tools@raybed2.UUCP (TOOLS) (01/27/86)
As requested by the author we are reposting the source and documentation of a C inference engine. Address all questions to George Hageman at: UUCP: {asgb!benish}!hageman MAIL: George W. Hageman P.O. Box 11234 Boulder, Colorado 80301 NOTE: RAYTHEON Inc. is not reponsible for the contents and/or consequences of use of this software. This software is totally the work of George Hageman and is being reposted as per his request (see following message). Address all questions, comments, etc. to him. ========================================================================= >From linus!decvax!seismo!hao!asgb!benish!hageman Fri Jan 24 07:31:04 1986 >Subject: Re: C inference engine > > ... it seems that > the probability of getting somthing out to net.and is > inversely proportional to the number of hops it has to go. > > I'll send you all of the shars (inference rulecompiler and > the storm expert). If you could make sure that they are > available at your site either by reposting them from your > end or by some other means it would be appreciated. > > Thanks, > >George [Hageman] ========================================================================= -------------------------CUT HERE---------------------------------------- #!/bin/sh # shar: Shell Archiver # Run the following text with /bin/sh to create: # README # inference.doc sed 's/^X//' << 'SHAR_EOF' > README XFrom linus!decvax!decwrl!pyramid!ut-sally!seismo!hao!asgb!hageman Tue Dec 31 15:31:49 1985 XRelay-Version: version B 2.10 5/3/83; site raybed2.UUCP XPosting-Version: version B 2.10.2 9/18/84; site asgb.UUCP XPath: raybed2!linus!decvax!decwrl!pyramid!ut-sally!seismo!hao!asgb!hageman XFrom: hageman@asgb.UUCP (George W. Hageman) XNewsgroups: net.sources XSubject: Inference engine documentation XMessage-ID: <831@asgb.UUCP> XDate: Tue, 31-Dec-85 15:31:49 EST XArticle-I.D.: asgb.831 XPosted: Tue Dec 31 15:31:49 1985 XDate-Received: Wed, 1-Jan-86 20:25:24 EST XDistribution: na XOrganization: Burroughs Corp. ASG, Boulder Colo. XLines: 1201 X XThe following is the documentation file for an inference engine Xwritten in C. There will be three other submittals to net.souces Xconsisting of the source for a rule compiler, inference engine, and, Xa weather prediction expert rule base including an animals expert. X XHave fun.... X X----------------------- Cut Here ----------------------------- SHAR_EOF sed 's/^X//' << 'SHAR_EOF' > inference.doc X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X INTRODUCTION: X X The software contained in this distribution is copyright (C) by X George Hageman 1985 and is released into the public X domain with the following restrictions: X X (1) This software is intended for non-commertial usage. X (2) I am held save from damages resulting from X its use, and X (3) The following concepts and legal jargon are agreed to X by the user of this software. X X User-supported software concept: X X IF you find use for this software X ANDIF it saves you some development time X THEN send me $10.00 X ANDTHENHYP you will feel good! X X This source code is provided on an "as is" basis without warranty X of any kind, expressed or implied, including but not limited to X the implied warranties of merchantability and fitness for a X particular purpose. The entire risk as to quality and X performance of this software is with you. Should the software X prove defective, you assume the entire cost of all necessary X repair, servicing, or correction. In no event will the author be X liable to you for any damages, including any lost profits, lost X savings, or other incidental or consequential damages arising out X of the use of inability to use this software. In short my X friends, I have done a reasonable amount of work in debugging X this software and I think it is pretty good but, as you know, X there is always some chance that a bug is still lurking around. X If you should happen to be lucky enough to find one, please let X me know so I can make an attempt to fix it. X X The following is a short description of how to use the X inference engine and rule-compiler contained in this software X release. The source and object files for the rule compiler and X the inference engine are contained in the rcomp.lbr and infer.lbr X respectively. There are common files contained in each library. X These common files are header files which are used to define X common terms between the different sources. The most important X header file is the file named "expert.h" which not only contains X common definitions used between the rule compiler and the X inference engine, but has a short description of their usage as X well. This inference engine, and its associated rule compiler, X represents a significant time investment for me, so if you X believe in the shareware concept please remember my address. X X George W. Hageman X P.O. Box 11234 X Boulder, Colorado 80301 X X X X X X George W. Hageman --1-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X This software compiles using the Microsoft C Compiler Rev X 3.0 using the make function which comes with the Microsoft Macro X Assembler Rev. 4.0. I have nothing but good things to say about X these two products and suggest that you consider their purchase X if you are into serious software development for the PC. This X software also compiles and runs under UNIX system V. Use the X UNIXSV flag in the makefile or use a -DUNIXSV when you compile X it. X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X George W. Hageman --2-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X INFERENCE ENGINES: X X An inference engine is merely a program which attempts to X prove consequents given a certain set of antecedents and a set of X rules which define the TRUTH or FALSEness of each consequent in X terms of the antecedents. The consequents, antecedents and X rules for this inference engine are contained in a text file X which is compiled by the rule-compiler into a form the inference X engine can understand. Often these two functions are contained X in the same executeable, but I have decided to split them up to X make the inference engine as small as possible. X X Rules are collections of ANTECEDENTS and CONSEQUENTS formed X into TRUTH statements. Each rule is an attempt state that "If X all of the antecedents for this particular RULE are TRUE, then X all of the consequents connected to this rule are TRUE. If one X or more of the antecedents for a RULE are FALSE, then it is X assumed that this rule cannot prove the TRUTH of the consequents, X but this does not necessarily prove the consequents FALSE since X some other rule may prove them TRUE." Rules must have at least X one ANTECEDENT and at least one CONSEQUENT to be considered X valid. X X Each ANTECEDENT and CONSEQUENT is a simple statement X consisting of a leading KEYWORD, and a FOLLOWING STRING. X KEYWORDS tell the inference engine what the FOLLOWING STRING will X mean or what is to be done with it. The FOLLOWING STRINGs may be X either in upper or lower case and are either statements such as X "THE ANIMAL IS A BAT", or, a pathname to an executeable which X will be loaded and executed depending on what is defined by the X KEYWORD. Strings, except for the number of leading blanks, can be X considered equal only if they are identical. The reason for this X rule will become apparent later. An example of a pathname X FOLLOWING STRING is "/b1/hageman/expert/storm/gt_3200 data.fil". X Note that the strings denoting pathnames should be exactly as X they would be if the pathname were to be given at a terminal, X also, you may include parameters with any pathname. These X parameters are no different than the parameters that you would X use if you were initiating the executeable from the terminal X rather than via the inference engine. Under MS_DOS these path X names can either be upper or lower case, and for the UNIX X operating system, they must correspond to the exact path name. X X X X X X X X X X X X X X X X George W. Hageman --3-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X QUICK AND DIRTY: X X Impatient? Well here are some quick ways to get started X with the inference engine, leave all that reading till later! X X ONE: X X Use your text editor (WS in the Non-document mode only X Please) to create a quick rule file, or use the animals example X contained in this release. Skip to the next page if you want to X find out what the KEYWORDS are and how to use them. X X TWO: X X Compile the rules with the rule-compiler by typing.. X X rulecomp inputfile outputfile X X where the inputfile is the filename of the file containing X your rules, and the outputfile is the file inwhich you want the X compiled rules to be written to. Caution, the rule compiler does X not check for the equivalence of the inputfile and outputfile X filenames, if they are identical you will probably have to type X in your rules again. X X THREE: X X Run the inference engine by typing .. X X inference outputfile X X answer the questions and go back to step ONE if you found an X error with your rules or you want to expand them. X X X X X X X X X X X X X X X X X X X X X X X X X George W. Hageman --4-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X KEYWORDS: X X The following are the KEYWORDS which the rule compiler can X recognize, and a short description of what each means and how X each would be used. Note that the members of each group have X identical meaning and can therefore be substituted for each other X without effecting the sense of the rule. Latter examples will X attempt to demonstrate this fact. X X X X IF, AND, ANDIF: X X These KEYWORDS define the FOLLOWING STRING as an ANTECEDENT, X and the TRUTH sense of the string is TRUE if the string is X TRUE. These KEYWORDS can be used interchangeable without X effecting the sense of the rule being expressed. X X Example: X X IF the animal is a mammal X ANDIF the animal has hooves X AND the animal has horns X X This is equivalent to: X X AND the animal is a mammal X IF the animal has hooves X ANDIF the animal has horns X X Note that since the antecedent part of a rule is essentially X a large AND statement, the order in which the individual X statements are arranged is a matter of esthetics only. X However, it may be more readable to the human, if a certain X order is maintained. X X IFNOT, ANDNOT X X These KEYWORDS are essentially identical to the above X KEYWORDS except that the sense of the statement is reversed. X That is to say that if the following string is TRUE then the X truth value of the statement is FALSE. X X Example: X X IFNOT the animal is a mammal X ANDNOT the animal has smooth skin X ANDNOT the animal breaths air X THEN animal is a fish X X X X X X X X X George W. Hageman --5-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X IFRUN, ANDRUN, ANDIFRUN X X These KEYWORDS tell the inference engine that the FOLLOWING X STRING is to be used as a pathname to an executeable. This X executeable is to be loaded and run and the resultant TRUTH X value returned when the routine exits is the TRUTH value of X the ANTECEDENT statement. Like the AND, IF, ANDIF KEYWORDS X above, each of these may be substituted for any of the X others without effecting the sense of the rule statement. X Note that the full path name of the executeable is not X needed if the executeable file resides in the working X directory from which the inference engine was initiated. X X Example: X X IFRUN /b1/hageman/expert/gt3000 X ANDRUN /b1/hageman/expert/sedir direction.dat X ANDIFRUN falling barompress X THEN sorry about the picnic X X IFNOTRUN, ANDNOTRUN X X These are used as the KEYWORDS above are used -- to initiate X the execution of an ANTECEDENT executeable file, except that X the truth value of the result is reversed as with the IFNOT, X ANDNOT and the ANDIFNOT KEYWORDS. X X Example: X X IFNOTRUN gt3000 X ANDNOTRUN sedir direction.dat X ANDNOTRUN falling barompress X THEN how about a picnic? X X THEN, ANDTHEN, THENHYP, ANDTHENHYP X X These KEYWORDS tell the inference engine that the FOLLOWING X STRING is a CONSEQUENT. If all of the immediately X proceeding ANTECEDENTS have a truth value of TRUE, then the X inference engine INFERS that the CONSEQUENT is TRUE. The X THEN KEYWORDS ending in "HYP" tell the inference engine that X the FOLLOWING STRING is an ending CONCLUSION and no further X processing or inferencing is required. The routine will X exit when one of the THENHYP or ANDTHENHYP CONSEQUENTS are X proven TRUE. Therefore, one should use the "HYP" X CONSEQUENT KEYWORDS with care. X X Examples: X X IF you have an aunt X ANDIF your aunt has a child X THEN you have a cousin X X IF you have a cousin X THENHYP you have at least two relatives X X X George W. Hageman --6-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X THENRUN, ANDTHENRUN, THENRUNHYP, ANDTHENRUNHYP X X These are similar to the THEN, ANDTHEN etc. KEYWORDS except X they perform the loading and execution of the FOLLOWING X STRING path name if they are proven TRUE. The value X returned by the executeable file loaded becomes the value X remembered for the CONSEQUENT. The truth value for a X CONSEQUENT proceeded with the KEYWORDS of THEN or ANDTHEN is X only remembered if it is proven TRUE. However, with the RUN X type of CONSEQUENT since it is initiated only when found to X be proven, the predicate value it returns is remembered even X if it is FALSE. This prevents the rerunning of CONSEQUENT X routines. X X In this manner one can use rules to determine weather or not X a particular routine should be executed, then use the truth X value returned by the routine upon its exit in other rule X statements. An obvious use for such a function would be in X the field of diagnostics. Through a set of rules it could X be determined that a particular diagnostic should be run, X once the diagnostic has been run, further rules could use X the fact of whether the diagnostic test passed (TRUE) or X failed (FALSE) to make decisions about the further isolation X of the hardware failure. X X Example: X X ! X IFNOTRUN isdev1 X IFNOTRUN isdev2 X IFNOTRUN isdev3 X THENHYP there are no devices to run diagnostics on X ! X ! see note below for the following rule X ! X IF isdev1 X ANDIFRUN dev1diag X THENHYP device one is faulty X ! X IFRUN isdev2 X ANDIFRUN dev2diag X THENHYP device two is faulty X ! X IFRUN isdev3 X ANDIFRUN dev3diag X THENHYP device three is faulty X ! X IFNOTRUN dev1diag X IFNOTRUN dev2diag X IFNOTRUN dev3diag X IFRUN isdev1 X ANDRUN isdev2 X THENRUN diag12 X ! X ! X X X George W. Hageman --7-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X ! X IFRUN diag12 X THENHYP device two is suspect remove and re-run test X ! X IFNOTRUN diag12 X THENHYP device one is suspect, remove and re-run test X ! X X Note: X X You have probably noticed that the FOLLOWING STRINGS X associated with the RUN KEYWORDS and the IF, AND etc. X KEYWORDS are interchangeable. This is due to fact that the X TRUTH of a string is kept as a pointer into the string X buffer, and therefore have no information concerning their X nature and only have meaning when used in conjunction with a X KEYWORD. If you are sure that the string "isdev1" will have X its truth determined earlier by running the routine X "isdev1", Then you may use it as a regular string in later X rules, however, if its truth has not been determined then X the inference engine will ask you for the truth of the X statement "isdev1" rather than running the routine. To be X sure use the "RUN" form for the strings which relate to X executeables, they will only be run once as it is, so you X don't really have to keep them straight. X X Notice also that if the first rule is not proved by the X fact that isdev1 turns up being TRUE and therefore the X antecedent statement is FALSE due to the reverse sense of X the IFNOTRUN KEYWORD, then the others will not be run until X they are encountered in other rules containing them. So be X safe and use the RUN forms of the KEYWORDS if you intend the X execution of an object. X X X X X X X X X X X X X X X X X X X X X X X X X George W. Hageman --8-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X USAGE: X X Ok, now that we know what all the key words are, how does X one go about using an inference engine, and more specifically how X does one use this inference engine and what for? X X People usually use inference engines as part of what are X known as expert systems. Expert systems are a study associated X with a branch of software engineering known as Artificial X Intelligence (AI). (I am probably going to get some heat from X that statement). Expert systems are supposed to mimic the way X in which human experts deal with a particular physical or mental X problem. A clear example is an expert system which could X isolate a fault within a complex computer system as well as or X almost as well as its human counterpart. It is apparent that X the computer expert system would lack much of the tactile X resources the human expert would have, but the computer expert X could still be of great value when coupled with a novice computer X user. In this way the computer expert would rely on the human X to perform actions and observations the computer expert is X incapable of doing. The computer expert and the novice then X could form a team which might perform as well as the human expert X alone and at a probably much lower per/hour labor rate. X X Unfortunately, in order to develop an expert system, one X must either be an expert in the area one wants to develop an X expert system for or have a ready access to one. Assuming that X you are or have found one, the following is a description of how X one would use the inference engine and the rule compiler to X produce an expert system. Fortunately one of the sticker tasks X of developing the inference engine has been done, and all you X have to do is develop the rule base, compile it with the rule X compiler and use the resultant compiled rule-base file as a X parameter when you initiate the inference engine. In reality X this is a much tougher job than developing the inference engine. X X Expert systems generally consist of three parts, a X KNOWLEDGE BASE, HUMAN INTERFACE, and an INFERENCE ENGINE. The X following is a short description of each: X X THE RULE or KNOWLEDGE BASE: X X The rules consisting of ANTECEDENTS and CONSEQUENTS are X known as the "KNOWLEDGE BASE" of the expert system. An X additional part of the KNOWLEDGE BASE consists of the executeable X files and their shared data files. The way the "knowledge X engineer" puts these rules together determines how good and/or X effective the resultant expert system becomes. The KNOWLEDGE X BASE is the smarts of the expert system, and the basic data on X which the inference engine is to operate upon. X X X X X X X X George W. Hageman --9-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X THE HUMAN INTERFACE: X X The expert system needs a way to ask the human user about X the TRUTH or FALSENESS of the antecedents contained in the rule X base. This is contained as a part of the inference engine X associated with this release. These routines will ask the user X whether or not FOLLOWING STRINGS are TRUE or FALSE. Additional X human interfaces may be contained in the executeable files. X X THE INFERENCE ENGINE: X X The inference engine released with this software is known as X a backwards chaining inference engine. It works by identifying X consequents and attempting to find rules to prove that each X consequent is TRUE. Once a consequent is proved TRUE, it is X remembered as being TRUE. Each antecedent which is determined X either TRUE or FALSE is remembered so that the user does not have X to be asked more than once to verify a particular statement. X Remember that if a consequent is not proved TRUE, then it does X not necessarily mean that it is FALSE. For more information X consult the "inference.str" file which is a preliminary pseudo X code description of the inference engine. It is not correct X because I have not gone back and up dated it from the X implementation effort (Tom De Marco please forgive me) but, it is X close enough to provide a basis for understanding the code. I X suggest looking at the code to understand how this inference X engine works. I have also left in all of the debug statements X which I found helpful so by modifying the makefile to include the X DEBUG FLAGS, you can observe the inference engine working. X X This inference engine attempts to prove all of the X consequents from the top of the rule base through to the bottom X in a linear way if possible. If however, an antecedent is really X a consequent of a rule, the inference engine will attempt to X prove that consequent even if it occurs later in the rule base. X In this sense, the inference engine will exhibit some forward X chaining characteristics. X X There are several good books on the development of expert X systems, inference engines and the like. I have included a X bibliography which contain the books I consulted to build this X one. X X X X X X X X X X X X X X X X George W. Hageman --10-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X BUILDING EXPERT SYSTEMS: X X The builders of expert systems are sometimes known as X "knowledge engineers". As the name implies, they deal with the X manipulation and representation of knowledge leading to the X development of the Knowledge base the inference engine operates X upon. In order to develop the knowledge base the knowledge X engineer needs either to be an expert in the area for which the X expert system is to be developed or, have ready access to a human X expert in the field. X X The inference engine in this distribution accepts knowledge X in many ways. The first of which are the rules as discussed X above which are relatively simple logical or predicate statements X about the TRUTH of well defined consequents. The other is the X somewhat complex knowledge representation as contained in the X executeable files which may be initiated by the inference engine. X In fact, the inference engine and the rule_compiler each can be X one of these executeable files so you can have recursive expert X systems if you have a mind to! You can even use another X executeable to produce a text file of rules, which then can be X operated on by the rule-compiler and then fed to another X inference engine producing self-modifying or learning expert X system. So even though the inference engine is only 12K and the X rule compiler 10K these are sufficient enough to produce rather X powerful expert systems. X X To develop the knowledge base the knowledge engineer first X must under stand the limitations which are acceptable to the X expert system user. For example, if the user of an animal X identification expert system is not concerned with whether the X expert can differentiate between a snake and a lizard or is X not interested in reptiles at all, then the expert system can be X simplified by leaving out this knowledge. Once the boundaries X of an expert system are well known, the expert system designer X can concentrate on how to define the particulars. This software X release contains two examples of simple expert systems. The X first is the more or less classical animal identification expert, X and the second is a weather predictor expert which demonstrates X the usage of the IFRUN, ANDTHENRUN, etc. KEYWORDS. X X X X X X X X X X X X X X X X X X George W. Hageman --11-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X ANIMALS: X X This is a simple expert which can differentiate between only X certain types of animals -- Mammals and Birds. And among these X two groups it can only tell you that the animal you are thinking X about is either a Giraffe, Zebra, Cheeta, Tiger, Penguin, X albatross, Duck, and so on. The example has been limited to X these few identifications in order to greatly simplify the X development effort and to help demonstrate the strategy of X developing the rules associated with this simple expert system. X X The strategy associated with the development of a consistent X set of rules which will identify a particular animal given X certain physical characteristics to work with is DIVIDE AND X CONQUER. The idea being to use rules which build a decision X tree where each branch of the tree is formed by a rule which can X decide which direction to go at that junction. Since we are X obviously dealing with birds and mammals then we can build our X root branch or the grossest division as a rule which can X differentiate between birds and mammals. Like: X X ! X IF animal gives milk X ANDIF animal has hair X THEN animal is mammal X ! X IFNOT animal is mammal X THEN animal is bird X ! X . X . X X Notice that if the animal is not a mammal we automatically X assume that it is a bird since this is the domain of our expert X system -- it does not consider any other type of animal as a X possibility. If we were to include perhaps reptiles then the X following might be used instead: X X ! X IF animal gives milk X ANDIF animal has hair X THEN animal is mammal X ! X IFNOT animal is mammal X AND animal has feathers X AND animal lays eggs X THEN animal is bird X ! X IFNOT animal is mammal X IFNOT animal is bird X THEN animal is reptile X ! X X X X X X George W. Hageman --12-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X Again the last category is the default and needs no further X definitions because it is within the limitations of the expert X system. X X X Further refinement of the decision tree associated with the X animals expert should build on the knowledge gained by earlier X branching. So one should use the knowledge that the animal has X been identified as a bird to further define the animal. An X example of the further definition of the type of mammal follows: X X ! X IF animal is mammal X ANDIF animal eats meat X ANDIF animal eats little vegetation X THEN animal is carnivore X ! X IFNOT animal is carnivore X ANDNOT animal eats little vegetation X THEN animal is vegetarian X ! X X Finer and finer branching is achieved by this divide and X conquer strategy until the leaves of the tree are reached, These X leaves are the actual hypothesis which end the search for a X particular animal. X X . X . X ! X IF animal is cat X AND animal has tan color X AND animal has stripes X THENHYP animal is tiger X ! X IF animal is cat X AND animal has tan color X AND animal has spots X THENHYP animal is cheeta X ! X . X . X X Notice that "animal is cat" should be a THEN Consequent X somewhere or else the inference engine will simply ask you if the X "animal is cat" statement is TRUE or not -- which may not be X construed as a particularly intelligent thing for an expert X system to do. The intelligence represented by the expert system X is directly related to the intelligence you give it. However, it X is possible to get very confused when there are a large number of X rules for a particular expert system and mistakes in logic or the X development of circular logic occurs. The first will cause X incorrect conclusions to be drawn and the second will cause the X inference engine to crash. Circular logic causes the inference X engine to run out of stack space. X X X George W. Hageman --13-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X A circular argument is an argument which cannot be resolved X because its proof relies on another rule which in turn relies on X proving the first statement before it can be proved such as in: X X ! X IF the second one is true X THEN the first one is true X ! X IF the first one is true X THEN the second one is true X ! X X Or to expand the concept: X X ! X IF the third one is true X THEN the first one is true X ! X IF the first one is true X THEN the second one is true X ! X IF the second one is true X THEN the third on is true X ! X X Usually, when the inference engine tells you that "Stack X overflow" has occurred -- this will be the problem. X X Look at the animal file contained in this release, see how X the rules are built and as an exercise add another animal to be X differentiated like a platypus, and later add a whole class of X animals such as domestic farm animals, or even a division such as X reptiles or insects. X X You will soon notice that your knowledge base will increase X very quickly with each set of animals you want your expert to X differentiate. With this growth of the knowledge base come real X difficulty in keeping the rules correct and non-circular. A X strategy for limiting the complexity for these rules is to use X the IFRUN or THENRUN capability of this inference engine to fire- X up a whole new inference engine which is an expert in one of the X major branches of animals. In this manner one only has to make X the major decisions associated with a class of animals and then X run the expert system which knows how to handle the specific X class of animals. X X X X X X X X X X X X X George W. Hageman --14-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X For example: X X ! X IF animal has feathers X AND animal lays eggs X THEN animal is bird X THENRUNHYP inference.exe birds.cmp X ! X IFNOT animal is bird X AND animal has hair X AND animal gives milk X THEN animal is mammal X THENRUNHYP inference.exe mammals.cmp X ! X X The files "birds.cmp" and "mammals.cmp" are the resultant X compiled files from the text knowledge bases "birds" and X "mammals" which the knowledge engineer would need to produce. X But, as stated above, these files would represent expert systems X knowing only the limited area of birds or mammals and therefore X can be greatly simplified. NOTE: inference.exe returns a TRUE X value if it has proved anything while it ran, and FALSE if it X could not prove anything. With an IBM AT with 512 KBYTES of X memory I was able to load four copies of an inference engine X simultaneously. A good way to see how many your system can deal X with at the same time compile the following test: X X ! X IFRUN INFERENCE.EXE TEST.CMP X THENHYP I am done X ! X X X If this file is named TEST, then compile it using the following: X X rulecomp test test.cmp X X Then, run the inference engine with the test.cmp file as follows: X X inference test.cmp X X X Notice that when any routine cannot be run for some reason X or another, an attempt is made to tell you what went wrong -- out X of memory, can't find it, or some other reason, and the routine X will be assumed to have returned normally with a TRUE predicate X value. This is done so that the inference engine won't simply X die at some mysterious point. The "I infer that : I am done" at X the top was the last inference engine which could be loaded which X could run but could not spawn a new process, the next one down is X the last one which could spawn one, and any others below this X line plus this one will tell you the number of levels of the X inference engine you can run on your system. X X X X X George W. Hageman --15-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X THE WEATHER EXPERT: X X The other expert system knowledge base included with this X release is a weather predicting expert. This expert system X demonstrates the use of executeable files to expand the X abilities of the inference engine to deal with other forms of X knowledge. Look a the source files for the weather expert, X notice how each member of this set of routines uses a common file X for the transfer of needed data. The need of a file for this X transfer of data is done because it was the only standard form of X data transmission which was not machine dependent according to X MS-DOS and UNIX operating systems. Specific methods for dealing X with this problem can be found for your machine which can greatly X speed up this cumbersome data transfer method -- but it works. X X UNIX and the Microsoft C compiler allows a routine to exit X with a value which will be returned to the parent process. This X method is used to allow each executeable to return its TRUTH- X VALUE or PREDICATE-VALUE back to the inference engine. The X routine runRoutine(consequent) performs this task. If you look X at the file runrouti.c you can see that this is done with the X "exit(value) ;" statement. The values used to indicate the TRUTH X and FALSEness of the routine are "RETURN_ROUTINE_TRUE" and X "RETURN_ROUTINE_FALSE" as contained in the header file X "routine.h". This header file should be included in any routine X which returns a TRUE/FALSE value to the inference engine. X X The strategy for using this method of expanding the X knowledge base is essentially the same as that for the animal X type expert system, except that it is noticed that the simple X form of the knowledge base does not have the capability to X perform some of the functions needed. Cases where complex X questions or the manipulation of data are necessary must resort X to the use of executeable files which can deal with them. Such X is the case for the weather predicting expert system. X X The weather expert must deal with such data as barometric X pressure, wind direction, and the current rate of change of the X barometric pressure. Additional data such as cloud conditions X can be handled by the predicate functions of the inference X engine. Again the strategy is to divide and conquer by X determining which information needs to be gathered by the X executeable portion of the expert system, what routines must be X used to convert this data into a form which is usable by the X inference engine i.e. TRUE or FALSE, and, what information can X be gathered directly by the inference engine. Once these X decisions are made then a decision tree can be built in a similar X manner to the one built for the animal expert but also X incorporating the executeable files where appropriate. Look at X the file "weather" and at each of the source files for the X executeable portion of the weather expert. X X X X X X X George W. Hageman --16-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X Notice that there is a "main" routine (even though all of X the programs are stand-a-lone programs and are have the name X "main"). This routine is in the file "MESSAGE1.C", and provides X the data entry for all of the data needed by the expert system. X The routine explains to the user what is needed, checks for X reasonable responses, and writes the data to a disk file for X later use by the other routines associated with this system. X These other routines, when initiated, have the task of reading X the disk file produced by the "MESSAGE1.EXE" executeable, check X for some conditions, and return "ROUTINE_RETURN_TRUE", if the X conditions are met and "ROUTINE_RETURN_FALSE" if they are not. X X In this manner the knowledge engineer can make expert X systems of a higher complexity and usefulness than would X otherwise be possible. X X CONCLUSION: X X I hope that this short definition of the inference engine is X enough to get you started into the fascinating field of AI. X There are some useful additions the enthusiastic programmer could X make to the inference engine to both enhance its usefulness and X its ability to assist in the debugging of knowledge basses. A X "Why" function which shows the complete logical path which lead X to the question being asked, showing each statement as being X known or unknown and if known what its predicate value is, would X be very helpful. Further, the addition of different KEYWORDS X such as an OR function, might expand the usefulness of the X inference engine. I may include these in my next release of this X software but If you have made such an addition -- I will include X them in the next release and refund your $10.00 if you have been X so good as to send it to me. X X Good luck and if you have any questions or would like to X discuss this concept please drop me a line. X X Thanks, X X George W. Hageman X X X X X X X X X X X X X X X X X X X George W. Hageman --17-- X X X X X X INFERENCE -- SOFTMAN ENTERPRIZES -- Dec. 30, 1985 X X X BIBLIOGRAPHY: X X The following books and articles were helpful in the X development of this inference engine. X X MVP-FORTH EXPERT SYSTEM TOOLKIT, Jack Park, Mountain View X Press, Inc. P.O. Box 4656 Mountain View, CA 94040 Phone: (415)- X 961-4130. X X MVP-FORTH EXPERT-2 TUTORIAL, Mitch Derick and Linda Derick, X Mountain View Press. X X INSIDE F83, C. H. Ting, OFFETE ENTERPRISES, INC. Available X from Moutain View Press. X X Expert Systems and the Weather, Jack Park, Dr. Dobb's X Journal, April 1984, pp. 24-28. X X Programming in Prolog, William F. Clocksin and Christopher X S. Mellish, Springer-Verlag X X LISP, Patrick H. Winston and Berthold Klaus and Paul Horn, X Addison Weseley. X X A special thankyou to Jack Park and the MVP-FORTH EXPERT X SYSTEM TOOLKIT. Many of the ideas in this document and the X development environment afforded by FORTH were the starting point X for many of the ideas developed in this inference engine. If you X are into FORTH this is an excellent source of information on the X subject. X X X X X X X X X X X X X X X X X X X X X X X X X X X X George W. Hageman --18-- X X X X X---------------------- Cut Here -------------------------------- X XGeorge Hageman ( ...bmcg!asgb!benish!hageman ) X XHappy New Year! X X SHAR_EOF exit
tools@raybed2.UUCP (TOOLS) (01/27/86)
As requested by the author we are reposting the source and documentation of a C inference engine. Address all questions to George Hageman at: UUCP: {asgb!benish}!hageman MAIL: George W. Hageman P.O. Box 11234 Boulder, Colorado 80301 NOTE: RAYTHEON Inc. is not reponsible for the contents and/or consequences of use of this software. This software is totally the work of George Hageman and is being reposted as per his request (see following message). Address all questions, comments, etc. to him. ========================================================================= >From linus!decvax!seismo!hao!asgb!benish!hageman Fri Jan 24 07:31:04 1986 >Subject: Re: C inference engine > > ... it seems that > the probability of getting somthing out to net.and is > inversely proportional to the number of hops it has to go. > > I'll send you all of the shars (inference rulecompiler and > the storm expert). If you could make sure that they are > available at your site either by reposting them from your > end or by some other means it would be appreciated. > > Thanks, > >George [Hageman] ========================================================================= _____CUT for inference.sh_____ #! /bin/sh # This is a shell archive, meaning: # 1. Remove everything above the #! /bin/sh line. # 2. Save the resulting text in a file. # 3. Execute the file with /bin/sh (not csh) to create the files: # expert.h # infer.h # inference.h # keywords.h # routine.h # gettruth.c # inference.c # remante.c # runrouti.c # verify.c # verifytr.c # weknow.c # inference.str # makeinfe # makercom # README # This archive created: Sun Jan 12 16:12:08 1986 export PATH; PATH=/bin:$PATH if test -f 'expert.h' then echo shar: will not over-write existing file "'expert.h'" else cat << \SHAR_EOF > 'expert.h' /************************************************************************* ** ** ** The software contained in this distribution is copyright (C) ** ** by George Hageman 1985 and is released into the public ** ** domain with the following restrictions: ** ** ** ** (1) This software is intended for non-commertial ** ** usage. ** ** (2) I am held save from damages resulting from ** ** its use, and ** ** (3) The following concepts and legal jargon are ** ** agreed to by the user of this software. ** ** ** ** User-supported software concept: ** ** ** ** IF you find use for this software ** ** ANDIF it saves you some development time ** ** THEN send me $10.00 ** ** ANDTHENHYP you will feel good! ** ** ** ** ** ** This source code is provided on an "as is" basis without ** ** warranty of any kind, expressed or implied, including but ** ** not limited to the implied warranties of merchantability ** ** and fitness for a particular purpose. The entire risk as ** ** to quality and performance of this software is with you. ** ** Should the software prove defective, you assume the entire ** ** cost of all necessary repair, servicing, or correction. In ** ** no event will the author be liable to you for any damages, ** ** including any lost profits, lost savings, or other ** ** incidental or consequential damages arising out of the use ** ** of inability to use this software. In short my friends, I ** ** have done a reasonable ammount of work in debugging this ** ** software and I think it is pretty good but, as you know, ** ** there is always some chance that a bug is still lurking ** ** around. If you should happen to be lucky enough to find one, ** ** please let me know so I can make an attempt to fix it. ** ** ** ** Thanks, ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *************************************************************************/ /* ** These are the structures of the rulebase which will ** be used to compile the rules into. */ #define FALSE 0 #define TRUE -1 #define MAX_STRING_BUFF 5000 #define MAX_STR_LEN 100 #define MAX_RULE_STATEMENTS 500 #define MAX_HYPS 250 #define ANTECEDENT 1 #define CONSEQUENT 2 #define COMMENT_CHAR '!' #define BLANK 0x20 #define EOL 0x0a #define KEY_EOF -2 #define LINE_ERROR -3 #define KEY_WORD_ERROR -4 #define ERROR -5 #define STR_LEN_ERROR -6 /* ** Other definitions of key words */ #define AND_N 0 #define ANDIF_N 1 #define ANDIFRUN_N 2 #define ANDNOT_N 3 #define ANDNOTRUN_N 4 #define ANDRUN_N 5 #define ANDTHEN_N 6 #define ANDTHENHYP 7 #define ANDTHENRUN_N 8 #define ANDTHENRUNHYP_N 9 #define IF_N 10 #define IFNOT_N 11 #define IFNOTRUN_N 12 #define IFRUN_N 13 #define THEN_N 14 #define THENHYP_N 15 #define THENRUN_N 16 #define THENRUNHYP_N 17 /* ** Flag definitions: */ #define STRING_TRUE 1 #define STRING_FALSE 2 #define ROUTINE_TRUE 3 #define ROUTINE_FALSE 4 #define STRING_TRUE_HYP 5 #define ROUTINE_TRUE_HYP 6 #define NUM_KEYWORDS 18 struct rule_statement_r { int flag ; /* logical flag for inference engine */ int string ; /* offset into string buffer */ }; /* ** rules are compiled into the array rules in the folloiwng form: ** ** antecedent-group consequent-group ** ... ** antecedent-group consequent-group ** end-group ** ** Each group of consequences and antecedents ** are compiled in a group like the following: ** ** flag pointer flag pointer ... flag pointer 0-flag 0-pointer ** ** The end-group is merely: ** ** 0-flag 0-pointer 0-flag 0-pointer 0-flag 0-pointer ** ** flags are used by the inference engine to determine what to ** do with the following string pointer. ** string pointers are merely offsets into the string array. ** The pointers may either point ** to a string which is a rule statement such as "the animal has wings" ** or is a UNIX pathname for a particular routine which is to be ** executed such as "/g1/hageman/Diagnostics/Disk1diag". This ** routine will then be executed and will return either a true or ** false indication. Latter versions of the inference engin may be ** capable of returning more than this via some pipe-line mechanism or ** other. ** ** Once an anicedent whether string or routine is verified it is placed ** in either a known-true or known-false stack for later verification ** in other rules which use them. In short they only have to be verified ** once. ** ** Examples of a rule structure are: ** ** IFNOT the animal is a bird ** AND the animal has wings ** ANDNOT the animal lives in caves ** AND the animal is nocternal ** THEN the animal is a bat ** IF the animal is a bat ** ANDRUN /g1/hageman/Src/Expert/speed_of_bat ** THENHYP the bat is out of hell ** IF the animal is a bat ** ANDNOTRUN /g1/hageman/Src/Expert/speed_of_bat ** THENHYP the bat is out of cave ** */ SHAR_EOF fi # end of overwriting check if test -f 'infer.h' then echo shar: will not over-write existing file "'infer.h'" else cat << \SHAR_EOF > 'infer.h' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /* ** the following are the global common variables which ** are used in the inference engine... ** ** all routines except inference.c should have this ** file included. */ #define MAX_KNOWN 500 int numHypot, hypStack[MAX_HYPS],strBuffOfst ; char strBuff[MAX_STRING_BUFF] ; int ruleBuffOfst ; int knownTrue[MAX_KNOWN], knownFalse[MAX_KNOWN] ; int numTrue, numFalse ; struct rule_statement_r ruleBuff[MAX_RULE_STATEMENTS] ; SHAR_EOF fi # end of overwriting check if test -f 'inference.h' then echo shar: will not over-write existing file "'inference.h'" else cat << \SHAR_EOF > 'inference.h' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /************************************************************************* ** ** ** The software contained in this distribution is copyright (C) ** ** by George Hageman 1985 and is released into the public ** ** domain with the following restrictions: ** ** ** ** (1) This software is intended for non-commertial ** ** usage. ** ** (2) I am held save from damages resulting from ** ** its use, and ** ** (3) The following concepts and legal jargon are ** ** agreed to by the user of this software. ** ** ** ** User-supported software concept: ** ** ** ** IF you find use for this software ** ** ANDIF it saves you some development time ** ** THEN send me $10.00 ** ** ANDTHENHYP you will feel good! ** ** ** ** ** ** This source code is provided on an "as is" basis without ** ** warranty of any kind, expressed or implied, including but ** ** not limited to the implied warranties of merchantability ** ** and fitness for a particular purpose. The entire risk as ** ** to quality and performance of this software is with you. ** ** Should the software prove defective, you assume the entire ** ** cost of all necessary repair, servicing, or correction. In ** ** no event will the author be liable to you for any damages, ** ** including any lost profits, lost savings, or other ** ** incidental or consequential damages arising out of the use ** ** of inability to use this software. In short my friends, I ** ** have done a reasonable ammount of work in debugging this ** ** software and I think it is pretty good but, as you know, ** ** there is always some chance that a bug is still lurking ** ** around. If you should happen to be lucky enough to find one, ** ** please let me know so I can make an attempt to fix it. ** ** ** ** Thanks, ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *************************************************************************/ /* Expert system inference engine This inference engine is backwards-chaining only and features the running of binary files if: 1) they are antecedents associated with a particuar consequent being proved, or 2) they are consequents which have been proven true by verify(). their actual predicate value will be determined by their returned result after running. This inference engine is designed with diagnostics in mind and so will probably be best suited for this application. Later revisons will include forward-chaining so that the user will have the opportunity to give pre-existant conditons, or that these my be supplied by the calling process. (If you cant tell by the above description -- I am very excited about the possibilties presented in this form of computer control of the diagnostic process... Geo.) See structure design for details of operation, but basically the inference reads in all of the compiled information as produced by the rule compiler. it proceeds to attempt to prove each consequent by proving the truth or falseness of any antecedent associated with this consequent. if any antecedent of a consequent turns out to be a consequent itself, then the inference engine will recursively attempt to prove this consequent. the process is complete when all of the predicate values of the consequents has been determined. Additional features which I may put in at a later time is the abiltiy for the inference engine to expalin itself to the user when the user asks why the inference engine needs to know the predicate value of a particular antecedent. This will be done by forward and backward chaining of predicat clauses, the truth of each will be displayed. */ #define MAX_ANTECEDENTS 25 extern int numHypot, hypStack[],strBuffOfst ; extern char strBuff[] ; extern int ruleBuffOfst ; extern int knownTrue[], knownFalse[] ; extern int numTrue, numFalse ; extern struct rule_statement_r ruleBuff[] ; SHAR_EOF fi # end of overwriting check if test -f 'keywords.h' then echo shar: will not over-write existing file "'keywords.h'" else cat << \SHAR_EOF > 'keywords.h' char *keyWords[NUM_KEYWORDS] = { "AND ", "ANDIF ", "ANDIFRUN ", "ANDNOT ", "ANDNOTRUN ", "ANDRUN ", "ANDTHEN ", "ANDTHENHYP ", "ANDTHENRUN ", "ANDTHENRUNHYP ", "IF ", "IFNOT ", "IFNOTRUN ", "IFRUN ", "THEN ", "THENHYP ", "THENRUN ", "THENRUNHYP " } ; SHAR_EOF fi # end of overwriting check if test -f 'routine.h' then echo shar: will not over-write existing file "'routine.h'" else cat << \SHAR_EOF > 'routine.h' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /* ** these are the two return values ** which must be returned as the exit ** value. Any other will result in ** an assumption that the result is true ** or that some sort of error occured. */ #define RETURN_ROUTINE_TRUE 254 #define RETURN_ROUTINE_FALSE 255 SHAR_EOF fi # end of overwriting check if test -f 'gettruth.c' then echo shar: will not over-write existing file "'gettruth.c'" else cat << \SHAR_EOF > 'gettruth.c' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /************************************************* ** ** getTruth(antecedent) ** ** asks user for the truth of a string or ** returns -- ** TRUE if user says the statement is TRUE ** FALSE if the user says the statement is FALSE ** *************************************************/ #include <stdio.h> #ifdef MSDOS #include <conio.h> #endif #include "expert.h" #include "inference.h" int getTruth(cnsquent) int cnsquent ; { int done,c ; done = FALSE ; while(!done) { printf("\n Is the following statement True? (T/F,Y/N)\n\n ") ; printf("%s ?",&strBuff[ruleBuff[cnsquent].string]) ; #ifdef MSDOS c = getche() ; #endif #ifdef UNIXSV c = getchar() ; getchar() ; #endif switch(c) { case 'y' : case 'Y' : case 't' : case 'T' : printf("\n\n") ; return(TRUE) ; case 'n' : case 'N' : case 'f' : case 'F' : printf("\n\n") ; return(FALSE) ; case 'w' : case 'W' : printf("\n Why is not implemented \n") ; default : printf("\n Please try again \"T\" or \"F\" \n ") ; } } } SHAR_EOF fi # end of overwriting check if test -f 'inference.c' then echo shar: will not over-write existing file "'inference.c'" else cat << \SHAR_EOF > 'inference.c' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /******************************************************************* ** ** inference engine main routine ** *******************************************************************/ #include <stdio.h> #include <string.h> #include "expert.h" #include "routine.h" #define MAX_KNOWN 100 int numHypot, hypStack[MAX_HYPS],strBuffOfst ; char strBuff[MAX_STRING_BUFF] ; int ruleBuffOfst ; int knownTrue[MAX_KNOWN], knownFalse[MAX_KNOWN] ; int numTrue, numFalse ; struct rule_statement_r ruleBuff[MAX_RULE_STATEMENTS] ; int main(argc,argv) int argc ; char **argv ; { int i,consequent ; int proved ; int p_value ; FILE *infile ; for( proved = 0; proved < MAX_STRING_BUFF; proved ++ ) strBuff[proved] = 0 ; proved = FALSE ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP argc=%d ",argc) ; #endif if(argc != 2 ) { fprintf(stdout, "\n\n Usage: inference in.file \n " ) ; exit(RETURN_ROUTINE_FALSE) ; } infile = fopen( argv[1], "rb" ); if(infile == NULL) { fprintf(stdout,"\n\n Cannot open input file %s \n ", argv[1]); exit(RETURN_ROUTINE_FALSE) ; } for(i=0;i<MAX_KNOWN;i++) knownTrue[i]=knownFalse[i]=0 ; /* ** ** read in the compiled rules ** */ fread(&numHypot,sizeof(int),1,infile) ; fread(hypStack,sizeof(int),numHypot,infile) ; fread(&ruleBuffOfst,sizeof(int),1,infile) ; fread(ruleBuff,2*sizeof(int),ruleBuffOfst,infile) ; fread(&strBuffOfst,sizeof(int),1,infile) ; fread(strBuff,1,strBuffOfst,infile) ; #ifdef DEBUG printf("\nDEBUG-main, numHypot = %d",numHypot) ; for(i=0;i<numHypot;i++) { printf("\nDEBUG-main, consequent[%d]= %d, string=%s",i,hypStack[i], &strBuff[(ruleBuff[hypStack[i]].string)] ) ; } printf("\nDEBUG-main, number of rules = %d",ruleBuffOfst) ; printf("\nDEBUG-main, number of bytes in stringbuffer=%d",strBuffOfst) ; for(i=0;i<ruleBuffOfst;i++) { if(ruleBuff[i].flag !=0) { printf("\nDEBUG-main, rule[%d].flag=%d, rule[%d].string= %d->%s" ,i,ruleBuff[i].flag,i,ruleBuff[i].string,&strBuff[ruleBuff[i].string]) ; } } printf("\n") ; #endif for( i=0 ; i < numHypot ; i++ ) { consequent = hypStack[i] ; #ifdef DEBUG printf("\nDEBUG-main, consequent = %d ",consequent ) ; #endif if(weKnow(consequent,&p_value) == TRUE) { #ifdef DEBUG printf("\nDEBUG-main, we knew this consequent was ") ; if(p_value == TRUE) printf("-- TRUE") ; else printf("-- FALSE") ; #endif continue ; } if ( verify(consequent) == TRUE ) { #ifdef DEBUG printf("\nDEBUG-main, consequent verified TRUE " ) ; #endif if( (ruleBuff[consequent].flag == ROUTINE_TRUE) || (ruleBuff[consequent].flag == ROUTINE_TRUE_HYP) ) { if(weKnow(consequent,&p_value) == TRUE) continue ; #ifdef DEBUG printf("\nRuning Routine %s",&strBuff[ruleBuff[consequent].string]) ; #endif if (runRoutine(consequent) == TRUE) { knownTrue[numTrue++]=ruleBuff[consequent].string ; #ifdef DEBUG printf(" -- TRUE\n") ; #endif if(ruleBuff[consequent].flag == ROUTINE_TRUE_HYP) { printf("\nCONCLUSION\n") ; exit(RETURN_ROUTINE_TRUE) ; } } else { knownFalse[numFalse++]=ruleBuff[consequent].string ; #ifdef DEBUG printf(" -- FALSE\n") ; #endif } } else { knownTrue[numTrue++]=ruleBuff[consequent].string ; proved = TRUE ; printf("\nI infer that : %s\n",&strBuff[ruleBuff[consequent].string]) ; if(ruleBuff[consequent].flag == STRING_TRUE_HYP) { printf("\nCONCLUSION\n") ; exit(RETURN_ROUTINE_TRUE) ; } } } else { #ifdef DEBUG printf("\nDEBUG-main, consequent not proved " ) ; #endif } } if(proved == FALSE) { printf("\n I can't prove anything\n") ; exit(RETURN_ROUTINE_FALSE) ; } exit(RETURN_ROUTINE_TRUE) ; } /* --<<hidden tof */ /****************************************************** ** ** known(hypot,knownFile,numKnown) ** ** checks to see if hypot is in the stack knownFile of length ** numKnown ** ** returns true if known, false otherwise ** ******************************************************/ known(hypot,knownFile,numKnown) int hypot,numKnown ; int knownFile[] ; { int i ; for (i = 0 ; i < numKnown ; i++ ) if (ruleBuff[hypot].string == knownFile[i] ) return(TRUE) ; return(FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'remante.c' then echo shar: will not over-write existing file "'remante.c'" else cat << \SHAR_EOF > 'remante.c' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /*********************************************** ** ** remAnte(antecedent) ** ** returns the truth value of the fact to be remembered ** similar to verify except that the fact is a known antecedent ** and is not a consequent of any rule. And therefore can be remembered ** false as well as true. ** ************************************************/ #include <stdio.h> #include "expert.h" #include "inference.h" int remAnte(antecedent) int antecedent ; { int p_value ; switch(ruleBuff[antecedent].flag) { case STRING_TRUE : case STRING_TRUE_HYP: knownTrue[numTrue++]=ruleBuff[antecedent].string ; return(TRUE) ; case STRING_FALSE : knownTrue[numTrue++]=ruleBuff[antecedent].string ; return(FALSE) ; default: /* routine to run */ if(weKnow(antecedent,&p_value) == TRUE) return(p_value) ; if( runRoutine(antecedent) == TRUE ) { knownTrue[numTrue++]=ruleBuff[antecedent].string ; if((ruleBuff[antecedent].flag == ROUTINE_TRUE) || (ruleBuff[antecedent].flag == ROUTINE_TRUE_HYP)) { return(TRUE) ; } else { return(FALSE) ; } } else { knownFalse[numFalse++]=ruleBuff[antecedent].string ; if(ruleBuff[antecedent].flag == ROUTINE_FALSE) { return(TRUE) ; } else { return(FALSE) ; } } } } SHAR_EOF fi # end of overwriting check if test -f 'runrouti.c' then echo shar: will not over-write existing file "'runrouti.c'" else cat << \SHAR_EOF > 'runrouti.c' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /***************************************************************** ** ** runRoutine(antecedent) ** ** spawns the process with the path name specified in ** ** ruleBuff[antecedent].string ** ** and returns the value as TRUE or FALSE depending on ** the value returned from the exit() command from the spawnd routine. ** ** the routine returns TRUE if there is any problem with spawning ** the specified executable. ** ******************************************************************/ #define MAX_ARGS 20 #include <stdio.h> #ifdef MSDOS #include <process.h> #endif #include <errno.h> #include "expert.h" #include "inference.h" #include "routine.h" int runRoutine(cnsquent) int cnsquent ; { extern int errno ; #ifdef UNIXSV int pnid ; #endif int i,argc,p_value,numChars ; char buffer[MAX_STR_LEN], *string_p; char *argv[MAX_ARGS] ; /* ** copy string to buffer to get parameters */ string_p = &strBuff[ruleBuff[cnsquent].string] ; for (numChars = 0 ; numChars < MAX_STR_LEN ; numChars++) { buffer[numChars]= *( string_p + numChars ) ; if(buffer[numChars] == NULL) break ; } #ifdef DEBUG printf("\nDEBUG -- runroutine -- copied string is %s\n",buffer) ; #endif /* ** set the argv(alues) to the proper location within the buffer */ argc = 1 ; argv[0] = buffer ; for(i=0;i<numChars;i++) { #ifdef DEBUG printf("\n DEBUG -- runroutine parameters i = %d, char = %c \n",i,buffer[i]) ; #endif if(buffer[i] == NULL) { break ; } if(buffer[i] == BLANK) { buffer[i] = NULL ; while( buffer[++i] == BLANK ) ; if(buffer[i] == NULL) { break ; } argv[argc++] = &buffer[i] ; if(argc == MAX_ARGS) { printf("\n maximum arguments exceeded for %s\n",string_p); argc -= 1 ; break ; } } } argv[argc]=NULL ; #ifdef DEBUG for( i = 0 ; i < argc ; i++) { printf("\n argv[%d] = %s\n",i,argv[i]) ; } printf("\nRunning Routine %s ",argv[0] ) ; #endif #ifdef MSDOS p_value=spawnv(P_WAIT,argv[0],argv ) ; #endif #ifdef UNIXSV pnid = fork() ; if(pnid == -1) { printf("\nFork failure! Running %s -- returning TRUE \n",argv[0]) ; return(TRUE) ; } if(pnid != 0 ) /* parent */ { wait(&p_value) ; if(p_value != -1) p_value = (p_value >> 8 ) & 0x0ff ; } else /* child */ { execv(argv[0],argv) ; } #endif /* ** The return value is set by the routine having an exit(X) where ** X is the value to be returned... ** There is a problem since the return value can also provide an ** indication that there was some problem with the attempt as follows: */ if(p_value == RETURN_ROUTINE_TRUE) { #ifdef DEBUG printf(" -- TRUE\n") ; #endif return(TRUE) ; } if(p_value == RETURN_ROUTINE_FALSE) { #ifdef DEBUG printf(" -- FALSE \n") ; #endif return(FALSE) ; } if(p_value) switch(errno) { case ENOENT : printf("\n Executable file %s not found assumed TRUE\n",argv[0]) ; return(TRUE) ; case ENOEXEC : printf("\n File %s is not executable assumed TRUE\n",argv[0]) ; return(TRUE) ; case ENOMEM : printf("\ Not enough memory to run -- assumed TRUE\n") ; return(TRUE) ; } printf("\n Routine did not return either ROUTINE_TRUE or ROUTINE_FALSE assumed TRUE\n") ; return(TRUE) ; } SHAR_EOF fi # end of overwriting check if test -f 'verify.c' then echo shar: will not over-write existing file "'verify.c'" else cat << \SHAR_EOF > 'verify.c' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /******************************************************** ** ** verify(consequent) ** ** finds the truth about the consequent -- returns ** TRUE if consequent is proved (all antecedents are TRUE) ** FALSE if any of the antecedents are FALSE ** ********************************************************/ #include <stdio.h> #include "expert.h" #include "inference.h" int verify(cnsquent) int cnsquent ; { int i,j,k,m,n ; int antecedent[MAX_ANTECEDENTS] ; int consequent[MAX_ANTECEDENTS] ; int p_value ; /* predicate value */ #ifdef DEBUG int di ; for(di=0;di<numTrue;di++) printf("\nDEBUG-verify knownTrueFact = %d",knownTrue[di]) ; for(di=0;di<numFalse;di++) printf("\nDEBUG-verify knownFalseFact = %d",knownFalse[di]) ; #endif /* ** ** get all of the antecedents for the consequent ** ** First locate the antecedents -- should be directly in front ** of the consequent, delimited by a consequent with a flag of zero */ #ifdef DEBUG printf("\nDEBUG -- verify consequent = %d",cnsquent ) ; #endif j = 0 ; for(i=cnsquent; i>=0 ; i--) { if(ruleBuff[i].flag == 0 ) break ; } if(i == -1) { printf("\n Bad Consequent, has no antecedents! returning TRUE value \n ") ; return(TRUE); } for(i = i-1 ;i>=0; i--) { if(ruleBuff[i].flag != 0) antecedent[j++]=i ; else break ; } if(j==0) { printf("\n Bad Consequent, has no antecedents! returning TRUE value \n ") ; return(TRUE); } #ifdef DEBUG printf("\nDEBUG -- verify antecedents = ") ; for(di=0; di < j; di++) printf("\n %d -- %d",di,antecedent[di]) ; #endif /* ** at this point we should have some antecedents in the antecedent ** stack so now lets see if each can be proved, and if there are ** any consequents which will need verification. */ /* ** main verificaiton loop: */ for(i=j-1 ; i >= 0 ; i--) /* for all of the antecedents in our stack */ { /* ** determine if the antecedent is itself a consequent ** ** compare value of the string pointer of the antecedent needs to ** be compaired with the value of the string pointer of all of the ** consequents, if there is a match then the antecedent is a consequent ** ** There may be more ** than one consequent and this is handled below since all of these ** must be false before we give up hope that one will be verified-- ** REMEMBER -- consequents are not remembered FALSE they can only be ** remembered when they are true -- FALSEness for a consequent merely ** means that this particular rule did not verify it , some other one ** might. ** */ for(k=0; k< numHypot; k++ ) if(ruleBuff[hypStack[k]].string == ruleBuff[antecedent[i]].string) break ; if(k != numHypot) /* we have an antecedent which is a consequent */ { #ifdef DEBUG printf("\nDEBUG -- verify antecedent %d is consequent %d",i, antecedent[i] ) ; #endif /* ** What we have is an antecedent which is a consequent of another ** rule or rules. What is needed then is to place each of these consequents ** into a stack and prove them one at a time. We will return truth ** if any of these are proven true and return false only when all of ** them are false. We can use veriry recursively in this case to ** verify each one. ** ** get all consequents matching hypStack[k].string into a stack ** look for truth of any consequent. ** if consequent is true (according to flag) return true. ** if all consequents are false then return false. */ n = 0 ; for( m = 0 ; m < numHypot ; m++) { if(ruleBuff[antecedent[i]].string == ruleBuff[hypStack[m]].string) { #ifdef DEBUG printf("\nDEBUG--consequent stack(%d) = %d",n,hypStack[m]) ; #endif consequent[n++] = hypStack[m] ; } } /* ** verify each consequent */ p_value = FALSE ; for(m = 0 ; m < n ; m++) { #ifdef DEBUG printf("\nDEBUG -- verify(2) consequent = %d",consequent[m] ) ; #endif if( verify(consequent[m]) == TRUE ) { p_value = TRUE ; if(known(consequent[m],knownTrue,numTrue) == FALSE) { printf("\nI infer that : %s\n",&strBuff[ruleBuff[consequent[m]].string]) ; knownTrue[numTrue++]=ruleBuff[consequent[m]].string ; } if(remAnte(antecedent[i]) == TRUE) { break ; } else { return(FALSE) ; } } } if(p_value == FALSE) /* all of the consequents were not proved */ { switch(ruleBuff[antecedent[i]].flag) { case STRING_FALSE : case ROUTINE_FALSE : continue ; case STRING_TRUE : case STRING_TRUE_HYP : case ROUTINE_TRUE : case ROUTINE_TRUE_HYP : return(FALSE) ; } } else /* at least one was known */ { switch(ruleBuff[antecedent[i]].flag) { case STRING_TRUE : case STRING_TRUE_HYP : case ROUTINE_TRUE: case ROUTINE_TRUE_HYP: continue ; case STRING_FALSE : case ROUTINE_FALSE : return(FALSE) ; } } } else /* we have a plane old string or routine antecedent */ { if(weKnow(antecedent[i],&p_value) == TRUE) { if(p_value == TRUE) continue ; else return(FALSE) ; } /* ** Things arent known and are simple consequents so prove them ** either by asking the user or by running the routine */ if(verifyTruth(antecedent[i]) == TRUE) continue ; else return(FALSE) ; } } /* ** Everything was TRUE in the big and statement so return it */ return(TRUE) ; } SHAR_EOF fi # end of overwriting check if test -f 'verifytr.c' then echo shar: will not over-write existing file "'verifytr.c'" else cat << \SHAR_EOF > 'verifytr.c' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /***************************************************** ** ** verifyTruth(antecedent) ; ** ** This routine verifies the truth of a string or routine which ** is not a consequnt of a rule (ie an antecedent) ** ** The routine remembers the final state of the antecedent in ** the knownTrue, or knownFalse stacks ** ** accomplishes task either by running the routine or by ** asking the user for the specific truth of a statement ** ** returns -- ** the "true" predicate value of the antecedent ** according to its .flag: ** ** TRUE if the antecedent phrase is TRUE and ** the antecedent .flag indicates positive, ** FALSE if the antecedent phrase is TRUE and ** the antecedent .flag indicates negative. ** etc. ** *******************************************************/ #include <stdio.h> #include "expert.h" #include "inference.h" int verifyTruth(antecedent) int antecedent ; { switch(ruleBuff[antecedent].flag) { case STRING_TRUE : case STRING_TRUE_HYP: if( getTruth(antecedent) == TRUE) { knownTrue[numTrue++] = ruleBuff[antecedent].string ; return(TRUE) ; } else { knownFalse[numFalse++] = ruleBuff[antecedent].string ; return(FALSE) ; } case STRING_FALSE : if( getTruth(antecedent) == TRUE) { knownTrue[numTrue++] = ruleBuff[antecedent].string ; return(FALSE) ; } else { knownFalse[numFalse++] = ruleBuff[antecedent].string ; return(TRUE) ; } case ROUTINE_TRUE : case ROUTINE_TRUE_HYP: if( runRoutine(antecedent) == TRUE) { knownTrue[numTrue++] = ruleBuff[antecedent].string ; return(TRUE) ; } else { knownFalse[numFalse++] = ruleBuff[antecedent].string ; return(FALSE) ; } case ROUTINE_FALSE : if (runRoutine(antecedent) == TRUE) { knownTrue[numTrue++] = ruleBuff[antecedent].string ; return(FALSE) ; } else { knownFalse[numFalse++] = ruleBuff[antecedent].string ; return(TRUE) ; } default: printf("\major problem # 0001 -- llegal antecedent flag\n") ; return(TRUE) ; } } SHAR_EOF fi # end of overwriting check if test -f 'weknow.c' then echo shar: will not over-write existing file "'weknow.c'" else cat << \SHAR_EOF > 'weknow.c' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /***************************************************************** ** ** weKnow(antecedent,&predicate) ** ** routines searches both knownTrue and knownFalse ** stacks to determine whether the antecedent is known. ** ** the return value of the routine is TRUE if known and FALSE otherwise ** ** the predicate is set to the "true" value of the antecedent according ** to whether its phase is TRUE or FALSE and its .flag indicator. ** *****************************************************************/ #include "expert.h" #include "inference.h" int weKnow(antecedent,p_value) int antecedent,*p_value ; { if(known(antecedent,knownTrue,numTrue) == TRUE ) switch(ruleBuff[antecedent].flag) { case STRING_TRUE: case STRING_TRUE_HYP: case ROUTINE_TRUE: case ROUTINE_TRUE_HYP: *p_value = TRUE ; return(TRUE) ; case STRING_FALSE: case ROUTINE_FALSE : *p_value = FALSE ; return(TRUE) ; } if(known(antecedent,knownFalse,numFalse) == TRUE ) switch(ruleBuff[antecedent].flag) { case STRING_TRUE: case STRING_TRUE_HYP: case ROUTINE_TRUE: case ROUTINE_TRUE_HYP : *p_value = FALSE ; return(TRUE) ; case STRING_FALSE: case ROUTINE_FALSE: *p_value = TRUE ; return(TRUE) ; } return(FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'inference.str' then echo shar: will not over-write existing file "'inference.str'" else cat << \SHAR_EOF > 'inference.str' /* ** ** This is the inference engine for which the rule compiler ** has the task of compiling the rules into a knowledge base ** This knowledge base has the following parts: hypstack consisting of a stack of integers, each of which points to the offset into the rule base which is a hypothesis. rule base consisting of an orderd set of flags and pointers, each comprising a single rule statement. Each flag identifies the type of rule and the pointer points to the specific string within the string buffer which accompanied the rule keyword. the keywords are defined in the rule compiler documentation so look there for it. ** ** ** */ /*********************INFERENCE ENGINE STRUCTURE******************/ /* ** MAIN VERIFICATION DRIVER ** MAIN(ARGC,ARGV) { READ ALL DATA FROM COMPILED RULES INTO INTERNAL BUFFERS CLEAR THE KNOWN TRUE AND KNOWN FALSE STACKS WHILE(ALL CONSEQUENT NOT DONE) { POP A CONSEQUENT OFF OF THE CONSEQUENT STACK (INVERSE ORDER) IF((CONSEQUENT IS KNOWN TRUE) OR (CONSEQUENT IS KNOWN FALSE)) { CONTINUE } VERIFY(CONSEQUENT) IF(CONSEQUENT IS TRUE) { IF(CONSEQUENT.FLAG == ROUTINE_TRUE) { IF(CONSEQUENT IS NOT KNOWN TRUE OR CONSEQUENT IS NOT KNOWN FALSE) { PRINT RUNNING CONSEQUENT (CONSEQUENT) RESULT = RUN ROUTINE (CONSEQUENT) TELL USER RESULT OF RUN } } ELSE { TELL USER THE TRUTH AND OR CONCLUSION } } } IF(NO CONSEQUENT WAS PROVEN) { TELL USER "CANNOT PROVE ANYTHING" } } ** ** */ /* ** ** VERIFY A PARTICULAR CONSEQUENT ** VERIFY(CONSEQUENT) (RECURSIVE VERIFY OF THE CONSEQUENT) { GET ALL ANTECEDENTS FOR CONSEQUENT ONTO STACK IF(THERE ARE NO ANTECEDENTS FOR THE CONSEQUENT) { PRINT "BAD CONSEQUENT -- HAS NO ANTECEDENTS" RETURN(TRUE) } WHILE(ALL ANTECEDENTS FOR CONSEQUENT NOT PROVED) { POP ANTECEDENT OFF OF STACK IF(ANTECEDENT IS CONSEQUENT) { IF(CONSEQUENT IS KNOWN FALSE) { RETURN(FALSE) } IF(CONSEQUENT IS KNOWN TRUE) { CONTINUE } VERIFY(CONSEQUENT) IF(CONSEQUENT IS TRUE) { IF(CONSEQUENT.FLAG == ROUTINE_TRUE) { PRINT RUNNING CONSEQUENT (CONSEQUENT) RESULT = RUN ROUTINE (CONSEQUENT) IF (RESULT == FALSE) { RETURN(FALSE) } } ELSE { PUT CONSEQUENT ON KNOWN TRUE STACK } CONTINUE } ELSE { PUT CONSEQUENT ON KNOWN FALSE STACK RETURN(FALSE) } } ELSE { IF(ANTECEDENT IS KNOWN TRUE) { CONTINUE } IF(ANTECEDENT IS KNOWN FALSE) { RETURN (FALSE) } SWITCH(ANTECEDENT.FLAG): { CASE (STRING_TRUE) : RESULT = GET TRUTH FOR STATEMNT (ANTECEDENT) IF(RESULT == FALSE) { RETETURN (FALSE) } BREAK ; CASE (STRING_FALSE) : RESULT = GET TRUTH FOR STATEMNT (ANTECEDENT) IF(RESULT == TRUE) { RETURN(FALSE) } BREAK ; CASE (ROUTINE_TRUE) : PRINT "RUNNING ROUTINE --" PRINT STRING POINTED TO BY ANTECEDENT.STRING RESULT = RUN ROUTINE (ANTECEDENT) IF(RESULT == FALSE) { RETURN (FALSE) } BREAK ; CASE (ROUTINE_FALSE) : PRINT "RUNNING ROUTINE --" PRINT STRING POINTED TO BY ANTECEDENT.STRING RESULT = RUN ROUTINE(ANTECEDENT) IF(TRUE) { RETURN(FALSE) } BREAK ; DEFAULT: 'DIS IS SOME PROBLEM MAMA! } } } RETURN(TRUE) } ** ** */ /* ** ** ROUTINE FOR GETTING TRUTH OUT OF USER ** PRINTS STRING AND ASKS FOR WHETHER IT IS TRUE OR FALSE ** GET TRUTH FOR STATEMNT(ANTECEDENT) { PRINT "IS THE FOLLOWING TRUE?" PRINT STATEMENT AT ANTECEDENT.STRING GET USER RESPONSE (YES, WHY OR NO) DO FOREVER { IF(USER RESPONSE IS YES) { PLACE ANTECEDENT IN KNOWN TRUE STACK RETURN(TRUE) } IF(USER RESPONSE IS NO) { PLACE ANTECEDENT IN KNOW FALSE STACK RETETURN (FALSE) } IF(USER RESPONSE IS WHY) { PRINT OUT CONSEQUENT/ANTECEDENT STACK IN A NICE FORMAT } } } ** ** */ /* ** ** ROUTINE TO TEST THE TRUTH OF A ROUTINE ** RUN ROUTINE (ANTECEDENT) { SPAWN THE ROUTINE NAMED IN THE STRING POINTED TO BY ANTECEDENT.STRING WAIT FOR ROUTINE TO FINISH GET RESULT OF THE ROUTINE IF(RESULT OF ROUTINE IS TRUE) { PLACE ANTECEDENT IN KNOWN TRUE STACK RETURN(TRUE) } ELSE { PLACE ANTECEDENT IN KNOWN FALSE STACK RETURN (FALSE) } } ** ** ** */ SHAR_EOF fi # end of overwriting check if test -f 'makeinfe' then echo shar: will not over-write existing file "'makeinfe'" else cat << \SHAR_EOF > 'makeinfe' # # Makefile # # debug the file and do a 80286 model #CFLAGS = /DDEBUG /DMSDOS /G2 /Zd /Od /Fc CFLAGS = /DMSDOS # All object modules inference.obj : inference.c expert.h msc $(CFLAGS) inference.c ; verify.obj : verify.c expert.h inference.h expert.h msc $(CFLAGS) verify.c ; lib inference -verify +verify ; runrouti.obj : runrouti.c inference.h expert.h routine.h msc $(CFLAGS) runrouti.c ; lib inference -runrouti +runrouti ; verifytr.obj : verifytr.c inference.h expert.h msc $(CFLAGS) verifytr.c ; lib inference -verifytr +verifytr ; weknow.obj : weknow.c inference.h expert.h msc $(CFLAGS) weknow.c ; lib inference -weknow +weknow ; remante.obj : remante.c inference.h expert.h routine.h msc $(CFLAGS) remante.c ; lib inference -remante +remante ; gettruth.obj : gettruth.c inference.h expert.h msc $(CFLAGS) gettruth.c ; lib inference -gettruth +gettruth ; # inference.exe -- main target # inference.exe : inference.obj inference.lib # link inference.obj ,inference.exe, inference.map, inference.lib /MAP/LINE/STACK:9000 ; link inference.obj ,inference.exe, inference.map, inference.lib /STACK:9000 ; # # mapsym inference # SHAR_EOF fi # end of overwriting check if test -f 'makercom' then echo shar: will not over-write existing file "'makercom'" else cat << \SHAR_EOF > 'makercom' # # Makefile # # debug the file and do a 80286 model #CFLAGS = /DDEBUG /G0 /Zd /Od /Fc CFLAGS = /G0 # All object modules rulecomp.obj : rulecomp.c expert.h keywords.h msc $(CFLAGS) rulecomp.c ; getkeywo.obj : getkeywo.c expert.h msc $(CFLAGS) getkeywo.c ; putstrin.obj : putstrin.c expert.h msc $(CFLAGS) putstrin.c ; # rulecomp.exe -- main target # rulecomp.exe : rulecomp.obj getkeywo.obj putstrin.obj link rulecomp.obj getkeywo.obj putstrin.obj ,rulecomp.exe,/STACK:15000 ; # link rulecomp.obj getkeywo.obj putstrin.obj ,rulecomp.exe,/MAP/LINE/STACK:15000 ; # # mapsym rulecomp # SHAR_EOF fi # end of overwriting check if test -f 'README' then echo shar: will not over-write existing file "'README'" else cat << \SHAR_EOF > 'README' To compile: cc *.c -DUNIXSV -o inference There is no need for a make but the one included is for the Microsoft make command which comes whith their 4.0 Macro-assembler. Geo. SHAR_EOF fi # end of overwriting check # End of shell archive exit 0
tools@raybed2.UUCP (TOOLS) (01/27/86)
As requested by the author we are reposting the source and documentation of a C inference engine. Address all questions to George Hageman at: UUCP: {asgb!benish}!hageman MAIL: George W. Hageman P.O. Box 11234 Boulder, Colorado 80301 NOTE: RAYTHEON Inc. is not reponsible for the contents and/or consequences of use of this software. This software is totally the work of George Hageman and is being reposted as per his request (see following message). Address all questions, comments, etc. to him. ========================================================================= >From linus!decvax!seismo!hao!asgb!benish!hageman Fri Jan 24 07:31:04 1986 >Subject: Re: C inference engine > > ... it seems that > the probability of getting somthing out to net.and is > inversely proportional to the number of hops it has to go. > > I'll send you all of the shars (inference rulecompiler and > the storm expert). If you could make sure that they are > available at your site either by reposting them from your > end or by some other means it would be appreciated. > > Thanks, > >George [Hageman] ========================================================================= ____Cut for rulecomp.sh______ #! /bin/sh # This is a shell archive, meaning: # 1. Remove everything above the #! /bin/sh line. # 2. Save the resulting text in a file. # 3. Execute the file with /bin/sh (not csh) to create the files: # expert.h # infer.h # inferenc.h # keywords.h # routine.h # getkeywo.c # putstrin.c # rulecomp.c # README.TO # makercom # rulecomp.str # This archive created: Sun Jan 12 16:13:31 1986 export PATH; PATH=/bin:$PATH if test -f 'expert.h' then echo shar: will not over-write existing file "'expert.h'" else cat << \SHAR_EOF > 'expert.h' /************************************************************************* ** ** ** The software contained in this distribution is copyright (C) ** ** by George Hageman 1985 and is released into the public ** ** domain with the following restrictions: ** ** ** ** (1) This software is intended for non-commertial ** ** usage. ** ** (2) I am held save from damages resulting from ** ** its use, and ** ** (3) The following concepts and legal jargon are ** ** agreed to by the user of this software. ** ** ** ** User-supported software concept: ** ** ** ** IF you find use for this software ** ** ANDIF it saves you some development time ** ** THEN send me $10.00 ** ** ANDTHENHYP you will feel good! ** ** ** ** ** ** This source code is provided on an "as is" basis without ** ** warranty of any kind, expressed or implied, including but ** ** not limited to the implied warranties of merchantability ** ** and fitness for a particular purpose. The entire risk as ** ** to quality and performance of this software is with you. ** ** Should the software prove defective, you assume the entire ** ** cost of all necessary repair, servicing, or correction. In ** ** no event will the author be liable to you for any damages, ** ** including any lost profits, lost savings, or other ** ** incidental or consequential damages arising out of the use ** ** of inability to use this software. In short my friends, I ** ** have done a reasonable ammount of work in debugging this ** ** software and I think it is pretty good but, as you know, ** ** there is always some chance that a bug is still lurking ** ** around. If you should happen to be lucky enough to find one, ** ** please let me know so I can make an attempt to fix it. ** ** ** ** Thanks, ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *************************************************************************/ /* ** These are the structures of the rulebase which will ** be used to compile the rules into. */ #define FALSE 0 #define TRUE -1 #define MAX_STRING_BUFF 5000 #define MAX_STR_LEN 100 #define MAX_RULE_STATEMENTS 500 #define MAX_HYPS 250 #define ANTECEDENT 1 #define CONSEQUENT 2 #define COMMENT_CHAR '!' #define BLANK 0x20 #define EOL 0x0a #define KEY_EOF -2 #define LINE_ERROR -3 #define KEY_WORD_ERROR -4 #define ERROR -5 #define STR_LEN_ERROR -6 /* ** Other definitions of key words */ #define AND_N 0 #define ANDIF_N 1 #define ANDIFRUN_N 2 #define ANDNOT_N 3 #define ANDNOTRUN_N 4 #define ANDRUN_N 5 #define ANDTHEN_N 6 #define ANDTHENHYP 7 #define ANDTHENRUN_N 8 #define ANDTHENRUNHYP_N 9 #define IF_N 10 #define IFNOT_N 11 #define IFNOTRUN_N 12 #define IFRUN_N 13 #define THEN_N 14 #define THENHYP_N 15 #define THENRUN_N 16 #define THENRUNHYP_N 17 /* ** Flag definitions: */ #define STRING_TRUE 1 #define STRING_FALSE 2 #define ROUTINE_TRUE 3 #define ROUTINE_FALSE 4 #define STRING_TRUE_HYP 5 #define ROUTINE_TRUE_HYP 6 #define NUM_KEYWORDS 18 struct rule_statement_r { int flag ; /* logical flag for inference engine */ int string ; /* offset into string buffer */ }; /* ** rules are compiled into the array rules in the folloiwng form: ** ** antecedent-group consequent-group ** ... ** antecedent-group consequent-group ** end-group ** ** Each group of consequences and antecedents ** are compiled in a group like the following: ** ** flag pointer flag pointer ... flag pointer 0-flag 0-pointer ** ** The end-group is merely: ** ** 0-flag 0-pointer 0-flag 0-pointer 0-flag 0-pointer ** ** flags are used by the inference engine to determine what to ** do with the following string pointer. ** string pointers are merely offsets into the string array. ** The pointers may either point ** to a string which is a rule statement such as "the animal has wings" ** or is a UNIX pathname for a particular routine which is to be ** executed such as "/g1/hageman/Diagnostics/Disk1diag". This ** routine will then be executed and will return either a true or ** false indication. Latter versions of the inference engin may be ** capable of returning more than this via some pipe-line mechanism or ** other. ** ** Once an anicedent whether string or routine is verified it is placed ** in either a known-true or known-false stack for later verification ** in other rules which use them. In short they only have to be verified ** once. ** ** Examples of a rule structure are: ** ** IFNOT the animal is a bird ** AND the animal has wings ** ANDNOT the animal lives in caves ** AND the animal is nocternal ** THEN the animal is a bat ** IF the animal is a bat ** ANDRUN /g1/hageman/Src/Expert/speed_of_bat ** THENHYP the bat is out of hell ** IF the animal is a bat ** ANDNOTRUN /g1/hageman/Src/Expert/speed_of_bat ** THENHYP the bat is out of cave ** */ SHAR_EOF fi # end of overwriting check if test -f 'infer.h' then echo shar: will not over-write existing file "'infer.h'" else cat << \SHAR_EOF > 'infer.h' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /* ** the following are the global common variables which ** are used in the inference engine... ** ** all routines except inference.c should have this ** file included. */ #define MAX_KNOWN 500 int numHypot, hypStack[MAX_HYPS],strBuffOfst ; char strBuff[MAX_STRING_BUFF] ; int ruleBuffOfst ; int knownTrue[MAX_KNOWN], knownFalse[MAX_KNOWN] ; int numTrue, numFalse ; struct rule_statement_r ruleBuff[MAX_RULE_STATEMENTS] ; SHAR_EOF fi # end of overwriting check if test -f 'inferenc.h' then echo shar: will not over-write existing file "'inferenc.h'" else cat << \SHAR_EOF > 'inferenc.h' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /************************************************************************* ** ** ** The software contained in this distribution is copyright (C) ** ** by George Hageman 1985 and is released into the public ** ** domain with the following restrictions: ** ** ** ** (1) This software is intended for non-commertial ** ** usage. ** ** (2) I am held save from damages resulting from ** ** its use, and ** ** (3) The following concepts and legal jargon are ** ** agreed to by the user of this software. ** ** ** ** User-supported software concept: ** ** ** ** IF you find use for this software ** ** ANDIF it saves you some development time ** ** THEN send me $10.00 ** ** ANDTHENHYP you will feel good! ** ** ** ** ** ** This source code is provided on an "as is" basis without ** ** warranty of any kind, expressed or implied, including but ** ** not limited to the implied warranties of merchantability ** ** and fitness for a particular purpose. The entire risk as ** ** to quality and performance of this software is with you. ** ** Should the software prove defective, you assume the entire ** ** cost of all necessary repair, servicing, or correction. In ** ** no event will the author be liable to you for any damages, ** ** including any lost profits, lost savings, or other ** ** incidental or consequential damages arising out of the use ** ** of inability to use this software. In short my friends, I ** ** have done a reasonable ammount of work in debugging this ** ** software and I think it is pretty good but, as you know, ** ** there is always some chance that a bug is still lurking ** ** around. If you should happen to be lucky enough to find one, ** ** please let me know so I can make an attempt to fix it. ** ** ** ** Thanks, ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *************************************************************************/ /* Expert system inference engine This inference engine is backwards-chaining only and features the running of binary files if: 1) they are antecedents associated with a particuar consequent being proved, or 2) they are consequents which have been proven true by verify(). their actual predicate value will be determined by their returned result after running. This inference engine is designed with diagnostics in mind and so will probably be best suited for this application. Later revisons will include forward-chaining so that the user will have the opportunity to give pre-existant conditons, or that these my be supplied by the calling process. (If you cant tell by the above description -- I am very excited about the possibilties presented in this form of computer control of the diagnostic process... Geo.) See structure design for details of operation, but basically the inference reads in all of the compiled information as produced by the rule compiler. it proceeds to attempt to prove each consequent by proving the truth or falseness of any antecedent associated with this consequent. if any antecedent of a consequent turns out to be a consequent itself, then the inference engine will recursively attempt to prove this consequent. the process is complete when all of the predicate values of the consequents has been determined. Additional features which I may put in at a later time is the abiltiy for the inference engine to expalin itself to the user when the user asks why the inference engine needs to know the predicate value of a particular antecedent. This will be done by forward and backward chaining of predicat clauses, the truth of each will be displayed. */ #define MAX_ANTECEDENTS 25 extern int numHypot, hypStack[],strBuffOfst ; extern char strBuff[] ; extern int ruleBuffOfst ; extern int knownTrue[], knownFalse[] ; extern int numTrue, numFalse ; extern struct rule_statement_r ruleBuff[] ; SHAR_EOF fi # end of overwriting check if test -f 'keywords.h' then echo shar: will not over-write existing file "'keywords.h'" else cat << \SHAR_EOF > 'keywords.h' char *keyWords[NUM_KEYWORDS] = { "AND ", "ANDIF ", "ANDIFRUN ", "ANDNOT ", "ANDNOTRUN ", "ANDRUN ", "ANDTHEN ", "ANDTHENHYP ", "ANDTHENRUN ", "ANDTHENRUNHYP ", "IF ", "IFNOT ", "IFNOTRUN ", "IFRUN ", "THEN ", "THENHYP ", "THENRUN ", "THENRUNHYP " } ; SHAR_EOF fi # end of overwriting check if test -f 'routine.h' then echo shar: will not over-write existing file "'routine.h'" else cat << \SHAR_EOF > 'routine.h' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /* ** these are the two return values ** which must be returned as the exit ** value. Any other will result in ** an assumption that the result is true ** or that some sort of error occured. */ #define RETURN_ROUTINE_TRUE 254 #define RETURN_ROUTINE_FALSE 255 SHAR_EOF fi # end of overwriting check if test -f 'getkeywo.c' then echo shar: will not over-write existing file "'getkeywo.c'" else cat << \SHAR_EOF > 'getkeywo.c' #include <stdio.h> #include <string.h> #include "expert.h" /****************************************************************** ** ** ** GET KEYWORD ** ** ******************************************************************/ /* ** ** getKeyWord(infile,keyWords,lineNum) ; ** ** returns either KEY_EOF, or number of keyword, or indications ** that keyword was not first word on line. ** */ int getKeyWord (infile,keyWords,lineNum) FILE *infile ; char *keyWords[] ; int *lineNum ; { int firstc,c,i,j ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-GET_KEYWORD") ; #endif /* ** get first non blank character */ i = 0 ; while( TRUE ) { c = getc(infile); putchar(c) ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-GET_KEYWORD character= %c,%x",c,c) ; #endif if( c == EOF ) return (KEY_EOF) ; if( (i == 0) && (c == COMMENT_CHAR) ) /* ignore comment line */ { while( c != EOL ) { #ifdef DEBUG fprintf(stdout,"\nDEBUG-GET_KEYWORD (delete comment) character=%c,%x",c,c); #endif c = getc(infile) ; if( c == EOF) return (KEY_EOF) ; putchar(c) ; } printf("%04d ",*lineNum) ; *lineNum += 1 ; i = 0 ; } else { i = 1 ; if( c != BLANK ) { if(c == EOF) return(KEY_EOF) ; break ; } } } /* ** locate first keyword with matching first character */ for( i = 0 ; i < NUM_KEYWORDS ; i++ ) { #ifdef DEBUG fprintf(stdout,"\nDEBUG-GET_KEYWORD i=%d, keyword=%c",i,*(keyWords[i])) ; #endif if ( *(keyWords[i]) == c ) break ; } if( i == NUM_KEYWORDS ) return (KEY_WORD_ERROR) ; /* ** find the key word if there ** ** Note that this search algrorithm is very dependant on having ** the keyWord file being in strict alphabetical order!!! ** */ j=0 ; firstc = c ; while( i < NUM_KEYWORDS ) { if( (c=getc(infile)) == *(keyWords[i]+(++j)) ) { #ifdef DEBUG fprintf(stdout,"\nDEBUG-GET_KEYWORD char=%c,keyword=%c",c,*((keyWords[i])+j)) ; #endif putchar(c) ; if( c == BLANK ) return (i) ; if( c == EOF ) return(KEY_EOF) ; } /* ** increment the keyWord pointer to be tested ** decrement the character pointer in keyWord ** and put the last character tested back. */ /* ** since the keyWord array is alphabetical, testing ** for a first character change would indicate that ** the possible keywords have been exhausted. */ else { i++ ; j-- ; ungetc(c,infile) ; if( c == EOF ) return (KEY_EOF) ; if( firstc != *(keyWords[i])) return (KEY_WORD_ERROR) ; } } /* ** no keywords were found because we exhausted the keyWord array */ return (KEY_WORD_ERROR) ; } SHAR_EOF fi # end of overwriting check if test -f 'putstrin.c' then echo shar: will not over-write existing file "'putstrin.c'" else cat << \SHAR_EOF > 'putstrin.c' #include <stdio.h> #include <string.h> #include "expert.h" /***************************************************************** ** ** PUT STRING ** ** looks for string on rule line and ** either returns the offset into the ** string buffer if found or places ** it into the string buffer and returns ** the offset to it. ** strBuffOfst is the pointer to the offset to ** the last used location in the string buffer ** ** *****************************************************************/ int putString (infile,strBuff,strBuffOfst) FILE *infile ; char *strBuff ; int *strBuffOfst ; { int i,offSet,strLen,c,newline ; char buff[MAX_STR_LEN] ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-PUTSTRING strBuffOfst= %d",*strBuffOfst) ; #endif /* ** ** get file positioned to first non blank character (after keyword) ** */ while( ( c=getc(infile)) == BLANK ) putchar(c) ; if( c == EOL ) { putchar(c) ; return (LINE_ERROR) ; } if( c == EOF ) return (KEY_EOF) ; ungetc(c,infile); #ifdef DEBUG fprintf(stdout,"\nDEBUG-PUTSTRING c = %c", c) ; #endif /* ** ** load the string on the line into the string buffer for ** later comparison to strings in the line buffer. ** */ newline = FALSE ; for( i = 0 ; i < (MAX_STR_LEN-1) ; i++ ) { buff[i]=c=getc(infile) ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-PUTSTRING c =%c, i = %d -- ", c,i) ; #endif putchar(c) ; if(c == '\\') { #ifdef DEBUG fprintf(stdout,"\nDEBUG-PUTSTRING newline is TRUE"); #endif newline = TRUE ; continue ; } if( newline == TRUE ) { if( c == 'n' ) { i -= 1 ; buff[i] = '\n' ; } #ifdef DEBUG fprintf(stdout,"\nDEBUG-PUTSTRING newline is FALSE"); #endif newline = FALSE ; continue ; } if(c == EOL) { buff[i]=0 ; break ; } if(c == EOF) { buff[i]=0 ; ungetc(c,infile) ; break ; } } /* ** remove trailing blanks in the buffer ** */ for( --i ; i > -1 ; i-- ) { if( buff[i] != BLANK ) break ; buff[i]=0 ; } if(i <= 0) return(STR_LEN_ERROR) ; strLen = i ; buff[MAX_STR_LEN-1] = 0 ; /* ** at this point strLen should be the offset to the last character ** in the string and is also, therefore, the length of the string -1 ** ** search for the string in the string buffer ** return offset to string if found else put the string ** in the string buffer and uptate buffer offset returning ** pointer to new string ** */ offSet = 0 ; while( offSet < *strBuffOfst ) { if( strcmp(&strBuff[offSet], buff) == 0 ) return(offSet) ; while( strBuff[++offSet] ) ; /* look for end of null trmntd string */ ++offSet ; /* move past the null to next string */ } #ifdef DEBUG fprintf(stdout,"\nDEBUG-PUTSTRING strBuffOfst= %d",*strBuffOfst) ; fprintf(stdout,"\nDEBUG-PUTSTRING offSet = %d",offSet) ; fprintf(stdout,"\nDEBUG-PUTSTRING strBuff= %s",&strBuff[offSet]); fprintf(stdout,"\nDEBUG-PUTSTRING buff = %s",buff) ; #endif strcpy(&strBuff[*strBuffOfst],buff) ; if(*strBuffOfst == 0 ) { *strBuffOfst += strLen + 2 ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-PUTSTRING strBuffOfst= %d",*strBuffOfst) ; #endif return(0) ; } else { offSet = *strBuffOfst ; *strBuffOfst += strLen + 2 ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-PUTSTRING strBuffOfst= %d",*strBuffOfst) ; #endif return(offSet) ; } } SHAR_EOF fi # end of overwriting check if test -f 'rulecomp.c' then echo shar: will not over-write existing file "'rulecomp.c'" else cat << \SHAR_EOF > 'rulecomp.c' /***************************************************************** ** ** ** Inference -- (C) Copyright 1985 George Hageman ** ** ** ** user-supported software: ** ** ** ** George Hageman ** ** P.O. Box 11234 ** ** Boulder, Colorado 80302 ** ** ** *****************************************************************/ /***************************************************************** ** Expert system rule compiler ** ** This compiler produces a file of the form: ** ** Number_of_bytes_in_hypstack_section ** Hypstack_section ** Number_of_bytes_in_rule_section ** Rule base section ** Number_of_bytes_in_string_section ** String section ** EOF ** ** The rule section consits of integer flags and long-integer ** pointers to strings in the string section. ** ** All strings in the string section will be unique nomatter how ** many times they are repeated in the rules which are compiled ** into the rule base by this compiler. ** ** ** Usage: ** ** rulecomp rule.file object.file ** *****************************************************************/ /***************************************************************** ** ** rule compiler main routine ** *******************************************************************/ #include <stdio.h> #include <string.h> #include "expert.h" #include "keywords.h" int main(argc,argv) int argc ; char **argv ; { char strBuff[MAX_STRING_BUFF] ; int i ; int state ; int strAddr; int numHypot, hypStack[MAX_HYPS],strBuffOfst ; int c ; int ruleBuffOfst ; int keyWrdNum ; int getKewWord() ; int putString() ; int lineNum ; struct rule_statement_r ruleBuff[MAX_RULE_STATEMENTS] ; int done ; FILE *infile, *outfile ; for( done = 0; done < MAX_STRING_BUFF; done ++ ) strBuff[done] = 0 ; for( done = 0; done < MAX_HYPS ; done++ ) hypStack[done]=0 ; done = FALSE ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP argc=%d ",argc) ; #endif if(argc != 3 ) { fprintf(stdout, "\n\n Usage: rulecomp in.file out.file\n\n" ) ; exit() ; } infile = fopen( argv[1], "r" ); if(infile == NULL) { fprintf(stdout,"\n\n Cannot open input file %s ", argv[1]); exit() ; } outfile = fopen(argv[2], "wb" ) ; if(outfile == NULL) { fprintf(stdout,"\n\n Cannot open output file %s ",argv[2]); exit() ; } done = FALSE ; numHypot = 0 ; /* number of hypothesis is zero */ strBuffOfst = 0 ; /* pointer in buffer is zero */ ruleBuffOfst = 0 ; /* rule buffer offset is zero */ state = ANTECEDENT ; /* Compilation states: ** ** Antecedent group in progress -- 1 ** Consequent group in progress -- 2 ** ** If state 1 and you get a consequent then output group barrier. ** change state to 2. ** If state 2 and you get an antecedent then output group barrier. ** change state to 1. */ lineNum = 1 ; printf("\n") ; while( !done ) { /* ** get the key word number from the ** input file */ printf("%04d ",lineNum++) ; keyWrdNum = getKeyWord(infile,keyWords,&lineNum); /* ** error occured on line clear the line and ** start over. */ if(keyWrdNum == KEY_EOF) { done = TRUE ; continue ; } if(keyWrdNum == KEY_WORD_ERROR) { while( ( (c = getc(infile))) != EOL && (c != EOF) ) putchar(c) ; fprintf(stdout," **** KEY WORD not found on line " ); if(c == EOF) { done = TRUE ; break ; } putchar(c) ; continue; } #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP keyWrdNum = %d",keyWrdNum ) ; #endif /* ** based on the key Word build the ** rule files */ switch(keyWrdNum) { case AND_N : case ANDIF_N : case IF_N : #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP case AND_N, ANDIF_N, IF_N ") ; #endif if(state == CONSEQUENT) { state = ANTECEDENT ; ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; } ruleBuff[ruleBuffOfst].flag = STRING_TRUE ; strAddr=putString(infile,strBuff,&strBuffOfst) ; ruleBuff[ruleBuffOfst++].string = strAddr ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP strAddr= %d",strAddr ) ; #endif break ; case ANDRUN_N : case ANDIFRUN_N : case IFRUN_N : #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP case AND_N, ANDIF_N, IF_N ") ; #endif if(state == CONSEQUENT) { state = ANTECEDENT ; ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; } ruleBuff[ruleBuffOfst].flag = ROUTINE_TRUE ; strAddr=putString(infile,strBuff,&strBuffOfst) ; ruleBuff[ruleBuffOfst++].string = strAddr ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP strAddr= %d",strAddr ) ; #endif break ; case ANDNOT_N : case IFNOT_N : #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP case ANDNOT_N, IFNOT_N ") ; #endif if(state == CONSEQUENT) { state = ANTECEDENT ; ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; } ruleBuff[ruleBuffOfst].flag = STRING_FALSE ; strAddr=putString(infile,strBuff,&strBuffOfst) ; ruleBuff[ruleBuffOfst++].string = strAddr ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP strAddr=%d",strAddr) ; #endif break ; case ANDNOTRUN_N : case IFNOTRUN_N : #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP case ANDNOT_N, IFNOT_N ") ; #endif if(state == CONSEQUENT) { state = ANTECEDENT ; ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; } ruleBuff[ruleBuffOfst].flag = ROUTINE_FALSE ; strAddr=putString(infile,strBuff,&strBuffOfst) ; ruleBuff[ruleBuffOfst++].string = strAddr ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP strAddr=%d",strAddr) ; #endif break ; case ANDTHEN_N : case THEN_N : case THENHYP_N : case ANDTHENHYP : #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP case ANDTHEN_N,THEN_N,THENHYP_N"); #endif if(state == ANTECEDENT) { state = CONSEQUENT ; ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; } if( (keyWrdNum == THENHYP_N) || (keyWrdNum == ANDTHENHYP) ) ruleBuff[ruleBuffOfst].flag = STRING_TRUE_HYP ; else ruleBuff[ruleBuffOfst].flag = STRING_TRUE ; strAddr=putString(infile,strBuff,&strBuffOfst) ; hypStack[numHypot++] = ruleBuffOfst ; ruleBuff[ruleBuffOfst++].string = strAddr ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP strAddr=%d",strAddr) ; #endif break ; case ANDTHENRUN_N : case THENRUN_N : case THENRUNHYP_N : case ANDTHENRUNHYP_N : #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP case ANDTHEN_N,THEN_N,THENHYP_N"); #endif if(state == ANTECEDENT) { state = CONSEQUENT ; ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; } if( (keyWrdNum == THENRUNHYP_N ) || (keyWrdNum == ANDTHENRUNHYP_N) ) ruleBuff[ruleBuffOfst].flag = ROUTINE_TRUE_HYP ; else ruleBuff[ruleBuffOfst].flag = ROUTINE_TRUE ; strAddr=putString(infile,strBuff,&strBuffOfst) ; hypStack[numHypot++] = ruleBuffOfst ; ruleBuff[ruleBuffOfst++].string = strAddr ; #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP strAddr=%d",strAddr) ; #endif break ; case KEY_EOF : #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP case KEY_EOF ") ; #endif done = TRUE ; break ; default: #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP case DEFAULT " ) ; #endif fprintf(stdout, " \n\n illegal keyword number found " ); } } /* ** set up some blank space at the end of the rule file */ ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; if(ruleBuffOfst%2 == 0 ) { ruleBuff[ruleBuffOfst].flag = NULL ; ruleBuff[ruleBuffOfst++].string = NULL ; } #ifdef DEBUG fprintf(stdout,"\nDEBUG-RULECOMP ruleBoffOfst=%d", ruleBuffOfst ) ; #endif /* ** ruleBuffOfst -3 is the number of rule statements processed */ /* ** ** Write out all of the compiled information as follows: ** ** numHypot*2 Number_of_bytes_in_hypstack_section ** hypStack Hypstack_section ** ruleBuffOfst Number_of_bytes_in_rule_section ** ruleBuff Rule base section ** strBuffOfst Number_of_bytes_in_string_section ** strBuff String section ** EOF ** */ #ifdef DEBUG fprintf(stdout,"\nDEBUG numHypot=%d",numHypot ) ; for(i=0;i<numHypot;i++) fprintf(stdout,"\nDEBUG hypStack=%d",hypStack[i] ) ; fprintf(stdout,"\nDEBUG ruleBuffOfst=%d ",ruleBuffOfst ) ; for(i=0;i<ruleBuffOfst;i++) { fprintf(stdout,"\nDEBUG ruleBuff[%d].flag=%d ",i,ruleBuff[i].flag ) ; fprintf(stdout,"\nDEBUG ruleBuff[%d].string=%d ",i,ruleBuff[i].string ) ; } fprintf(stdout,"\nDEBUG strBuffOfst=%d",strBuffOfst ) ; for(i=0;i<strBuffOfst;i++) fprintf(stdout,"\nDEBUG strBuff[%d]=%d(d),%c(c)",i,strBuff[i],strBuff[i] ) ; #endif fwrite(&numHypot,sizeof(int),1,outfile) ; fwrite(hypStack,sizeof(int),numHypot,outfile) ; fwrite(&ruleBuffOfst,sizeof(int),1,outfile) ; fwrite(ruleBuff,2*sizeof(int),ruleBuffOfst,outfile) ; fwrite(&strBuffOfst,sizeof(int),1,outfile) ; fwrite(strBuff,1,strBuffOfst,outfile) ; fclose(infile); fclose(outfile); #ifdef DEBUG fclose(stdout) ; #endif printf("\n\n") ; exit(0) ; } SHAR_EOF fi # end of overwriting check if test -f 'README.TO' then echo shar: will not over-write existing file "'README.TO'" else cat << \SHAR_EOF > 'README.TO' To compile: cc *.c -DUNIXSV -orulecomp No other command is necessary.. Geo. SHAR_EOF fi # end of overwriting check if test -f 'makercom' then echo shar: will not over-write existing file "'makercom'" else cat << \SHAR_EOF > 'makercom' # # Makefile # # debug the file and do a 80286 model #CFLAGS = /DDEBUG /G0 /Zd /Od /Fc CFLAGS = /G0 # All object modules rulecomp.obj : rulecomp.c expert.h keywords.h msc $(CFLAGS) rulecomp.c ; getkeywo.obj : getkeywo.c expert.h msc $(CFLAGS) getkeywo.c ; putstrin.obj : putstrin.c expert.h msc $(CFLAGS) putstrin.c ; # rulecomp.exe -- main target # rulecomp.exe : rulecomp.obj getkeywo.obj putstrin.obj link rulecomp.obj getkeywo.obj putstrin.obj ,rulecomp.exe,/STACK:15000 ; # link rulecomp.obj getkeywo.obj putstrin.obj ,rulecomp.exe,/MAP/LINE/STACK:15000 ; # # mapsym rulecomp # SHAR_EOF fi # end of overwriting check if test -f 'rulecomp.str' then echo shar: will not over-write existing file "'rulecomp.str'" else cat << \SHAR_EOF > 'rulecomp.str' /* Pseudo code for the rule compiler : compile_rules(rule_file,output_compile_file) { OPEN rule_file ; WHILE ( EOF in rule_file NOT reached ) { locate keyword IF ( keyword not located on line and line not blank ) { OUTPUT error message to user telling of problem } place flag associated with keyword into rule section IF (following string is in string section) { place the address of the string into the rule section } ELSE { place the string into the string section (0 delimit) place the address of the string into the rule section } IF ( the keyword is a THEN or THENHYP ) { place and additional IF flag and a zeroed pointer in the rule section place address of hypothesis or then clause into hypstack section } } IF (last keyword not of a "HYP" type ) { OUTPUT warning to user about this being a problem } place two successive IF flags - zeroed pointer into the rule section to mark the end of the rules section. CLOSE rule_file OPEN compile_output_file OUTPUT number of bytes in rule section to compile_output_file COPY rule section to compile_output_file OUTPUT number of bytes in string section to compile_output_file COPY string section to compile_output_file CLOSE compile_output_file } */ SHAR_EOF fi # end of overwriting check # End of shell archive exit 0
tools@raybed2.UUCP (TOOLS) (01/27/86)
As requested by the author we are reposting the source and documentation of a C inference engine. Address all questions to George Hageman at: UUCP: {asgb!benish}!hageman MAIL: George W. Hageman P.O. Box 11234 Boulder, Colorado 80301 NOTE: RAYTHEON Inc. is not reponsible for the contents and/or consequences of use of this software. This software is totally the work of George Hageman and is being reposted as per his request (see following message). Address all questions, comments, etc. to him. ========================================================================= >From linus!decvax!seismo!hao!asgb!benish!hageman Fri Jan 24 07:31:04 1986 >Subject: Re: C inference engine > > ... it seems that > the probability of getting somthing out to net.and is > inversely proportional to the number of hops it has to go. > > I'll send you all of the shars (inference rulecompiler and > the storm expert). If you could make sure that they are > available at your site either by reposting them from your > end or by some other means it would be appreciated. > > Thanks, > >George [Hageman] ========================================================================= ____Cut for storm.sh _____ #! /bin/sh # This is a shell archive, meaning: # 1. Remove everything above the #! /bin/sh line. # 2. Save the resulting text in a file. # 3. Execute the file with /bin/sh (not csh) to create the files: # routine.h # weather.h # edir.c # gt_301.c # gt_302.c # lt_298.c # lt_301.c # message1.c # ndir.c # nedir.c # nwdir.c # rpd_fall.c # rpd_rise.c # sdir.c # sedir.c # slo_fall.c # slo_rise.c # steady.c # swdir.c # wdir.c # animal # weather # makefile # This archive created: Sun Jan 12 16:14:38 1986 export PATH; PATH=/bin:$PATH if test -f 'routine.h' then echo shar: will not over-write existing file "'routine.h'" else cat << \SHAR_EOF > 'routine.h' /* ** these are the two return values ** which must be returned as the exit ** value. Any other will result in ** an assumption that the result is true ** or that some sort of error occured. */ #define RETURN_ROUTINE_TRUE 254 #define RETURN_ROUTINE_FALSE 255 SHAR_EOF fi # end of overwriting check if test -f 'weather.h' then echo shar: will not over-write existing file "'weather.h'" else cat << \SHAR_EOF > 'weather.h' #define NORTH 1 #define NORTH_EAST 2 #define EAST 3 #define SOUTH_EAST 4 #define SOUTH 5 #define SOUTH_WEST 6 #define WEST 7 #define NORTH_WEST 8 #define STEADY 1 #define RISE_SLOW 2 #define RISE_FAST 3 #define FALL_SLOW 4 #define FALL_FAST 5 SHAR_EOF fi # end of overwriting check if test -f 'edir.c' then echo shar: will not over-write existing file "'edir.c'" else cat << \SHAR_EOF > 'edir.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[2]==EAST) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'gt_301.c' then echo shar: will not over-write existing file "'gt_301.c'" else cat << \SHAR_EOF > 'gt_301.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[0]>3010) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'gt_302.c' then echo shar: will not over-write existing file "'gt_302.c'" else cat << \SHAR_EOF > 'gt_302.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[0]>=3020) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'lt_298.c' then echo shar: will not over-write existing file "'lt_298.c'" else cat << \SHAR_EOF > 'lt_298.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[0]<2980) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'lt_301.c' then echo shar: will not over-write existing file "'lt_301.c'" else cat << \SHAR_EOF > 'lt_301.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[0]<=3010) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'message1.c' then echo shar: will not over-write existing file "'message1.c'" else cat << \SHAR_EOF > 'message1.c' #include <stdio.h> #include "routine.h" #include "weather.h" /* common definitions for direction and stuff */ int main() /* ** note that argv[1] is a pointer to our array of common value */ { char string[20] ; int test ; int value[20] ; FILE *dataFile ; dataFile = fopen("WEATHER.DAT","wb") ; for(test = 0 ; test < 20 ; test++) value[test] = 0 ; /* ** value[0] = barometric pressure * 100 ** value[1] = condition of pressure ** 1-steady, 2-rise_slow, 3-rise_fast, 4-fall-slow, 5-fall-fast ** value[2] = direction of ground wind ** 1-n, 2-ne, 3-e, 4-se, 5-s, 6-sw, 7-w, 8-nw ** */ printf("\n \nWEATHER EXPERT: \n") ; printf("\n This program attempts to prove one of the following:"); printf("\n\tthe weather is ok\n\tthe weather is improving\n\tthe weather is deteriorating\n"); printf("\nNot all weather cases are included in the forecast algorithm."); printf("\n\nBefore we attempt a forecast, I need some data\n What is the barometric pressure reading?\n"); test = 0 ; while((test < 2000) || (test > 4000)) { printf("\n(Type in the pressure as an integer (BP*100) 30.1 = 3010...?"); scanf("%d",&value[0]) ; test = value[0] ; } printf("\n\t Thankyou!, \n\n Now I need to know how the barometer is acting\n"); test = 0; while((test <1) || (test >5)) { printf("\n\t Please input the correct number for the following:\n"); printf("\n\t 1 -- It is steady\n\t 2 -- It is rising slowly\n\t 3 -- It is rising rapidly") ; printf("\n\t 4 -- It is falling slowly\n\t 5 -- It is falling rapidly \n?"); scanf("%d",&value[1]); test = value[1] ; } test = 0 ; printf("\n\t Thankyou,") ; while((test < 1) || ( test > 8 ) ) { printf("\n\nNow I need the wind direction, which direction is it blowing from?\n"); printf("<n, ne, e, se, s, sw, w, nw>?") ; scanf("%s",string) ; if(0 == strcmp(string,"n")) value[2]=NORTH ; if(0 == strcmp(string,"ne")) value[2]=NORTH_EAST ; if(0 == strcmp(string,"e")) value[2]=EAST ; if(0 == strcmp(string,"se")) value[2]=SOUTH_EAST ; if(0 == strcmp(string,"s")) value[2]=SOUTH ; if(0 == strcmp(string,"sw")) value[2]=SOUTH_WEST ; if(0 == strcmp(string,"w")) value[2]=WEST ; if(0 == strcmp(string,"nw")) value[2]=NORTH_WEST ; if(0 == strcmp(string,"N")) value[2]=NORTH ; if(0 == strcmp(string,"NE")) value[2]=NORTH_EAST ; if(0 == strcmp(string,"E")) value[2]=EAST ; if(0 == strcmp(string,"SE")) value[2]=SOUTH_EAST ; if(0 == strcmp(string,"S")) value[2]=SOUTH ; if(0 == strcmp(string,"SW")) value[2]=SOUTH_WEST ; if(0 == strcmp(string,"W")) value[2]=WEST ; if(0 == strcmp(string,"NW")) value[2]=NORTH_WEST ; test = value[2] ; } printf("\n\n\n\n For the next question, you should stand outside with your back"); printf("\nto the surface wind. You now must observe the direction the"); printf("\nupper level clouds are moving. You observe them to be moving") ; printf("\nfrom your right, from your left, or in a direction parallel") ; printf("\nto that which your are facing.\n") ; printf("\nUse this information to answer the following question. If you"); printf("\nare unable to see the upper level clouds, answer no to the following"); printf("\nquestion.\n\n") ; fwrite(value,2,20,dataFile) ; fclose(dataFile) ; exit(RETURN_ROUTINE_TRUE) ; } SHAR_EOF fi # end of overwriting check if test -f 'ndir.c' then echo shar: will not over-write existing file "'ndir.c'" else cat << \SHAR_EOF > 'ndir.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[2]==NORTH) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'nedir.c' then echo shar: will not over-write existing file "'nedir.c'" else cat << \SHAR_EOF > 'nedir.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[2]==NORTH_EAST) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'nwdir.c' then echo shar: will not over-write existing file "'nwdir.c'" else cat << \SHAR_EOF > 'nwdir.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[2]==NORTH_WEST) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'rpd_fall.c' then echo shar: will not over-write existing file "'rpd_fall.c'" else cat << \SHAR_EOF > 'rpd_fall.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[1]==FALL_FAST) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'rpd_rise.c' then echo shar: will not over-write existing file "'rpd_rise.c'" else cat << \SHAR_EOF > 'rpd_rise.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[1]==RISE_FAST) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'sdir.c' then echo shar: will not over-write existing file "'sdir.c'" else cat << \SHAR_EOF > 'sdir.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[2]==SOUTH) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'sedir.c' then echo shar: will not over-write existing file "'sedir.c'" else cat << \SHAR_EOF > 'sedir.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[2]==SOUTH_EAST) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'slo_fall.c' then echo shar: will not over-write existing file "'slo_fall.c'" else cat << \SHAR_EOF > 'slo_fall.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[1]==FALL_SLOW) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'slo_rise.c' then echo shar: will not over-write existing file "'slo_rise.c'" else cat << \SHAR_EOF > 'slo_rise.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[1]==RISE_SLOW) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'steady.c' then echo shar: will not over-write existing file "'steady.c'" else cat << \SHAR_EOF > 'steady.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[1]==STEADY) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'swdir.c' then echo shar: will not over-write existing file "'swdir.c'" else cat << \SHAR_EOF > 'swdir.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[2]==SOUTH_WEST) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'wdir.c' then echo shar: will not over-write existing file "'wdir.c'" else cat << \SHAR_EOF > 'wdir.c' #include <stdio.h> #include "routine.h" #include "weather.h" main() { FILE *dataFile ; int value[20] ; dataFile = fopen("WEATHER.DAT","rb") ; fread(value,2,20,dataFile) ; fclose(dataFile) ; if(value[2]==WEST) return(RETURN_ROUTINE_TRUE) ; else return(RETURN_ROUTINE_FALSE) ; } SHAR_EOF fi # end of overwriting check if test -f 'animal' then echo shar: will not over-write existing file "'animal'" else cat << \SHAR_EOF > 'animal' ! THIS IS THE KNOWLEDGE BASE FOR THE ! ANIMAL CLASIFICATION EXPERT ! IF ANIMAL HAS FEATHERS ANDIF ANIMAL LAYS EGGS THEN ANIMAL IS BIRD ! IFNOT ANIMAL IS BIRD THEN ANIMAL IS MAMMAL ! IF ANIMAL IS MAMMAL AND ANIMAL EATS MEAT THEN ANIMAL IS CARNIVORE ! IF ANIMAL IS CARNIVORE AND ANIMAL HAS POINTED TEETH AND ANIMAL HAS RETRACTABLE CLAWS AND ANIMAL HAS FORWARD POINTING EYES THEN ANIMAL IS CAT ! IF ANIMAL IS MAMMAL ANDNOT ANIMAL IS CARNIVORE AND ANIMAL HAS HOOFS THEN ANIMAL IS UNGULATE ! IF ANIMAL IS CAT AND ANIMAL HAS TAWNY COLOR AND ANIMAL HAS DARK SPOTS THENHYP ANIMAL IS CHEETA ! IF ANIMAL IS CAT AND ANIMAL HAS TAWNY COLOR AND ANIMAL HAS BLACK STRIPES THENHYP ANIMAL IS TIGER ! IF ANIMAL IS CAT AND ANIMAL IS SMALL AND ANIMAL IS DOMESTICATED AND ANIMAL MOSTLY CATCHES MICE AND ANIMAL LOVES WARM LAPS THENHYP ANIMAL IS A HOUSE CAT ! IF ANIMAL IS UNGULATE AND ANIMAL HAS LONG NECK AND ANIMAL HAS LONG LEGS AND ANIMAL HAS DARK SPOTS THENHYP ANIMAL IS GARAFFE ! IF ANIMAL IS BIRD ANDNOT ANIMAL FLIES ANDNOT ANIMAL SWIMS AND ANIMAL HAS LONG NECK AND ANIMAL IS BLACK AND WHITE THENHYP ANIMAL IS OSTRICH ! IF ANIMAL IS UNGULATE AND ANIMAL HAS BLACK STRIPES THENHYP ANIMAL IS ZEBRA ! IF ANIMAL IS BIRD ANDNOT ANIMAL FLIES AND ANIMAL SWIMS AND ANIMAL IS BLACK AND WHITE THENHYP ANIMAL IS PENGUIN ! IF ANIMAL IS BIRD AND ANIMAL FLIES AND ANIMAL FLIES WELL AND ANIMAL HAS WEBBED FEET ANDNOT ANIMAL HAS FLAT BILL THENHYP ANIMAL IS ALBATROS ! IF ANIMAL IS BIRD AND ANIMAL FLIES AND ANIMAL FLIES WELL AND ANIMAL HAS WEBBED FEET AND ANIMAL HAS FLAT BILL THENHYP ANIMAL IS DUCK ! ! ! IFNOT ANIMAL IS CHEETA IFNOT ANIMAL IS TIGER IFNOT ANIMAL IS A HOUSE CAT IFNOT ANIMAL IS GARAFFE IFNOT ANIMAL IS OSTRICH IFNOT ANIMAL IS ZEBRA IFNOT ANIMAL IS PENGUIN IFNOT ANIMAL IS ALBATROS IFNOT ANIMAL IS DUCK THENHYP THIS ANIMAL IS NOT WITHIN MY KNOWLEDGE SHAR_EOF fi # end of overwriting check if test -f 'weather' then echo shar: will not over-write existing file "'weather'" else cat << \SHAR_EOF > 'weather' ! ! WEATHER PREDICTOR AS WRITTEN BY JACK PARK AND ! TRANSLATED BY GEORGE HAGEMAN FOR DEMONSTRATION ! PURPOSES ONLY ! IF YOU WANT TO HAVE ME PREDICT THE WEATHER THENRUN message1.exe ! IFNOT YOU WANT TO HAVE ME PREDICT THE WEATHER ANDNOT YOU ARE ABSOLUTELY POSITIVE ABOUT IT THENRUN message1.exe ! IFNOT YOU WANT TO HAVE ME PREDICT THE WEATHER ANDIF YOU ARE ABSOLUTELY POSITIVE ABOUT IT THENHYP TOO BAD, WE COULD HAVE HAD SOME FUN! ! IFRUN message1.exe ANDIF YOU CAN SEE UPPER LEVEL CLOUDS ANDIF CLOUDS MOVING FROM YOUR LEFT THEN CLOUDS INDICATE BAD WEATHER ! IFRUN message1.exe ANDIF YOU CAN SEE UPPER LEVEL CLOUDS ANDNOT CLOUDS INDICATE BAD WEATHER ANDIF CLOUDS MOVING FROM YOUR RIGHT THEN CLOUDS INDICATE WEATHER IMPROVING ! ! IFRUN message1.exe ANDIF YOU CAN SEE UPPER LEVEL CLOUDS ANDNOT CLOUDS INDICATE BAD WEATHER ANDNOT CLOUDS INDICATE WEATHER IMPROVING ANDIF CLOUDS MOVE PARALLEL TO DIRECTION THEN CLOUDS INDICATE STEADY WEATHER ! IFRUN message1.exe ANDNOT YOU CAN SEE UPPER LEVEL CLOUDS THEN CLOUDS INDICATE STEADY WEATHER ! IFRUN gt_302.exe ANDRUN slo_fall.exe ANDRUN wdir.exe THEN WEATHER OK THEN FAIR AND WARM NEXT 48 HRS ! IFRUN gt_302.exe ANDRUN steady.exe ANDRUN wdir.exe THEN CONTINUED FAIR THEN LITTLE TEMPERATURE CHANGE THEN WEATHER OK ! IFRUN gt_301.exe ANDRUN slo_fall.exe ANDRUN nedir.exe AND CLOUDS INDICATE STEADY WEATHER AND SEASON IS SUMMER THEN RAIN MAY NOT fall THEN STEADY FOR SEVERAL DAYS THEN WEATHER OK ! IFRUN gt_301.exe ANDRUN slo_fall.exe ANDRUN nedir.exe AND CLOUDS INDICATE BAD WEATHER AND SEASON IS WINTER THEN RAIN WITHIN 24 HOURS THEN WEATHER TURNING BAD ! IFRUN lt_298.exe ANDRUN rpd_rise.exe THEN WEATHER IMPROVING THEN CLEARING AND COLDER ! IFRUN lt_301.exe ANDRUN slo_rise.exe AND CLOUDS INDICATE WEATHER IMPROVING THEN CLEARING WITHIN A FEW HOURS THEN FAIR NEXT SEVERAL DAYS THEN WEATHER IMPROVING ! IFRUN gt_301.exe ANDRUN slo_fall.exe ANDRUN edir.exe AND CLOUDS INDICATE BAD WEATHER THEN RAIN IN 12 - 18 HOURS THEN WEATHER TURNING BAD ! IFRUN lt_298.exe ANDRUN rpd_fall.exe ANDRUN ndir.exe THEN SEVERE STORM WARNING THEN SEVERE NORTHEAST GALES THEN WEATHER TURNING BAD ! IFRUN lt_298.exe ANDRUN rpd_fall.exe ANDRUN sedir.exe THEN SEVERE STORM WARNING THEN RAIN OR SNOW IMMINENT THEN WEATHER TURNING BAD ! IFRUN lt_301.exe ANDRUN slo_fall.exe ANDRUN edir.exe AND CLOUDS INDICATE BAD WEATHER THEN RAIN FOR NEXT DAY OR TWO THEN WEATHER TURNING BAD ! IFRUN lt_301.exe ANDRUN rpd_fall.exe ANDRUN edir.exe AND CLOUDS INDICATE BAD WEATHER THEN CLEARING WITHIN 24 HOURS THEN COOLER TEMPERATURES THEN WEATHER TURNING BAD ! IFRUN gt_301.exe ANDRUN rpd_rise.exe ANDRUN wdir.exe THEN FAIR TODAY THEN RAIN AND WARMER NEXT 48 HOURS THEN WEATHER TURNING BAD ! IFRUN gt_301.exe ANDRUN slo_fall.exe ANDRUN wdir.exe THEN WARMER THEN RAIN WITHING 24 - 36 HOURS THEN WEATHER TURNING BAD ! IFRUN gt_301.exe ANDRUN rpd_fall.exe ANDRUN wdir.exe AND CLOUDS INDICATE BAD WEATHER THEN WARMER THEN RAIN WITHIN 18 - 24 HOURS THEN WEATHER TURNING BAD ! IFRUN gt_301.exe ANDRUN slo_fall.exe ANDRUN sdir.exe THEN RAIN WITHIN 24 HOURS THEN WEATHER TURNING BAD ! IFRUN gt_301.exe ANDRUN rpd_fall.exe ANDRUN sdir.exe THEN WEATHER TURNING BAD THEN WINDY, RAIN WITHIN 12 HOURS ! IFNOT WEATHER OK IFNOT WEATHER TURNING BAD IFNOT WEATHER IMPROVING THENHYP INSUFFICIENT DATA FOR A FORECAST ! IF WEATHER OK THENHYP I'M GLAD THAT THE WEATHER WILL BE OK ! IF WEATHER TURNING BAD THENHYP TOO BAD ABOUT THE PICKNICK ! IF WEATHER IMPROVING THENHYP HOW ABOUT A PICKNICK? ! SHAR_EOF fi # end of overwriting check if test -f 'makefile' then echo shar: will not over-write existing file "'makefile'" else cat << \SHAR_EOF > 'makefile' #make file for weather storm: message1.exe gt_302.exe gt_301.exe lt_301.exe lt_298.exe \ wdir.exe nwdir.exe ndir.exe nedir.exe edir.exe sedir.exe sdir.exe \ swdir.exe steady.exe rpd_fall.exe rpd_rise.exe slo_rise.exe slo_fall.exe message1.exe: message1.c cc message1.c -omessage1.exe gt_302.exe: gt_302.c cc gt_302.c -ogt_302.exe gt_301.exe: gt_301.c cc gt_301.c -ogt_301.exe lt_301.exe: lt_301.c cc lt_301.c -olt_301.exe lt_298.exe: lt_298.c cc lt_298.c -olt_298.exe wdir.exe: wdir.c cc wdir.c -owdir.exe nwdir.exe: nwdir.c cc nwdir.c -onwdir.exe swdir.exe: swdir.c cc swdir.c -oswdir.exe edir.exe: edir.c cc edir.c -oedir.exe nedir.exe: nedir.c cc nedir.c -onedir.exe sedir.exe: sedir.c cc sedir.c -osedir.exe sdir.exe: sdir.c cc sdir.c -osdir.exe ndir.exe: ndir.c cc ndir.c -ondir.exe slo_rise.exe: slo_rise.c cc slo_rise.c -oslo_rise.exe steady.exe: steady.c cc steady.c -osteady.exe rpd_rise.exe: rpd_rise.c cc rpd_rise.c -orpd_rise.exe rpd_fall.exe: rpd_fall.c cc rpd_fall.c -orpd_fall.exe slo_fall.exe: slo_fall.c cc slo_fall.c -oslo_fall.exe SHAR_EOF fi # end of overwriting check # End of shell archive exit 0