Building expert systems in prolog

This chapter discusses a forward chaining rule based system and its expert system applications. It shows how the forward chaining system works, how to use it, and how to implement it quickly and easily using Prolog. A large number of expert systems require the use of forward chaining, or data driven inference. The most famous of these is Digital Equipment Corporation's XCON system. It configures computers. It starts with the data about the customer order and works forward toward a configuration based on that data. The XCON system was written in the OPS5 (forward chaining rule based) language. Data driven expert systems are different from the goal driven, or backward chaining systems seen in the previous chapters. The goal driven approach is practical when there are a reasonable number of possible final answers, as in the case of a diagnostic or identification system. The system methodically tries to prove or disprove each possible answer, gathering the needed information as it goes. The data driven approach is practical when combinatorial explosion creates a seemingly infinite number of possible right answers, such as possible configurations of a machine. Forward chaining systems are often called “production” systems. Each of the rules is actually a miniature procedure called a production. When the patterns in the left hand side match working storage elements, then the actions on the right hand side are taken. This chapter concentrates on building a production system called Oops. Production systems are composed of three components. These are: a working storage area which contains the current state of the system; an inference engine which knows how to apply the rules. left hand side (LHS) ==> right hand side (RHS). The LHS is a collection of conditions which must be matched in working storage for the rule to be executed. The RHS contains the actions to be taken if the LHS conditions are met. 1. Select a rule whose left hand side conditions match the current state as stored in the 2. Execute the right hand side of that rule, thus somehow changing the current state. 3. Repeat until there are no rules which apply. Building Expert Systems in Prolog Production systems differ in the sophistication of the algorithm used to select a rule (step 1). The first version of Oops will use the simplest algorithm of just selecting the first rule whose conditions match working storage. The knowledge engineer programs in Oops by creating rules for the particular application. The syntax of the rules is: rule <rule id>: [<N>: <condition>, .] ==> [<action>, .]. rule id — a unique identifier for the rule; N — optional identification for the condition; condition — a pattern to match against working storage; Each condition is a legal Prolog data structure, including variables. Variables are
identified, as in Prolog, by an initial upper case letter, or underscore. In general, the
condition pattern is matched against those stored in working storage. The comparison
operators (>, =<, etc.) are also defined for comparing variables that are bound during the
pattern matching.
Note that the data representation of Oops is richer than that used in Clam. In Clam there were only attribute–value pairs, or object–attribute–value triples. In Oops the data can be represented by any legal Prolog term including variables. The following RHS actions are supported: assert(X) — adds the term X to working storage;
retract(all) — retracts all of the working storage terms which were matched in the
LHS of the rule being executed;
retract(N) — retracts LHS condition number N from working storage;
X = <arithmetic expression> — sets X to the value of the expression;
X # Y — unifies the structures X and Y;
write(X) — writes the term X to the terminal;
nl — writes a new line at the terminal;
read(X) — reads a term and unifies it to X;
prompt(X, Y) — writes X and reads Y;
In the Winston & Horn LISP book there is an example of a forward chaining animal identification system. Some of those rules would be expressed in Oops like this: rule id6: [1: has(X, pointed_teeth), 2: has(X, claws), 3: has(X, forward_eyes)] ==> [retract(all), assert(isa(X, carnivore))]. This rule would fire if working storage contained the Prolog terms: has(robie, pointed_teeth) has(robie, claws) has(robie, forward_eyes) When the rule fired, these three terms would be removed by the retract(all) action on the
RHS, and would be replaced with the term:
Since the working storage elements which matched the conditions were removed, this rule would not fire again. Instead, another rule such as this might fire next: rule id10: [1: isa(X, mammal), 2: isa(X, carnivore), 3: has(X, black_stripes)] ==> [retract(all), assert(isa(X, tiger))]. Rules about relationships are also easily coded. Again from Winston & Horn's example the rule that says children are the same type of animal as their parents is expressed as follows: rule id16: [1: isa(Animal, Type), 2: parent(Animal, Child)] ==> [retract(2), assert(isa(Child, Type))]. This would transform working storage terms like: The working storage is initialized with a statement of the form: Each term is a legal Prolog term, which is asserted in working storage. For example: initial_data([gives(robie, milk), eats_meat(robie), has(robie, tawny_color), has(robie, dark_spots), parent(robie, suzie)]. It would be better if we could set up the system to ask the user for the initial terms. In a conventional programming language we might set up a loop which repeatedly asked for data until the user typed in “end”. Building Expert Systems in Prolog To do the same thing in a production system requires a bit of trickery, which goes against the grain of rule based systems. Theoretically, the rules are independent and don't communicate with each other, but by setting flags in working storage the programmer can force a specific order of rule firings. Here is how to code the input loop in Oops. It violates another tenet of production systems by making use of the known rule selection strategy. In the case of Oops, it is known that rule 1 will be tried before rule 2. initial_data([read_facts]). rule 1: % This is the end condition of [1: end, % the loop. If "end" and 2: read_facts] % "read_facts" are both % in working storage, ==> [retract(all)]. % then remove them both. rule 2: % This is the body of the loop. [1: read_facts] % If "read_facts" is in WS, ==> % then prompt for an attribute [prompt('Attribute? ', X), % and assert it. If X assert(X)]. % is "end", rule 1 will fire next. The animal identification problem is one that can be solved either in a data driven (forward chaining) approach as illustrated here and in Winston & Horn, or in a goal driven (backward chaining) approach. In fact, where the list of possible animals is known the backward chaining approach is probably a more natural one for this problem. A more suitable problem for a forward chaining system is configuration. The Oops sample program in the appendix shows such a system. It lays out furniture in a living room. The program includes a number of rules for laying out furniture. For example: The couch goes on the longer wall of the room, and is not on the same side as the door. If there is a lamp or television on a wall without a plug, buy an extension cord. Here are those rules in Oops. They are more complex due to the need to work with the amount of wall space available. % f1 - the couch goes opposite the door rule f1: [1: furniture(couch, LenC), % an unplaced couch position(door, DoorWall), % find the wall with the door opposite(DoorWall, OW), % the wall opposite the door right(DoorWall, RW), % the wall right of the door 2: wall(OW, LenOW), % available space opposite wall(RW, LenRW), % available space to the right LenOW >= LenRW, % if opposite bigger than right LenC =< LenOW] % length of couch less than % wall space ==> [retract(1), % remove the furniture term assert(position(couch, OW)), % assert new position retract(2), % remove the old wall, length NewSpace = LenOW - LenC, % calculate the space left assert(wall(OW, NewSpace))]. % assert new space % f3 - the tv should be opposite the couch rule f3: [1: furniture(tv, LenTV), 2: position(couch, CW), 3: opposite(CW, W), 4: wall(W, LenW), LenW >= LenTV] ==> [retract(1), assert(position(tv, W)), retract(4), NewSpace = LenW - LenTV, assert(wall(W, NewSpace))]. % get extension cords if needed rule f12: [1: position(tv, W), 2: not(position(plug, W))] ==> [assert(buy(extension_cord, W)), assert(position(plug, W))]. rule f13: [1: position(table_lamp, W), 2: not(position(plug, W))] ==> [assert(buy(extension_cord, W)), assert(position(plug, W))]. The program also uses rules to control a dialog with the user to gather initial data. It needs
to know about room dimensions, furniture to be placed, plug locations, etc. It does this by
setting various data gathering goals. For example the initial goal of the system is to
place_furniture. It gives directions to the user and sets up the goal read_furniture. Once
read_furniture is done (signified by the user entering end : end), it sets up the next goal
of read_walls. Here is the beginning code.
rule 1: [1: goal(place_furniture), % The initial goal causes a 2: legal_furniture(LF)] % rule to fire with introductory info. ==> % It will set a new goal. [retract(1), cls, nl, write('Enter a single item of furniture at each prompt.'), nl, write('Include the width (in feet) of each item.'), nl, write('The format is Item:Length.'), nl, nl, write('The legal values are:'), nl, write(LF), nl, nl, write('When there is no more furniture, enter "end:end".'), nl, assert(goal(read_furniture))]. rule 2: [1: furniture(end, end), % When the furniture is read 2: goal(read_furniture)] % set the new goal of reading ==> % wall sizes [retract(all), assert(goal(read_walls))]. rule 3: [1: goal(read_furniture), % Loop to read furniture. 2: legal_furniture(LF)] ==> [prompt('furniture> ', F:L), member(F, LF), assert(furniture(F, L))]. Building Expert Systems in Prolog rule 4: % If rule 3 matched and failed [1: goal(read_furniture), % the action, then member 2: legal_furniture(LF)] % must have failed. ==> [write('Unknown piece of furniture, must be one of:'), nl, write(LF), nl]. The room configurer illustrates both the strengths and weaknesses of a pure production system. The rules for laying out the furniture are very clear. New rules can be added, and old ones deleted without affecting the system. It is much easier to work with this program structure than it would be to understand procedural code that attempted to do the same thing. On the other hand, the rules which interact with the user to collect data are difficult to read and have interdependencies, which make them hard to maintain. The flow of control is obscured. This code would be better written procedurally, but it is done using Oops to illustrate how these kinds of problems can be solved with a production architecture. An ideal architecture would integrate the two approaches. It would be very simple to let Oops drop back down to Prolog for those cases where Oops is inappropriate. This architecture is covered in chapter 7. The implementation of Oops is both compact and readable due to the following features of Prolog: Each rule is represented as a single Prolog term (a relatively complex structure). The functors of the rule structure are defined as operators to allow the easy-to-read syntax of the rule. Prolog's built-in backtracking search makes rule selection easy. Prolog's built-in pattern matching (unification) makes comparison with working storage easy. Since each rule is a single term, unification causes variables to be automatically bound between LHS conditions and RHS actions. The Prolog database provides an easy representation of working storage. Each rule is a single Prolog term, composed primarily of two lists: the right hand side
(RHS), and the left hand side (LHS). These are stored using Prolog's normal data
structures, with rule being the predicate and the various arguments being lists.
In Clam, DCG was used to allow a friendly, flexible rule format. In Oops, Prolog operators are used. The operators allow for a syntax that is formal, but readable. The operator syntax can also be used directly in the code. Without operator definitions, the rules would look like normal hierarchical Prolog data structures: rule(==>(:(id4, [:(1, flies(X)), :(2, lays_eggs(X))], [retract(all), assert(isa(X, bird))])). The following operator definitions allow for the more readable format of the rules: Working storage is stored in the database under the key fact. So to add a term to working
storage:
and to look for a term in working storage: Figure 5.1 shows the major predicates in the Oops inference engine. The inference cycle of
recognize–act is coded in the predicate go. It searches for the first rule which matches
working storage, and executes it. Then it repeats the process. If no rules match, then the
second clause of go is executed and the inference ends. Then the second clause prints out
the current state showing what was determined during the run. (Note that LHS and RHS
are bound to lists.)
Figure 5.1 Major predicates in Oops inference engine go:- call(rule ID: LHS ==> RHS), try(LHS, RHS), write('Rule fired '), write(ID), nl, !, go. go:- nl, write(done), nl, print_state. This code illustrates the tremendous expressiveness of Prolog. The code is very tight due to the built-in pattern matching and backtracking search. Especially note that since the entire rule is a single Prolog term, the unification between variables in the conditions and actions happens automatically. This leads to a use of variables that is, in some senses, cleaner and more powerful than that found in OPS5. The try/2 predicate is very simple. If match/2 fails, it forces go to backtrack and find the
next rule. The LHS is passed to process so retract statements can find the facts to retract.
try(LHS, RHS):- match(LHS), process(RHS, LHS). Building Expert Systems in Prolog The match/2 predicate recursively goes through the list of conditions, locating them in
working storage. If the condition is a comparison test, then the test is tried, rather than
searched for in the database.
match([]) :- !. match([N:Prem|Rest]) :- !, (fact(Prem); test(Prem)), % a comparison test rather than a fact match(Rest). match([Prem|Rest]) :- (fact(Prem); % condition number not specified test(Prem)), match(Rest). The test/1 predicate can be expanded to include any kind of test. Oops uses most of the
basic tests provided with Prolog, plus a few. For example:
test(X >= Y):- X >= Y, !. test(X = Y):- X is Y, % use = for arithmetic !. test(X # Y):- X = Y, % use # for unification !. test(member(X, Y)):- member(X, Y), !. test(not(X)):- fact(X), !, fail. If match/2 succeeds, then process/2 is called. It executes the RHS list of actions. It is
equally straightforward.
process([], _) :- !. process([Action|Rest], LHS) :- take(Action, LHS), process(Rest, LHS). Only the action retract needs the LHS. The take/2 predicate does a retract if that is what's
called for, or else passes control to take/1, which enumerates the simpler actions. Some
examples are given here.
take(retract(N), LHS) :- (N == all; integer(N)), retr(N, LHS), !. take(A, _) :- take(A), !. take(retract(X)) :- retract(fact(X)), !. take(assert(X)) :- asserta(fact(X)), write(adding-X), nl, !. take(X # Y) :- X = Y, !. take(X = Y) :- X is Y, !. take(write(X)) :- write(X), !. take(nl) :- nl, !. take(read(X)) :- read(X), !. The retr predicate searches for LHS conditions with the same identification (N) and
retracts them. If all was indicated, then it retracts all of the LHS conditions.
retr(all, LHS) :- retrall(LHS), !. retr(N, []) :- write('retract error, no '-N), nl, !. retr(N, [N:Prem|_]) :- retract(fact(Prem)), !. retr(N, [_|Rest]) :- !, retr(N, Rest). retrall([]). retrall([N:Prem|Rest]) :- retract(fact(Prem)), !, retrall(Rest). retrall([Prem|Rest]) :- retract(fact(Prem)), !, retrall(Rest). retrall([_|Rest]) :- % must have been a test retrall(Rest). Oops can be made to look like the other shells by the addition of a command loop predicate with commands similar to those in Clam and Native. Figure 5.2 shows the architecture of Oops. Building Expert Systems in Prolog command_loop
read
write

go
match
process

initial_data
Figure 5.2 Major predicates of the Oops shell Explanations for forward chaining systems are more difficult to implement. This is because each rule modifies working storage, thus covering its tracks. The most useful information in debugging a forward chaining system is a trace facility. That is, you want to know each rule that is fired and the effects it has on working storage. Each fact can have associated with it the rule which posted it, and this would give the immediate explanation of a fact. However, the facts that supported the rules which led up to that fact might have been erased from working memory. To give a full explanation, the system would have to keep time stamped copies of old versions of facts. The trace option is added in Oops in a similar fashion to which it was added in Clam. The inference engine informs the user of the rules that are firing as they fire. Oops in its current state is a simple forward chaining system. More advanced forward chaining systems differ in two main aspects. more sophisticated rule selection when many rules match the current working storage; The current rule selection strategy of Oops is simply to pick the first rule that matches. If many rules match, there might be other optimal choosing strategies. For example, we could pick the rule that matched the most recently asserted facts, or the rule that had the most specific match. Either of these would change the inference pattern of the system to give effects that might be more natural. Oops is also inefficient in its pattern matching, since at each cycle of the system it tries all of the rules against working memory. There are various indexing schemes that can be used to allow for much faster picking of rules which match working memory. These will be discussed in chapter 8. OPS5, which is probably the most well known example of a forward chaining, or production, system offers two different means of selecting rules. One is called LEX and the other is MEA. Both make use of time stamped data to determine the best rule to fire next. They differ slightly in the way in which they use the data. Both of these strategies can be added to Oops as options. For both, the first step is to collect all of the rules whose LHS match working memory at a given cycle. This set of rules is called the conflict set. It is not actually the rules, but rather instantiations of the rules. This means that the same rule might have multiple instantiations if there are multiple facts which match a LHS premise. This will often happen when there are variables in the rules that are bound differently for different instantiations. For example, an expert system to identify animals might have the following condition on the LHS: In working memory there might be the following two facts: . eats(robie, meat). eats(suzie, meat). . Assuming the other conditions on the LHS matched, this would lead to two different
instantiations of the same rule. One for robie and one for suzie.
The simplest way to get the conflict set is to use findall or its equivalent. (If your system
does not have a findall, a description of how to write your own can be found in Clocksin
and Mellish section 7.8, Assert and Retract: Random, Gensym, Findall.) It collects all of
the instantiations of a term in a list. The three arguments to findall are:
a term that is used as a pattern to collect instantiations of variables; an output list whose elements match the pattern of the first argument, and for which there is one element for each successful execution of the query in the second argument. The instantiations of the conflict set will be stored in a structure, r/4. The last three
arguments of r/4 will be the ID, LHS, and RHS of the rule, which will be used later.
The first argument of r/4 is the LHS with the variables instantiated with the working
storage elements that were matched. Each match of a LHS premise and working storage
element is also accompanied by a time stamp indicating when the working storage element
was last updated.
The query to be executed repeatedly by findall will be similar to the one currently used to
find just the first matching rule:
Building Expert Systems in Prolog ?- rule ID : LHS ==> RHS, match(LHS, Inst) Note that match now has a second argument to store the instantiation of the rule, which
will be the first argument to r/4.
The following predicate puts the above pieces together and uses findall to build a list (CS)
of r/4s representing all of the rules that currently match working storage.
conflict_set(CS) :- findall(r(Inst, ID, LHS, RHS), [rule ID: LHS ==> RHS, match(LHS, Inst)], CS). The match predicate just needs to be changed to capture the instantiation of the
conditions. Notice there is an additional argument, Time, in the fact predicate. This is a
time stamp that will be used in the selection process.
match([], []) :- !.
match([N:Prem|Rest], [Prem/Time|IRest]) :-
!,
(fact(Prem, Time);
test(Prem), Time = 0), %comparison, not a fact
match(Rest, IRest).
match([Prem|Rest], [Prem/Time|IRest]) :-
(fact(Prem, Time); % no condition number
test(Prem), Time = 0),
match(Rest, IRest).
The timestamp is just a chronological counter that numbers the facts in working memory
as they are added. All assertions of facts are now handled by the assert_ws predicate as
follows:
assert_ws(fact(X, T)) :- getchron(T), asserta(fact(X, T)). The getchron predicate simply keeps adding to a counter:
getchron(N) :- retract( chron(N) ), NN is N + 1, asserta( chron(NN) ), !. Now that we have a list of possible rules and instantiations in the conflict set, it is necessary to select one. First we will look at the OPS5 LEX method of rule selection. It uses three criteria to select a rule. The first is refraction. This discards any instantiations that have already been fired. Two instantiations are the same if the variable bindings and the time stamps are the same. This prevents the same rule from firing over and over — unless the programmer has caused working memory to be repeatedly updated with the same fact. The second is recency. This chooses the rules that use the most recent elements in working memory. The conflict set rules are ordered with those rules with the highest time stamps first. This is useful to give the system a sense of focus as it works on a problem. Facts that are just asserted will most likely be used next in a rule. The third is specificity. If there are still multiple rules in contention, the most specific is used. The more conditions there are that apply in the LHS of the rule, the more specific it is. For example, a rule with 4 conditions is more specific than one with 3 conditions. This criteria ensures that general case rules will fire after more specific case rules. If after these tests there are still multiple rules which apply, then one is chosen at random. The LEX strategy changes the way in which Oops rules are programmed. In the first version of Oops, the knowledge engineer had to make sure that the working storage elements that caused the rule to fire are changed. It was the knowledge engineer's responsibility to ensure that a rule did not repeatedly fire. The opposite is also true. Where looping is required, the facts matching the LHS must be continually reasserted. In the original version of Oops the knowledge engineer knew the order in which rules would fire, and could use that information to control the inference. Using LEX he/she can still control the inference, but it requires more work. For example, if it is desirable to have the couch placed first by the system, then that rule must be structured to fire first. This can be done by adding a goal to place the couch first and asserting it after the data is gathered. For example: rule gather_data . ==> [. assert( goal(couch_first) ) ]. rule couch [ goal(couch_first), . The gather_data rule will assert the couch_first goal after all other assertions. This
means it is the most recent addition to working storage. The Lex recency criteria will then
ensure that the couch rule is fired next.
The rule which is supposed to fire last in the system also needs to be handled specially. The easiest way to ensure a rule will fire last is to give it an empty list for the LHS. The specificity check will keep it from firing until all others have fired. To implement the LEX strategy, we modify the go predicate to first get the conflict set and
then pass it to the predicate select_rule, which picks the rule to execute. After processing
the rule, the instantiation associated with the rule is saved to be used as a check that it is
not re-executed.
go :- conflict_set(CS), select_rule(CS, r(Inst, ID, LHS, RHS)), process(RHS, LHS), asserta( instantiation(Inst) ), Building Expert Systems in Prolog write('Rule fired '), write(ID), nl, !, go. go. The select_rule predicate applies the three criteria above to select the appropriate rule. The
refract predicate applies refraction, and lex_sort applies both recency and specificity
through a sorting mechanism.
select_rule(CS, R) :- refract(CS, CS1), lex_sort(CSR, [R|_]). First let's look at refract, which removes those rules that duplicate existing instantiations.
It relies on the fact that after each successful rule firing, the instantiation is saved in the
database.
refract([], []). refract([r(Inst, _, _, _)|T], TR) :- instantiation(Inst), !, refract(T, TR). refract([H|T], [H|TR]) :- refract(T, TR). Once refract is done processing the list, only those rules with new instantiations are left
on the list.
The implementation of lex_sort doesn't filter the remaining rules, but sorts them so that
the first rule on the list is the desired rule. This is done by creating a key for each rule that
is used to sort the rules. The key is designed to sort by recency and specificity. The sorting
is done with a common built-in predicate, keysort, which sorts a list by keys where the
elements are in the form: key – term. (If your Prolog does not have a keysort, see
Clocksin and Mellish section 7.7, Sorting.)
lex_sort(L, R) :- build_keys(L, LK), keysort(LK, X), reverse(X, Y), strip_keys(Y, R). The build_keys predicate adds the keys to each term. The keyed list is then sorted by
keysort. It comes out backwards, so it is reversed, and finally the keys are stripped from
the list. In order for this to work, the right key needs to be chosen.
The key that gives the desired results is itself a list. The elements are the time stamps of the various matched conditions in the instantiation of the rule. The key (a list) is sorted so that the most recent (highest number) time stamps are at the head of the list. These complex keys can themselves be sorted to give the correct ordering of the rules. For example, consider the following two rules, and working storage: rule t1: [flies(X), lays_eggs(X)] ==> [assert(bird(X))]. rule t2: [mammal(X), long_ears(X), eats_carrots(X)] ==> [assert(animal(X, rabbit))]. fact( flies(lara), 9). fact( flies(zach), 6). fact( lays_eggs(lara), 7). fact( lays_eggs(zach), 8). fact( mammal(bonbon), 3). fact( long_ears(bonbon), 4). fact( eats_carrots(bonbon), 5). There would be two instantiations of the first rule, one each for lara and zach, and one
instantiation of the second rule for bonbon. The highest numbers are the most recent time
stamps. The keys (in order) for these three instantiations would be:
In order to get the desired sort, lists must be compared element by element starting from
the head of the list. This gives the recency sort. The sort must also distinguish between
two lists of different lengths with the same common elements. This gives the specificity
sort. For AAIS prolog the sort works as desired with recency being more important than
specificity. It should be checked for other Prologs.
build_keys([], []). build_keys([r(Inst, A, B, C)|T], [Key-r(Inst, A, B, C)|TR]) :- build_chlist(Inst, ChL), sort(ChL, X), reverse(X, Key), build_keys(T, TR). build_chlist([], []). build_chlist([_/Chron|T], [Chron|TC]) :- build_chlist(T, TC). The build_keys predicate uses build_chlist to create a list of the time stamps associated
with the LHS instantiation. It then sorts those, and reverses the result, so that the most
recent time stamps are first in the list.
The final predicate, strip_keys, simply removes the keys from the resulting list.
strip_keys([], []). strip_keys([Key-X|Y], [X|Z]) :- strip_keys(Y, Z). The other strategy offered with OPS5 is MEA. This is identical to LEX with one additional filter added. After refraction, it finds the time stamp associated with the first condition of the rule and picks the rule with the highest time stamp on the first condition. If there is more than one, then the normal LEX algorithm is used to pick which of them to use. At first this might seem like an arbitrary decision; however, it was designed to make goal directed programming easier in OPS5. The flow of control of a forward chaining system is often controlled by setting goal facts in working storage. Rules might have goals in the conditions thus ensuring the rule will only fire when that goal is being pursued. Building Expert Systems in Prolog By making the goal condition the first condition on the LHS of each rule, and by using MEA, the programmer can force the system to pursue goals in a specified manner. In fact, using this technique it is possible to build backward chaining systems using a forward chaining tool. The test for MEA is simply added to the system. First, the filter is added to the select_rule
predicate. It will simply return the same conflict set if the current strategy is not MEA.
select_rule(R, CS) :- refract(CS, CS1), mea_filter(0, CS1, [], CSR), lex_sort(CSR, [R|_]). The actual filter predicates build the new list in an accumulator variable, Temp. If the first
time stamp for a given rule is less than the current maximum, it is not included. If it equals
the current maximum, it is added to the list of rules. If it is greater than the maximum, that
timestamp becomes the new maximum, and the list is reinitialized to have just that single
rule.
mea_filter(_, X, _, X) :- not strategy(mea), !. mea_filter(_, [], X, X). mea_filter(Max, [r([A/T|Z], B, C, D)|X], Temp, ML) :- T < Max, !, mea_filter(Max, X, Temp, ML). mea_filter(Max, [r([A/T|Z], B, C, D)|X], Temp, ML) :- T = Max, !, mea_filter(Max, X, [r([A/T|Z], B, C, D)|Temp], ML). mea_filter(Max, [r([A/T|Z], B, C, D)|X], Temp, ML) :- T > Max, !, mea_filter(T, X, [r([A/T|Z], B, C, D)], ML). These examples illustrate some of the difficulties with expert systems in general. The OPS5 programmer must be intimately familiar with the nature of the inferencing in order to get the performance desired from the system. He is only free to use the tools available to him. On the other hand, if the programmer has access to the selection strategy code, and knows the type of inferencing that will be required, the appropriate strategy can be built into the system. Given the accessibility of the above code, it is easy to experiment with different selection strategies. Add a command loop that turns on and off tracing, MEA/LEX strategies, loads rule files, consults the rules, lists working storage, etc. Add a feature that allows for the saving of test case data, which can then be run against the system. The test data and the results are used to debug the system as it undergoes change. Allow each rule to optionally have a priority associated with it. Use the user-defined rule priorities as the first criteria for selecting rule instantiations from the conflict set. Add features on the LHS and RHS that allow rules to be written, which can access the conflict set and dynamically change the rule priorities. Figure out an application for this. Add new syntax to the knowledge base that allows rules to be clustered into rule sets. Maintain separate conflict sets for each rule set and have the inference engine process each rule set to completion. Have higher level rules, which can be used to decide which rule sets to execute. Alternatively, each rule set can have an enabling pattern associated with it that allows it to fire just as individual rules are fired. Each fact in working storage can be thought of as being dependent on other facts. The other facts are those that instantiated the LHS of a rule which updated the fact. By keeping track of these dependencies, a form of truth maintenance can be added to the system. When a fact is then removed from working storage, the system can find other facts that were dependent on it and remove them as well. Building Expert Systems in Prolog

Source: http://ce.yazd.ac.ir/ghasemzadeh/eLecture-ExpertSystem/Ch05-Forward%20Chaining.pdf

Qm2130

Q U I C K S C A N ® M O B I L E Q M 2 1 0 0 General Purpose Handheld Linear Imager Bar Code Reader eliminates the restraints caused by cabled with Datalogic’s STAR Cordless System™ The QuickScan reader series is Datalogic The QM2100’s cradle provides hands-free Scanning’s value line of general purpose charging feature ensures constant up-time for increased productivit

Alco_1893007162_6p_01_r5.qxd

Alco_1893007162_6p_01_r5.qxd 4/4/03 11:17 AM Page 388 This lawyer tried psychiatrists, biofeedback, relax- ation exercises, and a host of other techniques to con-trol her drinking. She finally found a solution,uniquely tailored, in the Twelve Steps. W hen i wasa newly minted lawyer starting outin the practice of criminal law, there were fiveof us in our law office. My favorite lawyer was the

Copyright ©2018 Sedative Dosing Pdf