1. A smart coupling of type-2 fuzzy ontology (T2FO) with a multi-agent
system: A novel mechanism to automate the personalized itinerary
Student Name: Syed Ahmad Chan Bukhari
Student Id: 2010214029
Lab: Artificial Intelligence Lab
Supervised by: Prof. Yong-Gi Kim
Department of Computer Science, Gyeongsang National University, Jinju Korea 1
2. Contents
• Background and motivation
• Past research work
• Proposed solution
• ST2FO-MAS to automate personalized Itinerary (Problem Intro.)
• Secure Type-2 Fuzzy Ontology
– Secure Type-2 Fuzzy Ontology (A quick review of terminologies)
– Type-1 Fuzzy system
– Type-2 Fuzzy system
• Secure Type-2 Fuzzy Ontology Development
– Crisp ontology development
– Type-1 Fuzzy ontology Development
– Type-2 Fuzzy ontology development
• Multi-Agent System
– Terminology, Role, Integration and usage
– Architecture and working
• Architecture of STFO-MAS and its Application to automate the personalized itinerary
– inside decision supported multi-agent pool
– Inside the Natural language query processing
• Experiments and results
– Ontology Evaluation
– Overall system evaluation
– Extracted results
– Graphical efficiency comparison
ST2FO-MAS to automate personlized
2
itinerary
3. Background and Motivation
• As the internet grows rapidly, millions of web pages are being
added on a daily basis
• Personalized information extraction and intelligent decision making
on it behalf are challenging issues nowadays
• Explosive internet heterogeneity making relevant Info. Extraction
and intelligent decision making more challenging
• Search engines are used commonly to find information
• Conventional mechanism of searching: keywords and directory
structure
• Most of the data on internet is in imprecise, uncertain
• Optimal searching not possible by using conventional ways
• Currently users spend hours and hours to find desired information
from internet
• Any solution?
ST2FO-MAS to automate personlized
3
itinerary
4. Past research work
Researchers Research area/ Domain Year Tools and technologies
Yi et al. To represent the Chinese medicines 2010 Ontology, Fuzzy system
Zhai et al. SCM 2009 Ontology
A. Segev et al. Patent search 2010 Ontology
Huiying et al. Enterprise information-retrieval model 2009 NLP, Ontology, AI
Noy et al. FOGA 2001 Fuzzy system, ANN, Ontology
Zhai et al. E-commerce domain 2008 Fuzzy Ontology
hang Shing et al. Diet recommendations for diabetic patient 2011 FML, ONTOLOGY
C.S. Lee To present the computer Go knowledge 2010 Fuzzy system, ontology
Wang, M et al. Automate meetings scheduling 2010 FNL, Ontology, AI
Jaber et al. Customized learning paths in an e-learning platform 2010 MAS, Ontology
S. Yang E-health 2010 MAS, Ontology
Szu-Yin, L et al. Corporate tacit knowledge 2005 Ontology, AI
Jung et al. Indirect alignment between multiple language ontologies. 2011 MAS, Ontology, AI
ST2FO-MAS to automate personlized
4
itinerary
5. Proposed solution
• Researchers proposed several solution but mostly failed with time, due to
diverse and fatally vague nature of web data
• Some solutions found working but with low precision rate and with high
cost
• We provide an end-to-end solution to automate the optimal information
extraction and decision making
• Our system based on: Secure Type-2 Fuzzy Ontology MAS
– Why Type-2 fuzzy system used?
– Why incorporated Type-2 fuzzy system with ontology?
– Why information security important?
– What is Ontology and how can we exploit it?
– What is the co-relation of MAS, NLP with T2FO and optimal information
extraction and decision making?
• Domain of application: Personalized itinerary booking (Why use this
domain???)
ST2FO-MAS to automate personlized
5
itinerary
6. ST2FO-MAS to automate personalized Itinerary
(Problem Intro.)
• Manual air ticket booking : time consuming and laborious
• Easiness of web technology provides opportunity to travel companies to
online their portals
• Thousands of solutions available now
• Passengers spend hours to find acceptable fare
• Travelers are anxiously waiting for solution with personalized outcomes
Problems Proposed Solution
Intensively blurred information Type-2 Fuzzy system
Scattered information resources T2FO and MAS
Personalized constraints Type-2 Fuzzy ontology
Tour’s operator limitations
Information security based on XML
Increasing Information security
challenges (hacking risks) Type-2 Fuzzy Ontology
Limitation of Fuzzy Information NLP
acquisition techniques MAS,NLP and T2FO
Usability issues Ontology with MAS
Process Automation
ST2FO-MAS to automate personlized
6
itinerary
7. Secure Type-2 Fuzzy Ontology
A quick review of terminologies
Ontology:
The term ontology has its origin in philosophy and has been applied in many
different ways.
1. “An ontology formally represents knowledge as a set of concepts within
a domain, and the relationships between those concepts.”
2. “Formal, explicit specification of a shared conceptualization“
Main Components of Ontology
Individuals: instances or objects (the basic or "ground level" objects)
Classes: sets, collections, concepts, types of objects, or kinds of things.
Attributes: aspects, properties, features, characteristics, or parameters that
objects (and classes) can have
Relations: ways in which classes and individuals can be related to one another
ST2FO-MAS to automate personlized
7
itinerary
8. Secure Type-2 Fuzzy Ontology
(A quick review of terminologies)
Common definitions and concepts about type-1 Fuzzy set and type-2
Type-1 Fuzzy system
• The fuzzy set theory was introduced by Lotfi Zadeh in 1965 to deal with vague
and imprecise concepts.
• In classical set theory, elements either belong to a particular set or they don’t
belong.
• However, in fuzzy set theory the association of an element with a particular set
lies between ‘0’ and ‘1’ which is called degree of association or membership
degree. A fuzzy set can be defined as:
Definition 1: A fuzzy set ‘s’ over universe of discourse ‘X’ can be defined by its
membership function µ_s which maps element ‘x’ to values between [0,1].
ST2FO-MAS to automate personlized
8
itinerary
9. Secure Type-2 Fuzzy Ontology
(A quick review of terminologies)
Type-2 Fuzzy System
• Type-1 or conventional fuzzy logic can handle the uncertainty at certain
level.
Some Fact
• vagueness are the vital parts of any real-time system
• Uncertainty and vagueness is increasing continuously due to heterogeneity.
How to handle the extensive blurred information?
Solution: Type-2 Fuzzy logic
• Type-2 fuzzy logic is the extended version of classical fuzzy set theory.
• In type-1 fuzzy set theory, the membership values are crisp, while type-2
fuzzy systems have fuzzy membership values.
9
10. Secure Type-2 Fuzzy Ontology
(Ontology Development)
OUR Proposed formation of Type-2 Fuzzy Ontology Building
ST2FO-MAS to automate personlized
10
itinerary
11. Development of Secure type-2 fuzzy ontology
The anatomy of Type-2 Secured Fuzzy Ontology (Layered
Domain Ontology Development steps
Architecture)
1. Determine the domain
and scope of the
ontology.
2. Consider reusing
existing ontologies.
3. Enumerate important
terms in the ontology.
4. Define the classes and
the class hierarchy.
5. Define the properties of
the classes.
6. Define the facets of the
slots.
7. Create instances.
Language: OWL-2 , RDF and Protégé
Reasoner: Pellet, DeLorean
ST2FO-MAS to automate personlized
11
itinerary
12. Development of Secure type-2 fuzzy ontology
• Fuzzy ontology can be defined in the form of fuzzy sets.
• Let be fuzzy class in universe of discourse µ then
and the relationship between two ontology classes are fuzzy relation
• Annotation feature of protégé is used to define fuzzy concept in fuzzy ontology
• Manual process of annotation adding is a complex and error pruning
• Protégé fuzzy OWL tab helps us to make this process handy
• A class of cheap ticket can be described in to fuzzy form as:
•Similarly very cheap ticket can be expressed as:
12
13. Development of Secure type-2 fuzzy ontology
13
Secure Type-2 Fuzzy Ontology of Ticket Booking Domain
14. Secure Type-2 Fuzzy Ontology
(Information security)
Why information security important?
• Information is the most valuable assets of any organization.
• Nowadays, secure information has become a strategic issue for online
businesses.
• In ontology, all kind of information is shared in plain text format.
• This raises the issues of information leakage, altering and deletion of
information contents
Possible Information security Challenges
• DOS attack on server
• XML content exploit attack (data holders: CDATA,PCDATA, NUMBER)
• X-Path altering attack (also known as XML bomb)
Light Weight solution for content security
• XML security recommendations developed by W3C
•XML digital signature
• XML encryption
• XML key management specification (XKMS)
•security assertion markup language
• XML access control markup language XACML) 14
16. Multi-agent system ( Terminology, Role, Integration and usage)
• Diversity and complexity factors are increasing day by day in modern
software applications.
• The multi-Agent system is considered an efficient technology in the
development of distributed systems.
• A multi-Agent system is basically the group of interconnected agents, in
which each agent works autonomously while sharing information.
• An agent is a bunch of code which is designed to perform a specific task
on the behalf of its user.
Why we used MAS?
Our domain is diverse
Complex and unstructured
For automatic information extraction
For intelligent decision making
ST2FO-MAS to automate personlized
16
itinerary
17. Multi-agent system ( Architecture and working)
ST2FO-MAS to automate personlized
17
itinerary
18. A graphical architecture of STFO-MAS and its Application to automate the
personalized itinerary
2 3
1 4
5
6
7
8
18
19. What's inside decision supported multi-agent pool?
Agent Name Agent Acronym Funcationality
Query Processing Agent QPA Natural language to query building
Query Processing
Query Optimization
Personal Preferences and PPSA Interaction with personal ontology
Schedule Maintaining Agent Communication with other agents to rovide the
personal preferences information
Monitoring the information process and
implementations of user constraints.
Type-2 Fuzzy Inference T2FIA Crtical decision making based on information
Engine Agent Remain in touch all the time with PPSA and SBTA
Responsible for making underlying connection with
fuzzy ontology
Secured Bank Transaction SBTA Receiving requests for transaction.
Agent Authentication
Resorce allocation
Transaction processing
Log generation
Ticket reservation Agent TRA Making connection with travel agency databases
Finding and reserving of the optimal ticket
Keep in touch with T2FIA AND PPSA
Multi-agent system schema
ST2FO-MAS to automate personlized
19
itinerary
20. What's Inside the Natural language query processing agent
(QPA)?
I(noun) want to(preposition) go(verb)
from(preposition) Seoul(noun) to
London(noun) to attend(preposition) a
meeting(verb) . The meeting will be
held afternoon (noun, adjective), so I
want to take (verb) vegetables (noun)
in lunch (noun). Please book (verb) a
ticket (noun) of economy class (noun+
adjective) with cheap rate (noun+
adjective) and minimum delay (noun+
adjective).”
ST2FO-MAS to automate personlized
20
itinerary
21. Experiments and results
Ontology Evaluation
• We evaluated the ontology after completion of each phase of T2FO development to
measure the efficiency
•We used Manchester OWL-2 syntax of DL-query to evaluate the efficiency of ontology
Some queries results are:
ST2FO-MAS to automate personlized
21
itinerary
22. Experiments and results
System security Evaluator
ST2FO-MAS to automate personlized
22
itinerary
23. Experiments and results
Overall system evaluation
•Information system can be categorized on the basis of
its effectiveness.
•There are some known ways to define the efficiency of an
information system, such as the precision, recall and time
• To exact judge the performance, we requested five volunteer to
help us in experiments.
•The volunteers enquired from the system by using crisp ontology
and Type-2 fuzzy ontology.
• we noted the time, precision and recall in each mode
• Mathematically, the precision and recall can be expressed as the following:
here ‘ce’ is the total number of records that are extracted from the internet,
and ‘te’ and ‘fe’ represent the true and false elements in the extracted records.
ST2FO-MAS to automate personlized
23
itinerary
24. Experiments and results (Extracted results)
Overall system performance results recoded in the case of the secured type-1 fuzzy ontology.
Total Number of No of False Precision Recall Job
Number of True Elements (fe) Percentage Percentage Completion
Resource Elements (te) (PP) (%) (RC) (%) Time (JCT)
Extracted (Seconds)
Corpus 1 (ce)
Volunteer 1 569 191 378 61.1 74.8 180
Volunteer 2 479 146 333 58.9 76.6 234
Volunteer 3 587 275 312 58.1 68.1 156
Volunteer 4 389 87 302 94.8 81.8 132
Volunteer 5 495 198 297 62.5 71.5 210
Overall system performance results recoded in the case of the secured type-1 fuzzy
ontology.
Total Number Number of No of False Precision Recall Job Completion
of Resource True Elements Elements (fe) Percentage (PP) Percentage (RC) Time (JCT)
Extracted (te) (%) (%) (Seconds)
Corpus 1 (ce)
Volunteer 1 569 311 258 68.8 71.2 228
Volunteer 2 479 292 187 71.9 67.3 258
Volunteer 3 587 496 91 86.5 54.2 286
Volunteer 4 389 278 111 77.9 58.3 305
Volunteer 5 495 267 228 68.5 64.9 315
ST2FO-MAS to automate personlized
24
itinerary
25. Experiments and results
Overall system performance results recoded in the case of the secured type-2
fuzzy ontology.
Total Number of No of False Precision Recall Job
Number of True Elements (fe) Percentage Percentage Completion
Resource Elements (te) (PR) (%) (RC) (%) Time (JCT)
Extracted (Seconds)
Corpus 1 (ce)
Volunteer 1 569 437 159 78.2 56.5 336
Volunteer 2 479 337 142 77.2 58.8 319
Volunteer 3 587 530 57 91.1 52.55 422
Volunteer 4 389 279 110 77.9 58.23 357
Volunteer 5 495 391 104 82.6 55.3 467
ST2FO-MAS to automate personlized
25
itinerary
26. Experiments and results (Efficiency Comparison)
Crisp ontology Case
Fuzzy ontology Case
ST2FO-MAS to automate personlized
26
itinerary
27. Experiments and results (Efficiency Comparison)
Type-2 Fuzzy ontology
Case
Combine Efficiency Analysis
ST2FO-MAS to automate personlized
27
itinerary
28. References
1. A. Segev, J. Kantola, Patent Search Decision Support Service, In: Proceedings of Seventh International Conference on Information Technology, 2010, pp.
568-573.
2. A. Vorobiev, J. Han, Security Attack Ontology for Web Services, Semantics, In: Proceedings of Second International Conference on Knowledge and Grid,
2006, pp. 42-49.
3. A.C. Bukhari, Y.G Kim, Exploiting the Heavyweight Ontology with Multi-Agent System Using Vocal Command System: A Case Study on E-Mall,
International Journal of Advancements in Computing Technology 3(2011) 233-241.
4. A.C. Bukhari, Y.G Kim, Ontology-assisted automatic precise information extractor for visually impaired inhabitants, Artificial Intelligence Review (2005)
Issn: 0269-2821.
5. C. Lee, M. Wang, H. Hagras, A Type-2 Fuzzy Ontology and Its Application to Personal Diabetic-Diet Recommendation, IEEE Transactions on Fuzzy Systems
18 (2010), pp. 374-395
6. C. Lee, M. Wang, M. Wu, C. Hsu; Y. Lin, S. Yen , A type-2 fuzzy personal ontology for meeting scheduling system, In: Proceeding of International
Conference on Fuzzy Systems, 2010 , pp. 1-8
7. C.J Su, C.Y Wu, JADE implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring , Applied Soft
Computing Journal 11 (2011), 315-325.
8. C.I. Nyulas, M.J. O'Connor, S.W. Tu, D.L. Buckeridge, A. Okhmatovskaia, M.A. Musen, An Ontology-Driven Framework for Deploying JADE Agent
Systems, IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008, pp. 573-577.
9. C. Lee, C. Jiang, T. Hsieh, A genetic fuzzy agent using ontology model for meeting scheduling system, Information Sciences 176 (2006) 1131-1155
10. C. Lee, M. Wang, G. Acampora, C. Hsu, and H. Hagras, Diet assessment based on type-2 fuzzy ontology and fuzzy markup language, Int. J. Intell. Syst., 25
(2010) 1187-1216.
11. C. S. Lee, M. H. Wang. Z. R. Yang, Y. J. Chen, H. Doghmen, and O. Teytaud, FML-based type-2 fuzzy ontology for computer Go knowledge representation,
In: Proceeding of International Conference on System Science and Engineering (ICSSE 2010), 2010, pp. 63-68.
12. C.D. Maio,G. Fenza, V. Loia, S. Senatore , Towards an automatic fuzzy ontology generation," In: Proceedings of IEEE International Conference on fuzzy
system,2009, pp.1044-1049.
13. C.D. Maio,G. Fenza, V. Loia, S. Senatore, Hierarchical web resources retrieval by exploiting Fuzzy Formal Concept Analysis, Information Processing &
Management Available online 26 May 2011, ISSN 0306-4573.
14. D.H. Fudholi, N. Maneerat, R. Varakulsiripunth, Y. Kato, Application of Protégé, SWRL and SQWRL in fuzzy ontology-based menu recommendation,
International Symposium on Intelligent Signal Processing and Communication Systems, 2009, pp. 631-634.
15. D.Wu, J.M. Mendel, Uncertainty measures for interval type-2 fuzzy sets, Information Sciences, 177 (2007) 5378-5393.
16. E. Gatial, Z. Balogh, M. Ciglan, L. Hluchy, Focused web crawling mechanism based on page relevance, In: Proceedings of (ITAT 2005) information
technologies applications and theory, 2005, pp. 41–45
17. F. Abdoli, M. Kahani, Ontology-based distributed intrusion detection system,In: Proceedings of 14th International Computer Conference, 2009, pp. 65-
70.
ST2FO-MAS to automate personlized
28
itinerary
29. References
18. F. Bobillo, U. Straccia, Fuzzy Ontology Representation using OWL 2, International Journal of Approximate Reasoning (2011) 1-36.
19. F. Bobillo, M. Delgado, J. Gomez-Romero, DeLorean: a reasoner for fuzzy OWL 1.1, In: Proceedings of 4th International Workshop on Uncertainty
Reasoning for the Semantic Web (URSW 2008), 2008, pp. 35-44.
20. F.N Natalya, LM Deborah, Ontology development 101: a guide to creating your first ontology.
http://protege.stanford.edu/publications/ontology_development/ontology101-noy-mcguinness.htm
21. H. Gao, J. Zhao, Q. Yin, J. Wang, Ontology-based enterprise information retrieval model, IEEE International Conference on Grey Systems and
Intelligent Services, 2009, pp. 1326-1330.
22. H. Cunningham, Y. Wilks, R. J. Gaizauskas, GATE, a General Architecture for Text Engineering. Computers and humanities (2002), 1057-1060.
23. J. Lakshmipathi, T. Chithralekha, VIHARI: An Ontology Sevice Driven Multi-Agent System for Air Ticket Booking, in: Proceedings of Advanced
Computing and Communications, 2007, pp. 675-680.
24. J. Zhai, Q. Wang, M. Lv, Application of Fuzzy Ontology Framework to Information Retrieval for SCM, In: Proceedings of International Symposiums
on Information Processing (ISIP), 2008, pp. 173-177
25. J. Zhai, L. Shen,Y. Liang, J. Jiang, Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce, In: Proceedings of International
Symposium on Electronic Commerce and Security, 2008, pp. 221-225.
26. J. Zhai, M. Lv, J. Li, Q. Wang, Knowledge modeling for fuzzy systems based on ontology, In: Proceedings of Control and Decision Conference, 2008,
pp. 3393-3397.
27. J.J. Jung, Exploiting multi-agent platform for indirect alignment between multilingual ontologies: A case study on tourism business, Expert Systems
with Applications 38 (2011), 5774-5780.
28. J.M Mendel, R.I. John, F. Liu, Interval Type-2 Fuzzy Logic Systems Made Simple, IEEE Transactions on Fuzzy Systems 14 (2006) 808-821.
29. J.R. Chen, S.R. Wolfe, S.D. Wragg, A distributed multi-agent system for collaborative information management and sharing, in: Proceedings of the
ninth international conference on Information and knowledge management, 2000, pp.382-388.
30. J.M. Mendel, Advances in type-2 fuzzy sets and systems, Information Sciences 177 (2007) 84-110
31. J. Lee, K. Whang, Secure query processing against encrypted XML data using Query-Aware Decryption, Information Sciences, 176 (2006) 1928-
1947
32. J.E Bouhdidi, M. Ghailani, O. Abdoun and A. Fennan, A New Approach based on a Multi-ontologies and Multi-agents System to Generate
Customized Learning Paths in an E-Learning Platform, International Journal of Computer Applications, 12(2010), 1-6.
33. K. Sim, P.Wong, Toward agency and ontology for web-based information retrieval, IEEE Transactions on Systems, Man, and Cybernetics, Part C:
Applications and Reviews, 34(2004), 257-269.
34. L.A. Zadeh, Fuzzy Sets, Information Control 8 (1965) 338-353.
35. M.S. Kim, K.Y. Whang, J.G. Lee, and M.J. Lee, n-Gram/2 L: A Space and Time Efficient Two-Level n-Gram Inverted Index Structure, in VLDB,
Trondheim (2005) 325-336.
36. M. Cremonini, S. De Capitani di Vimercati, E. Damiani, P.Samarati, An XML-based approach to combine firewalls and web services security
specifications, XML Security (2003) 69-78
37. M.H. Wang, C.S. Lee, K.L. Hsieh, C.Y Hsu, G. Acampora, C.C Chang , Ontology-based multi-agents for intelligent healthcare applications, Journal of
Ambient Intelligence and Humanized Computing, 1(2010), 1-21.
38. N.F. Noy, D.L. McGuinness, Ontology Development 101: A Guide to Creating Your First Ontology, Stanford Knowledge Systems Laboratory
Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report, 2001, SMI-2001-0880.
39. N. Shadbolt, W. Hall, T.B. Lee, The semantic web revisited, Journal of Intelligent System 21(2006) 96–101.
ST2FO-MAS to automate personlized
40. N.N. Karnik, J.M. Mendel, Operations on type-2 fuzzy sets, Fuzzy Sets and Systems 122, (2001) pp 327-348. 29
itinerary
30. References
41. P. Yan, Y. Zhao, C. Sanxing, and Ontology-Based Information Content Security Analysis, In: Proceedings of Fifth International
Conference on Fuzzy Systems and Knowledge Discovery, 2008, pp. 479-483.
42. P.D Meo, A. Garro, G. Terracina, D. Ursino, Personalizing learning programs with X-Learn, an XML-based, 'user-device' adaptive
multi-agent system, Information Sciences 177(2007) 1729-1770.
43. Q.T Tho, S.C Hui, A.C. Fong, T.H Cao, Automatic fuzzy ontology generation for semantic Web, IEEE Transactions on Knowledge
and Data Engineering 18 (2006) 842-856.
44. Q. Guo, M. Zhang, A novel approach for multi-agent-based Intelligent Manufacturing System, Information Sciences 179 (2009)
3079-3090.
45. R.M Sachs, D.W Brown, J. DeLong, A first step on the path to automated flight reservations , In: Proceeding of Third IEEE
Workshop on Interactive Voice Technology for Telecommunications Applications,1996, pp. 61-64
46. R. Azevedo, E. Dantas, F. Freitas, C. Rodrigues, M.J. Almeida, W. Veras, R. Santosyi, An Autonomic Ontology-Based Multiagent
System for Intrusion Detection in Computing Environments, International Journal for Infonomics (IJI) 3 (2011) 182 – 189.
47. R. Subhashini, V.J.S Kumar, Shallow NLP techniques for noun phrase extraction, In: Proceeding of Trendz in Information Sciences
& Computing (TISC), 2010 , pp.73-77.
48. S. Nasrolahi, M. Nikdast, M. Boroujerdi, The semantic web: a new approach for future world wide web, In: Proceedings of
World Academy of Science, Engineering and Technology, 2009, pp. 1149-1154
49. S. Yi, Z. Dezheng, C. Li, Fuzzy ontology constructing and its application in traditional Chinese medicine, In: Proceedings
of International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2010 pp. 592-595
50. S. Bechhofer, F.V Harmelen, J. Hendler, I. Horrocks,D.L McGuinness, P.F Patel-Schneider,L.A Stein, OWL Web Ontology Language
Reference, 2004, W3C Recommendation http ://www.w3.org/TR/owl-ref.
51. S. Beji, N. Kadhi, Security Ontology Proposal for Mobile Applications, In: Proceedings of Tenth International Conference
on Mobile Data Management: Systems, Services and Middleware, 2009, pp. 580-587.
52. S. Yang, L. Szu-Yin, L. Shih-Neng, S. Cheng, and V. Soo, An ontology-based multi-agent platform for patent knowledge
management, International Journal of Electronic Business Management, 3(2005), 181-192
53. W. Ying, J.S. Wimalasiri, P. Ray, S. Chattopadhyay and C. S. Wilson, An ontology driven Multiagent approach to integrated e-
Health systems, International Journal of E-Health and Medical Communications, 1(2010), 28-40
ST2FO-MAS to automate personlized
30
itinerary
31. Many Thanks for your Kind attention!
ST2FO-MAS to automate personlized
31
itinerary