<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Structure of Semantic Service in a Distributed Knowledge Based System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kulykovsk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artur Tim</string-name>
          <email>timenko.artur@gmail.com</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Zaporizhzhia National Technical University</institution>
          ,
          <addr-line>Zhukovsky str., 64,Zaporizhzhia, 69063</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The main difference in distributed systems based on knowledge is the use of the service approach and ontologies in knowledge engineering. Semantic service acts as a software agent that regulates the interaction of all components of the system. Semantic service provides: semantic principle, which defines a formal description of information and allows you to define the following characteristics of services: scalability, semantic interoperability, formal models of services and ontologies; the principle of decision making; the principle of distribution, which allows you to aggregate the capabilities of several computing objects through cooperation. The communication and collaboration mechanism of the distributed systems based on knowledge covers the message transfer between services, information exchange between semantic service and distributed knowledge bases, and the semantic service behaviors in the entire process from request submission, request handle, to result return. The knowledge base is formed from three types of ontologies. The rules for recognizing performance problems are converted into ontology and the system knowledge base is placed. The working memory of a semantic service contains facts that correspond to simple events, composite events, and identified problems and recommendations. The algorithm for using semantic service is discussed in the article. To assess the performance of the SS attached, create an information system of two components: event trace generator and event trace analyzer.</p>
      </abstract>
      <kwd-group>
        <kwd>distributed system</kwd>
        <kwd>semantic service</kwd>
        <kwd>components of a distributed system</kwd>
        <kwd>knowledge engineering</kwd>
        <kwd>data</kwd>
        <kwd>ontology</kwd>
        <kwd>services</kwd>
        <kwd>semantic web</kwd>
        <kwd>structure of semantic service</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Economic globalization and global networks have become the trend of world
development. Especially with the development of information technology and the
innovation of management theory, modern enterprises need to go beyond the boundaries of
traditional companies to achieve for a rapid and effective integration of resources on a
global scale, thus can produce high-quality products that meet the needs of the market
or provide services the customer need in a very short period of time [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        In this case, a new distributed computer system in terms of development of modern
technologies put the emphasis on the properties of interoperability and scalability.
This direction is connected with the rapid growth of blockchain technology and the
Internet of things (IoT). As analysts predict that, by 2025, the share of block chain
apps will account for 10% of world gross domestic product [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. By 2020 will create
more than 30 billion IoT devices. IoT will affect every industry, from retail to health
care [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        At the moment in the literature there are a large number of definitions of the
concept of "distributed system". The most comprehensive definition proposed by AS
Tanenbaum [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]: “Distributed system (DS) is a set of independent computers, which is
perceived by its users as the only consistent system.” Another definition is proposed
in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]: DS are software and hardware systems, in which execution of operations
(actions, calculations) necessary to ensure the target functionality of the system is
distributed (physically or logically) between different performers. In the computing field,
under our computer, in our study, we will understand the software and hardware
system created for a specific practical application, the functionality of which is
distributed on various nodes.
      </p>
      <p>On the one hand, DS are tools that allow solving a large number of complex tasks,
most of which are not solved by other methods. DS can eliminate the main drawback
of centralized systems - the limitations of increasing computing power. At the same
time, the analysis revealed a number of problems that need to be solved. The limited
use of DS is complicated by the use of equipment from different manufacturers with
different types of architectures. Due to the wide variety of aspects of building
computing systems, as well as the variety of existing operating systems, it becomes
necessary to create methods for adaptive planning of distribution of flows in a distributed
system, which will significantly speed up the processing of incoming requests for
services and increase the overall system performance.</p>
      <p>
        Modern representations of data are changing the ways and forms of
communication, production and consumption of information [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The dominance of horizontal
relations, structure-role of information decentralization of all types of data available at
any time on every device. The user should not care about the specific technology used
to provide computing capacity or data storage, so you can say that a user has some
information about the remote resource. Distributed systems based on knowledge
(DKBS) in order to study the data, their processing and use evolving technologies of
the semantic web.
      </p>
      <p>The formal model of the DKBS consists of a set of ontologies; lots of services; a
set of events that describe the processes of the system; semantic service (SS); a set of
composite services and knowledge base. The completeness and effectiveness of the
system is determined by a multitude of ontologies. The main difference in DKBS is
the use of the service approach and ontologies in knowledge engineering. SS acts as a
software agent that regulates the interaction of all components of the system.</p>
    </sec>
    <sec id="sec-2">
      <title>Literature review</title>
      <p>
        Software agents originally were discussed in the 70’s, and in the mid 90’s briefly
gained some momentum but then stalled. The ”software agent” term has found its
way into a number of technologies and has been widely used, for example, in artificial
intelligence, databases, operating systems and computer networks literature. Although
there is no single definition of an agent [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7, 8, 9</xref>
        ] all definitions agree that an agent is
essentially a special software component that has autonomy that provides an
interoperable interface to an arbitrary system and/or behaves like a human agent, working for
some clients in pursuit of its own agenda. Most discussions on agents focus on their
autonomy, intelligence, mobility and interaction [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14">10, 11, 12, 13, 14</xref>
        ]. Agent-based
systems [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ] claim to be next generation software capable of adapting
dynamically to changing business environment and of solving a wide range of knowledge
processing application. Although sophisticated software agents can be difficult to
build from scratch due to the skills and knowledge needed, the widely available agent
construction toolkits may provide a quick and easy start to building software agents
without much agent expertise. Significant research and development into multi-agent
systems (MAS) has been conducted in recent years [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">17, 18, 19</xref>
        ], and there are many
architectures available today [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ]. Nevertheless, several issues still need to be
faced to make the multi-agent technology widely accepted: secure and efficient
execution supports; standardization; appropriate programming languages and
coordination models.
      </p>
      <p>Decentralization and openness are inherent properties of multiagent systems
(MAS). The technologies they provide are thus the right abstraction for developing
Web-oriented applications. Moreover, different works have been proposed to use
Semantic Web technologies (SWT) for representing various dimensions of MAS (e.g.,
interaction protocols, norms, organizations).</p>
      <p>
        Consequently, recent research in MAS have seen an intensive use of Knowledge
representation together with increasing use of SWT. We envision that SWT will
ultimately play a central role in all parts of MAS. Thus far, work combining MAS and
SWT have only been concerned about addressing one dimension of MAS at a time.
Also, they were mostly tackling the agent [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ] and interaction dimensions [
        <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
        ]
to ease communications, especially on domain knowledge. Other works have used
those technologies to model part of the organization structure [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], norms and
commitment [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], reputation [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] and more. The situation shows that it is time to go
beyond these ad hoc solutions and integrate the pieces into a complete
Semantic-Webbased infrastructure. We observe too that none of the mentioned contributions were
really taking advantage of the Web aspect of these technologies, except some Web
service integration. We also want to provide models and specifications for the SS so
that services can uniformly query and reason about DKBS, web services, data, and
ontologies.
      </p>
    </sec>
    <sec id="sec-3">
      <title>A Distributed Knowledge Based System</title>
      <p>The proposed architecture is based on services and is designed to support all the
processes of the system life cycle. That is, the proposed architecture is meant to include all
the concepts necessary to perform all activities related to the life cycle. We shall
adopt a generic, knowledge-based architecture. The enterprise members are
represented by autonomous agents, geographically scattered, which are able to cooperate to
achieve a common business goal.</p>
      <p>The various persons constituting the DKBS, in order to process distributed
knowledge bases, assume the following roles:
 Knowledge Manager: is in the top of the hierarchy, and acts as a project manager,
but in higher levels. It's like a knowledge strategist, cooperating, defining, and
distributing the knowledge to coordinate all the other roles;
 Knowledge Provider: is the owner of human knowledge. It is typically an expert in
the application domain, but could be another person in the organization who does
not have the expert status;
 Knowledge Analyst: uses a range of methods and tools that make the analysis of a
standard knowledge-intensive task relatively straightforward;
 Knowledge System Developer: is responsible for the design and implementation.</p>
      <p>The developer must have a basic background of analysis methods. In knowledge
system development, the main knowledge problems have been solved by the
knowledge analyst. Therefore, this role must have some skills of software
designers;
 Knowledge User: makes use, directly or indirectly, of a knowledge system. Its
interaction with the knowledge base system is important for the project
development and validation;
 Project Manager: manages the project, specially the knowledge engineer and the
knowledge system developer.</p>
      <p>
        In turn, the structure of the system based on knowledge, is shown in Fig. 1. The
main components are [
        <xref ref-type="bibr" rid="ref29 ref30 ref31">29, 30,31</xref>
        ]:
 base of knowledge. Base of knowledge intended for storage of knowledge about
the subject. Its concrete form depends strongly on the chosen model of knowledge
representation. The presence of this component is the main difference between the
systems based on knowledge from other types of programs;
 output machine. Output machine generates a response to the user request using the
knowledge base. Its principle of operation is also dependent on the chosen model
of knowledge representation;
 editor knowledge base – program to change the contents of the knowledge base;
 user interface – the mechanism by which the communication user and the system.
      </p>
      <p>In addition to the agents representing the distributed knowledge base, a SS is
introduced in the MAS community. This agent reacts by seizing deal opportunities present
in the DKBS, and proceed thus to establish the corresponding virtual entities.</p>
      <p>The principle of the Distributed Knowledge Base proposed in this paper is to
depends on a number of ontologies that provide semantic principle: ontologies of events
DKBS (Task Ontology); ontologies of services (Application Ontology); ontology
specialized areas of data systems based on (Domain Ontology). (fig. 2).</p>
      <p>DKBS can be represented as a model of interaction of the main artifacts: clients,
services and SS. Each component in the system is associated with a specific ontology.
SS provides:
 semantic principle, which defines a formal description of information and allows
you to define the following characteristics of services: scalability, semantic
interoperability, formal models of services and ontologies;
 the principle of decision making;
 the principle of distribution, which allows you to aggregate the capabilities of
several computing objects through cooperation.</p>
      <p>
        Considering all the types of ontologies [
        <xref ref-type="bibr" rid="ref32 ref33 ref34">32, 33, 34</xref>
        ], we chose it for three, because
the Application Ontology is a model of a service describes its functional and
nonfunctional characteristics. Domain Ontology is a certain base set of knowledge for
each subject area. Task Ontology keeps information about all the functions and
actions of the system.
      </p>
      <p>Each ontology has its own expressive capabilities depending on their functional
purpose. Ontology-oriented for subject area (Domain Ontology), describe the
dictionary of terms concrete and formal set four end subsets: concepts, relations, axioms and
interpretation functions. Task Ontology consists of a Glossary of terms, specialize
tasks and actions in subject area. Every task has a different status and stages of its
implementation. The main feature for all concepts of the ontology problem is the
time. Application Ontology is the most specific ontology, in addition to all the basic
concepts, contains specialized terms and instances subject area.</p>
      <p>SS includes domain ontology and a set of modules to operate the services and their
ontological description a lot of events we have formed as a set of claims that can be
applied to DKBS and a set of axioms of their appearance.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Structure of Semantic Service in a DKBS</title>
      <p>In each interaction of the SS, the ontology functionality is necessarily preserved. Each
function is characterized by the input (1) and output arguments (2). Correspondingly,
each action SS (3) is characterized by a function of the work with the ontology, the
values of its arguments when you call and the completion of the system.</p>
      <p>f SS  FAkIN  ( fa1IN ,..., fakIN ); k  1,..., K.</p>
      <p>f SS  FAnOUT  ( fa1OUT ,..., faKOUT ); k  1,..., K.
aij  { fk , FAvaliIN , FAval OjUT );i  1,..., K ; j  1,...K; fk  F.
(1)
(2)
(3)</p>
      <p>In the DKBS, the communication and collaboration mechanism between services is
a problem that must be well considered in the design of the SS structure. The
communication and collaboration mechanism covers the message transfer between services,
information exchange between SS and distributed knowledge bases, and the SS
behaviors in the entire process from request submission, request handle, to result return.
These procedures can be summarized as follows:
 SS deploys appropriate services on its local Knowledge Base, performs the
registration on the knowledge bases;
 The retrieval request accesses the system periodically. SS gets retrieval requests
and searches its Knowledge Base.
 SS returns the retrieval result to the system after the search finishes.
 The SS implies a classification and a sort order to the retrieval result according to
its corresponding retrieval request.
 User views the retrieval results on the interface and selects the needed Knowledge.</p>
      <p>With the information about the Knowledge Base embedded in the retrieval result,
the user then contacts the relevant enterprise to obtain the Knowledge.</p>
      <p>The principle of operation of the SS is illustrated in Fig. 3. The knowledge base is
formed from three types of ontologies. The rules for recognizing performance
problems are converted into ontology and the system knowledge base is placed. The
working memory of a SS contains facts that correspond to simple events, composite events,
and identified problems and recommendations. The algorithm for using SS to perform
an analysis is as follows. The initial data is the sequence of events of the system, let's
call it the trace. Trace contains simple events. E The algorithm processes the events of
the route in the order of the time of their occurrence and performs the following cycle:
1. Read the next event from the trace E.
2. Convert it to the concept of ontology and add it to the working memory of the SS.
3. Start the SS. If the new event is a search query, then pick up the relevant answers
in the knowledge base. For an indefinite concept of a simple event, the output
engine consistently executes the rules for constructing composite events, for
constructed fact-composite events, the rules for identifying performance problems.
The result of triggering a SS can be:
(a) adding a new fact-simple event to some of the constructed fact-composite
events;
(b) identification of fact-composite events of working memory for compliance or
non-compliance with the performance problem;
(c) delete or save a new event in the working memory;
(d) search for a saved event.
4. Retrieve the search results from the working memory or offer recommendations to
solve the problem.
e  f , et, EPval, t, d , cs ,
(4)
where f  F - action function;
et - the type of event that sets its parameters et  EP  (ep1,..., epK ) ;
EPval  (v1,..., vK ) - event parameter values;
t - time of the event;
d - event duration;
cs - service code.</p>
      <p>The implementation scheme of the tracer generator is presented in fig. 4. The tracer
generator consists of the following components:
 OntologyGenerator program converts messages into ontology concepts;
 library SM is designed to track messaging between services;
 library Timer provides functions for obtaining current system time with high
accuracy;
 library TracerWriter saves simple events created by the tracer to a trace file.</p>
      <p>Presumably all generator modules are implemented in the Java programming
language.</p>
      <p>The implementation scheme of the SS trace analyzer is shown in fig. 5. The trace
analyzer consists of the following components:
 library UI implements the CC user interface.
 library TraceReader provides reading simple events from trace files.
 library Ontology implements event conversion to ontology concepts.
 library Query generates queries to the SS.
Modern representations of data are changing the ways and forms of communication,
production and consumption of information. The dominance of horizontal relations,
structure-role of information decentralization of all types of data available at any time
on every device. The user should not care about the specific technology used to
provide computing capacity or data storage, so you can say that a user has some
information about the remote resource. DKBS in order to study the data, their processing and
use evolving technologies of the semantic web. The formal model of the DKBS
consists of a set of ontologies; lots of services; a set of events that describe the processes
of the system; SS, a set of composite services and knowledge base. The completeness
and effectiveness of the system is determined by a multitude of ontologies. The main
difference in DKBS is the use of the service approach and ontologies in knowledge
engineering. SS acts as a software agent that regulates the interaction of all
components of the system. SS provides: semantic principle, which defines a formal
description of information and allows you to define the following characteristics of services:
scalability, semantic interoperability, formal models of services and ontologies; the
principle of decision making; the principle of distribution, which allows you to
aggregate the capabilities of several computing objects through cooperation. The
communication and collaboration mechanism of the DKBS covers the message transfer
between services, information exchange between SS and distributed knowledge bases,
and the SS behaviors in the entire process from request submission, request handle, to
result return. The knowledge base is formed from three types of ontologies. The rules
for recognizing performance problems are converted into ontology and the system
knowledge base is placed. The working memory of a SS contains facts that
correspond to simple events, composite events, and identified problems and
recommendations. The algorithm for using SS is discussed in the article. To assess the
performance of the SS attached, create an information system of two components: event trace
generator and event trace analyzer.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Ruzhi</given-names>
            <surname>Xu</surname>
          </string-name>
          , Peiguang Lin, Cheng Liu:
          <article-title>Research on Distributed Knowledge Base System Architecture for Knowledge Sharing of Virtual Organization</article-title>
          . Atlantis Press, pp.
          <fpage>349</fpage>
          -
          <lpage>357</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>2. WEB 3</source>
          .
          <article-title>0 budet pitat'sya stekom tekhnologii blokcheyn [WEB 3.0 will be powered by blockchain technology stack]</article-title>
          . Available at: https://101blockchains.com/ru/web-3-0/ (accessed 01.03.
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Deloitte</surname>
          </string-name>
          projects by
          <year>2025</year>
          that 10%
          <article-title>of global GDP to be built on blockchain applications</article-title>
          . Available at: https://www.freightwaves.com/news/2017/9/2/deloitte (accessed
          <volume>02</volume>
          .09.
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Tanenbaum</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Van Steen</surname>
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Distributed systems</article-title>
          . Pearson Prentice Hall (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Burns</surname>
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Designing Distributed Systems: Patterns and Paradigms for Scalable</article-title>
          ,
          <string-name>
            <given-names>Reliable</given-names>
            <surname>Services. O'Reilly Media</surname>
          </string-name>
          ,
          <string-name>
            <surname>Inc</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Allemang</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
            <given-names>J</given-names>
          </string-name>
          .:
          <article-title>Semantic web for the working ontologist modeling in RDF, RDFS and OWL</article-title>
          . Elsevier Inc. (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Russell</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norvig</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Artificial Intelligence:
          <string-name>
            <given-names>A Modern</given-names>
            <surname>Approach.</surname>
          </string-name>
          Prentice-Hall, Englewood
          <string-name>
            <surname>Cliffs</surname>
          </string-name>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Genesereth</surname>
            ,
            <given-names>M.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ketchpel</surname>
            ,
            <given-names>S.P.</given-names>
          </string-name>
          : Software Agents.
          <source>Communications of the ACM</source>
          <volume>37</volume>
          (
          <issue>7</issue>
          ):
          <fpage>48</fpage>
          -
          <lpage>53</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jennings</surname>
            ,
            <given-names>N.R.</given-names>
          </string-name>
          :
          <source>Intelligent Agents: Theory and Practice</source>
          .
          <source>Knowledge Engineering Review</source>
          <volume>10</volume>
          (
          <issue>2</issue>
          ):
          <fpage>115</fpage>
          -
          <lpage>152</lpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Stoian</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Popirlan</surname>
            ,
            <given-names>C.I.:</given-names>
          </string-name>
          <article-title>A proposal for an enhanced mobile agent architecture (EMA)</article-title>
          .
          <source>In: Annals of the University of Craiova, Mathematics and Computer Science Series</source>
          , vol.
          <volume>37</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>71</fpage>
          -
          <lpage>79</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Tandareanu</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Popirlan</surname>
            ,
            <given-names>C.I.:</given-names>
          </string-name>
          <article-title>A Mobile Agents Approach for Knowledge Bases Processing</article-title>
          . In: Samarati,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Yung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Martinelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Ardagna</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.A. (eds.) ISC</surname>
          </string-name>
          <year>2009</year>
          .
          <article-title>LNCS</article-title>
          , vol.
          <volume>5735</volume>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>32</lpage>
          . Springer, Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Popirlan</surname>
            ,
            <given-names>C.I.</given-names>
          </string-name>
          :
          <article-title>Knowledge Processing in Contact Centers using a Multi-Agent Architecture</article-title>
          .
          <source>WSEAS Transactions On Computers</source>
          <volume>9</volume>
          (
          <issue>11</issue>
          ),
          <fpage>1318</fpage>
          -
          <lpage>1327</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Popirlan</surname>
            ,
            <given-names>C.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stefanescu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Mobile Agents System for Intelligent Data Analysis</article-title>
          .
          <source>In: Proceedings of WSEAS Applied Computing Conference (ACC</source>
          <year>2009</year>
          ), Athens, Greece, pp.
          <fpage>663</fpage>
          -
          <lpage>668</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Popirlan</surname>
            ,
            <given-names>C.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dupac</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An Optimal Path Algorithm for Autonomous Searching Robots</article-title>
          . In: Annals of University of Craiova, Mathematics and Computer Science Series, vol.
          <volume>36</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>37</fpage>
          -
          <lpage>48</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Sycara</surname>
            ,
            <given-names>K.P.</given-names>
          </string-name>
          :
          <article-title>Multiagent Systems</article-title>
          .
          <source>AI Magazine</source>
          ,
          <volume>79</volume>
          -
          <fpage>92</fpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Introduction to Multiagent Systems</article-title>
          . John Wiley and Sons, UK (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kabbaj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Development of Intelligent Systems and Multi-Agents Systems with Amine Platform</article-title>
          . In: Schärfe,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Hitzler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Øhrstrøm</surname>
          </string-name>
          , P. (eds.)
          <article-title>ICCS 2006</article-title>
          .
          <article-title>LNCS (LNAI)</article-title>
          , vol.
          <volume>4068</volume>
          , pp.
          <fpage>286</fpage>
          -
          <lpage>299</lpage>
          . Springer, Heidelberg (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Balachandran</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Enkhsaikhan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Developing Multi-agent E-Commerce Applications with JADE</article-title>
          . In: Apolloni,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Howlett</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.J.</given-names>
            ,
            <surname>Jain</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (eds.)
          <source>KES</source>
          <year>2007</year>
          ,
          <article-title>Part III</article-title>
          .
          <source>LNCS (LNAI)</source>
          , vol.
          <volume>4694</volume>
          , pp.
          <fpage>941</fpage>
          -
          <lpage>949</lpage>
          . Springer, Heidelberg (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Rodrguez</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernndez</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Julin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Corchado</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ossowski</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Botti</surname>
          </string-name>
          , V.:
          <article-title>A THOMAS Based Multi-Agent System for Recommendations and Guidance in Malls</article-title>
          .
          <source>Journal of Physical Agents</source>
          <volume>3</volume>
          (
          <issue>2</issue>
          ),
          <fpage>21</fpage>
          -
          <lpage>26</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Hagras</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Callaghan</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Colley</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Intelligent Embedded Agents</article-title>
          .
          <source>Journal of Information Sciences</source>
          ,
          <fpage>289</fpage>
          -
          <lpage>292</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Bouchachia</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prossegger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <given-names>A</given-names>
            <surname>Bi-Clustering</surname>
          </string-name>
          Agent
          <article-title>-based Approach for Map Segmentation</article-title>
          .
          <source>In: Proceedings of the IEEE Symposium on Intelligent Agents, IA 2009, Part of the IEEE Symposium Series on Computational Intelligence</source>
          , pp.
          <fpage>99</fpage>
          -
          <lpage>105</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>T.</given-names>
            <surname>Klapiscak</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Bordini</surname>
          </string-name>
          .
          <article-title>JASDL: A Practical Programming Approach Combining Agent and Semantic Web Technologies</article-title>
          .
          <source>In Proc. of DALT</source>
          , pp
          <fpage>91</fpage>
          -
          <lpage>110</lpage>
          , (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>M. Hadzic</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Chang</surname>
          </string-name>
          , and P. Wongthongtham:
          <article-title>Ontology-Based Multi-Agent Systems</article-title>
          . Springer (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <article-title>OWL-DL as a FIPA-ACL content language</article-title>
          .
          <source>In Proc. of FOCA</source>
          <year>2006</year>
          , (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Peng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Joshi</surname>
          </string-name>
          , and
          <string-name>
            <surname>R. S.</surname>
          </string-name>
          <article-title>Cost: Agent Communication in DAML World</article-title>
          .
          <source>In Proc. of WRAC</source>
          <year>2002</year>
          , pp.
          <fpage>347</fpage>
          -
          <lpage>354</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>D.</given-names>
            <surname>Okouya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Penserini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Saudrais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Staikopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Dignum</surname>
          </string-name>
          , and
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Clarke: Designing MAS Organisation through an Integrated MDA/Ontology Approach</article-title>
          .
          <source>In Proc. of TWOMDE</source>
          : pp.
          <fpage>55</fpage>
          -
          <lpage>60</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>N.</given-names>
            <surname>Fornara</surname>
          </string-name>
          and
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Colombetti: Representation and monitoring of commitments and norms using OWL</article-title>
          .
          <source>AI Comm</source>
          .,
          <volume>23</volume>
          (
          <issue>4</issue>
          ):
          <fpage>341</fpage>
          -
          <lpage>356</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28. L.
          <string-name>
            <surname>Nardin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Brand˜ao, and</article-title>
          <string-name>
            <surname>J. Sichman:</surname>
          </string-name>
          <article-title>Experiments on semantic interoperability of agent reputation models using the SOARI architecture</article-title>
          .
          <source>Eng. Appl. of AI</source>
          ,
          <volume>24</volume>
          (
          <issue>8</issue>
          ), pp.
          <fpage>1461</fpage>
          -
          <lpage>1471</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>Dzharratano</given-names>
            <surname>Dzh</surname>
          </string-name>
          .:
          <article-title>Ekspertnyye sistemy: printsipy razrabotki i programmirovaniye: per. s angl. K. A</article-title>
          .
          <string-name>
            <surname>Ptitsyna</surname>
          </string-name>
          .
          <article-title>- 4-ye izd. [Expert systems: principles of development and programming]. Moskva, Vil'yams (</article-title>
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Smolin</surname>
            <given-names>D. V.</given-names>
          </string-name>
          :
          <article-title>Vvedeniye v iskusstvennyy intellekt: konspekt lektsiy [Introduction to Artificial Intelligence]</article-title>
          .
          <source>Moskva</source>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Behnam</surname>
            <given-names>Azvine</given-names>
          </string-name>
          , Nader Azarmi, Detlef D.
          <source>Nauck: Intelligent Systems and Soft Computing: Prospects, Tools and Applications</source>
          . Springer (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Gruber Thomas R.:</surname>
          </string-name>
          <article-title>A translation approach to portable ontology specifications</article-title>
          .
          <source>Appeared in Knowledge Acquisition</source>
          , vol.
          <volume>5</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>199</fpage>
          -
          <lpage>220</lpage>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Yu</surname>
            <given-names>Liyang</given-names>
          </string-name>
          :
          <article-title>Introduction to Semantic Web and Semantic Web services</article-title>
          , CRC Press (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34. John Davies, Rudi Studer, Paul Warren:
          <article-title>Semantic Web technologies: trends and research in ontology-based systems</article-title>
          . John Wiley &amp; Sons (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>