Possible conflicts:: A compilation technique for consistency-based diagnosis

被引:68
|
作者
Pulido, B [1 ]
González, CA [1 ]
机构
[1] Univ Valladolid, Dept Informat, E-47011 Valladolid, Spain
关键词
analytical redundancy relations (ARRs); compilation of dependencies; conflicts; model-based diagnosis; possible conflicts;
D O I
10.1109/TSMCB.2004.835007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Consistency-based diagnosis is one of the most widely used approaches to model-based diagnosis within the artificial intelligence community. It is usually carried out through an iterative cycle of behavior prediction, conflict detection, candidate generation, and candidate refinement. In that process conflict detection has proven to be a nontrivial step from the theoretical point of view. For this reason, many approaches to consistency-based diagnosis have relied upon some kind of dependency-recording. These techniques have had different problems, specially when they were applied to diagnose dynamic systems. Recently, offline dependency compilation has established itself as a suitable alternative approach to online dependency- recording. In this paper we propose the possible conflict concept as a compilation technique for consistency- based diagnosis. Each possible conflict represents a subsystem within system description containing minimal analytical redundancy and being capable to become a conflict. Moreover, the whole set of possible conflicts can be computed offline with no model evaluation. Once we have formalized the possible. conflict concept, we explain how possible conflicts can be used in the consistency-based diagnosis framework, and how this concept can be easily extended to diagnose dynamic systems. Finally, we analyze its relation to conflicts in the general diagnosis engine (GDE) framework and compare possible conflicts with other compilation techniques, especially with analytical redundancy relations (ARRs) obtained through structural analysis. Based on results from these comparisons we provide additional insights in the work carried out within the BRIDGE community to provide a common framework for model-based diagnosis for both artificial intelligence and control engineering approaches.
引用
收藏
页码:2192 / 2206
页数:15
相关论文
共 50 条
  • [1] Improving robustness in consistency-based diagnosis using possible conflicts
    Pulido, Belarmino
    Bregon, Anibal
    Alonso-Gonzalez, Carlos
    [J]. ECAI 2008, PROCEEDINGS, 2008, 178 : 791 - 792
  • [2] Consistency-based diagnosis
    Palshikar, GK
    [J]. DR DOBBS JOURNAL, 2001, 26 (03): : 50 - +
  • [3] Distributed Consistency-Based Diagnosis
    Armant, Vincent
    Dague, Philippe
    Simon, Laurent
    [J]. LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, PROCEEDINGS, 2008, 5330 : 113 - +
  • [4] Dependent Failures in Consistency-based Diagnosis
    Weber, Joerg
    Wotawa, Franz
    [J]. ECAI 2008, PROCEEDINGS, 2008, 178 : 801 - +
  • [5] PHYSIOLOGICAL APPLICATIONS OF CONSISTENCY-BASED DIAGNOSIS
    DOWNING, KL
    [J]. ARTIFICIAL INTELLIGENCE IN MEDICINE, 1993, 5 (01) : 9 - 30
  • [6] Kernel consistency-based diagnosis and kernel abductive diagnosis
    Ouyang, Dantong
    Jiang, Yunfei
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 1998, 21 (06): : 540 - 545
  • [7] Consistency-based diagnosis of configuration knowledge bases
    Felfernig, A
    Friedrich, GE
    Jannach, D
    Stumptner, M
    [J]. ECAI 2000: 14TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2000, 54 : 146 - 150
  • [8] Consistency-based diagnosis of configuration knowledge bases
    Felfernig, A
    Friedrich, G
    Jannach, D
    Stumptner, M
    [J]. ARTIFICIAL INTELLIGENCE, 2004, 152 (02) : 213 - 234
  • [9] Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry
    Wei, Sheng
    Potkonjak, Miodrag
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014, 22 (09) : 1845 - 1853
  • [10] Scalable consistency-based hardware trojan detection and diagnosis
    Wei S.
    Potkonjak M.
    [J]. Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 176 - 183