Type 2 fuzzy ontology ahmadchan

31
A smart coupling of type-2 fuzzy ontology (T2FO) with a multi-agent system: A novel mechanism to automate the personalized itinerary 1 Student Name: Syed Ahmad Chan Bukhari Student Id: 2010214029 Lab: Artificial Intelligence Lab Supervised by: Prof. Yong-Gi Kim Department of Computer Science, Gyeongsang National University, Jinju Korea

Transcript of Type 2 fuzzy ontology ahmadchan

A smart coupling of type-2 fuzzy ontology (T2FO) with a multi-agent system: A novel mechanism to automate the personalized itinerary

1

Student Name: Syed Ahmad Chan Bukhari Student Id: 2010214029 Lab: Artificial Intelligence Lab Supervised by: Prof. Yong-Gi Kim

Department of Computer Science, Gyeongsang National University, Jinju Korea

Contents

• Background and motivation • Past research work • Proposed solution • ST2FO-MAS to automate personalized Itinerary (Problem Intro.)

• Secure Type-2 Fuzzy Ontology – Secure Type-2 Fuzzy Ontology (A quick review of terminologies) – Type-1 Fuzzy system – Type-2 Fuzzy system

• Secure Type-2 Fuzzy Ontology Development – Crisp ontology development – Type-1 Fuzzy ontology Development – Type-2 Fuzzy ontology development

• Multi-Agent System – Terminology, Role, Integration and usage – Architecture and working

• Architecture of STFO-MAS and its Application to automate the personalized itinerary – inside decision supported multi-agent pool – Inside the Natural language query processing

• Experiments and results – Ontology Evaluation – Overall system evaluation – Extracted results – Graphical efficiency comparison

2 ST2FO-MAS to automate personlized

itinerary

Background and Motivation

• As the internet grows rapidly, millions of web pages are being added on a daily basis

• Personalized information extraction and intelligent decision making on it behalf are challenging issues nowadays

• Explosive internet heterogeneity making relevant Info. Extraction and intelligent decision making more challenging

• Search engines are used commonly to find information

• Conventional mechanism of searching: keywords and directory structure

• Most of the data on internet is in imprecise, uncertain

• Optimal searching not possible by using conventional ways

• Currently users spend hours and hours to find desired information from internet

• Any solution?

3 ST2FO-MAS to automate personlized

itinerary

Past research work

ST2FO-MAS to automate personlized itinerary

4

Researchers Research area/ Domain Year Tools and technologies

Yi et al. To represent the Chinese medicines 2010 Ontology, Fuzzy system

Zhai et al. SCM 2009 Ontology

A. Segev et al. Patent search 2010 Ontology

Huiying et al. Enterprise information-retrieval model 2009 NLP, Ontology, AI

Noy et al. FOGA 2001 Fuzzy system, ANN, Ontology

Zhai et al.

E-commerce domain 2008 Fuzzy Ontology

hang Shing et al. Diet recommendations for diabetic patient 2011 FML, ONTOLOGY

C.S. Lee To present the computer Go knowledge 2010 Fuzzy system, ontology

Wang, M et al. Automate meetings scheduling 2010 FNL, Ontology, AI

Jaber et al. Customized learning paths in an e-learning platform 2010 MAS, Ontology

S. Yang E-health 2010 MAS, Ontology

Szu-Yin, L et al. Corporate tacit knowledge 2005 Ontology, AI

Jung et al. Indirect alignment between multiple language ontologies. 2011 MAS, Ontology, AI

Proposed solution

• Researchers proposed several solution but mostly failed with time, due to diverse and fatally vague nature of web data

• Some solutions found working but with low precision rate and with high cost

• We provide an end-to-end solution to automate the optimal information extraction and decision making

• Our system based on: Secure Type-2 Fuzzy Ontology MAS

– Why Type-2 fuzzy system used?

– Why incorporated Type-2 fuzzy system with ontology?

– Why information security important?

– What is Ontology and how can we exploit it?

– What is the co-relation of MAS, NLP with T2FO and optimal information extraction and decision making?

• Domain of application: Personalized itinerary booking (Why use this domain???)

5 ST2FO-MAS to automate personlized

itinerary

ST2FO-MAS to automate personalized Itinerary (Problem Intro.)

• Manual air ticket booking : time consuming and laborious • Easiness of web technology provides opportunity to travel companies to

online their portals • Thousands of solutions available now • Passengers spend hours to find acceptable fare • Travelers are anxiously waiting for solution with personalized outcomes

6

Problems Proposed Solution

Intensively blurred information Scattered information resources Personalized constraints Tour’s operator limitations Increasing Information security challenges (hacking risks) Limitation of Fuzzy Information acquisition techniques Usability issues Process Automation

Type-2 Fuzzy system T2FO and MAS Type-2 Fuzzy ontology Information security based on XML Type-2 Fuzzy Ontology NLP MAS,NLP and T2FO Ontology with MAS

ST2FO-MAS to automate personlized itinerary

Secure Type-2 Fuzzy Ontology

A quick review of terminologies Ontology: The term ontology has its origin in philosophy and has been applied in many

different ways.

1. “An ontology formally represents knowledge as a set of concepts within a domain, and the relationships between those concepts.”

2. “Formal, explicit specification of a shared conceptualization“

Main Components of Ontology

Individuals: instances or objects (the basic or "ground level" objects) Classes: sets, collections, concepts, types of objects, or kinds of things. Attributes: aspects, properties, features, characteristics, or parameters that

objects (and classes) can have Relations: ways in which classes and individuals can be related to one another

7 ST2FO-MAS to automate personlized

itinerary

Common definitions and concepts about type-1 Fuzzy set and type-2 Type-1 Fuzzy system • The fuzzy set theory was introduced by Lotfi Zadeh in 1965 to deal with vague and imprecise concepts. • In classical set theory, elements either belong to a particular set or they don’t belong. • However, in fuzzy set theory the association of an element with a particular set lies between ‘0’ and ‘1’ which is called degree of association or membership degree. A fuzzy set can be defined as: Definition 1: A fuzzy set ‘s’ over universe of discourse ‘X’ can be defined by its membership function µ_s which maps element ‘x’ to values between [0,1].

Secure Type-2 Fuzzy Ontology (A quick review of terminologies)

8 ST2FO-MAS to automate personlized

itinerary

Secure Type-2 Fuzzy Ontology (A quick review of terminologies)

Type-2 Fuzzy System • Type-1 or conventional fuzzy logic can handle the uncertainty at certain

level. Some Fact • vagueness are the vital parts of any real-time system • Uncertainty and vagueness is increasing continuously due to heterogeneity. How to handle the extensive blurred information? Solution: Type-2 Fuzzy logic • Type-2 fuzzy logic is the extended version of classical fuzzy set theory. • In type-1 fuzzy set theory, the membership values are crisp, while type-2

fuzzy systems have fuzzy membership values.

9

ST2FO-MAS to automate personlized itinerary

10

Secure Type-2 Fuzzy Ontology (Ontology Development)

OUR Proposed formation of Type-2 Fuzzy Ontology Building

The anatomy of Type-2 Secured Fuzzy Ontology (Layered Architecture)

Development of Secure type-2 fuzzy ontology

11

1. Determine the domain and scope of the ontology.

2. Consider reusing existing ontologies.

3. Enumerate important terms in the ontology.

4. Define the classes and the class hierarchy.

5. Define the properties of the classes.

6. Define the facets of the slots.

7. Create instances.

Domain Ontology Development steps

Language: OWL-2 , RDF and Protégé Reasoner: Pellet, DeLorean

ST2FO-MAS to automate personlized itinerary

12

Development of Secure type-2 fuzzy ontology

• Fuzzy ontology can be defined in the form of fuzzy sets. • Let be fuzzy class in universe of discourse µ then

and the relationship between two ontology classes are fuzzy relation • Annotation feature of protégé is used to define fuzzy concept in fuzzy ontology • Manual process of annotation adding is a complex and error pruning • Protégé fuzzy OWL tab helps us to make this process handy • A class of cheap ticket can be described in to fuzzy form as: •Similarly very cheap ticket can be expressed as:

Secure Type-2 Fuzzy Ontology of Ticket Booking Domain 13

Development of Secure type-2 fuzzy ontology

Why information security important? • Information is the most valuable assets of any organization. • Nowadays, secure information has become a strategic issue for online businesses. • In ontology, all kind of information is shared in plain text format. • This raises the issues of information leakage, altering and deletion of information contents

Secure Type-2 Fuzzy Ontology (Information security)

14

Possible Information security Challenges • DOS attack on server • XML content exploit attack (data holders: CDATA,PCDATA, NUMBER) • X-Path altering attack (also known as XML bomb)

Light Weight solution for content security

• XML security recommendations developed by W3C

•XML digital signature • XML encryption • XML key management specification (XKMS) •security assertion markup language • XML access control markup language XACML)

ST2FO-MAS to automate personlized itinerary

15

<? XML version="1.0"?>

<! DOCTYPE Ontology [ <! ENTITY xsd "http://www.w3.org/2001/XMLSchema#" > ]>

<owlx:Ontology owlx:name="http://www.ailab.gnu.ac.kr/t2fo" xmlns:owlx="http://www.w3.org/2003/05/owl-xml">

<CustomerInfo xmlns='http://www.ailab.gnu.ac.kr/st2fo-mas/person_ontology'>

<Name>ahmad chan</Name>

<EncryptedData Type='http://www.w3.org/2001/04/xmlenc#Element' xmlns='http://www.w3.org/2001/04/xmlenc#'>

<EncryptionMethod Algorithm='http://www.w3.org/2001/04/xmlenc#tripledes-cbc'/>

<KeyInfo xmlns='http://www.w3.org/2000/09/xmldsig#'>

<EncryptedKey xmlns='http://www.w3.org/2001/04/xmlenc#'>

<EncryptionMethod Algorithm='http://www.w3.org/2001/04/xmlenc#rsa-1_5'/>

<KeyInfo xmlns='http://www.w3.org/2000/09/xmldsig#'>

<KeyName>white tiger</KeyName>

</KeyInfo>

<CipherData>

<CipherValue>vHE@#$&&JUIOFdefghj...</CipherValue>

</CipherData>

</EncryptedKey>

</KeyInfo>

<CipherData>

<CipherValue>yyFE%!JJNIcflijnvcthsdrtg...</CipherValue>

</CipherData>

</EncryptedData>

</CustomerInfo>

</owlx:Ontology>

Secure Type-2 Fuzzy Ontology (Information security: Application scheme)

• Diversity and complexity factors are increasing day by day in modern software applications.

• The multi-Agent system is considered an efficient technology in the development of distributed systems.

• A multi-Agent system is basically the group of interconnected agents, in which each agent works autonomously while sharing information.

• An agent is a bunch of code which is designed to perform a specific task on the behalf of its user.

Why we used MAS?

Our domain is diverse

Complex and unstructured

For automatic information extraction

For intelligent decision making

16

Multi-agent system ( Terminology, Role, Integration and usage)

ST2FO-MAS to automate personlized itinerary

17 ST2FO-MAS to automate personlized

itinerary

Multi-agent system ( Architecture and working)

18

5

2 3

1 4

8

7

6

A graphical architecture of STFO-MAS and its Application to automate the personalized itinerary

19 ST2FO-MAS to automate personlized

itinerary

What's inside decision supported multi-agent pool?

Agent Name Agent Acronym Funcationality

Query Processing Agent QPA Natural language to query building

Query Processing

Query Optimization

Personal Preferences and

Schedule Maintaining Agent

PPSA Interaction with personal ontology

Communication with other agents to rovide the

personal preferences information

Monitoring the information process and

implementations of user constraints.

Type-2 Fuzzy Inference

Engine Agent

T2FIA Crtical decision making based on information

Remain in touch all the time with PPSA and SBTA

Responsible for making underlying connection with

fuzzy ontology

Secured Bank Transaction

Agent

SBTA Receiving requests for transaction.

Authentication

Resorce allocation

Transaction processing

Log generation

Ticket reservation Agent TRA Making connection with travel agency databases

Finding and reserving of the optimal ticket

Keep in touch with T2FIA AND PPSA

Multi-agent system schema

20 ST2FO-MAS to automate personlized

itinerary

What's Inside the Natural language query processing agent (QPA)?

I(noun) want to(preposition) go(verb) from(preposition) Seoul(noun) to London(noun) to attend(preposition) a meeting(verb) . The meeting will be held afternoon (noun, adjective), so I want to take (verb) vegetables (noun) in lunch (noun). Please book (verb) a ticket (noun) of economy class (noun+

adjective) with cheap rate (noun+

adjective) and minimum delay (noun+

adjective).”

21 ST2FO-MAS to automate personlized

itinerary

Experiments and results

Ontology Evaluation

• We evaluated the ontology after completion of each phase of T2FO development to measure the efficiency •We used Manchester OWL-2 syntax of DL-query to evaluate the efficiency of ontology Some queries results are:

ST2FO-MAS to automate personlized itinerary

22

Experiments and results

System security Evaluator

23 ST2FO-MAS to automate personlized

itinerary

Experiments and results

Overall system evaluation

•Information system can be categorized on the basis of its effectiveness. •There are some known ways to define the efficiency of an information system, such as the precision, recall and time • To exact judge the performance, we requested five volunteer to help us in experiments. •The volunteers enquired from the system by using crisp ontology and Type-2 fuzzy ontology. • we noted the time, precision and recall in each mode • Mathematically, the precision and recall can be expressed as the following:

here ‘ce’ is the total number of records that are extracted from the internet, and ‘te’ and ‘fe’ represent the true and false elements in the extracted records.

ST2FO-MAS to automate personlized itinerary

24

Total

Number of

Resource

Extracted

Corpus 1 (ce)

Number of

True

Elements (te)

No of False

Elements (fe)

Precision

Percentage

(PP) (%)

Recall

Percentage

(RC) (%)

Job

Completion

Time (JCT)

(Seconds)

Volunteer 1

569

191

378

61.1

74.8

180

Volunteer 2

479

146

333

58.9

76.6

234

Volunteer 3 587 275 312 58.1 68.1 156

Volunteer 4 389 87 302 94.8 81.8 132

Volunteer 5 495 198 297 62.5 71.5 210

Overall system performance results recoded in the case of the secured type-1 fuzzy ontology.

Experiments and results (Extracted results)

Overall system performance results recoded in the case of the secured type-1 fuzzy ontology.

Total Number

of Resource

Extracted

Corpus 1 (ce)

Number of

True Elements

(te)

No of False

Elements (fe)

Precision

Percentage (PP)

(%)

Recall

Percentage (RC)

(%)

Job Completion

Time (JCT)

(Seconds)

Volunteer 1

569

311

258

68.8

71.2

228

Volunteer 2

479

292

187

71.9

67.3

258

Volunteer 3 587 496 91 86.5 54.2 286

Volunteer 4 389 278 111 77.9 58.3 305

Volunteer 5 495 267 228 68.5 64.9 315

ST2FO-MAS to automate personlized itinerary

25

Experiments and results

Overall system performance results recoded in the case of the secured type-2 fuzzy ontology.

Total

Number of

Resource

Extracted

Corpus 1 (ce)

Number of

True

Elements (te)

No of False

Elements (fe)

Precision

Percentage

(PR) (%)

Recall

Percentage

(RC) (%)

Job

Completion

Time (JCT)

(Seconds)

Volunteer 1

569

437

159

78.2

56.5

336

Volunteer 2

479

337

142

77.2

58.8

319

Volunteer 3 587 530 57 91.1 52.55 422

Volunteer 4 389 279 110 77.9 58.23 357

Volunteer 5 495 391 104 82.6 55.3 467

ST2FO-MAS to automate personlized itinerary

26

Experiments and results (Efficiency Comparison)

Crisp ontology Case

Fuzzy ontology Case

ST2FO-MAS to automate personlized itinerary

27

Experiments and results (Efficiency Comparison)

Type-2 Fuzzy ontology Case

Combine Efficiency Analysis

ST2FO-MAS to automate personlized itinerary

28

References

1. A. Segev, J. Kantola, Patent Search Decision Support Service, In: Proceedings of Seventh International Conference on Information Technology, 2010, pp. 568-573.

2. A. Vorobiev, J. Han, Security Attack Ontology for Web Services, Semantics, In: Proceedings of Second International Conference on Knowledge and Grid, 2006, pp. 42-49.

3. A.C. Bukhari, Y.G Kim, Exploiting the Heavyweight Ontology with Multi-Agent System Using Vocal Command System: A Case Study on E-Mall, International Journal of Advancements in Computing Technology 3(2011) 233-241.

4. A.C. Bukhari, Y.G Kim, Ontology-assisted automatic precise information extractor for visually impaired inhabitants, Artificial Intelligence Review (2005) Issn: 0269-2821.

5. C. Lee, M. Wang, H. Hagras, A Type-2 Fuzzy Ontology and Its Application to Personal Diabetic-Diet Recommendation, IEEE Transactions on Fuzzy Systems 18 (2010), pp. 374-395

6. C. Lee, M. Wang, M. Wu, C. Hsu; Y. Lin, S. Yen , A type-2 fuzzy personal ontology for meeting scheduling system, In: Proceeding of International Conference on Fuzzy Systems, 2010 , pp. 1-8

7. C.J Su, C.Y Wu, JADE implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring , Applied Soft Computing Journal 11 (2011), 315-325.

8. C.I. Nyulas, M.J. O'Connor, S.W. Tu, D.L. Buckeridge, A. Okhmatovskaia, M.A. Musen, An Ontology-Driven Framework for Deploying JADE Agent Systems, IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008, pp. 573-577.

9. C. Lee, C. Jiang, T. Hsieh, A genetic fuzzy agent using ontology model for meeting scheduling system, Information Sciences 176 (2006) 1131-1155 10. C. Lee, M. Wang, G. Acampora, C. Hsu, and H. Hagras, Diet assessment based on type-2 fuzzy ontology and fuzzy markup language, Int. J. Intell. Syst., 25

(2010) 1187-1216. 11. C. S. Lee, M. H. Wang. Z. R. Yang, Y. J. Chen, H. Doghmen, and O. Teytaud, FML-based type-2 fuzzy ontology for computer Go knowledge representation,

In: Proceeding of International Conference on System Science and Engineering (ICSSE 2010), 2010, pp. 63-68. 12. C.D. Maio,G. Fenza, V. Loia, S. Senatore , Towards an automatic fuzzy ontology generation," In: Proceedings of IEEE International Conference on fuzzy

system,2009, pp.1044-1049. 13. C.D. Maio,G. Fenza, V. Loia, S. Senatore, Hierarchical web resources retrieval by exploiting Fuzzy Formal Concept Analysis, Information Processing &

Management Available online 26 May 2011, ISSN 0306-4573. 14. D.H. Fudholi, N. Maneerat, R. Varakulsiripunth, Y. Kato, Application of Protégé, SWRL and SQWRL in fuzzy ontology-based menu recommendation,

International Symposium on Intelligent Signal Processing and Communication Systems, 2009, pp. 631-634. 15. D.Wu, J.M. Mendel, Uncertainty measures for interval type-2 fuzzy sets, Information Sciences, 177 (2007) 5378-5393. 16. E. Gatial, Z. Balogh, M. Ciglan, L. Hluchy, Focused web crawling mechanism based on page relevance, In: Proceedings of (ITAT 2005) information

technologies applications and theory, 2005, pp. 41–45 17. F. Abdoli, M. Kahani, Ontology-based distributed intrusion detection system,In: Proceedings of 14th International Computer Conference, 2009, pp. 65-

70.

18. F. Bobillo, U. Straccia, Fuzzy Ontology Representation using OWL 2, International Journal of Approximate Reasoning (2011) 1-36. 19. F. Bobillo, M. Delgado, J. Gomez-Romero, DeLorean: a reasoner for fuzzy OWL 1.1, In: Proceedings of 4th International Workshop on Uncertainty

Reasoning for the Semantic Web (URSW 2008), 2008, pp. 35-44. 20. F.N Natalya, LM Deborah, Ontology development 101: a guide to creating your first ontology.

http://protege.stanford.edu/publications/ontology_development/ontology101-noy-mcguinness.htm 21. H. Gao, J. Zhao, Q. Yin, J. Wang, Ontology-based enterprise information retrieval model, IEEE International Conference on Grey Systems and

Intelligent Services, 2009, pp. 1326-1330. 22. H. Cunningham, Y. Wilks, R. J. Gaizauskas, GATE, a General Architecture for Text Engineering. Computers and humanities (2002), 1057-1060. 23. J. Lakshmipathi, T. Chithralekha, VIHARI: An Ontology Sevice Driven Multi-Agent System for Air Ticket Booking, in: Proceedings of Advanced

Computing and Communications, 2007, pp. 675-680. 24. J. Zhai, Q. Wang, M. Lv, Application of Fuzzy Ontology Framework to Information Retrieval for SCM, In: Proceedings of International Symposiums

on Information Processing (ISIP), 2008, pp. 173-177 25. J. Zhai, L. Shen,Y. Liang, J. Jiang, Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce, In: Proceedings of International

Symposium on Electronic Commerce and Security, 2008, pp. 221-225. 26. J. Zhai, M. Lv, J. Li, Q. Wang, Knowledge modeling for fuzzy systems based on ontology, In: Proceedings of Control and Decision Conference, 2008,

pp. 3393-3397. 27. J.J. Jung, Exploiting multi-agent platform for indirect alignment between multilingual ontologies: A case study on tourism business, Expert Systems

with Applications 38 (2011), 5774-5780. 28. J.M Mendel, R.I. John, F. Liu, Interval Type-2 Fuzzy Logic Systems Made Simple, IEEE Transactions on Fuzzy Systems 14 (2006) 808-821. 29. J.R. Chen, S.R. Wolfe, S.D. Wragg, A distributed multi-agent system for collaborative information management and sharing, in: Proceedings of the

ninth international conference on Information and knowledge management, 2000, pp.382-388. 30. J.M. Mendel, Advances in type-2 fuzzy sets and systems, Information Sciences 177 (2007) 84-110 31. J. Lee, K. Whang, Secure query processing against encrypted XML data using Query-Aware Decryption, Information Sciences, 176 (2006) 1928-

1947 32. J.E Bouhdidi, M. Ghailani, O. Abdoun and A. Fennan, A New Approach based on a Multi-ontologies and Multi-agents System to Generate

Customized Learning Paths in an E-Learning Platform, International Journal of Computer Applications, 12(2010), 1-6. 33. K. Sim, P.Wong, Toward agency and ontology for web-based information retrieval, IEEE Transactions on Systems, Man, and Cybernetics, Part C:

Applications and Reviews, 34(2004), 257-269. 34. L.A. Zadeh, Fuzzy Sets, Information Control 8 (1965) 338-353. 35. M.S. Kim, K.Y. Whang, J.G. Lee, and M.J. Lee, n-Gram/2 L: A Space and Time Efficient Two-Level n-Gram Inverted Index Structure, in VLDB,

Trondheim (2005) 325-336. 36. M. Cremonini, S. De Capitani di Vimercati, E. Damiani, P.Samarati, An XML-based approach to combine firewalls and web services security

specifications, XML Security (2003) 69-78 37. M.H. Wang, C.S. Lee, K.L. Hsieh, C.Y Hsu, G. Acampora, C.C Chang , Ontology-based multi-agents for intelligent healthcare applications, Journal of

Ambient Intelligence and Humanized Computing, 1(2010), 1-21. 38. N.F. Noy, D.L. McGuinness, Ontology Development 101: A Guide to Creating Your First Ontology, Stanford Knowledge Systems Laboratory

Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report, 2001, SMI-2001-0880. 39. N. Shadbolt, W. Hall, T.B. Lee, The semantic web revisited, Journal of Intelligent System 21(2006) 96–101. 40. N.N. Karnik, J.M. Mendel, Operations on type-2 fuzzy sets, Fuzzy Sets and Systems 122, (2001) pp 327-348.

ST2FO-MAS to automate personlized itinerary

29

References

ST2FO-MAS to automate personlized itinerary

30

References

41. P. Yan, Y. Zhao, C. Sanxing, and Ontology-Based Information Content Security Analysis, In: Proceedings of Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008, pp. 479-483.

42. P.D Meo, A. Garro, G. Terracina, D. Ursino, Personalizing learning programs with X-Learn, an XML-based, 'user-device' adaptive multi-agent system, Information Sciences 177(2007) 1729-1770.

43. Q.T Tho, S.C Hui, A.C. Fong, T.H Cao, Automatic fuzzy ontology generation for semantic Web, IEEE Transactions on Knowledge and Data Engineering 18 (2006) 842-856.

44. Q. Guo, M. Zhang, A novel approach for multi-agent-based Intelligent Manufacturing System, Information Sciences 179 (2009) 3079-3090.

45. R.M Sachs, D.W Brown, J. DeLong, A first step on the path to automated flight reservations , In: Proceeding of Third IEEE Workshop on Interactive Voice Technology for Telecommunications Applications,1996, pp. 61-64

46. R. Azevedo, E. Dantas, F. Freitas, C. Rodrigues, M.J. Almeida, W. Veras, R. Santosyi, An Autonomic Ontology-Based Multiagent System for Intrusion Detection in Computing Environments, International Journal for Infonomics (IJI) 3 (2011) 182 – 189.

47. R. Subhashini, V.J.S Kumar, Shallow NLP techniques for noun phrase extraction, In: Proceeding of Trendz in Information Sciences & Computing (TISC), 2010 , pp.73-77.

48. S. Nasrolahi, M. Nikdast, M. Boroujerdi, The semantic web: a new approach for future world wide web, In: Proceedings of World Academy of Science, Engineering and Technology, 2009, pp. 1149-1154

49. S. Yi, Z. Dezheng, C. Li, Fuzzy ontology constructing and its application in traditional Chinese medicine, In: Proceedings of International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2010 pp. 592-595

50. S. Bechhofer, F.V Harmelen, J. Hendler, I. Horrocks,D.L McGuinness, P.F Patel-Schneider,L.A Stein, OWL Web Ontology Language Reference, 2004, W3C Recommendation http ://www.w3.org/TR/owl-ref.

51. S. Beji, N. Kadhi, Security Ontology Proposal for Mobile Applications, In: Proceedings of Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 2009, pp. 580-587.

52. S. Yang, L. Szu-Yin, L. Shih-Neng, S. Cheng, and V. Soo, An ontology-based multi-agent platform for patent knowledge management, International Journal of Electronic Business Management, 3(2005), 181-192

53. W. Ying, J.S. Wimalasiri, P. Ray, S. Chattopadhyay and C. S. Wilson, An ontology driven Multiagent approach to integrated e-Health systems, International Journal of E-Health and Medical Communications, 1(2010), 28-40

Many Thanks for your Kind attention!

31 ST2FO-MAS to automate personlized

itinerary