Abstraction of Prevention Conceived in Distributed Knowledge Base
Susumu Yamasaki
1 a
and Mariko Sasakura
2 b
1
Okayama University, Tsushima-Naka, Okayama, Japan
2
Department of Computer Science, Okayama University, Tsushima-Naka, Okayama, Japan
Keywords:
Knowledge Acquisition, Algebraic Approach, Distributed System.
Abstract:
This paper is concerned with prevented information common in distributed knowledge base. The distributed
knowledge is a framework to reflect knowledge acquisition and retrieval in a seminar class with participants.
The presented accounts are listened to, by participants such that the participants may acquire knowledge.
To make the acquired knowledge formal, it is restricted to rule-type and assumed as logically causal or al-
gebraically structural. For such formalized knowledge, the meaning of knowledge may be considered by a
consistent fixed point of the mapping associated with knowledge rules. The fixed point approach has com-
plexity if the mapping is nonmonotonic (not monotonic), because the fixed point is not always available for the
mapping. In this paper, we face such complexity caused by the nonmonotonic mapping which is reasonable
from interactions between positive and negative informations in acquiring knowledge. With the assumption of
some consistent fixed point existence, retrieval derivation to the ruled knowledge is inductively designed such
that it may be sound with respect to the fixed point meaning of knowledge. The derivation adopts negation by
failure, making adjustments between succeeding and failing cases, inherently involved in acquired knowledge.
As regards the whole system in accordance with the seminar class, distributed knowledge base is formalized
by taking a direct product of knowledge regarded as acquired by each participant. To make complexity of
mutually interactive communications simpler and to possibly formulate common prevention conceived in the
distributed knowledge base, we present a mapping associated with distributed knowledge base containing
common negatives. Then the meaning of the whole system with common prevention information may be the-
oretically defined by a consistent fixed point of a mapping. A consistent fixed point of the mapping does not
always exist, however, if it is definable, retrieval derivation in distributed knowledge base may be designed
with an oracle of assumed prevention information in such a distributed knowledge base.
1 INTRODUCTION
A community may be regarded as containing dis-
tributed knowledge base which is formed with knowl-
edge of community members. Then some common
knowledge can be abstracted, although formulation
of knowledge arrangements is complex as a process.
This paper aims at the formation of common knowl-
edge, especially, preventive negative. This is moti-
vated as a problem in a seminar circle which is empir-
ical in the virtual reality by M. Sasakura, et al. (2021).
The treatment of common negative may involve ap-
plicative and theoretical interests, while positive in-
formation can be enjoyed individually.
As regards knowledge with logic, there have been
advanced methodologies.
a
https://orcid.org/0000-0001-7895-5040
b
https://orcid.org/0000-0002-8909-9072
(a) Nonmonotonic logic on reasoning and inference
mechanism is now rather classical but should be still
worthwhile examining (Hanks and McDermott, 1987;
Reiter, 2001).
(b) With respect to modal logic which may be tools
for epistemic aspects, first-order modal logic is for-
mally dealt with (Fitting, 2002), and second-order
abstraction is considered for modality such that am-
biguity of knowledge may be discussed by B. Kooi
(2016). Quantifiers over epistemic agents are intro-
duced (Naumov and Tao, 2019), as well.
(c) With reference to computability, quantified modal
logic is discussed (Rin and S.Walsh, 2016). Topolog-
ical space may be taken for modality (Goldblatt and
Hodkinson, 2020).
(d) For stepwise removal of objects, dynamic modal-
ity is presented (Bentham et al., 2022). Dynamic logic
for action was presented by L. Spalazzi et al. (2000).
Justified belief truth is discussed (Egre et al., 2021).
Yamasaki, S. and Sasakura, M.
Abstraction of Prevention Conceived in Distributed Knowledge Base.
DOI: 10.5220/0011708600003485
In Proceedings of the 8th International Conference on Complexity, Future Information Systems and Risk (COMPLEXIS 2023), pages 39-46
ISBN: 978-989-758-644-6; ISSN: 2184-5034
Copyright
c
2023 by SCITEPRESS Science and Technology Publications, Lda. Under CC license (CC BY-NC-ND 4.0)
39
(e) Reduction of decidability is compiled (Rasga
et al., 2021) and inference theory is formulated (Ten-
nant, 2021).
Concerning knowledge representation, this paper
considers a rule set as knowledge, where each rule
can be given by some algebraic expression reflecting
logical implication or causal relation, based on alge-
bra. The rule set causes nonmonotonic acquiring of
knowledge. In this sense, the classical nonmonotonic
logic is most relevant to the present paper, based on
algebraic expressions. Some common prevention in
distributed knowledge base (each of which is formed
by algebraic expressions) causes complexity, to be de-
tected.
For the behaviours of distributed systems, com-
munication theories are embedded with the ideas of
rewriting process and process algebra, as well as of
sequence generations:
(a) Rewriting process with reductions for calculus
is formulated by functionalism as in the work (C.
Bertolissi et al., 2006).
(b) Mobile ambients are dealt with in process of
behaviours (Cardelli and Gordon, 2000; Merro and
Nardelli, 2005).
(c) Sequences traversing states in a distributed sys-
tem may be covered by the method of automata (M.
Droste et al., 2009).
Among the above processes, the presentation of
the seminar (referred to, in this paper) is regarded as
the sequence generated in the above third method.
The seminar presentation of this paper contains a
stream of photo images, which is related to the se-
quence generated by traversing states. On the other
hand, the distributed system of knowledge is captured
in a static sense. Just common, negative (as a meet
of reports from the participants) can be examined at
each site of participants.
This paper then makes theoretical analyses and
designs on:
(a) knowledge representation abstracted from the
seminar participants,
(b) meaning of acquired knowledge and retrieval, and
(c) applications of meaning (with retrieval) to dis-
tributed knowledge system containing common nega-
tive.
The paper is organized as follows. Section 2
abstracts a theoretical method of sharing prevention
knowledge, from the seminar in a virtual reality space.
In Section 3, a rule set is formally given as algebraic
expressions whose meaning may be defined by fixed
point of a mapping associated with the rule set. A re-
trieval derivation for knowledge is detection and ex-
amination of the meaning which knowledge denotes.
In Section 4, a distributed knowledge with common
negative is dealt with, by expanding individual knowl-
edge base and derivation. Concluding remarks are
given in Section 5.
2 KNOWLEDGE ACQUISITION
AND PROCESSING
The seminar (which we have implemented in virtual
reality) conceives some knowledge processing prob-
lem. As in lecture and seminar, participants (who
listen to the presenter’s verbal accounts) may be re-
garded as acquiring knowledge. The class consists of
images through video camera, to be organized as the
streams to the seminar participants. After reviewing
the presentation, the participants deliver reports to be
gathered into a common virtual space.
Common Prevention in Distributed Knowledge
Base
There is a motivated problem of this paper: After
reporting, can the seminar participants hold a com-
mon knowledge? As common knowledge, preventive
notices (which the seminar presents and participants
would keep) are the subject of this paper. The dis-
tributed system is in general complex, owing to nega-
tives: The more positive and negative knowledge are
acquired, the more complicated the system is. We
here assume that:
(a) Each participant organizes his/her understanding
as knowledge base, with respect to the presentation
by verbal accounts in seminar.
(b) Each participant can manage knowledge consist-
ing of rules, where each rule is constructed in terms
of positive and negative informations deriving conclu-
sion.
(c) Negatives inferred by each knowledge are exam-
ined, to be common in the distributed system, where
each knowledge may derive inferences, as the partici-
pant thinks of, after the seminar presentation.
(d) The knowledge acquisition (to be virtually imple-
mentable in the seminar) is schematized with human
interaction.
That is, the verbal accounts or explanations are
to be presented such that the participants can acquire
knowledge of rule sets, where the participants sup-
posedly acknowledge algebraic structure of knowl-
edge. Among acquired knowledge, common preven-
tion may be inferred. This scheme is arranged as in
Table 1. On the common prevention, algebraic analy-
sis is made for retrieval derivation to be designed.
Rule Set as Knowledge
The rule formation comes from logical or algebraic
COMPLEXIS 2023 - 8th International Conference on Complexity, Future Information Systems and Risk
40
Table 1: The acquired knowledge is formalized.
Presenter = Participants
Verbal accounts Acquired Rules
Examined = Negatives
Alert Communicated Prevention
property to understand knowledge. As regards pos-
itive and negative informations, theories on state
spaces are given (Hornicher, 2021). Merge of dis-
tributed knowledge is formulated (Christoff et al.,
2022). In this paper, common negative in a distributed
system is paid attention to, conceived from the semi-
nar problem so that the negative of logical or algebraic
basis may be shared.
A rule is of the form r, in a formal way (which
would be clearer in Section 3), represented by posi-
tive and negative information to derive a conclusion,
which can be taken as knowledge acquisition:
r = (Pos, Neg, con) where
Pos, Neg A (a domain)
Pos ::= {a} Pos
Neg ::= {a
} Neg
(a
stands for negative operation on A)
con ::= a or a
(for a A)
The form contains recursion of representation in
Backus-Naur Form. If we see the structure as logi-
cal, we may interpret the knowledge as follows:
(a) If Pos = {a
1
, . . . , a
n
}, Pos denotes a
1
. . . a
n
with conjunction .
(b) If Neg = {b
1
, . . . , b
m
}, Neg denotes b
1
. . . b
m
.
(c) (Pos, Neg, con) denotes Pos Neg con with
” (implication).
Then a set R of rules (where the rules are mutually
conjunctive) is assumed as knowledge (which each
participant acquires after the seminar). As auxiliary
means, a subset of the set {a
| a A} may be re-
ported to the presenter. It is considerably common
negative information.
We analyze the meaning of knowledge and a dis-
tributed knowledge system with common negative.
Then we show some way to see the meaning and to
perform retrieval of the knowledge.
Although the following treatment on knowledge
as rule set is algebraic, the rule set is interpreted log-
ically as a conjunction of rules which are in accor-
dance to logical implications with premises and con-
clusion in 3-valued intuitionistic logic.
3 KNOWLEDGE
ORGANIZATION
In this section, a rule set is formally described. Each
rule reflects algebraic, logical or causal relation such
that a set of rules is regarded as knowledge.
3.1 A Rule Set
We firstly assume a domain A to construct a set of
knowledgeable objects. We then make use of:
A
= {a
| a A}
where a
is to be interpreted as negative of a.
A rule is a triplet of the form (Pos, Neg, con)
where:
(a) Pos A,
(b) Neg A
and
(c) con = a or a
for a A.
The expression (Pos, Neg, a) or (Pos
0
, Neg
0
, a
)
may be adopted, if the form con (of the third item
in the rule triplet) is a A or a
A
, respectively. A
name R is used to refer to a set of such triplets (a rule
set).
Example 1. We illustrate a set R of rules:
(i) ({revised}, { f ashioned
}, evolved)
(ii) ({ f ashioned},
/
0, ruled)
(iii) (
/
0, {ruled
}, revised)
Many-valued logic provability is presented
(Pawlowski and Urbaniak, 2018). From practical
views, answer set programming and problem solving
are compiled in 2-valued logic (Gebser and Schaub,
2016; Kaufmann et al., 2016).
Apart from answer set programming, 3-valued
evaluation is studied with the unknown (the unde-
fined), for preventive negative to be paid attention
to. The 3-valued evaluation applicable to algebraic
expressions contains originality with respect to
complexity for both rule sets and retrieval. As a
3-valued evaluation, we adopt the following algebra:
Base Algebra of 3-Valued Domain
A bounded lattice K = ({ f , unk, t},
W
,
V
, , >)
equipped with the partial order v and an implication
may be taken:
(a) and > are the least and the greatest elements f
and t, respectively, with respect to the partial order v
such that = f v unk v t = >.
(b) The least upper bound ( join)
W
and the greatest
lower bound (meet)
V
exist for any two elements of
the set { f , unk, t}.
Abstraction of Prevention Conceived in Distributed Knowledge Base
41
(c) The implication (a relation on the set) is defined
in a way that z v (x y) iff x
V
z v y.
t is the truth, f the falsehood and unk (the
unknown as t or f ) is the undefined for the truth
value, where the partial order is defined, regarding
the truth value.
Evaluation of Rule Set and Model
A valuation V : A { f , unk, t} is assumed with the
bounded lattice K. With respect to V , the value
eval
V
(E) of an expression E is given.
eval
V
(a) = V (a) (a A)
eval
V
(a
)
= if eval
V
(a) = f then t else f (a
A
)
eval
V
(con)
= if con = a then eval
V
(a)
else if con = a
then eval
V
(a
)
eval
V
(Pos) =
V
{V (a) | a Pos}
eval
V
(Neg) =
V
{V (a
) | a
Neg}
eval
V
((Pos, Neg, con))
= if eval
V
(Pos) v eval
V
(con)
or eval
V
(Neg) v eval
V
(con) then t
else if eval
V
(con) = f then f else unk
eval
V
(R) =
V
(Pos,Neg,con)R
eval
V
((Pos, Neg, con))
For a pair (I, J) 2
A
× 2
A
such that I J =
/
0, i.e.,
I and J are disjoint, the valuation
V (I, J) : A { f , unk, t}
is defined to be:
V (I, J)(a)
= if a I then t else if a J then f
else unk
If the disjoint pair (I, J) (I J =
/
0) causes
eval
V (I,J)
(R) = t, the pair is called a model of the rule
set R.
3.2 Fixed Point Model
For a method to obtain a model of the given rule
set, a fixed point of the mapping associated with the
rule set may be taken, although we cannot always
have such a fixed point, because of nonmonotonic
functionality of the mapping.
Mapping for Modeling of Rule Set
Given a rule R, a mapping T
R
: 2
A
× 2
A
2
A
× 2
A
is
defined to be
T
R
(I, J) = (I
0
, J
0
)
such that the pair (I
0
, J
0
) is given for the pair (I, J) to
T
R
:
if ((Pos, Neg, a) R. ((b Pos. b J) or
(c
Neg. c I))) then a J
0
else if ((Pos, Neg, a) R. ((b Pos. b I) and
(c
Neg. c J))) and
((Pos
0
, Neg
0
, a
) R. ((b Pos
0
. b J) or
(c
Neg
0
. c I))) then a I
0
else ((Pos, Neg, a) R. ((b Pos. b 6∈ J) and
(b
0
Pos. b
0
6∈ I)) and (c
Neg. c J))) and
((Pos
0
, Neg
0
, a
) R. ((b Pos
0
. b J) or
(c Neg
. c I))) entails a 6∈ I
0
J
0
If T
R
(I, J) = (I, J) such that I J =
/
0, the pair is
called a consistent fixed point of T
R
.
Proposition 1. If (I, J) is a consistent fixed point of
T
R
then eval
V (I,J)
(R) = t.
Proof. All the rules of R are examined. For each a
A, we check the evaluation of R with respect to the
valuation V (I, J).
(i) When a I,
((Pos, Neg, a) R. eval
V (I,J)
((Pos, Neg, a)) = t).
Because a I,
((Pos
0
, Neg
0
, a
) R. ((b Pos
0
. b J) or
(c
Neg
0
. c I))).
It follows that
eval
V (I,J)
(Pos
0
) = f or eval
V (I,J)
(Neg
0
) = f .
Thus eval
V (I,J)
((Pos
0
, Neg
0
, a
)) = t.
(ii) Assume that a J. Then
((Pos, Neg, a) R. ((b Pos. b J) or
(c
Neg. c I))).
It follows that
eval
V (I,J)
(Pos) = f or eval
V (I,J)
(Neg) = f .
Thus eval
V (I,J)
((Pos, Neg, a)) = t. On the other hand,
eval
V (I,J)
(a
) = t
such that eval
V (I,J)
((Pos
0
, Neg
0
, a
)) = t.
(iii) In case that a 6∈ I J:
((Pos, Neg, a) R. ((b Pos. b 6∈ J) and
(b
0
Pos. b
0
6∈ I)) and (c
Neg. c J))) and
((Pos
0
, Neg
0
, a
) R. ((b Pos
0
. b J) or
(c
Neg
0
. c I))).
It follows that
eval
V (I,J)
(Pos) = unk and eval
V (I,J)
(Neg) = t.
COMPLEXIS 2023 - 8th International Conference on Complexity, Future Information Systems and Risk
42
On the assumption of a 6∈ I J, eval
V (I,J)
(a) = unk.
Thus eval
V (I,J)
((Pos, Neg, a) = t.
For any rule of the assumed form
(Pos
0
, Neg
0
, a
) R,
eval
V (I,J)
(Pos
0
Neg
0
) = f , while eval
V (I,J)
(a
) = f .
Thus eval
V (I,J)
(Pos
0
, Neg
0
, a
) = t.
Example 2. Assume the rule set R as in Example 1.
Then, we have a model as fixed points of T
R
:
({revised, evolved}, { f ashioned, ruled})
Thus, the consistent fixed point (I, J) of T
R
is a
model of R.
Given a set R of rules, the following derivation is
an amended version of negation by failure.
Retrieval Derivation
suc and f ail are succeeding and failing derivations,
inductively defined as follows.
(1)
/
0 : suc.
(2)
if (Pos, Neg, a) R.
(((Pos
0
, Neg
0
, a
) R. Pos
0
Neg
0
: f ail) and
Pos Neg G : suc) then {a} G : suc.
(3) If {a} : f ail and G : suc then {a
} G : suc.
(4) If (Pos, Neg, a) R. (Pos Neg : f ail) then
{a} : f ail.
(5) If {a} : f ail then {a} G : f ail.
(6) If {a} : suc then {a
} G : f ail.
Example 3. Assume the rule set R as in Example 1.
Then we have a succeeding derivation.
1. For “{evolved} : suc” to hold,
{revised} { f ashioned
} : suc
must hold, since there is
({revised}, { f ashioned
}, evolved) R.
2. For “{revised} { f ashioned
} : suc” to hold,
{revised} : suc must hold, since we can see
{ f ashioned} : f ail”.
3. For {revised} : suc to hold, {ruled
} : suc
must hold, since there is (
/
0, {ruled
}, revised)
R.
4. We can see {ruled} : f ail”. The check of
whether {ruled
} : suc or not may be reduced
to the case for “
/
0 : suc” (initially assumed).
Thus we can display the following scheme:
{evolved}
|
with ({revised}, { f ashioned
}, evolved) R
|
{revised} { f ashioned
}
|
with { f ashioned} : f ail
|
{revised}
|
with (
/
0, {rules
}, revised)
|
{ruled
}
|
with {ruled} : f ail
|
/
0 : suc
The derivation is sound with respect to possibly
existing, consistent fixed point model in the sense:
Proposition 2. Assume that (I, J) is a consistent fixed
point of T
R
.
(1) If {a} : suc then a I.
(2) If {a} : f ail then a J.
Proof. (1) If {a} : suc then
((Pos
0
, Neg
0
, a
) R. Pos
0
Neg
0
: f ail).
It follows that
(b Pos
0
.{b} : f ail), or
(c
Neg
0
: {c
} : f ail)(i.e., c
Neg
0
.{c} : suc).
By induction hypothesis, there is b J or c I, for the
assumed derivation {a} : suc. With respect to {a} :
suc, two cases are to be examined.
(a) If (
/
0,
/
0, a) R, as a basis, it is evident that a I.
(b) If (Pos, Neg, a) R such that Pos Neg : suc, as
induction step, we can reason that
(b Pos. b I) and (c
Neg. c J),
from the condition that
(b Pos.{b} : suc) and (c
Neg.{c} : f ail).
This completes the induction step, such that a I.
(2) If {a} : f ail then
((Pos, Neg, a) R. Pos Neg : f ail).
When there is no rule of the form (Pos, Neg, a), then
a J. Otherwise, it follows that
(b Pos.{b} : f ail) or (c
Neg.{c
} : f ail)
(the latter of which is caused by c
Neg.{c} : suc).
By induction, b J or c I. This concludes that a
J.
Abstraction of Prevention Conceived in Distributed Knowledge Base
43
Negation by Failure
In the Retrieval Derivation, the item (2) contains the
point: For {a} : suc” to hold, the following condition
is required:
((Pos
0
, Neg
0
, a
) R. Pos
0
Neg
0
: f ail)
This condition contains complexity, which the
original negation by failure rule (K. Clark, 1978) does
not need. The condition comes from the evaluation
for the triplet with the implication in:
Pos Neg implies con.
The meaning of the implication is concerned with 3-
valued domain, as above mentioned for the definition
of eval
V
(). Then:
(i) If {a} : f ail then {a
} : suc.
(ii) In case that {a
} : f ail, it may be possible that
{a} : suc. (Therefore, if {a} : suc then {a
} :
f ail.)
This amended negation by failure is well enough to
escape from infinite procedure for failure such that
succeeding derivation contains only finite steps of ex-
ecutions.
On the other hand, the rule set R
R = {(
/
0, {b
}, a), (
/
0, {a
}, b)}
induces 2 consistent fixed points of T
R
:
({a}, {b}) and ({b}, {a})
Because of no finite failure for {b}, we cannot have
{a} : suc. At the same time, we cannot obtain {a} :
f ail such that it is no case of {b} : suc.
4 DISTRIBUTED KNOWLEDGE
BASE
In this section, distributed knowledge base is just a tu-
ple of knowledges each of which is described in Sec-
tion 3. But the negative from each knowledge must
be common. How we can have the meaning of dis-
tributed knowledge base with common negatives is
presented to apply to the theory for prevention alert
in distributed systems. Then we can have retrieval
derivation by means of oracle of assumed prevention,
with respect to the meaning of distributed knowledge
base.
4.1 Tuple of Rule Sets
As distributed knowledge base (which may be re-
garded as constructed by seminar participants), a tu-
ple of rule sets
τ = hR
1
, . . . , R
n
i (n 1)
is used. To represent a distributed knowledge base,
we extend the method of how each rule set denotes a
knowledge over a set A.
A valuation V
i
: A { f , unk, t} (1 i n) is as-
sumed with the bounded lattice K, as in the case of
Section 3.
The evaluations of R
k
with the way as below are
to be executed for 1 k n.
Evaluation of Rule Sets Tuple and Model
With (V
1
, . . . , V
n
), the value Eval
(V
1
,...,V
n
)
(τ) is given
by:
Eval
(V
1
,...,V
n
)
(τ)
= Eval
(V
1
,...,V
n
)
(hR
1
, . . . , R
n
i)
= (eval
V
1
(R
1
), . . . , eval
V
n
(R
n
))
For a pair (I, J) 2
A
× 2
A
such that I J =
/
0, i.e.,
I and J are disjoint, the valuation
V
k
(I, J) : A { f , unk, t} (1 k n)
is used as V (I, J) in Section 3.
If with the disjoint pairs (I
k
, J
k
) (1 k n) for a
tuple τ of rule sets,
Eval
(V
1
(I
1
,J
1
),...,V
n
(I
n
,J
n
))
(τ) = (t, . . . , t)
then the pairs are called a model of τ.
Just taking a direct product of pairs each of which
may be defined by the mapping of T
R
k
(1 k n),
we have a mapping of Tr
τ
.
Mapping for Modeling of Rule Sets Tuple
Given a tuple of rule sets τ = hR
1
, . . . , R
n
i, a mapping
Tr
τ
: (2
A
× 2
A
)
n
(2
A
× 2
A
)
n
is defined to be
Tr
τ
((I
1
, J
1
), . . . , (I
n
, J
n
))
= (T
R
1
(I
1
, J
1
), . . . , T
R
n
(I
n
, J
n
))
= ((I
0
1
, J
0
1
), . . . , (I
0
n
, J
0
n
))
such that each pair (I
0
k
, J
0
k
) is given for the pair (I
k
, J
k
)
with T
R
k
(as T
R
in Section 3):
if ((Pos, Neg, a) R
k
. ((b Pos. b J
k
) or
(c
Neg. c I
k
))) then a J
0
k
else if
((Pos, Neg, a) R
k
. ((b Pos. b I
k
) and
(c
Neg. c J
k
))) and
((Pos
0
, Neg
0
, a
) R
k
. ((b Pos
0
. b J
k
) or
(c
Neg
0
. c I
k
))) then a I
0
k
else ((Pos, Neg, a) R
k
. ((b Pos. b 6∈ J
k
) and
(b
0
Pos. b
0
6∈ I
k
)) and (c
Neg. c J
k
))) and
((Pos
0
, Neg
0
, a
) R
k
. ((b Pos
0
. b J
k
) or
(c Neg
. c I
k
))) entails a 6∈ I
0
k
J
0
k
COMPLEXIS 2023 - 8th International Conference on Complexity, Future Information Systems and Risk
44
The fixed point of the mapping Tr
τ
may be ob-
tained such that each R
k
(1 k n) is modelled.
Proposition 3. If
Tr
τ
((I
1
, J
1
), . . . , (I
n
, J
n
)) = ((I
1
, J
1
), . . . , (I
n
, J
n
))
such that I
k
J
k
=
/
0 (1 k n) then
Eval
(V (I
1
,J
1
),...,V (I
n
,J
n
))
(τ) = (t, . . . , t),
i.e., eval
V (I
k
,J
k
)
(I
k
, J
k
) = t (1 k n).
Proof. For each R
k
, the proof of Proposition 1 can
be applied, where each T
R
k
is independent of another
T
R
j
(k 6= j). Tr
τ
is defined in terms of such mutually
independent T
R
k
. Therefore the above fixed point of
Tr
τ
is a tuple of the consistent fixed points of T
R
k
(1
k n). Thus the above fixed point of Tr
τ
is associated
with
Eval
(V (I
1
,J
1
),...,V (I
n
,J
n
))
(τ)
which is a tuple of n values of t.
The fixed points (I
k
, J
k
) (for 1 k n) are com-
ponents of the (tuple) fixed point of τ.
4.2 Retrieval in Knowledge Base
Fixed point of
Tr
τ
: (2
A
× 2
A
)
n
(2
A
× 2
A
)
n
,
((I
1
, J), . . . , (I
n
, J)) (I
k
J =
/
0, 1 k n) can be
knowledge acquisitions of individuals, where preven-
tion information is common.
Since each (I
k
, J) is independent of another
(I
k
0
, J), retrieval derivation to each R
k
is available,
which is defined with an oracle O supposed to be a
common negative knowledge, following the deriva-
tion given in Section 3.
Retrieval Derivation to R
k
with Oracle O
(1)
/
0 : suc.
(2) If a 6∈ O where there is (Pos, Neg, a) R
k
such
that (((Pos
0
, Neg
0
, a
) R
k
. Pos
0
Neg
0
: f ail)
and Pos Neg G : suc) then {a} G : suc.
(3) If {a} : f ail and G : suc then {a
} G : suc.
(4) If a O such that (Pos, Neg, a) R
j
.(PosNeg :
f ail) then {a} : f ail.
(5) If {a} : f ail then {a} G : f ail.
(6) If {a} : suc then {a
} G : f ail.
The above retrieval derivation may contain sound-
ness with respect to (I
k
, J), in the sense:
Proposition 4. Assume that for
τ = hR
1
, . . . , R
n
i
((I
1
, J), . . . , (I
n
, J)) is a fixed point of Tr
τ
, where
I
k
J =
/
0 (1 k n).
For the derivation to R
k
with the oracle Q J, we
have:
(1) If {a} : suc then a I
k
.
(2) If {a} : f ail then a J.
Proof. Because O is supposedly a subset J, the rea-
son why soundness is held is almost the same as the
proof of Proposition 2 in Section 3. But we describe
formally in the similar way.
(1) If {a} : suc with a 6∈ O then
(Pos
0
, Neg
0
, a
) R. Pos
0
Neg
0
: f ail.
Thus (b Pos
0
.{b} : f ail) or (c
Neg.{c
} : f ail)
(i.e., c
Neg
0
.{c} : suc).
By induction hypothesis, there is b J or c I,
for the assumed derivation {a} : suc.
2 cases are also to be examined:
(a) If (
/
0,
/
0, a) R, as a basis, it is evident that a I.
(b) If (Pos, Neg, a) R such that Pos Neg : suc, as
induction step, we can reason that
(b Pos. b I) and (c
Neg. c J),
from the condition that
(b Pos. {b} : suc) and (c
Neg. {c} : f ail).
This completes the induction step, such that a I.
(2) If {a} : f ail with a O then
(Pos, Neg, a) R. Pos Neg : f ail.
When there is no rule of the form (Pos, Neg, a), then
a J. Otherwise, it follows that
b Pos.{b} : f ail or c
Neg. {c
} : f ail
(the latter of which is caused by c
Neg.{c} : suc).
By induction, b J or c I. This concludes that a
J.
Proposition 4 shows that the derivations to R
k
with
oracle O is sound with respect to the consistent fixed
point (I
k
, J) of T
R
k
, where the oracle O, an assumed
subset of the set J can be regarded as common pre-
vention in the distributed knowledge base
τ = hR
1
, . . . , R
n
i.
Example 4. Assume the rule set
R
1
= { (
/
0,
/
0, c), ({c}, {d
}, a), ({b},
/
0, {a
}) }
The set is modeled by ({a, c}, {b, d}).
Assume the rule set
R
2
= { (
/
0,
/
0, c), ({b, c},
/
0, a), (
/
0,
/
0, a
) }.
The set R
2
is modeled by ({c}, {a, b}). For the tuple
hR
1
, R
2
i, {b} is a common prevention.
Abstraction of Prevention Conceived in Distributed Knowledge Base
45
5 CONCLUSION
Motivated by a seminar relation between the presen-
ter and participants, we settle knowledge acquisitions
and distributed knowledge base.
We established theoretical results:
(a) A triplet of a positive set, a negative set and con-
clusion as a rule, is adopted, such that a rule set may
be regarded as acquired knowledge whose evaluation
is made in 3-valued domain: The rule-set evaluation
is based on 3-valued bounded lattice structure.
(b) This evaluation involves complex difficulty caused
by strong negatives. We conclude that a fixed point of
a mapping associated with a rule set may be a model
(which evaluates the rule set as true in the 3-valued
domain). A fixed point does not always exist, how-
ever, it may be a model if it must be consistent (that
is, no case is evaluated as both positive and negative),
leaving the unknown (undefined) as it is.
(c) A retrieval derivation is made by amending nega-
tion by failure, to be sound with respect to the model
which is a consistent fixed point.
This is another theoretical dealing with the alge-
braic/logical complex, compared with the papers (Ya-
masaki and Sasakura, 2021a; Yamasaki and Sasakura,
2022). Then we deal with distributed knowledge base
containing common prevention, abstractly reflecting
the seminar system with the reports on negatives from
participants.
(d) We think of a tuple of triplets (for rule sets) as dis-
tributed knowledge base, which is regarded as a theo-
retical representation of a seminar system.
(e) The evaluation of distributed knowledge base is
made such that we may have some model by a con-
sistent fixed point of a mapping associated with dis-
tributed knowledge base, although such a fixed point
does not always exist. This mapping contains the
mappings associated with acquired knowledges (vir-
tually of participants).
(f) With some assumed prevention, distributed re-
trieval derivations are available by means of strate-
gies containing individual derivation for knowledge
as briefly pointed out in (c).
As in the treatment of communication (Yamasaki
and Sasakura, 2021b), if both positive and negative
are common, then the whole distributed knowledge
base should be treated as single knowledge base. In
this case, Section 3 gives a theoretical base. Ow-
ing to implementation of communication among R
k
(1 k n), the retrieval derivation must be essen-
tially complex. If we could have access to another R
j
from R
k
only by reference to, a possible fixed point
and the given procedural aspects of retrieval deriva-
tion may be abstractly simpler.
REFERENCES
Bentham, J. V., K.Mierzewski, and Blando, F. (2022). The
modal logic of stepwise removal. Rev.Symb.Log.,
15(1):36–63.
Cardelli, L. and Gordon, A. (2000). Mobile ambients. The-
oret.Comput.Sci., 240(1):177–213.
Christoff, Z., Gratzl, N., and Roy, O. (2022). Priority
merge and intersection modalities. Rev.Symb.Log.,
15(1):165–a96.
Egre, P., Marty, P., and Renne, B. (2021). Knowledge,
justification and adequate reasoning. Rev.Symb.Log.,
14(3):681–727.
Fitting, M. (2002). Modal logics between propositional and
first-order. J.Log.comput., 12(6):1017–1026.
Gebser, M. and Schaub, T. (2016). Modeling and language
extensions. AI Magazine, 3(3):33–44.
Goldblatt, R. and Hodkinson, I. (2020). Strong com-
pleteness of modal logics over 0-dimensional metric
spaces. Rev.Log.Comput., 13(3):611–632.
Hanks, S. and McDermott, D. (1987). Nonmonotonic logic
and temporal projection. Artifi.Intelli., 33(3):379–
412.
Hornicher, L. (2021). The logic of information in state
spaces. Rev.Symb.Log., 15(1):155–186.
Kaufmann, B., Leone, N., Perri, S., and Schaub, T. (2016).
Grounding and solving in answer set programming. AI
Magazine, 3(3):25–32.
Merro, M. and Nardelli, F. (2005). Behavioural theory for
mobile ambients. J.ACM., 52(6):961–1023.
Naumov, P. and Tao, J. (2019). Everyone knows that
some knows: Quantifiers over epistemic agents. Re-
view.Symb.Log., 12(2):255–270.
Pawlowski, P. and Urbaniak, R. (2018). Many-valued logic
of informal provability: A non-deterministic strategy.
Review.Symb.Log., 11(2):207–223.
Rasga, J., Sernadas, C., and Carnielli, W. (2021). Reduction
techniques for proving decidability in logics and their
meet-combination. Bull.Symb.Log., 27(1):39–66.
Reiter, R. (2001). Knowledge in Action. MIT Press.
Rin, B. and S.Walsh (2016). Realizability semantics for
quantified modal logic: generalizing flagg’s 1985 con-
struction. Rev.Symb.Log., 9(4):752–809.
Tennant, N. (2021). What is a rule of inference.
Rev.Symb.Log., 14(2):307–346.
Yamasaki, S. and Sasakura, M. (2021a). Algebraic expres-
sions with state constraints for causal relations and
data semantics. In CCIS 1446, Data Management
Technologies and Applications, pages 245–266.
Yamasaki, S. and Sasakura, M. (2021b). Distributed strate-
gies and managements based on state constraint logic
with predicate for communication. In Proceedings of
the 6th International Conference on Complexity, Fu-
ture Information Systems and Risk, pages 78–85.
Yamasaki, S. and Sasakura, M. (2022). Consultation to ef-
fectiveness and logical meaning. In Proceedings of
the 6th International Conference on Complexity, Fu-
ture Information Systems and Risk, pages 57–64.
COMPLEXIS 2023 - 8th International Conference on Complexity, Future Information Systems and Risk
46