This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Generalized Associative Petri Net for Reasoning
September 2007 (vol. 19 no. 9)
pp. 1241-1251
The application of fuzzy Petri Nets to the development of intelligent systems has received an increasing attention recently. However, the fuzzy production rules are rather limited if the determination of certainty factor for each proposition is subjective. Unfortunately, this is the case for many existing fuzzy Petri nets. This paper proposes a generalized associative Petri net model with associative degree and knowledge representation of a rule-based system. Based on the generalized associative Petri net model, an efficient reasoning algorithm is proposed. The ontology mapping and the associative reasoning algorithm are described formally in details. An example of malicious email reasoning is also included as an illustration.

[1] R. Agrawal, T. Imielinski, and A. Swami, “Database Mining: A Performance Perspective,” IEEE Trans. Knowledge and Data Eng., vol. 5, no. 6, pp. 914-925, Dec. 1993.
[2] R. Agrawal, T. Imielinski, and A. Swami, “Mining Association Rules between Sets of Items in Large Databases,” Proc. ACM SIGMOD Conf. Management of Data, pp. 207-216, May 1993.
[3] R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules,” Proc. Int'l Conf. Very Large Databases (VLDB '94), pp. 487-499, Sept. 1994.
[4] A. Bernaras, I. Laresgoiti, and J. Corera, “Building and Reusing Ontologies for Electrical Network Applications,” Proc. European Conf. Artificial Intelligence (ECAI '96), pp. 298-302, 1996.
[5] S. Chen, J.S. Ke, and J. Chang, “Knowledge Representation Using Fuzzy Petri Nets,” IEEE Trans. Knowledge and Data Eng., vol. 2, no. 3, pp. 311-319, Sept. 1990.
[6] S. Corcho, M. Fernández-López, and A. Gómez-Pérez, “Methodologies, Tools and Languages for Building Ontologies: Where Is Their Meeting Point?” Data Knowledge Eng., vol. 46, no. 1, pp. 41-64, 2003.
[7] R. Crawford, P. Kerchen, K. Levitt, R. Olsson, M. Archer, and M. Casillas, “Automated Assistance for Detecting Malicious Code,” Proc. Sixth Int'l Computer Virus and Security Conf., 1993.
[8] K.A. Dahlgren, “Linguistic Ontology,” Int'l J. Human-Computer Studies, vol. 43, pp. 809-818, 1995.
[9] C. Flavian and M. Guinaliu, “Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site,” Industrial Management and Data Systems, vol. 106, no. 5, pp.601-620,
[10] M. Gruninger and M.S. Fox, “Methodology for the Design and Evaluation of Ontologies,” Proc. Workshop Basic Ontological Issues in Knowledge Sharing, 1995.
[11] D. Gryaznov, “Scanners of the Year 2000: Heuristics,” Proc. Fifth Int'l Virus Bull., pp. 225-234, 1999.
[12] J. Han and M. Kamber, Data Mining Concepts and Techniques, pp.226-230. Morgan Kaufmann, 2001.
[13] K. Hirota and W. Pedrycz, “OR/AND Neuron in Modeling Fuzzy Set Connectives,” IEEE Trans. Fuzzy Systems, vol. 2, no. 2, pp. 151-161, 1994.
[14] M. Horridge, H. Knublauch, A. Rector, R. Stevens, and C. Wroe, “A Practical Guide to Building OWL Ontologies Using the Protégé-OWL Plug-In and CO-ODE Tools,” ed. 1.0, http://www.co-ode.org/resources/tutorials ProtegeOWLTutorial.pdf, 2004.
[15] Z. Kedad and E. Metais, “Dealing with Semantic Heterogeneity During Data Integration,” Proc. 18th Int'l Conf. Conceptual Modeling, J. Akoka, M. Bouzeghoub, I. Comyn-Wattiau, and E.Metais, eds., pp. 325-339, 1999.
[16] S. Kim and C.S. Leem, “Enterprise Security Architecture in Business Convergence Environments,” Industrial Management and Data Systems, vol. 105, no. 7, pp. 919-936, 2005.
[17] P. Kerchen, R. Lo, J. Crossley, G. Elkinbard, and R. Ollson, “Static Analysis Virus Detection Tools for UNIX Systems,” Proc. 13th Nat'l Computer Security Conf., pp. 350-365, 1990.
[18] J.O. Kephart and W.C. Arnold, “Automatic Extraction of Computer Virus Signatures,” Proc. Fourth Virus Bull. Int'l Conf., pp. 178-184, 1994.
[19] D.B. Lenat, “CYC: A Large-Scale Investment in Knowledge Infrastructure,” Comm. ACM, vol. 38, no. 11, pp. 33-41, 1995.
[20] D.B. Lenat and R.V. Guha, Building Large Knowledge-Based Systems: Representation and Inference in the Cyc Project. Addison-Wesley, 1990.
[21] X. Li and W. Yu, “Dynamic Knowledge Inference and Learning Under Adaptive Fuzzy Petri Net Framework,” IEEE Trans. Systems, Man, and Cybernetics—PART C: Applications and Rev., vol. 30, no. 4, pp. 442-450, 2000.
[22] X. Li and F.L. Rosano, “Adaptive Fuzzy Petri Nets for Dynamic Knowledge Representation and Inference,” Expert System with Applications, vol. 19, no. 3, pp. 235-241, 2000.
[23] C.G. Looney, “Fuzzy Petri Nets and Applications,” Fuzzy Reasoning in Information, Decision and Control Systems, S.G. Tzafestas and A.N. Venetsanopoulos, eds., pp. 511-527, Kluwer Academic Publishers, 1994.
[24] C.G. Looney and A.R. Alfize, “Logical Controls via Boolean Rule Matrix Transformations,” IEEE Trans. Systems, Man, and Cybernetics, vol. 17, no. 6, pp. 1077-1082, Nov./Dec. 1987.
[25] R.W. Lo, K.N. Levitt, and R.A. Olsson, “MCF: A Malicious Code Filter,” Computers and Security, vol. 14, no. 6, pp. 541-566, 1995.
[26] G. McGraw and G. Morrisett, “Attacking Malicious Code: Report to the Infosec Research Council,” IEEE Software, vol. 17, no. 5, pp.33-41, Sept./Oct. 2000.
[27] D. Michie, J. Spiegelhalter, and D.C.C. Taylor, “Machine Learning of Rules and Trees,” Machine Learning, Neural and Statistical Classification, Ellis Horwood, 1994.
[28] R. Mizoguchi, “Tutorial on Ontological Engineering—Part 1: Introduction to Ontological Engineering New Generation Computing,” New Generation Computing, vol. 21, no. 4, pp. 365-384, 2003.
[29] T. Murata, “Petri Nets: Properties, Analysis and Applications,” Proc. IEEE, vol. 77, no. 4, pp. 541-580, 1989.
[30] OWL Web Ontology Language Overview, http://www.w3.org/2001/swWebOnt/, 2005.
[31] W. Pedrycz and F. Gomide, “A Generalized Fuzzy Petri Net Model,” IEEE Trans. Fuzzy Systems, vol. 2, no. 4, pp. 295-301, 1994.
[32] Protégé 2000, http:/protege.stanford.edu/, 2005.
[33] D.H. Shih and H.S. Chiang, “Email Virus: How Organizations Can Protect Their Emails,” Online Information Rev., vol. 28, no. 5, pp.356-366, 2004.
[34] D.H. Shih, H.S. Chiang, C.Y. Chan, and B. Lin, “Internet Security: Malicious E-Mails Detection and Protection,” Industrial Management and Data Systems, vol. 104, no. 7, pp. 613-623,
[35] D.H. Shih, H.S. Chiang, and D.C. Yen, “Classification Methods in the Detection of New Malicious Emails,” Information Sciences, vol. 172, nos. 1-2, pp. 241-261, June9, 2005.
[36] E.H. Spafford, “The Internet Worm Program: An Analysis,” Technical Report CSD-TR-823, Dept. of Computer Science, Purdue Univ., 1988.
[37] V. Sugumaran and V.C. Storey, “Ontologies for Conceptual Modeling: Their Creation, Use, and Management,” Data and Knowledge Eng., vol. 24, no. 3, pp. 251-271, 2002.
[38] A.T. Swartout, “Ontologies,” IEEE Intelligent Systems and Their Applications, vol. 14, no. 1, pp. 18-19, 1999.
[39] D.S. Yeung and E.C.C. Tsang, “A Multilevel Weighted Fuzzy Reasoning Algorithm for Expert Systems,” IEEE Trans. Systems, Man, and Cybernetics, vol. 28, no. 2, pp. 149-158, 1998.
[40] M. Uschold and M. King, “Towards a Methodology for Building Ontologies,” Proc. 14th Int'l Joint Conf. Artificial Intelligence Workshop Basic Ontological Issues in Knowledge Sharing, pp. 6.1-6.10, 1995.

Index Terms:
Ontology, Petri net, Reasoning, Association rule, Data mining
Citation:
Dong-Her Shih, Hsiu-Sen Chiang, Binshan Lin, "A Generalized Associative Petri Net for Reasoning," IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 9, pp. 1241-1251, Sept. 2007, doi:10.1109/TKDE.2007.1068
Usage of this product signifies your acceptance of the Terms of Use.