<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>1st International Workshop on Combinations of Intelligent Methods and Applications (CIMA 2008)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tuesday July</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patras</string-name>
          <email>ihatz@ceid.upatras.gr</email>
          <email>ihatz@ceid.upatras.gr.</email>
          <email>michailo@ceid.upatras.gr.</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Greece</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ioannis Hatzilygeroudis</institution>
          ,
          <addr-line>Constantinos Koutsojannis and Vasile Palade</addr-line>
        </aff>
      </contrib-group>
      <fpage>27</fpage>
      <lpage>68</lpage>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Proceedings
Copyright © 2008 for the individual papers by the papers’ authors. Copying is
permitted for private and academic purposes. Re-publication of material from this
volume requires permission by the copyright owners.
Using Genetic Programming to Learn Models Containing Temporal Relations from</p>
    </sec>
    <sec id="sec-2">
      <title>Spatio-Temporal Data</title>
      <p>Andrew Bennett and Derek Magee ………………………………………………………… 7
Combining Intelligent Methods for Learner Modelling in Exploratory Learning</p>
    </sec>
    <sec id="sec-3">
      <title>Environments</title>
      <p>Mihaela Cocea and George D. Magoulas ……………………………………………….. 13</p>
    </sec>
    <sec id="sec-4">
      <title>Belief Propagation in Fuzzy Bayesian Networks</title>
      <p>Christopher Fogelberg, Vasile Palade and Phil Assheton ……………………………... 19
Combining Goal Inference and Natural-Language Dialogue for Human-Robot Joint</p>
    </sec>
    <sec id="sec-5">
      <title>Action</title>
      <p>Mary Ellen Foster, Manuel Giuliani, Thomas Muller, Markus Rickert, Alois Knoll,
Wolfram Erlhagen, Estela Bicho, Nzoji Hipolito and Luis Louro ………………………. 25</p>
    </sec>
    <sec id="sec-6">
      <title>A Tool for Evolving Artificial Neural Networks</title>
      <p>Efstratios F. Georgopoulos, Adam V. Adamopoulos and Spiridon D. Likothanassis .. 31</p>
    </sec>
    <sec id="sec-7">
      <title>Intelligently Raising Academic Performance Alerts</title>
      <p>Dimitris Kalles, Christos Pierrakeas and Michalis Xenos ………………………………. 37</p>
    </sec>
    <sec id="sec-8">
      <title>Recognizing predictive patterns in chaotic maps</title>
      <p>Nicos G. Pavlidis, Adam Adamopoulos and Michael N. Vrahatis ……………………... 43
Improving the Accuracy of Neuro-Symbolic Rules with Case-Based Reasoning</p>
      <p>Jim Prentzas, Ioannis Hatzilygeroudis and Othon Michail …………………….……….. 49
Combinations of Case-Based Reasoning with Other Intelligent Methods (short paper)</p>
      <p>Jim Prentzas and Ioannis Hatzilygeroudis ……………………………………………..... 55
Combining Argumentation and Hybrid Evolutionary Systems in a Portfolio</p>
    </sec>
    <sec id="sec-9">
      <title>Construction Application</title>
      <p>Nikolaos Spanoudakis and Konstantina Pendaraki and Grigorios Beligiannis ………. 59
An Architecture for Multiple Heterogeneous Case-Based Reasoning Employing</p>
    </sec>
    <sec id="sec-10">
      <title>Agent Technologies (short paper)</title>
      <p>Elena I. Teodorescu and Miltos Petridis ...................................................................... 65</p>
      <sec id="sec-10-1">
        <title>Workshop Organization</title>
        <sec id="sec-10-1-1">
          <title>Chairs-Organizers</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Ioannis Hatzilygeroudis</title>
      <p>University of Patras, Greece</p>
    </sec>
    <sec id="sec-12">
      <title>Constantinos Koutsojannis</title>
      <p>TEI of Patras, Greece</p>
    </sec>
    <sec id="sec-13">
      <title>Vasile Palade</title>
      <p>Oxford University, UK</p>
      <sec id="sec-13-1">
        <title>Program Committee</title>
        <p>Ajaith Abraham, IITA, South Korea
Ao Sio Iong, Oxford University, UK
Plamen Agelov, Lancaster University, UK
Emilio Corchado, University of Burgos, Spain
George Dounias, University of the Aegean, Greece</p>
      </sec>
    </sec>
    <sec id="sec-14">
      <title>Artur S. d’Avila Garcez, City University, UK</title>
      <p>Melanie Hilario, CUI - University of Geneva, Switzerland
Elpida Keravnou-Papailiou, University of Cyprus, Cyprus
Rudolf Kruse, University of Magdeburg, Germany
George Magoulas, Birkbeck College, Univ. of London, UK
Vasilis Megalooikonomou, University of Patras, Greece
Toni Moreno, University Rovira i Virgili, Spain
Amedeo Napoli, CNRS-INRIA-University of Nancy, France
Ciprian-Daniel Neagu, University of Bradford, UK
Jim Prentzas, TEI of Lamia, Greece
Han Reichgelt, Southern Polytechnic State Univ., GA, USA
David Sanchez, University Rovira i Virgili, Spain
Douglas Vieira, University of Minas Gerais, Brazil</p>
      <sec id="sec-14-1">
        <title>Contact Chair</title>
      </sec>
    </sec>
    <sec id="sec-15">
      <title>Ioannis Hatzilygeroudis</title>
      <p>Dept. of Computer Engineering &amp; Informatics
University of Patras, Greece
Email: ihatz@ceid.upatras.gr</p>
      <sec id="sec-15-1">
        <title>Preface</title>
        <p>The combination of different intelligent methods is a very active research area in Artificial
Intelligence (AI). The aim is to create integrated or hybrid methods that benefit from each
of their components. It is generally believed that complex problems can be easier solved
with such integrated or hybrid methods.</p>
        <p>Some of the existing efforts combine what are called soft computing methods (fuzzy
logic, neural networks and genetic algorithms) either among themselves or with more
traditional AI methods such as logic and rules. Another stream of efforts integrates
casebased reasoning or machine learning with soft-computing or traditional AI methods. Some
of the combinations have been quite important and more extensively used, like
neurosymbolic methods, neuro-fuzzy methods and methods combining rule-based and
casebased reasoning. However, there are other combinations that are still under investigation.
In some cases, combinations are based on first principles, whereas in other cases they
are created in the context of specific applications.</p>
        <p>The Workshop is intended to become a forum for exchanging experience and ideas
among researchers and practitioners who are dealing with combining intelligent methods
either based on first principles or in the context of specific applications.</p>
        <p>There were totally 20 papers submitted to the Workshop. Each paper was reviewed by
at least two members of the PC. We finally accepted 12 papers (10 full and 2 short).
Revised versions of the accepted papers (based on the comments of the reviewers) are
included in these proceedings in alphabetic order (based on first author).</p>
        <p>Five of the accepted papers deal with combinations of Genetic Programming or
Genetic Algorithms with either non-symbolic methods, like Neural Networks (NNs) and/or
Kalman Filters (Georgopoulos etal, Spanoudakis etal), or symbolic ones, like Decision
Trees (Kalles etal) and Temporal Logic (Bennett and Magee). Another four papers deal
with combinations of Case-Based Reasoning (CBR). One of them presents a short survey
of CBR combinations (Prentzas and Hatzilygeroudis) and another one a combination with
Agents (Teodorescu and Petridis). The rest two of them present CBR combinations with a
Neuro-Fuzzy (Cocea and Magoulas) and a Neuro-Symbolic (Prentzas etal) approach
respectively, leading to multi-combinations. Also, another two papers concern
combinations of Fuzzy Logic with either NNs (Anastassopoulos and Iliadis) or Bayesian
Nets (Fogelberg etal). Finally, one of the papers combines a NN-based approach with a
Natural Language Processing one (Foster etal).</p>
        <p>Four of the above papers present combinations developed in the context of an
application. Applications involve Medicine (Anastassopoulos and Iliadis), Education
(Cocea and Magoulas, Kalles etal) and Economy (Spanoudakis etal).</p>
        <p>We hope that this collection of papers will be useful to both researchers and
developers.</p>
        <p>Given the success of this first Workshop on combinations of intelligent methods, we
intend to continue our effort in the coming years.</p>
        <p>Ioannis Hatzilygeroudis
Constantinos Koutsojannis
Vasile Palade
ANN for prognosis of abdominal pain
in childhood: use of fuzzy modelling
for convergence estimation</p>
        <p>
          George C. Anastassopoulos, Lazaros S. Iliadis
Abstract. This paper focuses in two parallel objectives. First it
aims in presenting a series of Artificial Neural Network models
that are capable of performing prognosis of abdominal pain in
childhood. Clinical medical data records have been gathered and
used towards this direction. Its second target is the presentation and
application of an innovative fuzzy algebraic model capable of
evaluating Artificial Neural Networks’ performance [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ]. This
model offers a flexible approach that uses fuzzy numbers, fuzzy
sets and various fuzzy intensification and dilution techniques to
perform assessment of neural models under different perspectives.
        </p>
        <p>It also produces partial and overall evaluation indices. The
produced ANN models have proven to perform the classification
with significant success in the testing phase with first time seen
data.
1 INTRODUCTION</p>
        <p>
          The wide range of problems in which Artificial Neural
Networks can be used with promising results, is the reason of their
growth [
          <xref ref-type="bibr" rid="ref2 ref21 ref23 ref24 ref3 ref62 ref63 ref77 ref78">2, 3</xref>
          ]. Some of the fields that ANNs are used are: medical
systems [
          <xref ref-type="bibr" rid="ref25 ref26 ref27 ref4 ref5 ref6 ref64 ref65 ref66 ref79 ref80 ref81">4-6</xref>
          ], robotics [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ], industry [
          <xref ref-type="bibr" rid="ref10 ref11 ref29 ref30 ref31 ref32 ref68 ref69 ref70 ref71 ref8 ref83 ref84 ref85 ref9">8 – 11</xref>
          ], image processing
[
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ], applied mathematics [
          <xref ref-type="bibr" rid="ref13 ref34 ref73 ref87">13</xref>
          ], financial analysis [
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ],
environmental risk modelling [
          <xref ref-type="bibr" rid="ref15 ref36 ref75">15</xref>
          ] and others.
        </p>
        <p>Prognosis is a medical term denoting an attempt of physician to
accurately estimate how a patient's disease will progress, and
whether there is chance of recovery, based on an objective set of
factors that represent that situation. The inference about prognosis
of a patient when presented with complex clinical and prognostic
information is a common problem, in clinical medicine. The
diagnosis of a disease is the outcome of combination of clinical
and laboratorial examinations through medical techniques.</p>
        <p>
          In this paper various ANN architectures using different learning
rules, transfer functions and optimization algorithms have been
tried. This research effort was motivated form the fact that reliable
and seasonable detection of abdomen pain constitute attainments in
effective treatment of disease and avoidance of relapses. That is
why the development of such an intelligent model that can
collaborate with the doctors will be very useful towards successful
treatment of potential patients.
2 DIAGNOSTIC FACTORS OF ABDOMINAL
PAIN
Several reports have described clinical scoring systems
incorporating specific elements of the history, physical
examination, and laboratory studies designed to improve diagnostic
accuracy of abdominal pain [
          <xref ref-type="bibr" rid="ref16 ref37">16</xref>
          ]. Nothing is guaranteed, but
Democritus University of Thrace, Hellenic Open University
anasta@med.duth.gr, liliadis@fmenr.duth.gr
decision rules can predict which children are at risk for
appendicitis (appendicitis is the most common surgical condition
of the abdomen). One such numerically based system is based on
a 6-part scoring system: nausea (6 point), history of local RLQ
pain (2 point), migration of pain (1 point), difficulty walking (1
point), rebound tenderness / pain with percussion (2 point), and
absolute neutrophil count of &gt;6.75 x 10`3/μL (6 point). A score &lt;5
had a sensitivity of 96.3% with a negative predictive value of
95.6% for AA.
        </p>
        <p>
          To date, all efforts to find clinical features or laboratory tests,
either alone or in combination, that are able to diagnose
appendicitis with 100% sensitivity or specificity have proven
futile. Also, there is only one research work [
          <xref ref-type="bibr" rid="ref25 ref4 ref64 ref79">4</xref>
          ] in bibliography
based on ANN that deals with the abdominal pain prognosis in
childhood.
        </p>
        <p>The incidence of Acute Appendicitis (AA) is 4 cases per 1000
children. However appendicitis despite pediatric surgeons’ best
efforts remains the most commonly misdiagnosed surgical
condition. Although diagnosis and treatment have improved,
appendicitis continues to cause significant morbidity and still
remains, although rarely, a cause of death. Appendicitis has a
male-to-female ratio of 3:2 with a peak incidence between ages 12
and 18 years. The mean age in the pediatric population is 6-10
years. The lifetime risk is 8.6% for boys and 6.7% for girls.</p>
        <p>The 15 factors that are used in the routine clinical practice for
the assessment of AA in childhood are: Sex, Age, Religion,
Demographic data, Duration of Pain, Vomitus, Diarrhea, Anorexia,
Tenderness, Rebound, Leucocytosis, Neutrophilia, Urinalysis,
Temperature, Constipation. The sex (males), the age (peak of
appearance of A.A in children aged 9 to 13 years), and the religion
(hygiene condition, feeding attitudes, genetic predisposition) were
in relation with a higher frequency for AA. Anorexia, vomitus,
diarrhea or constipation and a slight elevation of the temperature
(370 C - 380 C) were common manifestation of AA. Additionally,
abdominal tenderness principally in the RLQ of the abdomen and
the existence of the rebound sign, are strongly related with AA.</p>
        <p>Leucocytosis (&gt;10.800 K/μl) with neutrophilia (neutrophil count &gt;
75%) is considered to be a significant clue for AA. Urinalysis is
useful for detecting urinary tract disease, normal findings on
urinalysis are of limited diagnostic value for appendicitis.</p>
        <p>The role of race, ethnicity, health insurance, education, access to
healthcare, and economic status on the development and treatment
of appendicitis are widely debated. Cogent arguments have been
made on both sides for and against the significance of each
socioeconomic or racial condition. A genetic predisposition
appears operative in some cases, particularly in children in whom
appendicitis develops before age 6 years. Although the disorder is
uncommon in infants and elderly, these groups have a
disproportionate number of compilations because of delays in
diagnosis and the presence of comorbid conditions.</p>
        <p>As diagnosis, there are four stages of appendicitis, including
acute focal appendicitis, acute supurative appendicitis, gangrenous
appendicitis and perforated appendicitis. These distinctions are
vague, and only the clinically relevant distinction of perforated
(gangrenous appendicitis includes into this entity as dead intestine
functionally acts as a perforation) versus non-perforated
appendicitis (acute focal and supurative appendicitis) should be
made.</p>
        <p>The present study is based on data set that is obtained from the
Pediatric Surgery Clinical Information System of the University
Hospital of Alexandroupolis, Greece. It consisted of 516 children’s
medical records. Some of these children had different stages of
appendicitis and, therefore, underwent operative treatment. This
data set was divided into a set of 422 records and another set of 94
records. The former was used for training of the ANN, while the
latter for testing. A small number of data records were used as a
validation set during training to avoid overfitting. Table 1
represents the stages of appendicitis as well as the corresponding
cases for each one. The 3rd column of Table 1 depicts the coding
of possible diagnosis, as they used for ANN training and testing
stages.</p>
        <p>Normal
ev ten
i
tra m
e ta
pO tre
3 NEURAL NETWORK DESIGN
Data were divided into two groups, the training cases (TRAC) and
the testing cases (TESC). The TRAC consisted of 417 concrete
medical data records and the TESC consisted of 101. Each input
record was organised in a format of fifteen fields, namely sex, age,
religion, area of residence, pain time period, vomit symptoms,
diarrhoea, anorexia, located sensitivity, rebound, wbc, poly,
general analysis of urine, body temperature, constipation. The
output record contained a single field which corresponded to the
potential outcome of each case.</p>
        <p>
          The determination if the TRAC and TESC data sets was
performed in a rather random manner. The training and testing
sample size which would be sufficient for a good generalization
was determined by using the Widrow’s rule of thumb for the LMS
algorithm which is a distribution free, worst case formula [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ] and it
is shown in the following equation 1. W is the total number of free
parameters in the network (synaptic weights and biases) and ε
denotes the fraction of the classification errors permitted during
testing. The O notation shows the order of quantity enclosed within
[
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ]. N = O⎜⎛ W ⎟⎞ (1)
        </p>
        <p>⎝ ε ⎠</p>
        <p>In the case examined here with 417 training examples used, the
classification error that could be tolerated would be about 4%.
3.1 Description of the experiments performed</p>
        <p>
          During experimentations, numerous ANN architectures,
learning algorithms and transfer functions were combined in an
effort to obtain the optimal network. For the Tangent Hyperbolic
(TanH) transfer function the input data were normalized (divided
properly) in order to be included in the acceptable range of [
          <xref ref-type="bibr" rid="ref21 ref24 ref3 ref63 ref78">-3, 3</xref>
          ]
to avoid problems such as saturation, where an element’s
summation value (the sum of the inputs times the weights) exceeds
the acceptable network range [
          <xref ref-type="bibr" rid="ref17 ref38">17</xref>
          ]. Standard back-propagation
optimization algorithms using TanH, or Sigmoid or Digital Neural
Network Architecture (DNNA) transfer functions, combined with
the Extended Delta Bar Delta (ExtDBD) or with the Quick Prop
learning rules [
          <xref ref-type="bibr" rid="ref18 ref19 ref39 ref40">18, 19</xref>
          ] were employed. The ExtDBD is a heuristic
technique reinforcing good general trends and damping oscillations
[
          <xref ref-type="bibr" rid="ref20 ref41">20</xref>
          ].
        </p>
        <p>
          Modular and radial basis function (RBF) ANN applying the
ExtDBD learning rule and the TanH transfer function were also
used in an effort to determine the optimal networks. RBFs have an
internal representation of hidden neurons which are radially
symmetric, and the hidden layer consists of pattern units fully
connected to a linear output layer [
          <xref ref-type="bibr" rid="ref42 ref43">21, 22</xref>
          ].
3.2 ANN evaluation metrics applied
Traditional ANN evaluation measures like the Root Mean Square
Error (RMS error), R2 and the confusion matrix were used to
validate the ensuing neural network models. It is well known that
the RMS error adds up the squares of the errors for each neuron in
the output layer, divides by the number of neurons in the output
layer to obtain an average, and then takes the square root of that
average. The confusion matrix is a graphical way of measuring the
network’s performance during the “training” and “testing” phases.
        </p>
        <p>
          It also facilitates the correlation of the network output to the actual
observed values that belong to the testing set in a visual display
[
          <xref ref-type="bibr" rid="ref17 ref38">17</xref>
          ], and therefore provides a visual indication of the network’s
performance. A network with the optimal configuration should
have the “bins” (the cells in each matrix) on the diagonal from the
lower left to the upper right of the output. An important aspect of
the matrix is that the value of the vertical axis in the generated
histogram is the Common Mean Correlation (CMC) coefficient of
the desired (d), and the actual (predicted) output (y) across the
Epoch.
        </p>
        <p>
          Finally, the FUSETRESYS (Fuzzy Set Transformer Evaluation
System) that constitutes an innovative ANN evaluation system has
been applied offering a more flexible approach [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ].
3.3 Technical description of the FUSETRESYS
ANN evaluation model
Fuzzy logic enables the performance of calculations with
mathematically defined words called “Linguistics” [
          <xref ref-type="bibr" rid="ref1 ref22 ref44 ref45 ref46 ref61 ref76">1, 23-25</xref>
          ].
        </p>
        <p>FUSETRESYS faces each training/testing example as a Fuzzy Set.</p>
        <p>
          It applies triangular or trapezoidal membership functions in order
to determine the partial degree of convergence (PADECOV) of the
ANN for each training/testing example separately. The following
equations 2 and 3 represent a triangular and a trapezoidal
membership functions respectively [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ].
        </p>
        <p>x − a c − x
μs(x;a,b,c)=max{min{ , },0} a&lt;b&lt;c (2)</p>
        <p>b − a c − b
μs(x;a,b,c,d)= max{min{ x − a ,1, d − x },0}a&lt;b&lt;c&lt;d
b − a d − c</p>
        <p>(3)
The model can produce various overall degrees of convergence
(OVDECOV) for all of the training examples by applying either
fuzzy T-Norm or fuzzy S-Norm conjunction operations, depending
on the optimistic or pessimistic point of view of the developer.
T15
15
15
15
7
9
9
7
7
0
9
0</p>
        <p>Learning
Rule/Transfer</p>
        <p>Function
Genetic
Algorithm
/TanH</p>
        <p>NormCum_Delta/</p>
        <p>TanH</p>
        <p>NormCum_Delta/</p>
        <p>TanH
ExtDBD/</p>
        <p>
          TanH
μ ⎛ ~
⎜⎜ A∩ B~ ⎟⎟⎞
⎝ ⎠
Norms tend to produce lower aggregation indices so in the case of
ANN evaluation they can be considered as a pessimistic approach,
whereas the opposite happens with S-Norms [
          <xref ref-type="bibr" rid="ref47">26</xref>
          ]. In fact, each
distinct Norm evaluates the performance of an ANN under a
different perspective. For example the drastic product assigns the
ANN a high OVDECOV only if it does not have extreme
deviations between the desired and the produced classifications
during the training/testing process [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ] whereas the Einstein
TNorm acts in a more average mode. The following equations 4 and
5 present the drastic product and the Einstein product T-Norms.
        </p>
        <p>More details on fuzzy conjunction operators can be found in
[2628].</p>
        <p>= Min {μ ~ (Χ),μ ~ (Χ)} if Max {μ ~ (Χ),μ ~ (Χ)} = 1 else</p>
        <p>A B A B
μ
⎜⎜⎝⎛ A~∩ B~ ⎟⎟⎠⎞ = 0 (4)μ ⎜⎜⎝⎛⎜ Α ∩~ Β~⎟⎟⎟⎞⎠ = 2 − [μ A~{X ) μ+ μA~{B~X( X)μ)B~−( Xμ A)~{X )μ B~ ( X )]</p>
        <p>(5)</p>
        <p>The fact that the FUSETRESYS evaluates each training/testing
example separately, offers a more clear view of the ANN’s
performance. In this way the developers know if the network
operates extremely bad or well in specific cases.</p>
        <p>
          Also when there are several neurons in the output layer, the
traditional approaches produce separate evaluation results for each
one whereas the FUSETRESYS can produce an additive
performance index (ADPERI) of the ANN. This could be done
under different perspectives and under different degrees of
optimism [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ].
        </p>
        <p>
          Finally the application of fuzzy set hedges offers the “dilution”
and the “intensification” options. In this way by using the dilution
approach the developer softens the membership function over the
fuzzy set and weakens the membership constraints so that a point
of the Universe of discourse is “truer” than it would be before [
          <xref ref-type="bibr" rid="ref1 ref22 ref48 ref61 ref76">1,
27</xref>
          ]. On the contrary the intensification hardens the MF over the FS
and strengthens the membership constraints so that a point on the
domain is “less true” than it used to be [
          <xref ref-type="bibr" rid="ref1 ref22 ref48 ref61 ref76">1, 27</xref>
          ]. The following
equations 6 and 7 correspond to the intensification and dilution
functions respectively.
μ int ensify ( A) (X i ) = μ An ( X i ) (6) μ dilute ( A) (X i ) = μ An (X i ) (7)
        </p>
        <p>1</p>
        <p>
          In this way the ANN can be evaluated strictly by using a “very
well fit” evaluation option, or in a more relaxed way by using the
“somewhat fit” option. Of course it is in the developer’s hand to
decide the potential type of the ANN’s evaluation and the degree
of dilution or intensification. For a more detailed description of
FUSETRESYS please see [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ].
4 RESULTS AND DISCUSSION
4.1 ANN analysis
Several experiments were performed. The following table 2
presents the structure of the four most effective Back Propagation
(BP) multilayer (ML) neural networks. In all cases of ANN
models, the classical approach for overcoming the overfitting
problem has been followed. More specifically, a set of validation
data have been provided to the algorithm in addition to the training
data. The algorithm has monitored the error with respect to this
validation set, while using the training set to drive the gradient
descent search. The number of weight tuning iterations performed
by the system, were determined in each case based on the criterion
of lowest error over the validation set. Two copies of the best
performing weights are kept: one copy for training and another one
of the best performing weights thus far.
made towards the development of modular ANN (MODANN) for
the classification problem solution. The term MODANN refers to
the “adaptive” mixtures of local experts (LOCEXP) as proposed
by [
          <xref ref-type="bibr" rid="ref50">29</xref>
          ].
        </p>
        <p>They consist of a group of BP ANN referred to as local experts
competing to learn different aspects of a problem. A “gating ANN”
controls the competition and learns to assign different parts of the
data space to different networks.</p>
        <p>1 7 13 19 25 31 37 43 49 55 61 67 73 79 85 91 97</p>
        <p>
          Code number for each evaluated record
The LOCEXP have the same architecture but they can apply
distinct learning rules or transfer functions. Also the number of the
output processing elements of the gating network is equal to the
number of LOCEXP used. The number of the neurons in the
hidden layer of the gating network should be larger than the
number of the output processing elements [
          <xref ref-type="bibr" rid="ref17 ref38">17</xref>
          ].
The above table 5 presents the structure and the architecture of the
optimal MODANN that was developed for the medical
classification problem examined here. The performance of the
developed modular network is very satisfying, having an R2 value
of 0.9434 and a FUSETRESYS produced average PADECOV
equal to 0.9733 (using the Triangular membership function) in the
testing process using the first time seen testing data set.
        </p>
        <p>The following figure 2 depicts the gating probabilities for the
optimal MODANN..
The above Table 6 presents a small sample of the 101 distinct
PADECOV values produced by the FUSTRESYS.</p>
        <p>Also the Einstein T-Norm was applied for the determination of
the overall degree of convergence of the ANN. The ML#2 ANN
had a very high OVEDECOV index with a value of 0.98299
whereas the other ML#3 ANN and the MODANN #REF1 had
OVEDECOV indices as high as 0.97. The Drastic Product T-Norm
was not applied in this research effort because it was proven
unnecessary from the data in table 5 where there were no serious
indications of extreme bad ANN performance in any of the testing
examples.
5 CONCLUSIONS
The above research has obtained six ANNs with good level of
convergence and it has proven that there exist at least four ANNs
that have high performance indices, in the case of abdominal pain
classification. Namely the best ANNs are two ML BP ANN, a RBF
ANN and a MODANN using a referee gating network and two
local experts. All of them have been described in the previous
sections.</p>
        <p>
          A very interesting part of the whole research effort is the
application of an innovative ANN evaluation model called
FUSETRESYS that uses fuzzy logic and fuzzy algebra proposed in
[
          <xref ref-type="bibr" rid="ref11 ref32 ref71">11</xref>
          ].
        </p>
        <p>The new evaluation scheme has performed individual
convergence indices namely PADECOV, for the output of each
single data record used in the testing phase. The worst PADECOV
value equals to 0.6666 which actually is the degree of membership
of each data record to the FS “Actual output value equal to the
desired value”. This worst case appears three times exactly in the
same cases of data records, for the ML#2, ML#3, #1REF ANN and
it shows that the classification capacity of the developed networks
is not bad even in the worst cases. This conclusion becomes
stronger by considering the fact that the second worst PADECOV
index has a value of 0.833.</p>
        <p>If an overall ANN validation is performed the traditional
evaluation instruments agree with the FUSETRESYS that the most
suitable ANN is the ML BP with code# 4 whereas all of the other
developed ANN have almost an equally good performance. The
Einstein T-Norm produces a higher “good performance index” for
the MODANN than the traditional methods.</p>
        <p>As it can be seen in table 7, the OVDECOV indices have very
high values for ML#2 and for REF#1 and ML#3 networks when a
“Partly fit” validation is performed. There is significant
differentiation when a very strict evaluation is done under the
linguistic “Very well fit”. The OVDECOV indices fall from 0.99
to 0.75 for ML#2, from 0.99 to 0.65 for #REF and from 0.99 to
0.71 for ML#3 respectively. This is a very useful approach and it
shows the actual power of FUSETRESYS due to the fact that it
shows the differentiation of the average convergence degree of the
three ANN when more strict validation methods are applied. So
ANN fed with the same data records in testing and appearing to
have more or less the same performance, they are very seriously
differentiated when more strict convergence validation methods are
performed.</p>
        <p>The proposed ANN architecture faces the appendicitis prediction
quite satisfactory, based on both the above presented results, and
the pediatric surgeon’s opinion that used these ANNs in their
everyday routine clinical practice.</p>
        <p>The innovative ANN evaluation model that was applied
successfully in this research effort will be used extensively in the
future, in an integrated effort to check its validity under various
perspectives.</p>
        <p>ACKNOWLEDGEMENTS
We would like to thank the pediatric surgeons of the Pediatric
Surgeon Department of Medical School of Democritus University
of Thrace, for their contribution in the concession of the medical
records.
Using Genetic Programming to Learn Models Containing
Temporal Relations from Spatio-Temporal Data
Andrew Bennett and</p>
        <p>
          Derek Magee
1
Abstract. In this paper we describe a novel technique for learning
predictive models from non-deterministic spatio-temporal data. Our
technique learns a set of sub-models that model different, typically
independent, aspects of the data. By using temporal relations, and
implicit feature selection, based on the use of 1st order logic
expressions, we make the sub-models general, and robust to irrelevant
variations in the data. We use Allen’s intervals [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ], plus a set of four novel
temporal state relations, which relate temporal intervals to the current
time. These are added to the system as background knowledge in the
form of functions. To combine the sub-models into a single model a
context chooser is used. This probabilistically picks the most
appropriate set of sub-models to predict in a certain context, and allows
the system to predict in non-deterministic situations. The models are
learnt using an evolutionary technique called Genetic Programming.
        </p>
        <p>The method has been applied to learning the rules of snap, and uno
by observation; and predicting a person’s course through a network
of CCTV cameras.
1</p>
        <p>Introduction
Learning predictive models from spatial-temporal data is, in general,
a hard problem. Events and activities can have variations in their
spatial, and temporal scope; include multiple (variable numbers of)
objects; can overlap temporally with other events, and activities; and
happen in a non-deterministic manner. A model for predicting
spatiotemporal events must support this complexity. Our novel technique
learns a set of sub-models that model different, typically
independent, aspects of data. The sub-models can, in addition to object
properties, use temporal relations to describe the scene, and implicit
feature selection, based on the use of 1st order logic expressions, to
make them robust to irrelevant variations in the data. To combine the
sub-models into a single model a context chooser is used. This picks
the most appropriate set of sub-models to predict in a certain
context, and allows the system to predict in non-deterministic situations.</p>
        <p>Using the combination of sub-models and the context chooser also
reduces the complexity of the model search space, and allows the
system to learn a global sub-model that matches most of the dataset,
and then learn simple sub-models to cover the cases where the global
sub-model does not work.</p>
        <p>
          This approach extends our previous work [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ], by allowing a
qualitative, as well as a markovian representation of time. This is done by
replacing the step-wise markovian view with temporal relations like
Allen’s intervals [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ], and a set of four additional relations to relate
the temporal state of objects to the current time. We use Genetic
Programming to learn the models, and present an improved fitness
function. The system has been successfully tested on handcrafted snap,
1 University of Leeds, UK, email: {andrewb,drm}@comp.leeds.ac.uk
and uno datasets, along with learning from video the structure of a
set of mock CCTV cameras.
        </p>
        <p>
          There has been much previous work on learning from
spatiotemporal domains. Traditional methods usually require a fixed
dimensionality vector, existing with canonical ordering / constant
meaning, to represent the world. To construct this vector often
requires knowledge of the domain, making these methods hard to use
in a problem domain where the structure of the domain is variable,
and not known a priori. One approach to modelling data of variable
dimensionality is to take statistics of a variable size set [
          <xref ref-type="bibr" rid="ref29 ref68 ref8 ref83">8</xref>
          ]. This
produces a fixed set description, however spatial relationship
information is lost in this process. If this information is important within a
domain this leads to a poor model. Feature selection can be used to
find the most relevant subset of the data, which then allows for a more
general model to be built. However, the relevant subset may change
from one context to another.
        </p>
        <p>
          Temporal modelling approaches such as Markov chains,
Hidden Markov Models (HMMs) and Variable Length Markov
Models (VLMMs) [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ] use a description based on graphs to model state
transitions. These methods also usually need a fixed
dimensionality vector with canonical ordering for each observation. There does
not have to be a fixed dimensionality for every observation vector,
as theoretically each observation vector can have a different number
of dimensions. It is possible to optimise their structure by using local
optimisation approaches based on information theory [
          <xref ref-type="bibr" rid="ref21 ref24 ref3 ref63 ref78">3</xref>
          ]. In VLMMs
this optimisation acts as kind of temporal feature selection, but as the
input variables stay in the same fixed order spatial feature selection
is not performed.
        </p>
        <p>
          Bayesian networks are a generalisation of probabilistic graph
based reasoning methods like HMMs and VLMMs. Again these
networks require a fixed input vector, but again their relational
structure can be optimised by local search [
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ], genetic algorithms [
          <xref ref-type="bibr" rid="ref26 ref5 ref65 ref80">5</xref>
          ], or
MCMC [
          <xref ref-type="bibr" rid="ref27 ref6 ref66 ref81">6</xref>
          ] usually based on information theoretic criteria.
        </p>
        <p>
          An alternative to using graph based methods is to use (1st order)
logical expressions. Feature selection is implicit in the formalism
of these expressions. Logical expressions also make no assumptions
about the ordering of variables, so there is no need to have a have
them in a fixed ordering. Progol [
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ] and HR [
          <xref ref-type="bibr" rid="ref25 ref4 ref64 ref79">4</xref>
          ] are Inductive Logic
Programming (ILP) methods. In general ILP takes data and generates
a set of logical expressions describing the structure of the data.
Progol does this by iterative subsumption using a deterministic search
with the goal of data compression. HR does this by using a stochastic
search using a number of specialist operators. This is similar to
Genetic Programming which is described below. These approaches
suffer from a number of disadvantages. Firstly, logical expressions are
deterministic, so it is hard for then to model non-deterministic
situations. However, there has been much work on combining (1st order)
logic and probability to solve this problem [
          <xref ref-type="bibr" rid="ref16 ref37">16</xref>
          ] and [
          <xref ref-type="bibr" rid="ref30 ref69 ref84 ref9">9</xref>
          ]. Secondly
Progol’s search is depth bounded, which limits the size of problems
it can work on, as explained in [
          <xref ref-type="bibr" rid="ref15 ref36 ref75">15</xref>
          ]. Thirdly Progol’s fitness function
is only based on how well the model compresses the data, and not
how well the model predicts the data. This can cause incorrect, or
invalid models to be produced.
        </p>
        <p>
          Genetic Programming (GP) [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ] is a evolutionary method, similar
to genetic algorithms, for creating a program that model a dataset. In
a similar way to HR, it takes a dataset data, a set of terminals, and a
set of functions; and using a set of operators generates a binary tree
that models the data.
        </p>
        <p>
          Qualitative representations can be used to describe
spatiotemporal data in an abstract manner. [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ] describes a set of seven
temporal relations to represent temporal interactions between objects.
        </p>
        <p>
          There has been previous work in learning of spatio-temporal
models from video by [
          <xref ref-type="bibr" rid="ref15 ref36 ref75">15</xref>
          ] who produced a system that could learn basic
card games. It had three parts: an attention mechanism, unsupervised
low-level learning, and high-level protocol learning. The attention
mechanism uses a generic blob tracker, that locates the position of
the moving objects. From this a set of features including: colour,
position and texture are extracted. The data is clustered into groups.
Using these clusters new input data is assigned its closest cluster
prototype. A symbolic data stream is then created by combining together
the clustered data, with time information. The symbolic stream is
passed to Progol, which builds a model of the data. Once the model
has been learnt it can be applied to new data. This allows the system
to interact in the world.
        </p>
        <p>
          [
          <xref ref-type="bibr" rid="ref17 ref38">17</xref>
          ] looked at learning event definitions from video. A raw video
of a scene is converted into a polygon representation. This is then
transformed into a force-dynamic model which shows how the
objects in the scene are in contact with one another. Using this data
andmeets-and (AMA) logic formulae describing the events are learnt
using a specific-to-general ILP approach. Work in the area of learning
from spatial-temporal data, such as the previous two approaches have
inspired our work.
        </p>
        <p>The reminder of this paper will take the following form. The
second section looks at previous work about the architecture for the
models. The subsequent section looks at an extension to this work to
incorporate temporal relations into the sub-models. The subsequent
section describes how these models are learnt by Genetic
Programming. The subsequent section presents an evaluation of our system,
and the final section shows the conclusions of the work and the
further work.
2</p>
        <p>Architecture for Models of Spatio-Temporal
Data
?</p>
        <p>Context chooser
Data</p>
        <p>Sub−models Output</p>
        <p>Overall output</p>
        <p>
          An architecture to represent a model of spatio-temporal data, along
with associated learning methods is described in our previous work
[
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ]. We use this architecture as shown in Figure 1. It is broken down
into two parts: the sub-models, and the context chooser. The
submodels each model a separate part of the underlying process
generating the data. Each sub-model contains two sections: a search
section, and an output section. The search section looks for a particular
pattern in the dataset. A query language, created by ourselves,
having some similarity to SQL and Prolog, is used to describe the actual
search, and a binary tree is used to represent it. The output section
describes what is implied if the search returns true. This will be a set
of entities and relations, and their properties the sub-model predicts.
        </p>
        <p>Figure 2 shows an example of a sub-model.</p>
        <p>Search</p>
        <p>&amp;
=
=</p>
        <p>Output</p>
        <p>=
Light1.colour(t−1) C1 Light2.colour(t−1) C0 Light3.colour(t)</p>
        <p>C2</p>
        <p>The context chooser is used to decide how to combine the
submodels in different situations. It takes as its input a boolean vector
describing which sub-models have evaluated true, and returned outputs,
and using a probability distribution decides which ones will form the
overall output. A context Sn is defined as a set of sub-models M
producing an output in a given context, for example Sn = M1, M2
represents that M1, and M2 have search sections that have
evaluated true at the same time. For each context a probability
distribution over the possible combinations of model outputs for that
context is defined, for example Pn(M1), Pn(M2), Pn(M1, M2), where
Pj Pn(j) = 1. This distribution is formed from the frequency of
occurrence of each situation in the training data in the given context.</p>
        <p>This can be implemented as a sparse hash table.
3</p>
        <p>Incorporating Temporal Relations into</p>
        <p>Sub-models
To evaluate the sub-models history data from the world is required.</p>
        <p>
          The search section of the sub-model uses data pointers to reference
particular data items in the history. The search section of the
submodel is then evaluated with respect to this data. If the search
section evaluates true, then the output section is implied. In our previous
work [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ] each data pointer could only reference fixed quantified time
points in the history, as shown in Figure 2. The use of this qualitative
markovian representation of time implies an exact ordering of the
events. When multiple independent events are happening
simultaneously this representation will fail, and an alternative method of
representing temporal ordering is necessary. In order to quantify temporal
ordering in the data we use a combination of Allen’s intervals [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ], and
four novel temporal state relations. Allen’s intervals describe
temporal relations between objects. There are seven relations which are:
meets, starts, finishes, during, before, overlaps, and equal to. Along
with describing temporal relations between objects in the history, we
need to describe how the objects relate to the current time. An object
2
goes through a series of temporal states, based on how its start and
end time relates to current time, these are described Figure 3. Firstly
the object is entering the world, its end time is unknown, but its start
time is the same as the current time. Secondly the object exists in the
world, again the end time is unknown, but its start time is less than
the current time. Thirdly the object is leaving the world and its end
time is equal to the current time. Finally the object has left the world,
where both its start, and end times are less than the current time.
        </p>
        <p>Current Time
Entering
Current_time = start
Existing
Current_time &gt; start
Leaving
Current_time = end AND Current_time &gt; start
Left
Current_time &gt; end AND Current_time &gt; start</p>
        <p>Both the Allen’s intervals, and our additional temporal state
relations, are represented in the system as functions of the data, that
appear in the search section of the sub-models. These relations do
not appear in the data; only the temporal range of individual objects
occurs in the data. As the data pointers can be used over the entire
history, it is quite likely that a sub-model will evaluate on many
different parts of the history. To resolve this issue we just use the result
which includes the most recent data. The justification for this is the
sub-model will have already output this information at a previous
time in other situations.
4</p>
        <p>
          Learning the Models from Data
Previously in our previous work [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ] it has been shown that it was
intractable to find the set of optimal sub-models by exhaustive search,
for all but the simplest problems. The search space is complex, so a
stochastic search method was chosen as an alternative. We use
Genetic Programming [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ], which has already been successfully used
for pattern recognition tasks [
          <xref ref-type="bibr" rid="ref11 ref32 ref71">11</xref>
          ].
        </p>
        <p>
          Genetic Programming (GP) [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ] evolves a population of programs
until a program with the desired behaviour is found. It is a type of
genetic algorithm, but the programs are stored as binary trees, and
not as fixed length strings. Functions are used for the nodes, and
terminals (for example constants, and variables) are used for the leaf
nodes. In order for the population to evolve a fitness function (in our
case a predictive accuracy score) must be defined. This score will
be used by the GP system to decide which programs in the current
generation to use to produce the next generation, and which ones
to throw away. To initialise the system, a set of randomly generated
programs must be created. Each then receive a score using the fitness
function. Algorithms including crossover, mutation and reproduction
use the programs from the current generation to create a new
generation. Crossover takes two programs and randomly picks a sub-tree
on each program, these two trees are swapped over, creating two new
programs. Mutation takes one program, randomly picks a sub-tree on
it, and replaces it with a randomly generated sub-tree. Reproduction
copies a program exactly as it is into the new generation. The
programs in the new generation are then scored based on how well data
is predicted, and the process is repeated. The GP system will stop
when a certain fitness score is reached, or a certain number of
generations has passed.
        </p>
        <p>
          In our implementation of GP we assume that a program is a
model containing a context chooser, and a set of sub-models. To
initialise the population we generate a set of models just containing
one randomly generated sub-model. The sub-model is produced
using Koza’s ramped half and half method [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ]. We apply a hierarchical
structure to our sub-models in a similar manner to [
          <xref ref-type="bibr" rid="ref13 ref34 ref73 ref87">13</xref>
          ], to try and cut
down the search space, and to make finding a solution more efficient.
        </p>
        <p>
          A set of operators is then used to evolve the population. There are
two kinds of operators. Firstly there are operators that try to optimise
sub-models which are used in the model, and secondly there are
operators that optimise the sub-models themselves. A technique called
tournament selection [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ] is used to pick a model from the
population. Tournament selection picks n models at random from the
population, and returns the one with the lowest score, for our experiments
we set n to be 5. The operators used to optimise sub-models which
are used in the model are shown below:
Reproduction A set number of models are picked via tournament
        </p>
        <p>selection and copied directly into the new population.</p>
        <p>Adding in a sub-model from another model Two models are
picked by tournament selection. A sub-model from the first
picked model is randomly selected, and added to the second
chosen model.</p>
        <p>Replacing a sub-model Again two models are picked by
tournament selection, and a sub-model from the first chosen model is
then replaced by a sub-model randomly selected from the second
chosen model.</p>
        <p>Removing a sub-model A sub-model is picked by tournament
selection, and a randomly selected sub-model is removed.</p>
        <p>
          The only operator used to optimise the sub-models themselves is
crossover. In crossover two models are picked using tournament
selection. A sub-model from each model is then randomly selected, and
standard crossover [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ] is performed on these sub-models.
        </p>
        <p>To score the models a fixed length window is randomly moved
over the dataset. At each generation two random locations are picked:
one for training, and one for testing. In the training phase the
probability distribution used in the context chooser is calculated. In the
testing phase the fitness of a model (m) is evaluated over a
windowed section of the dataset (w). For each position in the window the
model is given a set of history data (h), calculated from the window,
and is queried to produce a prediction. This produces a set of
possible corresponding outputs (o), and a set of possible corresponding
output likelihoods (ol). The similarity (C) of each output with the
actual output (r), is computed using the F indBestM atch function, as
shown in Equation 1. This function takes the set of actual output, and
the set of model output, and firstly pads out them out with blank data
so that they are the same size. Then for each item in the actual output
set, a unique match in the model output set is found. For each of the
matches a comparison is done between the two objects. The
comparison looks at how similar each of the properties in the two objects are.</p>
        <p>
          Each of the comparisons are summed together to produce a score that
shows how good that set of matches is. An exhaustive search is then
performed over all the possible combination of matches to find the
best (maximal) matching score. The result is then multiplied by its
output likelihood. From this the best (maximal) output is found. This
3
is then repeated over the rest of window, and the results summed and
then normalised to produce (S), as shown in Equation 2. This fitness
function is an improved version to the one described in our previous
work [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ], as it can be applied to non-deterministic datasets.
        </p>
        <p>C(o, r) = F indBestM atch(o, r)
S(m, w) = 1 ∗ X
|w|</p>
        <p>M axn(oln ∗ C(on, ri))
i</p>
        <p>The system runs in two stages, and will stop running once it
exceeds a maximum number of generations. Firstly the system is
initialised in the manner described above, and then for five generations
it works out the best set of sub-models to use in the models. To do
this the system uses reproduction (10%), removing (10%), adding
(40%), and replacement (40%). Next the system will optimise these
models to find the best solution. It uses crossover (60%),
reproduction (10%), removing (10%), adding (10%), and replacement (10%).</p>
        <p>(1)
(2)
5</p>
        <p>
          Evaluation
Our method was evaluated on three different datasets, which were:
handcrafted uno data, handcrafted snap data, and data from people
walking through a network of mock CCTV cameras. More detail
about these datasets is presented in the following section.
A 10 minute video of people walking along a path containing a
junction was filmed. This was then used to mock up a network of CCTV
cameras. Figure 4 shows a frame from the video. Virtual motion
detectors, representing CCTV cameras, were hand placed over the
video has shown in Figure 4. Using frame differencing, and
morphological operations, the video was processed to determine the location
of the motion. If the number of moved pixels in a region exceeded
a fixed threshold then the virtual detector outputted that motion had
occurred at that location. Hysteresis on the motion detection is
implemented as a 2 state, state machine (where the states are motion/no
motion). The state machine requires a numbers of frames (normally
10) of stability to change state. The data produced is then placed in
a datafile with a motion event recorded per state change going from
no motion to motion. This was used to create a training datafile
containing 84 state changes and a test file containing 46 state changes.
The snap dataset was handcrafted, but the format of it was similar
to the snap dataset used in the work of [
          <xref ref-type="bibr" rid="ref15 ref36 ref75">15</xref>
          ]. The snap sequence is
the following: initially the computer will see a blank scene, then it
will hear the word play, next two coloured cards will be seen. Either
they will be both put down at the same time, or put down one by
one. If they are the same then the word “equals” will be heard,
otherwise “different” will be heard. Then the cards are removed, again
either one by one, or at the same time. We ask the computer to only
learn the sections where a human is speaking, as it would be
impossible to accurately predict the next two cards because they are
essentially random. Again three datasets were prepared: a non-noisy,
and noisy training set, and a non-noisy test set. All the datasets
contained around 50 rounds of snap. The noisy data was generated by
adding 10% noise to the non-noisy training set. The noise took the
form of removing cards, removing the play state, and changing the
output state, for example making the output not equal when it should
be equal.
The handcrafted uno dataset has a similar sequence to the snap
dataset. Again the computer will initially see a blank scene. Then
play will be heard. Next two cards, each one having one of three
possible coloured shapes on them, will be placed down either at the
same time, or one by one. If the two card have the same coloured
shape on them the “same” is heard; or if they have shapes of the
same colour then “colour” is heard; or if they have the same shapes
on then “shape” is heard; or if the cards are different then “nothing”
is heard. The cards are then removed either together, or one by one.
        </p>
        <p>Three datasets were created: a non-noisy training set, a noisy training
set, and a non-noisy test set. Each one contained around 50 rounds
of uno. Again noisy data was prepared by adding 10% of noisy data
to the non-noisy training data. The noise took the same form as the
noisy snap data.
To test the system five runs were allocated to each possible
combination of dataset. For each run a different random number seed was
used to initialise the system. The tests were run on a 2GHz machine
having 8GB memory.</p>
        <p>To evaluate how well the models have been learnt they were tested
on a separate test set. Two metrics were used to evaluate the results:
coverage, and prediction accuracy. Coverage (C) scores if the
system can correctly predict the dataset (ie. the probability of correct
4
prediction is greater than 0%) and is the number of correct
predictions (pc) divided by the dataset size (d) as shown in Equation 3.</p>
        <p>Prediction accuracy (A) scores with what probability the correct
prediction is made, and is the sum of the likelihoods of each correct
prediction (pl) divided by the dataset size, as shown in Equation 4.</p>
        <p>In non-deterministic scenarios this will not be 100%.</p>
        <p>pc
C = (3)
d
pl
A = (4)</p>
        <p>d</p>
        <p>Both the snap datasets were tested on a population size of 4000,
and the system was run for 65 generations, taking around 5 hours
to do each run. All the runs using the non-noisy datasets were
successful. However the models did not get 100% coverage because they
failed to produce any output at the start of the test dataset as there was
insufficient items in the history. Figure 5 shows an example of this,
as it will only evaluate once there are three cards in the history. Four
of the results did not predict the first two items in the test dataset,
and one of the results only failed to predict the first item. Two out of
the five runs using the noisy snap dataset got an exact solution. The
noise effected the models causing the sub-models to model incorrect
parts of the dataset. This was because some of the noise added to the
noisy training set changed the outcomes for some rounds of snap,
this then causes the system to model this noise, and to incorrectly
predict the outcomes in the test set. Again, like in the non-noisy snap
models there was problems predicting the start of the test dataset.</p>
        <p>The models themselves made use of both the Allen’s intervals, and
the temporal state relations. Figure 5 shows one of the sub-models
produced from the non-noisy snap training set. It shows the use of
Allens intervals (the before relation), and the temporal state relations
(the enter relation). Most of the models contained four sub-models in
them.</p>
        <p>The uno datasets were run on a population of size 6000, and for
65 generations, taking around 7 hours to do each run. One out of five
runs on the non-noisy dataset managed to get the correct solution, but
it did not get 100% coverage because it did not have enough history at
the start of the test set to predict the initial items. The rest of the
nonnoisy results were very close to the solution, and probably needed
more generations to find the exact solution. The models themselves
were very similar to the models produced for the snap datasets. Both
Allen’s intervals, and the temporal state relations were used. None
of the runs for the noisy dataset managed to produce an exact result,
with the noise causing the sub-models to model incorrect parts of the
dataset.</p>
        <p>The runs using the path dataset used a population size of 2000, and
the system was run for 65 generations, taking around 3 hours to do
each run. All the runs using the non-noisy dataset predicted well in
the main section of the test dataset, but failed to predict well at the
start of the test dataset, due to lack of history. Some of the runs also
failed to predict infrequently occurring actions in the test set. In the
runs using the noisy training set all the models learnt the frequently
occurring actions, but they all started to learn some of the noise in
the dataset, and this effected their scores on the test dataset. Both the
non-noisy and noisy models used Allen’s intervals, and the temporal
state relations.
7</p>
        <p>
          Conclusions
We have extended the previous work of [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ] and shown that that it is
possible, by the use of temporal relations, to use a qualitative, as well
        </p>
        <p>Snap Noise
Uno No Noise</p>
        <p>Uno Noise
Path No Noise</p>
        <p>Path Noise
as a markovian representation of time. This technique is important
for a number of reasons. Firstly it produces models that are robust to
irrelevant variations in data. Secondly, it allows the system to learn
from a dataset containing single actions, and then be able to predict
from a dataset containing multiple overlapping actions.</p>
        <p>In future work will be looking into using spatial, as well as
temporal relations in the system. We are also looking into trying out
quantitative relations, so that a relation will not work on objects that are
either too close, or too far away. We will also be looking into changing
the output from a sub-model based on what data the search section
has evaluated on. Finally we will be looking at speed improvements
to the system so that the run time can be reduced.
soning’, in International Symposium on Imprecise Probabilities and</p>
        <p>
          Their Applications, pp. 193–202, (2005).
[
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ] John Koza, Genetic Programming, MIT Press, 1992.
[
          <xref ref-type="bibr" rid="ref11 ref32 ref71">11</xref>
          ] John Koza, Genetic Programming II, MIT Press, 1994.
[
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ] Philippe Leray and Olivier Francios, ‘Bayesian network structural
learning and incomplete data’, in Adaptive Knowledge Representation
and Reasoning, (2005).
[
          <xref ref-type="bibr" rid="ref13 ref34 ref73 ref87">13</xref>
          ] David Montana, ‘Strongly typed genetic programming’, in
Evolution
        </p>
        <p>
          ary Computation, (1995).
[
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ] S.H. Muggleton and J. Firth, ‘CProgol4.4: a tutorial introduction’, in
        </p>
        <p>
          Relational Data Mining, 160–188, Springer-Verlag, (2001).
[
          <xref ref-type="bibr" rid="ref15 ref36 ref75">15</xref>
          ] Chris Needham, Paulo Santos, Derek Magee, Vincent Devin, David
        </p>
        <p>Hogg, and Anthony Cohn, ‘Protocols from perceptual observations’,</p>
        <p>
          Artificial Intelligence, 167, 103–136, (2005).
[
          <xref ref-type="bibr" rid="ref16 ref37">16</xref>
          ] N. J. Nilsson, ‘Probabilistic logic’, Artificial Intelligence, 28, 71–87,
        </p>
        <p>
          (1986).
[
          <xref ref-type="bibr" rid="ref17 ref38">17</xref>
          ] Jeffrey Mark Siskind, ‘Grounding the lexical semantics of verbs in
visual perception using force dynamics and event logic’, Articial
Intelligence Research, 15, 31–90, (2000).
        </p>
        <p>Mihaela Cocea
and</p>
        <p>George D. Magoulas 1
Abstract. Most of the existing learning environments work in
wellstructured domains by making use of or combining AI techniques in
order to create and update a learner model, provide individual and/or
collaboration support and perform learner diagnosis. In this paper we
present an approach that exploits the synergy of case-base reasoning
and soft-computing for learner modelling in an ill-structured domain
for exploratory learning. We present the architecture of the learner
model, the knowledge formulation in terms of cases and illustrate its
application in an exploratory learning environment for mathematical
generalisation.
1</p>
        <p>
          INTRODUCTION
Several AI techniques have been proposed in intelligent learning
environments, such as case-based reasoning [
          <xref ref-type="bibr" rid="ref48">27</xref>
          ], [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ], bayesian
networks [
          <xref ref-type="bibr" rid="ref25 ref4 ref64 ref79">4</xref>
          ], [
          <xref ref-type="bibr" rid="ref27 ref6 ref66 ref81">6</xref>
          ], neural networks [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ], genetic and evolutionary
algorithms [
          <xref ref-type="bibr" rid="ref45">24</xref>
          ], neuro–fuzzy systems [
          <xref ref-type="bibr" rid="ref47">26</xref>
          ], as well as synergistic
approaches, such as genetic algorithms and case-based reasoning [
          <xref ref-type="bibr" rid="ref13 ref34 ref73 ref87">13</xref>
          ],
hybrid rules integrating symbolic rules with neurocomputing [
          <xref ref-type="bibr" rid="ref11 ref32 ref71">11</xref>
          ],
and expert systems with genetic algorithms [
          <xref ref-type="bibr" rid="ref18 ref39">18</xref>
          ].
        </p>
        <p>
          Exploratory Learning Environments (ELEs) belong to a particular
class of learning environments built on the principles of
constructivism paradigm for teaching and learning. ELEs place the emphasis
on the opportunity to learn through free exploration and discovery
rather than guided tutoring. This approach has proved to be
beneficial for learners in terms of acquiring deep conceptual and
structural knowledge. However, discovery learning without guidance and
support appears to be less effective than step-by-step guiding
learning environments [
          <xref ref-type="bibr" rid="ref16 ref37">16</xref>
          ]. To this end, an understanding of learner’s
behaviour and knowledge construction is needed [
          <xref ref-type="bibr" rid="ref43">22</xref>
          ].
        </p>
        <p>
          Most existing ELEs use simulations as a way of actively involving
learners in the learning process (e.g. [
          <xref ref-type="bibr" rid="ref49">28</xref>
          ], [
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ]) and exploit
cognitive tools [
          <xref ref-type="bibr" rid="ref50">29</xref>
          ] to support their learning. Few such systems model
learner’s knowledge/skills; for example [
          <xref ref-type="bibr" rid="ref25 ref4 ref64 ref79">4</xref>
          ] and [
          <xref ref-type="bibr" rid="ref27 ref6 ref66 ref81">6</xref>
          ] use bayesian
networks and [
          <xref ref-type="bibr" rid="ref47">26</xref>
          ] combines neural networks with fuzzy representation
of knowledge. Another category of ELEs is closer to the
constructivist approach by allowing the learner to construct their own models
rather than explore a “predefined” one. Compared to conventional
learning environments (even environments that use simulations), this
type of ELE requires approaches to learner modelling that would be
able to capture and model the useful interactions that take place as
learners construct their models.
        </p>
        <p>In this paper, we present an approach to learner modelling in ELEs
(suitable for both exploring simulations and constructing models)
that combines case-based reasoning with other AI techniques. The
1 The authors are with the London Knowledge Lab, Birkbeck College,
University of London, UK; email: fmihaela;gmagoulasg@dcs.bbk.ac.uk
subsequent section briefly introduces the application domain, namely
mathematical generalisation, and the ELE used, called ShapeBuilder,
and discusses the challenges involved in performing learner
modelling. Section 3 presents a conceptual framework for the learner
modelling process and describes the case-based formulation. Section
4 illustrates the process with an example, while Section 5 concludes
the paper and outlines future work.
2</p>
        <p>EXPLORATORY LEARNING FOR</p>
        <p>
          MATHEMATICAL GENERALISATION
Mathematical generalisation (MG) is associated with algebra, as
“algebra is, in one sense, the language of generalisation of quantity. It
provides experience of, and a language for, expressing generality,
manipulating generality, and reasoning about generality” [
          <xref ref-type="bibr" rid="ref20 ref41">20</xref>
          ].
        </p>
        <p>
          However, students do not associate algebra with generalisation as
the algebraic language is perceived as been separate from what it
represents [
          <xref ref-type="bibr" rid="ref15 ref36 ref75">15</xref>
          ]. To address this problem the ShapeBuilder [
          <xref ref-type="bibr" rid="ref29 ref68 ref8 ref83">8</xref>
          ] system,
which is an ELE under development in the context of the MiGen
project 2, aims to facilitate the correspondence between the
models, patterns and structures (visual representations) that the learners
build, on one hand, and their numeric, iconic and symbolic
representations, on the other hand. ShapeBuilder allows the construction
of different shapes [
          <xref ref-type="bibr" rid="ref30 ref69 ref84 ref9">9</xref>
          ], e.g. rectangles, L-shapes, T-shapes and
supports the three types of representations aforementioned: (a) numeric
representations that include numbers (constants or variables) and
expressions with numbers; (b) iconic representations which correspond
to icon variables; (c) symbolic representations that are names or
symbols given by users to variables or expressions. An icon variable has
the value of a dimension of a shape (e.g. width, height) and can be
obtained by double-clicking on the corresponding edge of the shape.
        </p>
        <p>It is represented as an icon of the shape with the corresponding edge
highlighted (see Figure 1a).</p>
        <p>
          Constants, variables and numeric expressions lead to specific
constructions/models, while icon variables and expressions using them
lead to general ones. Through the use of icon variables, ShapeBuilder
encourages structured algebra thinking, connecting the visual with
the abstract (algebraic) representation, as “each expression of
generality expresses a way of seeing” [
          <xref ref-type="bibr" rid="ref20 ref41">20</xref>
          ] (see Figure 1b). It also uses
the “messing up” metaphor [
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ] that consists of asking the learner to
resize a construction and observe the consequences; the model will
“mess up” only if it is not general (see Figures 1c and d), indicating
learner’s lack of generalisation ability.
        </p>
        <p>When attempting to model the learner in an ELE for such a wide
domain as MG, several challenges arise. The main and widely
ac2 Funded by ESRC, UK, under TLRP e-Learning Phase-II
(RES-139-25</p>
        <p>
          0381); http://www.tlrp.org/proj/tel/tel_noss.html.
knowledged challenge is to balance freedom with control: learners
should be given enough freedom so that they can actively engage in
activities but they should be offered enough guidance in order to
assure that the whole process reflects constructivist learning and leads
to useful knowledge [
          <xref ref-type="bibr" rid="ref42">21</xref>
          ]. This and some other challenges are
illustrated in Table 1 with examples from the domain of MG.
        </p>
        <p>Example
When a learner is trying to produce a general
representation, for how long should he be left alone to explore
and when does guidance become necessary?
Besides learner’s knowledge of MG concepts (e.g.
use of variables, consistency between representations,
etc.), other aspects need to be modelled in order to
support the learner during exploration: shapes
constructed, relations between shapes, etc.</p>
        <p>In exploratory learning it is difficult to categorise
actions or learner’s explorations into “correct” and
“incorrect”. Moreover, actions that might lead to
incorrect outcomes such as resizing can be more valuable
for constructivist learning than “correct” actions.</p>
        <p>Can consistency be inferred from the fact that a learner
is checking the correspondence between various forms
of representations? If so, is that always true? Are there
any exceptions to this rule?
As it is neither realistic nor feasible to include all
possible outcomes (correct or incorrect) to model the
domain of MG, only key information with educational
value could be stored, such as strategies in solving
a task. The challenge is how to represent and detect
them.
3</p>
        <p>A CONCEPTUAL FRAMEWORK FOR</p>
        <p>
          LEARNER MODELLING
Given the challenges mentioned in Table 1 a conventional learner
modelling approach does not fit the purposes of ELEs. Due to the
exploratory nature of the activities and the diversity of possible
trajectories, flexibility in the representation of information and handling of
uncertainty are two important aspects for effectively supporting the
learning process. As case-based reasoning offers flexibility of
information representation and soft computing techniques handle
uncertainty, a combination of the two is used. Moreover, previous research
has proved the benefits of combining case-based reasoning with
neural networks [
          <xref ref-type="bibr" rid="ref44">23</xref>
          ] and fuzzy quantifiers [
          <xref ref-type="bibr" rid="ref51">30</xref>
          ]. In the following
subsections, the architecture of the system, the AI components and their
role are described.
The architecture of the “Intelligent” ShapeBuilder is represented in
Figure 2. As the learner interacts with the system through the
interface, the actions of the learner are stored in the Learner Model (LM)
and they are passed to the Interactive Behaviour Analysis Module
(IBAM) where they are processed in cooperation with the
Knowledge Base (KB); the results are fed into the LM. The Feedback
Module (FM) is informed by the LM and the KB and feeds back to the
learner through the interface.
        </p>
        <p>The KB includes two components (see Figure 2): a domain and
a task model. The domain model includes high level learning
outcomes related to the domain (e.g. using variables, structural
reasoning, consistency, etc.) and considers that each learning outcome can
be achieved by exploring several tasks. The task model includes
different types of information: (a) strategies of approaching the task
which could be correct, incorrect or partially correct; (b) outcomes
of the exploratory process and solutions to specific questions
associated with each (sub)task; (c) landmarks, i.e. relevant aspects or
critical events occurring during the exploratory process; (d) contexts, i.e.
reference to particular (sub)tasks.</p>
        <p>
          The IBAM component combines case-based reasoning with soft
computing in order to identify what learners are doing and be able
to provide feedback as they explore a (sub)task. More specifically, as
they are working in a specific subtask, which specifies a certain
context, their actions are preprocessed, current cases are identified and
matched to the cases from the Task Model (the case base). Prior to
matching, local feature weighting [
          <xref ref-type="bibr" rid="ref44">23</xref>
          ] is applied in order to reflect
the importance of the attributes in the current context.
        </p>
        <p>
          In the FM component, multicriteria decision making [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ] will be
used to obtain priorities between several aspects that require
feedback depending on the context.
        </p>
        <p>
          Case-based Knowledge Representation
In case-based reasoning (CBR) [
          <xref ref-type="bibr" rid="ref17 ref38">17</xref>
          ] the knowledge is stored as cases,
typically including the description of a problem and the
corresponding solution. When a new problem is encountered, similar cases are
are higher than the corresponding ones for the case of the
transformation of Eq. (3). Moreover, note that for the case of
the rst transformation and 2 = 0:5 a bit with value `0' is
more likely to be followed by a bit with the same value
(probability equal to 0:55854); a phenomenon that does not occur
at present. For the pattern `11' the probability of
encountering a zero immediately after it becomes 0:933909, 0:628256,
and 0:717049, for 2 equal to 0.01, 0.1, and 0.5, respectively.
        </p>
        <p>Finally, for the pattern `01' the probability of zero after its
appearance is 0:932387, 0:538762, and 0:568140 for 2 equal
to 0.01, 0.1, and 0.5, respectively. The predictive power of the
binary patterns, `0', `11', (perfect predictors in the noise-free
binary sequence) and `01' (good predictor in the noise-free
binary sequence), with respect to the value of the variance of
the additive noise term, 2 is illustrated in Fig. 5. To
generate Fig. 5, 2 assumed values in the interval [0; 0:5] with a
stepsize of 10 3.
4</p>
        <p>Conclusions
Despite the chaotic nature of the tent map and the resulting
complexity of the binary sequences that were derived after the
application of two threshold, binary, transformations a large
number of short-term predictors was detected. The reported
experimental results indicate that the binary sequences
generated through the variable threshold binary transformation
are more predictable than those obtained through the xed
threshold transformation. This nding is clearer for values of
the control parameter, r, close to its upper bound, 2. Indeed
for r = 1:999 all the patterns of length up to nine appear in the
binary sequences obtained through the rst transformation,
suggesting that there is no perfect predictor. On the contrary,
for the sequences generated through the second
transformation with the same value of r, only three out of the four
possible patterns of length two are encountered, suggesting that
there is a perfect short-term predictor of length one. The
inclusion of an additive Gaussian noise term with zero mean in
the tent map equation eliminated all perfect predictors.
However, for small values of the variance of the Gaussian noise
binary patterns with high predictive power were identi ed.</p>
        <p>Future work on the subject will include the investigation of
multiplicative noise, as well as, the application of this
methodology to real{world time series and in particular nancial time
series. It is worth noting that the second binary
transformation is particularly meaningful in the study of nancial time
series as it corresponds to the direction of change of the next
value relative to the present one.</p>
        <p>Acknowledgments
This work was partially supported by the Hellenic Ministry of
Education and the European Union under Research Program
PYTHAGORAS-89203.
Improving the Accuracy of Neuro-Symbolic Rules with</p>
        <p>Case-Based Reasoning</p>
        <p>Jim Prentzas1, Ioannis Hatzilygeroudis2 and Othon Michail2
Abstract. In this paper, we present an improved approach
integrating rules, neural networks and cases, compared to a
previous one. The main approach integrates neurules and cases.</p>
        <p>Neurules are a kind of integrated rules that combine a symbolic
(production rules) and a connectionist (adaline unit)
representation. Each neurule is represented as an adaline unit.</p>
        <p>
          The main characteristics of neurules are that they improve the
performance of symbolic rules and, in contrast to other hybrid
neuro-symbolic approaches, retain the modularity of production
rules and their naturalness in a large degree. In the improved
approach, various types of indices are assigned to cases
according to different roles they play in neurule-based
reasoning, instead of one. Thus, an enhanced knowledge
representation scheme is derived resulting in accuracy
improvement. Experimental results demonstrate its
effectiveness.
1 INTRODUCTION
In contrast to rule-based systems that solve problems from
scratch, case-based systems use pre-stored situations (i.e.,
cases) to deal with similar new situations. Case-based reasoning
offers some advantages compared to symbolic rules and other
knowledge representation formalisms. Cases represent specific
knowledge of the domain, are natural and usually easy to obtain
[
          <xref ref-type="bibr" rid="ref11 ref32 ref71">11</xref>
          ], [
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ]. Incremental learning comes natural to case-based
reasoning. New cases can be inserted into a knowledge base
without making changes to the preexisting knowledge. The
more cases are available, the better the domain knowledge is
represented. Therefore, the accuracy of a case-based system can
be enhanced throughout its operation, as new cases become
available. A negative aspect of cases compared to symbolic
rules is that they do not provide concise representations of the
incorporated knowledge. Also it is not possible to represent
heuristic knowledge. Furthermore, the time-performance of the
retrieval operations is not always the desirable.
        </p>
        <p>
          Approaches integrating rule-based and case-based reasoning
have given interesting and effective knowledge representation
schemes and are becoming more and more popular in various
fields [
          <xref ref-type="bibr" rid="ref21 ref24 ref3 ref63 ref78">3</xref>
          ], [
          <xref ref-type="bibr" rid="ref13 ref34 ref73 ref87">13</xref>
          ], [
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ], [
          <xref ref-type="bibr" rid="ref15 ref36 ref75">15</xref>
          ], [
          <xref ref-type="bibr" rid="ref17 ref38">17</xref>
          ], [
          <xref ref-type="bibr" rid="ref18 ref39">18</xref>
          ], [
          <xref ref-type="bibr" rid="ref19 ref40">19</xref>
          ]. The objective of
these efforts is to derive hybrid representations that augment the
positive aspects of the integrated formalisms and
simultaneously minimize their negative aspects. The
complementary advantages and disadvantages of rule-based and
case-based reasoning are a good justification for their possible
combination. The bulk of the approaches combining rule-based
and case-based reasoning follow the coupling models [
          <xref ref-type="bibr" rid="ref17 ref38">17</xref>
          ]. In
these models, the problem-solving (or reasoning) process is
decomposed into tasks (or stages) for which different
representation formalisms (i.e., rules or cases) are applied.
        </p>
        <p>However, a more interesting approach is one integrating
more than two reasoning methods towards the same objective.</p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref16 ref37">16</xref>
          ] and [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ], such an approach integrating three reasoning
schemes, namely rules, neurocomputing and case-based
reasoning in an effective way is introduced. To this end,
neurules and cases are combined. Neurules are a type of hybrid
rules integrating symbolic rules with neurocomputing in a
seamless way. Their main characteristic is that they retain the
modularity of production rules and also their naturalness in a
large degree. In that approach, on the one hand, cases are used
as exceptions to neurules, filling their gaps in representing
domain knowledge and, on the other hand, neurules perform
indexing of the cases facilitating their retrieval. Finally, it
results in accuracy improvement.
        </p>
        <p>In this paper, we enhance the above approach by employing
different types of indices for the cases according to different
roles they play in neurule-based reasoning. In this way, an
improved knowledge representation scheme is derived as
various types of neurules’ gaps in representing domain
knowledge are filled in by indexed cases. Experimental results
demonstrate the effectiveness of the presented approach
compared to our previous one.</p>
        <p>The rest of the paper is organized as follows. Section 2
presents neurules, whereas Section 3 presents methods for
constructing the indexing scheme of the case library. Section 4
describes the hybrid inference mechanism. Section 5 presents
experimental results regarding accuracy of the inference
process. Section 6 discusses related work. Finally, Section 7
concludes.
2</p>
        <p>
          NEURULES
Neurules are a type of hybrid rules integrating symbolic rules
with neurocomputing giving pre-eminence to the symbolic
component. Neurocomputing is used within the symbolic
framework to improve the performance of symbolic rules [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ],
[
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ]. In contrast to other hybrid approaches (e.g. [
          <xref ref-type="bibr" rid="ref25 ref4 ref64 ref79">4</xref>
          ], [
          <xref ref-type="bibr" rid="ref26 ref5 ref65 ref80">5</xref>
          ]), the
constructed knowledge base retains the modularity of
production rules, since it consists of autonomous units
(neurules), and also retains their naturalness in a large degree,
since neurules look much like symbolic rules [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ], [
          <xref ref-type="bibr" rid="ref29 ref68 ref8 ref83">8</xref>
          ]. Also, the
inference mechanism is a tightly integrated process, which
results in more efficient inferences than those of symbolic rules
[
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ], [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ]. Explanations in the form of if-then rules can be
produced [
          <xref ref-type="bibr" rid="ref30 ref69 ref84 ref9">9</xref>
          ], [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ].
2.1 Syntax and Semantics
The form of a neurule is depicted in Fig.1a. Each condition Ci is
assigned a number sfi, called its significance factor. Moreover,
each rule itself is assigned a number sf0, called its bias factor.
        </p>
        <p>Internally, each neurule is considered as an adaline unit
(Fig.1b). The inputs Ci (i=1,...,n) of the unit are the conditions
of the rule. The weights of the unit are the significance factors
of the neurule and its bias is the bias factor of the neurule. Each
input takes a value from the following set of discrete values: [1
(true), 0 (false), 0.5 (unknown)]. This gives the opportunity to
easily distinguish between the falsity and the absence of a
condition in contrast to symbolic rules. The output D, which
represents the conclusion (decision) of the rule, is calculated via
the standard formulas:</p>
        <p>D = f(a) ,</p>
        <p>n
a = sf 0 + ∑ sf i Ci</p>
        <p>i=1
where a is the activation value and f(x) the activation function,
a threshold function. Hence, the output can take one of two
values (‘-1’, ‘1’) representing failure and success of the rule
respectively.</p>
        <p>Fig. 1. (a) Form of a neurule (b) a neurule as an adaline unit</p>
        <p>The general syntax of a condition Ci and the conclusion D is:
&lt;condition&gt;::= &lt;variable&gt; &lt;l-predicate&gt; &lt;value&gt;
&lt;conclusion&gt;::= &lt;variable&gt; &lt;r-predicate&gt; &lt;value&gt;
where &lt;variable&gt; denotes a variable, that is a symbol
representing a concept in the domain, e.g. ‘sex’, ‘pain’ etc, in a
medical domain. &lt;l-predicate&gt; denotes a symbolic or a numeric
predicate. The symbolic predicates are {is, isnot} whereas the
numeric predicates are {&lt;, &gt;, =}. &lt;r-predicate&gt; can only be a
symbolic predicate. &lt;value&gt; denotes a value. It can be a symbol
or a number. The significance factor of a condition represents
the significance (weight) of the condition in drawing the
conclusion(s). Table 1 (Section 3) presents two example
neurules, from a medical diagnosis domain.</p>
        <p>
          Neurules can be constructed either from symbolic rules, thus
exploiting existing symbolic rule bases, or from empirical data
(i.e., training examples) (see [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ] and [
          <xref ref-type="bibr" rid="ref29 ref68 ref8 ref83">8</xref>
          ] respectively). An
adaline unit is initially assigned to each possible conclusion.
        </p>
        <p>
          Each unit is individually trained via the Least Mean Square
(LMS) algorithm. When the training set is inseparable, special
techniques are used. In that case, more than one neurule having
the same conclusion are produced.
The neurule-based inference engine performs a task of
classification: based on the values of the condition variables
and the weighted sums of the conditions, conclusions are
reached. It gives pre-eminence to symbolic reasoning, based on
a backward chaining strategy [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ], [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ]. As soon as the initial
input data is given and put in the working memory, the output
neurules are considered for evaluation. One of them is selected
for evaluation. Selection is based on textual order. A neurule
fires if the output of the corresponding adaline unit is computed
to be ‘1’ after evaluation of its conditions. A neurule is said to
be ‘blocked’ if the output of the corresponding adaline unit is
computed to be ‘-1’ after evaluation of its conditions.
        </p>
        <p>A condition evaluates to ‘true’ (‘1’), if it matches a fact in
the working memory, that is there is a fact with the same
variable, predicate and value. A condition evaluates to
‘unknown’, if there is a fact with the same variable, predicate
and ‘unknown’ as its value. A condition cannot be evaluated if
there is no fact in the working memory with the same variable.</p>
        <p>In this case, either a question is made to the user to provide data
for the variable, in case of an input variable, or an intermediate
neurule with a conclusion containing the variable is examined,
in case of an intermediate variable. A condition with an input
variable evaluates to ‘false’ (‘0’), if there is a fact in the
working memory with the same variable, predicate and
different value. A condition with an intermediate variable
evaluates to ‘false’ if additionally to the latter there is no
unevaluated intermediate neurule that has a conclusion with the
same variable. Inference stops either when one or more output
neurules are fired (success) or there is no further action
(failure).</p>
        <p>During inference, a conclusion is rejected (or not drawn)
when none of the neurules containing it fires. This happens
when: (i) all neurules containing the conclusion have been
examined and are blocked or/and (ii) a neurule containing an
alternative conclusion for the specific variable fires instead. For
instance, if all neurules containing the conclusion ‘disease-type
is inflammation’ have been examined and are blocked, then this
conclusion is rejected (or not drawn). If a neurule containing
e.g. the alternative conclusion ‘disease-type is
primarymalignant’ fires, then conclusion ‘disease-type is inflammation’
is rejected (or not drawn), no matter whether all neurules
containing as conclusion ‘disease-type is inflammation’ have
been examined (and are blocked) or not.
3 INDEXING
Indexing concerns the organization of the available cases so
that combined neurule-based and case-based reasoning can be
performed. Indexed cases fill in gaps in the domain knowledge
representation by neurules and during inference may assist in
reaching the right conclusion. To be more specific, cases may
enhance neurule-based reasoning to avoid reasoning errors by
handling the following situations:
(a) Examining whether a neurule misfires. If sufficient
conditions of the neurule are satisfied so that it can fire, it
should be examined whether the neurule misfires for the
specific facts, thus producing an incorrect conclusion.
(b) Examining whether a specific conclusion was erroneously</p>
        <p>rejected (or not drawn).</p>
        <p>
          In the approach in [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ], the neurules contained in the neurule
base were used to index cases representing their exceptions. A
case constitutes an exception to a neurule if its attribute values
satisfy sufficient conditions of the neurule (so that it can fire)
but the neurule's conclusion contradicts the corresponding
attribute value of the case. In this approach, various types of
indices are assigned to cases. More specifically, indices are
assigned to cases according to different roles they play in
neurule-based reasoning and assist in filling in different types
of gaps in the knowledge representation by neurules. Assigning
different types of indices to cases can produce an effective
approach combining symbolic rule-based with case-based
reasoning [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ].
        </p>
        <p>In this new approach, a case may be indexed by neurules and
by neurule base conclusions as well. In particular, a case may
be indexed as:
(a) False positive (FP), by a neurule whose conclusion is
contradicting. Such cases, as in our previous approach,
represent exceptions to neurules and may assist in
avoiding neurule misfirings.
(b) True positive (TP), by a neurule whose conclusion is
endorsing. The attribute values of such a case satisfy
sufficient conditions of the neurule (so that it can fire)
and the neurule's conclusion agrees with the
corresponding attribute value of the case. Such cases
may assist in endorsing correct neurule firings.
(c) False negative (FN), by a conclusion erroneously
rejected (or not drawn) by neurules. Such cases may
assist in reaching conclusions that ought to have been
drawn by neurules (and were not drawn). If neurules
with alternative conclusions containing this variable
were fired instead, it may also assist in avoiding neurule
misfirings. ‘False negative’ indices are associated with
conclusions and not with specific neurules because there
may be more than one neurule with the same conclusion
in the neurule base.</p>
        <p>
          The indexing process may take as input the following types
of knowledge:
(a) Available neurules and non-indexed cases.
(b) Available symbolic rules and indexed cases. This type of
knowledge concerns an available formalism of symbolic
rules and indexed exception cases as the one presented in
[
          <xref ref-type="bibr" rid="ref27 ref6 ref66 ref81">6</xref>
          ].
        </p>
        <p>
          The availability of data determines which type of knowledge
is provided as input to the indexing module. If an available
formalism of symbolic rules and indexed cases is presented as
input, the symbolic rules are converted to neurules using the
‘rules to neurules’ module. The produced neurules are
associated with the exception cases of the corresponding
symbolic rules [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ]. Exception cases are indexed as ‘false
positives’ by neurules. Furthermore, for each case ‘true
positive’ and ‘false negative’ indices may be acquired using the
same process as in type (a).
        </p>
        <p>When available neurules and non-indexed cases are given as
input to the indexing process, cases must be associated with
neurules and neurule base conclusions. For each case, this
information can be easily acquired as following:</p>
        <p>Until all intermediate and output attribute values of the case
have been considered:
1. Perform neurule-based reasoning for the neurules based on</p>
        <p>the attribute values of the case.
2. If a neurule fires, check whether the value of its conclusion
variable matches the corresponding attribute value of the
case. If it does (doesn't), associate the case as a ‘true
positive’ (‘false positive’) with this neurule.
3. Check all intermediate and final conclusions. Associate the
case as a ‘false negative’ with each rejected (or not drawn)
conclusion that ought to have been drawn based on the
attribute values of the case.</p>
        <p>To illustrate how the indexing process works, we present the
following example. Suppose that we have a neurule base
containing the two neurules in Table 1 and the example cases
shown in Table 2 (only the most important attributes of the
cases are shown). The cases however, also possess other
attributes (not shown in Table 2).</p>
        <p>‘disease-type’ is the output attribute that corresponds to the
neurules’ conclusion variable. Table 3 shows the types of
indices associated with each case in Table 2 at the end of the
indexing process.</p>
        <p>To acquire indexing information, the input values
corresponding to the attribute values of the cases are presented
to the example neurules. Recall that when a neurule condition
evaluates to ‘true’ it gets the value ‘1’, whereas when it is false
gets ‘0’.</p>
        <p>For example, given the input case C2, the final weighted sum
of neurule NR1 is: -23.9 + 10.6 + 10.5 + 8.8 = 6&gt;0. Note that
the first three conditions of NR1 evaluate to ‘true’ whereas the
remaining four (i.e., ‘fever is medium’, ‘fever is no-fever’,
‘patient-class is human21-35’ and ‘ant-reaction is medium’) to
‘false’ (not contributing to the weighted sum).
Case
ID
C1
C2
C3
C4
C5
C6
patient-class
human21-35
human0-20
human0-20
human0-20
human21-35</p>
        <p>pain
continuous
continuous</p>
        <p>night
continuous
continuous
human0-20
continuous
The fact that the final weighted sum is positive means that
sufficient conditions of NR1 are satisfied so that it can fire.</p>
        <p>Furthermore, the corresponding output attribute value of the
case matches the conclusion of NR1 and therefore C2 is
associated as ‘true positive’ with NR1.</p>
        <p>Similarly, when the input values corresponding to the
attribute values of cases C1 and C4 are given as input to the
neurule base, sufficient conditions of neurules NR2 and NR1
respectively are satisfied so that they can fire and the
corresponding output attribute case values match their
conclusions. Furthermore, when the input values corresponding
to the attribute values of case C5 are given as input to the
neurule base, sufficient conditions of both neurules NR1 and
NR2 are satisfied so that they can fire. However, the
corresponding output attribute case values match the conclusion
of NR2 and contradict the conclusion of NR1. In addition,
conclusion ‘disease-type is inflammation’ cannot be drawn
when the input values corresponding to the attribute values of
case C3 are given as input because the only neurule with the
corresponding conclusion (i.e., NR1) is blocked. A similar
situation happens for case C6.
4 THE HYBRID INFERENCE MECHANISM
The inference mechanism combines neurule-based with
casebased reasoning. The combined inference process mainly
focuses on the neurules. The indexed cases are considered
when: (a) sufficient conditions of a neurule are fulfilled so that
it can fire, (b) all output or intermediate neurules with a specific
conclusion variable are blocked and thus no final or
intermediate conclusion containing this variable is drawn.</p>
        <p>In case (a), firing of the neurule is suspended and case-based
reasoning is performed for cases indexed as ‘false positives’
and ‘true positives’ by the neurule and cases indexed as ‘false
negatives’ by alternative conclusions containing the neurule’s
conclusion variable. Cases indexed as ‘true positives’ by the
neurule endorse its firing whereas the other two sets of cases
considered (i.e., ‘false positives’ and ‘false negatives’) prevent
its firing. The results produced by case-based reasoning are
evaluated in order to assess whether the neurule will fire or
whether an alternative conclusion proposed by the retrieved
case will be considered valid instead.</p>
        <p>In case (b), the case-based module will focus on cases
indexed as ‘false negatives’ by conclusions containing the
specific (intermediate or output) variable.</p>
        <p>The basic steps of the inference process are the following:
1. Perform neurule-based reasoning for the neurules.
2. If sufficient conditions of a neurule are fulfilled so that it can
fire, then
2.1. Perform case-based reasoning for the ‘false positive’
and ‘true positive’ cases indexed by the neurule and the
‘false negative’ cases associated with alternative
conclusions containing the neurule’s conclusion
variable.
2.2. If none case is retrieved or the best matching case is
indexed as ‘true positive’, the neurule fires and its
conclusion is inserted into the working memory.
2.3. If the best matching case is indexed as ‘false positive’ or
‘false negative’, insert the conclusion supported by the
case into the working memory and mark the neurule as
'blocked'.
3. If all intermediate neurules with a specific conclusion
variable are blocked, then
3.1. Examine all cases indexed as ‘false negatives’ by the
corresponding intermediate conclusions, retrieve the
best matching one and insert the conclusion supported
by the retrieved case into the working memory.
4. If all output neurules with a specific conclusion variable are
blocked, then
4.1. Examine all cases indexed as ‘false negatives’ by the
corresponding final conclusions, retrieve the best
matching one and insert the conclusion supported by the
retrieved case into the working memory.</p>
        <p>
          The similarity measure between two cases ck and cl is
calculated via a distance metric [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ]. The best-matching case to
the problem at hand is the one having the maximum similarity
with (minimum distance from) the input case. If multiple stored
cases have a similarity equal to the maximum one, a simple
heuristic is used.
        </p>
        <p>Let present now two simple inference examples concerning
the combined neurule base (Table 1) and the indexed example
cases (Tables 2 and 3). Suppose that during inference sufficient
conditions of neurule NR1 are satisfied so that it can fire. Firing
of NR1 is suspended and the case-based reasoning process
focuses on the cases contained in the union of the following sets
of indexed cases:
• the set of cases indexed as ‘true positives’ by NR1:</p>
        <p>{C2, C4},
• the set of cases indexed as ‘false positives’ by</p>
        <p>NR1: {C5} and
• the set of cases indexed as ‘false negatives’ by
alternative conclusions containing variable
‘disease-type’ (i.e., ‘disease-type is chronic
inflammation’): {C6}.</p>
        <p>So, in this example the case-based reasoning process focuses on
the following set of indexed cases: {C2, C4} ∪ {C5} ∪ {C6} =
{C2, C4, C5, C6}.</p>
        <p>Suppose now that during inference both output neurules in
the example neurule base are blocked. The case-based
reasoning process will focus on the cases contained in the union
set of the following sets of indexed cases:
• the set of cases indexed as ‘false negatives’ by</p>
        <p>conclusion ‘disease-type is inflammation’: {C3}.
• the set of cases indexed as ‘false negatives’ by
conclusion ‘disease-type is chronic-inflammation’:
{C6}.</p>
        <p>
          Therefore, in this example the case-based reasoning process
focuses on the following set of indexed cases: {C3} ∪ {C6} =
{C3, C6}.
5 EXPERIMENTAL RESULTS
In this section, we present experimental results using datasets
acquired from [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ]. Note that there are no intermediate
conclusions in these datasets. The experimental results involve
evaluation of the presented approach combining neurule-based
and case-based reasoning and comparison with our previous
approach [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ]. 75% and 25% of each dataset were used as
training and testing sets respectively. Each initial training set
was used to create a combined neurule base and indexed case
library. For this purpose, each initial training set was randomly
split into two disjoint subsets, one used to create neurules and
one used to create an indexed case library. More specifically,
2/3 of each initial training set was used to create neurules by
employing the ‘patterns to neurules’ module [
          <xref ref-type="bibr" rid="ref29 ref68 ref8 ref83">8</xref>
          ] whereas the
remaining 1/3 of each initial training set constituted
nonindexed cases. Both types of knowledge (i.e., neurules and
nonindexed cases) were given as input to the indexing construction
module presented in this paper producing a combined neurule
base and an indexed case library which will be referred to as
NBRCBR. Neurules and non-indexed cases were also used to
produce a combined neurule base and an indexed case library
according to [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ] which will be referred to as
NBRCBR_PREV.
        </p>
        <p>
          Inferences were run for both NBRCBR and
NBRCBR_PREV using the testing sets. Inferences from
NBRCBR_Prev were performed using the inference mechanism
combining neurule-based and CBR as described in [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ].
        </p>
        <p>Inferences from NBRCBR were performed according to the
inference mechanism described in this paper. No test case was
stored in the case libraries.</p>
        <p>Table 4 presents such experimental results regarding
inferences from NBRCBR and NBRCBR_PREV. It presents
results regarding classification accuracy of the integrated
approaches and the percentage of test cases resulting in
neurulebased reasoning errors that were successfully handled by
casebased reasoning. Column ‘% FPs handled’ refers to the
percentage of test cases resulting in neurule misfirings (i.e.,
‘false positives’) that were successfully handled by case-based
reasoning. Column ‘% FNs handled’ refers to the percentage of
test cases resulting in having all output neurules blocked (i.e.,
‘false negatives’) that were successfully handled by case-based
reasoning. ‘False negative’ test cases are handled in
NBRCBR_PREV by retrieving the best-matching case from the
whole library of indexed cases.</p>
        <p>Dataset</p>
        <p>Car
(1728
patterns)
Nursery
(12960
patterns)</p>
        <p>As can be seen from the table, the presented approach results
in improved classification accuracy. Furthermore, in inferences
from NBRCBR the percentages of both ‘false positive’ and
‘false negative’ test cases successfully handled are greater than
the corresponding percentages in inferences from
NBRCBR_PREV. Results also show that there is still room for
improvement.</p>
        <p>
          We also tested a nearest neighbor approach working alone in
these two datasets (75% of the dataset used as case library and
25% of the dataset used as testing set). We used the similarity
measure presented in Section 5. The approach classified the
input case to the conclusion supported by the best-matching
case retrieved from the case library. Classification accuracy for
car and nursery dataset is 90.45% and 96.67% respectively. So,
both integrated approaches perform better. This is due to the
fact that the indexing schemes assist in focusing on specific
parts of the case library.
In this paper, we present an approach integrating neurule-based
and case-based reasoning that improves a previous hybrid
approach [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ]. Neurules are a type of hybrid rules integrating
symbolic rules with neurocomputing. In contrast to other
neurosymbolic approaches, neurules retain the naturalness and
modularity of symbolic rules. Integration of neurules and cases
is done in order to improve the accuracy of the inference
mechanism. Cases are indexed according to the roles they can
play during neurule-based inference. More specifically, they are
associated as ‘true positives’ and ‘false positives’ with neurules
and as ‘false negatives’ with neurule base conclusions.
        </p>
        <p>The presented approach integrates three types of knowledge
representation schemes: symbolic rules, neural networks and
case-based reasoning. Most hybrid intelligent systems
implemented in the past usually integrate two intelligent
technologies e.g. neural networks and expert systems, neural
and fuzzy logic, genetic algorithms and neural networks, etc. A
new development that should receive interest in the future is the
integration of more than two intelligent technologies,
facilitating the solution of complex problems and exploiting
multiple types of data sources.</p>
        <p>Combinations of Case-Based Reasoning with Other
Intelligent Methods</p>
        <p>Jim Prentzas1 and Ioannis Hatzilygeroudis2
Abstract. Case-based reasoning is a popular approach used in
intelligent systems. Whenever a new case has to be dealt with,
the most similar cases are retrieved from the case base and their
encompassed knowledge is exploited in the current situation.</p>
        <p>
          Combinations of case-based reasoning with other intelligent
methods have been explored deriving effective knowledge
representation schemes. Although some types of combinations
have been mostly explored, other types have not been
thoroughly investigated. In this paper, we briefly outline
popular case-based reasoning combinations. More specifically,
we focus on combinations of case-based reasoning with
rulebased reasoning, soft computing and ontologies. We illustrate
basic types of such combinations and discuss future directions.
1 INTRODUCTION
Case-based representations store a large set of previous cases
with their solutions in the case base using them whenever a
similar new case has to be dealt with [
          <xref ref-type="bibr" rid="ref19 ref40">19</xref>
          ], [
          <xref ref-type="bibr" rid="ref43">22</xref>
          ]. Whenever, a
new input case comes in, a case-based system performs
inference in four phases known as the case-based reasoning
(CBR) cycle [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ]: (i) retrieve, (ii) reuse, (iii) revise and (iv)
retain. The retrieval phase retrieves from the case base the
most relevant stored case(s) to the new case. Indexing
schemes and similarity metrics are used for this purpose. In
the reuse phase, a solution for the new case is created based
on the retrieved most relevant case(s). The revise phase
validates the correctness of the proposed solution, perhaps
with the intervention of the user. Finally, the retain phase
decides whether the knowledge learned from the solution of
the new case is important enough to be incorporated into the
system.
        </p>
        <p>
          CBR can be effectively combined with other intelligent
methods [
          <xref ref-type="bibr" rid="ref46">25</xref>
          ], [
          <xref ref-type="bibr" rid="ref52">31</xref>
          ]. Two main trends for CBR combinations
can be discerned. The first trend involves embedded
approaches in which the primary intelligent method (usually
CBR) embeds one or more other intelligent methods to
assist its internal online and offline tasks. The second
combination trend involves approaches in which the
problem solving process can be decomposed into tasks for
which different representation formalisms are required or
available. In such situations, a CBR system as a whole (with
its possible internal modules) is integrated ‘externally’ with
other intelligent systems to create an improved overall
system.
        </p>
        <p>Popular CBR combinations involve combinations with
rulebased reasoning (RBR), model-based reasoning (MBR) and soft
computing methods. CBR has also been combined with other
intelligent methods (e.g. ontologies). In certain CBR
combinations both combination trends have been followed. In
other combinations one of the two trends is mostly explored.</p>
        <p>In this paper, we briefly discuss aspects involving CBR
combinations. We focus on intelligent methods with which
CBR is usually combined. Our purpose is not to present an
extensive survey of developed CBR combinations but to
present their key aspects.
3 COMBINATIONS OF CBR
Combinations of CBR with other intelligent methods have been
explored for more effective knowledge representation and
problem solving. CBR can be combined with various intelligent
methods. However, CBR is usually combined with RBR, MBR
and soft computing methods.</p>
        <p>
          To categorize CBR combinations one could use Medsker’s
general categorization scheme for integrated intelligent systems
[
          <xref ref-type="bibr" rid="ref47">26</xref>
          ]. Medsker distinguishes five main combination models:
standalone, transformational, loose coupling, tight coupling and
fully integrated models. Distinction between those models is
based on the degree of coupling between the integrated
components. Underlying categories for some of these models
are also defined. Main types of underlying categories for loose
and tight coupling models involve pre-processing,
postprocessing and co-processing models as well as embedded
processing (for tight coupling models only). Not all of these
combination models and/or their underlying categories have
been thoroughly explored in the case of CBR combinations.
        </p>
        <p>The types of combination models that have been applied to
CBR combinations depend on the nature of the other intelligent
methods combined with CBR. Some combination models are
difficult to apply in certain CBR combinations. For instance, it
is difficult to apply the fully integrated model in combinations
of RBR with CBR. Obviously, the standalone model can be
applied to combinations of CBR with any other method.</p>
        <p>
          Generally speaking, coupling models are the most usual
CBR combination models. More specifically, embedded
coupling approaches constitute perhaps the most popular trend.
Most of the combinations following this trend use other
intelligent methods to assist various CBR tasks. CBR is a
generic methodology for building knowledge-based systems
and its internal reasoning tasks can be implemented using a
number of techniques as long as the guiding CBR principles are
followed [
          <xref ref-type="bibr" rid="ref57">36</xref>
          ]. The reverse approach that is, embedding
casebased modules into intelligent systems employing other
representations to assist in their internal tasks does not seem to
be popular with the exception of combinations with genetic
algorithms. In combinations of CBR with RBR and MBR,
various coupling approaches have also been investigated
besides embedded approaches [
          <xref ref-type="bibr" rid="ref52">31</xref>
          ]. In coupling combinations
of CBR with soft computing methods, embedded approaches
seem to be the most thoroughly investigated.
        </p>
        <p>
          In the following, we discuss main issues involving
combinations of CBR with RBR, fuzzy logic, neural networks,
genetic algorithms and ontologies.
3.1 Combinations of CBR with RBR
Various types of coupling models involving combinations of
CBR and RBR have been investigated i.e., sequential
processing, co-processing and embedded processing [
          <xref ref-type="bibr" rid="ref52">31</xref>
          ].
        </p>
        <p>
          In sequential processing, information (produced by
reasoning) necessarily passes sequentially through some or all
of the combined modules to produce the final result [
          <xref ref-type="bibr" rid="ref54">33</xref>
          ], [
          <xref ref-type="bibr" rid="ref11 ref32 ref71">11</xref>
          ].
        </p>
        <p>
          In co-processing approaches, the combined modules closely
interact in producing the final result. Such systems can be
discerned into two types: cooperation-oriented, which give
emphasis on cooperation, and reconciliation-oriented, which
give emphasis on reconciliation. In the former type, the
combined components cooperate with each other (usually by
interleaving their reasoning steps) [
          <xref ref-type="bibr" rid="ref48">27</xref>
          ], [
          <xref ref-type="bibr" rid="ref53">32</xref>
          ]. In the latter, each
component produces its own conclusion, possibly differing
from the conclusion of the other component, and thus a
reconciliation process is necessary [
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ].
        </p>
        <p>
          In embedded processing, CBR systems employ one or more
RBR modules to perform tasks of their CBR cycle (e.g.
retrieval and adaptation). Such approaches are quite common in
CBR especially for adaptation. RBR systems embedding CBR
modules do not seem to exist.
3.2 Combinations of CBR with Fuzzy Logic
CBR can be combined with fuzzy logic in fruitful ways in order
to handle imprecision. A usual approach is the incorporation of
fuzzy logic into a CBR system in order to improve CBR aspects
[
          <xref ref-type="bibr" rid="ref25 ref4 ref64 ref79">4</xref>
          ], [
          <xref ref-type="bibr" rid="ref50">29</xref>
          ], [
          <xref ref-type="bibr" rid="ref56">35</xref>
          ], [
          <xref ref-type="bibr" rid="ref30 ref69 ref84 ref9">9</xref>
          ]. Such combinations have been vastly
explored as imprecision and uncertainty are inherent in various
CBR tasks. Fuzzy terms may be used in case representation
enabling a flexible encoding of case features that encompasses
imprecise and uncertain information. Fuzzy logic may be also
proved very useful in indexing and retrieval. Fuzzy indexing
enables multiple indexing of a case on a single feature with
different degrees of membership [
          <xref ref-type="bibr" rid="ref56">35</xref>
          ]. Fuzzy similarity
assessment and matching methods can produce more accurate
results. Fuzzy clustering and classification methods can also be
applied in case retrieval. In addition, fuzzy adaptation rules can
be employed in case adaptation.
        </p>
        <p>
          The works concerning combination of RBR with CBR [
          <xref ref-type="bibr" rid="ref52">31</xref>
          ]
could potentially be improved with use of fuzzy rules.
        </p>
        <p>
          Investigation of coupling approaches in combinations of CBR
with fuzzy systems besides embedded ones could be fruitful.
Neural networks are usually employed by CBR to perform
tasks such as indexing, retrieval and adaptation. In this way,
appealing characteristics of neural networks such as
parallelism, robustness, adaptability, generalization and ability
to cope with incomplete input data are exploited [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref56">35</xref>
          ]. Due
to the fact that different types of neural networks have been
developed (e.g. back propagation neural networks, radial basis
function networks, Self-Organizing Map networks, ART
network), different types of neural capabilities for classification
and clustering can be exploited. Certain CBR approaches have
employed different types of neural networks for the various
internal CBR tasks (e.g. [
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref55">34</xref>
          ]). Knowledge extracted from
neural networks could also be exploited by CBR [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref56">35</xref>
          ]. An
interesting direction could involve non-embedded coupling
approaches combining CBR with neural networks.
Usual combinations of CBR with genetic algorithms (GAs)
involve use of GAs to optimize (one or more) aspects of a CBR
system. On the other hand, CBR can be exploited to enhance
GAs. Other types of combinations of CBR with GAs can be
also implemented.
        </p>
        <p>
          GAs can be used within CBR to enhance indexing and
retrieval. GAs have been used to assign case feature weights
enhancing similarity assessment [
          <xref ref-type="bibr" rid="ref60">39</xref>
          ], [
          <xref ref-type="bibr" rid="ref29 ref68 ref8 ref83">8</xref>
          ], to perform feature
selection [
          <xref ref-type="bibr" rid="ref18 ref39">18</xref>
          ] and generally to select relevant indices for
evolving environments. GAs have also been used to retrieve
multiple similar cases [
          <xref ref-type="bibr" rid="ref59">38</xref>
          ]. If k nearest neighbor retrieval is
applied, genetic algorithms can be used to find the optimal k
parameter in order to improve the retrieval accuracy [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ].
        </p>
        <p>
          Furthermore, GAs can be used to perform instance selection
i.e., finding the representative cases in a case base and
determining a reduced subset of a case base. In this way, time
performance is improved by reducing search space and
accuracy can be improved through elimination of noisy and
useless cases [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ].
        </p>
        <p>
          Additionally, GAs have been used to enhance case
adaptation [
          <xref ref-type="bibr" rid="ref16 ref37">16</xref>
          ], [
          <xref ref-type="bibr" rid="ref17 ref38">17</xref>
          ]. Genetic algorithms can also optimize case
representation, e.g. by performing case feature discretization
[
          <xref ref-type="bibr" rid="ref18 ref39">18</xref>
          ] and removing irrelevant features. Such optimizations
improve accuracy, search time and storage requirements. It is
also quite usual to simultaneously optimize more than one CBR
aspect with GAs (e.g. [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ], [
          <xref ref-type="bibr" rid="ref18 ref39">18</xref>
          ]).
        </p>
        <p>On the other hand CBR can be employed to enhance GAs.</p>
        <p>
          CBR can be applied to GAs by creating cases to track the
history of a search. This case base can contribute in the
understanding of how a solution was reached, why a solution
works, and what the search space looks like. It could thus be
used to design highly tailored search strategies for future use
[
          <xref ref-type="bibr" rid="ref44">23</xref>
          ]. Such an approach could therefore be used to explain the
results of the genetic algorithm and for knowledge extraction.
        </p>
        <p>
          Moreover, similar stored cases can be also incorporated into a
genetic algorithm to reduce convergence time and improve
solution accuracy. GAs randomly initialize their starting
population. Instead, relevant stored cases can be used as part of
the initial population (solution) of GAs. Additionally, relevant
stored cases can be periodically injected into the pool of
chromosomes while the genetic algorithm runs [
          <xref ref-type="bibr" rid="ref45">24</xref>
          ], [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ]. In
certain approaches, CBR is exploited by GAs for both
knowledge extraction and case injection [
          <xref ref-type="bibr" rid="ref51">30</xref>
          ].
3.5 Combinations of CBR with Ontologies
Ontologies facilitate knowledge sharing and reuse. They can
provide an explicit conceptualization describing data semantics
and a shared and common understanding of the domain
knowledge that can be communicated among agents and
application systems [
          <xref ref-type="bibr" rid="ref27 ref6 ref66 ref81">6</xref>
          ]. Ontologies play a crucial role in
enabling the processing and sharing of knowledge between
programs on the Web [
          <xref ref-type="bibr" rid="ref42">21</xref>
          ]. Intelligent Decision Support
Systems in the semantic Web framework should be able to
handle, integrate with and reason from distributed data and
information on the Web [
          <xref ref-type="bibr" rid="ref21 ref24 ref3 ref63 ref78">3</xref>
          ].
        </p>
        <p>
          Therefore ontologies can be combined with CBR in various
ways. Ontologies can be used by a CBR system to represent the
input problem [
          <xref ref-type="bibr" rid="ref20 ref41">20</xref>
          ], to enhance similarity assessment [
          <xref ref-type="bibr" rid="ref13 ref34 ref73 ref87">13</xref>
          ], case
representation, case abstraction and case adaptation [
          <xref ref-type="bibr" rid="ref21 ref24 ref3 ref63 ref78">3</xref>
          ].
        </p>
        <p>
          Ontologies may perform all such CBR tasks [
          <xref ref-type="bibr" rid="ref58">37</xref>
          ].
3.6 Combinations of CBR with Multiple Intelligent
Methods
The previous sections focused on combinations of CBR with
one other individual intelligent method. However, intelligent
systems have been developed that combine CBR with multiple
other intelligent methods. Such multi-integrated paradigms
usually follow a coupling model.
        </p>
        <p>
          Obviously, a CBR system may employ multiple intelligent
methods (e.g. rules and various soft computing methods) to
perform its internal tasks [
          <xref ref-type="bibr" rid="ref57">36</xref>
          ]. Typical examples of approaches
employing multiple soft computing methods within the CBR
cycle are presented in [
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ] and [
          <xref ref-type="bibr" rid="ref55">34</xref>
          ]. In [
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ] all of the four
phases of the CBR cycle employ soft computing methods.
        </p>
        <p>
          Employed soft computing methods are a self-organizing neural
network for retrieval, a radial basis neural network for reuse,
fuzzy systems for revise and all soft computing methods for
retain. In [
          <xref ref-type="bibr" rid="ref55">34</xref>
          ] fuzzy logic, supervised and unsupervised neural
networks and a genetic algorithm are employed for case
representation, indexing, retrieval and adaptation.
        </p>
        <p>
          More interesting approaches concern multi-integrated
systems not following the embedded approach. Typical such
multi-integrated approaches involve combinations of CBR,
RBR and MBR (e.g. [
          <xref ref-type="bibr" rid="ref49">28</xref>
          ]). Such approaches seem to be quite
effective, because combinations of CBR with RBR and MBR
individually have been thoroughly investigated. Quite often
such systems have been implemented to deal with deficiencies
of earlier systems combining CBR with only one of the other
two intelligent methods (e.g. RBR or MBR alone).
Multiintegrated CBR approaches, besides those involving
RBR/MBR, could be developed. For instance, ontologies could
constitute an interesting candidate method that could be
combined with CBR and another intelligent method in order to
facilitate knowledge sharing and reuse among the integrated
system components themselves [
          <xref ref-type="bibr" rid="ref26 ref5 ref65 ref80">5</xref>
          ] and among integrated
systems. Such a combination could be useful in Web-based
systems that need to share knowledge. Fruitful such approaches
could involve combinations of CBR, ontologies and
RBR/MBR. For instance in [
          <xref ref-type="bibr" rid="ref27 ref6 ref66 ref81">6</xref>
          ] an approach combining CBR,
RBR and an ontology is presented.
        </p>
        <p>
          Multi-integrated paradigms could also be considered systems
combining CBR with certain types of neuro-symbolic or
neurofuzzy approaches in which the neuro-symbolic (neuro-fuzzy)
module fully integrates the neural and symbolic (fuzzy)
approach. Such modules could be used within CBR instead of
plain neural or fuzzy components. Non-embedded coupling
approaches can be applied as well. For instance, in [
          <xref ref-type="bibr" rid="ref15 ref36 ref75">15</xref>
          ] a
neuro-symbolic method is combined with CBR according to the
reconciliation coupling approach.
In this paper, we discuss key aspects involving combinations of
CBR with other intelligent methods. Such combinations are
becoming increasingly popular due to the fact that in many
application domains a vast amount of case data is available.
        </p>
        <p>Such combined approaches have managed to solve problems in
application domains where a case-based module needs the
assistance and/or completion of other intelligent modules in
order to produce effective results. This trend is very likely to
carry on in the following years.</p>
        <p>Future directions in combinations of CBR with other
intelligent methods could involve a number of aspects. Main
such aspects involve: (a) combinations of CBR with soft
computing methods, (b) combinations of CBR with fuzzy rules,
(c) combinations of CBR with ontologies and (d) combinations
of CBR with neuro-symbolic and neuro-fuzzy approaches.</p>
        <p>Combinations of CBR with soft computing methods not
following an embedded coupling approach could be an
interesting future research direction. At present there seems to
be a lack of great interest in pursuing this direction since the
main interest has been focused on employing soft computing
methods within CBR. A non-embedded direction in the
combinations of CBR with soft computing could be pursued as
thoroughly as in the case of combinations of CBR with
RBR/MBR. A further step towards this direction could involve
non-embedded approaches combining CBR with multiple soft
computing methods or combinations of CBR, soft computing
and other intelligent methods (e.g. RBR, MBR or ontologies).</p>
        <p>Combinations of CBR with fuzzy rule-based systems could
be based on work combining CBR with RBR that is,
investigation of various coupling approaches.</p>
        <p>The increasing interest in Web-based intelligent systems and
future advances in the Semantic Web is likely to provide an
impetus to approaches combining CBR with ontologies. This
trend is likely to involve multi-integrated approaches
combining CBR, ontologies and other intelligent methods.</p>
        <p>Finally, a direction that may be useful to pursue involves
non-embedded coupling approaches combining CBR with
neuro-symbolic and neuro-fuzzy modules. Few such
approaches have been developed.</p>
        <p>REFERENCES</p>
        <p>
          Nikolaos Spanoudakis1 and Konstantina Pendaraki2 and Grigorios Beligiannis2
Abstract. In this paper we present an application for the
construction of mutual fund portfolios. It is based on a
combination of Intelligent Methods, namely an argumentation
based decision making framework and a forecasting algorithm
combining Genetic Algorithms (GA), MultiModel Partitioning
(MMP) theory and Extended Kalman Filters (EKF). The
argumentation framework is employed in order to develop mutual
funds performance models and to select a small set of mutual
funds, which will compose the final portfolio. The forecasting
algorithm is employed in order to forecast the market status
(inflating or deflating) for the next investment period. The
knowledge engineering approach and application development
steps are also discussed.12
1 INTRODUCTION
Portfolio management [
          <xref ref-type="bibr" rid="ref29 ref68 ref8 ref83">8</xref>
          ] is concerned with constructing a
portfolio of securities (e.g., stock, bonds, mutual funds [
          <xref ref-type="bibr" rid="ref13 ref34 ref73 ref87">13</xref>
          ], etc.)
that maximizes the investor’s utility. In a previous study [
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ], we
constructed mutual fund (MF) portfolios using an argumentation
based decision making framework. We developed rules that
characterize the market and different investor types policies using
evaluation criteria of fund performance and risk. We also defined
strategies for resolving conflicts over these rules. Furthermore, the
developed application can be used for a set of different investment
policy scenarios and supports the investor/portfolio manager in
composing efficient MF portfolios that meet his investment
preferences. The traditional portfolio theories ([
          <xref ref-type="bibr" rid="ref29 ref68 ref8 ref83">8</xref>
          ], [
          <xref ref-type="bibr" rid="ref11 ref32 ref71">11</xref>
          ], [
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ])
were based on unidimensional approaches that did not fit to the
multidimensional nature of risk ([
          <xref ref-type="bibr" rid="ref21 ref24 ref3 ref63 ref78">3</xref>
          ]), and they did not capture the
complexity presented in the data set. In [
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ], this troublesome
situation was resolved by the high level of adaptability in the
decisions of the portfolio manager or investor when his
environment is changing and the characteristics of the funds are
multidimensional that was demonstrated by the use of
argumentation.
        </p>
        <p>
          Our study showed that when taking into account the market
context, the results were better if we could forecast the status of
the market of the following investment period. In order to achieve
this goal we employed a hybrid system that combines Genetic
Algorithms (GA), MultiModel Partitioning (MMP) theory and the
Extended Kalman Filter (EKF). A general description of this
algorithm and its application in linear and non-linear data is
discussed in [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ], while the specific version used in this
contribution is presented in [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ], where its successful application to
non-linear data is also presented. This algorithm captured our
attention because it had been successfully used in the past for
1 Technical University of Crete, Greece, email: nikos@science.tuc.gr
2 University of Ioannina, Greece, email: {dpendara, gbeligia}@cc.uoi.gr
accurately predicting the evolution of stock values in the Greek
market (its application on economic data is presented in [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ]).
        </p>
        <p>
          Moreover, there is a lot of work on hybrid evolutionary algorithms
and their application on many difficult problems has shown very
promising results [
          <xref ref-type="bibr" rid="ref25 ref4 ref64 ref79">4</xref>
          ]. The problem of predicting the behavior of
the financial market is an open problem and many solutions have
been proposed. However, there isn't any known algorithm able to
identify effectively all kinds of behaviors. Also, many traditional
methods have been applied to the same problem and the results
obtained were not very satisfactory. There are two main
difficulties in this problem, firstly the search space is huge and,
secondly, it comprises of many local optima.
        </p>
        <p>In this contribution, we present the whole application resulting
from the combination of argumentation with hybrid evolutionary
systems along with the respective results.</p>
        <p>The rest of the paper is organized as follows: Section two
presents an overview of the concepts and application domain
knowledge. Section three outlines the main features of the
proposed argumentation based decision-making framework and
the developed argumentation theory. The forecasting hybrid
evolutionary system is presented in section four, followed by
section five, which presents the developed application and
discusses the obtained empirical results. Finally, section six
summarizes the main findings of this research.
2 DOMAIN KNOWLEDGE</p>
        <p>This section describes the criteria (or variables) used for
creating portfolios and the knowledge on how to use these criteria
in order to construct a portfolio.</p>
        <p>The data used in this study is provided from the Association of
Greek Institutional Investors and consists of daily data of domestic
equity mutual funds (MFs) over the period January 2000 to
December 2005.</p>
        <p>
          The proposed framework is based on five fundamental
variables. The return of the funds is the actual value of return of
an investment defined by the difference between the nominal
return and the rate of inflation. This variable is based on the net
price of a fund. At this point, it is very important to mention that
transaction costs such as management commission are included in
the net price. Frond-end commission and redemption commission
fluctuate depending on the MF class and in most cases are very
low. The standard deviation is used to measure the variability of
the fund’s daily returns, thus representing the total risk of the
fund. The beta coefficient (β) is a measure of fund’s risk in
relation to the capital risk. The Sharpe index [
          <xref ref-type="bibr" rid="ref13 ref34 ref73 ref87">13</xref>
          ] is a useful
measure of performance and is used to measure the expected
return of a fund per unit of risk, defined by the standard deviation.
        </p>
        <p>
          The Treynor index [
          <xref ref-type="bibr" rid="ref15 ref36 ref75">15</xref>
          ] is similar to the Sharpe index except that
performance is measured as the risk premium per unit of
systematic (beta coefficient) and not of total risk.
        </p>
        <p>On the basis of the argumentation framework for the selection
of a small set of MF, which will compose the final
multiportfolios, the examined funds are clustered in three groups for
each criterion for each year. For example, we have funds with
high, medium and low performance (return), the same for the
other criteria.</p>
        <p>The aforementioned performance and risk variables visualize
the characteristics of the capital market (bull or bear) and the type
of the investor according to his investment policy (aggressive or
moderate). Further information is represented through variables
that describe the general conditions of the market and the investor
policy (selection of portfolios with high performance per unit of
risk).</p>
        <p>The general conditions of the market are characterized through
the development of funds which have high performance levels
(high return). Regarding the market context, in a bull market,
funds are selected if they have high systematic or total risk. On the
other hand, in a bear market, we select funds with low systematic
and total risk. An aggressive investor is placing his capital upon
funds with high performance and high systematic risk.</p>
        <p>Accordingly, a moderate investor selects funds with high
performance and low or medium systematic risk. Some types of
investors select portfolios with high performance per unit of risk.</p>
        <p>Such portfolios are characterized by high Sharpe ratio and high
Treynor ratio.
In this section we firstly present the argumentation framework that
we used and then we describe the domain knowledge modeling
based on the argumentation framework.
3.1
Autonomous agents, be they artificial or human, need to make
decisions under complex preference policies that take into account
different factors. In general, these policies have a dynamic nature
and are influenced by the particular state of the environment in
which the agent finds himself. The agent's decision process needs
to be able to synthesize together different aspects of his preference
policy and to adapt to new input from the current environment.</p>
        <p>Such agents are the mutual fund managers.</p>
        <p>
          In order to address requirements like the above, Kakas and
Moraitis ([
          <xref ref-type="bibr" rid="ref27 ref6 ref66 ref81">6</xref>
          ]) proposed an argumentation based framework to
support an agent's self deliberation process for drawing
conclusions under a given policy.
        </p>
        <p>
          Argumentation can be abstractly defined as the principled
interaction of different, potentially conflicting arguments, for the
sake of arriving at a consistent conclusion (see e.g. [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ]). The
nature of the “conclusion” can be anything, ranging from a
proposition to believe, to a goal to try to achieve, to a value to try
to promote. Perhaps the most crucial aspect of argumentation is
the interaction between arguments. This means that argumentation
can give us means for allowing an agent to reconcile conflicting
information within itself, for reconciling its informational state
with new perceptions from the environment, and for reconciling
conflicting information between multiple agents through
communication. A single agent may use argumentation techniques
to perform its individual reasoning because it needs to make
decisions under complex preferences policies, in a highly dynamic
environment (see e.g. [
          <xref ref-type="bibr" rid="ref27 ref6 ref66 ref81">6</xref>
          ]). This is the case used in this research.
        </p>
        <p>In the following paragraphs we describe the theoretical framework
that we adopted:</p>
        <p>Definition 1. A theory is a pair (T, P) whose sentences are
formulae in the background monotonic logic (L, ⊢ ) of the form
L←L1,…,Ln, where L, L1, …, Ln are positive or negative ground
literals. For rules in P the head L refers to an (irreflexive) higher
priority relation, i.e. L has the general form L = h_p(rule1, rule2).</p>
        <p>The derivability relation, ⊢ , of the background logic is given by
the simple inference rule of modus ponens.</p>
        <p>An argument for a literal L in a theory (T, P) is any subset, T,
of this theory that derives L, T ⊢ L, under the background logic. A
part of the theory T0 ⊂ T, is the background theory that is
considered as a non defeasible part (the indisputable facts).</p>
        <p>
          An argument attacks (or is a counter argument to) another
when they derive a contrary conclusion. These are conflicting
arguments. A conflicting argument (from T) is admissible if it
counter-attacks all the arguments that attack it. It counter-attacks
an argument if it takes along priority arguments (from P) and
makes itself at least as strong as the counter-argument (we omit
the relevant definitions from [
          <xref ref-type="bibr" rid="ref27 ref6 ref66 ref81">6</xref>
          ] due to limited space).
        </p>
        <p>Definition 2. An agent’s argumentative policy theory is a
theory T = ((T, T0), PR, PC) where T contains the argument rules in
the form of definite Horn logic rules, PR contains priority rules
which are also definite Horn rules with head h_p(r1, r2) s.t. r1, r2
∈ T and all rules in PC are also priority rules with head h_p(R1,
R2) s.t. R1, R2 ∈ PR ∪ PC. T0 contains auxiliary rules of the
agent’s background knowledge.</p>
        <p>Thus, in defining the decision maker’s theory we specify three
levels. The first level (T) defines the (background theory) rules
that refer directly to the subject domain, called the Object-level
Decision Rules. In the second level we have the rules that define
priorities over the first level rules for each role that the agent can
assume or context that he can be in (including a default context).</p>
        <p>Finally, the third level rules define priorities over the rules of the
previous level (which context is more important) but also over the
rules of this level in order to define specific contexts, where
priorities change again.
3.2
Theory</p>
        <p>The</p>
        <p>Decision</p>
        <p>Maker’s</p>
        <p>Argumentation
Using the presented argumentation framework, we transformed
the criteria for all MFs and experts knowledge (§2) to background
theory (facts) and rules of the first and second level. Then, we
defined the strategies (or specific contexts) in the third level rules.</p>
        <p>The goal of the knowledge base is to select some MFs in order
to construct our portfolio. Therefore our rules have as their head
the predicate selectFund/1 and its negation. We write rules
supporting it or its negation and use argumentation for resolving
conflicts. We introduce the hasInvestPolicy/2, preference/1 and
market/1 predicates for defining the different contexts and roles.</p>
        <p>For example, John, an aggressive investor is expressed with the
predicate hasInvestPolicy(john, aggressive).</p>
        <p>The knowledge base facts are the performance and risk
variables values for each MF, the thresholds for each group of
values for each year and the above mentioned predicates
characterizing the investor and the market. The following rules are
an example of the object-level rules (level 1 rules of the
framework - T):
r1(Fund): selectFund(Fund) ← highR(Fund)
r2(Fund): ¬selectFund(Fund) ← highB(Fund)</p>
        <p>The highR predicate denotes the classification of the MF as a
high return fund and the highB predicate denotes the classification
of the MF as a high risk fund. Thus, the r1 rule states that a high
performance fund should be selected, while the r2 rule states that a
high risk fund should not be selected. Such rules are created for
the three groups of our performance and risk criteria.</p>
        <p>Then, in the second level we assign priorities over the object
level rules. The PR are the default context rules or level 2 rules.</p>
        <p>These rules are added by experts and express their preferences in
the form of priorities between the object level rules that should
take place within defined contexts and roles. For example, the
level 1 rules with signatures r1 and r2 are conflicting. In the
default context the first one has priority, while the bear market
context reverses this priority:
R1: h_p(r1(Fund),r2(Fund)) ← true
R2: h_p(r2(Fund),r1(Fund)) ← market(bear)</p>
        <p>Rule R1 defines the priorities set for the default context, i.e. an
investor selects a fund that has high return on investment (RoI)
even if it has high risk. Rule R2 defines the default context for the
bear market context (within which, the fund selection process is
cautious and does not select a high RoI fund if it has high risk).</p>
        <p>Finally, in PC (level 3 rules) the decision maker defines his
strategy and policy for integrating the different roles and contexts
rules. When combining the Aggressive investor role and bear
market context, for example, the final portfolio is their union
except that the aggressive investor now would accept to select
high and medium risk MFs (instead of only high). The decision
maker’s strategy sets preference rules between the rules of the
previous level but also between rules at this level. Relating to the
level 2 priorities, the bear market context’s priority of not buying
a high risk MF, even if it has a high return, is set at higher priority
than that of the general context. Then, the specific context of an
aggressive investor in a bear market defines that the bear market
context preference is inverted. See the relevant priority rules:
C1: h_p(R2, R1) ← true
C2: h_p(R1, R2) ← hasInvestPolicy(Investor, aggressive).</p>
        <p>C3: h_p(C2, C1) ← true</p>
        <p>Thus, an aggressive investor in a bear market context would
continue selecting high risk funds. In the latter case, the argument
r1 takes along the priority arguments R1, C2 and C3 and becomes
stronger (is the only admissible one) than the conflicting r2
argument that can only take along the R2 and C1 priority
arguments. Thus, the selectFund(Fund) predicate is true and the
fund is inserted in the portfolio.</p>
        <p>
          The problem with the above rules is that the facts market(bear)
or (exclusive) market(bull) could not be safely determined for the
next investment period. In the application version presented in
[
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ] it was just assumed to remain the same as at the time of the
investment. This strategy, however produced quite poor results for
this context if it should change in the next period.
4 FORECASTING THE STATUS OF THE
FINANCIAL MARKET
One of the most prominent issues in the field of signal processing
is the adaptive filtering problem, with unknown time-invariant or
time-varying parameters. Selecting the correct order and
estimating the parameters of a system model is a fundamental
issue in linear and nonlinear prediction and system identification.
        </p>
        <p>
          The problem of fitting an AutoRegressive Moving Aaverage
model with eXogenous input (ARMAX) or a Nonlinear
AutoRegressive Moving Aaverage model with eXogenous input
(NARMAX) to a given time series has attracted much attention
because it arises in a large variety of applications, such as time
series prediction in economic and biomedical data, adaptive
control, speech analysis and synthesis, neural networks, radar and
sonar, fuzzy systems, and wavelets [
          <xref ref-type="bibr" rid="ref26 ref5 ref65 ref80">5</xref>
          ].
        </p>
        <p>
          The forecasting algorithm used in this contribution is a generic
applied evolutionary hybrid technique, which combines the
effectiveness of adaptive multimodel partitioning filters and GAs’
robustness [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ]. This method has been first presented in [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ].
        </p>
        <p>
          Specifically, the a posteriori probability that a specific model, of a
bank of the conditional models, is the true model, can be used as
fitness function for the GA. In this way, the algorithm identifies
the true model even in the case where it is not included in the
filters’ bank. It is clear that the filter’s performance is
considerably improved through the evolution of the population of
the filters’ bank, since the algorithm can search the whole
parameter space. The proposed hybrid evolutionary algorithm can
be applied to linear and nonlinear data; is not restricted to the
Gaussian case; does not require any knowledge of the model
switching law; is practically implementable, computationally
efficient and applicable to online/adaptive operation; and exhibits
very satisfactory performance as indicated by simulation
experiments [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ]. The structure of the hybrid evolutionary system
used is depicted in Figure 1.
        </p>
        <p>
          The representation used for the genomes of the population of
the GA is the following. We use a mapping that transforms a fixed
dimensional internal representation to variable dimensional
problem instances. Each genome consists of a vector x of real
values xi∈ ℜ , i = 1, ..., k, and a bit string b of binary digits
bi∈{0,1}, i = 1, ..., k. Real values are summed up as long as the
corresponding bits are equal. Obviously, k is an upper bound for
the dimension of the resulting parameter vector. We use the first
k/3 real values for the autoreggressive part, the second k/3 real
values for the moving average part, and the last k/3 real values for
the exogenous input part. An example of this mapping is
presented in Figure 2. For a more detailed description of this
mapping refer to [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ].
        </p>
        <p>At first, an initial population of m genomes is created at
random (each genome consists of a vector of real values and a bit
string). As stated before, each vector of real values represents a
possible value of the NARMAX model order and its parameters.</p>
        <p>For each such population we apply an MMAF with EKFs and
have as result the model-conditional probability density function
(pdf) of each candidate model. This pdf is the fitness of each
candidate model, namely the fitness of each genome of the
population (Figure 3).</p>
        <p>
          (one) which is the maximum value it is able to have as a
probability For a more detailed description of this hybrid
evolutionary system refer to [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ].
        </p>
        <p>
          The reproduction operator we decided to use is the classic
biased roulette wheel selection according to the fitness function
value of each possible model order [
          <xref ref-type="bibr" rid="ref30 ref69 ref84 ref9">9</xref>
          ]. As far as crossover is
concerned, we use the one-point crossover operator for the binary
strings and the uniform crossover operator for the real values [
          <xref ref-type="bibr" rid="ref30 ref69 ref84 ref9">9</xref>
          ].
        </p>
        <p>
          Finally, we use the flip mutation operator for the binary strings
and the Gaussian mutation operator for the real values [
          <xref ref-type="bibr" rid="ref30 ref69 ref84 ref9">9</xref>
          ]. Every
new generation of possible solutions iterates the same process as
the old ones and all this process may be repeated as many
generations as we desire or till the fitness function has value 1
        </p>
        <p>
          In this contribution we apply a slightly different approach
compared to the one presented in [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ]. In [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ], at the algorithm’s
step where the value of the estimation (output) x of each filter is
calculated, the past values of x that are used in order to estimate
the next value of x are always taken from the estimation file (the
file of all past values of x that have been estimated by the
algorithm till this point). All these values are used in each
generation in order to estimate the next value of the estimation
(output) vector x. The method presented in this contribution uses a
different approach in order to estimate x. At the algorithm’s step
where the value of x for each filter is calculated, the past values of
x that are used in order to estimate the next value of x are smaller
than the total length of the time series that has been estimated till
this point. The length of past values used in each generation in
order to estimate the next value of x equals to n/2, where n is the
total length of the time series to be estimated. Every new value of
x, estimated by the algorithm, is added to this time series of length
n/2 and the oldest one is removed in order this time series to
sustain a length of n/2. The value of n/2 was not selected
arbitrarily. We have conducted exhaustive experiments using
many different values. The value of n/2, that has been finally
selected, was the most effective one, that is, the one that resulted
in the best prediction results.
        </p>
        <p>Thus, the hybrid evolutionary system presented in Figure 1 is
used in order to forecast the behavior of the financial market in
relation to its current status. The market is characterized as bull
market if it is forecasted to rise in the next semester, or as bear
market if it is forecasted to fall. We used the return values of the
Greek market index for each semester starting from year 1985 to
the years of our sample data (2000 to 2005). The algorithm
performed very well considering that it could forecast the next
semester market behavior with a success rate of 85.17% (12 out of
14 right predictions).
5 THE PORTFOLIO CONSTRUCTION
APPLICATION
In this section we firstly present the system architecture, i.e. the
combination method for the argumentation decision making
subsystem and the hybrid forecasting sub-system that resulted in a
coherent application. Then we present the results of this
combination.</p>
        <p>to different investment choices and leads to the selection of
different number and combinations of MFs.</p>
        <p>System Architecture
The portfolio generation application is a Java program creating a
human-machine interface and managing its modules, namely the
decision making module, which is a prolog rule base (executed in
SWI-prolog1) using the Gorgias2 framework, and the forecasting
module, which is a Matlab3 implementation of the forecasting
hybrid system (see Figure 4).</p>
        <p>The application connects to the SWI-Prolog module using the
provided Java interface (JPL) that allows for inserting facts to an
existing rule-base and running it for reaching goals. The goals can
be captured and returned to the Java program. The application
connects to Matlab by executing it in a system shell. The matlab
program writes the results of the algorithm to a MySQL4 database
using SQL (Structured Query Language). The application first
executes the forecasting module, then updates the database, using
JDBC (Java DataBase Connectivity interface) technology, with
the investor profile (selected roles) and, finally, queries the
decision making module setting as goal the funds to select for
participation in the final portfolio. Thus, after the execution of the
forecasting module the predicate market/1 is determined as bull or
bear and inserted as a fact in the rule base before the decision
making process is launched. The reader can see in Figure 5 a
screenshot of the integrated system.
For evaluating our results we defined scenarios for all years for
which we had available data (2000-2005) and for all combinations
of contexts. That resulted to the two investor types combined with
the market status, plus the two investor types combined with the
high performance option, plus the market status combined with
the high performance option, all together five different scenarios
run for six years each. Each one of the examined scenarios refers
1 SWI-Prolog offers a comprehensive Free Software Prolog environment,</p>
        <p>http://www.swi-prolog.org
2 Gorgias is an open source general argumentation framework that
combines the ideas of preference reasoning and abduction,
http://www.cs.ucy.ac.cy/~nkd/gorgias/
3 MATLAB® is a high-level language and interactive environment for
performing computationally intensive tasks, http://www.mathworks.</p>
        <p>com/products/matlab
4 MySQL is an open source database, http://www.mysql.com</p>
        <p>Figure 5: A screenshot for portfolio generation for a scenario</p>
        <p>of a moderate investor in a bull market context</p>
        <p>
          In Table 1 the reader can inspect the average return on
investment (RoI) for the six years for all different contexts. The
reader should notice that the table contains two RoI columns, the
first (“Previous RoI”) depicts the results before changing the
system as they appeared in [
          <xref ref-type="bibr" rid="ref14 ref35 ref74">14</xref>
          ]. The second presents the results of
upgrading the application by combining it with the hybrid
evolutionary forecasting sub-system and by fixing the selected
funds participation to the final portfolio. The latter modification is
out of the scope of this paper but the reader can clearly see that it
has greatly influenced the performance of all scenarios.
        </p>
        <p>Table 1, however, shows the added value of this contribution as
the market context has become the most profitable in the “New
RoI” column (8.17% RoI), while in the “Previous RoI” column it
was one of the worst cases (3.72% RoI). Consequently the specific
contexts containing the market context have better results.
7.16
7.92
6.08
7.46
7.16
7.23</p>
        <p>Moreover, Table 1 also shows the added value of our approach
as the reader can compare our results with the return on
investment (RASE) of the General Index of the Athens Stock
Exchange (ASE-GI). According to the results of this table, the
average return of the constructed portfolios for all contexts, except
two, achieves higher return than the market index. The two cases
where the constructed portfolios did not beat the market index are
the moderate simple context and moderate-market specific
context. This is, maybe, due to the fact that in these two contexts
we have an investor who wishes to earn more without taking into
account any amount of risk in relation to the variability which
characterizes the conditions of the market during the examined
period. This fact makes it very difficult to implement investment
strategies that can help a fund manager outperform a passive
investment policy.</p>
        <p>Furthermore, we notice that in some specific contexts the
results are more satisfying than the results obtained by simple
contexts, while in others there is little or no difference. This
means that by using effective strategies in the third preference
rules layer the decision maker can optimize the combined
contexts. Specifically, the aggressive-high performance specific
context provides better results than both the simple contexts
aggressive and high performance (the ones that it combines) and
the general context. The moderate-high performance specific
context’s returns on investment are equal to the higher simple
context’s returns (high performance) while the aggressive-market
specific context returns are closer to the higher simple context’s
returns (market).</p>
        <p>Finally, in Figure 6, we present the RoI of all contexts
separately for each year. This view is also useful, as it shows that
for two years, 2003 and 2004, RASE was greater than all our
contexts RoI performance. This shows that our application, for the
time being, performs better for medium term to long term
investments, i.e. those that range over five years.
The objective of this paper was to present an artificial intelligence
based application for the MF portfolio generation problem that
combines two different intelligent methods, argumentation based
decision making and a hybrid system that combines Genetic
Algorithms (GA), MultiModel Partitioning (MMP) theory and the
Extended Kalman Filter (EKF).</p>
        <p>We described in detail how we developed our argumentation
theory and how we combined it with the hybrid system to
determine an important fact for the decision making process, i.e.
the status of the financial market in the next investment period.</p>
        <p>The developed application allows a decision maker (fund
manager) to construct multi-portfolios of MFs under different,
possibly conflicting contexts. Moreover, for medium to long term
investments, the returns on investment of the constructed
portfolios are better than those of the General Index of the Athens
Stock Exchange, while the best results are those that involve the
forecasting of the financial market.</p>
        <p>Our future work will be to develop a new rule base for the
problem of determining when to construct a new portfolio for a
specific investor. We will also make the application web-based so
that it can get on-line financial data available from the internet for
computing the decision variables and for allowing the investors to
insert their profiles by filling on-line forms. Finally, we will
continue evaluating our application as new data become available
for years after 2005. Our aim is to be able to guarantee a better
RoI than that of the ASE.</p>
        <p>
          Elena I Teodorescu and Miltos Petridis1
Abstract. This paper presents an investigation into applying
Case-Based Reasoning to Multiple Heterogeneous Case
Bases using agents. The adaptive CBR process and the
architecture of the system are presented. A case study is
presented to illustrate and evaluate the approach. The process of
creating and maintaining the dynamic data structures is
discussed. The similarity metrics employed by the system
are used to support the process of optimisation of the
collaboration between the agents which is based on the use of a
blackboard architecture. The blackboard architecture is
shown to support the efficient collaboration between the
agents to achieve an efficient overall CBR solution, while
using case-based reasoning methods to allow the overall
system to adapt and “learn” new collaborative strategies for
achieving the aims of the overall CBR problem solving
process.
1 Introduction1
Case-based reasoning (CBR) is now an established artificial
intelligence paradigm. Given a case-base of prior experiences, a CBR
system solves new problems by retrieving cases from the
casebase, and adapting their solutions to comply the new
requirements[
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ].
        </p>
        <p>
          Multiple Case Based Reasoning (MCBR) is used to retrieve
solutions for a new problem from more than one case-base. Methods
for managing sharing of standardized case bases have been studied
in research on distributed CBR (e.g. [
          <xref ref-type="bibr" rid="ref13 ref34 ref73 ref87">13</xref>
          ]), as have methods for
facilitating large-scale case distribution [
          <xref ref-type="bibr" rid="ref10 ref31 ref70 ref85">10</xref>
          ]. Leake and
Sooriamuthhi propose a new strategy for MCBR - an agent selectively
supplements its own case-base as needed, by dispatching problems
to external case-bases and using cross-case-base adaptation to
adjust their solutions for inter-case-base differences [
          <xref ref-type="bibr" rid="ref13 ref25 ref26 ref27 ref34 ref4 ref5 ref6 ref64 ref65 ref66 ref73 ref79 ref80 ref81 ref87">4, 5, 6,13</xref>
          ].
        </p>
        <p>In many problems in modern organisations, the knowledge
encapsulated by cases is contained in multiple case bases reflecting
the fragmented way with which organisations capture and organise
knowledge. The traditional approach is to merge all case bases into
a central case base that can be used for the CBR process. However,
this approach brings with it three challenges:
• Moving cases into a central case base potentially
separates from its context and makes maintenance more
difficult.
• Various case bases can use different semantics. There is
therefore a need to maintain various ontologies and
mappings across the case bases.
• The knowledge content “value” of individual cases can
be related to its origination. This can be lost when
merging into a central case base.</p>
        <p>Keeping the cases distributed in the form of a Heterogeneous
Multiple Case Based Reasoning system (HMCBR) may have a
number of advantages such as increased maintainability and
com</p>
        <p>
          1 Department of Computing Science, University of Greenwich, Park
Row, London SE10 9LS email:{ E.I.Teodorescu , M.Petridis}@gre.ac.uk
petence and the contextualisation of the cases. Past research at
Greenwich [
          <xref ref-type="bibr" rid="ref2 ref23 ref62 ref77">2</xref>
          ][
          <xref ref-type="bibr" rid="ref21 ref24 ref3 ref63 ref78">3</xref>
          ] has shown the need to combine knowledge
encoded in cases from various heterogeneous sources to achieve a
competent, seamless CBR system.
        </p>
        <p>
          Ontanon and Plaza [
          <xref ref-type="bibr" rid="ref28 ref67 ref7 ref82">7</xref>
          ] looked at a way to “improve the overall
performance of the multiple case systems and of the individual
CBR agents without compromising the agent’s autonomy”. They
present [
          <xref ref-type="bibr" rid="ref29 ref68 ref8 ref83">8</xref>
          ] a framework for collaboration among agents that use
CBR and strategies for case bartering (case trading by CBR
agents). Nevertheless, they do not focus at the possibility of cases
having different structures and what impact this will have on
applying CBR to heterogeneous case bases. Leake [
          <xref ref-type="bibr" rid="ref26 ref5 ref65 ref80">5</xref>
          ] states that “An
important issue beyond the scope of this paper is how to establish
correspondences between case representations, if the
representations used by different case-bases differ.”
        </p>
        <p>Given several case bases as the search domain, it is very likely
that they have different structures. Ideally, accessing Multiple Case
Bases should not require a change to their data structures. In order
for an MCBR system to effectively use case-bases that may have
been developed in different ways, for different tasks or task
environments, methods are needed to adjust retrieved cases for local
needs.</p>
        <p>
          Leake and Sooriamurthi [
          <xref ref-type="bibr" rid="ref25 ref4 ref64 ref79">4</xref>
          ] proposed a theoretical
“cross-casebase adaptation” which would adapt suggested solutions from one
case base to apply to the needs of another. They are currently
exploring sampling methods for comparing case-base
characteristics in order to select appropriate cross-case-base adaptation
strategies.
        </p>
        <p>In order to enable effective solution retrieval across autonomous
case bases with differing structures, it is essential to have access
and a good understanding of each of the different case base
structures involved. This would make it possible to identify the
commonalities, equivalences and specific characteristics of every case
base associated with the system.
2.1 The process of adaptive CBR
Instead of trying to adapt the suggested solutions from one case
base to the needs of another, the approach investigated in this study
will be to create a “dynamic structure” of a general case. This
dynamic structure would be modified every time a new case base
with a new structure is added.</p>
        <p>The process of adaptive CBR, within the architecture of the
HMCBR System (Figure 1), will incorporate a number of steps.</p>
        <p>Firstly, in order for the system to work with a particular case
base, it will need to know the structure of that case base. Every
newly added case base will therefore have to publish its structure to
a Registry System. The published structures are required to have
their own data dictionaries attached to enable the creation of a
dynamic Data Dictionary.</p>
        <p>Fig. 1. The Architecture of the HMCBR System</p>
        <p>The published structure will be retrieved by the Dynamic CB
System and used to adapt the local dynamic structure to
accommodate any new elements and map existing ones.</p>
        <p>When the dynamic structure reflects all participating case bases,
a case query can be submitted. The system would then reformulate
the target case structure into each provider’s case base structure.</p>
        <p>The target case structure will be a subset of the dynamic structure.</p>
        <p>
          The reformulated cases are submitted to each provider and
solution cases are retrieved using KNN techniques [
          <xref ref-type="bibr" rid="ref1 ref22 ref61 ref76">1</xref>
          ]. The structures
of these solutions will be translated into the dynamic structure, thus
creating a dynamic case base. Finally, the system will apply the
classical CBR process to the dynamic case base.
        </p>
        <p>The whole process is intended to provide a transparent view of
the CBR process across the heterogeneous system.
2.2</p>
        <p>Case Study
This case study requires searching for a property from three estate
agencies without amalgamating their case bases structures.</p>
        <p>Let us suppose that the estate agencies have different case base
structures (figure 2).</p>
        <p>A possible buyer should be able to search for a property and get
all the suitable solutions from all three agencies. A search should
retrieve the best matches from all case bases as if it was dealing
with a single case base in a way transparent to the buyer.</p>
        <p>Case Bases Structures 1(CBS1)
Case Bases Structures 2(CBS2)</p>
        <p>Case Bases Structures 3(CBS3)
Fig. 2. Three different Case Base Structures
Creating and maintaining a dynamic structure makes the
selfadaptive multi case base reasoning system possible. By adding a
new case base to the existing ones, new attributes are added to a
global dynamic structure and new relations linked to these
attributes are established.</p>
        <p>CBS1. Apartment Studio
type
DCBS
name</p>
        <p>House 0 0 1</p>
        <p>Flat 1 0.8 0
Fig. 3. Data Dictionary includes relations between some of the
attributes.</p>
        <p>A data dictionary is required to keep all the metadata for the
dynamic structure. This data dictionary would have multiple
functions: It records the location and the name of every attribute from
the Case Base Structures (CBS) and how these are translated into
the Dynamic Case Base Structure (DCBS). It also stores the type
and any default value for every single attribute.</p>
        <p>The Data Dictionary will reflect any relationships between the
Dynamic Case Base Structure attributes. These relationships can be
mathematical relationships or look-up tables (figure 3).</p>
        <p>We will use the presented case study to show how a dynamic
structure is created and how it is continuously changed by adding
new case bases to the search domain.</p>
        <p>Let us suppose that our general structure (the initial state of the
Dynamic Structure containing few main attributes of a property) is
already built (see figure 4). The structure has attached a basic Data
Dictionary mainly containing the data types of the existing
attributes.</p>
        <p>We will show how this initial structure will be dynamically
changed by consecutively adding the three agents to the search
domain.</p>
        <p>Adding the Case Base Structure 1 to the system implies
mapping of the attributes ParkingSpace, Area and Type into the
Dynamic Structure (these attributes are already existing in the initial
structure) and also adding more attributes to it (i.e. NoOfRooms,</p>
        <p>NoOfBathrooms, GardenLength, GardenWidth)</p>
        <p>Data Dictionary
Size: Double
NoOfBedrooms: Integer
Location: String
ParkingSpace: double</p>
        <p>Name: house
house 1
flat 0
flat
0
1
Fig. 4. Initial state of the Dynamic Structure and Data Dictionary</p>
        <p>The Data Dictionary will reflect the mapping of attributes:</p>
        <p>CBS1.ParkingSpace = DCBS.ParkingSpace;
CBS1.Area = DCBS.Location</p>
        <p>CBS1.type= DCBS.name</p>
        <p>The following attributes will be added to the dynamic data
dictionary:</p>
        <p>NoOfRooms: integer;</p>
        <p>GardenLength: double; GardenWidth: double</p>
        <p>Any other relevant relationships such as look-up tables for
defining mappings between the values of attribute Type of CBS1 and
the values of the attribute Name of the dynamic structure will be
captured.</p>
        <p>Case Base Structure 2 will add another attribute, GardenSize, to
the Dynamic Structure and the data dictionary will record mapping
of attributes:</p>
        <p>CBS2.Name = DCBS.Name,
CBS2.Location = DCBS.Location ,</p>
        <p>CBS2.NoOfBedrooms = DCBS. NoOfBedrooms;</p>
        <p>The mathematical relationships are recorded:
DCBS.GardenSize = DCBS.GardenLength * DCBS.GardenWidth,</p>
        <p>Functions can be applied, for example to keep the same metric
system:</p>
        <p>DCBS.GardenSize= CBS2.GardenSizeInFeet/(3.281)2</p>
        <p>The Data Dictionary would also include a look-up table
showing the conversion of values of CBS2.Name to values of
DCBS.Name.</p>
        <p>Attention has to be paid to the meanings of the names of the
attributes. For example, if the attribute “Type” in CBS1 and the
attribute “Name” in CBS2 have the same meaning (they would be
translated as “Name” in DCBS, with values found in a look-up
table), the attribute “Name” from CBS3 has not the same meaning
as the one from CBS2. It is actually translated into DCBS.Location
(similar to CBS2.Location)</p>
        <p>Fig. 5. Adapted Dynamic Structure after CBS3 was added</p>
        <p>By adding the third estate agent case base to the search domain,
the dynamic structure will grow even more (see figure 5) and the
Data dictionary will reflect it by adding the attributes
DSBS.Garage and DSBS.View.</p>
        <p>The following attributes are mapped:</p>
        <p>CBS3.Name = DCBS.Location
CBS3.Description = DCBS.Name</p>
        <p>CBS3.GardenSizeInMeters = DCBS.GardenSize</p>
        <p>Another look-up table can be created and added to the Data
Dictionary to record the relationship between the Garage and
ParkingSpace. Figure 6 shows the state of the Dynamic data Dictionary
after CBS1, CBS2 and CBS3 are added.</p>
        <p>Dynamic Data Dictionary
CBS1.Area = DCBS.Location
NoOfRooms: integer
CBS1.type= DCBS.name
DCBS.GardenSize: double
DCBS.GardenSize = CBS2.GardenSizeInFeet
DCBS.GardenSize = DCBS.GardenLenght *</p>
        <p>DCBS.GardenWidth ...</p>
        <p>CBS3.Name = DCBS.Location
CBS3.GardenSizeInMetres = DCBS.GardenSize</p>
        <p>Garage ParkingSpace
Garage 1 0.7
ParkingSpace 0.7 1</p>
        <p>Fig. 6. Adapted Dynamic Data Dictionary after CBS1, CBS2
and CBS3 are added
4 Optimising the agent collaboration process
In order to optimise the process of collaboration between the
agents to achieve an efficient solution from the overall CBR
process when applied across the heterogeneous case bases, an overall
similarity metric is required. Additionally, an overall process to
enable collaboration between the agents is necessary based on a
flexible architecture to enable this collaboration.</p>
        <p>Defining an overall similarity metric
The overall similarity metric between a target and a source Case
can be defined as:
,
where:
σ: overall similarity
σCBy: similarity from case base provider CBy
CT: target case
CS: source case</p>
        <p>: weighting for a case base provider y for case CT</p>
        <p>To allow for defining locally optimised similarity metrics for
different providers, the following metric can be defined:</p>
        <p>, ,             2
,
,
where:
tribute x
: the weighting from case base provider CBy for
at, , : the local similarity metric for provider CBy
for attribute x.</p>
        <p>This extended similarity metric takes into account the level of
trust that the HMCBR system attributes to the competence of each
case base provider. The level of trust is determined by applying
CBR to the case-base of the history of queries. Additionally it
allows to adjust the trust to particular providers to different
“regions” in the case base allowing for case base providers to be
“specialised” on particular types of domain knowledge. Finally, the
extended metric allows for different ways of defining similarity
based on possible particularities pertaining to individual case base
providers.</p>
        <p>Let us assume that in our case study the third estate agent is
specialised in city apartments. After a few searches for country side
houses with gardens, reasoning can be applied to the History
casebase. Results will show that, for this particular query, the estate
agent’s level of trust is not high, i.e. there will be less solutions for
this particular case base added to the Dynamic case-base.</p>
        <p>
          A global level of trust of a provider’s case-base can be
calculating taking in consideration the results of all the previous enquiries
for that provider.
4.2 An architecture and process to support effective
collaboration between case base agents
The architecture of the HMCBR system shown in figure 1 contains
the dynamic CB system, which incorporates a blackboard
architecture. Blackboards have been used very effectively in the past for
the construction of hybrid and agent based AI systems [
          <xref ref-type="bibr" rid="ref11 ref32 ref71">11</xref>
          ], [
          <xref ref-type="bibr" rid="ref12 ref33 ref72 ref86">12</xref>
          ].
        </p>
        <p>The dynamic CB system is where the process for agent
collaboration is controlled. It is based on a blackboard architecture
incorporating the blackboard containing the target and retrieved cases
from various providers together with similarity calculations and
rankings. The blackboard also contains a log of the solution
process and the reconciliation strategy followed, thus representing the
state of the overall CBR solution process at any point in this
process. Figure 7 shows the structure of the dynamic CB module
incorporating the blackboard architecture.</p>
        <p>Blackboard</p>
        <p>The blackboard manager manages the overall solution process,
communicates with and keeps track of the CB agents, selects and
implements a solution strategy and monitors and evaluates the
solutions achieved. Given a new target case, the blackboard
manager decides on strategy for finding similar cases from the CB
providers. The blackboard system decides which CB providers to
use and the number of cases to retrieve from each one and other
requirements, such as the requirement for diversity, similarity
thresholds etc. The system then initialises the agents and assigns to
them a mission. On return, the results (cases) are mapped using the
dynamic data dictionary and written to the blackboard. A “global”
CBR process is used to decide on the retrieved cases. The system
then selects and presents the shortlisted cases after the
reconciliation process and provides these to the user, together with links to
their original forms for the user to explore. Finally, the system
“reflects” on the process by updating the query history and
confidence weights for each provider.</p>
        <p>The system described here has been implemented and tested on
a set of case bases from three different estate agent case bases, all
using different structures. Experiments with the system have shown
that the system can retrieve useful cases combining cases from all
case bases to provide a more efficient overall solution when
compared to using the case bases separately or mapping them to one
central case base. Additionally, the system has shown that it can
provide a more diverse retrieved case population in both cases. A
full scale evaluation of the system, including using a different
application domain is under way.
5</p>
        <p>Conclusion
At a time of increasing web-based communication and sharing of
knowledge between organisations and organisational units within
enterprises, heterogeneous CBR applied to Multiple Case Bases
seems to be the natural progression in this area of research.</p>
        <p>The paper investigates an approach based on agents operating
on different structures/views of the problem domain in a
transparent and autonomous way. In this approach all data is kept locally
by each case base provider in its native form. Agents can be
dynamically added to the system, thus increasing the search domain
and potentially the competence and vocabulary of the system.</p>
        <p>This research proposes a new architecture for a self-adaptive
MCBR system which involves the use of a dynamic structure based
on the blackboard architecture. The Dynamic Structure reflects all
participating case base provider structures. As new agents are
added to the system, their case base structure is published and is
used to adapt the Dynamic Structure accordingly.</p>
        <p>The Dynamic Structure is used at runtime to translate search
queries into the local structures of each agent. Each agent can then
use the translated query to match it to its local cases and retrieve
the best matches.</p>
        <p>A Data Dictionary is created in order to manage the Dynamic
Structure. This contains the metadata for the Dynamic Structure,
such as mapping details of the case base provider’s structures to the
Dynamic Structure, type information and relationships between
attributes of the dynamic structure.</p>
        <p>The dynamic case base system manages the overall process,
including controlling the agents, reconciling and optimising the
retrieved cases and feeding back into its strategy by continuously
adjusting weights representing confidence levels on individual case
base providers. A prototype system to evaluate the efficiency of
using a heterogeneous Multiple Case Based Reasoning system is
currently being evaluated. Preliminary findings are encouraging.</p>
        <p>Further work will concentrate into optimising the process of
collaboration between the agents and methods and strategies for the
reconciliation of retrieved cases.</p>
        <p>References</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Agre</surname>
          </string-name>
          , '
          <article-title>KBS Maintenance as Learning Two-Tiered Domain Representation'</article-title>
          ,
          <string-name>
            <surname>In M.M. Veloso</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Aamodt</surname>
          </string-name>
          , (Eds.):
          <source>Case-Based Reasoning Research and Development</source>
          , First International Conference, ICCBR-95
          <source>, Proceedings, Lecture Notes in Computer Science</source>
          , Vol.
          <volume>1010</volume>
          , Springer-Verlag,
          <fpage>108</fpage>
          -
          <lpage>120</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Asuncion</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.J.</given-names>
            <surname>Newman</surname>
          </string-name>
          , 'UCI Repository of Machine Learning Databases' [http://www.ics.uci.edu/~mlearn/MLRepository.html]. Irvine, CA, University of California, School of Information and Computer Science (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.</given-names>
            <surname>Cercone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>An</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Chan</surname>
          </string-name>
          , '
          <article-title>Rule-Induction and Case-Based Reasoning: Hybrid Architectures Appear Advantageous'</article-title>
          ,
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          ,
          <volume>11</volume>
          ,
          <fpage>164</fpage>
          -
          <lpage>174</lpage>
          , (
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>S. I. Gallant</surname>
          </string-name>
          ,
          <source>Neural Network Learning and Expert Systems</source>
          , MIT Press,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.Z.</given-names>
            <surname>Ghalwash</surname>
          </string-name>
          , '
          <article-title>A Recency Inference Engine for Connectionist Knowledge Bases'</article-title>
          ,
          <source>Applied Intelligence</source>
          ,
          <volume>9</volume>
          ,
          <fpage>201</fpage>
          -
          <lpage>215</lpage>
          , (
          <year>1998</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.R.</given-names>
            <surname>Golding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.S.</given-names>
            <surname>Rosenbloom</surname>
          </string-name>
          , '
          <article-title>Improving accuracy by combining rule-based and case-based reasoning'</article-title>
          ,
          <source>Artificial Intelligence</source>
          ,
          <volume>87</volume>
          ,
          <fpage>215</fpage>
          -
          <lpage>254</lpage>
          , (
          <year>1996</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>I.</given-names>
            <surname>Hatzilygeroudis</surname>
          </string-name>
          , J. Prentzas, '
          <article-title>Neurules: Improving the Performance of Symbolic Rules'</article-title>
          ,
          <source>International Journal on AI Tools</source>
          ,
          <volume>9</volume>
          ,
          <fpage>113</fpage>
          -
          <lpage>130</lpage>
          , (
          <year>2000</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>I.</given-names>
            <surname>Hatzilygeroudis</surname>
          </string-name>
          , J. Prentzas, '
          <article-title>Constructing Modular Hybrid Rule Bases for Expert Systems'</article-title>
          ,
          <source>International Journal on AI Tools</source>
          ,
          <volume>10</volume>
          ,
          <fpage>87</fpage>
          -
          <lpage>105</lpage>
          , (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Hatzilygeroudis</surname>
          </string-name>
          , J. Prentzas, '
          <article-title>An Efficient Hybrid Rule-Based Inference Engine with Explanation Capability'</article-title>
          ,
          <source>Proceedings of the 14th International FLAIRS Conference</source>
          , AAAI Press,
          <fpage>227</fpage>
          -
          <lpage>231</lpage>
          , (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>I.</given-names>
            <surname>Hatzilygeroudis</surname>
          </string-name>
          , J. Prentzas, '
          <article-title>Integrating (Rules, Neural Networks) and Cases for Knowledge Representation and Reasoning in Expert Systems'</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>27</volume>
          ,
          <fpage>63</fpage>
          -
          <lpage>75</lpage>
          , (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kolodner</surname>
          </string-name>
          ,
          <article-title>Case-Based Reasoning</article-title>
          , Morgan Kaufmann Publishers, San Mateo, CA,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>D.B. Leake</surname>
          </string-name>
          (ed.),
          <source>Case-Based Reasoning: Experiences</source>
          , Lessons &amp; Future
          <string-name>
            <surname>Directions</surname>
          </string-name>
          , AAAI Press/MIT Press,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.R.</given-names>
            <surname>Lee</surname>
          </string-name>
          , '
          <article-title>An Exception Handling of Rule-Based Reasoning Using Case-Based Reasoning'</article-title>
          ,
          <source>Journal of Intelligent and Robotic Systems</source>
          ,
          <volume>35</volume>
          ,
          <fpage>327</fpage>
          -
          <lpage>338</lpage>
          , (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.R.</given-names>
            <surname>Marling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sqalli</surname>
          </string-name>
          , E. Rissland,
          <string-name>
            <given-names>H.</given-names>
            <surname>Munoz-Avila</surname>
          </string-name>
          , D. Aha, '
          <article-title>Case-Based Reasoning Integrations'</article-title>
          ,
          <source>AI Magazine</source>
          ,
          <volume>23</volume>
          ,
          <fpage>69</fpage>
          -
          <lpage>86</lpage>
          , (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Montani</surname>
          </string-name>
          , R. Bellazzi, '
          <article-title>Supporting Decisions in Medical Applications: the Knowledge Management Perspective'</article-title>
          ,
          <source>International Journal of Medical Informatics</source>
          ,
          <volume>68</volume>
          ,
          <fpage>79</fpage>
          -
          <lpage>90</lpage>
          , (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Prentzas</surname>
          </string-name>
          , I. Hatzilygeroudis, '
          <article-title>Integrating Hybrid Rule-Based with Case-Based Reasoning'</article-title>
          , In S. Craw and
          <string-name>
            <given-names>A</given-names>
            .
            <surname>Preece</surname>
          </string-name>
          (Eds),
          <source>Advances in Case-Based Reasoning, Proceedings of the European Conference on Case-Based Reasoning, ECCBR-2002, Lecture Notes in Artificial Intelligence</source>
          , Vol.
          <volume>2416</volume>
          , Springer-Verlag,
          <fpage>336</fpage>
          -
          <lpage>349</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Prentzas</surname>
          </string-name>
          , I. Hatzilygeroudis, '
          <source>Categorizing Approaches Combining Rule-Based and Case-Based Reasoning', Expert Systems</source>
          ,
          <volume>24</volume>
          ,
          <fpage>97</fpage>
          -
          <lpage>122</lpage>
          , (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>E.L.</given-names>
            <surname>Rissland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.B.</given-names>
            <surname>Skalak</surname>
          </string-name>
          , 'CABARET:
          <article-title>Rule Interpretation in a Hybrid Architecture'</article-title>
          ,
          <source>International Journal of Man-Machine Studies</source>
          ,
          <volume>34</volume>
          ,
          <fpage>839</fpage>
          -
          <lpage>887</lpage>
          , (
          <year>1991</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rossille</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-F.</given-names>
            <surname>Laurent</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Burgun, '
          <article-title>Modeling a Decision Support System for Oncology using Rule-Based and Case-Based Reasoning Methodologies'</article-title>
          ,
          <source>International Journal of Medical Informatics</source>
          ,
          <volume>74</volume>
          ,
          <fpage>299</fpage>
          -
          <lpage>306</lpage>
          , (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>H.</given-names>
            <surname>Vafaie</surname>
          </string-name>
          , C. Cecere, 'CORMS AI:
          <article-title>Decision Support System for Monitoring US Maritime Environment'</article-title>
          ,
          <source>Proceedings of the 17th Innovative Applications of Artificial Intelligence Conference (IAAI)</source>
          , AAAI Press,
          <fpage>1499</fpage>
          -
          <lpage>1507</lpage>
          , (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <article-title>3.3 Combinations of CBR with Neural Networks 3.4 Combinations of CBR with Genetic Algorithms</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Aamodt</surname>
          </string-name>
          , E. Plaza, '
          <article-title>Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches'</article-title>
          ,
          <source>AI Communications</source>
          ,
          <volume>7</volume>
          ,
          <fpage>39</fpage>
          -
          <lpage>59</lpage>
          , (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>H.</given-names>
            <surname>Ahn</surname>
          </string-name>
          , K. Kim, '
          <article-title>Global optimization of case-based reasoning for breast cytology diagnosis', Expert Systems with Applications (to appear).</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [3]
          <string-name>
            <surname>I. Bischindaritz</surname>
          </string-name>
          , '
          <article-title>Memoire: A Framework for Semantic Interoperability of Case-Based Reasoning Systems in Biology and Medicine'</article-title>
          ,
          <source>Artificial Intelligence in Medicine</source>
          ,
          <volume>36</volume>
          ,
          <fpage>177</fpage>
          -
          <lpage>192</lpage>
          , (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.P.</given-names>
            <surname>Bonissone</surname>
          </string-name>
          , R. Lopez de Mantaras,
          <source>'Fuzzy Case-Based Reasoning Systems', Handbook on Fuzzy Computing</source>
          , vol.
          <source>F 4.3</source>
          , Oxford University Press,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>L.</given-names>
            <surname>Castillo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Armengol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Onaindia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sebastia</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. GonzalezBoticario</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fernandez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.D.</given-names>
            <surname>Arias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Borrajo</surname>
          </string-name>
          , '
          <article-title>SAMAP: An User Oriented Adaptive System for Planning Tourist Visits'</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>34</volume>
          ,
          <fpage>1318</fpage>
          -
          <lpage>1332</lpage>
          , (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ceccaroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Cortes</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Sanchez-Marre, 'OntoWEDSS : Augmenting Environmental Decision-Support Systems with Ontologies'</article-title>
          ,
          <source>Environmental Modelling &amp; Software</source>
          ,
          <volume>19</volume>
          ,
          <fpage>785</fpage>
          -
          <lpage>797</lpage>
          , (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.-C.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-C.</given-names>
            <surname>Hsieh</surname>
          </string-name>
          , C.-H. Liu, '
          <article-title>A Case-Injected Genetic Algorithm for Single Machine Scheduling Problems with Release Time'</article-title>
          ,
          <source>International Journal on Production Economics</source>
          ,
          <volume>103</volume>
          ,
          <fpage>551</fpage>
          -
          <lpage>564</lpage>
          , (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.-C.</given-names>
            <surname>Chang</surname>
          </string-name>
          , C.-Y. Lai,
          <string-name>
            <given-names>K. R.</given-names>
            <surname>Lai</surname>
          </string-name>
          , '
          <article-title>A Hybrid System by Evolving Case-Based Reasoning with Genetic Algorithm in Wholesaler's Returning Book Forecasting'</article-title>
          ,
          <source>Decision Support Systems</source>
          ,
          <volume>42</volume>
          ,
          <fpage>1715</fpage>
          -
          <lpage>1729</lpage>
          , (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>W.</given-names>
            <surname>Cheetam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.C.K.</given-names>
            <surname>Shiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.O.</given-names>
            <surname>Weber</surname>
          </string-name>
          , '
          <source>Soft Case-Based Reasoning'</source>
          , Knowledge Engineering Review,
          <volume>20</volume>
          ,
          <fpage>267</fpage>
          -
          <lpage>269</lpage>
          , (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Chen</surname>
          </string-name>
          , P. Burrell, '
          <source>Case-Based Reasoning System and Artificial Neural Networks: A Review', Neural Computing &amp; Applications</source>
          ,
          <volume>10</volume>
          ,
          <fpage>264</fpage>
          -
          <lpage>276</lpage>
          , (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [11]
          <string-name>
            <surname>R.-J. Dzeng</surname>
          </string-name>
          , H.-Y. Lee, 'Critiquing Contractors'
          <article-title>Scheduling by Integrating Rule-Based and Case-Based Reasoning'</article-title>
          , Automation in Construction,
          <volume>13</volume>
          ,
          <fpage>665</fpage>
          -
          <lpage>678</lpage>
          , (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fdez-Riverola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.M.</given-names>
            <surname>Corchado</surname>
          </string-name>
          , '
          <article-title>FSfRT: Forecasting System for Red Tides'</article-title>
          ,
          <source>Applied Intelligence</source>
          ,
          <volume>21</volume>
          ,
          <fpage>251</fpage>
          -
          <lpage>264</lpage>
          , (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Gervas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Diaz-Agudo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Peinado</surname>
          </string-name>
          , R. Hervas, '
          <source>Story Plot Generation Based on CBR', Knowledge-Based Systems</source>
          ,
          <volume>18</volume>
          ,
          <fpage>235</fpage>
          -
          <lpage>242</lpage>
          , (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.R.</given-names>
            <surname>Golding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.S.</given-names>
            <surname>Rosenbloom</surname>
          </string-name>
          , '
          <article-title>Improving Accuracy by Combining Rule-Based and Case-Based Reasoning'</article-title>
          ,
          <source>Artificial Intelligence</source>
          ,
          <volume>87</volume>
          ,
          <fpage>215</fpage>
          -
          <lpage>254</lpage>
          , (
          <year>1996</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>I.</given-names>
            <surname>Hatzilygeroudis</surname>
          </string-name>
          , J. Prentzas, '
          <article-title>Integrating (Rules, Neural Networks) and Cases for Knowledge Representation and Reasoning in Expert Systems'</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>27</volume>
          ,
          <fpage>63</fpage>
          -
          <lpage>75</lpage>
          , (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>B. W.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Shih</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.-H.</given-names>
            <surname>Chiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. Y.</given-names>
            <surname>Hu</surname>
          </string-name>
          , C. Chiu, '
          <article-title>Price information evaluation and prediction for broiler using adapted casebased reasoning approach', Expert Systems with Applications (to appear).</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Y.-K. Juan</surname>
            , S.-G. Shih,
            <given-names>Y.-H.</given-names>
          </string-name>
          <string-name>
            <surname>Perng</surname>
          </string-name>
          , '
          <article-title>Decision Support for Housing Customization: A hybrid approach using case-based reasoning and genetic algorithm'</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>31</volume>
          ,
          <fpage>83</fpage>
          -
          <lpage>93</lpage>
          , (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [18]
          <string-name>
            <surname>K.-J. Kim</surname>
          </string-name>
          , '
          <source>Toward Global Optimization of Case-Based Reasoning Systems for Financial Forecasting', Applied Intelligence</source>
          ,
          <volume>21</volume>
          ,
          <fpage>239</fpage>
          -
          <lpage>249</lpage>
          , (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>J.L.</given-names>
            <surname>Kolodner</surname>
          </string-name>
          ,
          <article-title>Case-Based Reasoning</article-title>
          , Morgan Kaufmann,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O.</given-names>
            <surname>Byung</surname>
          </string-name>
          <string-name>
            <surname>Kwon</surname>
          </string-name>
          , '
          <article-title>Meta Web Service: Building Web-based Open Decision Support System based on Web Services'</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>24</volume>
          ,
          <fpage>375</fpage>
          -
          <lpage>389</lpage>
          , (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kwon</surname>
          </string-name>
          , M. Kim, '
          <article-title>MyMessage: Case-Based Reasoning and Multicriteria Decision Making Techniques for Intelligent ContextAware Message Filtering'</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>27</volume>
          ,
          <fpage>467</fpage>
          -
          <lpage>480</lpage>
          , (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [22]
          <string-name>
            <surname>D.B. Leake</surname>
          </string-name>
          (Ed.),
          <source>Case-Based Reasoning: Experiences</source>
          , Lessons, and Future Directions, AAAI Press,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.J.</given-names>
            <surname>Louis</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. McGraw</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.O.</given-names>
            <surname>Wyckoff</surname>
          </string-name>
          , '
          <article-title>Case-based reasoning assisted explanation of genetic algorithm results'</article-title>
          ,
          <source>Journal of Experimental &amp; Theoretical Artificial Intelligence</source>
          ,
          <volume>5</volume>
          ,
          <fpage>21</fpage>
          -
          <lpage>37</lpage>
          , (
          <year>1993</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Louis</surname>
          </string-name>
          , C. Miles, '
          <article-title>Playing to Learn: Case-Injected Genetic Algorithms for Learning to Play Computer Games'</article-title>
          ,
          <source>IEEE Transactions on Evolutionary Computation</source>
          ,
          <volume>9</volume>
          ,
          <fpage>669</fpage>
          -
          <lpage>681</lpage>
          , (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>C.</given-names>
            <surname>Marling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sqalli</surname>
          </string-name>
          , E. Rissland,
          <string-name>
            <given-names>H.</given-names>
            <surname>Munoz-Avila</surname>
          </string-name>
          , D. Aha, 'CaseBased Reasoning Integrations',
          <source>AI Magazine</source>
          ,
          <volume>23</volume>
          ,
          <fpage>69</fpage>
          -
          <lpage>86</lpage>
          , (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>L.R.</given-names>
            <surname>Medsker</surname>
          </string-name>
          ,
          <source>Hybrid Intelligent Systems</source>
          , Kluwer Academic Publishers, Second Printing,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Montani</surname>
          </string-name>
          , R. Bellazzi, '
          <article-title>Supporting Decisions in Medical Applications: the Knowledge Management Perspective'</article-title>
          ,
          <source>International Journal of Medical Informatics</source>
          ,
          <volume>68</volume>
          ,
          <fpage>79</fpage>
          -
          <lpage>90</lpage>
          , (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S.</given-names>
            <surname>Montani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Magni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bellazzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Larizza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Roudsari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.R.</given-names>
            <surname>Carson</surname>
          </string-name>
          , '
          <article-title>Integrating model-based decision support in a multi-modal reasoning system for managing type 1 diabetic patients'</article-title>
          ,
          <source>Artificial Intelligence in Medicine</source>
          ,
          <volume>29</volume>
          ,
          <fpage>131</fpage>
          -
          <lpage>151</lpage>
          , (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Pal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.C.K.</given-names>
            <surname>Shiu</surname>
          </string-name>
          ,
          <source>Foundations of Soft Case-Based Reasoning</source>
          , John Wiley,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>E.I.</given-names>
            <surname>Perez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.A.</given-names>
            <surname>Coello Coello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hernandez-Aguirre</surname>
          </string-name>
          ,
          <article-title>'Extraction and Reuse of Design Patterns from Genetic Algorithms using CaseBased Reasoning'</article-title>
          , Soft Computing,
          <volume>9</volume>
          ,
          <fpage>44</fpage>
          -
          <lpage>53</lpage>
          , (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>J.</given-names>
            <surname>Prentzas</surname>
          </string-name>
          , I. Hatzilygeroudis, '
          <source>Categorizing Approaches Combining Rule-Based and Case-Based Reasoning', Expert Systems</source>
          ,
          <volume>24</volume>
          ,
          <fpage>97</fpage>
          -
          <lpage>122</lpage>
          , (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>E.L.</given-names>
            <surname>Rissland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.B.</given-names>
            <surname>Skalak</surname>
          </string-name>
          , 'CABARET:
          <article-title>Rule Interpretation in a Hybrid Architecture'</article-title>
          ,
          <source>International Journal of Man-Machine Studies</source>
          ,
          <volume>34</volume>
          ,
          <fpage>839</fpage>
          -
          <lpage>887</lpage>
          , (
          <year>1991</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rossille</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-F.</given-names>
            <surname>Laurent</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Burgun, '
          <article-title>Modeling a Decision Support System for Oncology using Rule-Based and Case-Based Reasoning Methodologies'</article-title>
          ,
          <source>International Journal of Medical Informatics</source>
          ,
          <volume>74</volume>
          ,
          <fpage>299</fpage>
          -
          <lpage>306</lpage>
          , (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [34]
          <string-name>
            <surname>K.M. Saridakis</surname>
            ,
            <given-names>A.J.</given-names>
          </string-name>
          <string-name>
            <surname>Dentsoras</surname>
          </string-name>
          , '
          <article-title>Case-DeSC: A System for CaseBased Design with Soft Computing Techniques'</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>32</volume>
          ,
          <fpage>641</fpage>
          -
          <lpage>657</lpage>
          , (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>S.C.K.</given-names>
            <surname>Shiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.K.</given-names>
            <surname>Pal</surname>
          </string-name>
          , '
          <source>Case-Based Reasoning: Concepts</source>
          ,
          <source>Features and Soft Computing', Applied Intelligence</source>
          ,
          <volume>21</volume>
          ,
          <fpage>233</fpage>
          -
          <lpage>238</lpage>
          , (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [36]
          <string-name>
            <surname>I. Watson</surname>
          </string-name>
          , '
          <article-title>Case-Based Reasoning is a Methodology not a Technology'</article-title>
          ,
          <source>Knowledge-Based Systems</source>
          ,
          <volume>12</volume>
          ,
          <fpage>303</fpage>
          -
          <lpage>308</lpage>
          , (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>P.</given-names>
            <surname>Wriggers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Siplivaya</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Joukova</surname>
          </string-name>
          , R. Slivin, '
          <article-title>Intelligent Support of Engineering Analysis using Ontology and Case-Based Reasoning'</article-title>
          ,
          <source>Engineering Applications of Artificial Intelligence</source>
          ,
          <volume>20</volume>
          ,
          <fpage>709</fpage>
          -
          <lpage>720</lpage>
          , (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [38]
          <string-name>
            <surname>H.-L. Yang</surname>
          </string-name>
          , C.-S. Wang, '
          <article-title>Two stages of case-based reasoning - Integrating genetic algorithm with data mining mechanism', Expert Systems with Applications (to appear).</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>F.-C.</given-names>
            <surname>Yuan</surname>
          </string-name>
          , C. Chiu, '
          <article-title>A Hierarchical Design of Case-Based Reasoning in the Balanced Scorecard Application', Expert Systems with Applications (to appear).</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Adamopoulos</surname>
          </string-name>
          , Anninos,
          <string-name>
            <given-names>P. A.</given-names>
            ,
            <surname>Likothanassis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S .D.</given-names>
            ,
            <surname>Beligiannis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. N.</given-names>
            ,
            <surname>Skarlas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. V.</given-names>
            ,
            <surname>Demiris</surname>
          </string-name>
          <string-name>
            <given-names>E. N.</given-names>
            and
            <surname>Papadopoulos</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          ,
          <year>2002</year>
          .
          <article-title>Evolutionary Self-adaptive Multimodel Prediction Algorithms of the Fetal Magnetocardiogram</article-title>
          ,
          <source>14th Int. Conf. on Digital Signal Processing (DSP 2002)</source>
          , Vol. II, 1-
          <issue>3</issue>
          <year>July</year>
          , Santorini, Greece, pp.
          <fpage>1149</fpage>
          -
          <lpage>1152</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>G. N.</given-names>
            <surname>Beligiannis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. V.</given-names>
            <surname>Skarlas</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. D.</given-names>
            <surname>Likothanassis</surname>
          </string-name>
          . “
          <string-name>
            <given-names>A Generic</given-names>
            <surname>Applied</surname>
          </string-name>
          <article-title>Evolutionary Hybrid Technique for Adaptive System Modeling and Information Mining”</article-title>
          ,
          <source>IEEE Signal Processing Magazine</source>
          ,
          <volume>21</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>28</fpage>
          -
          <lpage>38</lpage>
          ,
          <year>2004</year>
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.</given-names>
            <surname>Colson</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zeleny</surname>
          </string-name>
          , “
          <article-title>Uncertain prospects ranking and portfolio analysis under the condition of partial information</article-title>
          ”
          <source>in Mathematical Systems in Economics 44</source>
          ,
          <year>1979</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Crina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ajith</surname>
          </string-name>
          , I. Hisao (Eds.), “
          <article-title>Hybrid Evolutionary Algorithms”</article-title>
          ,
          <source>Studies in Computational Intelligence</source>
          , Vol.
          <volume>75</volume>
          ,
          <year>2007</year>
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Haykin</surname>
          </string-name>
          , Adaptive Filter Theory. Englewood Cliffs, NJ: PrenticeHall Int.,
          <year>1991</year>
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kakas</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Moraitis</surname>
          </string-name>
          , “
          <article-title>Argumentation based decision making for autonomous agents”</article-title>
          ,
          <source>Proc. of the second Int. Conf. on Autonomous Agents and Multi-Agent Systems (AAMAS03)</source>
          ,
          <source>July 14-18</source>
          , Australia,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.K.</given-names>
            <surname>Katsikas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.D.</given-names>
            <surname>Likothanassis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Beligiannis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.G.</given-names>
            <surname>Berketis</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.A.</given-names>
            <surname>Fotakis</surname>
          </string-name>
          , “
          <article-title>Evolutionary multimodel partitioning filters: A unified framework</article-title>
          ,
          <source>” IEEE Trans. Signal Processing</source>
          , vol.
          <volume>49</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>2253</fpage>
          -
          <lpage>2261</lpage>
          ,
          <year>2001</year>
        </mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H.</given-names>
            <surname>Markowitz</surname>
          </string-name>
          , Portfolio Selection: Efficient Diversification of Investments, Wiley, New York,
          <year>1959</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Michalewicz</surname>
          </string-name>
          ,
          <article-title>Genetic Algorithms + Data Structures = Evolution Programs</article-title>
          , 3rd ed. New York: Springer-Verlag,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>I.</given-names>
            <surname>Rahwan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Moraitis</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Reed</surname>
          </string-name>
          (Eds.) “
          <source>Argumentation in MultiAgent Systems”, Lecture Notes in Artificial Intelligence</source>
          ,
          <volume>3366</volume>
          , Springer-Verlag, Berlin, Germany,
          <year>2005</year>
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ross</surname>
          </string-name>
          , “
          <article-title>The Arbitrage Theory of Capital Asset Pricing”</article-title>
          ,
          <source>Journal of Economic Theory</source>
          ,
          <volume>6</volume>
          ,
          <year>1976</year>
          , pp.
          <fpage>341</fpage>
          -
          <lpage>360</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>W.F.</given-names>
            <surname>Sharpe</surname>
          </string-name>
          , “
          <article-title>Capital asset prices: A theory of market equilibrium under conditions of risk”</article-title>
          ,
          <source>Journal of Finance</source>
          ,
          <volume>19</volume>
          ,
          <year>1964</year>
          , pp.
          <fpage>425</fpage>
          -
          <lpage>442</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W.F.</given-names>
            ,
            <surname>Sharpe</surname>
          </string-name>
          , “
          <article-title>Mutual fund performance”</article-title>
          ,
          <source>Journal of Business</source>
          ,
          <volume>39</volume>
          ,
          <year>1966</year>
          , pp.
          <fpage>119</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Spanoudakis</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Pendaraki</surname>
          </string-name>
          , “
          <article-title>A Tool for Portfolio Generation Using an Argumentation Based Decision Making Framework”</article-title>
          ,
          <source>in: Proceedings of the annual IEEE International Conference on Tools with Artificial Intelligence (ICTAI</source>
          <year>2007</year>
          ), Patras, Greece,
          <source>October 29-31</source>
          ,
          <year>2007</year>
        </mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.L.</given-names>
            <surname>Treynor</surname>
          </string-name>
          , “
          <article-title>How to rate management of investment funds”</article-title>
          ,
          <source>Harvard Business Review</source>
          ,
          <volume>43</volume>
          ,
          <year>1965</year>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          [1] Kolodner, J.:
          <source>Case-based Reasoning</source>
          , Morgan Kaufmann, 1993
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Knight</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petridis</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mileman</surname>
            <given-names>T</given-names>
          </string-name>
          :
          <article-title>Maintenance of a Case-Base for the Retrieval of Rotationally Symmetric Shapes for the Design of Metal Castings LNAI</article-title>
          <year>1998</year>
          : Springer Verlag.
          <source>Advances in Case-Based Reasoning, 5th European Workshop</source>
          , Trento, Italy, Sept. 6-
          <fpage>9</fpage>
          .
          <year>2000</year>
          pp
          <fpage>418</fpage>
          -
          <lpage>430</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref78">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Knight</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petridis</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mejasson</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
            <given-names>P</given-names>
          </string-name>
          :
          <article-title>A Intelligent design assistant (IDA): a CBR System for Materials Design Journal of Materials</article-title>
          and Design 22 pp
          <fpage>163</fpage>
          -
          <lpage>170</lpage>
          ,
          <year>2001</year>
        </mixed-citation>
      </ref>
      <ref id="ref79">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>David</given-names>
            <surname>Leake</surname>
          </string-name>
          &amp;
          <article-title>Raja Sooriamurthi: “Automatically Selecting Strategies for Multi-Case-Base Reasoning” -</article-title>
          <source>Proceedings of the Sixth European Conference on Case-Based (ECCBR)</source>
          , Aberdeen, Scotland, September,
          <year>2002</year>
        </mixed-citation>
      </ref>
      <ref id="ref80">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>David</given-names>
            <surname>Leake</surname>
          </string-name>
          &amp; Raja Sooriamurthi : “
          <source>Managing Multiple Case Bases: Dimensions and Issues” (Proceedings of the Fifteenth Florida Artificial Intelligence Research</source>
          Society (FLAIRS) Conference , Pensacola, Florida, May
          <year>2002</year>
          ),
        </mixed-citation>
      </ref>
      <ref id="ref81">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>David</given-names>
            <surname>Leake</surname>
          </string-name>
          &amp; Raja Sooriamurthi: “
          <source>When Two Case Bases are Better Than One: Exploiting Multiple Case Bases” (Proceedings of the Fourth International Conference on Case-Based Reasoning (ICCBR)</source>
          , Vancouver, Canada, July,
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref82">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Enric</given-names>
            <surname>Plaza</surname>
          </string-name>
          , Santiago Ontañón:
          <article-title>Cooperative Multiagent Learning</article-title>
          .
          <source>Adaptive Agents and Multi-Agents Systems 2002</source>
        </mixed-citation>
      </ref>
      <ref id="ref83">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Santiago</given-names>
            <surname>Ontañón</surname>
          </string-name>
          , Enric Plaza:
          <article-title>A bartering approach to improve multiagent learning</article-title>
          .
          <source>AAMAS 2002</source>
        </mixed-citation>
      </ref>
      <ref id="ref84">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Francisco</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Martín</surname>
          </string-name>
          , Enric Plaza, Josep Lluís Arcos:
          <article-title>Knowledge and Experience Reuse Through Communication Among Competent (Peer) Agents</article-title>
          .
          <source>International Journal of Software Engineering and Knowledge Engineering</source>
          <year>1999</year>
        </mixed-citation>
      </ref>
      <ref id="ref85">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Hayes</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Doyle</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cunningham</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Distributed CBR Using</surname>
            <given-names>XML</given-names>
          </string-name>
          ,
          <source>Proceedings of the Fourth European Conference on Case-Based (ECCBR)</source>
          , Dublin, Ireland,
          <year>June 1998</year>
          [11]
          <string-name>
            <given-names>R</given-names>
            <surname>Engelmore</surname>
          </string-name>
          , T Morgan :
          <article-title>Blackboard Systems</article-title>
          , AddisonWesley,
          <year>1988</year>
        </mixed-citation>
      </ref>
      <ref id="ref86">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Petridis</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knight</surname>
            <given-names>B</given-names>
          </string-name>
          , (
          <year>2001</year>
          )
          <article-title>: “A blackboard architecture for a hybrid CBR system for scientific software</article-title>
          ”
          <source>in Proceedings of the Workshop Program at the 4th International Conference in Case-based Reasoning ICCBR01</source>
          , Vancouver 2001, Eds R. Weber,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <source>von Wagenheim</source>
          , pp
          <fpage>190</fpage>
          -
          <lpage>195</lpage>
          , NCARAI, Naval Research Laboratory, Code 5510 Washington DC.
        </mixed-citation>
      </ref>
      <ref id="ref87">
        <mixed-citation>
          [13]
          <article-title>Case Dispatching versus Case-Base Merging: when MCBR matters: David Leake</article-title>
          and
          <string-name>
            <given-names>Raja</given-names>
            <surname>Sooriamurthi</surname>
          </string-name>
          .
          <source>International Journal on Artificial Intelligence Tools: Architectures, Languages and Algorithms</source>
          (IJAIT).
          <article-title>Special issue on recent advances in techniques for intelligent systems</article-title>
          . Vol
          <volume>13</volume>
          , No 1,
          <fpage>2004</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>