Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "120dd56f-2199-447d-ac20-7bd0d683a0e1"}, "_deposit": {"id": "4010", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4010"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4010", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Knowledge_based System for Security Services", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Artificial Intelligent (AI) can be considered as tools that emulate human thought to help in solving problems. Knowledge_based system is an important part of Artificial Intelligence. Knowledge_based systems are software systems that have structured knowledge about a field of expertise. They are able to solve some problems with their domain by using knowledge derived from experts in the field. The most common way that knowledge is represented in knowledge_based system is by IF-THEN rules. This system intends to implement for security services using rule based approach as forward and backward chaining methods. This system includes seven types of security services. The users choose necessary facts among the seven types of security services using forward chaining approach, the system produces the final result cost. The users can change their desired cost using backward chaining approach. Then, system can produce the facts rely on the users’ desired cost."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "knowledge_based system"}, {"interim": "forward chaining"}, {"interim": "backward chaining"}, {"interim": "security services"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-05"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55119.pdf", "filesize": [{"value": "421 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 421000.0, "url": {"url": "https://meral.edu.mm/record/4010/files/55119.pdf"}, "version_id": "d334166a-6187-4e39-a1e4-d5c0a2c0a2e2"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Moe, Yadanar"}, {"subitem_authors_fullname": "San, Kalyar Myo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1721"}, "item_title": "Knowledge_based System for Security Services", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004010", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-05"}, "publish_date": "2019-08-05", "publish_status": "0", "recid": "4010", "relation": {}, "relation_version_is_last": true, "title": ["Knowledge_based System for Security Services"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Knowledge_based System for Security Services

http://hdl.handle.net/20.500.12678/0000004010
http://hdl.handle.net/20.500.12678/0000004010
70161831-6524-4bab-8886-39795a45193f
120dd56f-2199-447d-ac20-7bd0d683a0e1
None
Preview
Name / File License Actions
55119.pdf 55119.pdf (421 Kb)
Publication type
Article
Upload type
Publication
Title
Title Knowledge_based System for Security Services
Language en
Publication date 2009-12-30
Authors
Moe, Yadanar
San, Kalyar Myo
Description
Artificial Intelligent (AI) can be considered as tools that emulate human thought to help in solving problems. Knowledge_based system is an important part of Artificial Intelligence. Knowledge_based systems are software systems that have structured knowledge about a field of expertise. They are able to solve some problems with their domain by using knowledge derived from experts in the field. The most common way that knowledge is represented in knowledge_based system is by IF-THEN rules. This system intends to implement for security services using rule based approach as forward and backward chaining methods. This system includes seven types of security services. The users choose necessary facts among the seven types of security services using forward chaining approach, the system produces the final result cost. The users can change their desired cost using backward chaining approach. Then, system can produce the facts rely on the users’ desired cost.
Keywords
knowledge_based system, forward chaining, backward chaining, security services
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1721
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:54:34.791113
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL