突检测。针对重复套餐增多致使业务支撑系统(BSS)不堪重负而出现效率低下甚至宕机的现象,运用人工智能知识表示的方法将电信资费每条优惠规则表示为条件部分和结论部分,采用当前有代表性的冲突检测算法Rete算法和Rete改进算法的思想,提出了优惠规则冲突检测算法,与专家平台相结合,实现了优惠规则的自动化冲突检测。最后通过实例验证了优惠规则知识表示和冲突检测算法的合理性和有效性,在优惠规则的科学设置、减少客户投诉、压缩优惠规则数量、提高系统效率和增加经济效益与社会效益等方面都取得了较好的效果。 Presently, applying the nature language to explain Telecom Tariff Discount Policies (TTDP) by telecom operators not only makes different people understand differently, but also makes computers not be used to implement automatic conflict detection of reduplicated TTDP. Therefore, aiming at the phenomena of overloading and inefficient Business Sporting Systems (BSS) due to increasing reduplicated TTDP, the algorithm of conflict detection for reduplicated TTDP was proposed and automatic conflict detection was implemented with combination of expert platform. Each discount policy was expressed into the conditional part and conclusive part with traditional knowledge expression method and applying idea of the representative algorithms of conflict detections such as Rete and improved Rete algorithms. The practical results show the efficiency and rationality of the knowledge expression and the conflict detection algorithm for TTDP , better effects with scientific and rational set up of TTDP, decrease in customer complaints, compression of the number of TTDP, improved system efficiency and increased econQmic and social benefits.
出处 《计算机应用》 CSCD 北大核心 2008年第4期1091-1094,共4页 journal of Computer Applications
关键词 电信资费 优费规则 冲突检测 telecom tariff discount policy conflict detection
  • 相关文献

参考文献8

  • 1DOORENBOS R B. CMU - CS - 95 - 113, Production Matching tor Large Learning Systems[ R]. Pittsburgh, USA: Carnegie Mellon University, Computer Science Department, 1995.
  • 2FORGY C L. Rete: A fast algorithm for the many pattern/many object pattern match problem[ J]. Artificial Intelligence, 1982, 19(1) : 17 - 37.
  • 3KUCHAR J K, LEE C Y. Survey of conflict detection and resolution modeling methods[ R]. Cambridge: Massachusette Institute of Technology, Department of Aeronautics and Astronautics, 1997.
  • 4LIU W Q, EASTERBROOK S, MYLOPOULOS J. Policy-based detection of inconsistency in models[ R]. Toronto, Canada: University of Toronto, Department of Computer Science, 2002.
  • 5LUPU E C, SLOMAN M. Conflicts in policy-based distributed systems management[ J]. IEEE Transactions on Software Engineering, 1999, 25(6) : 852 - 869.
  • 6SANDHU R, BHAMIDIPATI V , MUNAWER Q. The ARBAC 97 model for role-based administration of role[ J]. ACM Transactions on Information and System Security, 1999, 2(1) : 105 - 135.
  • 7SANDHU R, COYNE E, FEINSTEIN H, et al. Role-based access control models[ J]. IEEE Computer, 1996, 29(2) : 38 -47.
  • 8SANDHU R, FERRAIOLO D, KUHN R. The NIST model for rolebased access control towards a unified standard[ C]//Proceedings of 5th ACM Workshop on Role-Based Access Control. New York: ACM Press, 2000:47-64.

同被引文献6

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部