1,470 research outputs found

    Method for Detecting Anomalous States of a Control Object in Information Systems Based on the Analysis of Temporal Data and Knowledge

    Get PDF
    The problem of finding the anomalous states of the control object in the management information system under conditions of uncertainty caused by the incompleteness of knowledge about this object is considered. The method of classifying the current state of the control object in real time, allowing to identify the current anomalous state. The method uses temporal data and knowledge. Data is represented by sequences of events with timestamps. Knowledge is represented as weighted temporal rules and constraints. The method includes the following key phases: the formation of sequences of logical facts; selection of temporal rules and constraints; classification based on a comparison of rules and constraints. Logical facts are represented as predicates on event attributes and reflect the state of the control object. Logical rules define valid sequences of logical facts. Performing a classification by successive comparisons of constraints and weights of the rules makes it possible to more effectively identify the anomalous state since the comparison of the constraints reduces the subset of facts comparing to the current state. The method creates conditions for improving management efficiency in the context of incomplete information on the state of a complex object by using logical inference in knowledge bases for anomalous states of such control objects

    Method of Forming Recommendations Using Temporal Constraints in a Situation of Cyclic Cold Start of the Recommender System

    Get PDF
    The problem of the formation of the recommended list of items in the situation of cyclic cold start of the recommendation system is considered. This problem occurs when building recommendations for occasional users. The interests of such consumers change significantly over time. These users are considered “cold” when accessing the recommendation system. A method for building recommendations in a cyclical cold start situation using temporal constraints is proposed. Temporal constraints are formed on the basis of the selection of repetitive pairs of actions for choosing the same objects at a given level of time granulation. Input data is represented by a set of user choice records. For each entry, a time stamp is indicated. The method includes the phases of the formation of temporal constraints, the addition of source data using these constraints, as well as the formation of recommendations using the collaborative filtering algorithm. The proposed method makes it possible, with the help of temporal constraints, to improve the accuracy of recommendations for “cold” users with periodic changes in their interests

    The Method of Constructing Recommendations Online on the Temporal Dynamics of User Interests Using Multilayer Graph

    Get PDF
    The problem of the online construction of a rating list of objects in the recommender system is considered. A method for constructing recommendations online using the presentation of input data in the form of a multi-layer graph based on changes in user interests over time is proposed. The method is used for constructing recommendations in a situation with implicit feedback from the user. Input data are represented by a sequence of user choice records with a time stamp for each choice. The method includes the phases of pre-filtering of data and building recommendations by collaborative filtering of selected data. At pre-filtering of the input data, the subset of data is split into a sequence of fixed-length non-overlapping time intervals. Users with similar interests and records with objects of interest to these users are selected on a finite continuous subset of time intervals. In the second phase, the pre-filtered subset of data is used, which allows reducing the computational costs of generating recommendations. The method allows increasing the efficiency of building a rating list offered to the target user by taking into account changes in the interests of the user over time

    Method For Detecting Shilling Attacks In E-commerce Systems Using Weighted Temporal Rules

    Full text link
    The problem of shilling attacks detecting in e-commerce systems is considered. The purpose of such attacks is to artificially change the rating of individual goods or services by users in order to increase their sales. A method for detecting shilling attacks based on a comparison of weighted temporal rules for the processes of selecting objects with explicit and implicit feedback from users is proposed. Implicit dependencies are specified through the purchase of goods and services. Explicit feedback is formed through the ratings of these products. The temporal rules are used to describe hidden relationships between the choices of user groups at two consecutive time intervals. The method includes the construction of temporal rules for explicit and implicit feedback, their comparison, as well as the formation of an ordered subset of temporal rules that capture potential shilling attacks. The method imposes restrictions on the input data on sales and ratings, which must be ordered by time or have timestamps. This method can be used in combination with other approaches to detecting shilling attacks. Integration of approaches allows to refine and supplement the existing attack patterns, taking into account the latest changes in user priorities

    METHOD OF CONSTRUCTING AN ATTRIBUTE DESCRIPTION OF THE BUSINESS PROCESS "AS IS" IN THE PROCESS APPROACH TO ENTERPRISE MANAGEMENT

    Get PDF
    The problem of constructing an attribute description of a business process with the automated formation of process models “as is” using logs of information systems in which the tracks of individual processes are not identified is considered. It is shown that to solve this problem, it is advisable to distinguish the distinctive properties of individual business processes represented by the attributes of log events. A method for constructing an attribute description of a business process is proposed. The method is based on the comparison of combinations of attributes for intervals of events of a fixed length and the subsequent selection of subsets of attributes with the same values. The method includes the steps of forming the intervals of events, constructing combinations of attributes for specified intervals, as well as calculating and subsequently averaging the weights of combinations of attributes on these intervals. The result of the method is a weight-ordered set of event attributes and their values, which takes into account the attribute and temporal aspects of the business process. The method creates conditions for a more efficient transition from functional to process management based on splitting the log into processes using the resulting attribute description and subsequent prototyping of business process models “as is” by means of process mining

    Consciosusness in Cognitive Architectures. A Principled Analysis of RCS, Soar and ACT-R

    Get PDF
    This report analyses the aplicability of the principles of consciousness developed in the ASys project to three of the most relevant cognitive architectures. This is done in relation to their aplicability to build integrated control systems and studying their support for general mechanisms of real-time consciousness.\ud To analyse these architectures the ASys Framework is employed. This is a conceptual framework based on an extension for cognitive autonomous systems of the General Systems Theory (GST).\ud A general qualitative evaluation criteria for cognitive architectures is established based upon: a) requirements for a cognitive architecture, b) the theoretical framework based on the GST and c) core design principles for integrated cognitive conscious control systems

    METHOD FOR DETECTING ANOMALOUS STATES OF A CONTROL OBJECT IN INFORMATION SYSTEMS BASED ON THE ANALYSIS OF TEMPORAL DATA AND KNOWLEDGE

    Get PDF
    The problem of finding the anomalous states of the control object in the management information system under conditions of uncertainty caused by the incompleteness of knowledge about this object is considered. The method of classifying the current state of the control object in real time, allowing to identify the current anomalous state. The method uses temporal data and knowledge. Data is represented by sequences of events with timestamps. Knowledge is represented as weighted temporal rules and constraints. The method includes the following key phases: the formation of sequences of logical facts; selection of temporal rules and constraints; classification based on a comparison of rules and constraints. Logical facts are represented as predicates on event attributes and reflect the state of the control object. Logical rules define valid sequences of logical facts. Performing a classification by successive comparisons of constraints and weights of the rules makes it possible to more effectively identify the anomalous state since the comparison of the constraints reduces the subset of facts comparing to the current state. The method creates conditions for improving management efficiency in the context of incomplete information on the state of a complex object by using logical inference in knowledge bases for anomalous states of such control objects

    METHOD OF AUTOMATED CONSTRUCTION AND EXPANSION OF THE KNOWLEDGE BASE OF THE BUSINESS PROCESS MANAGEMENT SYSTEM

    Get PDF
    The problem of constructing and using the knowledge representation in the process control system is studied. It is shown that when implementing knowledge-intensive business process management, it is necessary to use automated construction and expansion knowledge base to support decision-making in accordance with the current state of the context for the implementation of business process actions. The state of the context is specified as a set of weighted logical facts, the arguments of which are the values of the attributes of the events of the business process log. The sequence of the process implementation at each moment of time is displayed in the form of a probabilistic distribution of the possible rules of executing the actions of the business process in this context. The method of automated construction and updating of the knowledge base of the information system of process control is proposed. The method includes the stages of forming knowledge representation templates, constructing context descriptions, logical facts, constructing rules, and calculating the probability distribution for rules. The method creates opportunities to support decision-making on the management of the business process in the event of a discrepancy between the current implementation of the business process and its model

    METHOD OF FORMING RECOMMENDATIONS USING TEMPORAL CONSTRAINTS IN A SITUATION OF CYCLIC COLD START OF THE RECOMMENDER SYSTEM

    Get PDF
    The problem of the formation of the recommended list of items in the situation of cyclic cold start of the recommendation system is considered. This problem occurs when building recommendations for occasional users. The interests of such consumers change significantly over time. These users are considered “cold” when accessing the recommendation system. A method for building recommendations in a cyclical cold start situation using temporal constraints is proposed. Temporal constraints are formed on the basis of the selection of repetitive pairs of actions for choosing the same objects at a given level of time granulation. Input data is represented by a set of user choice records. For each entry, a time stamp is indicated. The method includes the phases of the formation of temporal constraints, the addition of source data using these constraints, as well as the formation of recommendations using the collaborative filtering algorithm. The proposed method makes it possible, with the help of temporal constraints, to improve the accuracy of recommendations for “cold” users with periodic changes in their interests
    corecore