Integration of a secure type-2 fuzzy ontology with a multi-agent platform: A proposal to automate the personalized flight ticket booking domain

被引:24
作者
Bukhari, Ahmad C. [1 ]
Kim, Yong-Gi [1 ]
机构
[1] Gyeongsang Natl Univ, Dept Comp Sci, Artificial Intelligence Lab, Jinju 660701, Kyungnam, South Korea
基金
新加坡国家研究基金会;
关键词
Type-2 fuzzy ontology; Multi-agent system with ontology; Information security in fuzzy systems; Automation of flight booking system; Personalization with type-2 fuzzy ontology;
D O I
10.1016/j.ins.2012.02.036
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several fuzzy ontology-based solutions have been proposed in the domain of web-based applications to reduce the manual work load of daily activities. However, because of the explosive heterogeneity in the current Internet structure, the performance of the available solutions has been decreasing drastically. We propose an integrated secure type-2 fuzzy ontology multi-agent platform (ST2FO-MAS) to completely automate the laborious process of manual air ticket booking. The air ticket booking domain is rife with uncertainties, and most of the information is based on complex linguistic terminologies. The available fuzzy ontology schemes cannot extract intensively blurred information from the internet to provide personalized solutions. Meanwhile, information security attacks have been growing significantly, which is a discouraging indicator for e-commerce applications. The proposed ST2FO-MAS can provide an end-to-end solution that can ideally address the ongoing information security challenges. The accommodation of a multi-agent system in a secure type-2 fuzzy ontology boosts the performance of the system because of its robust autonomous working scheme. To completely judge the performance of the proposed solution, we developed an intelligent prototype system that was based on JAVA, JADE and XML security recommendations. We conducted several experiments under the supervision of domain experts, and we evaluated the performance of the system. The experimental results are quite satisfactory and support the efficacy of the proposed model. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:24 / 47
页数:24
相关论文
共 60 条
[1]   Ontology-based Distributed Intrusion Detection System [J].
Abdoli, F. ;
Kahani, M. .
2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, :65-+
[2]   Type-2 fuzzy neural networks with fuzzy clustering and differential evolution optimization [J].
Aliev, Rafik A. ;
Pedrycz, Witold ;
Guirimov, Babek G. ;
Aliev, Rashad R. ;
Ilhan, Umit ;
Babagil, Mustafa ;
Mammadli, Sadik .
INFORMATION SCIENCES, 2011, 181 (09) :1591-1608
[3]  
[Anonymous], INT J ADV COMPUTING
[4]  
[Anonymous], 2011, INT J INFONOMICS IJI
[5]  
Bechhofer S., 2004, W3C recommendation
[6]   Security ontology proposal for mobile applications [J].
Beji, Sofien ;
El Kadhi, Nabil .
MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, :580-587
[7]  
Bobillo F., 2008, P 4 INT WORKSH UNC R, P35
[8]  
Bobillo F., 2011, INT J APPROX REASON, P1
[9]   Generalized fuzzy rough description logics [J].
Bobillo, Fernando ;
Straccia, Umberto .
INFORMATION SCIENCES, 2012, 189 :43-62
[10]  
Bouhdidi J.E., 2010, INT J COMPUTER APPL, V12, P1