{"created":"2020-09-01T13:54:30.589581+00:00","id":4010,"links":{},"metadata":{"_buckets":{"deposit":"120dd56f-2199-447d-ac20-7bd0d683a0e1"},"_deposit":{"id":"4010","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4010"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4010","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Knowledge_based System for Security Services","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Artificial Intelligent (AI) can be considered as tools that emulate human thought to help in solving problems. Knowledge_based system is an important part of Artificial Intelligence. Knowledge_based systems are software systems that have structured knowledge about a field of expertise. They are able to solve some problems with their domain by using knowledge derived from experts in the field. The most common way that knowledge is represented in knowledge_based system is by IF-THEN rules. This system intends to implement for security services using rule based approach as forward and backward chaining methods. This system includes seven types of security services. The users choose necessary facts among the seven types of security services using forward chaining approach, the system produces the final result cost. The users can change their desired cost using backward chaining approach. Then, system can produce the facts rely on the users’ desired cost."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"knowledge_based system"},{"interim":"forward chaining"},{"interim":"backward chaining"},{"interim":"security services"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-05"}],"displaytype":"preview","filename":"55119.pdf","filesize":[{"value":"421 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4010/files/55119.pdf"},"version_id":"d334166a-6187-4e39-a1e4-d5c0a2c0a2e2"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Moe, Yadanar"},{"subitem_authors_fullname":"San, Kalyar Myo"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1721"},"item_title":"Knowledge_based System for Security Services","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-05","publish_status":"0","recid":"4010","relation_version_is_last":true,"title":["Knowledge_based System for Security Services"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:15:24.354073+00:00"}