4.7 Article

Intelligent conversation system using multiple classification ripple down rules and conversational context

Journal

EXPERT SYSTEMS WITH APPLICATIONS
Volume 112, Issue -, Pages 342-352

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.eswa.2018.06.049

Keywords

Knowledgebase systems; Textual question answering; MCRDR; Case based reasoning; Pattern matching

Funding

  1. Asian Office of Aerospace Research and Development (AOARD) [FA2386-16-1-4045]
  2. Australian Government Research Training Program Scholarship

Ask authors/readers for more resources

We introduce an extension to Multiple Classification Ripple Down Rules (MCRDR), called Contextual MCRDR (C-MCRDR). We apply C-MCRDR knowledge-base systems (KBS) to the Textual Question Answering (TQA) and Natural Language Interface to Databases (NLIDB) paradigms in restricted domains as a type of spoken dialog system (SDS) or conversational agent (CA). C-MCRDR implicitly maintains topical conversational context, and intra-dialog context is retained allowing explicit referencing in KB rule conditions and classifications. To facilitate NLIDB, post-inference C-MCRDR classifications can include generic query referencing - query specificity is achieved by the binding of pre-identified context. In contrast to other scripted, or syntactically complex systems, the KB of the live system can easily be maintained courtesy of the RDR knowledge engineering approach. For evaluation, we applied this system to a pedagogical domain that uses a production database for the generation of offline course-related documents. Our system complemented the domain by providing a spoken or textual question-answering alternative for undergraduates based on the same production database. The developed system incorporates a speech-enabled chatbot interface via Automatic Speech Recognition (ASR) and experimental results from a live, integrated feedback rating system showed significant user acceptance, indicating the approach is promising, feasible and further work is warranted. Evaluation of the prototype's viability found the system responded appropriately for 80.3% of participant requests in the tested domain, and it responded inappropriately for 19.7% of requests due to incorrect dialog classifications (4.4%) or out of scope requests (15.3%). Although the semantic range of the evaluated domain was relatively shallow, we conjecture that the developed system is readily adoptable as a CA NLIDB tool in other more semantically-rich domains and it shows promise in single or multi-domain environments. (C) 2018 The Authors. Published by Elsevier Ltd.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

A knowledge construction methodology to automate case-based learning using clinical documents

Maqbool Ali, Jamil Hussain, Sungyoung Lee, Byeong Ho Kang, Kashif Sattar

EXPERT SYSTEMS (2020)

Article Computer Science, Hardware & Architecture

The Intelligent Medical Platform: A Novel Dialogue-Based Platform for Health-Care Services

Taqdir Ali, Muhammad Afzal, Hyeong Won Yu, Ubaid Ur Rehman, Ho-Seong Han, June Young Choi, Arif Jamshed, Jamil Hussain, Muhammad Bilal Amin, Musarrat Hussain, Usman Akhtar, Wajahat Ali Khan, Sungyoung Lee, Byeong Ho Kang, Maqbool Hussain

COMPUTER (2020)

Article Computer Science, Information Systems

An Efficient Resource Monitoring Service for Fog Computing Environments

Sudheer Kumar Battula, Saurabh Garg, James Montgomery, Byeong Kang

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Theory & Methods

Performance evaluation of Hyperledger Fabric-enabled framework for pervasive peer-to-peer energy trading in smart Cyber-Physical Systems

Ankur Lohachab, Saurabh Garg, Byeong Ho Kang, Muhammad Bilal Amin

Summary: The researchers designed a novel P2P energy trading framework to improve resource utilization and address the electricity crisis challenge, evaluating the results based on different system parameters for validation. Performance bottlenecks and optimal configurations were determined through independent investigations, with the use of benchmark tools aiding application designers and developers in selecting suitable implementation models.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Artificial Intelligence

A decision model for blockchain applicability into knowledge-based conversation system

Wenli Yang, Saurabh Garg, Zhiqiang Huang, Byeong Kang

Summary: Conversation systems often face challenges in knowledge management from multiple human experts. Current knowledge-based conversation systems are typically centralized on servers, leading to potential issues in transparency and security. Blockchain solutions are being proposed to enhance security and efficiency in various domains, but the selection of blockchain platforms for knowledge-based conversation systems is still under development. The proposed decision model in this paper utilizes multiple methods such as AHP, FAHP, and FTOPSIS to analyze and generate consistent results, aiding in the selection of blockchain platforms and improving decision-making efficiency.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Automation & Control Systems

A Generalized Golden Rule Representative Value for Multiple-Criteria Decision Analysis

Zeyi Liu, Fuyuan Xiao, Chin-Teng Lin, Byeong Ho Kang, Zehong Cao

Summary: This study proposes a representative value method for handling interval criteria, using neural networks to adjust parameters to enhance decision accuracy and effectiveness.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)

Article Operations Research & Management Science

GPSPiChain-Blockchain and AI based Self-Contained Anomaly Detection Family Security System in Smart Home

Ali Raza, Lachlan Hardy, Erin Roehrer, Soonja Yeom, Byeong Ho Kang

Summary: Advancements in technology have led to better integration of personal computing devices into people's lives and homes, raising concerns about controlling access to sensitive information. The rise of blockchain technology allows for immutable audit trails of locational data, which can be controlled through inexpensive equipment at home. This paper presents a blockchain-based family security system for outdoor tracking and in-house monitoring, integrating sensors and AI to detect anomalies in users' activities while ensuring data security within the family unit.

JOURNAL OF SYSTEMS SCIENCE AND SYSTEMS ENGINEERING (2021)

Article Computer Science, Hardware & Architecture

A context-aware information-based clone node attack detection scheme in Internet of Things

Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang, Abid Khan

Summary: This paper presents an efficient scheme for detecting clone node attacks on mobile IoT networks by using semantic information to securely locate IoT devices. The proposed location proof mechanism combines location proofs and batch verification to accelerate the verification process at trusted nodes. Additionally, a model for selecting trustworthy IoT devices based on their capabilities is introduced for the location proof-verification procedure, resulting in high detection accuracy and reduced resource overheads.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2022)

Article Computer Science, Information Systems

A Comprehensive Survey of Context-Aware Continuous Implicit Authentication in Online Learning Environments

Riseul Ryu, Soonja Yeom, David Herbert, Julian Dermoudy

Summary: This study aims to determine how implicit authentication can observe students' behavior without disrupting their learning activities. A structured systematic review of the existing literature reveals future research directions, including considering diverse authenticators, addressing template ageing issues, and exploring evaluation approaches for context-aware implicit authentication systems.

IEEE ACCESS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

An Adaptive Biometric Authentication System for Online Learning Environments Across Multiple Devices

Riseul Ryu, Soonja Yeom, David Herbert, Julian Dermoudy

Summary: Online learning environments require robust authentication systems to ensure the authenticity of students' identities and work, and to prevent academic malpractices. This paper proposes a design for an adaptive biometric authentication system that dynamically selects biometric combinations based on a user's authenticating device.

ARTIFICIAL INTELLIGENCE IN EDUCATION: POSTERS AND LATE BREAKING RESULTS, WORKSHOPS AND TUTORIALS, INDUSTRY AND INNOVATION TRACKS, PRACTITIONERS AND DOCTORAL CONSORTIUM, PT II (2022)

Article Computer Science, Interdisciplinary Applications

Teaching Embedded Systems and Internet-of-Things Supported by Multipurpose Multiobjective Remote Laboratories

Ananda Maiti, Ali Raza, Byeong Ho Kang

Summary: The Internet-of-Things (IoT) is a set of technologies that integrate physical devices into human activities, gaining popularity among developers and consumers. It is crucial for IoT to be included in higher education curriculum using a project-based learning approach.

IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES (2021)

Review Computer Science, Information Systems

Continuous Multimodal Biometric Authentication Schemes: A Systematic Review

Riseul Ryu, Soonja Yeom, Soo-Hyung Kim, David Herbert

Summary: Building safeguards against illegitimate access and authentication is crucial for system security. Continuous multimodal biometric authentication systems have been proposed as a reliable solution to address the challenges in existing user authentication schemes. However, there is a lack of critical analysis on current progress in the field, highlighting the need for further research and development in this area.

IEEE ACCESS (2021)

Review Mathematical & Computational Biology

Deep Learning for Retail Product Recognition: Challenges and Techniques

Yuchen Wei, Son Tran, Shuxiang Xu, Byeong Kang, Matthew Springer

COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE (2020)

Proceedings Paper Computer Science, Theory & Methods

Window-based Streaming Graph Partitioning Algorithm

Md Anwarul Kaium Patwary, Saurabh Garg, Byeong Kang

PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2019) (2019)

Article Computer Science, Information Systems

A Survey on Blockchain-Based Internet Service Architecture: Requirements, Challenges, Trends, and Future

Wenli Yang, Erfan Aghasian, Saurabh Garg, David Herbert, Leandro Disiuta, Byeong Kang

IEEE ACCESS (2019)

Review Computer Science, Artificial Intelligence

A comprehensive review of slope stability analysis based on artificial intelligence methods

Wei Gao, Shuangshuang Ge

Summary: This study provides a comprehensive review of slope stability research based on artificial intelligence methods, focusing on slope stability computation and evaluation. The review covers studies using quasi-physical intelligence methods, simulated evolutionary methods, swarm intelligence methods, hybrid intelligence methods, artificial neural network methods, vector machine methods, and other intelligence methods. The merits, demerits, and state-of-the-art research advancement of these studies are analyzed, and possible research directions for slope stability investigation based on artificial intelligence methods are suggested.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Machine learning approaches for lateral strength estimation in squat shear walls: A comparative study and practical implications

Khuong Le Nguyen, Hoa Thi Trinh, Saeed Banihashemi, Thong M. Pham

Summary: This study investigated the influence of input parameters on the shear strength of RC squat walls and found that ensemble learning models, particularly XGBoost, can effectively predict the shear strength. The axial load had a greater influence than reinforcement ratio, and longitudinal reinforcement had a more significant impact compared to horizontal and vertical reinforcement. The performance of XGBoost model outperforms traditional design models and reducing input features still yields reliable predictions.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

DHESN: A deep hierarchical echo state network approach for algal bloom prediction

Bo Hu, Huiyan Zhang, Xiaoyi Wang, Li Wang, Jiping Xu, Qian Sun, Zhiyao Zhao, Lei Zhang

Summary: A deep hierarchical echo state network (DHESN) is proposed to address the limitations of shallow coupled structures. By using transfer entropy, candidate variables with strong causal relationships are selected and a hierarchical reservoir structure is established to improve prediction accuracy. Simulation results demonstrate that DHESN performs well in predicting algal bloom.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Learning high-dependence Bayesian network classifier with robust topology

Limin Wang, Lingling Li, Qilong Li, Kuo Li

Summary: This paper discusses the urgency of learning complex multivariate probability distributions due to the increase in data variability and quantity. It introduces a highly scalable classifier called TAN, which utilizes maximum weighted spanning tree (MWST) for graphical modeling. The paper theoretically proves the feasibility of extending one-dependence MWST to model high-dependence relationships and proposes a heuristic search strategy to improve the fitness of the extended topology to data. Experimental results demonstrate that this algorithm achieves a good bias-variance tradeoff and competitive classification performance compared to other high-dependence or ensemble learning algorithms.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Make a song curative: A spatio-temporal therapeutic music transfer model for anxiety reduction

Zhejing Hu, Gong Chen, Yan Liu, Xiao Ma, Nianhong Guan, Xiaoying Wang

Summary: Anxiety is a prevalent issue and music therapy has been found effective in reducing anxiety. To meet the diverse needs of individuals, a novel model called the spatio-temporal therapeutic music transfer model (StTMTM) is proposed.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

A modified reverse-based analysis logic mining model with Weighted Random 2 Satisfiability logic in Discrete Hopfield Neural Network and multi-objective training of Modified Niched Genetic Algorithm

Nur Ezlin Zamri, Mohd. Asyraf Mansor, Mohd Shareduwan Mohd Kasihmuddin, Siti Syatirah Sidik, Alyaa Alway, Nurul Atiqah Romli, Yueling Guo, Siti Zulaikha Mohd Jamaludin

Summary: In this study, a hybrid logic mining model was proposed by combining the logic mining approach with the Modified Niche Genetic Algorithm. This model improves the generalizability and storage capacity of the retrieved induced logic. Various modifications were made to address other issues. Experimental results demonstrate that the proposed model outperforms baseline methods in terms of accuracy, precision, specificity, and correlation coefficient.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

On taking advantage of opportunistic meta-knowledge to reduce configuration spaces for automated machine learning

David Jacob Kedziora, Tien-Dung Nguyen, Katarzyna Musial, Bogdan Gabrys

Summary: The paper addresses the problem of efficiently optimizing machine learning solutions by reducing the configuration space of ML pipelines and leveraging historical performance. The experiments conducted show that opportunistic/systematic meta-knowledge can improve ML outcomes, and configuration-space culling is optimal when balanced. The utility and impact of meta-knowledge depend on various factors and are crucial for generating informative meta-knowledge bases.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Optimal location for an EVPL and capacitors in grid for voltage profile and power loss: FHO-SNN approach

G. Sophia Jasmine, Rajasekaran Stanislaus, N. Manoj Kumar, Thangamuthu Logeswaran

Summary: In the context of a rapidly expanding electric vehicle market, this research investigates the ideal locations for EV charging stations and capacitors in power grids to enhance voltage stability and reduce power losses. A hybrid approach combining the Fire Hawk Optimizer and Spiking Neural Network is proposed, which shows promising results in improving system performance. The optimization approach has the potential to enhance the stability and efficiency of electric grids.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

NLP-based approach for automated safety requirements information retrieval from project documents

Zhijiang Wu, Guofeng Ma

Summary: This study proposes a natural language processing-based framework for requirement retrieval and document association, which can help to mine and retrieve documents related to project managers' requirements. The framework analyzes the ontology relevance and emotional preference of requirements. The results show that the framework performs well in terms of iterations and threshold, and there is a significant matching between the retrieved documents and the requirements, which has significant managerial implications for construction safety management.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Dog nose-print recognition based on the shape and spatial features of scales

Yung-Kuan Chan, Chuen-Horng Lin, Yuan-Rong Ben, Ching-Lin Wang, Shu-Chun Yang, Meng-Hsiun Tsai, Shyr-Shen Yu

Summary: This study proposes a novel method for dog identification using nose-print recognition, which can be applied to controlling stray dogs, locating lost pets, and pet insurance verification. The method achieves high recognition accuracy through two-stage segmentation and feature extraction using a genetic algorithm.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Fostering supply chain resilience for omni-channel retailers: A two-phase approach for supplier selection and demand allocation under disruption risks

Shaohua Song, Elena Tappia, Guang Song, Xianliang Shi, T. C. E. Cheng

Summary: This study aims to optimize supplier selection and demand allocation decisions for omni-channel retailers in order to achieve supply chain resilience. It proposes a two-phase approach that takes into account various factors such as supplier evaluation and demand allocation.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Accelerating Benders decomposition approach for shared parking spaces allocation considering parking unpunctuality and no-shows

Jinyan Hu, Yanping Jiang

Summary: This paper examines the allocation problem of shared parking spaces considering parking unpunctuality and no-shows. It proposes an effective approach using sample average approximation (SAA) combined with an accelerating Benders decomposition (ABD) algorithm to solve the problem. The numerical experiments demonstrate the significance of supply-demand balance for the operation and user satisfaction of the shared parking system.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Review Computer Science, Artificial Intelligence

Financial fraud detection using graph neural networks: A systematic review

Soroor Motie, Bijan Raahemi

Summary: Financial fraud is a persistent problem in the finance industry, but Graph Neural Networks (GNNs) have emerged as a powerful tool for detecting fraudulent activities. This systematic review provides a comprehensive overview of the current state-of-the-art technologies in using GNNs for financial fraud detection, identifies gaps and limitations in existing research, and suggests potential directions for future research.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Review Computer Science, Artificial Intelligence

Occluded person re-identification with deep learning: A survey and perspectives

Enhao Ning, Changshuo Wang, Huang Zhang, Xin Ning, Prayag Tiwari

Summary: This review provides a detailed overview of occluded person re-identification methods and conducts a systematic analysis and comparison of existing deep learning-based approaches. It offers important theoretical and practical references for future research in the field.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

A hierarchical attention detector for bearing surface defect detection

Jiajun Ma, Songyu Hu, Jianzhong Fu, Gui Chen

Summary: The article presents a novel visual hierarchical attention detector for multi-scale defect location and classification, utilizing texture, semantic, and instance features of defects through a hierarchical attention mechanism, achieving multi-scale defect detection in bearing images with complex backgrounds.

EXPERT SYSTEMS WITH APPLICATIONS (2024)