期刊文献+

应急响应系统的规则冗余检测技术研究

Research of redundant rule detection method in emergency response system
下载PDF
导出
摘要 在应急响应系统(ERS)中,规则及规则推理用于确定应急事件的响应级别。当系统的规则库增加规则时,会出现冗余的规则,冗余规则的存在导致响应级别的判断不准确,影响推理的效率和准确性。针对该问题,提出一种规则的冗余检测方法,使规则库中的规则始终保持无冗余状态;同时,给出了冗余规则的处理方法。最后给出该算法的一个应用实例,结果表明该算法能快速检测出冗余规则,有效降低规则数目。 Rule and rule reasoning are used to determine the response level of the event in emergency response system(ERS).When a new rule is added to the rule base,redundant rule may appear;however,the existence of redundant rules will cause inaccuracy as the response level of the event is determined,and affect reasoning efficiency and the accuracy of reasoning.To solve the problem mentioned above,this paper proposed an algorithm for detecting redundant.It kept rules in rule base non-redundant and gave methods about how to deal with the redundant rules.Finally,shew an example using the proposed algorithm,the results indicate that the proposed algorithm can detect redundant quickly and reduce the number of rules effectively.
出处 《计算机应用研究》 CSCD 北大核心 2011年第10期3671-3674,共4页 Application Research of Computers
基金 山东省政府"泰山学者"建设工程项目 山东省博士基金资助项目(BS2009DX011) 山东省科学技术发展计划资助项目(2010GSF10811)
关键词 产生式规则 冗余 检测 规则库 production rule redundancy detection rule base
  • 相关文献

参考文献10

二级参考文献73

  • 1叶亚齐,许梦国.面向对象方法构造基于规则专家系统[J].信息技术,2004,28(8):69-71. 被引量:11
  • 2Schmolze J G,Snyder W.Detecting redundancy among production rules using term rewrite semantics[J].Knowledge-based System, 1999,12:3-11.
  • 3Revault N.Model transformation based on production rules[J].Electronic Notes in Theoretical Computer Science,2003,72(4):1-14.
  • 4Sloman M. Policy driven management for distributed systems. Journal of Network and Systems Management, 1994, 2(4) :333-360.
  • 5Moses T. eXtensible access control markup language (XACML) version 2.0. OASIS Standard, 2005.
  • 6Jajodia S, Samarati P, Subrahmanian V S et al. A unified framework for enforcing multiple access control policies// Proceedings of the ACM SIGMOD International Conference on Management of Data. Tucson, Arizona, USA, 1997, 26 (2) : 474-485.
  • 7Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations//Proeeedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:31-42.
  • 8Lupu E, Sloman M. Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering, 1999, 25(6): 852-869.
  • 9Cholvy L, Cuppens F. Analyzing consistency of security policies//Proceedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:103-112.
  • 10Dunlop N, Indulska J, Raymond K. Dynamic conflict detection in policy-based management systems//Proceedings of the 6th International Enterprise Distributed Object ComputingConference (EDOC). Lausanne, Switzerland, 2002:15-26.

共引文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部