A rule-based CBR approach for expert finding and problem diagnosis

被引:40
作者
Tung, Yuan-Hsin [1 ]
Tseng, Shian-Shyong [1 ]
Weng, Jui-Feng [1 ]
Lee, Tsung-Ping [1 ]
Liao, Anthony Y. H.
Tsai, Wen-Nung [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu, Taiwan
关键词
Rule-based CBR; RBR; CBR; Expert finding; Role-based access control; Problem diagnosis;
D O I
10.1016/j.eswa.2009.07.037
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is important to find the person with right expertise and the appropriate solutions in the specific field to solve a critical situation in a large complex system such as an enterprise level application. In this paper, we apply the experts' knowledge to construct a solution retrieval system for expert finding and problem diagnosis. Firstly, we aim to utilize the experts' problem diagnosis knowledge which can identify the error type of problem to suggest the corresponding expert and retrieve the solution for specific error type. Therefore, how to find an efficient way to use domain knowledge and the corresponding experts has become an important issue. To transform experts' knowledge into the knowledge base of a solution retrieval system, the idea of developing a solution retrieval system based on hybrid approach using RBR (rule-based reasoning) and CBR (case-based reasoning), RCBR (rule-based CBR), is proposed in this research. Furthermore, we incorporate domain expertise into our methodology with role-based access control model to suggest appropriate expert for problem solving, and build a prototype system with expert finding and problem diagnosis for the complex system. The experimental results show that RCBR (rule-based CBR) can improve accuracy of retrieval cases and reduce retrieval time prominently. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2427 / 2438
页数:12
相关论文
共 31 条
[1]  
AAMODT A, 1994, AI COMMUN, V7, P39
[2]   A Web based conversational case-based recommender system for ontology aided metadata discovery [J].
Aktas, MS ;
Pierce, M ;
Fox, GC ;
Leake, D .
FIFTH IEEE/ACM INTERNATIONAL WORKSHOP ON GRID COMPUTING, PROCEEDINGS, 2004, :69-75
[3]  
CARSWELL JD, 2002, P 6 EUR C ECCBR 2002, P58
[4]  
Chang CG, 2004, PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P2116
[5]  
Chang YI, 2004, 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, P478
[6]  
Chen YF, 2002, IEEE WCNC, P918, DOI 10.1109/WCNC.2002.993394
[7]  
DUNKER K, 1945, PSYCHOL MONOGRAPHS, V58
[8]  
Eckerson W. W., 1995, OPEN INFORMATION SYS, V3, P1
[9]  
ENOKIDO T, 2008, P IEEE ICDCS JUN, P24
[10]  
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980