DIKWP-TRIZ: A Revolution on Traditional TRIZ Towards Invention for Artificial Consciousness
Abstract
:1. Introduction
- Integration of DIKWP Model with TRIZ Methodology for Artificial Consciousness Innovation: This paper introduces the DIKWP-TRIZ framework, which integration provides a structured approach for applying the TRIZ principle to cognitive processes, particularly to address the incompleteness issues that exist in the concept to Cognitive Space, such as the incompleteness of solutions caused by searching for solutions without understanding the optimization parameters. By bridging the gap between cognitive modeling and inventive problem solving, this approach offers a novel methodology that enhances innovation capabilities in complex, value-driven contexts.
- Comprehensive Mapping of TRIZ Principles to Cognitive Transformations in DIKWP: The research systematically maps TRIZ principles to various cognitive transformations within the DIKWP model, such as the transition from Data to Knowledge or from Wisdom to Purpose. This mapping clarifies the applicability of each TRIZ principle in cognitive processes among the principles. By proposing a refined set of principles and contextual guidelines, the paper improves the precision and efficiency of TRIZ applications in complex cognitive scenarios, thereby facilitating more effective problem solving and innovation.
- Development of a Methodological Framework for Reducing Redundancies and Enhancing Consistency in TRIZ-DIKWP Applications: This study addressed potential inconsistencies in the application of TRIZ principles within the DIKWP framework by extending the TRIZ invention principle in Semantic Space and using Cognitive Space coverage integrity analysis. The proposed methodological framework includes strategies for integrating overlapping principles and offers decision-making tools to guide practitioners in selecting the most appropriate principles for specific cognitive processes. This structured approach ensures a coherent and systematic application of TRIZ principles, enhancing the overall robustness and effectiveness of the DIKWP-TRIZ methodology.
2. Related Works
2.1. DIKWP Model
2.2. TRIZ Theory
3. Research Methodology
3.1. DIKWP Conceptualization
3.1.1. Data Conceptualization
3.1.2. Information Conceptualization
3.1.3. Knowledge Conceptualization
3.1.4. Wisdom Conceptualization
3.1.5. Purpose Conceptualization
3.2. Mapping TRIZ Principles to DIKWP Transformations
3.3. Cognitive Space Coverage Integrity Analysis
3.4. Application of DIKWP-TRIZ
4. Mapping and Coverage Analysis of TRIZ Rules in DIKWP
4.1. Mapping the 40 TRIZ Principles to the DIKWP Model
4.1.1. Data (D) → Data (D)
- Principle 1: SegmentationThis principle involves dividing large datasets into smaller, more manageable segments to facilitate detailed analysis and obtain targeted insights. This strategy helps optimize resource utilization and enhances the efficiency of the analytical process [37].
- Principle 2: Extraction
- Principle 5: MergingIntegrating datasets from different sources to create a more complete and robust dataset. This not only enhances the overall accuracy of the Data but also increases its utility, providing a solid foundation for decision making [40].
- Principle 10: Preliminary ActionsPreprocessing the Data, such as cleansing, standardization, or structural adjustment, prior to formal analysis to ensure the smoothness and effectiveness of subsequent Data operations. This step is essential in Data analysis, as it directly impacts the quality of the final results. For instance, in Data mining, preprocessing steps like Data cleaning, normalization, and integration are essential for reducing noise and inconsistencies, which are common in large datasets. Proper preprocessing improves the performance of Data analysis and mining algorithms, leading to more robust findings. Additionally, preprocessing also includes standardization, which ensures that all Data points are on the same scale, enhancing the accuracy of analytical models and decision-making processes [41].
- Principle 12: EquipotentialityWe have extended the semantic content of this principle here, which is to reduce excessive content flow, complexity, and inconsistency through certain optimization strategies, such as layering or preset boundaries, in order to improve the coordination of the entire system. For example, in software development in Domain-Driven Design [42] mode, all sub-business domain models with the same level are divided into the same equipotential surface. In addition, a unified domain modeling language can be established to ensure that domain experts and developers have the same understanding of the same term.
- Principle 18: Mechanical vibrationWe have expanded the semantic content of this principle by adding a specific mechanism to randomize or denoise the data content, ensuring that the entire system operates at its optimal state. For example, in the protection algorithm for Differential Privacy [43], researchers use Differential Privacy technology to protect individual data without significantly affecting the statistical results and try to avoid individual data leakage as much as possible [44].
- Principle 26: CopyingThe main principle is to use a simple, inexpensive, and easy-to-manufacture replica instead of an expensive or complex original. This principle is reflected in the concept of metaverse [45], which models display targets through computer graphics technology to form data-driven content, allowing users to achieve immersive experiences through virtual reality- or augmented reality-related technologies.
- Principle 30: Flexible Shells and Thin FilmsWe have expanded the semantics of this principle by isolating and processing specific data content from other data content under certain conditions, in order to prevent the environment in which specific content is located by directly accessing that content. For example, in encryption application scenarios, the application of Homomorphic Encryption [46] technology is extremely important, as it can be used and searched without affecting its confidentiality.
4.1.2. Data (D) → Information (I)
- Principle 3: Local QualityFocus on analyzing specific Data subsets to generate detailed Information. This approach can reveal insights that might be overlooked from a global perspective, providing in-depth understanding at a local level. For example, in large-scale market research Data, examining the behavior patterns of a particular consumer group can uncover unique preferences and needs, thereby informing product customization. For example, a study on large-scale software engineering Data demonstrated the benefits of splitting Data into smaller, more homogeneous subsets, resulting in improved model performance and more accurate predictions [47].
- Principle 5: MergingIntegrate Data points from various sources to form a coherent and valuable Information system, facilitating a comprehensive understanding of the subject matter. For instance, combining user behavior Data, geographical Information, and social media feedback can help companies build a more comprehensive user profile, thereby enhancing the effectiveness of marketing strategies [48].
- Principle 7: Nested DollCognitive subjects are able to nest multiple data fields together, progressively forming contrasting content and constructing different semantic expressions. For example, a company’s sales report can reflect the content that users want to understand and compare at once through multiple layers of nesting.
- Principle 9: Preliminary Anti-ActionThe principle of preliminary anti-action in TRIZ, which involves preprocessing steps like filtering out noise or irrelevant Data, is crucial to enhancing the clarity and quality of Information. For instance, techniques such as noise reduction in various applications, like hyperspectral imaging, improve the analysis of key signals by eliminating non-white noise prior to formal analysis [49]. Additionally, noise filtering algorithms can significantly improve Data quality, especially in scenarios involving imbalanced Data or chaotic signals, thereby enhancing the subsequent Data analysis [50]. These preprocessing steps are essential for ensuring the authenticity and reliability of Information, reducing potential biases during analysis, and improving the overall quality of results [51].
- Principle 17: Another DimensionBy utilizing multidimensional representations of data, such as visualization tools or multi-layer models, content with the same semantics can be presented and differentiated through another dimension, revealing deeper insights and providing rich and detailed understanding. For example, using 3D charts to display trend changes in time series data, or using heat maps to illustrate the strength of correlations between variables, can help analysts more intuitively grasp data characteristics [52].
- Principle 28: Mechanics SubstitutionAutomate Data processing tasks using algorithms and tools to efficiently transform large amounts of Data into meaningful Information. With the advancement of machine learning and AI technologies, such automated methods have become an indispensable part of modern Data analysis, significantly enhancing the speed and accuracy of Information extraction [53].
- Principle 35: Parameter ChangesBy altering the measurement standards, formats, or parameters of Data, new Information semantics can be revealed. In financial market analysis, applying different smoothing parameters to historical trading Data can distinguish between short-term and long-term market fluctuations. For example, using moving averages with different periods (such as 5-day and 200-day moving averages) can identify short-term market volatility and long-term trends, thereby providing a basis for investment decisions [54].
4.1.3. Data (D) → Knowledge (K)
- Principle 6: UniversalityExtract general principles or models from specific Data points and extend localized insights to broader contexts. For example, in collaborative environments such as cross-functional software development teams, applying universal principles from one industry can enhance team Knowledge sharing and efficiency across different sectors [55].
- Principle 24: IntermediaryUtilize intermediate models, such as simulations or analytical frameworks, as bridges between raw Data and refined Knowledge to facilitate the understanding and interpretation of complex datasets. For example, in financial risk management, intermediary models like stochastic differential equations are used to model economic scenarios and bridge the gap between complex raw Data and actionable insights [56].
4.1.4. Data (D) → Wisdom (W)
- Principle 40: Composite MaterialsWe extend the semantics of materials to transform them into Data, while composites are expanded into multiple channels or methods serving as Data sources. Correspondingly, in Information technology, this process involves integrating various Data sources and analytical models to generate comprehensive, high-quality decisions guided by Wisdom. This approach is exemplified in applications such as financial risk management [57] and the formulation of optimized traffic management strategies [58], where diverse Data inputs and sophisticated analysis converge to produce holistic, informed decisions.
4.1.5. Data (D) → Purpose (P)
- Principle 4: AsymmetryWe can prioritize subsequent objectives based on the relevance of Data collection and analysis activities to the intended Purpose, ensuring that resources are concentrated in high-impact areas. This approach allows for a strategic allocation of efforts, maximizing the effectiveness of decision making and optimizing outcomes by focusing on areas that most significantly contribute to achieving the desired goals [59].
- Principle 11: In-advance cushioningStakeholders utilize historical traffic and log Data from the same period in previous years to proactively prepare Data systems and infrastructure, supporting anticipated goal-driven demands and enhancing flexibility and readiness. For instance, in e-commerce platforms, to accommodate the surge in traffic during upcoming shopping seasons, stakeholders may upgrade server capacity and optimize database architecture in advance. These proactive measures ensure that the system can handle high concurrent access loads, thereby maintaining performance and reliability under increased demand [60,61].
- Principle 15: DynamismMaintain a flexible Data strategy that can evolve with changing purposes or goals, ensuring its ongoing relevance and effectiveness. For example, in a rapidly changing market environment, regularly evaluating and adjusting Data analysis models to reflect the latest market demands and trends enables the organization to base its decisions on the most up-to-date Information. For instance, the concept of asymmetric resource allocation is also applicable in situations involving emergency medical services. During mass casualty incidents, allocating resources based on prioritization, such as through column generation models, maximizes lifesaving capacity [62].
- Principle 29: Pneumatics and HydraulicsWe have expanded the semantics of this principle to include the concept of increasing the degrees of freedom of the target. Adjusting the degrees of freedom of the system through external data-driven means to achieve the desired goals or intentions. For example, in the field of software engineering, the goal of commonly used Inversion of Control during the development process is to delegate key dependencies to specific containers for management and control through external means, reducing coupling [63].
4.1.6. Information (I) → Data (D)
- Principle 10: Preliminary ActionBased on the differentiated content of Information semantics, specific datasets that may be required in the future can be generated in advance. For example, by collecting meteorological Information, agricultural Data models can be developed beforehand, such as generating Data on the projected impact of rainfall and temperature variations on crop yields [64]. This proactive approach provides robust Data support for agricultural decision making, enabling stakeholders to make informed choices based on predictive insights.
- Principle 22: Blessing in DisguiseNegative or anomalous elements within Information can be transformed into specific Data points for further analysis and decision making. For instance, by identifying anomalies in business operations, such as production delays, specific operational Data can be generated or retrieved to optimize production processes. This targeted approach enables a deeper understanding of underlying issues and supports the development of more effective strategies for process improvement and risk mitigation [65].
4.1.7. Information (I) → Information (I)
- Principle 13: The Other Way RoundIn the transformation of Information to Information, principle 13 is mainly reflected in the reorganization of information flow or structure to promote a better understanding of complex concepts and more effective communication. For example, in the previous studies and improvement of business information flow [66,67], stakeholders were able to better understand and use corresponding workflows, which promoted business development and improved efficiency.
- Principle 17: Another DimensionThe cognitive subject can employ various forms of representation, such as charts and diagrams, to transform one type of differentiation into another, providing multiple perspectives and deeper insights into the Information. For example, in Data visualization, representing Information across different dimensions, such as through multidimensional scaling and graph visualizations, can help users better understand high-dimensional Data. A study on visualizing dimension coverage in exploratory analysis demonstrated that representing Data visually with multiple perspectives helps analysts form new questions and gain deeper insights into datasets [68]. In market research, combining bar charts and pie charts can enhance the analysis by offering different viewpoints on the same Data. For instance, visualizing research topics using a three-dimensional strategic diagram enabled researchers to gain a more nuanced understanding of interdisciplinary research areas and emerging trends [69]. This multi-faceted approach enhances the ability to analyze complex Data and facilitates more informed and strategic decision making.
4.1.8. Information (I) → Knowledge (K)
- Principle 15: DynamismThe Information represents different semantics, and as information updates, the complete semantics corresponding to its knowledge represent our gradually clearer understanding of the world. Therefore, the transformation of information into knowledge represents the continuous expansion of the integrity of knowledge boundaries. And the dynamism of Principle 15 corresponds well to this point. For example, many studies on the prediction and characteristics of protein molecules are constantly expanding human understanding of the field of biomolecules [70,71]. In order to record such dynamics, researchers have constructed corresponding databases to record these dynamic changes [72].
- Principle 24: IntermediaryThis principle in the conversion refers to the use of frameworks or models to transform information into knowledge, serving as a bridge between raw information and structured understanding. For example, in the field of education, developing a curriculum as a framework to guide student learning can help integrate dispersed learning materials into a systematic knowledge system [73].
4.1.9. Information (I) → Wisdom (W)
- Principle 23: FeedbackThrough feedback expressed through different semantic contents, we can assess the strengths and weaknesses of individuals or parts under similar conditions, and adjust or screen corresponding strategies or solutions accordingly. For example, in the scenario of autonomous driving, when facing multiple optimization objectives, researchers obtain the latest input information through feedback and choose the best driving strategy in a timely manner [74,75].
- Principle 32: Color ChangesWe extend the semantics of color to the realm of presentation, such as modifying the format or framing of Information to enhance the effectiveness of Wisdom-based communication. This approach, which may include storytelling or contextualization, makes the Information more engaging and impactful, thereby conveying it more effectively to the audience. For example, in marketing campaigns, communicating a product’s core values through a brand narrative, rather than simply listing its features, can create a deeper resonance with consumers [76].
4.1.10. Information (I) → Purpose (P)
- Principle 16: Partial or Excessive ActionsAdjust the level of effort in Information processing according to the specific requirements of the objective, ensuring that the Information is neither excessive nor insufficient. This means determining the scope and depth of Information collection and analysis based on the importance and required detail of the objective. For example, in software project management, if the goal is to evaluate the cost-effectiveness of a project, efforts should be focused on collecting Data directly related to costs and benefits, avoiding the collection of excessive unrelated Data to improve the efficiency and relevance of Information processing [77].
- Principle 32: Color ChangesWe extend the semantics of color to the realm of presentation. Modify the presentation of Information according to the objective to enhance the clarity and impact of Information transmission. This principle emphasizes the importance of presentation format, suggesting that Information should be expressed or visually represented in a way that better aligns with the needs of the target audience. For example, in corporate annual reports, to better convey the company’s performance and future outlook to shareholders, key financial Data can be presented using charts, timelines, and other visual tools to make the Information more intuitive and understandable [78,79,80].
4.1.11. Knowledge (K) → Data (D)
- Principle 8: Anti-weightWe have expanded the semantic content of this principle here, which is to achieve a solution to the problem through certain compensation methods. Therefore, in the conversion of knowledge to data, the idea of transforming complete content into consistent semantic content is often used in distributed processing. For example, in a distributed file system, to reduce the burden on a single storage system, complete content can be stored separately on each node through specific policies, which allows each node to undertake a small portion of the storage task, reducing the burden on individual nodes [81].
- Principle 9: Preliminary Anti-ActionUsing the completeness of knowledge semantics to filter out identical semantic content that does not belong to the knowledge system, in other words, the knowledge system pre-screens irrelevant data to ensure that only valuable data are collected and analyzed. This method not only improves data processing efficiency but also prevents irrelevant data from affecting the decision-making process. For example, before training an AI model, we need to preprocess the dataset in order to use our existing knowledge system to filter out data that do not match the actual situation.
- Principle 25: Self-serviceApply existing Knowledge systems to autonomously guide Data collection and processing, reducing the need for external intervention. For instance, in the design of intelligent sensor networks, pre-set algorithms can be used to automatically identify important Data streams and prioritize them, thereby optimizing resource allocation and enhancing the system’s adaptive capabilities [82,83].
- Principle 27: Cheap Short-living ObjectsData represent the same semantic content, and the conversion of knowledge to data through this principle represents the transformation from complex and complete to simple and lightweight. For example, in streaming media services, in order to reduce video content transmission time or bandwidth, service providers often use efficient video compression algorithms [84] to compress videos into smaller data formats while preserving semantic integrity as much as possible.
4.1.12. Knowledge (K) → Information (I)
- Principle 3: Local QualityThe key nodes and relationships within the Knowledge structure are concretized into Information content, aimed at addressing specific problems or application contexts. This process typically involves extracting critical components from the body of Knowledge and transforming them into actionable Information semantics that can be directly applied. By converting essential Knowledge elements into practical Information, this approach ensures that theoretical insights are effectively utilized in real-world scenarios. For example, in the field of software engineering, Domain-Driven Design [42] is one of the manifestations of local quality. Software development teams start from the business and abstract business knowledge into domain models to guide development. Through in-depth understanding and refinement of the domain, they can more accurately identify which parts need special attention and optimization in the business knowledge by reflecting different semantics. In addition, each subdomain under the DDD design can be independently designed and implemented. This modular design approach helps to concentrate resources and efforts on optimizing key modules, thereby improving the overall quality of the software system.
- Principle 13: The Other Way AroundGenerating specific Information content based on the inverse logical relationships within Knowledge is particularly useful in handling anomalies and reverse reasoning scenarios. This process involves reverse-analyzing causal relationships within the Knowledge base to produce Information that can explain or predict specific phenomena. For example, leveraging maintenance Knowledge to perform reverse reasoning can generate diagnostic Information about equipment failures, such as potential causes and corresponding solutions for a particular type of malfunction. This enables technical personnel to quickly identify the root cause of an issue, providing effective support in troubleshooting and decision making during equipment failures [85].
4.1.13. Knowledge (K) → Knowledge (K)
- Principle 22: Blessing in DisguiseUtilize challenges or limitations in knowledge as opportunities to develop deeper understanding or new methods. This approach emphasizes the potential for breakthroughs in solving problems and obstacles, advancing knowledge through critical thinking and innovation. For example, in technological innovation, traditional file systems cannot meet business needs, and companies developed their own file systems [81,86]. Therefore, by exploring alternative solutions or developing new methods, they promote the progress of related technologies and expand people’s understanding of file systems.
- Principle 34: Discarding and RecoveringUpdate Knowledge by eliminating outdated concepts and incorporating new findings, maintaining a robust and up-to-date Knowledge base. This method underscores the importance of Knowledge renewal, retaining core Knowledge while continuously discarding obsolete parts and adding the latest research outcomes. For example, in medical education, with the release of new clinical research results, teaching content should be promptly updated by removing disproven theories and including the latest medical practices [87].
4.1.14. Knowledge (K) → Wisdom (W)
- Principle 15: DynamismAllow Knowledge and Wisdom to co-evolve over time, adapting to new Information and changing contexts to maintain their relevance and effectiveness. This means that Knowledge and Wisdom should not be static but should continually update and develop in a changing environment. For instance, in medical research, as new discoveries emerge, existing treatment methods need to be constantly adjusted to align with the latest scientific understanding [88].
- Principle 40: Composite MaterialsWe extend the semantics of materials to analyze and transform Knowledge content. Combine diverse sources of Knowledge to develop a more nuanced and comprehensive form of Wisdom, integrating multiple perspectives and experiences. This approach highlights the importance of interdisciplinary Knowledge integration and cross-domain learning, where the fusion of Knowledge from different fields creates richer Wisdom. For example, in public policy making, integrating Knowledge from social sciences, economics, and ethics can lead to more comprehensive and sustainable policy measures [89,90].
4.1.15. Knowledge (K) → Purpose (P)
- Principle 25: Self-serviceWe can leverage the completeness of knowledge semantics to construct goals that can be autonomously adjusted or redefined, allowing goal setting to exhibit flexibility and adaptability based on new insights. For example, Computer Vision-based object recognition algorithms [91,92] can find corresponding targets and recognize them based on the knowledge learned during training.
- Principle 31: Porous MaterialsWe will expand and extend the porous semantics. Therefore, this invention principle can be defined as maintaining the openness of objectives to the influx of new Knowledge, allowing goals to dynamically adjust and optimize as understanding evolves. This method emphasizes the plasticity and adaptability of objectives, ensuring that goals are continually updated as new Knowledge is acquired. For instance, in corporate strategic planning, regularly reviewing changes in the external environment and internal capabilities enables timely adjustments to the company’s development direction to respond to market changes [93].
- Principle 35: Parameter ChangesBy utilizing the semantic integrity of knowledge, parameters are adjusted to remain within the current knowledge system and improve the overall goal of the system, resulting in outputs that meet expectations [94].
4.1.16. Wisdom (W) → Data (D)
- Principle 6: UniversalityWisdom is the information content with values, which is used in this principle to standardize or define universal expressions or contents of the same semantics, and can also integrate multiple independent data points into a coherent understanding beyond individual cases. For example, in the media field, in order to reach a wider audience of people of different ages, educational backgrounds, etc., corresponding adjustments need to be made to the expression methods and channels of the displayed data [95].
- Principle 24: IntermediaryThe cognitive subject can employ Wisdom-driven models or frameworks to analyze Data, offering more refined and contextually relevant insights. For example, in social science research, psychological theoretical models can be applied to interpret survey results. By leveraging the value-driven processes inherent in Wisdom, these models facilitate a deeper exploration of the motivations behind individual behaviors and the social factors that influence them. This approach allows for a more comprehensive and nuanced understanding of complex human dynamics, enhancing the ability to generate meaningful and actionable conclusions [96].
- Principle 25: Self-serviceWisdom can guide Data collection and interpretation, enabling autonomous operations by the cognitive subject and reducing reliance on external guidance. This involves incorporating intelligent decision-making mechanisms into Data processing. For instance, in intelligent traffic management systems, historical traffic flow patterns and emergency response experiences can be utilized to automatically adjust traffic signal control strategies, thereby optimizing traffic flow. This approach enhances system responsiveness and efficiency by enabling adaptive, self-regulating decision-making processes [97].
- Principle 35: Parameter ChangesThe cognitive subject can adjust Data parameters based on insights derived from Wisdom to ensure that Data collection and analysis methods support deeper understanding. For example, in intelligent transportation management systems, historical traffic flow patterns and emergency response experience can be utilized to automatically adjust input parameters for traffic signal control, thereby optimizing traffic flow. This method improves the system’s responsiveness and efficiency by implementing an adaptive and self-regulating decision-making process [97].
4.1.17. Wisdom (W) → Information (I)
- Principle 16: Partial or Excessive ActionsThe cognitive subject can leverage Wisdom to determine appropriate Information processing methods, ensuring efficient resource allocation. This means that in handling Information, it is crucial to apply measures that correspond to the level of semantic differentiation. For instance, in corporate strategy development, Wisdom can guide which Information requires in-depth exploration based on market trend analysis and which content only needs a high-level overview, thus preventing resource waste or Information overload [98]. This approach optimizes the decision-making process by aligning the depth of Information analysis with strategic priorities and resource availability.
- Principle 22: Blessing in DisguiseLeveraging Wisdom to identify the deeper meanings or hidden value within Information semantics can transform potential problems into opportunities for insight. For example, when faced with negative customer feedback, a wise analysis might uncover new ways to improve products or services, turning challenges into a catalyst for innovation and enhancement. This proactive approach not only addresses immediate concerns but also contributes to long-term growth and development by converting setbacks into strategic advancements [99].
4.1.18. Wisdom (W) → Knowledge (K)
- Principle 3: Local QualityThe cognitive subject transforms high-quality strategies derived from wise decision making in a specific domain into specialized Knowledge systems. For example, in healthcare management, Wisdom-based medical decisions—such as strategies for responding to pandemics—are translated into structured Knowledge systems for managing specific diseases. This may include Knowledge of the allocation of medical resources and patient management tailored to infectious diseases, thereby enabling a more systematic and effective approach to healthcare administration and crisis response [100].
- Principle 23: FeedbackUtilize experiential feedback to refine both Knowledge and Wisdom, enhancing understanding and decision-making abilities through the lessons learned from both successes and failures. This process emphasizes learning and reflection in practice, where continuous trial and error lead to the development of a more mature Knowledge system and wise judgment. For instance, researchers have drawn inspiration from the theory of evolution in nature, utilizing feedback and self-regulation in the process of biological evolution to abstract these theories into evolutionary algorithms for multi-objective optimization [101,102], achieving great success.
4.1.19. Wisdom (W) → Wisdom (W)
- Principle 15: DynamismEnable Wisdom to adapt and evolve with changing circumstances, ensuring its continued relevance and effectiveness in guiding decisions. This means that Wisdom is not a static collection of Knowledge but requires adjustment in response to changes in the external environment. For example, in business management, leaders should continuously adjust their management philosophies and strategies in response to market changes and competitive dynamics to maintain the company’s competitiveness. Through dynamic adjustment, Wisdom can better address future uncertainties. Research has shown that businesses that adapt their strategies in response to competitive intensity and market dynamism tend to achieve better performance outcomes [103]. Similarly, a study on business model adaptation highlights how proactive adjustment to environmental threats can significantly improve business performance [104].
- Principle 34: Discarding and RecoveringAbandon outdated or ineffective Wisdom to make room for new insights, ensuring that Wisdom remains a dynamic and flexible cognitive asset. This means being willing to let go of perspectives or methods that are no longer applicable while accumulating new Knowledge. For example, in the field of software engineering, with the development of new technologies and methodologies, old theories and practices may become outdated, requiring timely updating of professional knowledge and abandoning outdated concepts and methods [105].
4.1.20. Wisdom (W) → Purpose (P)
- Principle 10: Preliminary ActionThis principle is reflected in the transformation from wisdom to Purpose by setting goals using valuable information content. For example, investment banks and asset management companies will establish market monitoring systems to adopt corresponding hedging strategies before financial market fluctuations occur, in order to avoid potential losses caused by future price fluctuations [106].
- Principle 15: DynamismCognitive subjects need to adjust or redefine their goals based on new values in order to maintain their relevance and effectiveness in a constantly changing environment. This principle emphasizes the dynamic adjustment of goals and suggests updating the original goals when new knowledge or experience arises to better align with the current context. For example, in the medical field, medical institutions need to adjust treatment goals in a timely manner based on factors such as the patient’s age, economic level, and other conditions to avoid unexpected situations [107].
- Principle 20: Continuity of Useful ActionThe cognitive subject transforms wisdom into corresponding intentions through appropriate strategies under limited conditions, enabling it to output reliable goals or effects. For example, for the auto drive system [74], in the context of limited input content and computing power, the Purpose output of the autonomous drive system needs to be aligned under human values [108], so that the decisions of the autonomous drive system output can always conform to human values.
- Principle 33: HomogeneityThe important concept of this invention principle is to transform multiple similar intelligences into consistent knowledge expressions, which can form a synergy and increase efficiency without causing additional side effects. For example, using the Semantic Web [109], adopting unified classification standards and annotation methods to form a consistent knowledge network facilitates the association and inference of knowledge.
- Principle 39: Inert AtmosphereWe extend the semantics of this principle to improve target output efficiency by reducing environmental interference, while also facilitating analysis of the resulting phenomena. This principle embodies the transformation from wisdom to Purpose in the DIKWP model. For example, in the field of computer science, containerization is a lightweight and portable way to configure computing environments. It packages applications and their required libraries, dependencies, and configuration files together, as the simplicity of the environment makes it easy to deploy on various hosts, with consistent performance and reduced testing time costs [110].
4.1.21. Purpose (P) → Data (D)
- Principle 10: Preliminary ActionFuture Data collection plans and requirements can be proactively generated based on the content of purposes to ensure that the Data will meet the analytical needs of anticipated goals. In market analysis, for example, new Data collection strategies can be developed in advance based on market expansion purposes, such as gathering Information on emerging market trends and competitor activities. This approach ensures that Data acquisition is strategically aligned with the expected objectives, facilitating more effective analysis and informed decision making [111].
- Principle 19: Periodic ActionThe cognitive subject collects specific data based on periodic similar purposes for analysis or decision making in other aspects. In the context of the Internet of Things, sensors in the system collect status data of monitored devices every once in a while, which is used for the working status of each device [112].
- Principle 21: SkippingWhen facing problems caused by slow efficiency, in order to achieve rapid response, it is often necessary to preset corresponding strategies based on known experience. For example, in personalized recommendation systems, the system can directly recommend content of interest to users based on their preferences, without the need to collect a large amount of user behavior data for analysis first [113].
- Principle 23: FeedbackBased on the feedback mechanisms of the intended goals, supplementary and optimized Data can be generated to create datasets that more accurately align with the objectives. In user experience optimization, for instance, new Data collection requirements can be derived from user feedback to capture additional user behavior Information. This helps refine product design according to the intent of product improvements, ensuring that the Data collected support targeted enhancements and deliver a better user experience [114].
4.1.22. Purpose (P) → Information (I)
- Principle 6: UniversalityPurposes can be transformed into various reusable standardized Information templates, reflecting semantic differences through distinct, specific purposes. These templates can be adapted to suit different contexts and objectives, allowing for the effective communication of nuanced Information semantics across diverse scenarios [115]. This structured approach enhances the clarity and consistency of Information dissemination while ensuring alignment with varying goals and situational requirements.
4.1.23. Purpose (P) → Knowledge (K)
- Principle 2: Taking OutThe cognitive subject can extract the core goals and strategies from purposes to form independent Knowledge modules. These modules, containing comprehensive semantics, can be used to guide future actions. In corporate management, for instance, the core strategic purposes for company growth can be structured into Knowledge modules, such as market expansion strategies or brand development strategies, to support strategic implementation across various departments. This approach ensures that each department aligns its actions with the overarching strategic vision, facilitating coherent and coordinated organizational growth [116].
- Principle 15: DynamismIn risk management, transforming dynamic risk assessment purposes into a real-time, adaptive risk management Knowledge system is crucial. For instance, a large financial institution must navigate an ever-changing market environment and policy risks, such as macroeconomic fluctuations and international market uncertainties. Traditional static risk management strategies are no longer sufficient to meet the demands of rapidly evolving market conditions. It is essential to translate risk management purposes into a dynamic, continuously updated Knowledge framework that can effectively respond to emerging risks and challenges [19,117].
4.1.24. Purpose (P) → Wisdom (W)
- Principle 36: Phase TransitionsThe transformation from Purpose to wisdom is reflected in the principle that the cognitive subject forms wisdom beyond generalization through its subjective Purpose, that is, it can output value content beyond the general scope through limited resources under specific conditions. For example, when artificial neural networks were first proposed, they were just a simple computational model based on the concept of bionics. After decades of development, models based on artificial neural networks have been applied in various fields and have achieved excellent application results [118].
- Principle 40: Composite MaterialsWe have expanded the semantics of composite materials, transforming them into multidimensional objectives. The cognitive subject comprehensively considers the multidimensional goals embedded within the intentions—such as economic benefits and social responsibility—to generate wise decisions that balance the interests of all stakeholders. This holistic approach ensures that decision making is aligned with diverse objectives, facilitating sustainable and ethically sound outcomes. For example, when generating content for generative AI models, it is necessary to consider economic benefits, social responsibility, and compliance with human ethics and values, in order to avoid ethical and moral issues as much as possible [119]. However, fully considering the above content can construct different paths and solutions, promoting innovation in research related to generative AI.
4.1.25. Purpose (P) → Purpose (P)
- Principle 1: SegmentationWhen the cognitive subject is processing purposes, if the purposes are complex or difficult to process at once, they can use principle 1 to transform the purposes into multiple sub-purposes for processing. For example, in software engineering, designers often need to divide software into various sub-functions or sub-modules, with each sub-function or sub-module completing a small part of the overall Purpose while maintaining the same Purpose for the whole [120].
- Principle 14: CircularityThe transformation of this principle between purposes is reflected in transforming the linear structure that emphasizes the relationship between purposes into a circular structure, where all purposes are executed in a cyclic order under certain conditions. For example, in the field of software engineering, CI (Continuous Integration) and CD (Continuous Delivery/Continuous Deployment) belong to the concept of DevOps [121], which refers to the transformation of manual intervention in a series of processes such as code building, testing, deployment, and infrastructure configuration in the traditional development process into automation. Using CI/CD, code can be automatically tested, delivered, and deployed after being modified by developers. Appropriate CI/CD pipelines can minimize computer downtime and enable faster code release [122].
- Principle 37: Thermal ExpansionWe have expanded this invention principle to include the concept of elasticity, which means that cognitive agents can construct more solutions by improving target elasticity. This principle can be verified through the transformation of wisdom into Purpose. In the cloud computing scenario, users can adjust the resources required for cloud computing by modifying static parameters or load levels according to their own business needs, while providers need to build an elastic cloud computing environment to meet users’ personalized needs [123].
- Principle 38: Strong OxidantsThe semantic content of Principle 38 has been expanded to include the use of various means to accelerate the process of achieving a certain goal. This principle is reflected in the transformation between intentions. In the field of computer hardware, specific algorithms are accelerated through dedicated processors or instruction sets to achieve fast output results and increase system throughput [124].
4.2. Cognitive Space Coverage Completeness Analysis
5. Application of DIKWP-TRIZ
5.1. TRIZ Method
5.2. DIKWP-TRIZ Method
5.3. DIKWP-TRIZ Versus TRIZ
5.3.1. Traditional Framework of TRIZ and Its Limitations
5.3.2. Purpose and Ethical Considerations
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Number | Principle Name |
---|---|
Principle 1 | Segmentation |
Principle 2 | Extraction |
Principle 3 | Local Quality |
Principle 4 | Asymmetry |
Principle 5 | Merging |
Principle 6 | Universality |
Principle 7 | Nested Doll |
Principle 8 | Anti-weight |
Principle 9 | Preliminary Anti-Action |
Principle 10 | Preliminary Action |
Principle 11 | In-advance cushioning |
Principle 12 | Equipotentiality |
Principle 13 | The Other Way Round |
Principle 14 | Circularity |
Principle 15 | Dynamism |
Principle 16 | Partial or Excessive Actions |
Principle 17 | Another Dimension |
Principle 18 | Mechanical vibration |
Principle 19 | Periodic Action |
Principle 20 | Continuity of Useful Action |
Principle 21 | Skipping |
Principle 22 | Blessing in Disguise |
Principle 23 | Feedback |
Principle 24 | Intermediary |
Principle 25 | Self-service |
Principle 26 | Copying |
Principle 27 | Cheap Short-living Objects |
Principle 28 | Mechanics Substitution |
Principle 29 | Pneumatics and Hydraulics |
Principle 30 | Flexible Shells and Thin Films |
Principle 31 | Porous Materials |
Principle 32 | Color Changes |
Principle 33 | Homogeneity |
Principle 34 | Discarding and Recovering |
Principle 35 | Parameter Changes |
Principle 36 | Phase Transitions |
Principle 37 | Thermal Expansion |
Principle 38 | Strong Oxidants |
Principle 39 | Inert Atmosphere |
Principle 40 | Composite Materials |
References
- Altshuller, G.S. 40 Principles: TRIZ Keys to Technical Innovation; Technical Innovation Center: Worcester, MA, USA, 1998. [Google Scholar]
- Altshuller, G.S. Creativity as an Exact Science; Gordon and Breach: New York, NY, USA, 1984; p. 228. [Google Scholar]
- Ungvari, S. TRIZ Within the Context of the Kano Model or Adding the Third Dimension to Quality. 1999. Available online: https://www.metodolog.ru/triz-journal/archives/1999/10/e/index.htm (accessed on 6 November 2024).
- Slocum, M.S.; Kermani, A.H. Case Study: Integrating TRIZ Into Six Sigma. 2006. Available online: https://the-trizjournal.com/innovation-methods/innovation-triz-theory-inventive-problem-solving/case-study-integrating-triz-six-sigma/ (accessed on 6 November 2024).
- Domb, E. QFD and Tips/Triz. 1998. Available online: https://the-trizjournal.com/qfd-tipstriz/ (accessed on 6 November 2024).
- Wang, F.K.; Chen, K.S. Applying Lean Six Sigma and TRIZ methodology in banking services. Total Qual. Manag. Bus. Excell. 2010, 21, 301–315. [Google Scholar] [CrossRef]
- Hajime Yamashina, T.I.; Kawada, H. Innovative product development process by integrating QFD and TRIZ. Int. J. Prod. Res. 2002, 40, 1031–1050. [Google Scholar] [CrossRef]
- Sire, P.; Haeffelé, G.; Dubois, S. TRIZ as a Tool to Develop a TRIZ Educational Method by Learning it. Procedia Eng. 2015, 131, 551–560. [Google Scholar] [CrossRef]
- Berdonosov, V. Concept of the TRIZ Evolutionary Approach in Education. Procedia Eng. 2015, 131, 721–730. [Google Scholar] [CrossRef]
- Dourson, S. The 40 Inventive Principles of TRIZ Applied to Finance. 2004. Available online: https://ivm.org.uk/wp-content/uploads/2022/11/40-P-Finance.pdf (accessed on 6 November 2024).
- Xu, M. Design and Implementation of Family Financial Risk Prevention System Based on TRIZ and Wireless Sensor Network. In Proceedings of the 2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS), Shenyang, China, 10–11 December 2021; pp. 289–293. [Google Scholar] [CrossRef]
- Smith, C.W.; Vincent, J.F.V.; Mann, D.L. Systematic technology transfer from biology to engineering. Philos. Trans. R. Soc. Lond. Ser. Math. Phys. Eng. Sci. 2002, 360, 159–173. [Google Scholar] [CrossRef]
- Vincent, J.F. Deconstructing the design of a biological material. J. Theor. Biol. 2005, 236, 73–78. [Google Scholar] [CrossRef] [PubMed]
- Ilevbare, I.M.; Probert, D.; Phaal, R. A review of TRIZ, and its benefits and challenges in practice. Technovation 2013, 33, 30–37. [Google Scholar] [CrossRef]
- Chai, K.H.; Zhang, J.; Tan, K.C. A TRIZ-Based Method for New Service Design. J. Serv. Res. 2005, 8, 48–66. [Google Scholar] [CrossRef]
- Fan, K.; Duan, Y. Purpose Computation-Oriented Modeling and Transformation on DIKW Architecture; Springer International Publishing: Cham, Switzerland, 2022; pp. 45–63. [Google Scholar] [CrossRef]
- Mei, Y.; Duan, Y.; Chen, L.; Feng, Z.; Yu, L.; Guo, Z. Purpose Driven Disputation Modeling, Analysis and Resolution Based on DIKWP Graphs. In Proceedings of the 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), Hainan, China, 18–20 December 2022; pp. 2118–2125. [Google Scholar] [CrossRef]
- Guo, Z.; Duan, Y.; Chen, L.; Zhuang, C.; Mei, Y. Purpose Driven DIKW Modeling and Analysis of Meteorology and Depression. In Proceedings of the 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), Hainan, China, 18–20 December 2022; pp. 2126–2133. [Google Scholar] [CrossRef]
- Wu, K.; Duan, Y. Modeling and Resolving Uncertainty in DIKWP Model. Appl. Sci. 2024, 14, 4776. [Google Scholar] [CrossRef]
- Chella, A.; Manzotti, R. Artificial Consciousness. In Perception-Action Cycle: Models, Architectures, and Hardware; Cutsuridis, V., Hussain, A., Taylor, J.G., Eds.; Springer: New York, NY, USA, 2011; pp. 637–671. [Google Scholar] [CrossRef]
- Holland, O.; Gamez, D. Artificial Intelligence and Consciousness. In Encyclopedia of Consciousness; Banks, W.P., Ed.; Academic Press: Oxford, UK, 2009; pp. 37–45. [Google Scholar] [CrossRef]
- Jones, S. On the Evolution of Artificial Consciousness. In Proceedings of the Advances in Artificial Life; Kelemen, J., Sosík, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2001; pp. 427–431. [Google Scholar]
- Yucong Duan, S.G. Artificial Intelligence vs. Artificial Consciousness from the DIKWP Perspective. 2024. Available online: https://www.researchgate.net/publication/380073777_Artificial_Intelligence_vs_Artificial_Consciousness_from_the_DIKWP_Perspective (accessed on 16 November 2024).
- Wang, Y.; Duan, Y.; Wang, M.; Wei, J.; Zhuang, C.; Liu, Y. Resource Adjustment Processing on the DIKWP Artificial Consciousness Diagnostic System. In Proceedings of the 2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), Melbourne, Australia, 17–21 December 2023; pp. 1075–1082. [Google Scholar] [CrossRef]
- Duan, Y.; Lu, Z.; Zhou, Z.; Sun, X.; Wu, J. Data privacy protection for edge computing of smart city in a DIKW architecture. Eng. Appl. Artif. Intell. 2019, 81, 323–335. [Google Scholar] [CrossRef]
- Mei, Y.; Duan, Y. The DIKWP (Data, Information, Knowledge, Wisdom, Purpose) Revolution: A New Horizon in Medical Dispute Resolution. Appl. Sci. 2024, 14, 3994. [Google Scholar] [CrossRef]
- Mann, D.; Dewulf, S.; Zusman, A. TRIZ Matrix2003. 2021. Available online: https://www.triz-consulting.de/wp-content/uploads/2021/09/matrix2003-eng_v4.pdf (accessed on 16 November 2024).
- Park, W.B.; Song, Y.W.; Kim, S.B.; Lee, K.H.; Hu, J.H. Considerations on the Smart Factory and the Use of TRIZ 40 Inventive Principles: Focusing on Site Improvements in the Field of Semiconductor Industry. Asia-Pac. J. Converg. Res. Interchange 2023, 9, 15–26. [Google Scholar] [CrossRef]
- Reusch, P.J.A.; Zadnepryanets, M. TRIZ 40 inventive principles application in project management. In Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Warsaw, Poland, 24–26 September 2015; Volume 2, pp. 521–526. [Google Scholar] [CrossRef]
- Kretzschmar, N.; Chekurov, S. The applicability of the 40 TRIZ principles in design for additive manufacturing. In Proceedings of the 29th DAAAM International Symposium, Zadar, Croatia, 24–27 October 2018; pp. 888–893. [Google Scholar] [CrossRef]
- Beckmann, H. Method for Transferring the 40 Inventive Principles to Information Technology and Software. Procedia Eng. 2015, 131, 993–1001. [Google Scholar] [CrossRef]
- Livotov, P.; Chandra Sekaran, A.P.; Mas’udah. Lower Abstraction Level of TRIZ Inventive Principles Improves Ideation Productivity of Engineering Students. In Proceedings of the New Opportunities for Innovation Breakthroughs for Developing Countries and Emerging Economies; Benmoussa, R., De Guio, R., Dubois, S., Koziołek, S., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 526–538. [Google Scholar]
- Gazem, N.; Rahman, A.A. Improving TRIZ 40 Inventive Principles Grouping in Redesign Service Approaches. Asian Soc. Sci. 2014, 10, 127–128. [Google Scholar] [CrossRef]
- Liang, Y.; Tan, R.; Wang, C.; Li, Z. Computer-aided classification of patents oriented to TRIZ. In Proceedings of the 2009 IEEE International Conference on Industrial Engineering and Engineering Management, Hong Kong, China, 8–11 December 2009; pp. 2389–2393. [Google Scholar] [CrossRef]
- Yan, W.; Zanni-Merk, C.; Cavallucci, D.; Collet, P. An ontology-based approach for inventive problem solving. Eng. Appl. Artif. Intell. 2014, 27, 175–190. [Google Scholar] [CrossRef]
- Yan, W.; Liu, H.; Zanni-Merk, C.; Cavallucci, D. IngeniousTRIZ: An automatic ontology-based system for solving inventive problems. Knowl.-Based Syst. 2015, 75, 52–65. [Google Scholar] [CrossRef]
- Yang, Q.; neng Chen, W.; Gu, T.; Zhang, H.; Deng, J.D.; Li, Y.; Zhang, J. Segment-Based Predominant Learning Swarm Optimizer for Large-Scale Optimization. IEEE Trans. Cybern. 2017, 47, 2896–2910. [Google Scholar] [CrossRef]
- Liu, Z.; Kerr, B.; Dontcheva, M.; Grover, J.; Hoffman, M.; Wilson, A. CoreFlow: Extracting and Visualizing Branching Patterns from Event Sequences. Comput. Graph. Forum 2017, 36, 527–538. [Google Scholar] [CrossRef]
- Carter, G.; Galas, D.; Galitski, T. Maximal Extraction of Biological Information from Genetic Interaction Data. PLoS Comput. Biol. 2009, 5, e1000347. [Google Scholar] [CrossRef]
- Morrel-Samuels, P.; Francis, E.; Shucard, S. Merged Datasets: An Analytic Tool for Evidence-Based Management. Calif. Manag. Rev. 2009, 52, 120–139. [Google Scholar] [CrossRef]
- Milligan, G.W.; Cooper, M. A study of standardization of variables in cluster analysis. J. Classif. 1988, 5, 181–204. [Google Scholar] [CrossRef]
- Evans, E. Domain-Driven Design: Tackling Complexity in the Heart of Software; Addison-Wesley Professional: Boston, MA, USA, 2004. [Google Scholar]
- Dwork, C. Differential Privacy. In Proceedings of the Automata, Languages and Programming; Bugliesi, M., Preneel, B., Sassone, V., Wegener, I., Eds.; Springer: Berlin/Heidelberg, Germany, 2006; pp. 1–12. [Google Scholar]
- Dong, J.; Roth, A.; Su, W.J. Gaussian differential privacy. J. R. Stat. Soc. Ser. (Stat. Methodol.) 2022, 84, 3–37. [Google Scholar] [CrossRef]
- Mystakidis, S. Metaverse. Encyclopedia 2022, 2, 486–497. [Google Scholar] [CrossRef]
- Ogburn, M.; Turner, C.; Dahal, P. Homomorphic Encryption. Procedia Comput. Sci. 2013, 20, 502–509. [Google Scholar] [CrossRef]
- Bettenburg, N.; Nagappan, M.; Hassan, A. Towards improving statistical modeling of software engineering data: Think locally, act globally! Empir. Softw. Eng. 2015, 20, 294–335. [Google Scholar] [CrossRef]
- Arrigo, E.; Liberati, C.; Mariani, P. Social Media Data and Users’ Preferences: A Statistical Analysis to Support Marketing Communication. Big Data Res. 2021, 24, 100189. [Google Scholar] [CrossRef]
- Liu, X.; Bourennane, S.; Fossati, C. Nonwhite Noise Reduction in Hyperspectral Images. IEEE Geosci. Remote. Sens. Lett. 2012, 9, 368–372. [Google Scholar] [CrossRef]
- Van Hulse, J.; Khoshgoftaar, T.M.; Napolitano, A. A Novel Noise Filtering Algorithm for Imbalanced Data. In Proceedings of the 2010 Ninth International Conference on Machine Learning and Applications, Washington, DC, USA, 12–14 December 2010; pp. 9–14. [Google Scholar] [CrossRef]
- Xiong, H.; Pandey, G.; Steinbach, M.; Kumar, V. Enhancing data analysis with noise removal. IEEE Trans. Knowl. Data Eng. 2006, 18, 304–319. [Google Scholar] [CrossRef]
- Ventocilla, E.; Riveiro, M. A comparative user study of visualization techniques for cluster analysis of multidimensional data sets. Inf. Vis. 2020, 19, 318–338. [Google Scholar] [CrossRef]
- Garouani, M.; Ahmad, A.; Bouneffa, M.; Hamlich, M.; Bourguin, G.; Lewandowski, A. Towards big industrial data mining through explainable automated machine learning. Int. J. Adv. Manuf. Technol. 2022, 120, 1169–1188. [Google Scholar] [CrossRef]
- Avramov, D.; Kaplanski, G.; Subrahmanyam, A. Moving average distance as a predictor of equity returns. Rev. Financ. Econ. 2021, 39, 127–145. [Google Scholar] [CrossRef]
- Ghobadi, S.; D’Ambra, J. Modeling High-Quality Knowledge Sharing in cross-functional software development teams. Inf. Process. Manag. 2013, 49, 138–157. [Google Scholar] [CrossRef]
- Jamshidian, F.; Zhu, Y. Scenario Simulation: Theory and methodology. Financ. Stoch. 1996, 1, 43–67. [Google Scholar] [CrossRef]
- Kuester, K.; Mittnik, S.; Paolella, M.S. Value-at-Risk Prediction: A Comparison of Alternative Strategies. J. Financ. Econom. 2005, 4, 53–89. [Google Scholar] [CrossRef]
- Neumann, T.; Ebendt, R.; Kuhns, G. From finance to ITS: Traffic data fusion based on Markowitz’ portfolio theory. J. Adv. Transp. 2016, 50, 145–164. [Google Scholar] [CrossRef]
- Wudhikarn, R. An efficient resource allocation in strategic management using a novel hybrid method. Manag. Decis. 2016, 54, 1702–1731. [Google Scholar] [CrossRef]
- Mohan, S.; Alam, M.F.; Fowler, J.; Gopalakrishnan, M.; Printezis, A. Capacity Planning and Allocation for Web-Based Applications. Decis. Sci. 2014, 45, 535–567. [Google Scholar] [CrossRef]
- Liu, T. Cross-Border Internet of Things E-Commerce Warehouse Control System Based on TRIZ Theory. Sci. Program. 2021, 2021, 2656508:1–2656508:10. [Google Scholar] [CrossRef]
- Sung, I.; Lee, T. Optimal allocation of emergency medical resources in a mass casualty incident: Patient prioritization by column generation. Eur. J. Oper. Res. 2016, 252, 623–634. [Google Scholar] [CrossRef]
- Sobernig, S.; Zdun, U. Inversion-of-control layer. In Proceedings of the 15th European Conference on Pattern Languages of Programs, Irsee, Germany, 7–11 July 2010; Association for Computing Machinery: New York, NY, USA, 2010. EuroPLoP ’10. p. 21. [Google Scholar] [CrossRef]
- Balducci, F.; Impedovo, D.; Pirlo, G. Machine Learning Applications on Agricultural Datasets for Smart Farm Enhancement. Machines 2018, 6, 38. [Google Scholar] [CrossRef]
- Gupta, N.; Anand, K.; Sureka, A. Pariket: Mining Business Process Logs for Root Cause Analysis of Anomalous Incidents. In Proceedings of the Databases in Networked Information Systems; Chu, W., Kikuchi, S., Bhalla, S., Eds.; Springer: Cham, Switzerland, 2015; pp. 244–263. [Google Scholar]
- Naticchia, B.; Corneli, A.; Carbonari, A. Framework based on building information modeling, mixed reality, and a cloud platform to support information flow in facility management. Front. Eng. Manag. 2020, 7, 131–141. [Google Scholar] [CrossRef]
- Racu, R.; Ernst, R. Scheduling Anomaly Detection and Optimization for Distributed Systems with Preemptive Task-Sets. In Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS’06), San Jose, CA, USA, 4–7 April 2006; pp. 325–334. [Google Scholar] [CrossRef]
- Sarvghad, A.; Tory, M.; Mahyar, N. Visualizing Dimension Coverage to Support Exploratory Analysis. IEEE Trans. Vis. Comput. Graph. 2017, 23, 21–30. [Google Scholar] [CrossRef]
- Feng, J.; Mu, X.; Wang, W.; Xu, Y. A topic analysis method based on a three-dimensional strategic diagram. J. Inf. Sci. 2020, 47, 770–782. [Google Scholar] [CrossRef]
- Senior, A.W.; Evans, R.; Jumper, J.; Kirkpatrick, J.; Sifre, L.; Green, T.; Qin, C.; Žídek, A.; Nelson, A.W.; Bridgland, A.; et al. Improved protein structure prediction using potentials from deep learning. Nature 2020, 577, 706–710. [Google Scholar] [CrossRef]
- Jumper, J.; Evans, R.; Pritzel, A.; Green, T.; Figurnov, M.; Ronneberger, O.; Tunyasuvunakool, K.; Bates, R.; Žídek, A.; Potapenko, A.; et al. Highly accurate protein structure prediction with AlphaFold. Nature 2021, 596, 583–589. [Google Scholar] [CrossRef]
- Varadi, M.; Bertoni, D.; Magana, P.; Paramval, U.; Pidruchna, I.; Radhakrishnan, M.; Tsenkov, M.; Nair, S.; Mirdita, M.; Yeo, J.; et al. AlphaFold Protein Structure Database in 2024: Providing structure coverage for over 214 million protein sequences. Nucleic Acids Res. 2023, 52, D368–D375. [Google Scholar] [CrossRef]
- Parke, H.M.; Coble, C.R. Teachers designing curriculum as professional development: A model for transformational science teaching. J. Res. Sci. Teach. 1997, 34, 773–789. [Google Scholar] [CrossRef]
- Yoo, S.W.; Kim, C.; Choi, J.; Kim, S.W.; Seo, S.W. GIN: Graph-Based Interaction-Aware Constraint Policy Optimization for Autonomous Driving. IEEE Robot. Autom. Lett. 2023, 8, 464–471. [Google Scholar] [CrossRef]
- Xu, Q.; Liu, Y.; Pan, J.; Wang, J.; Wang, J.; Li, K. Reachability Analysis Plus Satisfiability Modulo Theories: An Adversary-Proof Control Method for Connected and Autonomous Vehicles. IEEE Trans. Ind. Electron. 2023, 70, 2982–2992. [Google Scholar] [CrossRef]
- Zhang, Y.; Reynolds, M.; Lugmayr, A.; Damjanov, K.; Hassan, G.M. A Visual Data Storytelling Framework. Informatics 2022, 9, 73. [Google Scholar] [CrossRef]
- Mansor, Z.; Arshad, N.H.; Yahya, S.; Letchmunan, S. Validated agile cost management success factors in software development projects. Int. J. Adv. Intell. Paradig. 2018, 11, 5–18. [Google Scholar] [CrossRef]
- Kim, J.; Spence, M.T.; Marshall, R. The Color of Choice: The Influence of Presenting Product Information in Color on the Compromise Effect. J. Retail. 2018. [Google Scholar] [CrossRef]
- Cookson, R. Framing Effects in Public Goods Experiments. Exp. Econ. 2000, 3, 55–79. [Google Scholar] [CrossRef]
- Zouaoua, D.; Crubleau, P.; Mathieu, J.P.; Thiéblemont, R.; Richir, S. TRIZ and the difficulties in marketing management applications. In Proceedings of the PICMET 2010 Technology Management for Global Economic Growth, Phuket, Thailand, 18–22 July 2010; pp. 1–10. [Google Scholar]
- Ghemawat, S.; Gobioff, H.; Leung, S.T. The Google file system. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, Bolton Landing, NY, USA, 19–22 October 2003; pp. 29–43. [Google Scholar]
- Faigl, J.; Hollinger, G.A. Autonomous Data Collection Using a Self-Organizing Map. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 1703–1715. [Google Scholar] [CrossRef]
- Shah, K.; Francesco, M.D.; Kumar, M.J. Distributed resource management in wireless sensor networks using reinforcement learning. Wirel. Netw. 2013, 19, 705–724. [Google Scholar] [CrossRef]
- Chen, Y.; Murherjee, D.; Han, J.; Grange, A.; Xu, Y.; Liu, Z.; Parker, S.; Chen, C.; Su, H.; Joshi, U.; et al. An Overview of Core Coding Tools in the AV1 Video Codec. In Proceedings of the 2018 Picture Coding Symposium (PCS), San Francisco, CA, USA, 24–27 June 2018; pp. 41–45. [Google Scholar] [CrossRef]
- Zihui, W.; Rong, C. Research of the failure cause analysis and solving model based on TRIZ & AFD. In Proceedings of the 2010 International Conference On Computer Design and Applications, Qinhuangdao, China, 25–27 June 2010; Volume 5, pp. V5-617–V5-620. [Google Scholar] [CrossRef]
- Bonwick, J.; Ahrens, M.; Henson, V.; Maybee, M.; Shellenbaum, M. The zettabyte file system. In Proceedings of the 2nd Usenix Conference on File and Storage Technologies, San Francisco, CA, USA, 31 March–2 April 2003; Volume 215. [Google Scholar]
- Zhu, R.; Wang, Y.; Wu, R.; Meng, X.; Han, S.; Duan, Z. Trends in high-impact papers in nursing research published from 2008 to 2018: A web of science-based bibliometric analysis. J. Nurs. Manag. 2020, 28, 1041–1052. [Google Scholar] [CrossRef]
- Benton, M.L.; Abraham, A.; LaBella, A.L.; Abbot, P.; Rokas, A.; Capra, J.A. The influence of evolutionary history on human health and disease. Nat. Rev. Genet. 2021, 22, 269–283. [Google Scholar] [CrossRef]
- Hu, L.; Huang, W.b.; Bu, Y. Interdisciplinary research attracts greater attention from policy documents: Evidence from COVID-19. Humanit. Soc. Sci. Commun. 2024, 11, 383. [Google Scholar] [CrossRef]
- Petersen, A.M.; Ahmed, M.E.; Pavlidis, I. Grand challenges and emergent modes of convergence science. Humanit. Soc. Sci. Commun. 2021, 8, 194. [Google Scholar] [CrossRef]
- Jiang, P.; Ergu, D.; Liu, F.; Cai, Y.; Ma, B. A Review of Yolo Algorithm Developments. Procedia Comput. Sci. 2022, 199, 1066–1073. [Google Scholar] [CrossRef]
- Jiang, H.; Learned-Miller, E. Face Detection with the Faster R-CNN. In Proceedings of the 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), Washington, DC, USA, 30 May–3 June 2017; pp. 650–657. [Google Scholar] [CrossRef]
- Vidal, R.; Salmeron, J.L.; Mena-Nieto, A.; Chulvi, V. Fuzzy Cognitive Map-based selection of TRIZ (Theory of Inventive Problem Solving) trends for eco-innovation of ceramic industry products. J. Clean. Prod. 2015, 107, 202–214. [Google Scholar] [CrossRef]
- Yin, X.; Niu, Z.; He, Z.; Li, Z.; Lee, D. An integrated computational intelligence technique based operating parameters optimization scheme for quality improvement oriented process-manufacturing system. Comput. Ind. Eng. 2020, 140, 106284. [Google Scholar] [CrossRef]
- Meppelink, C.S.; van Weert, J.C.; Haven, C.J.; Smit, E.G. The Effectiveness of Health Animations in Audiences With Different Health Literacy Levels: An Experimental Study. J. Med. Internet Res. 2015, 17, e11. [Google Scholar] [CrossRef]
- Nezlek, J. Multilevel Random Coefficient Analyses of Event- and Interval-Contingent Data in Social and Personality Psychology Research. Personal. Soc. Psychol. Bull. 2001, 27, 771–785. [Google Scholar] [CrossRef]
- Hamidi, H.; Kamankesh, A. An approach to intelligent traffic management system using a multi-agent system. Int. J. Intell. Transp. Syst. Res. 2018, 16, 112–124. [Google Scholar] [CrossRef]
- Huang, Z.; Lu, X.; Duan, H. Mining association rules to support resource allocation in business process management. Expert Syst. Appl. 2011, 38, 9483–9490. [Google Scholar] [CrossRef]
- Jabbour, S.; El Mazouri, F.E.; Sais, L. Mining Negatives Association Rules Using Constraints. Procedia Comput. Sci. 2018, 127, 481–488. [Google Scholar] [CrossRef]
- Spanos, S.; Dammery, G.; Pagano, L.; Ellis, L.A.; Fisher, G.; Smith, C.L.; Foo, D.; Braithwaite, J. Learning health systems on the front lines to strengthen care against future pandemics and climate change: A rapid review. BMC Health Serv. Res. 2024, 24, 829. [Google Scholar] [CrossRef]
- Huang, L.; Suh, I.H.; Abraham, A. Dynamic multi-objective optimization based on membrane computing for control of time-varying unstable plants. Inf. Sci. 2011, 181, 2370–2391. [Google Scholar] [CrossRef]
- Zhao, J.; Zhang, H.; Yu, H.; Fei, H.; Huang, X.; Yang, Q. A many-objective evolutionary algorithm based on three states for solving many-objective optimization problem. Sci. Rep. 2024, 14, 19140. [Google Scholar] [CrossRef]
- Cui, A.; Griffith, D.; Cavusgil, T. The Influence of Competitive Intensity and Market Dynamism on Knowledge Management Capabilities of Multinational Corporation Subsidiaries. J. Int. Mark. 2005, 13, 32–53. [Google Scholar] [CrossRef]
- Saebi, T.; Lien, L.B.; Foss, N. What Drives Business Model Adaptation? The Impact of Opportunities, Threats and Strategic Orientation. Long Range Plan. 2017, 50, 567–581. [Google Scholar] [CrossRef]
- Cico, O.; Jaccheri, L.; Nguyen-Duc, A.; Zhang, H. Exploring the intersection between software industry and Software Engineering education—A systematic mapping of Software Engineering Trends. J. Syst. Softw. 2021, 172, 110736. [Google Scholar] [CrossRef]
- Jaramillo-Restrepo, J.; Jiménez-Gómez, M.; Acevedo-Prins, N. Stock portfolio hedging with financial options. Indones. J. Electr. Eng. Comput. Sci. 2020, 19, 1436–1443. [Google Scholar] [CrossRef]
- Mangoni, A.A. Comprehensive Geriatric Assessment and Personalized Medicine; Springer International Publishing: Cham, Switzerland, 2018; pp. 69–77. [Google Scholar] [CrossRef]
- Menon, C.; Alexander, R. A safety-case approach to the ethics of autonomous vehicles. Saf. Reliab. 2020, 39, 33–58. [Google Scholar] [CrossRef]
- Shadbolt, N.; Berners-Lee, T.; Hall, W. The Semantic Web Revisited. IEEE Intell. Syst. 2006, 21, 96–101. [Google Scholar] [CrossRef]
- Casalicchio, E.; Iannucci, S. The state-of-the-art in container technologies: Application, orchestration and security. Concurr. Comput. Pract. Exp. 2020, 32, e5668. [Google Scholar] [CrossRef]
- Lutz, C.; Bodendorf, F. Analyzing industry stakeholders using open-source competitive intelligence—A case study in the automotive supply industry. J. Enterp. Inf. Manag. 2020, 33, 579–599. [Google Scholar] [CrossRef]
- Amin, S.U.; Hossain, M.S.; Muhammad, G.; Alhussein, M.; Rahman, M.A. Cognitive Smart Healthcare for Pathology Detection and Monitoring. IEEE Access 2019, 7, 10745–10753. [Google Scholar] [CrossRef]
- Cao, B.; Zhao, J.; Lv, Z.; Yang, P. Diversified Personalized Recommendation Optimization Based on Mobile Data. IEEE Trans. Intell. Transp. Syst. 2021, 22, 2133–2139. [Google Scholar] [CrossRef]
- Liang, L.; Ke, Y. User behavior data analysis and product design optimization algorithm based on deep learning. Int. J. Interact. Des. Manuf. (IJIDeM) 2023, 1–13. [Google Scholar] [CrossRef]
- de Mello, B.H.; Rigo, S.J.; da Costa, C.A.; da Rosa Righi, R.; Donida, B.; Bez, M.R.; Schunke, L.C. Semantic interoperability in health records standards: A systematic literature review. Health Technol. 2022, 12, 255–272. [Google Scholar] [CrossRef] [PubMed]
- Earl, M.J. Knowledge Management Strategies: Toward a Taxonomy. J. Manag. Inf. Syst. 2001, 18, 215–233. [Google Scholar] [CrossRef]
- Sun, J.; Li, H.; Adeli, H. Concept Drift-Oriented Adaptive and Dynamic Support Vector Machine Ensemble With Time Window in Corporate Financial Risk Prediction. IEEE Trans. Syst. Man Cybern. Syst. 2013, 43, 801–813. [Google Scholar] [CrossRef]
- Wu, Y.C.; Feng, J.W. Development and application of artificial neural network. Wirel. Pers. Commun. 2018, 102, 1645–1656. [Google Scholar] [CrossRef]
- Oniani, D.; Hilsman, J.; Peng, Y.; Poropatich, R.K.; Pamplin, J.C.; Legault, G.L.; Wang, Y. Adopting and expanding ethical principles for generative artificial intelligence from military to healthcare. NPJ Digit. Med. 2023, 6, 225. [Google Scholar] [CrossRef]
- Sackur, J.; Dehaene, S. The cognitive architecture for chaining of two mental operations. Cognition 2009, 111, 187–211. [Google Scholar] [CrossRef]
- Ebert, C.; Gallardo, G.; Hernantes, J.; Serrano, N. DevOps. IEEE Softw. 2016, 33, 94–100. [Google Scholar] [CrossRef]
- Mustyala, A. CI/CD Pipelines in Kubernetes: Accelerating Software Development and Deployment. EPH—Int. J. Sci. Eng. 2022, 8, 1–11. [Google Scholar]
- Barnawi, A.; Sakr, S.; Xiao, W.; Al-Barakati, A. The views, measurements and challenges of elasticity in the cloud: A review. Comput. Commun. 2020, 154, 111–117. [Google Scholar] [CrossRef]
- Wang, C.; Gong, L.; Jia, F.; Zhou, X. An FPGA Based Accelerator for Clustering Algorithms With Custom Instructions. IEEE Trans. Comput. 2021, 70, 725–732. [Google Scholar] [CrossRef]
From / To | Data | Information | Knowledge | Wisdom | Purpose |
---|---|---|---|---|---|
Data | 1, 2, 5, 10, 12, 18, 26, 30 | 3, 5, 9, 17, 28, 35 | 6, 24 | 40 | 4, 11, 15, 29 |
Information | 10, 22 | 13, 17 | 15, 24 | 23, 32 | 16, 32 |
Knowledge | 8, 9, 25, 27 | 3, 13 | 22, 34 | 15, 40 | 25, 31, 35 |
Wisdom | 6, 24, 25, 35 | 16, 22 | 3, 23 | 15, 34 | 10, 15, 20, 33, 39 |
Purpose | 10, 19, 21, 23 | 6 | 2, 15 | 36, 40 | 1, 14, 37, 38 |
TRIZ | DIKWP-TRIZ |
---|---|
principle 3, principle 10, principle 13, principle 25 | principle 4, principle 6, principle 10, principle 11, principle 15, principle 19, principle 21, principle 23, principle 24, principle 29 |
Aspects | Traditional TRIZ | DIKWP-TRIZ |
---|---|---|
Framework | Hierarchical structure (focuses on technical/physical contradictions) | Network structure (interaction among Data–Information–Knowledge–Wisdom–Purpose) |
Problem Focus | Technical contradictions (e.g., functionality vs. efficiency) | Cognitive, semantic, and ethical contradictions, handling uncertainty in AI |
Contradiction Handling Method | Uses 40 invention principles to resolve physical contradictions | Uses DIKWP network interactions to resolve incomplete Data, inconsistent Knowledge, etc. |
Resolution Methods | Invention principles such as segmentation, separation, and merging | Transformations and complementarity among DIKWP elements, e.g., using Data to correct Knowledge or Wisdom to resolve ethical conflicts |
Innovation Process | Based on analysis of past inventions, deterministic and systematic | Adaptive, emergent, intent-driven, capable of handling incomplete/inconsistent input/output pairs |
Uncertainty Handling | Assumes Data are complete or clearly defined, focuses on technical solutions | Explicitly handles the “three-no” problems (incomplete, inconsistent, imprecise Data) through semantic transformation |
Focus on Cognitive Systems | Primarily used for solving technical problems in engineering and design | Aims to solve problems in AI, cognitive systems, artificial consciousness, emphasizing ethical AI and Purpose-driven decision making |
Applicability | Engineering, product design, mechanical systems, manufacturing | AI development, large language models (LLMs), ethical decision making, cognitive and semantic problem solving |
Ethical Issue Handling | Not designed to solve moral or ethical contradictions | Handles ethical dilemmas through integration of Wisdom and Purpose, ensuring alignment with ethical principles in AI development |
Invention Space | Based on hierarchical application of 40 principles | DIKWP interaction’s 5 × 5 network model, where all elements can influence each other (e.g., Data can affect Wisdom, Knowledge can change Data) |
Application Scope | Engineering, industrial design, optimization, physical inventions | AI, consciousness systems, large-scale decision making, high-level ethical and semantic issue resolution |
Complexity of Invention | Uses established principles to solve clearly defined technical problems | Solves high-complexity problems with unknown or incomplete Data through transformation within the DIKWP space |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wu, K.; Duan, Y. DIKWP-TRIZ: A Revolution on Traditional TRIZ Towards Invention for Artificial Consciousness. Appl. Sci. 2024, 14, 10865. https://doi.org/10.3390/app142310865
Wu K, Duan Y. DIKWP-TRIZ: A Revolution on Traditional TRIZ Towards Invention for Artificial Consciousness. Applied Sciences. 2024; 14(23):10865. https://doi.org/10.3390/app142310865
Chicago/Turabian StyleWu, Kunguang, and Yucong Duan. 2024. "DIKWP-TRIZ: A Revolution on Traditional TRIZ Towards Invention for Artificial Consciousness" Applied Sciences 14, no. 23: 10865. https://doi.org/10.3390/app142310865
APA StyleWu, K., & Duan, Y. (2024). DIKWP-TRIZ: A Revolution on Traditional TRIZ Towards Invention for Artificial Consciousness. Applied Sciences, 14(23), 10865. https://doi.org/10.3390/app142310865