SlideShare a Scribd company logo
1 of 35
Contents

Background and motivation
Past research work
Proposed solution
ST2FO-MAS to automate personalized Itinerary
(Problem Intro.)
Secure Type-2 Fuzzy Ontology
Secure Type-2 Fuzzy Ontology (A quick review of
terminologies)
Type-1 Fuzzy system
Type-2 Fuzzy system
Secure Type-2 Fuzzy Ontology Development
Crisp ontology development
Type-1 Fuzzy ontology Development
Type-2 Fuzzy ontology development
                                                  2
Multi-Agent System
Related Publications

1. Ahmad C. Bukhari, Yong-Gi Kim, “Integration of Secure Type-2 Fuzzy Ontology with Multi-
agent Platform: A proposal to automate the Personalized Flight Ticket Booking Domain ”
Journal of Information sciences (SCI Index) Impact factor 2.9 For Tracking :
http://dx.doi.org/10.1016/j.ins.2012.02.036

2. Ahmad C. Bukhari ,Yong-Gi Kim, “Ontology-assisted automatic precise information extractor
for visually impaired inhabitant” Journal of Artificial Intelligence Review 2011
http://dx.doi.org/10.1007/s10462-011-9238-6 (SCI index)

 3. Ahmad C. Bukhari , Yong-Gi Kim, "Exploiting the Heavyweight Ontology with Multi -Agent
System Using Vocal Command System: A Case Study on E-Mall", IJACT : International
Journal of Advancements in Computing Technology, Vol. 3, No. 6, pp. 233 ~ 241, 2011
(SCIE, Scopus Index)

4. Ahmad C. Bukhari, Yong-Gi Kim, “Incorporation of Fuzzy Theory with Heavyweight Ontology
and Its Application on Vague Information Retrieval For Decision Making” International
Journal of Fuzzy Logic and Intelligent System, vol.11, no.3, September 2011, pp, 171-17
Http://dx.doi.org/10.5391/IJFIS.2011.11.3.171 (KISTI, ACOMS, SCIE Index)




                                                                                             3
Background and Motivation

As the internet grows rapidly, millions of WebPages are being
added on a daily basis
Personalized information extraction and intelligent decision
making on it behalf are becoming challenging issues
Explosive internet heterogeneity makes the relevant Info.
extraction and intelligent decision making more tricky
Search engines are used commonly to find information
Conventional mechanism of searching: keywords and directory
structure
Most of the data on internet is in imprecise and uncertain format
Optimal searching not possible by using conventional ways
Currently users spend hours and hours to find desired
information from internet
Any solution?

                                                                    4
Past research work




                     5
Proposed solution

Researchers proposed several solution but mostly failed with time, due
to diverse and fatally vague nature of web data
Some solutions found working nevertheless with low precision rate and
their performance decreasing drastically
We present an end-to-end solution to automate the optimal information
extraction and decision making
Underlying technologies of our system are: Type-2 Fuzzy Ontology,
MAS, NLP, Info. Security
Why we use type-2 fuzzy system?
Why we incorporated Type-2 fuzzy system with ontology?
Why the information security is so important?
What is the ontology and how can we exploit it for info. extraction?
What is the relation among MAS, NLP and T2FO to extract the optimal
information and for appropriate and timely decision making?



                                                                     6
ST2FO-MAS to automate personalized Itinerary
      (Ongoing challenges and proposed solutions)




                                                    7
ST2FO-MAS to automate personalized Itinerary (Problem Intro.)


Manual air ticket booking : time consuming and laborious
The domain is rife with uncertainties and with complex linguistic
terminologies
Thousands of solutions available now but mostly work for specific
airlines or for specific routes
Generally, passengers spend hours to find acceptable fare
A complete process (selection, reservation, booking with
transaction) requires full-time use involvement
Travelers are anxiously waiting for automatic solution with
personalized outcomes




                                                                    8
Secure Type-2 Fuzzy Ontology


 A quick review of terminologies
            Ontology:
    An ontology is a branch of
  metaphysics that focuses on the
        study of existence.
    “An ontology is an explicit and
formal specification of a shared
conceptualization of a domain, which
is machine readable and human       9
Secure Type-2 Fuzzy Ontology
Common definitions and(A quick review of terminologies) set and type-2
                       concepts about type-1 Fuzzy
Type-1 Fuzzy system
•  The fuzzy set theory was introduced by Lotfi Zadeh in 1965 to deal with vague
and imprecise concepts.
•   In classical set theory, elements either belong to a particular set or they don’t
belong.
•   However, in fuzzy set theory the association of an element with a particular set
lies between ‘0’ and ‘1’ which is called degree of association or membership
degree. A fuzzy set can be defined as:
Definition 1: A fuzzy set ‘s’ over universe of discourse ‘X’ can be defined by its
membership function µ_s which maps element ‘x’ to values between [0,1].




                                                                                        10
Secure Type-2 Fuzzy Ontology
                            (A quick review of terminologies)
Type-2 Fuzzy System
Type-1 fuzzy system or conventional fuzzy system can handle the uncertainty at
certain level.
Some Fact

vagueness are the vital parts of any real-time system
Uncertainty and vagueness is increasing continuously due to heterogeneity.
How to handle the extensive blurred information?

Solution: Type-2 Fuzzy system
Type-2 fuzzy system is the extended version of classical fuzzy set theory.
In type-1 fuzzy set theory, the membership values are crisp, while type-2 fuzzy
systems have fuzzy membership values.




                                                                            11
Secure Type-2 Fuzzy Ontology
                               (Ontology Development)
Proposed formation of Type-2 Fuzzy Ontology Building




                                                        12
Development of Secure type-2 fuzzy ontology
•   Fuzzy ontology can be defined in the form of fuzzy sets.
•   Let be fuzzy class in universe of discourse µ then


    and the relationship between two ontology classes are fuzzy relation


•   Annotation rule feature of protégé is used to define fuzzy concept in
fuzzy ontology
•   Manual process of annotation adding is a complex and error pruning
•   Protégé fuzzy OWL tab helps us to make this process handy
•   A class of cheap ticket can be described in to fuzzy form as:


•   Similarly very cheap ticket can be expressed as:



                                                                            13
Development of Secure type-2 fuzzy ontology
p Domain Ontology Development steps                      Source: Ahmad C. Bukhari,
                                                         Yong-Gi Kim, “Incorporation
                                                         of Fuzzy Theory with
   1.Determine the domain and scope of the ontology.     Heavyweight Ontology
                                                         and Its Application on Vague
   2.Consider reusing existing ontologies.               Information Retrieval For
                                                         Decision Making”
   3.Enumerate important terms in the ontology.          International
                                                         Journal of Fuzzy Logic and
   4.Define the classes and the class hierarchy.
                                                         Intelligent System, vol.11,
   5.Define the properties of the classes.
                                                         no.3, September 2011, pp,
                                                         171-17
   6.Define the facets of the slots.

   7.Create instances.




Language: OWL-2 , RDF and ProtĂŠgĂŠ
Reasoner: DL-reasoner, Pellet, DeLorean
                                                                               14
Development of Secure type-2 fuzzy ontology




The anatomy of Type-2 Secured Fuzzy Ontology (Layered Architecture)   15
Development of Secure type-2 fuzzy ontology (Internal Schema)
Secure Type-2 Fuzzy Ontology of Ticket Booking Domain




 Source: Ahmad C. Bukhari ,Yong-Gi Kim, “Ontology-assisted automatic precise information extractor   16
 for visually impaired inhabitant” Journal of Artificial Intelligence Review
1
    Development of Secure type-2 fuzzy ontology (Fuzz-owl Plugin) 2




                                           3



                                                         Readers interest
                                                         Source: Ahmad C. Bukhari,
                                                         Yong-Gi Kim, “Incorporation
                                                         of Fuzzy Theory with
                                                         Heavyweight Ontology
                                                         and Its Application on Vague
                                                         Information Retrieval For
                                                         Decision Making”
                                                         International
                                                         Journal of Fuzzy Logic and
                                                         Intelligent System, vol.11,
                                                         no.3, September 2011, pp,
                                                         171-17


                                                                          17
Secure Type-2 Fuzzy Ontology
    Why information security important? security)
                               (Information
    •   Information is the most valuable assets of any organization.
    •   Nowadays, secure information has become a strategic issue for online businesses.
    •  In ontology, all kind of information is shared in plain text format.
    •  This raises the issues of information leakage, altering and deletion of information contents
    • Information security can be achieved to increase the satisfaction level of authentication,
    authorization, integrity and confidentiality.
    • We used XML security recommendation to achieve this recommendation.


XML security recommendations developed by W3C

•   XML digital signature
•   XML encryption
•   XML key management specification (XKMS)
•   Security assertion markup language (SAML)
•   XML access control markup language (XACML)
  Possible Information security Challenges
•       DOS attack on server
•       XML content exploit attack (data holders: CDATA,PCDATA, NUMBER)
•       X-Path altering attack
                                                                                                      18
Secure Type-2 Fuzzy Ontology
                             (Information security: Application scheme)
<? XML version="1.0"?>
<! DOCTYPE Ontology [
<! ENTITY xsd "http://www.w3.org/2001/XMLSchema#" > ]>
<owlx:Ontology owlx:name="http://www.ailab.gnu.ac.kr/t2fo"
xmlns:owlx="http://www.w3.org/2003/05/owl-xml">
 <CustomerInfo xmlns='http://www.ailab.gnu.ac.kr/st2fo-mas/person_ontology'>
   <Name>ahmad chan</Name>
                                                                                  Public Key encryption algorithm
<EncryptedData Type='http://www.w3.org/2001/04/xmlenc#Element'
      xmlns='http://www.w3.org/2001/04/xmlenc#'>
 <EncryptionMethod Algorithm='http://www.w3.org/2001/04/xmlenc#tripledes-cbc'/>
<KeyInfo xmlns='http://www.w3.org/2000/09/xmldsig#'>
   <EncryptedKey xmlns='http://www.w3.org/2001/04/xmlenc#'>
  <EncryptionMethod Algorithm='http://www.w3.org/2001/04/xmlenc#rsa-1_5'/>
<KeyInfo xmlns='http://www.w3.org/2000/09/xmldsig#'>
  <KeyName>white tiger</KeyName>
</KeyInfo>
<CipherData>                                                                           XML Data level encryption
   <CipherValue>vHE@#$&&JUIOFdefghj...</CipherValue>
</CipherData>
</EncryptedKey>
</KeyInfo>
<CipherData>
  <CipherValue>yyFE%!JJNIcflijnvcthsdrtg...</CipherValue>
</CipherData>
</EncryptedData>
</CustomerInfo>
</owlx:Ontology>



       Code view of W3C XML security recommendations                                                         19
Multi-agent system ( Terminology, Role, Integration and usage)
Diversity and complexity factors are increasing day by day in modern
software applications.
The multi-Agent system is considered an efficient technology in the
development of distributed systems.
A multi-Agent system is basically the group of interconnected agents, in
which each agent works autonomously while sharing information.
An agent is a bunch of code which is designed to perform a specific
task on the behalf of its user.
Why we used MAS?
Our domain was diverse

Complex and unstructured

For automatic information extraction

For intelligent decision making




                                                                               20
A graphical architecture of STFO-MAS and its Application to
                2                     3
automate the personalized itinerary               1   Client GUI Panel

       1                       4
                                                  2 Query Processing Agent

               5
                                                  3   Search engines Pool
                   6


                                                  4   Data Repository

           7
                                                  5 Ontology Bases Crawler
                          8

                                                  6   Type-2 Fuzzy Ontologies


                                                  7   MAS Pool



                                                  8External Data repositories
                                                                       21
What's inside decision supported multi-agent pool?




                        Multi-agent system schema

                                                     22
Multi-agent system
Import Jade.core.agent; //Package Importing                                     ( Algorithm and working)
Public class TicketBookMAS
{
StartupQPA()
{
getInput(){ // taking input from user }
//Intialization stage
g.Action()
{
NLP Processing ();
QueryOptimization();
Webcrawling();
}
R=Get.Result();
mkConnect(IA) // Make connection with inference agent
Start thread 1
Delay 1000 mili second;
Startup IA()
{
Mkconnect(PPRA && QPA);
Inferencing(); //optimal ticket selection based on information provided by QPA
StoreResults();
Start thread 2
Thread1 stop //store information and break the process
Startup (SBTA && TRA)
{
//Initialization of SSL (SECURE SOCKET LAYER)
Autoauthenticate();
Q= resultant input=Optimal ticket;
RequestForReservation(Iternary Number like 152895623462);
//for bank payment , taking user concern first and then sharing bank crediential
through secure XML channel
Reservation Complted; //information displayed and stored and closing all
connection
Terminate thread 1
//Close all processs
}}}                                                                                                        23
Experiments
       What's Inside the query processing agent (QPA)?


de QPA, we perform four steps after receiving natural language query (NLQ) from client


  1.Tokenization
  2.word category disambiguation

  3.shallow parsing process

  4.DL-query generation




       I(noun) want to(preposition) go(verb) from(preposition)
       Seoul(noun) to London(noun) to attend(preposition) a
       meeting(verb) . The meeting will be held afternoon (noun,
       adjective), so I want to take (verb) vegetables (noun) in
       lunch (noun). Please book (verb) a ticket (noun) of
       economy class (noun+ adjective) with cheap rate (noun+
       adjective) and minimum delay (noun+ adjective).”
                                                                                         24
QPA Functionality algorithm

                                            Tokenization

                                           Query processing and optimization




                              Initial data filtration and storage stage




                                         Second Optimization Stage


                                                                           25
Experiments and results
Ontology Evaluation

      • We evaluated the ontology after completion of each phase of T2FO development to
      measure the efficiency
      •We used Manchester OWL-2 syntax of DL-query to evaluate the efficiency of ontology



    Some queries results are:




                                                                          DL-Query




 Ontology Classes

                                                                                      26
                                                                       Possible results
Experiments and results
System security Evaluator
      • We developed a module to evaluate the overall system security.

      • We added the malicious code and to engage the system

      • system generated the beeps and paused all the operation




                                                                         27
Experiments and results
 Overall system evaluation
    •   Information system can be categorized on the basis of its effectiveness.
    •  There are some known ways to define the efficiency of an information
    system, such as the precision (PR), recall(RC) and time
    •  To exact judge the performance, we requested five volunteers to
        help us in experiments.
    •  The volunteers enquired from the system by using crisp ontology, type-1
    fuzzy and Type-2 fuzzy ontology.
    •  we noted the time, precision and recall in each mode.
    •  Mathematically, the precision and recall can be expressed as the following:




 ‘ce’ is the total number of records that are extracted from the internet,
‘te’ and ‘fe’ represent the true and false elements in the extracted records.
                                                                                28
Results (Extracted results)

  Overall system performance results recoded in the case of the secured type-1 fuzzy ontology.




 Overall system performance results recoded in the case of the secured type-1 fuzzy
 ontology.




                                                                                                 29
Results

 Overall system performance results recoded in the case of the secured type-2
 fuzzy ontology.




                                                                                30
Results (Efficiency Comparison)

                                  Crisp ontology Case



                                        Precision




                                  Type-1
                                  Fuzzy ontology Case




                                                    31
Type-2
                           Fuzzy
                           ontology Case




Continuously Precision increasing




                                    32
References
1.A. Segev, J. Kantola, Patent Search Decision Support Service, In: Proceedings of Seventh International Conference on Information Technology, 2010, pp.
568-573.
2.A. Vorobiev, J. Han, Security Attack Ontology for Web Services, Semantics, In: Proceedings of Second International Conference on Knowledge and Grid, 2006,

pp. 42-49.
3.A.C. Bukhari, Y.G Kim, Exploiting the Heavyweight Ontology with Multi-Agent System Using Vocal Command System: A Case Study on E-Mall, International

Journal of Advancements in Computing Technology 3(2011) 233-241.
4.A.C. Bukhari, Y.G Kim, Ontology-assisted automatic precise information extractor for visually impaired inhabitants, Artificial Intelligence Review (2005) Issn:

0269-2821.
5.C. Lee, M. Wang, H. Hagras, A Type-2 Fuzzy Ontology and Its Application to Personal Diabetic-Diet Recommendation, IEEE Transactions on Fuzzy Systems 18

(2010), pp. 374-395
6.C. Lee, M. Wang, M. Wu, C. Hsu; Y. Lin, S. Yen , A type-2 fuzzy personal ontology for meeting scheduling system, In: Proceeding of International Conference

on Fuzzy Systems, 2010 , pp. 1-8
7.C.J Su, C.Y Wu, JADE implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring , Applied Soft Computing

Journal 11 (2011), 315-325.
8.C.I. Nyulas, M.J. O'Connor, S.W. Tu, D.L. Buckeridge, A. Okhmatovskaia, M.A. Musen, An Ontology-Driven Framework for Deploying JADE Agent

Systems, IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008, pp. 573-577.
9.C. Lee, C. Jiang, T. Hsieh, A genetic fuzzy agent using ontology model for meeting scheduling system, Information Sciences 176 (2006) 1131-1155

10.C. Lee, M. Wang, G. Acampora, C. Hsu, and H. Hagras, Diet assessment based on type-2 fuzzy ontology and fuzzy markup language, Int. J. Intell. Syst., 25

(2010) 1187-1216.
11.C. S. Lee, M. H. Wang. Z. R. Yang, Y. J. Chen, H. Doghmen, and O. Teytaud, FML-based type-2 fuzzy ontology for computer Go knowledge representation, In:

Proceeding of International Conference on System Science and Engineering (ICSSE 2010), 2010, pp. 63-68.
12.C.D. Maio,G. Fenza, V. Loia, S. Senatore , Towards an automatic fuzzy ontology generation," In: Proceedings of IEEE International Conference on fuzzy

system,2009, pp.1044-1049.
13.C.D. Maio,G. Fenza, V. Loia, S. Senatore, Hierarchical web resources retrieval by exploiting Fuzzy Formal Concept Analysis, Information Processing &

Management Available online 26 May 2011, ISSN 0306-4573.
14.D.H. Fudholi, N. Maneerat, R. Varakulsiripunth, Y. Kato, Application of ProtĂŠgĂŠ, SWRL and SQWRL in fuzzy ontology-based menu recommendation,

International Symposium on Intelligent Signal Processing and Communication Systems, 2009, pp. 631-634.
15.D.Wu, J.M. Mendel, Uncertainty measures for interval type-2 fuzzy sets, Information Sciences, 177 (2007) 5378-5393.

16.E. Gatial, Z. Balogh, M. Ciglan, L. Hluchy, Focused web crawling mechanism based on page relevance, In: Proceedings of (ITAT 2005) information

technologies applications and theory, 2005, pp. 41–45
17.F. Abdoli, M. Kahani, Ontology-based distributed intrusion detection system,In: Proceedings of 14th International Computer Conference, 2009, pp. 65-70.




                                                                                                                                                          33
References


1.F. Bobillo, U. Straccia, Fuzzy
Ontology Representation using
OWL 2, International Journal of
Approximate Reasoning (2011) 1-
36.
2.F. Bobillo, M. Delgado, J. Gomez-

Romero, DeLorean: a reasoner for
fuzzy OWL 1.1, In: Proceedings of
4th International Workshop on         34
Many Thanks for your Kind attention!




                                       35

More Related Content

What's hot

Neural perceptual model to global local vision for the recognition of the log...
Neural perceptual model to global local vision for the recognition of the log...Neural perceptual model to global local vision for the recognition of the log...
Neural perceptual model to global local vision for the recognition of the log...ijaia
 
Introduction to soft computing
Introduction to soft computingIntroduction to soft computing
Introduction to soft computingAnkush Kumar
 
Hierarchical Temporal Memory: Computing Like the Brain - Matt Taylor, Numenta
Hierarchical Temporal Memory: Computing Like the Brain - Matt Taylor, NumentaHierarchical Temporal Memory: Computing Like the Brain - Matt Taylor, Numenta
Hierarchical Temporal Memory: Computing Like the Brain - Matt Taylor, NumentaWithTheBest
 
Artificial intelligence and cognitive modeling have the same problem chapter2
Artificial intelligence and cognitive modeling have the same problem   chapter2Artificial intelligence and cognitive modeling have the same problem   chapter2
Artificial intelligence and cognitive modeling have the same problem chapter2sabdegul
 
Introduction to soft computing V 1.0
Introduction to soft computing  V 1.0Introduction to soft computing  V 1.0
Introduction to soft computing V 1.0Dr. C.V. Suresh Babu
 
If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48Satria Ady Pradana
 
Technical Paper.doc.doc
Technical Paper.doc.docTechnical Paper.doc.doc
Technical Paper.doc.docbutest
 
syllabus-IS.doc
syllabus-IS.docsyllabus-IS.doc
syllabus-IS.docbutest
 
Artificial intelligent Lec 1-ai-introduction-
Artificial intelligent Lec 1-ai-introduction-Artificial intelligent Lec 1-ai-introduction-
Artificial intelligent Lec 1-ai-introduction-Taymoor Nazmy
 
IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET Journal
 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft ComputingTameem Ahmad
 
Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Oladokun Sulaiman
 
Dodig-Crnkovic-Information and Computation
Dodig-Crnkovic-Information and ComputationDodig-Crnkovic-Information and Computation
Dodig-Crnkovic-Information and ComputationJosĂŠ NafrĂ­a
 
Symbols and Search : What makes a machine intelligent
Symbols and Search : What makes a machine intelligentSymbols and Search : What makes a machine intelligent
Symbols and Search : What makes a machine intelligentAshwin P N
 
Appelbaum beam talk_library_digitalscholarship_final
Appelbaum beam talk_library_digitalscholarship_finalAppelbaum beam talk_library_digitalscholarship_final
Appelbaum beam talk_library_digitalscholarship_finalDukeDigitalScholarship
 
Nevro net call for action en july30th
Nevro net   call for action en july30thNevro net   call for action en july30th
Nevro net call for action en july30thShchoukine Timour
 
Translating natural language competency questions into sparql queries web2013
Translating natural language competency questions into sparql queries   web2013Translating natural language competency questions into sparql queries   web2013
Translating natural language competency questions into sparql queries web2013Leila Zemmouchi-Ghomari
 
Neural networks...
Neural networks...Neural networks...
Neural networks...Molly Chugh
 

What's hot (20)

Neural perceptual model to global local vision for the recognition of the log...
Neural perceptual model to global local vision for the recognition of the log...Neural perceptual model to global local vision for the recognition of the log...
Neural perceptual model to global local vision for the recognition of the log...
 
Introduction to soft computing
Introduction to soft computingIntroduction to soft computing
Introduction to soft computing
 
Hierarchical Temporal Memory: Computing Like the Brain - Matt Taylor, Numenta
Hierarchical Temporal Memory: Computing Like the Brain - Matt Taylor, NumentaHierarchical Temporal Memory: Computing Like the Brain - Matt Taylor, Numenta
Hierarchical Temporal Memory: Computing Like the Brain - Matt Taylor, Numenta
 
Artificial intelligence and cognitive modeling have the same problem chapter2
Artificial intelligence and cognitive modeling have the same problem   chapter2Artificial intelligence and cognitive modeling have the same problem   chapter2
Artificial intelligence and cognitive modeling have the same problem chapter2
 
Introduction to soft computing V 1.0
Introduction to soft computing  V 1.0Introduction to soft computing  V 1.0
Introduction to soft computing V 1.0
 
If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48
 
Soft computing01
Soft computing01Soft computing01
Soft computing01
 
Technical Paper.doc.doc
Technical Paper.doc.docTechnical Paper.doc.doc
Technical Paper.doc.doc
 
syllabus-IS.doc
syllabus-IS.docsyllabus-IS.doc
syllabus-IS.doc
 
Artificial intelligent Lec 1-ai-introduction-
Artificial intelligent Lec 1-ai-introduction-Artificial intelligent Lec 1-ai-introduction-
Artificial intelligent Lec 1-ai-introduction-
 
IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft Computing
 
Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010
 
Dodig-Crnkovic-Information and Computation
Dodig-Crnkovic-Information and ComputationDodig-Crnkovic-Information and Computation
Dodig-Crnkovic-Information and Computation
 
Symbols and Search : What makes a machine intelligent
Symbols and Search : What makes a machine intelligentSymbols and Search : What makes a machine intelligent
Symbols and Search : What makes a machine intelligent
 
01 introduction
01 introduction01 introduction
01 introduction
 
Appelbaum beam talk_library_digitalscholarship_final
Appelbaum beam talk_library_digitalscholarship_finalAppelbaum beam talk_library_digitalscholarship_final
Appelbaum beam talk_library_digitalscholarship_final
 
Nevro net call for action en july30th
Nevro net   call for action en july30thNevro net   call for action en july30th
Nevro net call for action en july30th
 
Translating natural language competency questions into sparql queries web2013
Translating natural language competency questions into sparql queries   web2013Translating natural language competency questions into sparql queries   web2013
Translating natural language competency questions into sparql queries web2013
 
Neural networks...
Neural networks...Neural networks...
Neural networks...
 

Similar to Type-2 Fuzzy Ontology

Recruitment Based On Ontology with Enhanced Security Features
Recruitment Based On Ontology with Enhanced Security FeaturesRecruitment Based On Ontology with Enhanced Security Features
Recruitment Based On Ontology with Enhanced Security Featurestheijes
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentationguestac67362
 
Report on robotic control
Report on robotic controlReport on robotic control
Report on robotic controlAnil Maurya
 
Analytical Review on the Correlation between Ai and Neuroscience
Analytical Review on the Correlation between Ai and NeuroscienceAnalytical Review on the Correlation between Ai and Neuroscience
Analytical Review on the Correlation between Ai and NeuroscienceIOSR Journals
 
Heraclitus II: A Framework for Ontology Management and Evolution
Heraclitus II: A Framework for Ontology Management and EvolutionHeraclitus II: A Framework for Ontology Management and Evolution
Heraclitus II: A Framework for Ontology Management and EvolutionAlexander Mikroyannidis
 
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...
A N  E XTENSION OF  P ROTÉGÉ FOR AN AUTOMA TIC  F UZZY - O NTOLOGY BUILDING U...A N  E XTENSION OF  P ROTÉGÉ FOR AN AUTOMA TIC  F UZZY - O NTOLOGY BUILDING U...
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...ijcsit
 
Ben Goertzel Monash 2011
Ben Goertzel Monash 2011Ben Goertzel Monash 2011
Ben Goertzel Monash 2011Adam Ford
 
11.bio inspired approach as a problem solving technique
11.bio inspired approach as a problem solving technique11.bio inspired approach as a problem solving technique
11.bio inspired approach as a problem solving techniqueAlexander Decker
 
Computer Aided Development of Fuzzy, Neural and Neuro-Fuzzy Systems
Computer Aided Development of Fuzzy, Neural and Neuro-Fuzzy SystemsComputer Aided Development of Fuzzy, Neural and Neuro-Fuzzy Systems
Computer Aided Development of Fuzzy, Neural and Neuro-Fuzzy SystemsIJEACS
 
Toward enhancement of deep learning techniques using fuzzy logic: a survey
Toward enhancement of deep learning techniques using fuzzy logic: a survey Toward enhancement of deep learning techniques using fuzzy logic: a survey
Toward enhancement of deep learning techniques using fuzzy logic: a survey IJECEIAES
 
Iot ontologies state of art$$$
Iot ontologies state of art$$$Iot ontologies state of art$$$
Iot ontologies state of art$$$Sof Ouni
 
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: ReviewComparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: Reviewiosrjce
 
Soft computing
Soft computingSoft computing
Soft computingCSS
 
pln_ecan_agi_16
pln_ecan_agi_16pln_ecan_agi_16
pln_ecan_agi_16EEPCO
 
Knowledge Engineering and Intelligence Gathering
Knowledge Engineering and Intelligence GatheringKnowledge Engineering and Intelligence Gathering
Knowledge Engineering and Intelligence GatheringNicolae Sfetcu
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 

Similar to Type-2 Fuzzy Ontology (20)

Albus
AlbusAlbus
Albus
 
Recruitment Based On Ontology with Enhanced Security Features
Recruitment Based On Ontology with Enhanced Security FeaturesRecruitment Based On Ontology with Enhanced Security Features
Recruitment Based On Ontology with Enhanced Security Features
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentation
 
Report on robotic control
Report on robotic controlReport on robotic control
Report on robotic control
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Analytical Review on the Correlation between Ai and Neuroscience
Analytical Review on the Correlation between Ai and NeuroscienceAnalytical Review on the Correlation between Ai and Neuroscience
Analytical Review on the Correlation between Ai and Neuroscience
 
Heraclitus II: A Framework for Ontology Management and Evolution
Heraclitus II: A Framework for Ontology Management and EvolutionHeraclitus II: A Framework for Ontology Management and Evolution
Heraclitus II: A Framework for Ontology Management and Evolution
 
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...
A N  E XTENSION OF  P ROTÉGÉ FOR AN AUTOMA TIC  F UZZY - O NTOLOGY BUILDING U...A N  E XTENSION OF  P ROTÉGÉ FOR AN AUTOMA TIC  F UZZY - O NTOLOGY BUILDING U...
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...
 
Ben Goertzel Monash 2011
Ben Goertzel Monash 2011Ben Goertzel Monash 2011
Ben Goertzel Monash 2011
 
11.bio inspired approach as a problem solving technique
11.bio inspired approach as a problem solving technique11.bio inspired approach as a problem solving technique
11.bio inspired approach as a problem solving technique
 
Computer Aided Development of Fuzzy, Neural and Neuro-Fuzzy Systems
Computer Aided Development of Fuzzy, Neural and Neuro-Fuzzy SystemsComputer Aided Development of Fuzzy, Neural and Neuro-Fuzzy Systems
Computer Aided Development of Fuzzy, Neural and Neuro-Fuzzy Systems
 
Toward enhancement of deep learning techniques using fuzzy logic: a survey
Toward enhancement of deep learning techniques using fuzzy logic: a survey Toward enhancement of deep learning techniques using fuzzy logic: a survey
Toward enhancement of deep learning techniques using fuzzy logic: a survey
 
Iot ontologies state of art$$$
Iot ontologies state of art$$$Iot ontologies state of art$$$
Iot ontologies state of art$$$
 
F017624449
F017624449F017624449
F017624449
 
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: ReviewComparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
 
Soft computing
Soft computingSoft computing
Soft computing
 
pln_ecan_agi_16
pln_ecan_agi_16pln_ecan_agi_16
pln_ecan_agi_16
 
Knowledge Engineering and Intelligence Gathering
Knowledge Engineering and Intelligence GatheringKnowledge Engineering and Intelligence Gathering
Knowledge Engineering and Intelligence Gathering
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
lecture1423723637.pdf
lecture1423723637.pdflecture1423723637.pdf
lecture1423723637.pdf
 

More from Syed Ahmad Chan Bukhari, PhD

CEDAR: Easing Authoring of Metadata to Make Biomedical Data Sets More Findabl...
CEDAR: Easing Authoring of Metadata to Make Biomedical Data Sets More Findabl...CEDAR: Easing Authoring of Metadata to Make Biomedical Data Sets More Findabl...
CEDAR: Easing Authoring of Metadata to Make Biomedical Data Sets More Findabl...Syed Ahmad Chan Bukhari, PhD
 
Finding and Reusing Biomedical Datasets using CEDAR Metadata Repository and T...
Finding and Reusing Biomedical Datasets using CEDAR Metadata Repository and T...Finding and Reusing Biomedical Datasets using CEDAR Metadata Repository and T...
Finding and Reusing Biomedical Datasets using CEDAR Metadata Repository and T...Syed Ahmad Chan Bukhari, PhD
 
CEDAR: Web-Based Tools for Accelerating the Creation of Standardized Metadata
CEDAR: Web-Based Tools for Accelerating the Creation of Standardized MetadataCEDAR: Web-Based Tools for Accelerating the Creation of Standardized Metadata
CEDAR: Web-Based Tools for Accelerating the Creation of Standardized MetadataSyed Ahmad Chan Bukhari, PhD
 
Leveraging CEDAR workbench for ontology-linked submission of adaptive immune ...
Leveraging CEDAR workbench for ontology-linked submission of adaptive immune ...Leveraging CEDAR workbench for ontology-linked submission of adaptive immune ...
Leveraging CEDAR workbench for ontology-linked submission of adaptive immune ...Syed Ahmad Chan Bukhari, PhD
 
A semantic framework for biomedical image discovery
A semantic framework for biomedical image discoveryA semantic framework for biomedical image discovery
A semantic framework for biomedical image discoverySyed Ahmad Chan Bukhari, PhD
 
Semantic enrichment and similarity approximation for biomedical sequence images
Semantic enrichment and similarity approximation for biomedical sequence imagesSemantic enrichment and similarity approximation for biomedical sequence images
Semantic enrichment and similarity approximation for biomedical sequence imagesSyed Ahmad Chan Bukhari, PhD
 
MiAIRR:Minimum information about an Adaptive Immune Receptor Repertoire Seque...
MiAIRR:Minimum information about an Adaptive Immune Receptor Repertoire Seque...MiAIRR:Minimum information about an Adaptive Immune Receptor Repertoire Seque...
MiAIRR:Minimum information about an Adaptive Immune Receptor Repertoire Seque...Syed Ahmad Chan Bukhari, PhD
 
Cedar OnDemand: An intelligent browser extension to generate ontology-based m...
Cedar OnDemand: An intelligent browser extension to generate ontology-based m...Cedar OnDemand: An intelligent browser extension to generate ontology-based m...
Cedar OnDemand: An intelligent browser extension to generate ontology-based m...Syed Ahmad Chan Bukhari, PhD
 
Use of CEDAR Technology for Ontology-based Submission of Biomedical Data to ...
 Use of CEDAR Technology for Ontology-based Submission of Biomedical Data to ... Use of CEDAR Technology for Ontology-based Submission of Biomedical Data to ...
Use of CEDAR Technology for Ontology-based Submission of Biomedical Data to ...Syed Ahmad Chan Bukhari, PhD
 
CAIRR: A pipeline to submit AIRR data to the NCBI through the CEDAR Workbench
CAIRR: A pipeline to submit AIRR data to the NCBI through the CEDAR WorkbenchCAIRR: A pipeline to submit AIRR data to the NCBI through the CEDAR Workbench
CAIRR: A pipeline to submit AIRR data to the NCBI through the CEDAR WorkbenchSyed Ahmad Chan Bukhari, PhD
 
BioNLP-SADI: A Suite of interoperable BioNLP Semantic Web Services based on S...
BioNLP-SADI: A Suite of interoperable BioNLP Semantic Web Services based on S...BioNLP-SADI: A Suite of interoperable BioNLP Semantic Web Services based on S...
BioNLP-SADI: A Suite of interoperable BioNLP Semantic Web Services based on S...Syed Ahmad Chan Bukhari, PhD
 
AN Intelligent Realtime multiple vessel collision risk assessment system
AN Intelligent Realtime multiple vessel collision risk assessment system AN Intelligent Realtime multiple vessel collision risk assessment system
AN Intelligent Realtime multiple vessel collision risk assessment system Syed Ahmad Chan Bukhari, PhD
 

More from Syed Ahmad Chan Bukhari, PhD (16)

CEDAR: Easing Authoring of Metadata to Make Biomedical Data Sets More Findabl...
CEDAR: Easing Authoring of Metadata to Make Biomedical Data Sets More Findabl...CEDAR: Easing Authoring of Metadata to Make Biomedical Data Sets More Findabl...
CEDAR: Easing Authoring of Metadata to Make Biomedical Data Sets More Findabl...
 
Finding and Reusing Biomedical Datasets using CEDAR Metadata Repository and T...
Finding and Reusing Biomedical Datasets using CEDAR Metadata Repository and T...Finding and Reusing Biomedical Datasets using CEDAR Metadata Repository and T...
Finding and Reusing Biomedical Datasets using CEDAR Metadata Repository and T...
 
CEDAR Technologies for AIRR Submissions
CEDAR Technologies for AIRR SubmissionsCEDAR Technologies for AIRR Submissions
CEDAR Technologies for AIRR Submissions
 
CEDAR: Web-Based Tools for Accelerating the Creation of Standardized Metadata
CEDAR: Web-Based Tools for Accelerating the Creation of Standardized MetadataCEDAR: Web-Based Tools for Accelerating the Creation of Standardized Metadata
CEDAR: Web-Based Tools for Accelerating the Creation of Standardized Metadata
 
Leveraging CEDAR workbench for ontology-linked submission of adaptive immune ...
Leveraging CEDAR workbench for ontology-linked submission of adaptive immune ...Leveraging CEDAR workbench for ontology-linked submission of adaptive immune ...
Leveraging CEDAR workbench for ontology-linked submission of adaptive immune ...
 
Standardization of the HIPC Data Templates
Standardization of the HIPC Data TemplatesStandardization of the HIPC Data Templates
Standardization of the HIPC Data Templates
 
A semantic framework for biomedical image discovery
A semantic framework for biomedical image discoveryA semantic framework for biomedical image discovery
A semantic framework for biomedical image discovery
 
Semantic enrichment and similarity approximation for biomedical sequence images
Semantic enrichment and similarity approximation for biomedical sequence imagesSemantic enrichment and similarity approximation for biomedical sequence images
Semantic enrichment and similarity approximation for biomedical sequence images
 
MiAIRR:Minimum information about an Adaptive Immune Receptor Repertoire Seque...
MiAIRR:Minimum information about an Adaptive Immune Receptor Repertoire Seque...MiAIRR:Minimum information about an Adaptive Immune Receptor Repertoire Seque...
MiAIRR:Minimum information about an Adaptive Immune Receptor Repertoire Seque...
 
Cedar OnDemand: An intelligent browser extension to generate ontology-based m...
Cedar OnDemand: An intelligent browser extension to generate ontology-based m...Cedar OnDemand: An intelligent browser extension to generate ontology-based m...
Cedar OnDemand: An intelligent browser extension to generate ontology-based m...
 
Use of CEDAR Technology for Ontology-based Submission of Biomedical Data to ...
 Use of CEDAR Technology for Ontology-based Submission of Biomedical Data to ... Use of CEDAR Technology for Ontology-based Submission of Biomedical Data to ...
Use of CEDAR Technology for Ontology-based Submission of Biomedical Data to ...
 
CAIRR: A pipeline to submit AIRR data to the NCBI through the CEDAR Workbench
CAIRR: A pipeline to submit AIRR data to the NCBI through the CEDAR WorkbenchCAIRR: A pipeline to submit AIRR data to the NCBI through the CEDAR Workbench
CAIRR: A pipeline to submit AIRR data to the NCBI through the CEDAR Workbench
 
BioNLP-SADI: A Suite of interoperable BioNLP Semantic Web Services based on S...
BioNLP-SADI: A Suite of interoperable BioNLP Semantic Web Services based on S...BioNLP-SADI: A Suite of interoperable BioNLP Semantic Web Services based on S...
BioNLP-SADI: A Suite of interoperable BioNLP Semantic Web Services based on S...
 
AN Intelligent Realtime multiple vessel collision risk assessment system
AN Intelligent Realtime multiple vessel collision risk assessment system AN Intelligent Realtime multiple vessel collision risk assessment system
AN Intelligent Realtime multiple vessel collision risk assessment system
 
Canadian health census to lod
Canadian health census to lodCanadian health census to lod
Canadian health census to lod
 
BioNLPSADI
BioNLPSADIBioNLPSADI
BioNLPSADI
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Type-2 Fuzzy Ontology

  • 1.
  • 2. Contents Background and motivation Past research work Proposed solution ST2FO-MAS to automate personalized Itinerary (Problem Intro.) Secure Type-2 Fuzzy Ontology Secure Type-2 Fuzzy Ontology (A quick review of terminologies) Type-1 Fuzzy system Type-2 Fuzzy system Secure Type-2 Fuzzy Ontology Development Crisp ontology development Type-1 Fuzzy ontology Development Type-2 Fuzzy ontology development 2 Multi-Agent System
  • 3. Related Publications 1. Ahmad C. Bukhari, Yong-Gi Kim, “Integration of Secure Type-2 Fuzzy Ontology with Multi- agent Platform: A proposal to automate the Personalized Flight Ticket Booking Domain ” Journal of Information sciences (SCI Index) Impact factor 2.9 For Tracking : http://dx.doi.org/10.1016/j.ins.2012.02.036 2. Ahmad C. Bukhari ,Yong-Gi Kim, “Ontology-assisted automatic precise information extractor for visually impaired inhabitant” Journal of Artificial Intelligence Review 2011 http://dx.doi.org/10.1007/s10462-011-9238-6 (SCI index) 3. Ahmad C. Bukhari , Yong-Gi Kim, "Exploiting the Heavyweight Ontology with Multi -Agent System Using Vocal Command System: A Case Study on E-Mall", IJACT : International Journal of Advancements in Computing Technology, Vol. 3, No. 6, pp. 233 ~ 241, 2011 (SCIE, Scopus Index) 4. Ahmad C. Bukhari, Yong-Gi Kim, “Incorporation of Fuzzy Theory with Heavyweight Ontology and Its Application on Vague Information Retrieval For Decision Making” International Journal of Fuzzy Logic and Intelligent System, vol.11, no.3, September 2011, pp, 171-17 Http://dx.doi.org/10.5391/IJFIS.2011.11.3.171 (KISTI, ACOMS, SCIE Index) 3
  • 4. Background and Motivation As the internet grows rapidly, millions of WebPages are being added on a daily basis Personalized information extraction and intelligent decision making on it behalf are becoming challenging issues Explosive internet heterogeneity makes the relevant Info. extraction and intelligent decision making more tricky Search engines are used commonly to find information Conventional mechanism of searching: keywords and directory structure Most of the data on internet is in imprecise and uncertain format Optimal searching not possible by using conventional ways Currently users spend hours and hours to find desired information from internet Any solution? 4
  • 6. Proposed solution Researchers proposed several solution but mostly failed with time, due to diverse and fatally vague nature of web data Some solutions found working nevertheless with low precision rate and their performance decreasing drastically We present an end-to-end solution to automate the optimal information extraction and decision making Underlying technologies of our system are: Type-2 Fuzzy Ontology, MAS, NLP, Info. Security Why we use type-2 fuzzy system? Why we incorporated Type-2 fuzzy system with ontology? Why the information security is so important? What is the ontology and how can we exploit it for info. extraction? What is the relation among MAS, NLP and T2FO to extract the optimal information and for appropriate and timely decision making? 6
  • 7. ST2FO-MAS to automate personalized Itinerary (Ongoing challenges and proposed solutions) 7
  • 8. ST2FO-MAS to automate personalized Itinerary (Problem Intro.) Manual air ticket booking : time consuming and laborious The domain is rife with uncertainties and with complex linguistic terminologies Thousands of solutions available now but mostly work for specific airlines or for specific routes Generally, passengers spend hours to find acceptable fare A complete process (selection, reservation, booking with transaction) requires full-time use involvement Travelers are anxiously waiting for automatic solution with personalized outcomes 8
  • 9. Secure Type-2 Fuzzy Ontology A quick review of terminologies Ontology: An ontology is a branch of metaphysics that focuses on the study of existence. “An ontology is an explicit and formal specification of a shared conceptualization of a domain, which is machine readable and human 9
  • 10. Secure Type-2 Fuzzy Ontology Common definitions and(A quick review of terminologies) set and type-2 concepts about type-1 Fuzzy Type-1 Fuzzy system • The fuzzy set theory was introduced by Lotfi Zadeh in 1965 to deal with vague and imprecise concepts. • In classical set theory, elements either belong to a particular set or they don’t belong. • However, in fuzzy set theory the association of an element with a particular set lies between ‘0’ and ‘1’ which is called degree of association or membership degree. A fuzzy set can be defined as: Definition 1: A fuzzy set ‘s’ over universe of discourse ‘X’ can be defined by its membership function Âľ_s which maps element ‘x’ to values between [0,1]. 10
  • 11. Secure Type-2 Fuzzy Ontology (A quick review of terminologies) Type-2 Fuzzy System Type-1 fuzzy system or conventional fuzzy system can handle the uncertainty at certain level. Some Fact vagueness are the vital parts of any real-time system Uncertainty and vagueness is increasing continuously due to heterogeneity. How to handle the extensive blurred information? Solution: Type-2 Fuzzy system Type-2 fuzzy system is the extended version of classical fuzzy set theory. In type-1 fuzzy set theory, the membership values are crisp, while type-2 fuzzy systems have fuzzy membership values. 11
  • 12. Secure Type-2 Fuzzy Ontology (Ontology Development) Proposed formation of Type-2 Fuzzy Ontology Building 12
  • 13. Development of Secure type-2 fuzzy ontology • Fuzzy ontology can be defined in the form of fuzzy sets. • Let be fuzzy class in universe of discourse Âľ then and the relationship between two ontology classes are fuzzy relation • Annotation rule feature of protĂŠgĂŠ is used to define fuzzy concept in fuzzy ontology • Manual process of annotation adding is a complex and error pruning • ProtĂŠgĂŠ fuzzy OWL tab helps us to make this process handy • A class of cheap ticket can be described in to fuzzy form as: • Similarly very cheap ticket can be expressed as: 13
  • 14. Development of Secure type-2 fuzzy ontology p Domain Ontology Development steps Source: Ahmad C. Bukhari, Yong-Gi Kim, “Incorporation of Fuzzy Theory with 1.Determine the domain and scope of the ontology. Heavyweight Ontology and Its Application on Vague 2.Consider reusing existing ontologies. Information Retrieval For Decision Making” 3.Enumerate important terms in the ontology. International Journal of Fuzzy Logic and 4.Define the classes and the class hierarchy. Intelligent System, vol.11, 5.Define the properties of the classes. no.3, September 2011, pp, 171-17 6.Define the facets of the slots. 7.Create instances. Language: OWL-2 , RDF and ProtĂŠgĂŠ Reasoner: DL-reasoner, Pellet, DeLorean 14
  • 15. Development of Secure type-2 fuzzy ontology The anatomy of Type-2 Secured Fuzzy Ontology (Layered Architecture) 15
  • 16. Development of Secure type-2 fuzzy ontology (Internal Schema) Secure Type-2 Fuzzy Ontology of Ticket Booking Domain Source: Ahmad C. Bukhari ,Yong-Gi Kim, “Ontology-assisted automatic precise information extractor 16 for visually impaired inhabitant” Journal of Artificial Intelligence Review
  • 17. 1 Development of Secure type-2 fuzzy ontology (Fuzz-owl Plugin) 2 3 Readers interest Source: Ahmad C. Bukhari, Yong-Gi Kim, “Incorporation of Fuzzy Theory with Heavyweight Ontology and Its Application on Vague Information Retrieval For Decision Making” International Journal of Fuzzy Logic and Intelligent System, vol.11, no.3, September 2011, pp, 171-17 17
  • 18. Secure Type-2 Fuzzy Ontology Why information security important? security) (Information • Information is the most valuable assets of any organization. • Nowadays, secure information has become a strategic issue for online businesses. • In ontology, all kind of information is shared in plain text format. • This raises the issues of information leakage, altering and deletion of information contents • Information security can be achieved to increase the satisfaction level of authentication, authorization, integrity and confidentiality. • We used XML security recommendation to achieve this recommendation. XML security recommendations developed by W3C • XML digital signature • XML encryption • XML key management specification (XKMS) • Security assertion markup language (SAML) • XML access control markup language (XACML) Possible Information security Challenges • DOS attack on server • XML content exploit attack (data holders: CDATA,PCDATA, NUMBER) • X-Path altering attack 18
  • 19. Secure Type-2 Fuzzy Ontology (Information security: Application scheme) <? XML version="1.0"?> <! DOCTYPE Ontology [ <! ENTITY xsd "http://www.w3.org/2001/XMLSchema#" > ]> <owlx:Ontology owlx:name="http://www.ailab.gnu.ac.kr/t2fo" xmlns:owlx="http://www.w3.org/2003/05/owl-xml"> <CustomerInfo xmlns='http://www.ailab.gnu.ac.kr/st2fo-mas/person_ontology'> <Name>ahmad chan</Name> Public Key encryption algorithm <EncryptedData Type='http://www.w3.org/2001/04/xmlenc#Element' xmlns='http://www.w3.org/2001/04/xmlenc#'> <EncryptionMethod Algorithm='http://www.w3.org/2001/04/xmlenc#tripledes-cbc'/> <KeyInfo xmlns='http://www.w3.org/2000/09/xmldsig#'> <EncryptedKey xmlns='http://www.w3.org/2001/04/xmlenc#'> <EncryptionMethod Algorithm='http://www.w3.org/2001/04/xmlenc#rsa-1_5'/> <KeyInfo xmlns='http://www.w3.org/2000/09/xmldsig#'> <KeyName>white tiger</KeyName> </KeyInfo> <CipherData> XML Data level encryption <CipherValue>vHE@#$&&JUIOFdefghj...</CipherValue> </CipherData> </EncryptedKey> </KeyInfo> <CipherData> <CipherValue>yyFE%!JJNIcflijnvcthsdrtg...</CipherValue> </CipherData> </EncryptedData> </CustomerInfo> </owlx:Ontology> Code view of W3C XML security recommendations 19
  • 20. Multi-agent system ( Terminology, Role, Integration and usage) Diversity and complexity factors are increasing day by day in modern software applications. The multi-Agent system is considered an efficient technology in the development of distributed systems. A multi-Agent system is basically the group of interconnected agents, in which each agent works autonomously while sharing information. An agent is a bunch of code which is designed to perform a specific task on the behalf of its user. Why we used MAS? Our domain was diverse Complex and unstructured For automatic information extraction For intelligent decision making 20
  • 21. A graphical architecture of STFO-MAS and its Application to 2 3 automate the personalized itinerary 1 Client GUI Panel 1 4 2 Query Processing Agent 5 3 Search engines Pool 6 4 Data Repository 7 5 Ontology Bases Crawler 8 6 Type-2 Fuzzy Ontologies 7 MAS Pool 8External Data repositories 21
  • 22. What's inside decision supported multi-agent pool? Multi-agent system schema 22
  • 23. Multi-agent system Import Jade.core.agent; //Package Importing ( Algorithm and working) Public class TicketBookMAS { StartupQPA() { getInput(){ // taking input from user } //Intialization stage g.Action() { NLP Processing (); QueryOptimization(); Webcrawling(); } R=Get.Result(); mkConnect(IA) // Make connection with inference agent Start thread 1 Delay 1000 mili second; Startup IA() { Mkconnect(PPRA && QPA); Inferencing(); //optimal ticket selection based on information provided by QPA StoreResults(); Start thread 2 Thread1 stop //store information and break the process Startup (SBTA && TRA) { //Initialization of SSL (SECURE SOCKET LAYER) Autoauthenticate(); Q= resultant input=Optimal ticket; RequestForReservation(Iternary Number like 152895623462); //for bank payment , taking user concern first and then sharing bank crediential through secure XML channel Reservation Complted; //information displayed and stored and closing all connection Terminate thread 1 //Close all processs }}} 23
  • 24. Experiments What's Inside the query processing agent (QPA)? de QPA, we perform four steps after receiving natural language query (NLQ) from client 1.Tokenization 2.word category disambiguation 3.shallow parsing process 4.DL-query generation I(noun) want to(preposition) go(verb) from(preposition) Seoul(noun) to London(noun) to attend(preposition) a meeting(verb) . The meeting will be held afternoon (noun, adjective), so I want to take (verb) vegetables (noun) in lunch (noun). Please book (verb) a ticket (noun) of economy class (noun+ adjective) with cheap rate (noun+ adjective) and minimum delay (noun+ adjective).” 24
  • 25. QPA Functionality algorithm Tokenization Query processing and optimization Initial data filtration and storage stage Second Optimization Stage 25
  • 26. Experiments and results Ontology Evaluation • We evaluated the ontology after completion of each phase of T2FO development to measure the efficiency •We used Manchester OWL-2 syntax of DL-query to evaluate the efficiency of ontology Some queries results are: DL-Query Ontology Classes 26 Possible results
  • 27. Experiments and results System security Evaluator • We developed a module to evaluate the overall system security. • We added the malicious code and to engage the system • system generated the beeps and paused all the operation 27
  • 28. Experiments and results Overall system evaluation • Information system can be categorized on the basis of its effectiveness. • There are some known ways to define the efficiency of an information system, such as the precision (PR), recall(RC) and time • To exact judge the performance, we requested five volunteers to help us in experiments. • The volunteers enquired from the system by using crisp ontology, type-1 fuzzy and Type-2 fuzzy ontology. • we noted the time, precision and recall in each mode. • Mathematically, the precision and recall can be expressed as the following: ‘ce’ is the total number of records that are extracted from the internet, ‘te’ and ‘fe’ represent the true and false elements in the extracted records. 28
  • 29. Results (Extracted results) Overall system performance results recoded in the case of the secured type-1 fuzzy ontology. Overall system performance results recoded in the case of the secured type-1 fuzzy ontology. 29
  • 30. Results Overall system performance results recoded in the case of the secured type-2 fuzzy ontology. 30
  • 31. Results (Efficiency Comparison) Crisp ontology Case Precision Type-1 Fuzzy ontology Case 31
  • 32. Type-2 Fuzzy ontology Case Continuously Precision increasing 32
  • 33. References 1.A. Segev, J. Kantola, Patent Search Decision Support Service, In: Proceedings of Seventh International Conference on Information Technology, 2010, pp. 568-573. 2.A. Vorobiev, J. Han, Security Attack Ontology for Web Services, Semantics, In: Proceedings of Second International Conference on Knowledge and Grid, 2006, pp. 42-49. 3.A.C. Bukhari, Y.G Kim, Exploiting the Heavyweight Ontology with Multi-Agent System Using Vocal Command System: A Case Study on E-Mall, International Journal of Advancements in Computing Technology 3(2011) 233-241. 4.A.C. Bukhari, Y.G Kim, Ontology-assisted automatic precise information extractor for visually impaired inhabitants, Artificial Intelligence Review (2005) Issn: 0269-2821. 5.C. Lee, M. Wang, H. Hagras, A Type-2 Fuzzy Ontology and Its Application to Personal Diabetic-Diet Recommendation, IEEE Transactions on Fuzzy Systems 18 (2010), pp. 374-395 6.C. Lee, M. Wang, M. Wu, C. Hsu; Y. Lin, S. Yen , A type-2 fuzzy personal ontology for meeting scheduling system, In: Proceeding of International Conference on Fuzzy Systems, 2010 , pp. 1-8 7.C.J Su, C.Y Wu, JADE implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring , Applied Soft Computing Journal 11 (2011), 315-325. 8.C.I. Nyulas, M.J. O'Connor, S.W. Tu, D.L. Buckeridge, A. Okhmatovskaia, M.A. Musen, An Ontology-Driven Framework for Deploying JADE Agent Systems, IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008, pp. 573-577. 9.C. Lee, C. Jiang, T. Hsieh, A genetic fuzzy agent using ontology model for meeting scheduling system, Information Sciences 176 (2006) 1131-1155 10.C. Lee, M. Wang, G. Acampora, C. Hsu, and H. Hagras, Diet assessment based on type-2 fuzzy ontology and fuzzy markup language, Int. J. Intell. Syst., 25 (2010) 1187-1216. 11.C. S. Lee, M. H. Wang. Z. R. Yang, Y. J. Chen, H. Doghmen, and O. Teytaud, FML-based type-2 fuzzy ontology for computer Go knowledge representation, In: Proceeding of International Conference on System Science and Engineering (ICSSE 2010), 2010, pp. 63-68. 12.C.D. Maio,G. Fenza, V. Loia, S. Senatore , Towards an automatic fuzzy ontology generation," In: Proceedings of IEEE International Conference on fuzzy system,2009, pp.1044-1049. 13.C.D. Maio,G. Fenza, V. Loia, S. Senatore, Hierarchical web resources retrieval by exploiting Fuzzy Formal Concept Analysis, Information Processing & Management Available online 26 May 2011, ISSN 0306-4573. 14.D.H. Fudholi, N. Maneerat, R. Varakulsiripunth, Y. Kato, Application of ProtĂŠgĂŠ, SWRL and SQWRL in fuzzy ontology-based menu recommendation, International Symposium on Intelligent Signal Processing and Communication Systems, 2009, pp. 631-634. 15.D.Wu, J.M. Mendel, Uncertainty measures for interval type-2 fuzzy sets, Information Sciences, 177 (2007) 5378-5393. 16.E. Gatial, Z. Balogh, M. Ciglan, L. Hluchy, Focused web crawling mechanism based on page relevance, In: Proceedings of (ITAT 2005) information technologies applications and theory, 2005, pp. 41–45 17.F. Abdoli, M. Kahani, Ontology-based distributed intrusion detection system,In: Proceedings of 14th International Computer Conference, 2009, pp. 65-70. 33
  • 34. References 1.F. Bobillo, U. Straccia, Fuzzy Ontology Representation using OWL 2, International Journal of Approximate Reasoning (2011) 1- 36. 2.F. Bobillo, M. Delgado, J. Gomez- Romero, DeLorean: a reasoner for fuzzy OWL 1.1, In: Proceedings of 4th International Workshop on 34
  • 35. Many Thanks for your Kind attention! 35