Multi-Encrypted Extended Hierarchical Censored Production Rules: An Implementation Author: Deepa Chaudhary N.K Jain Monica Singh Abstract This paper exhibits multi-encrypted representation of knowledge employed in EHCPRs System. In all intelligent agents one of the points of consideration is to know that how the knowledge is structured, how it is viewed by designers, and what effective method of organizing the knowledge structures in memory have been used. Knowledge representation in a multi encrypted fashion will enhance learning; give better understanding, imagination and feel of real world objects (concepts) that are encapsulated in Multi-Encrypted EHCPR knowledge base. The implementation of Multi-encrypted Extended Hierarchical Censored Production Rule system represents a multi-encrypted structure for knowledge of both the types- tacit and explicit knowledge. This project is a web application which is a browser oriented interface. Being a web application it can have the scope of being online in future work. Keywords EHCPR Multi-Encryption Concepts Tacit Knowledge Auto-Extraction Instances Supervised Learning Introduction Karl Wiig (1996) defines knowledge as “the insights, understandings and the practical know-how that we all possess.” Knowledge is the information which represents long term relationships i.e., ways of doing things, common sense, ideas, methods, skills, and so on. Knowledge is the backbone of Artificial Intelligence and so issues related to knowledge representation, understanding, knowledge designing and implementation are relevance. In the creation of common sense knowledge base major information contents are the ontology of classes, instances and individuals; parts, properties, and materials of objects; functions and uses of objects; location, duration, post and preconditions of events; behaviour; emotions; strategies; and context. To accommodate all these concepts in a single unit, a unique knowledge representation scheme is required. Definitions of tacit and explicit knowledge provide a proper classification for all the existing knowledge. Tacit knowledge is the form of knowledge that is subconsciously understood and applied, difficult to articulate, developed from direct experiences and action and usually shared through highly interactive conversation and shared experiences. While tacit knowledge appears to be simple, it has far reaching consequences and is not widely understood. Tacit knowledge is not easily shared. Although it is that which is used by all people, it is not necessarily able to be 1 easily articulated. It consists of beliefs, ideals, values, schemata and mental models which are deeply ingrained in us and which we often take for granted. While difficult to articulate, this cognitive dimension of tacit knowledge shapes the way we perceive the world. In the field of knowledge management, the concept of tacit knowledge refers to a knowledge possessed only by an individual and difficult to communicate to others via words and symbols. Therefore, an individual can acquire tacit knowledge without language. Apprentices, for example, work with their mentors and learn craftsmanship not through language but by observation, imitation, and practice. The key to acquiring tacit knowledge is experience. Without some form of shared experience, it is extremely difficult for people to share each other’s thinking processes. Tacit knowledge is difficult to transfer to another person by means of writing it down or verbalizing it. For example, stating to someone that we are the students of computer is a piece of explicit knowledge that can be written down, transmitted, and understood by a recipient. However, the ability to explore and use any complex equipment requires all sorts of knowledge that is not always known explicitly, even by expert practitioners, and which is difficult to explicitly transfer to users. Taking this into account now Artificial Intelligent system requires: 1. Transformation of tacit knowledge into explicit form of knowledge. 2. The use of some knowledge representation structure to capture the knowledge which creates declarative knowledge. The richer the representation, the more useful it is for subsequent problem solving. Both humans and computers must be able to react promptly to new information, and they must be able to change or repair their knowledge when new information produces contradictions or when initial assumptions are withdrawn. An intelligent system should exhibit the capability to acquire fresh knowledge through its regress interaction with the external world in a given working environment. The knowledge flow in the intelligent system is through human being who represents the knowledge in some formalism as frames, logic, semantic net, grid and production rule etc. or suitably combines some of these schemes and hence is more effective in subsequent use. In this interaction between the system and human, there must be some fundamental gap in the understanding of the knowledge. This hindrance, in the understanding of the knowledge, is due to different nature/functionality of different formalisms employed. This problem can be overcome when the knowledge representation [1] model employed is made to be functionally equivalent to all the standard representation schemes. Moreover, it is useful to convert all the existing knowledge into this functionally equivalent knowledge representation scheme. Semantic nets [2] represent the meaning of sentences by means of a formal network structures. Various forms of these network structures are possible; but typically objects are represented by nodes in a network and their relations by arcs between the nodes. Semantic network is very expressive formalism in terms of inheritance hierarchy, multiple inheritance and representation of exceptions. Frame [3] is a general record like structure which represents an entity, or a 2 general concept as a set of slots (attributes) and associated values. Unlike a record, structure or class, it is possible to add slots to a frame dynamically i.e., at run time of a program execution and the contents of the slot need not be simple value. Frames are implicitly associated with one another because the value of a slot can be another frame. Frames suggest top down mechanism to represent general high level knowledge. Predicates [4], the language of logic, are another way of representing knowledge. Predicates can be used to illustrate all the basic concepts of logic. The atomic sentences (indivisible syntactic elements) consist of a single predicate followed by a parenthesized list of terms. The meaning of a concept comes from the ways in which it is connected to other concepts while its specificity stays constant. A Censored Production Rule CPR [5] is written as: IF P THEN D UNLESS C. Where P is production rules, D is decision and C is censor or exceptional condition. The “rule + exception” models [6] provide a realistic description of real world and hierarchies provide managing structure to the world knowledge base with different knowledge levels. Hierarchical Censored Production Rule system (HCPR) [7] combines rules, exceptions and hierarchy in this scheme of knowledge representation. With the inclusion of new operators, the HCPR system generalized further with the name Extended Hierarchical Censored Production Rules (EHCPRs) given by N.K Jain and K.K Bharadwaj [8].The Extended Hierarchical Censored Production Rules (EHCPRs) System ([9], [10], [11], [12], [13-22]) is an intelligent system which employs an EHCPR as a unit for representing real world knowledge. The EHCPRs system uses EHCPRs to create declarative knowledgebase to capture the knowledge from different environments. Different current projects in Artificial Intelligence such as Treasure, CYC, WorldNet, etc. are successful to represent extensively large knowledgebase. These systems have utilized multiple representation schemes to represent different types of concepts. In place of employing multiple representation schemes, the EHCPRs system uses a general representation by means of EHCPRs for all existing knowledge world. In an EHCPR, there are various operators to define different relations or dependencies of the objects (or concepts) with other objects (or concepts). Here is the definition of an EHCPR [17] [20]: A {decision/concept/object} /*As Head of rule*/ If B[b1, b2, …, bm] {preconditions (AND conditions)} Unless C[c1, c2, …, cn] {censor conditions (OR conditions)} Generality G {general concept} Specificity S[a1,a2, …, ak] {specific concepts} /* mutually exclusive set*/ Has-Part [Part_Concept1: (Default),(Constraints), Part_Concept2: (Default), (Constraints), …… , Part_Conceptp: (Default),(Constraints)] 3 Has-Property [Property_Concept1: (Default), (Constraints), Property_Concept2: (Default), (Constraints), ……, Property_Conceptq: (Default),(Constraints)] Has_Instance [ …] {instances} : γ, δ ………………………. (1) Here ‘A’ is a concept, consequent or decision part in the EHCPR. ‘B’ is the antecedent or precondition part and contains the defining features of concept A. When ‘B’ is satisfied, it leads to take the action or decision given by ‘A’. ‘C’ is censor (or exception) part of the ‘If-ThenUnless’ rule. The specificity information with ’S’ in an EHCPR is the clue about the next set of more specific entities. The general information with ‘G’ in an EHCPR is the clue about the next general entity related to the entity ‘A’ up in the hierarchy. The ‘Has-Part’ and the ‘Has-Property’ operators relegates with the characteristic features, which normally holds true but also at the same time are allowed to be false for an item, or individual who is an instance of that particular concept, in an extraordinary situation. The ‘Has_Instance’ operator represents the list of distinct individual, example, or instance, of that particular concept. Parameter ‘γ’ is a numeric measure of strength of “If” relationship between ‘A’ and ‘B’. ‘γ’ is referred to as the 0–level strength of implication. Every censor (c1, c2, …,cn) is associated with an estimate of its likelihood (δ1,…, δn) also called the certainty factor of that censor. ‘δ’ = γ + summation of all δ’s …………………….(2) and is referred to as the 1–level strength of implication. A detailed discussion of ’γ’ and ’δ’ is given in ([23],[1]). Their value is constrained to be greater than 0.5 and less than 1 for a meaningful and hence useful implication. Each concept represented as an EHCPR can have various instances and all instances of EHCPRs are represented uniformly through the same general form given below (4): Head /* particular instance of a concept / name of individual object*/ Instance-of (a general concept) Has-Part (set of actual known parts) Has-Property (set of known true properties) …………….. (4) Here, Head is the name of the instance. Instance-of is the name of the concept, of which Head is an instance. The override or peculiar attributes of an instance are kept with its Has-Part and HasProperty operators. Other attributes might be inherited by it through ‘Instance-of’ and subsequently by the ‘Generality’ operator. Multi-Encrypted EHCPRs System A concept is an abstraction to symbolize the world knowledge. A concept is either an entity or a process. An entity may be physical or abstract. Something formed in the mind; a thought or 4 notion, an idea derived or inferred from specific instances or occurrences is a concept. Any structure, system, plan, living being, and non-living is a concept. A general idea of a concept is created by abstracting, drawing, most common and uncommon characteristics. For example, the abstract general idea or concept that is designated by the word "red" is that characteristic which is common to apples, cherries, and blood. The abstract general idea or concept that is signified by the word "cow" is the collection of those characteristics which are common to all existing different breeds of cows. A better learning of any concept can be presumed with the use of all the existing encryptions for a concept. Uses of all the types of encryptions make the path of learning easy. When a mother teaches her kid about a cow she shows him picture, mimic cow’s moos, shows him how a cow moves like that. A kid uses his senses and creates his understanding for this concept i.e. for cow. His mother told him what to call this entity in his native language and as the child grows his learning make him capable to differentiate between different cows, their common and different treads. The ME-EHCPRs system has its senses in the form of all the encryptions to learn a concept. An EHCPR structured in [14] is encapsulating all types of encryptions to increase the knowledge domain of any concept. This ME-EHCPR system is further enhanced in this paper with a new concept of representing and teaching the knowledge base using multiple- encryption forms called Multi-Encrypted EHCPR system. The Multi-Encrypted EHCPR system structure will take the form: 1. “A {Decision/ Concept/Object}” is a concept, consequent or decision part in the MultiEncrypted EHCPR. 2. “B {preconditions (AND Conditions)}”. When B is satisfied, it leads to take the action or decision given by A. These are the concepts define concept A. 3. “C {Censor conditions (OR condition)}”. C is censor (or exception) part of the ‘If –ThenUnless’ rule. It is a set of disjunction of all the censor conditions. For a Production rule certainty increases with the falsehood of censor conditions and decreases without checking these. If we assume for a certain concept that all censor conditions are known to us and all are false. It automatically boosts hundred percent certainty for the concept existence. 4. “S {Specificity Concept (mutually exclusive set)}”. S is the specificity information which gives a clue about the next set of more specific entities. Systematic arrangement of available knowledge is desirable feature for its manipulation and use. This operator suggests tree structure organization for all the ME-EHCPRs. It reduces repetition of inherited knowledge also. 5. “G {General Concept}”. G is the general concept which gives knowledge of the concept ancestor/ general to the concept ‘A’ i.e. up in the hierarchy. 6. “TE {Textual Encryption}”. TE is the textual encryption which is a set of names of the concept A in multiple languages. In this paper we are considering only one language. It is an initiation node/pointer to refer all the related concepts in a particular language. 5 7. “PE {Picture Encryption}”. PE is the pictorial encryption which is a set of pictures of the concept A. 8. “AE {Audio Encryption}”. AE is the audio encryption which is a set of the sounds of the concept A. “VE {Video Encryption}”. VE is the video encryption which is a set of videos of the concept A. In the Notebooks 1914-16 Wittgenstein writes The difficulty of my theory of logical portrayal was that of finding a connection between the signs on paper and a situation outside in the world. I always said that truth is a relation between the proposition and the situation, but could never pick out such a relation (19e-20e; quoted in Word and World, 71). “A picture is worth a thousand words". This idea conveys use of audio and video encryption in ME-EHCPRs System. It also aptly characterizes one of the main goals of visualization. Block diagram of ME-EHCPR System showing functional components of the system to exhibit the system capability as an Artificial intelligent agent is shown in fig.1 Multi-Encrypted (Declarative Knowledge) Data Base (Set of Instances) Knowledge Base (Set of EHCPRs) Context Sensitive Multi-Lingual User Interface Learning Reasoning (Procedural Knowledge) Fig1: Block diagram of ME-EHCPR 1. Multi-Encrypted Knowledge Base and ME-Data Base, where knowledge base consists of set of ME-EHCPR’s and data base consists of set of instances of ME-EHCPR’s present in knowledge base. ME-EHCPRs KB is organized in tree structure. As a prototype we are handling only one KB. There will be many more interactive KBs [23] organized in Tree structure too. A concept defined in one KB can be used in others too. Ex: Red colour, red light, red dress, and red car these all will access concept “red” from the same concept 6 red. As knowledge base is permanent it will auto extract permanent knowledge from database too (discussed in logical description and shown in implementation). 2. Context Sensitive Multi-Lingual User Interface. Context sensitivity can be applied at various levels in an Artificial Intelligent system. Context sensitivity in location and cultural aspect can have a significant value in the area of International system [13]. It can be applied to representation, user interface, reasoning, and learning. Context sensitive approach of designing a User Interface will result in intelligent interface. An intelligent system senses the mood of the user and able to do some of the work of its own without the intervention of the user working in the System. This interactive nature of the System will result in making the user more enthusiastic, active and innovative while working with the System. Thus by implementing context sensitivity property we are actually making a machine intelligent artificially. By Multi-Lingual we mean the system will respond, act, interact and connect with the external world in the user’s own languages. Practically speaking it will be a multi lingual system. Not only user interface but the whole system can have a multi lingual approach that can be considered in future work. 3. Learning: Capability of automatic restructuring of the knowledge base and to view the fresh knowledge in the context of its already acquired knowledge is central to an effective learning system. Improvement in a task performance may be regarded as a consequence of knowledge improvement. Learning is a process of increasing an agent’s knowledge. Such a process will typically involve conducting various forms of inference, validating their results, and memorizing the results for future use. 4. Reasoning: The reasoning process in ME-EHCPRs system is more flexible in comparison to semantic networks and frames as it facilitates both backward and forward rule chaining while semantic networks use bottom up representation and frame suggested top down mechanism. This ME-EHCPRs System exhibits efficiency to work with all possible logical reasoning. A few are tested [24-26] and some are under process. The reasoning process in EHCPR system is more flexible in comparison to semantic networks and frames as it facilitates both backward and forward rule chaining while semantic networks use bottom up representation and frames suggested top down mechanism. Significance of Multi Encryption The concept that exists in knowledge base does have meaning in real world aspect. Their existence matters to other concepts also with whom these concepts have relations in the terms of generality, specificity etc. So the selection of operators or primitives is the most crucial task. When we are saying that a concept is defined and characterized by if, censor, generality, specificity, has-part and has-property operators it means that all world knowledge (concepts) will contribute through operators. But these representations are textual, that is the knowledge maintained in the knowledge base is in the form of textual encryption. Encryption in this context means the textual explanation of representing the knowledge about a concept. Encryption means various ways, forms of representing knowledge so that it can give better understanding, imagination and feeling of real world concepts. To make the knowledge base natural looking and natural behaving only textual encryption of representing knowledge is not enough some more encryption techniques needed to be augmented in the current system of EHCPRs. For this we 7 have used pictorial, visual, audible encryption techniques. For example the concept ‘Human’ can be explained using pictures of Human like ‘A human drinking water; A human driving car; A human laughing; A human surfing internet; A human lying on bed while ill’. These pictures of a concept can make the system understand various perspective of Human being as a concept in real world. By visualizing these pictures we can also analyse various activities done by human being, various emotions a human can have, and various circumstances a human can face. So through pictorial encryption we can come to know a number of new things about a human being which is complex to be represented in textual manner. Further various specialty about the human being concept can also be understood like ‘Some Human are good writer; some are good dancer; some are good singer’. So things are getting easier to be explained and understood using these encryption techniques. Pictorial representations of EHCPR are to show various activities, emotions, circumstances, events, decisions about a concept. Visual or video encryption technique of representing knowledge is to show how these activities are actually done; how these emotions are actually made; how these circumstances arises; how events triggered; how decisions are taken. So visual encryption actually answers the question of “How’s”. It sequences number of events while performing a task. For example ‘A Human drinking water’ will have number of steps while drinking. First of all it will take a glass, fill it with water from a jug containing water. Then it will hold the glass tightly and lift it towards its mouth. Then it will sip an amount of water that can be accommodated by its mouth. Then ultimately it will swallow the intake. This whole procedure of drinking water can be explained in such a detail using visual encryption technique. Pictorial encryptions are two-dimensional while visual encryption is threedimensional. A two-dimensional picture communicates only one point of view and it cannot indicate size, shape, surface or volume. These are the most essential visual attributes. Shape, size and colour are the major attributes that can be better defined using pictorial and visual encryption. Shape and size of a concept is always crucial. The effect made on viewer is so different that the viewer can make any similarity as well as differentiation among other concepts present in knowledge base or real world. For example, one can compare the size of a human with a plant. One can make a conclusion by this comparison that plants are shorter than human being. Colour also plays a vital role in understanding the concept more efficiently. Colour attribute always matter since it influences the way we look at a concept. A concept may have multiple colours like concept human can be fair, black or whitish. Further the concept parrot can be of colour Green, Blue, Red, and Yellow. These varieties of concept parrot can be considered as various instances or various specificity (hyacinth macaw, scarlet macaw, sun conure) of the concept Parrot. The colour of a concept may also change over time. Like the concept Mango changes its shape, size and colour over its life time. Initially it grows in the form of flower, and then they grow and change its shape like a fruit and green in colour, after some time it ripens and grows bigger in size and get orange or red in colour. All these explanation about a particular concept require to be memorized. For memorizing a thing listening is an important aspect. We can memorize only when we can feel anything. By listening to the behaviour of a concept we can better understand and feel its scope and relativity with present environment. Listening to a fact 8 leads to feeling the fact which further leads to the imagination of a brain which may go beyond the scope. By audio clips of describing various facts about a concept we can give a different view of understanding and learning. For example the concept Bird can have audio or sound encryption of a bird chirping in the trees, bird flapping their wings in a wish to fly can make the listener better understand and memorize the very concept. It can further make differentiation among related concepts like Birds do have a censor condition of airplane. Airplane flies but it is not a Bird. So the ‘fly’ property of both the concept has a completely different aspect. So by visual and audible encryption of ‘fly’ property of both the concept can be differentiated clearly and conveniently. Therefore it has been concluded here that any concept being a common property among different concept can behave and operate in different manner. ME-EHCPR Logical Description of the Implementation This project is implemented using 4-tier architecture to ensure security of code. 4 tier architecture means there is layering of code in the project and they will work by linking each another. In our project 1st layer is User Interface; through which user will interact with the system, 2 nd layer is Knowledge Object; this will create the knowledge object as a packet and encapsulate whole information about a concept or entity into an object called knowledge object, 3rd layer is Knowledge Application Layer; This layer will act as an adapter to pass the knowledge object to the knowledge access layer for further processing, 4th is Knowledge Access Layer; This layer will invoke the respective member function to establish the connection with the knowledge base and send the request along with the knowledge object to the knowledge base via the very channel created by it. Once these processing have been done and signal approaches the knowledge base, the knowledge base then further upgrade itself using respective procedures. This project is a web application which is a browser oriented interface. Being a web application it can have the scope of being online in future work. The web applications do have application level configuration information which is maintained in ‘web.config’ file. This file maintains information like authorization, connection string etc. The connection string holds the information about the database server. So this information is confidential. To confirm its security this information is stored in encrypted form using RSA algorithm. Automatic extraction of various concepts when a particular concept is generated Apart from security issues, which are one of the most significant parts of this project, one more issue is the deserving candidate of that concern, and that is automatic concept extraction upon a particular concept generation. Whenever we think about a concept a lot more thing comes into mind which can be acting as another new entity and so a new concept. While explaining any concept we can have several operators to describe it in a structural way called EHCPR. Each bite of information present in the EHCPR packet to represent the knowledge about the concept can also be considered as a concept. Like all set of If conditions, censor condition, specificity, generality, has-part, has-property an EHCPR packet have are also another concept. 9 So while feeding knowledge about a particular concept in the knowledge base, we are actually discovering a number of new concepts resulting in cloud of concepts. Let us come back to the definition of concept. A Concept in this context may be defined as anything which is capable of holding any information from which knowledge can be extracted and correlated with other concepts in the domain. Concepts allow us to store useful and pertinent conceptual information that applies to a set of individuals and use this knowledge in the future. Without categories and the conceptual knowledge associated with them, we would have to learn all the information of all the objects we ever confront separately, but storing all the information of all the objects encountered is impossible for a finite thing such as a brain or a computer. So we can conclude here that every piece of knowledge about particular concept is a concept as well. Practically it means each set of operator’s attributes that are possessing information in EHCPR structure are further treated as a new concept by the system if they are not existing already. Let us explore furthermore our previous example of BIRD. Bird If: {“Bipedal”, ”Fly”, “Chirp”, “Warm Blooded”} Unless: Dinosaur Generality: Animal Specificity: Crow, Ostrich, Parrot, Penguin, Sparrow, Kiwi, Eagle Has_Part: {Legs, Wings, Beak, Teeth} Has_Property: {Live in nest, Eat grains} Has_Instance: {Titu, Mithu, Sweety} When we are putting this knowledge packet of concept in the knowledge base, the system will auto extract a number of new concepts present in the operator’s very knowledge packet other than instances (see figure 5). Like if the user is entering knowledge about the concept ‘BIRD’ a number of concepts will be extracted from its ME-EHCPR packet like ‘Bipedal’, Constant body temperature, lay eggs, animal, crow, ostrich, parrot, penguin, sparrow, kiwi, Eagle etc. are auto extracted by the present ME-EHCPR and upgraded in the knowledge base. Meanwhile these new extracted concepts will have incomplete information in their ME-EHCPR structure but in future more information about respective concept in the form of ME-EHCPR attributes can be upgraded into the knowledge base. It means the next time we are accessing the knowledge base we can search those concepts and add on further information related to it in order to complete it as an ME-EHCPR structure. 10 Since instances are represented as individual object/ occurences of the concept. set of instances are maintained in database other than knowledge base as we have discussed in the block diagram of Multi-Encrypted EHCPR system. Instances do have their life time duration, i.e. their existence in database is not permanent. Knowledge base will contain concept knowledge and instances those status has been changed into permanent. Ex; one human called Johny is an instance and so is in database as long as he died and then transferred into KB. Important point is: Instances of any concept will be stored in database but other than textual encryption will also enrich the existing data base automatically as it works for the concept as it is. ME-EHCPR Implementation Detail Implementation of multi-encrypted EHCPRs system is done using Micro Soft Visual Studio 2010 Dot Net Framework, C# language, ASP.Net Web Tool, AJAX Control Toolkit. The knowledge base is maintained in SQL Server 2008 R2. This project is having proper login system, a user has to login with their password in order to access the system. Fig 2: login user interface For new user there is a proper registration system which will take some of the essential details of user and register it with the system. 11 Fig 3: Registration User Interface Next is knowledge packet ME-EHCPR Input User Interface. From here the authenticated user only will upgrade the knowledge base by putting knowledge in the operators of the ME-EHCPR given. 12 Fig 4: User Interface for an authenticate user having knowledge base access permission After that we have an interface to search the concept. Here in the figure below we can see the learning property where multiple concepts are appearing which is auto extracted by the system. From here the user can search the respective concept to get the knowledge about it. 13 Fig 5: end user searching concept Note: We enter only one concept of Bird and the system takes all the knowledge as other concepts once from all the operators. Hierarchy will be maintained through generality and specificity. It is one kind of auto extraction of knowledge. Another is when we give an instance and its all encryptions other than textual will update the existing ME-EHCPR and if no ME-EHCPR exists than knowledge will remain intact with instance in Data base. In the Concept view user interface, the concept will appear in the ME-EHCPR structure. In the button ‘Play Video’, ‘Play Audio, ‘Show Picture’ different encryption will be played of the respective concept that user have searched. 14 Fig 6: end user searched concept view Conclusion Knowledge management is the management of information, skills, experience, innovation and intelligence. ME-EHCPRs system is a conceptual knowledgebase system with the ability to return search result based on the user’s request, request history and subject matter experience. Lots of work is going on to make this system more efficient in capturing, storing, sharing and enhancing the knowledge with a systematic, holistic approach to the sustainable improvement of the handling of knowledge and within the knowledge which may create new knowledge, learn knowledge with context sensitivity. 15 References: 1. Brachman, R.J and H.J Levesque, 1985,” Reading in Knowledge Representation”, Los Altos, CA, USA, Morgan Kauffman. 2. Quillian, M.R., “Semantic Memory”, in M. Minski, Ed., Semantic Information Processing, MIT Press, Cambridge, MA. (1968) 3. M. Minski, 1975, “A Framework of Representing Knowledge”, in P.H. Winston, Ed., The Psychology of Computer Vision, McGraw-Hill, New York. 4. McDermott Drew, Doyle John, 1980, “Non-Monotonic Logic”, Artificial Intelligence, vol.13, pp.41-72 5. Michalski, R.S and P.H. Winston, “Variable Precision Logic”, Artificial Intelligence, 29, Elsevier Science Publisher, B.V. (North-Holland), 121-146. 6. Yiyu Yao, Fei- YueWang and JueWang, “Rule + Exception Strategies for Knowledge Management & Discovery”, LNAI 3642, Springer-Verlag, 69-78, (2005) 7. Bharadwaj, K.K, Jain, N.K, 1992, “Hierarchical Censored Production Rule (HCPR)”, Data and Knowledge Engineering, North Holland, Vol.8. 8. Jain Sarika and N.K. Jain, 2009, “A Generalized Knowledge Representation System for Context Sensitive Reasoning: Generalized HCPRs System”, In: Artificial Intelligence Review, vol. 30, pp. 39–42. Springer, Heidelberg (2009) 9. ChaudharyDeepa, Jain Sarika, Jain N K,” Globalization of EHCPRs System”, International conference( ICUTIT 2011), Ludhiana, 2011. 10. Jain N.K, Jain Sarika, Chaudhary Deepa,” Multilingual EHCPRs system”, National Conference(RTMD-2011), Amity University, India, 2011.” 11. Jain Sarika and N.K. Jain, 2009, “A Generalized Knowledge Representation System for Context Sensitive Reasoning: Generalized HCPRs System”, In: Artificial Intelligence Review, vol. 30, pp. 39–42. Springer, Heidelberg (2009) 12. Jain Sarika and N.K. Jain, 2010, “Acquiring Knowledge in Extended Hierarchical Censored Production Rules (EHCPRs) System”, International Journal of Artificial Life Research 1(4), 10–28. 13. Jain Sarika, Chaudhary Deepa, Jain N.K,” Localization of EHCPRs System in the multilingual domain: An Implementation”, International conference (ICISIL 2011), Patiala, March2011, Proceedings published in CCIS, Vol. 139, Springer, 2011. 14. Jain Sarika, Jain N.K, “learning Techniques in Extended Hierarchical Censored Production Rules (EHCPRs) System”, 2011, AIRE. 15. Jain Sarika, Jain N.K, Chaudhary Deepa,”Extended Hierarchical Censored Production Rules (EHCPRs) System as Decision Support System, International conference on Transforming organizations: Innovative Strategies, MERI, New Delhi, 2010. 16. Jain Sarika, N.K. Jain, and C.K. Goel, 2007, “A Generalized Knowledge Representation System and its Implementation: An Extended Hierarchical Censored Production Rules (EHCPRs) System”, MERI, Journal of Management and IT, vol. 1:1, pp. 88-101. 17. Jain Sarika, N.K. Jain, and C.K. Goel, 2008, “Implementing General Control Scheme in EHCPRs system”, proceedings of second National Conference on Mathematical Techniques: Emerging paradigms for electronics and IT Industries (MATEIT-2008), pp. 347-353. 18. Jain Sarika, N.K. Jain, and C.K. Goel, 2008,”EHCPRs system and management”, Journal of IPEM, vol.3:1, pp. 1-17. 16 19. Jain Sarika, N.K. Jain, and C.K. Goel, 2009, “Reasoning in EHCPRs system”, International journal of open problems in Computer Sc. And mathematics, vol.2:2, pp. 173-193. 20. Jain Sarika, N.K. Jain, and C.K. Goel, 2009, “Representation of Defaults and Constraints in EHCPRs System: An Implementation”, Int. J. Adaptive and Innovative Systems, Vol. 1:2, pp. 105-120, DOI 10.1504/IJAIS.2010.032274 21. Jain, N.K. & K.K. Bharadwaj, and N. Marranghello, 1999, “Extended Hierarchical Censored Production Rules (EHCPRs) System: An approach towards generalized knowledge representation”, Journal of Intelligent System, Freund & Pettman, UK, 9, 259295. 22. Jain, Sarika, Ph. D thesis, India, 2011 23. www.cyc.com 24. Chaudhary Deepa, Yadav Praveen 2012, ” Enriching the knowledge base using Unification Techniques”, Fourth International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, published by Springer. 25. Chaudhary Deepa, N.K. Jain, and Jain Sarika, 2011, “Extracting EHCPRs Rules from existing Knowledge bases”, International Conference on Issues and Challenges in networking, Intelligence and Computing Technologies (ICNICT-2011), KIET,Ghaziabad, U.P. 26. Chaudhary Deepa, Yadav Praveen 2012, ”Integrated Knowledge Base: an Approach to Knowledge Extraction”, International conference, ICNICT, 2012, KIET, MTU, Noida. ……………………………………………………………………………………………. 17