Lecture 8 Expert System
Lecture 8 Expert System
Advanced
Introduction Expert Systems Topics
Problem
Solving Uncertainty Conclusion
Genetic
Algorithms Learning
Knowledge
Representation Planning
& Reasoning
What is an Expert?
■ What characterizes an ‘Expert’
❑ Specialized knowledge in a certain area
❑ Experience in the given area
❑ Explanation of decisions
❑ Reasoning
Comparison of a Human Expert and an Expert System
Solution Conclusions
Expert System Structure
Expert System
Working Memory
Analogy: STM
-Initial Case facts
-Inferred facts
Inference USER
Engine
Knowledge Base
STM: Short Term Memory
Analogy: LTM
LTM: Long Term Memory
- Domain Knowledge
Knowledge Base
■ Part of the expert system that contains the domain
knowledge
❑ Problem facts, Rules
❑ Concepts
❑ Relationships
18
Backward Chaining
■ With this strategy, an expert system finds out the answer to the
question, “Why this happened?”
19
Doctor Example
■ Rules
❑ Rule 1
IF The patient has deep cough
AND We suspect an infection
THEN The patient has Pneumonia
❑ Rule 2
38
Development of Expert Systems: Steps
■ Develop the Prototype
• Acquire domain knowledge from the expert.
• Represent it in the form of If-THEN-ELSE rules.
■ Test and Refine the Prototype
• The knowledge engineer uses sample cases to test the prototype for any
deficiencies in performance.
• End users test the prototypes of the ES.
■ Develop and Maintain the ES
• Test and ensure the interaction of the ES with all elements of its environment,
including end users, databases, and other information systems.
• Document the ES project and Train the user to use ES.
• Keep the knowledge base up-to-date by regular review and update.
• Cater for new interfaces with other information systems.
39
When (Not) to Use an ES?
■ Expert systems are not suitable for all types of domains and
tasks especially when:
❑ Efficient conventional algorithms are known
❑ The main challenge is computation, not the knowledge
❑ Knowledge cannot be captured efficiently or used effectively
❑ Users are reluctant to apply an expert system, e.g. due to criticality
of task, high risk or high security demands
40