MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "120dd56f-2199-447d-ac20-7bd0d683a0e1"}, "_deposit": {"id": "4010", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4010"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4010", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Knowledge_based System for Security Services", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Artificial Intelligent (AI) can be considered as tools that emulate human thought to help in solving problems. Knowledge_based system is an important part of Artificial Intelligence. Knowledge_based systems are software systems that have structured knowledge about a field of expertise. They are able to solve some problems with their domain by using knowledge derived from experts in the field. The most common way that knowledge is represented in knowledge_based system is by IF-THEN rules. This system intends to implement for security services using rule based approach as forward and backward chaining methods. This system includes seven types of security services. The users choose necessary facts among the seven types of security services using forward chaining approach, the system produces the final result cost. The users can change their desired cost using backward chaining approach. Then, system can produce the facts rely on the users’ desired cost."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "knowledge_based system"}, {"interim": "forward chaining"}, {"interim": "backward chaining"}, {"interim": "security services"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-05"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55119.pdf", "filesize": [{"value": "421 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 421000.0, "url": {"url": "https://meral.edu.mm/record/4010/files/55119.pdf"}, "version_id": "d334166a-6187-4e39-a1e4-d5c0a2c0a2e2"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Moe, Yadanar"}, {"subitem_authors_fullname": "San, Kalyar Myo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1721"}, "item_title": "Knowledge_based System for Security Services", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004010", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-05"}, "publish_date": "2019-08-05", "publish_status": "0", "recid": "4010", "relation": {}, "relation_version_is_last": true, "title": ["Knowledge_based System for Security Services"], "weko_shared_id": -1}
Knowledge_based System for Security Services
http://hdl.handle.net/20.500.12678/0000004010
http://hdl.handle.net/20.500.12678/000000401070161831-6524-4bab-8886-39795a45193f
120dd56f-2199-447d-ac20-7bd0d683a0e1
Name / File | License | Actions |
---|---|---|
55119.pdf (421 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Knowledge_based System for Security Services | |||||
Language | en | |||||
Publication date | 2009-12-30 | |||||
Authors | ||||||
Moe, Yadanar | ||||||
San, Kalyar Myo | ||||||
Description | ||||||
Artificial Intelligent (AI) can be considered as tools that emulate human thought to help in solving problems. Knowledge_based system is an important part of Artificial Intelligence. Knowledge_based systems are software systems that have structured knowledge about a field of expertise. They are able to solve some problems with their domain by using knowledge derived from experts in the field. The most common way that knowledge is represented in knowledge_based system is by IF-THEN rules. This system intends to implement for security services using rule based approach as forward and backward chaining methods. This system includes seven types of security services. The users choose necessary facts among the seven types of security services using forward chaining approach, the system produces the final result cost. The users can change their desired cost using backward chaining approach. Then, system can produce the facts rely on the users’ desired cost. | ||||||
Keywords | ||||||
knowledge_based system, forward chaining, backward chaining, security services | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1721 | |||||
Journal articles | ||||||
Fourth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |