Type 2 fuzzy ontology ahmadchan


Published on

A smart coupling of type-2 fuzzy ontology (T2FO) with a multi-agent
system: A novel mechanism to automate the personalized itinerary

Published in: Education, Technology
1 Comment
1 Like
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Type 2 fuzzy ontology ahmadchan

  1. 1. A smart coupling of type-2 fuzzy ontology (T2FO) with a multi-agentsystem: A novel mechanism to automate the personalized itinerary Student Name: Syed Ahmad Chan Bukhari Student Id: 2010214029 Lab: Artificial Intelligence Lab Supervised by: Prof. Yong-Gi Kim Department of Computer Science, Gyeongsang National University, Jinju Korea 1
  2. 2. Contents• Background and motivation• Past research work• Proposed solution• ST2FO-MAS to automate personalized Itinerary (Problem Intro.)• Secure Type-2 Fuzzy Ontology – Secure Type-2 Fuzzy Ontology (A quick review of terminologies) – Type-1 Fuzzy system – Type-2 Fuzzy system• Secure Type-2 Fuzzy Ontology Development – Crisp ontology development – Type-1 Fuzzy ontology Development – Type-2 Fuzzy ontology development• Multi-Agent System – Terminology, Role, Integration and usage – Architecture and working• Architecture of STFO-MAS and its Application to automate the personalized itinerary – inside decision supported multi-agent pool – Inside the Natural language query processing• Experiments and results – Ontology Evaluation – Overall system evaluation – Extracted results – Graphical efficiency comparison ST2FO-MAS to automate personlized 2 itinerary
  3. 3. Background and Motivation• As the internet grows rapidly, millions of web pages are being added on a daily basis• Personalized information extraction and intelligent decision making on it behalf are challenging issues nowadays• Explosive internet heterogeneity making relevant Info. Extraction and intelligent decision making more challenging• Search engines are used commonly to find information• Conventional mechanism of searching: keywords and directory structure• Most of the data on internet is in imprecise, uncertain• Optimal searching not possible by using conventional ways• Currently users spend hours and hours to find desired information from internet• Any solution? ST2FO-MAS to automate personlized 3 itinerary
  4. 4. Past research work Researchers Research area/ Domain Year Tools and technologiesYi et al. To represent the Chinese medicines 2010 Ontology, Fuzzy systemZhai et al. SCM 2009 OntologyA. Segev et al. Patent search 2010 OntologyHuiying et al. Enterprise information-retrieval model 2009 NLP, Ontology, AINoy et al. FOGA 2001 Fuzzy system, ANN, OntologyZhai et al. E-commerce domain 2008 Fuzzy Ontologyhang Shing et al. Diet recommendations for diabetic patient 2011 FML, ONTOLOGYC.S. Lee To present the computer Go knowledge 2010 Fuzzy system, ontologyWang, M et al. Automate meetings scheduling 2010 FNL, Ontology, AIJaber et al. Customized learning paths in an e-learning platform 2010 MAS, OntologyS. Yang E-health 2010 MAS, OntologySzu-Yin, L et al. Corporate tacit knowledge 2005 Ontology, AIJung et al. Indirect alignment between multiple language ontologies. 2011 MAS, Ontology, AI ST2FO-MAS to automate personlized 4 itinerary
  5. 5. Proposed solution• Researchers proposed several solution but mostly failed with time, due to diverse and fatally vague nature of web data• Some solutions found working but with low precision rate and with high cost• We provide an end-to-end solution to automate the optimal information extraction and decision making• Our system based on: Secure Type-2 Fuzzy Ontology MAS – Why Type-2 fuzzy system used? – Why incorporated Type-2 fuzzy system with ontology? – Why information security important? – What is Ontology and how can we exploit it? – What is the co-relation of MAS, NLP with T2FO and optimal information extraction and decision making?• Domain of application: Personalized itinerary booking (Why use this domain???) ST2FO-MAS to automate personlized 5 itinerary
  6. 6. ST2FO-MAS to automate personalized Itinerary (Problem Intro.)• Manual air ticket booking : time consuming and laborious• Easiness of web technology provides opportunity to travel companies to online their portals• Thousands of solutions available now• Passengers spend hours to find acceptable fare• Travelers are anxiously waiting for solution with personalized outcomes Problems Proposed Solution Intensively blurred information Type-2 Fuzzy system Scattered information resources  T2FO and MAS Personalized constraints Type-2 Fuzzy ontology Tour’s operator limitations Information security based on XML Increasing Information security challenges (hacking risks) Type-2 Fuzzy Ontology Limitation of Fuzzy Information NLP acquisition techniques MAS,NLP and T2FO Usability issues Ontology with MAS Process Automation ST2FO-MAS to automate personlized 6 itinerary
  7. 7. Secure Type-2 Fuzzy Ontology A quick review of terminologiesOntology:The term ontology has its origin in philosophy and has been applied in many different ways.1. “An ontology formally represents knowledge as a set of concepts within a domain, and the relationships between those concepts.”2. “Formal, explicit specification of a shared conceptualization“ Main Components of OntologyIndividuals: instances or objects (the basic or "ground level" objects)Classes: sets, collections, concepts, types of objects, or kinds of things.Attributes: aspects, properties, features, characteristics, or parameters that objects (and classes) can haveRelations: ways in which classes and individuals can be related to one another ST2FO-MAS to automate personlized 7 itinerary
  8. 8. Secure Type-2 Fuzzy Ontology (A quick review of terminologies)Common definitions and concepts about type-1 Fuzzy set and type-2Type-1 Fuzzy system• The fuzzy set theory was introduced by Lotfi Zadeh in 1965 to deal with vagueand imprecise concepts.• In classical set theory, elements either belong to a particular set or they don’tbelong.• However, in fuzzy set theory the association of an element with a particular setlies between ‘0’ and ‘1’ which is called degree of association or membershipdegree. A fuzzy set can be defined as:Definition 1: A fuzzy set ‘s’ over universe of discourse ‘X’ can be defined by itsmembership function µ_s which maps element ‘x’ to values between [0,1]. ST2FO-MAS to automate personlized 8 itinerary
  9. 9. Secure Type-2 Fuzzy Ontology (A quick review of terminologies)Type-2 Fuzzy System• Type-1 or conventional fuzzy logic can handle the uncertainty at certain level. Some Fact• vagueness are the vital parts of any real-time system• Uncertainty and vagueness is increasing continuously due to heterogeneity. How to handle the extensive blurred information?Solution: Type-2 Fuzzy logic• Type-2 fuzzy logic is the extended version of classical fuzzy set theory.• In type-1 fuzzy set theory, the membership values are crisp, while type-2 fuzzy systems have fuzzy membership values. 9
  10. 10. Secure Type-2 Fuzzy Ontology (Ontology Development)OUR Proposed formation of Type-2 Fuzzy Ontology Building ST2FO-MAS to automate personlized 10 itinerary
  11. 11. Development of Secure type-2 fuzzy ontology The anatomy of Type-2 Secured Fuzzy Ontology (LayeredDomain Ontology Development steps Architecture) 1. Determine the domain and scope of the ontology. 2. Consider reusing existing ontologies. 3. Enumerate important terms in the ontology. 4. Define the classes and the class hierarchy. 5. Define the properties of the classes. 6. Define the facets of the slots. 7. Create instances.Language: OWL-2 , RDF and ProtégéReasoner: Pellet, DeLorean ST2FO-MAS to automate personlized 11 itinerary
  12. 12. Development of Secure type-2 fuzzy ontology• Fuzzy ontology can be defined in the form of fuzzy sets.• Let be fuzzy class in universe of discourse µ then and the relationship between two ontology classes are fuzzy relation• Annotation feature of protégé is used to define fuzzy concept in fuzzy ontology• Manual process of annotation adding is a complex and error pruning• Protégé fuzzy OWL tab helps us to make this process handy• A class of cheap ticket can be described in to fuzzy form as:•Similarly very cheap ticket can be expressed as: 12
  13. 13. Development of Secure type-2 fuzzy ontology 13Secure Type-2 Fuzzy Ontology of Ticket Booking Domain
  14. 14. Secure Type-2 Fuzzy Ontology (Information security)Why information security important?• Information is the most valuable assets of any organization.• Nowadays, secure information has become a strategic issue for onlinebusinesses.• In ontology, all kind of information is shared in plain text format.• This raises the issues of information leakage, altering and deletion ofinformation contentsPossible Information security Challenges• DOS attack on server• XML content exploit attack (data holders: CDATA,PCDATA, NUMBER)• X-Path altering attack (also known as XML bomb) Light Weight solution for content security• XML security recommendations developed by W3C •XML digital signature • XML encryption • XML key management specification (XKMS) •security assertion markup language • XML access control markup language XACML) 14
  15. 15. Secure Type-2 Fuzzy Ontology (Information security: Application scheme)<? XML version="1.0"?><! DOCTYPE Ontology [<! ENTITY xsd "http://www.w3.org/2001/XMLSchema#" > ]><owlx:Ontology owlx:name="http://www.ailab.gnu.ac.kr/t2fo"xmlns:owlx="http://www.w3.org/2003/05/owl-xml"> <CustomerInfo xmlns=http://www.ailab.gnu.ac.kr/st2fo-mas/person_ontology> <Name>ahmad chan</Name><EncryptedData Type=http://www.w3.org/2001/04/xmlenc#Element xmlns=http://www.w3.org/2001/04/xmlenc#> <EncryptionMethod Algorithm=http://www.w3.org/2001/04/xmlenc#tripledes-cbc/><KeyInfo xmlns=http://www.w3.org/2000/09/xmldsig#> <EncryptedKey xmlns=http://www.w3.org/2001/04/xmlenc#> <EncryptionMethod Algorithm=http://www.w3.org/2001/04/xmlenc#rsa-1_5/><KeyInfo xmlns=http://www.w3.org/2000/09/xmldsig#> <KeyName>white tiger</KeyName></KeyInfo><CipherData> <CipherValue>vHE@#$&&JUIOFdefghj...</CipherValue></CipherData></EncryptedKey></KeyInfo><CipherData> <CipherValue>yyFE%!JJNIcflijnvcthsdrtg...</CipherValue></CipherData></EncryptedData></CustomerInfo></owlx:Ontology> ST2FO-MAS to automate personlized 15 itinerary
  16. 16. Multi-agent system ( Terminology, Role, Integration and usage)• Diversity and complexity factors are increasing day by day in modern software applications.• The multi-Agent system is considered an efficient technology in the development of distributed systems.• A multi-Agent system is basically the group of interconnected agents, in which each agent works autonomously while sharing information.• An agent is a bunch of code which is designed to perform a specific task on the behalf of its user.Why we used MAS? Our domain is diverse Complex and unstructured For automatic information extraction For intelligent decision making ST2FO-MAS to automate personlized 16 itinerary
  17. 17. Multi-agent system ( Architecture and working) ST2FO-MAS to automate personlized 17 itinerary
  18. 18. A graphical architecture of STFO-MAS and its Application to automate thepersonalized itinerary 2 3 1 4 5 6 7 8 18
  19. 19. Whats inside decision supported multi-agent pool? Agent Name Agent Acronym Funcationality Query Processing Agent QPA  Natural language to query building  Query Processing  Query Optimization Personal Preferences and PPSA  Interaction with personal ontology Schedule Maintaining Agent  Communication with other agents to rovide the personal preferences information  Monitoring the information process and implementations of user constraints. Type-2 Fuzzy Inference T2FIA  Crtical decision making based on information Engine Agent  Remain in touch all the time with PPSA and SBTA  Responsible for making underlying connection with fuzzy ontology Secured Bank Transaction SBTA  Receiving requests for transaction. Agent  Authentication  Resorce allocation  Transaction processing  Log generation Ticket reservation Agent TRA  Making connection with travel agency databases  Finding and reserving of the optimal ticket  Keep in touch with T2FIA AND PPSA Multi-agent system schema ST2FO-MAS to automate personlized 19 itinerary
  20. 20. Whats Inside the Natural language query processing agent (QPA)?I(noun) want to(preposition) go(verb)from(preposition) Seoul(noun) toLondon(noun) to attend(preposition) ameeting(verb) . The meeting will beheld afternoon (noun, adjective), so Iwant to take (verb) vegetables (noun)in lunch (noun). Please book (verb) aticket (noun) of economy class (noun+adjective) with cheap rate (noun+adjective) and minimum delay (noun+adjective).” ST2FO-MAS to automate personlized 20 itinerary
  21. 21. Experiments and resultsOntology Evaluation • We evaluated the ontology after completion of each phase of T2FO development to measure the efficiency •We used Manchester OWL-2 syntax of DL-query to evaluate the efficiency of ontology Some queries results are: ST2FO-MAS to automate personlized 21 itinerary
  22. 22. Experiments and results System security Evaluator ST2FO-MAS to automate personlized 22 itinerary
  23. 23. Experiments and results Overall system evaluation•Information system can be categorized on the basis ofits effectiveness.•There are some known ways to define the efficiency of aninformation system, such as the precision, recall and time• To exact judge the performance, we requested five volunteer tohelp us in experiments.•The volunteers enquired from the system by using crisp ontologyand Type-2 fuzzy ontology.• we noted the time, precision and recall in each mode• Mathematically, the precision and recall can be expressed as the following:here ‘ce’ is the total number of records that are extracted from the internet,and ‘te’ and ‘fe’ represent the true and false elements in the extracted records. ST2FO-MAS to automate personlized 23 itinerary
  24. 24. Experiments and results (Extracted results) Overall system performance results recoded in the case of the secured type-1 fuzzy ontology. Total Number of No of False Precision Recall Job Number of True Elements (fe) Percentage Percentage Completion Resource Elements (te) (PP) (%) (RC) (%) Time (JCT) Extracted (Seconds) Corpus 1 (ce) Volunteer 1 569 191 378 61.1 74.8 180 Volunteer 2 479 146 333 58.9 76.6 234 Volunteer 3 587 275 312 58.1 68.1 156 Volunteer 4 389 87 302 94.8 81.8 132 Volunteer 5 495 198 297 62.5 71.5 210 Overall system performance results recoded in the case of the secured type-1 fuzzy ontology. Total Number Number of No of False Precision Recall Job Completion of Resource True Elements Elements (fe) Percentage (PP) Percentage (RC) Time (JCT) Extracted (te) (%) (%) (Seconds) Corpus 1 (ce) Volunteer 1 569 311 258 68.8 71.2 228 Volunteer 2 479 292 187 71.9 67.3 258 Volunteer 3 587 496 91 86.5 54.2 286 Volunteer 4 389 278 111 77.9 58.3 305 Volunteer 5 495 267 228 68.5 64.9 315 ST2FO-MAS to automate personlized 24 itinerary
  25. 25. Experiments and results Overall system performance results recoded in the case of the secured type-2 fuzzy ontology. Total Number of No of False Precision Recall Job Number of True Elements (fe) Percentage Percentage Completion Resource Elements (te) (PR) (%) (RC) (%) Time (JCT) Extracted (Seconds) Corpus 1 (ce) Volunteer 1 569 437 159 78.2 56.5 336 Volunteer 2 479 337 142 77.2 58.8 319 Volunteer 3 587 530 57 91.1 52.55 422 Volunteer 4 389 279 110 77.9 58.23 357 Volunteer 5 495 391 104 82.6 55.3 467 ST2FO-MAS to automate personlized 25 itinerary
  26. 26. Experiments and results (Efficiency Comparison) Crisp ontology Case Fuzzy ontology Case ST2FO-MAS to automate personlized 26 itinerary
  27. 27. Experiments and results (Efficiency Comparison) Type-2 Fuzzy ontology Case Combine Efficiency Analysis ST2FO-MAS to automate personlized 27 itinerary
  28. 28. References1. A. Segev, J. Kantola, Patent Search Decision Support Service, In: Proceedings of Seventh International Conference on Information Technology, 2010, pp. 568-573.2. A. Vorobiev, J. Han, Security Attack Ontology for Web Services, Semantics, In: Proceedings of Second International Conference on Knowledge and Grid, 2006, pp. 42-49.3. A.C. Bukhari, Y.G Kim, Exploiting the Heavyweight Ontology with Multi-Agent System Using Vocal Command System: A Case Study on E-Mall, International Journal of Advancements in Computing Technology 3(2011) 233-241.4. A.C. Bukhari, Y.G Kim, Ontology-assisted automatic precise information extractor for visually impaired inhabitants, Artificial Intelligence Review (2005) Issn: 0269-2821.5. C. Lee, M. Wang, H. Hagras, A Type-2 Fuzzy Ontology and Its Application to Personal Diabetic-Diet Recommendation, IEEE Transactions on Fuzzy Systems 18 (2010), pp. 374-3956. C. Lee, M. Wang, M. Wu, C. Hsu; Y. Lin, S. Yen , A type-2 fuzzy personal ontology for meeting scheduling system, In: Proceeding of International Conference on Fuzzy Systems, 2010 , pp. 1-87. C.J Su, C.Y Wu, JADE implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring , Applied Soft Computing Journal 11 (2011), 315-325.8. C.I. Nyulas, M.J. OConnor, S.W. Tu, D.L. Buckeridge, A. Okhmatovskaia, M.A. Musen, An Ontology-Driven Framework for Deploying JADE Agent Systems, IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008, pp. 573-577.9. C. Lee, C. Jiang, T. Hsieh, A genetic fuzzy agent using ontology model for meeting scheduling system, Information Sciences 176 (2006) 1131-115510. C. Lee, M. Wang, G. Acampora, C. Hsu, and H. Hagras, Diet assessment based on type-2 fuzzy ontology and fuzzy markup language, Int. J. Intell. Syst., 25 (2010) 1187-1216.11. C. S. Lee, M. H. Wang. Z. R. Yang, Y. J. Chen, H. Doghmen, and O. Teytaud, FML-based type-2 fuzzy ontology for computer Go knowledge representation, In: Proceeding of International Conference on System Science and Engineering (ICSSE 2010), 2010, pp. 63-68.12. C.D. Maio,G. Fenza, V. Loia, S. Senatore , Towards an automatic fuzzy ontology generation," In: Proceedings of IEEE International Conference on fuzzy system,2009, pp.1044-1049.13. C.D. Maio,G. Fenza, V. Loia, S. Senatore, Hierarchical web resources retrieval by exploiting Fuzzy Formal Concept Analysis, Information Processing & Management Available online 26 May 2011, ISSN 0306-4573.14. D.H. Fudholi, N. Maneerat, R. Varakulsiripunth, Y. Kato, Application of Protégé, SWRL and SQWRL in fuzzy ontology-based menu recommendation, International Symposium on Intelligent Signal Processing and Communication Systems, 2009, pp. 631-634.15. D.Wu, J.M. Mendel, Uncertainty measures for interval type-2 fuzzy sets, Information Sciences, 177 (2007) 5378-5393.16. E. Gatial, Z. Balogh, M. Ciglan, L. Hluchy, Focused web crawling mechanism based on page relevance, In: Proceedings of (ITAT 2005) information technologies applications and theory, 2005, pp. 41–4517. F. Abdoli, M. Kahani, Ontology-based distributed intrusion detection system,In: Proceedings of 14th International Computer Conference, 2009, pp. 65- 70. ST2FO-MAS to automate personlized 28 itinerary
  29. 29. References18. F. Bobillo, U. Straccia, Fuzzy Ontology Representation using OWL 2, International Journal of Approximate Reasoning (2011) 1-36.19. F. Bobillo, M. Delgado, J. Gomez-Romero, DeLorean: a reasoner for fuzzy OWL 1.1, In: Proceedings of 4th International Workshop on Uncertainty Reasoning for the Semantic Web (URSW 2008), 2008, pp. 35-44.20. F.N Natalya, LM Deborah, Ontology development 101: a guide to creating your first ontology. http://protege.stanford.edu/publications/ontology_development/ontology101-noy-mcguinness.htm21. H. Gao, J. Zhao, Q. Yin, J. Wang, Ontology-based enterprise information retrieval model, IEEE International Conference on Grey Systems and Intelligent Services, 2009, pp. 1326-1330.22. H. Cunningham, Y. Wilks, R. J. Gaizauskas, GATE, a General Architecture for Text Engineering. Computers and humanities (2002), 1057-1060.23. J. Lakshmipathi, T. Chithralekha, VIHARI: An Ontology Sevice Driven Multi-Agent System for Air Ticket Booking, in: Proceedings of Advanced Computing and Communications, 2007, pp. 675-680.24. J. Zhai, Q. Wang, M. Lv, Application of Fuzzy Ontology Framework to Information Retrieval for SCM, In: Proceedings of International Symposiums on Information Processing (ISIP), 2008, pp. 173-17725. J. Zhai, L. Shen,Y. Liang, J. Jiang, Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce, In: Proceedings of International Symposium on Electronic Commerce and Security, 2008, pp. 221-225.26. J. Zhai, M. Lv, J. Li, Q. Wang, Knowledge modeling for fuzzy systems based on ontology, In: Proceedings of Control and Decision Conference, 2008, pp. 3393-3397.27. J.J. Jung, Exploiting multi-agent platform for indirect alignment between multilingual ontologies: A case study on tourism business, Expert Systems with Applications 38 (2011), 5774-5780.28. J.M Mendel, R.I. John, F. Liu, Interval Type-2 Fuzzy Logic Systems Made Simple, IEEE Transactions on Fuzzy Systems 14 (2006) 808-821.29. J.R. Chen, S.R. Wolfe, S.D. Wragg, A distributed multi-agent system for collaborative information management and sharing, in: Proceedings of the ninth international conference on Information and knowledge management, 2000, pp.382-388.30. J.M. Mendel, Advances in type-2 fuzzy sets and systems, Information Sciences 177 (2007) 84-11031. J. Lee, K. Whang, Secure query processing against encrypted XML data using Query-Aware Decryption, Information Sciences, 176 (2006) 1928- 194732. J.E Bouhdidi, M. Ghailani, O. Abdoun and A. Fennan, A New Approach based on a Multi-ontologies and Multi-agents System to Generate Customized Learning Paths in an E-Learning Platform, International Journal of Computer Applications, 12(2010), 1-6.33. K. Sim, P.Wong, Toward agency and ontology for web-based information retrieval, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 34(2004), 257-269.34. L.A. Zadeh, Fuzzy Sets, Information Control 8 (1965) 338-353.35. M.S. Kim, K.Y. Whang, J.G. Lee, and M.J. Lee, n-Gram/2 L: A Space and Time Efficient Two-Level n-Gram Inverted Index Structure, in VLDB, Trondheim (2005) 325-336.36. M. Cremonini, S. De Capitani di Vimercati, E. Damiani, P.Samarati, An XML-based approach to combine firewalls and web services security specifications, XML Security (2003) 69-7837. M.H. Wang, C.S. Lee, K.L. Hsieh, C.Y Hsu, G. Acampora, C.C Chang , Ontology-based multi-agents for intelligent healthcare applications, Journal of Ambient Intelligence and Humanized Computing, 1(2010), 1-21.38. N.F. Noy, D.L. McGuinness, Ontology Development 101: A Guide to Creating Your First Ontology, Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report, 2001, SMI-2001-0880.39. N. Shadbolt, W. Hall, T.B. Lee, The semantic web revisited, Journal of Intelligent System 21(2006) 96–101. ST2FO-MAS to automate personlized40. N.N. Karnik, J.M. Mendel, Operations on type-2 fuzzy sets, Fuzzy Sets and Systems 122, (2001) pp 327-348. 29 itinerary
  30. 30. References 41. P. Yan, Y. Zhao, C. Sanxing, and Ontology-Based Information Content Security Analysis, In: Proceedings of Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008, pp. 479-483. 42. P.D Meo, A. Garro, G. Terracina, D. Ursino, Personalizing learning programs with X-Learn, an XML-based, user-device adaptive multi-agent system, Information Sciences 177(2007) 1729-1770. 43. Q.T Tho, S.C Hui, A.C. Fong, T.H Cao, Automatic fuzzy ontology generation for semantic Web, IEEE Transactions on Knowledge and Data Engineering 18 (2006) 842-856. 44. Q. Guo, M. Zhang, A novel approach for multi-agent-based Intelligent Manufacturing System, Information Sciences 179 (2009) 3079-3090. 45. R.M Sachs, D.W Brown, J. DeLong, A first step on the path to automated flight reservations , In: Proceeding of Third IEEE Workshop on Interactive Voice Technology for Telecommunications Applications,1996, pp. 61-64 46. R. Azevedo, E. Dantas, F. Freitas, C. Rodrigues, M.J. Almeida, W. Veras, R. Santosyi, An Autonomic Ontology-Based Multiagent System for Intrusion Detection in Computing Environments, International Journal for Infonomics (IJI) 3 (2011) 182 – 189. 47. R. Subhashini, V.J.S Kumar, Shallow NLP techniques for noun phrase extraction, In: Proceeding of Trendz in Information Sciences & Computing (TISC), 2010 , pp.73-77. 48. S. Nasrolahi, M. Nikdast, M. Boroujerdi, The semantic web: a new approach for future world wide web, In: Proceedings of World Academy of Science, Engineering and Technology, 2009, pp. 1149-1154 49. S. Yi, Z. Dezheng, C. Li, Fuzzy ontology constructing and its application in traditional Chinese medicine, In: Proceedings of International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2010 pp. 592-595 50. S. Bechhofer, F.V Harmelen, J. Hendler, I. Horrocks,D.L McGuinness, P.F Patel-Schneider,L.A Stein, OWL Web Ontology Language Reference, 2004, W3C Recommendation http ://www.w3.org/TR/owl-ref. 51. S. Beji, N. Kadhi, Security Ontology Proposal for Mobile Applications, In: Proceedings of Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 2009, pp. 580-587. 52. S. Yang, L. Szu-Yin, L. Shih-Neng, S. Cheng, and V. Soo, An ontology-based multi-agent platform for patent knowledge management, International Journal of Electronic Business Management, 3(2005), 181-192 53. W. Ying, J.S. Wimalasiri, P. Ray, S. Chattopadhyay and C. S. Wilson, An ontology driven Multiagent approach to integrated e- Health systems, International Journal of E-Health and Medical Communications, 1(2010), 28-40 ST2FO-MAS to automate personlized 30 itinerary
  31. 31. Many Thanks for your Kind attention! ST2FO-MAS to automate personlized 31 itinerary