Degrees of Information Relevance in Situation Assessment

被引:0
|
作者
Lu, Shan [1 ]
Kokar, Mieczyslaw M. [1 ]
机构
[1] Northeastern Univ, Dept Elect & Comp Engn, Boston, MA 02115 USA
关键词
relevance reasoning; situation assessment; RETRIEVAL; AWARENESS; SELECTION; WHOLE;
D O I
10.1109/cogsima49017.2020.9216086
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information overload is a big challenge that the decision makers need to overcome while assessing and sharing information about the situations they are dealing with. In our previous papers, we developed an information relevance reasoning method to support the human decision makers to identify the relevant information that needs to be processed. However, the amount of the relevant information identified by this method still may grow fast when large volumes of information are continuously added to the knowledge base. The collected information selected by this method would include redundant facts, which are relevant to a situation, but not necessary for understanding the situation. In order to identify only the information that is necessary for characterizing a specific situation, we need to refine the definition of relevant information. In this paper, we first extend the conceptual framework for the identification of information relevance developed in our previous papers by considering degrees of relevance. Based on the definition of weak relevance and strong relevance, we develop relevant information simplification algorithms to remove the redundant facts from the weakly relevant facts. We evaluate our method in a medical cyber security scenario. The results show that our relevant information simplification method reduces the size of the information for characterizing a specific situation and the amount of time that is needed to infer answers to queries related to the situation. We also verify that by removing the redundant relevant information we can get the same answers to the queries as if using the whole knowledge base.
引用
收藏
页码:180 / 187
页数:8
相关论文
共 50 条
  • [1] A Situation Assessment Framework for Cyber Security Information Relevance Reasoning
    Lu, Shan
    Kokar, Mieczyslaw M.
    [J]. 2015 18TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2015, : 1459 - 1466
  • [2] Inference-Based Information Relevance Reasoning Method in Situation Assessment
    Lu, Shan
    Kokar, Mieczyslaw
    [J]. Information (Switzerland), 2024, 15 (10)
  • [3] Team situation assessment and information distribution
    Artman, H
    [J]. ERGONOMICS, 2000, 43 (08) : 1111 - 1128
  • [4] Situation assessment and impact assessment activities in information fusion
    Hinman, ML
    [J]. SIGNAL PROCESSING, SENSOR FUSION, AND TARGET RECOGNITION X, 2001, 4380 : 351 - 360
  • [5] Pedigree information for enhanced situation and threat assessment
    Ceruti, Marion G.
    Das, Subrata
    Ashenfelter, Adam
    Raven, Gary
    Brooks, Richard
    Sudit, Moises
    Chen, Genshe
    Wright, Edward
    [J]. 2006 9TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2006, : 1661 - 1668
  • [6] Degrees of Perceived Control Over Personal Information: Effects of Information Relevance and Levels of Processing
    Shulman, Yefim
    Meyer, Joachim
    [J]. IEEE ACCESS, 2022, 10 : 40596 - 40608
  • [7] AN ENVIRONMENTAL HEALTH INFORMATION SYSTEM ASSESSMENT OF THE SITUATION IN GREECE
    Cavoura, O.
    Katsiri, A.
    Katsiris, N.
    Mantziaras, I. D.
    Dalbokova, D.
    [J]. GLOBAL NEST JOURNAL, 2011, 13 (03): : 300 - 308
  • [8] ANALYSES OF THE CONCEPT OF TRUST IN INFORMATION FUSION AND SITUATION ASSESSMENT
    Atoyan, Hasmik
    Shahbazian, Elisa
    [J]. HARBOUR PROTECTION THROUGH DATA FUSION TECHNOLOGIES, 2009, : 161 - 170
  • [9] The nature of situation assessment in new information retrieval environments
    Cool, C
    [J]. PROCEEDINGS OF THE ASIS ANNUAL MEETING, 1997, 34 : 135 - 146
  • [10] A Hierarchical Framework of Security Situation Assessment for Information System
    Jia, Yiyang
    Wu, Haiyan
    Jiang, Dongxing
    [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, : 23 - 28