Upload
austinfru
View
224
Download
0
Embed Size (px)
Citation preview
8/12/2019 Knowledge Engineering Management
1/90
VOL 7 NO 52009
kNOwLEdgE
ENgINEErINg
aNd maNagEmENT
8/12/2019 Knowledge Engineering Management
2/90
SETLabs BriefingsAdvisory Board
Gaurav RastogiAssociate Vice President,Head - Learning Services
George Eby Mathew
Senior Principal,Infosys Australia
Kochikar V P PhDAssociate Vice President,
Education & Research Unit
Raj JoshiManaging Director,
Infosys Consulting Inc.
Rajiv Narvekar PhDManager,
R&D StrategySoftware Engineering &
Technology Labs
Ranganath MVice President &Chief Risk Officer
Subu GoparajuVice President & Head,Software Engineering &
Technology Labs
knolee PoeeIT SystemsIn the lst thee eces, infomtion technoloy hs evolve n mtue s
epenble online business tnsction pocessin (OLTP) technoloy. Some
tillions of business tnsctions e pocesse coss the ol pe y n it
is no supise tht millions of people hve conence to tust the inteity of
this technoloy. In ition, the lst one ece hs itnesse the vilbility
n iespe use of online nlyticl pocessin (OLaP) tools tht offe
multiimensionl insihts into the ltest entepise infomtion to the business
ecision-mes.
Concuent to the bove evolution, the el of aticil Intellience (aI)
hs one thouh seies of seious chllenes in binin nolee into
utomte esonin n ction. Hoeve, the ecent success stoies in
pplyin aI techniques to specic business poblems hol out pomises tht
this el hs beun to offe cceptble benets to the business community. a
pim shift in infomtion technoloy, teme s knolee Poee IT
(kPIT) systems is nticipte. These kPIT systems shoul enble business uses
- semi-utomticlly o in humn-ssiste ys - to extct, ene n e-use
ctionble entepise nolee. Fo exmple, the nolee of expeience
pofessionls ho cn inose n epi complex enineein tifcts ith
expet sills ho constitute smll pecente cn be me vilble to novices
ho constitute le pecente, in n ttempt to ise the pouctivity n/
o qulity of the novice oup. knolee Enineein is citicl spect of
kPIT systems. an this iscipline coves moels to epesent vious ins ofnolee n techniques to extct, ene n e-use such nolee, hee
n hen equie.
This issue ims to pesent lnscpe pictue of emein tens in business
pplictions of nolee enineein tht cn potentilly empoe entepises
to be smt. Be it the use of iveent teminoloy to efe to common
business concepts coss entepise IT systems o the use of omin-specic
nolee to utomticlly extct nncil t fom complex unstuctue
souces, the ultimte ol of nolee enineein is to enble entepises
move fom the titionl y of mnin entepises to tht of nolee-
oiente n nolee-poee mnement. all the ppes in this collection
eve oun vey potent theme nolee-poee systems fo shp
ecision min n efcient mnement.
we hope you enjoy ein this issue s much s e hve in puttin it toethe
fo you. Neeless to mention, you feebc ill help us in ou pusuits to
bin insihts into technoloy tens to you thouh specil issues of SETLbs
Biens such s this one. Plese o ite in to me ith you comments n
suestions.
rvi P gothi Phd
guest Eito
8/12/2019 Knowledge Engineering Management
3/90
3
13
23
31
39
47
53
61
69
81
83
SETLabs BriefingsVOL 7 NO 5
2009
Literature Review:Applications of Collaborative Multi-Agent Technology toBusiness: A Comprehensive SurveyBy Ravi Gorthi PhD, Niranjani S, Anjaneyulu Pasala PhD and Arun Sethuraman
Multi-agent systems have the potential to revolutionize the way businesses operate today. Theauthors discuss innovative ways to apply the intelligent systems in the most effective manner toease business communication bottlenecks and speed up decisions therein.
Research:Building Knowledge-Work Support Systems with InformationWarehousesBy Arijit Laha PhDKnowledge can be accessed and interpreted in countless ways. A knowledge managementsystem falls flat if the socio-cultural-behavioral aspects of knowledge workers and users arenot considered. A task-based knowledge management (TbKM) approach and an InformationWarehouse (IW) can open up a host of possibilities in the field of knowledge management,asserts the author.
Insight: Whats in a Name?
By Yogesh Dandawate and John KuriakoseBusiness knowledge is encapsulated in business ontology. Creating business ontologiesafresh is a gargantuan task. The authors draw from their vast experience and suggest thatorganizations that dig into IT artifacts from their existing IT portfolio can build suchontologies wi th ease.
Opinion:Knowledge Management for Virtual TeamsBy Manish Kurhekar and Joydip GhoshalVirtual teams are the order of the day and how one leverages KM tools to smudge the physicalboundaries is what becomes a key differentiating factor. The authors document a plethoraof ways to exchange knowledge in a virtual team setup and win over the challenges of virtualinteractions.
Viewpoint:Toward Disruptive Strategies in Knowledge Management
By Rajesh Elumalai and George AbrahamKM tools and technologies have become imperative to the survival of any organization today.The authors suggest that it is time to revisit the conventional methods that are prevalent todayand work around strategies to maintain a competitive edge in the market.
Perspective:Knowledge Engineering for Customer Service OrganizationsBy Rakesh Kapur and Venugopal SubbaraoCustomer service providers need to update themselves with every new invention andtechnology that hits the market. To stand out in the crowd of service advisors, a differentiatedservice can be accelerated and aided with the help of knowledge engineering solutions, feelthe authors.
Model: Support to Decision Making: An ApproachBy Sujatha R Upadhyaya PhD, Swaminathan Natarajan and Komal KachruTools empowered with a Bayesian inference engine can support decision making in uncertain
situations. The authors suggest that such automated support can effectively reduce analysistime and accommodate flexibility in business decision making.
Methodology: Automated Knowledge-Based Information Extraction fromFinancial ReportsBy Bintu G Vasudevan PhD, Anju G Parvathy, Abhishek Kumar and Rajesh BalakrishnanFinancial data is often stored in tabular form. Information stored in financial statements anddocuments can throw up brilliant analysis if extracted and mined properly. A methodologythat can mine such text residing in images and similar such unstructured data can affectinvestment decisions, avoid pitfalls and reap huge pecuniary benefits, claim the authors.
Case Study: A Differentiated Approach to Business Process Automation usingKnowledge EngineeringBy Ashish Sureka PhD and Venugopal Subbarao
Manual processing of data, be it structured or unstructured, is bound to be cumbersome anderror prone. The authors suggest an application that is developed on a requirement that liesat the intersection of business process automation, knowledge engineering and text analyticsand promises to gather relevant data at a lightning speed.
The Last Word:Power Your Enterprise with Knowledge. Be Smart.By T Ravindra Babu PhD
Index
8/12/2019 Knowledge Engineering Management
4/90
Making business decisions under uncertain situationscan be a big pain. Thankfully, Bayesian networks
through their superior knowledge representation andinference methods come to the decision makers aid.
Sujatha Upadhyaya PhDResearcher, Information Management Group
SETLabs, Infosys Technologies Limited
In a world increasingly dictated by change, it is importantfor organizations to move away from people-dependentoperations to system-dependent ones. A sturdy knowledge
management system comes in handy in negotiating todaysall pervasive change.
Rakesh KapurPrincipal ConsultantConsulting Services, Infosys Technologies Limited
8/12/2019 Knowledge Engineering Management
5/90
3
SETLabs BriefingsVOL 7 NO 5
2009
Applications of Collaborative Multi-Agent Technology to Business:
A Comprehensive Survey
By Ravi Gorthi PhD, Niranjani S, Anjaneyulu Pasala PhD and Arun Sethuraman
Intelligent, multi-agent technology offers a hostof new opportunities to businesses across industry
and business segments
The collaborative, intelligent, multi-agenttechnology has witnessed a considerableattention in recent years. This technology
promises to offer a host of new opportunities to
business communities in almost all the vertical
industry and horizontal business segments.
Applications built using these technologies
enable dynamic data and information acquisition,
aiding planning and decision making. In thispaper, an attempt has been made to present a
landscape of plausible applications, which could
be very useful to the current CxOs of enterprises
in planning future business strategies.
MULTI AGENT SYSTEMS (MAS) :
BACKGROUND
An intelligent agent is a distinct kind of
software program concept that has a goal,
has knowledge of one or more domains of
relevance, is autonomous (pro-active) in
achieving its goal, is reactive to the changes to
the environment in which it pursues its goal
and is capable of communicating with humans
and other agents [1, 2]. These agents possess
basic characteristics like (i) role to play, (ii) one
or more goals to achieve, (iii) capability to take
actions autonomously, (iv) capability to monitor
the environment periodically and pro-actively
and effect changes, if required, (v) capability tosense and react to the changes to environment,
and (vi) capability to communicate with
humans, and extended characteristics like (i)
specic knowledge in one or more subjects, (ii)
capability to communicate and collaborate/
compete with other agents, (iii) ability to be
mobile and move around in the environment,
if needed, to achieve the goals [3].
Henceforth in this paper, the term
agent refers to a software agent with the above
mentioned basic and/or extended characteristics.
8/12/2019 Knowledge Engineering Management
6/90
4
Simple problems can be solved byagents with basic characteristics whereas
complex problems require multiple intelligent
agents that collaborate and/or compete among
themselves. Systems built using the extended
characteristics are known as multi-agent
systems (MAS) [4].
Some popular applications of MAS are:
Multiple agents with different roles
collaborate among themselves to
continuously monitor road trafc and
effect changes to signal durations at
road intersections in order to improve
trafc ow [5]
A personal assistant agent (residing on a
mobile wireless connected device of its
owner) detects and interacts with other
similar agents of a local social-network
in a geography and offers a variety of
services of interest to its owner [6]
A set of agents with different roles
collaborate among themselves in a
supply-chain management environment
leading to enhanced productivity and
quality [7, 8].
PRIOR SURVEYSA survey on applicat ions of agents in
telecommunications describes how (i) agents
in Integrated in Service Provision help in
mediating all personal communication from
different media sources with specific user
needs, (ii) agents help in automating some
of the network management and supervision
tasks, and (iii) agents help distributed problem
solving [9].
Abbott and Siskovic discuss the
various ways in which agents can be used
in managing the network resources, inconfiguring software programs, in the
maintenance and repair of software programs,
in e-mail filtering, network monitoring and
protection, etc [2].
A survey on applications of agents
in medical science presents agents-based
Intelligent Decision Support Systems (IDSS)
in areas of clinical management and clinical
research [10]. The study also analyzes the
applications of agents-based IDSS in Neonatal
Intensive Care Unit (NICU).
Mladenic shares a survey on the
applications of agents in text analytics and
learning where machine learning approaches
viz., content-based approach and collaborative
approach, with various user interface agents
have been discussed [11].
A survey carried on Distributed
Articial Intelligence (DAI) illustrates how
multi-agents coordinate with each other in
accomplishing complex tasks and handling
conicting situations. It also discusses game
theory involving inter-agent cooperation [12].
Yet another survey by Kowalczyk et al., narrates
various short overviews on intelligent and
mobile agents in e-commerce [13].
Tveit describes an overview of agent
oriented software engineering [14]. Hoekstra
offers a survey on the usage of intelligent agentsin dynamic scripting, genetic algorithms and
neural networks for video games business [15].
However, given the possibility that
future ITES is likely to heavily depend on
and utilize the collaborative MAS technology,
the details offered by the above surveys
are found to be inadequate. CXOs require a
comprehensive and latest view on the landscape
of applications of MAS technology to various
vertical and horizontal business segments. Our
survey addresses this need.
8/12/2019 Knowledge Engineering Management
7/90
5
APPLICATIONS OF MULTI-AGENTTECHNOLOGY
There is evidence of fairly exhaustive surveys
on the applications of MAS technology to
various vertical industrial segments such as
banking and capital markets [16, 17, 18], travel
and tourism [19, 20, 21], telecommunications
[6], transportation and services [22] and
bioinformatics [23, 24, 25] and horizontal
business domains such as knowledge
management [26], supply chain management
[7] and software project management [27, 28,
29, 30]. The subsequent sub-sections present a
landscape view of these applications.
Application of MAS Technology in Vertical
Industry Segments
Banking and Capital Markets
The rapid growth of e-commerce in recent
years has given rise to concerns in the area
of tax evasion and mitigation. Wei et al., [16]
explore and exploit the power and features
of mobile, multi-agent technology to offer a
new solution to this taxation problem, even
while preserving the privacy of the purchaser.
The authors propose the use of five types
of mobile agents, viz. purchaser agents,
seller agents, bank agents, tax agents and
certification agents, that interact with each
other in the creation and tracking of ElectronicInvoice (EI) and Electronic Tax Voucher (ETV)
leading to efficient and simplified e-commerce
taxation mechanism. The authors simulated
the proposed solution using IBMs Aglet
workbench.
The phenomenal growth in the area
of mobile wireless network users has led to
a great opportunity for the banking industry
to offer mobile banking services such as the
capability for the users to perform various
banking transactions viz., seek account balance,
get alerts on changes to bank accounts, performmoney transfers, pay utility bills, etc., through
their mobile devices. Adagunodo et al., present
an Interactive SMS Banking Agent based
innovative, incrementally scalable, mobile
banking solution [17]. In this solution, the real
time (24 hours a day and 7 days a week) SMS
banking agents run on a server (thus avoiding
the need for distribution and deployment) and
offer a range of banking transactions through
SMS facility on mobile devices.
There are many areas of social operations
such as visiting a restaurant, a hospital, an
entertainment park or a theater, where users
would like to know dynamically and easily
about the availability of resources. Muguda et
al., in their paper describe a very interesting
application of mobile agents [18]. They discuss
their experiments to characterize and model
the benets of planning in such environments,
where resources can be reserved and such
reservations can be traded in a market place.
Travel and Tourism
If people can dynamically get details on their
mobile wireless network enabled handheld
devices about a historical place, monument
or a piece of art work that they are currently
looking at, it can be of immense value to them.
Bombara et al., offer details of a multi-agentbased system called KORE that aims to address
the above need and provide a personal guide
to assist museum visitors through the visitors
wireless connected handheld device [19]. KORE
was developed as a prototype using Java Agent
Development Environment (JADE) to work on
Palm m505 PDA and consists of:
Main museum server, that has global
information database with details of all
the works of art in the museum
8/12/2019 Knowledge Engineering Management
8/90
6
Information service agents that provideaccess to main museum database
A set of zonal servers that have a
database with details on works of art
in that particular zone along with zone
information agents that are responsible
for managing the database
Beamer agents that drive the IR beamers
User mobile agents that use WAI (Work
of Art Identier) from IR beamers and
provide information based on Users
Preferences.
Tourists visiting a particular city would
like to dynamically receive details such as
places to visit, restaurants nearby, visiting
hours of a tourist spot, etc., on their mobile
devices.
Lopez and Bustos describe a multi-agent
system architecture that provides services like
obtaining up-to-date information on places of
visit and planning for a specic day in tourism
industry [20]. This MAS system architecture
consists of broker agents, sight agents, user
agents and a planning agent. Communication
among these agents is based on a common
ontology. Various services like search, reserve,
plan a specific day and register have been
provided to the users. When a user requires
details on places of visit, she uses variousservices provided by a user agent. Then the
user agent sends a REQUEST message to
a broker agent, that in turn processes and
forwards message to sight agents that match the
parameters and return a set of results that match
the users requirements containing relevant
information about each site. In order to reserve,
the user agent sends PROPOSE message with
required information to a sight agent, which
then reserves the bookings or sends refusal
if reservation is not possible. A plan agent
presents plans on receiving a REQUESTmessage from the user agent such that time
can be managed efciently throughout the day.
The authors have developed a prototype and
implemented it using JADE-LEAP platform on
Hewlett Packard iPAQ 5450 that has Bluetooth
and 802.11b onboard to run the user agents.
S i m i l a r l y , B a l a c h a n d r a n a n d
Enkhsaikhan present the use of MAS technology
in automating various services in travel industry
involving airline tickets, hotel accommodations,
taxi services, etc [21]. These agents communicate
with each other and negotiate the services to
provide an optimal solution to a customer. The
different types of agents used in creating this
MAS based application are:
Business agents such as travel agents,
ight agents, hotel agents, car agents
that are specialized assistant agents for
the customer using this system
Database agents that are responsible for
performing all database operations such
as queries and updates.
Transportation Services
Increasing population has led to increase in
traffic. There are limited parking spots in
busy commercial localities, malls, ofces andcolleges. People spend a lot of time nding a
parking space.
To address this problem of finding
parking space Ganchev et al., have demonstrated
a multi-agent based system solution wherein a
set of different types of agents collaborate to
automatically and dynamically locate a parking
space in a university campus. These ideas can
be extended to offer similar service in other
locations of public interest. The system can
inform the user through her mobile wireless
8/12/2019 Knowledge Engineering Management
9/90
7
connected device [22]. The authors presenteda detailed three tier architecture of this
solution consisting of: user mobile devices,
geographically dispersed InfoStations and a
central InfoStation center. Different types of
agents mounted on these devices or systems
collaborate through WPAN or Wi-Fi or Wi-Max
connections. In this solution, a user makes a
request for a parking slot through the mobile
device. This request will be forwarded to
the nearest InfoStation by the personal agent
residing on the users mobile device. If the
nearest InfoStation cannot conrm a parking slot
in its geography, it escalates the request to the
InfoStation center which then locates the near
optimal parking slot if available and informs
the personal agent of the user. This system
was implemented using JADE framework and
LEAP module that facilitate implementation of
agents on mobile devices. One can imagine that,
in future, it is possible to make such a personal
agent intelligent and proactive whereby (i) it
can examine the plans of its owner in advance
and proactively collaborate with appropriate
InfoStations and reserve parking slots, and
(ii) dynamically negotiate changes to these
reservations by sensing changes / delays to the
plans of its owner.
Roozemond and Rogier discuss the use
of intelligent agents to build traffic controlsystems that pro-actively bring changes in real
time to various trafc scenarios [5]. Information
agents collect information about weather, trafc
jams, public transport, route closures, best
routes and various parameters that control
trafc via a secure network and send it to the
user and the control stations. Signal durations
would hence be determined based on the
measured and predicted data. Trafc regulation
and tuning is done with coordination among
adjoining agents.
BioinformaticsThe adoption of multi-agent systems constitutes
an emerging area in bioinformatics [23]. In fact,
a working group on Agents in Bioinformatics
(BIOAGENTS) was founded during the rst
AgentLink III Technical Forum meeting held
in July 2004, with a purpose to explore agent
technology and develop new exible tools for
(a) analysis and management of data, and (b)
for modeling and simulation of computational
biology.
GeneWeaver is a multi-agent system
comprising of a community of agents, having
ve distinct roles, that collaborate with each
other in order to automate the processes
involved in bioinformatics [24].
Armano G et al., describe a multi-
agent system for Protein Secondary Structure
Predict ion (PSSP) by a populat ion of
homogenous experts [25]. The authors discuss
how multi-agent technology is a very good t
to address the problems of PSSP.
Telecommunication
The advent of wireless connected mobile
devices has enabled human beings to be
connected with other humans and information
systems anytime, anywhere. Such a paradigm
shift in connectivity coupled with the MAS
technology is showing a phenomenal potentialfor a new set of social and business applications.
Bryl et al., have used multi-agent
technology and Bluetooth enabled mobile
devices to create and use ad-hoc social networks
[6]. These social networks can hence be used
to provide access to a variety of services that
allow users of a locality to interact and transact
in areas of mutual interest, such as buy and
sell books in a university campus. A generic
architecture of independent servers is presented
where multi-agent platforms can be installed
8/12/2019 Knowledge Engineering Management
10/90
8
and agents can act on behalf of their users.Each server is meant to offer one or more specic
services (e.g., buy and sell books) of interest to
the geographic area in which it is located (e.g.,
a university campus). The strength of this
architecture is that it is (a) domain independent
where each server can offer different services
relevant to its location, and (b) independent
of the MAS technology used (one can use
different MAS technologies such as JADE on
each server). A prototype with buy/sell books
service has been developed and implemented
using JADE and tested using Nokia 6260 and
PC/Server equipped with Tecom Bluetooth
adapter. Bluetooth communication has been
implemented using Blue Cove which is an open
source implementation of the JSR-82 Bluetooth
API for Java.
Application of MAS Technology in Horizontal
Business Segments
Knowledge Management
Knowledge Management (KM) is gaining
importance in large organizations owing to their
geographically distributed operations spread
across different time zones. Such organizations
are increasingly tapping into global markets on
the one hand and resources on the other. KM
systems attempt to offer the latest knowledge
of the enterprise knowledge extracted andcreated from structured and unstructured
sources - to the employees who need it.
Houari and Far offer a comprehensive
methodology to build such a sophisticated
KM system using the multi-agent systems
technology [26]. They discuss how a KM
system built using agents with distinct roles,
cooperation and communication capabilities,
intelligence, autonomy and shared ontologies
can be used to achieve better utilization of
knowledge in decision-making.
Supply Chain ManagementA typical supply-chain manager is responsible
for (a) managing the optimal arrival and
stocking of a range of input materials from
different sub-contractors, and (b) the integration
and processing of the input materials to
produce and deliver a variety of finished
products to the clients. The management of this
responsibility in todays world is still human
centric. The supply chain manager and her
team interact with the teams representing the
sub-contractors, enterprise production units
and the clients. These interactions are known
to involve many tedious tasks that are error
prone. In addition to that, the lack of latest
information from all these sources can impact
cost, productivity and quality of products
delivered to the clients.
To achieve better coordination in the
flow of information among the sub-services
of a supply chain management, Wang et
al., propose the use of a variety of software
agents [7]. The problem of coordination among
sub-services is modeled as a distributed
constraint satisfaction problem which is solved
collaboratively by the group of software
agents. The steps involved in this solution
methodology are as follows:
Decomposing customer requirementsinto a set of services represented by a
business process or plan. This can be
achieved by means of any workflow
representation or hierarchical task
network (HTN) wherein each task is
broken down into sub-tasks and uses
task-reduction rules to decompose
abstract goals into lower level tasks.
Find and coordinate the actors that
would be fullling these services.
8/12/2019 Knowledge Engineering Management
11/90
9
These steps are achieved by creatingmultiple service dispatcher agents, service
broker agents and service provider agents.
The requirements are initially analyzed by
the dispatcher agent, based on the customers
requirements and history of customer requests.
Following this, each service broker agent
forwards the request to service providers for
collecting bids or solutions to the request. Once
all the bids are received, the next step is to
lter the dominated solutions and then identify
compatible and promising solutions. The nal
step is to rene constraints for a global solution
by means of communications between the
various service broker agents, thereby achieving
coherence and coordination.
Kern et al., discuss on how intelligent
software agents can help humans in carrying
out different tasks involved in supply chain
management [8]. Their project, titled as
MobiSoft, proposes a new form of supply-chain
management. In their approach, a mobile device
based software agent that performs the role of
a personal assistant is provided to each of the
humans involved in the supply-chain process
ow. These personal assistant agents interact
and collaborate to reduce human errors and
provide latest information to their owners
anytime, anywhere thereby enabling the teams
to achieve higher levels of productivity andquality.
Software Project Management
An important characteristic of business
management is the use of dialogues by a
community of professionals to solve problems.
One of the serious problems confronting the
business managers, in their problem solving
and decision making endeavor, is the high
degree of dependency on human interactions
and the high degree of manual interpretation
of dialogues by humans. Such a dependencyon manual intervention lends itself to problems
that can result from (i) the unpredictable,
inconsistent egoistic behavior of humans that
one witnesses time to time, (ii) the drop in
efciency of humans under stressful situations,
or (iii) the use of less experienced/qualied
humans for managing tasks due to lack of
sufcient number of adequately skilled human
resources.
Sethuraman et al . , i l lustrate the
application of MAS technology to one such
business management task, viz., software
project management (SPM) [27]. The authors
discuss the various sub-tasks of SPM that can
get benetted from the use of MAS technology.
They use the task of Quality Review which is
initiated and completed at the end of each phase
of the software lifecycle and demonstrate how
a set of personal assistant agents assigned to
each (a) software engineer, (b) quality assurance
reviewer, (c) quality assurance manager and (d)
software project manager, collaborate among
themselves and manage the Quality Review
task efciently. The agents manage many steps
of the process of Quality Review but do not
perform the sub-task of actually reviewing the
artifacts. The main advantages brought out by
this research are (i) productivity improvement,
as the agents perform many mundane tasks thatotherwise consume the time of experienced
software professionals, and (ii) consistency of
ensuring that the task of Quality Review is
initiated and completed at the right time and
any incompleteness is recorded and escalated
in time.
Petr ie et a l . i l lustrate how MAS
technology can be utilized for propagation
of dynamic knowledge, such as designs and
plans that are changed according to the status
of project execution, between the project
8/12/2019 Knowledge Engineering Management
12/90
10
designers and planners, such that the effectsof changes are communicated properly [28].
The effort is concentrated on provision of
support for complex projects, where it is crucial
to communicate changes to necessary actors
on time, also termed as Distributed Integrated
Process Coordination. The authors characterize
their coordination model as a logical set of
dependencies among the project elements
that can be used to determine the effects of
changes within the project. To implement
this, Redux dependencies model was used,
which tracks validity within the dependency
model and notifies designers as and when
changes occur. They exhibit this by means of
a central facilitating event which uses these
Redux dependencies for decision making and
propagation. They conduct a case study by
means of a building construction example.
Nienaber et al., talk of a comprehensive
black-box model of a generic agent framework
that could be used in different phases of
software project management [29]. The paper
discusses the creation of personal assistant
(PA) agents, messaging agents, task agents,
monitoring agents and team manager agents.
A multi-agent system comprised of these
types of agents is used in the framework
to support various aspects of SPM, such
as scope management, time management,cost management, quality management,
human resource management, communication
management and risk management. The paper
discusses the prototype design of the system
and proposes the development of the same
using JADE framework.
Pitt et al., describe the design and
implementation of a CEC GOAL project, that
aims at development of generic software tools
to support distributed project management,
which is collaborative, decentralized and inter-
organizational [30]. The authors propose theuse of autonomous software agents to provide
for normalization of inter-organizational
terminology and f low of information,
structuring of inter-organizational interactions
with respect to contracts and working practices
and also to enable each organization to provide
or use services required or offered by other
organizations. It uses a distributed review
process as an example to exhibit the application
of an agent system with behavior specified
by means of decision logic. They consider a
quality control scenario, where the deliverables
are largely technical papers. The project ofce
aims to assure quality of the papers by means
of getting them reviewed by at least three
reviewers. Hence a call for participation for
performing this review is sent out, followed by
an announce and negotiate way of aiding this
review process.
CONCLUSION
MAS is found to be increasingly adapted by
various industry verticals and horizontal
business segments. There is an important
need to present a comprehensive survey of
the current and potential future applications
of MAS technology, which is undertaken
in this paper. The landscape of case studies
discussed in this survey points to a host of newopportunities to various business communities.
REFERENCES
1. M Wooldridge, An Introduction to
Multi-Agent Systems, John Wiley &
Sons, 2002
2. L Abbott and H Siskovic, Intelligent
Agents in Computer and Network
Management. Available at http://
teachnet .edb.utexas.edu/~lynda_
abbott/webpage.html#intagt3
8/12/2019 Knowledge Engineering Management
13/90
11
3. G Weiss, Multi Agent Systems: A ModernApproach to Distributed Artificial
Intelligence; The MIT Press, 2001
4. Multi-agent Systems. Available at
http://www.cs.cmu.edu/~softagents/
multi.html
5. A R Danko and J L H Rogier, Agent
Controlled Traffic Lights, ESIT 2000,
14-15 September 2000, Aachen, Germany
6. V Bryl, P Giorgini and S Fante, An
Implemented Prototype of Bluetooth-
based Multi-Agent System, Proceedings
of WOA05, 2005. Available at http://
lia.deis.unibo.it/books/woa2005/
papers/21.pdf
7. M Wang, H Wang and J Liu, Dynamic
Supply Chain Integration through
Intelligent Agents, System Sciences,
2007. HICSS 2007, 40th Annual Hawaii
International Conference, January 2007
8. S Kern, T Dettborn, R Eckhaus, Yang
J, C Erfurth, W Rossak and P Braun,
Assistant-based Mobile Supply Chain
Management , 13 th Annual IEEE
International Symposium and Workshop
on Engineering of Computer Based
Systems, 2006
9. A Survey on Intelligent Agents in
Telecommunications. Available at
https://www.cs. tcd. ie/research_groups/aig/iag/survey.html
10. D Foster, C McGregor and S El-Masri,
A Survey of Agent-Based Intelligent
Decision Support Systems to Support
Clinical Management and Research.
Available at http://www.diee.unica.it/
biomed05/pdf/W22-102.pdf
11. D Mladenic, Text-Learning and Related
Intelligent Agents: A Survey, Intelligent
Systems and their Applications, IEEE,
1999, Vol 14, No 4, 1999
12. Surprise 95 Inte lligen t Agen ts andArticle 1. Available at http://www.
doc.ic.ac.uk/~nd/surprise_95/journal/
vol1/jjc1/article1.html
13. R Kowalczyk, M Ulieru and R Unland,
Integrating Mobile and Intelligent
Agents in Advanced e-commerce:
A S u r v e y . A v a i l a b l e a t h t t p : / /
c i t e s e e r x . i s t . p s u . e d u / v i e w d o c /
summary?doi=10.1.1.11.4636
14. A Tveit, A survey of Agent-Oriented
Software Engineering, First NTNU
CSGSC, May 2001
15. C Hoe kstra, Adaptive Artifi cially
Intelligent Agents in Video Games: A
Survey, UNIAI-06
16. D Wei, Z Gan and J Zhang, A Mobile-
Agent-Based E-Commerce Taxation
Model, Computational Intelligence and
Security, 2006, Vol 1
17. E R Adagunodo, O Awodele and O
B Ayayi, SMS Banking Services: A
21st Century Innovation in Banking
Technology, Issues in Informing Science
and Information Technology, Vol 4, 2007
18. N K Muguda, Peter R Wurman and
R Michael Young, Experiments with
Planning and Markets in Multi-agent
Systems, Proceedings of the Third
International Joint Conference onAutonomous Agents and Multi-agent
Systems, Vol 3, July 2004
19. M Bombara, D Cal and C Santoro, KORE:
A Multi-Agent System to Assist Museum
Visitors, Proc. Workshop Objects and
Agents (WOA 03), Pitagora Editrice
Bologna, 2003
20. J S Lopez and F A Bustos, MultiAgent
Tourism System: An Agent Application
on the Tourism Industry, Proceedings
of the International Joint Conference
8/12/2019 Knowledge Engineering Management
14/90
12
IBERAMIA/SBIA/SBRN 2006, 1stWorkshop on Industrial Applications
of Distributed Intelligent Systems
(INADIS2006), Ribeirao Preto, Brazil,
October 2328, 2006
21. B M Balachandran, M Enkhsaikhan,
Development of a Multi-Agent System for
Travel Industry Support, Computational
Intelligence for Modeling, Control and
Automation, 2006 and International
Conference on Intelligent Agents, Web
Technologies and Internet Commerce,
International Conference, Sydney, 2006
22. I Ganchev, M ODroma and D Meere,
Intelligent Car Parking Locator Service,
International Journal Information
Technologies and Knowledge, Vol 2, 2008
23. A E Merelli, B G Armano, A N Cannata,
A Corradini, C M Dinverno, D A Doms,
E P Lord, F A Martin, G L Milanesi, H
S Mller, D M Schroeder and I Luck,
Agents in Bioinformatics, Computational
and Systems Biology. Available at
http://citeseerx.ist.psu.edu/viewdoc/
summary?doi=10.1.1.101.3003
24. K Bryson, M Luck, M Joy and D Jones,
Applying Agents to Bioinformatics in
Geneweaver, in Cooperative Information
Agents IV, Lecture Notes in Articial
Intelligence, Springer-Verlag, 200025. G Armano, G Mancosu, and A Orro,
A Multi-agent System for Protein
Secondary Structure Prediction, in
NETTAB Models and Metaphors fromBiology to Bioinformatics Tools, pages
1929, Camerino, Italy, 57 Sept 2004
26. N Houari and B H Far, Application
of Intelligent Agent Technology for
Knowledge Management Integration,
P r o c e e d i n g s o f t h e T h i r d I E E E
International Conference on Cognitive
Informatics, 2004
27. A Sethuramam, K K Yalla, A Sari and
R P Gorthi, Agents Assisted Software
Project Management, Annual Bangalore
Compute Conference, Proceedings of
the 1st Bangalore Annual Compute
Conference, January 2008
28. C Petrie, S Goldmann and A Raquet,
Agent-Based Project Management,
Proceedings International Workshop on
Intelligent Agents in CSCW, Dortmound,
1998
29. R C Nienaber and A Barnard, A Generic
agent Framework to Support the Various
Software Project Management Process,
Interdisciplinary Journal of Information,
Knowledge and Management, Vol 2,
2007
30. J Pitt, M Anderson and R J Cunningham,
Normalized Interactions Between
Autonomous Agents: A Case Study in
Inter-organizational Project Management,Computer Supported Cooperative Work:
The Journal of Collaborative Computing,
Vol 5, 1996.
8/12/2019 Knowledge Engineering Management
15/90
13
SETLabs BriefingsVOL 7 NO 5
2009
Building Knowledge-WorkSupport Systems with Information
WarehousesBy Arijit Laha PhD
Efficient access to relevant information canenable your knowledge worker perform complex
tasks with seamless ease
Knowledge Management (KM) today can beseen as a key focus area within all leadingknowledge driven organizations. Several
initiatives are taken up within organizations
to manage knowledge. However, despite
all the money spent and the efforts put in
by organizations to achieve effective KM
capabilities, the results till date are far from
stellar. The overall situation led Maier to
observe the solution is still not there andmany businesses trying to implement these
technologies have been frustrated by the fact
that the technologies certainly could not live up
to the overly high expectations [1].
Much of the problems stem from the
multi-faceted nature of knowledge management
systems (KMS) that not only involve information
technology, but the social, cultural and
behavioral aspects of the organization as a
whole, as well as of various user communities
within the organization [2]. Usually there exists
signicant diversity of the above factors across
organizational subunits within an organization
[3]. This tends to render the universalistic
approach of organizational KM less effective [4].
In recent years, a host of extensive
ethnographic studies, where the researcher
becomes part of the environment and culture
under study and makes rst-hand observations
over an extended period of time, have been
published to demonstrate the effectiveness ofKM practices in various organizations [4, 5]. All
these studies, among other interesting ndings,
emphasize the necessity of building KMS to
cater to the needs of knowledge workers such
that it directly affects the way they perform a
task. Such task-oriented approach of knowledge
management is called the task-based knowledge
management (TbKM) [5, 6].
Burstein and Linger, based on their
extensive field works, positioned TbKM as a
robust framework suitable for studying and
8/12/2019 Knowledge Engineering Management
16/90
14
analyzing the characteristics of knowledge-intensive tasks [6]. They define a task as a
substantially invariant activity with outcomes,
including tangible outputs. A task is performed
by socially situated actors. Burstein and Linger
use the term knowledge work referring to the
collection of activities that constitute a task. They
have also outlined a conceptual architecture
of KMS supporting the workers in performing
tasks. This clearly makes a huge paradigm shift,
changing the focus to task instead of organization.
As a consequence, the designer of a KMS, instead
of studying the KM requirements of an entire
organization in all its diversity, can study the
requirements of individual workers or community
of workers involved in performing specic classes
of tasks and design system supports adapted to
the task-specic characteristics.
In TbKM, a KMS designed for supportinga targeted task or task-type is called a knowledge
work support system ( KWSS) [6]. TbKM can be
viewed as a framework for developing KWSS,
each supporting a single targeted task or task
type. Typical examples of such task-types are
survey design, dictionary construction, weather
forecasting, etc. [6]. In large organizations, there
is a bulk of knowledge-intensive tasks involving
planning, decision-making and many other
creative and reflective requirements where
suitable KWSS can be of great value. However,
due to the scale and complexity of such tasks,for building effective KWSS we need to consider
several additional aspects of KWSS that have not
received adequate consideration under TbKM.
EFFICIENCY AND RELEVANCE: THE
CONTEXT
This paper looks into the problem of providing
the knowledge workers efcient access to relevant
information. In the process, the discussion will
also delve on developing a novel approach for
building a very advanced information archive
called the information warehouse (IW) to
meet the requirements of knowledge workers
performing complex tasks using KWSSes.
As indicated above, the two operative
terms vis--vis information access here are
efcientand relevant. In conventional information
management systems the unit of creation, archivaland retrieval of information is whole document.
On the other hand, according to TbKM, a task is
a system of activities consisting of structure and
processes. Structure refers to the composition
of the task in terms of smaller activities and the
processes encapsulate the interrelation of the
activities. It is easy to see that a knowledge worker
engaged in performing a task, at any given time, is
actually engaged in performing an activity as part
of the task. Consequently, his/her information
needs are governed by the current task.
A regular search for information often throws up multiple
documents for the knowledge worker to read and decipherrelevant knowledge
8/12/2019 Knowledge Engineering Management
17/90
15
However, the worker, while seekinginformation, receives a set of whole documents,
some of which, depending on the precision of
the IR system, typically contain information
useful to the worker, embedded in relatively
small portions. Nevertheless, to access the
information, the worker needs to read a number
of (ideally all) whole documents retrieved,
which puts enormous demand on the cognitive
ability of the worker as well as on the available
time to her. Further, in todays environment,
where availability of multiple IT-enabled
archives of enormous volumes is common in
organizations, the worker faces serious threat
of information overload.
The most crucial support an information
system can provide to a knowledge worker
is the access to information that the worker is
likely to nd relevant and thus useful. However,
judgment of relevanceis a complex issue involving
situational, topical, cognitive, even social aspects,
many of them being beyond the scope of
information systems [7]. Nevertheless, the context
dened as any information that can be used to
characterize the situation of an entity forms an
important basis of judging the relevance [8].
From the perspective of a knowledge worker, her
current task and the current activity as part of the
task, dictate the most important components of
context. Sufce it to say:The information needed by a knowledge
worker, to make use in the context of her current
task-activity instance, is produced by other
knowledge workers as part of different instances
of task (may be of different types altogether)
performance, within their own contexts.
Thus, to properly use the information,
the current worker, i.e., the consumer, needs
to understand and/or compare the current
context with those of the other workers, i.e., the
producers of information.
While describing different aspects ofIW, this discussion will draw upon various
examples from a patient-care KWSS, under
development, for clearer explanations.
INFORMATION WAREHOUSE (IW)
IW supports archival of contextualized
information and is organized into two layers
the contextualization support and the
task instance (TI) archive that put together
provide the required functionalities [Fig.1].
The contextualization support layer consists of
artifacts that include structural and semantic
denitions of the supported tasks/task-types
and the domain vocabulary. They provide
means to category-based annotations of the
informational elements and are developed as
part of building individual KWSS. On the other
hand, the TI archive contains the information
produced/reproduced by performance of
instances or episodes of supported tasks.
The Contextualization Support: Knowledge
work is defined as the production and
The Information Warehouse
Contextualization Support
Generic
Informational Elements
Domain Semantics/
Vocabulary Theasurus/
Ontology, etc.
Mapping:
Task Elements to Generic
Info Elements
Mapping: Task
Elements to Domain
Semantics
Target Task(s)Definition(s): Structural
and Semantic
The Task Instance (TI)
Archive: TI Information are
contained in Generic
Informational Elements:
Granular, Linked and
Provenanced
Figure 1: The Information Warehouse (IW) ArchitectureSource: Infosys Research
8/12/2019 Knowledge Engineering Management
18/90
16
reproduction of information and knowledge[9]. The denition simultaneously captures two
aspects of knowledge work:
1. C o n s u m p t i o n o f I n f o r m a t i o n :
Consumption of information allows a
human worker to gain new knowledge
and/or update existing knowledge.
2. Production of Information: When the
worker articulates the knowledge, in
some symbolic form, production of
information occurs.
Information, unlike knowledge, is
an entity amenable to capture in persistent
media, sharing and archival. Information can
be in the form of end products (reports, plans,
strategies, procedures, lessons learned, etc., or
as intermediate products (memos, suggestions,
arguments, minutes of meeting, etc).
Ready for Discharge
Ready for the Physician
Patient Registered
Physician with KWSS
Ready for Treatment
Plans Modified
Commun
ica
te
EOT: End of Treatment
Follow-up Planned
Treatment Planned
Admin System In the Patient-care Facility (Hospital Ward)
Patient Discharged
Treatment Completed
Receive Instructions
EOT
Communicate(Receive Plans )
Patient under Treatment
Monitor
Condition
Condition Recorded
End Treatment
Apply
Treatment
Send Plans to
Patient-care
Facility
ins
truc
tE
OT
(Periodic/
Scheduled)
(Register Patient)(Register Patient)
(Discharge Patient)
(Wait for finish and
provide admin support
when required)
(Assign Physician)
(Receive Patient)
(Determine Treatment)
(Follow-up treatment)
(Send to
Physician)
(Complete) Review
Admit f or Treatment
Patient Admitted
Figure 2(a):The Activity Interdependency Model Source: Infosys Research
The contextualization support layerof IW consists of artifacts describing domain
vocabulary, task-structure definitions and
mappings between elements of task-structure
definitions and various types of container
objects used by the system to archive the
informational elements. There could be many
perspectives from which the structure of a
knowledge work can be analyzed [10]. This
discussion builds up on the activity-based
approach proposed by Dustdar [11]. Here task-
structure denitions comprise of two kinds of
artifacts namely the activity dependency model
and the information usage model. Activity
dependency model describes the various
interdependencies among the activities within
a task whereas the information usage model
describes the supportive interrelationships
among the informational elements associated
with the activities. Graphical representations of
the top level denitions for a patient-care KWSS
8/12/2019 Knowledge Engineering Management
19/90
17
are shown in Figures 2(a) and 2(b). The elements
of these artifacts are used to mark, annotate
and provide semantics to the instance-specic
or episodic informational elements archived in
TI archive.
Methodologies for analyzing the task-
structures and processes, and developing the
definition artifacts are beyond the scope ofthe current discussion. However, for the sake
of clarity we present the result of a high level
analysis of the patient-care task [Fig. 3].
The Task Instance (TI) Archive: The inner
layer of IW, called the task instance (TI) archive
contains the information produced through
knowledge articulation. The knowledge
reproduced is often from external sources and
is found relevant while performing the instances
or episodes of supported tasks/knowledge
Patient Consultsthe Doctor andInitiation of the
Case (in medicalsense) Occurs
DiagnosticProcedure
Diagnosis andTreatment Plan
TreatmentFollow-up
Plan
PatientCondition
Follow-upReport
Review
Making aDiagnosis
(next page)
Doctor
Makes
LeadstoMedication
and/or
Surgery
Therapy
Educationand
Instructions
Included in
Or
Imple
ment Implement
Report
Evalu
ate
Medical Care Case
Figure 2(b):The Information Usage ModelSource: Infosys Research
works. The challenge lies in organizing theinformation in TI archive of IW to leverage the
contextualization support that will provide
the workers with an improved platform
for accessing processing and producing
information. To achieve this, we strive to
impart three essential attributes to the archived
information: (i) proper granularity level, (ii)
linkage, and (iii) provenance of information.
Granularity Level: Knowledge-intensive tasks
are never monolithic or atomic in nature.
They consist of a set of interrelated activities,
often fairly diverse in nature. Knowledge
workers, whether as producers or consumers
of information, at any given point in time,
work on one activity. Thus, instead of large
body of information, as typically contained
in whole documents, it will be much easier
for the workers to work with information as
produced and consumed at activity levels.
In IW, the TI information is archived at
the level of informational elements (IE).
IE is commensurate with the activity and
informational granularity levels specified by
the task definitions. The task definitions are
available for the respective task classes in the
contextualization support layer. Further, TI-
specific IEs are persistently linked with their
corresponding definition elements.Given such an organization of archived
information, it can be easily seen that the
knowledge worker, as a consumer, can enjoy
great advantage in establishing the context
of the accessed informational elements and
utilize them with much more ease. Further,
the knowledge worker as a producer can also
articulate and produce information at the
activity level that can be easily contextualized
by the artifact supporting the task-type she is
engaged in.
8/12/2019 Knowledge Engineering Management
20/90
18
Linkage: With the maintenance of proper
granularity level of the informational elements,
creation and maintenance of proper linkage
among the informational elements can improve
the impact of IW manifold. This follows
from the well-known fact that the value or
usefulness of a piece of information increases
enormously when it can be associated with
other related pieces of information and studied
together.
For example, consider a patient-care
system. Consider a scenario where a doctor,
treating a patient, is trying to make a diagnosis
based on observed physical and clinical
ndings. Undoubtedly, mere information on the
fact that there were x number of patients who
Activity
Patient Consults the
Doctor and Initiation
of the Case
(in medical sense)
Occurs
DiagnosticProcedure
Diagnosis and
Treatment Plan
Follow-up Plan
Follow-up Report Patent Condition
Treatment
Report
Evaluate
Review
Therapy
Me
dica
tion
Anc
hor
Surgery
Educa
tion
an
d
Ins
truc
tions
Actors
Registers Creates
UsingPerforms
Makes
Informational
Elements
Medical record/file
Anchor
Creates
The Case for the
Patient's Treatment
Task
Processing
Making a
Diagnosis
On Diagnosis
The Diagnosis
Decision Treatment
Plan Workplan: List
Medication
Workplan List:
Activity, Schedule
Therapy
Workplan List:
Activity, Schedule
Instructions
Workplan List:
Activity, Schedule
Expectations/ Prognosis
Follow-up Plan List:
Expectation, Schedule
Follow-up
Report
Analysis
Store Analyze
Consulting
Treats Patient
Processes
The Case
Record
Cond
itions
ApplythePlans
Starts
Leadsto
Implement
Implem
ent
Conventional
Healthcare
Database
Review
Review
Conventional
Healthcare
Database
Patient
Receptionist
Doctor
Nurse
Nurse
Patient
Figure 3: Developed Contextualization Support Artifactsfor Patient-care KWSS
Source: Infosys Research
8/12/2019 Knowledge Engineering Management
21/90
19
had shown similar conditions, will not sufce.The doctor would want to know about the
diagnoses, prescribed treatments, success rate,
pattern in the prognosis and many more such
related pieces of information. Such a capability
needs rich navigable links among the IEs.
In IW, the links between various
informational elements within a task instance
as well as across task instances is maintained
based on several criteria so that given a piece
of information one can easily nd other related
IEs. This can help various services in the layer at
the top of IW and can serve establishing broader
context, providing support/evidence, allowing
follow-up of the usage as well as consequence of
usage of the information and many other aspects
of the information and knowledge works.
Provenance: Provenance of a piece of
information encompasses related information
on how, where, what, when, why, which and by
whom the information has come into existence.
This relates directly to the requirement of
reliability and authenticity of information that
are, as observed by Schultze, as among the most
important aspects of information other than the
content itself [13]. Further, it forms the basis of
validation of the information that is of crucial
importance in various task types. In the scenario
of collaborative works, where the information,containing some crucial arguments, prepared by
a co-worker can be examined much rigorously
using the provenance and linkage facilities
that go beyond the upfront information.
Contributions of the workers is thus likely to
be much more effective due to exchange of
information and collaboration. Apart from its
enormous importance to knowledge workers
by its own virtue, in many tasks, maintenance
of detailed provenance information is required
by various regulatory frameworks.
Creation and maintenance of provenancecan be easily achieved in IW. Due to activity
level granularity of the information and the
existence of links among the IEs as well as
between IEs and elements of task-denitions,
if the identity of the worker is consistently
maintained among the contents of IEs, one can
readily establish the provenance of an IE from
multiple perspectives. Also, IE level provenance
can be easily utilized to compute provenance at
various levels within the tasks.
Figure 4 depicts an example of TI
information as they are archived annotated by
contextualization elements.
DESIGNING THE TI ARCHIVE IN IW
At the technical design level one can envisage the
TI archive as a network of information elements
(InfoEl). The InfoEls are objects, specialized
to serve as containers of various types. The
InfoEl objects also contain specialized methods
that can assist computations commensurate
with the corresponding IE types. InfoEls are
interconnected through two types of links,
the creational links and the reference links,
and we call the organization as the creational
and referential network or CaRN view of
information [Fig. 5]. The CaRN view has the
following properties:
The CaRN view consists of task instances
(TI). In other words, TIs are the macro
units of the CaRN view.
A TI contains all information developed
during performance of a task or
knowledge-work instance and denes the
sub-network of InfoEls corresponding to
that particular TI.
A creational link joins two IEs when the
information content of one is created to
satisfy the need of creating the content
8/12/2019 Knowledge Engineering Management
22/90
20
Initial FindingsAnalysis
TestObservations
Test 2Observation
Test 1Observation
Test 3Observation
Test 2Observation
Test 1
Observation
Diagnosis (Differential)Decision Treatment
Plan Workplan(s)
MedicationWorkplan List:
Activity, Schedule
TherapyWorkplan List:
Activity Schedule
InstructionsWorkplan List:
Activity, Schedule
Expectations/Prognosis
Follow-up plan List:Expectations,
Schedule
Follow-up ReportAnalysis
Aspect 2Analysis
TestObservation
Diabetes
Blood SugarLevels
Fasting BS
Post-meal BS
MicroAlbumin Level
Test 1
Test 2Observation
Aspect 1Analysis
MetabolicCondition
Possibility 1 ActionPossibility 2 Action
Aspect 1Analysis
Weight Loss
Increase in Thirstand Appetite: Palpitation
and Weakness
Diabetes orHeart-disease or Both
Heart Disease
CardiacPerformance
Treadmill Test
ECG
BloodChemistry
Uric Acid
Condition: Diabetes,Initial Stage,
Kidney not Affected
NerveConditions
Glyco-Haemoglobin
Verify/Confirm Diagnosisand/or Record Patient
Status Analysis
Find
PossibilitiesChec
kFor
Chec
k
Inves
tiga
te
Inves
tiga
te
InvestigateInvestigate
Norma
l
Norma
l
Normal
Measure
Measure
Measure
Measure
Measure
Measurements
Measurements
Measurements
Measurements
Measurements
All withinNormal Ranges
Feedback onSuccess ofTreatment
Modify TreatmentBased on Feedback
Sing
leCon
dition
Processing the CaseMaking a Diganosis
HistoryObservation
SymptomsObservation
While processing any of the IntelliObjects theuser can search the archive for relevant pieces ofknowledge (other IntelliObjects) and navigatearound using context and relevance links to studythem. Those found useful in solving the problem(s) will be marked relevant and new relevancelinks may be created and maintained.
SignsObservation
Phys ExamObservation
Lipid Profile
Diabetic
Retinopathy
Comparison ofReported BS Levels
With Expected Values
Expected BS LevelLowering Under Treatment
Diet Control, RegularChecking of BS Level
Report to DoctorEvery Fortnight
Regular PhysicalExercise
Min. 30 Min/day
Oral Medicinesand/or Insulin Inj.
No Major Illnessin Recent Past
Aspect 2Analysis
False True
Figure 4: An Example of Task Instance Information asArchived
Source: Infosys Research
8/12/2019 Knowledge Engineering Management
23/90
21
of the other. Creational links also reect
the relationships between pieces of
information developed by activities
performed as part of the same task
instance, i.e., the creational links are
allowed to form between IEs that belong
to the same TI.
A reference link exists between two IEs
when the content of one is used, but not
explicitly created to cater to the needsof the other. Thus, the reference links
are free to cross the TI boundaries to
associate IEs belonging to different TIs.
Implementations of the archival of
information in CaRN view can be achieved
with relational databases (we have adopted this
option in our current prototype), XML databases,
object databases, content management systems
or some hybrid of them. However, irrespective
of implementation technology adopted, it can be
TI TI TI Special TI
(Policy)
Special TI
(Legal
Constraints)
Special TI
(Resource
Constraints)
A Task Instance (TI)Task
Subtask 1
Subtask 2
Soln. alt. 1Soln. alt. 2
Solution
aspect 1
Solution
aspect 2
Verification 1 Verification 2
Finding 1 Finding 2
Observation 1 Observation 2
Subtask 3
Selected
Solution Reasons
Action Plan Impact
Watch Plan
Expected
ImpactsActual
Impacts
Casual Analysis
of Deviations
Modified
Action Plan Information
Elements (InfEIs)
Creational Relationship Reference Relationship
Figure 5: The CaRN View of Information in TI Archive Source: Infosys Research
easily perceived that in this scheme, access to the
content of InfoEls and their interconnections can
provide the user with information with higher
relevance along with a capability of navigation
to other contextually related information using
the edges of the InfoEl network.
CONCLUSION
The IW embodies a powerful idea for
information archival for supporting knowledge-intensive tasks in several ways signicantly
ahead of the conventional practices. The
core facility provided by the IW for archival
of richly contextualized information opens
up enormous possibilities of building next
generation information systems for knowledge
management. At the one end of the spectrum we
can envisage building customized applications
leveraging the information in IW to support
individual tasks such as patient-care, legal
research, etc.
8/12/2019 Knowledge Engineering Management
24/90
22
At the other end of the spectrum liesa very exciting possibility. One can think of
building a technology platform consisting of the
IW and a host of interesting information access
and processing services, such as exploration,
collaboration, argumentation, recommendation,
contextualized articulation, transcription, etc.,
and most importantly a KWSS development
service for building and maintenance of KWSS,
running at the top of the platform. Given that
the platform is installed in an organization,
development service can be used for building
the denitions for new tasks and deploying
them to realize new KWSS on top of the same
platform. Further, it can enable verication and
update/improvement of performance of existing
KWSSes, resulting in overall organizational
learning. Suffice it to say, that a platform
consisting of IW can be used for building a
number of very sophisticated, inter-operating
KWSS to address the knowledge management
needs of an organization, to a large extent.
REFERENCES
1. R Maier, Modeling Knowledge Work for
the Design of Knowledge Infrastructures,
J University Computer Science, Vol 11,
No 4, 2005
2. M Alavi and D E Leidner, Knowledge
Management Systems: Issues, Challenges,and Benets, Comm. AIS, Vol 1, Article
7, 1999
3. G P Pisano, Knowledge, Integration,
and the Locus of Learning: An Empirical
Analysis of Process Development,
Strategic Management Journal, Vol 15,
Winter 1994
4. I Becerra-Fernandez and R Sabherwal,
Organizational Knowledge Management:
A Contingency Perspective, JMIS, Vol 18,
No 1, Summer 2001
5. D B Leake, L Birnbaum, C Marlowand H Yang, Task-Based Knowledge
Management, In Proceedings of the AAAI-
99 Workshop on Exploring Synergies of
KM and Case-Based Reasoning, AAAI
Press, 1999
6. F Burstein and R Linger, Supporting
post-Fordist practices A Knowledge
Management Framework for Supporting
Knowledge Work, Information Technology
and People, Vol 16 No 3, 2003
7. T D Anderson, Studying Human
Judgments of Relevance: Interactions in
Context, Proceedings IIiX, Copenhagen
Denmark 2006
8. A Dey, G Abowd and D Salber, A
Conceptual Framework and a Toolkit
for Supporting the Rapid Prototyping of
Contextaware Applications, Hum-Comp
Interact 16, 2001
9. N Stehr, The Knowledge Society, Sage,
Cambridge, UK, 1994
10. M Zachry, C Spinuzzi and W Hart-
Davidson, Visual Documentation of
knowledge work: An Examination of
Competing Approaches, Proceedings of
25th annual ACM International Conference
on Design of Communication, 2007
11. S Dustdar, Reconciling Knowledge
Management and Workow ManagementSystems: The Activity-Based Knowledge
Management Approach, Jadavpur
University Computer Science, Vol 11, No
4, 2005
12. J P Aarons, F Burstein and H Linger, What
is the Task? Applying the Task-based
KM Framework to Weather Forecasting,
Organizational Challenges for KM, 2005
13. U Schultze, A Confessional Account of
an Ethnography about Knowledge Work.
MIS Quarterly, Vol 24, No 1, 2000.
8/12/2019 Knowledge Engineering Management
25/90
23
SETLabs BriefingsVOL 7 NO 5
2009
Whats in a Name?By Yogesh Dandawate and John Kuriakose
Recover business ontology from existing enterprise
IT assets, incrementally
Business ontology is a formal and preciserepresentation of business knowledge interms of concepts, relations and rules. Software
engineering within the enterprise involves
a translation of knowledge about the world
from abstract mental models to executable
code. Business domain, technology design and
implementation language are three distinct
knowledge domains involved in software
engineering.
The current software engineering
scenario is characterized by geographically
dispersed teams and work transition between
these teams. It is vital that the entire team has a
shared understanding of the system in terms
of the business domain, functional features,internal structure (architecture and design)
and implementation (the program code) of
the software. The team needs a more formal
knowledge representation to respond to the
current scale and complexity.
Creating this shared understanding
of applications within the IT portfolio and
its context involves making implicit and
tacit knowledge explicit in ontologies and
employing knowledge engineering methods.
However, creating formal business ontology
from scratch is not feasible because of the scale
involved and the specialized skill sets required.
This paper outlines a more effective approach
to exploit existing IT artifacts (primarily
program code) across the IT portfolio to recover
fragments of the business ontology. Users can
then respond to this initial representation and
refine it to incrementally build the business
ontology.
Information overload is a key problem
in the knowledge management arena. To
analyze raw data one consumes expensive
resources. Previous research in cognitive
science has shown that human mind creates
mental models to comprehend [1]. A developer
creates a mental model during the process ofunderstanding the software system. The mental
model constitutes of key abstractions that exist
in the code.
The concepts in a domain form the
key abstractions in the mental model. The
mental model resides in the head of the
expert. In the current software development
scenario where there is continuous transition
of developers, the knowledge gathered about
the system should be made available to each
stakeholder. It is therefore essential that
8/12/2019 Knowledge Engineering Management
26/90
24
one captures the knowledge of the expertsformally and utilizes it for the benefit of
lesser experienced developers. This will help
reduce the comprehension time as well as
spread uniform understanding among the
developers.
Knowledge engineering (KE), an offshoot
of articial intelligence (AI), has been working
to resolve the problem of formal knowledge
representation. Research in this area suggests
that one needs domain ontology for background
knowledge, a knowledge base (KB) to store
information and an inference mechanism to
comprehend.
OBSERVATIONS
Problem domain or business domain concepts
are represented using programming language
concepts:
e.g., Concept::Account Class::Account
Some key problems that prevail in
software engineering and hinder comprehension
of code are:
Concept Scattering: Single concept in
business or problem domain gets represented
in multiple artifacts in multiple programming
languages.
Missing of Semantic Links between
Program Artifacts: Concept attributes across
multiple languages share same value spaces. Forinstance, a java program uses values of database
location that is available in a XML le. Hence
the database location is dened in a XML le
whereas the consumer of the information is a
java program. This multi-language-multi-artifact
dene-use leads to semantic integrity issues.
During program comprehension the
developer attempts to learn or gain knowledge
about various aspects of the program. This
involves learning new knowledge concepts
as well as mapping linguistic terms in the
program text to concepts in one of the domains.The programming language domain or the
implementation domain, architecture and
design domain and business or problem
domain are the three distinct knowledge
domains involved in software engineering
[Fig. 1].
A formal representation of knowledge in
a domain consists of concepts and relationships
in that domain and this is what is known as
Ontology[2, 3].
Ontology can be seen as a shared
agreement to represent knowledge withina community of stakeholders as a formal
representation.
Ontology, therefore, has a social
dimension of agreement and commitment
from the members of the community to what
is represented and also a formal dimension of
machine interpretation with precise semantics.
Thus, ontologies form the foundation for building
integrated knowledge repositories or knowledge
bases that capture shared understanding within
a software engineering team.
DomainOntology
Architectureand Design
Ontology
ImplementationLanguageOntology
Figure 1: Multi Domain OntologiesSource: Infosys Research
8/12/2019 Knowledge Engineering Management
27/90
25
Recently, the use of ontologies toaddress some of these knowledge management
problems within software engineering has
been proposed [4]. One of the specic software
reverse engineering problems we address is
the recovery of the business domain concepts
and relations from the structured program
artifacts. Previous work in this eld of ontology
learning has primarily focused on the web and
unstructured text corpus as data sources [5].
CREATING ONTOLOGY
Two primary reasons that inhibit clean slate
ontology creation are:
Existing ontology languages present a
high barrier of entry that inhibit their use
and deployment in the enterprise context
The enterprise already has amplestructured and unstructured information
that can be mined to learn the business
ontology rather than attempting to create
it from scratch.
Our discussion brings forth an approach
to exploit structured data sources within the
enterprise IT portfolio that include program
artifacts, structured web content, web services
descriptions, XML and messaging artifacts,
database schema and business process models
to recover elements of the business ontology.The key idea presented is to extract and exploit
the identifier names within the respective
formal languages and apply lingo-syntactic
patterns that govern the composition of
identier names from basic tokens.
APPROACH
Previous studies have already established the
contribution and role of meaningful identiers
within program code in comprehension [6, 7].
Research indicates that almost 47-62% of the
development time is spent in understanding
the previously written code [8].
An attempt is made to build an extensible
knowledge base that is capable of aspects like
extracting identifiers from the code base and
tokens from identifiers, storing identifiers,
tokens, programming language elementsand syntactic relations between the program
elements. It should also be able to analyze
how multiple tokens are composed to form
program identifier names and exploit syntactic
rules within the language to identify language
relations between the tokens. Other features
of the extensible knowledge base should
include features viz., leveraging existing
machine processable semantic lexicons for
disambiguation of the meaning of a token in
the context; identifying basic linguistic tokens
Auto recovery of ontology from the formal software artifactsshould be seen as a feasible approach than creating ontology
from scratch
8/12/2019 Knowledge Engineering Management
28/90
26
that model business concepts and separatingtokens from business and technology domain;
and applying axiomatic token rules to identify
concept tokens and relations between them.
CERTAIN FACTS ABOUT IDENTIFIERS
Object oriented program code is composed of
classes, methods, variables which are qualied
by identiers.
Deibenbock and Pizkas work in the
past highlights facts that state that about
70% of the code comprises of identiers and
every programming language available today
allows use of arbitrary sequence of characters.
There exists no mechanism available to check
if the identier names are meaningful. They
also opine that consistent and well-formed
variable names, can improve code quality and
that programming guidelines have naming
conventions intended to improve the readability
of the code. Identier names are intended to
communicate the concepts that they represent.
This helps comprehension and maintenance.
Also, multi programmer development does not
guarantee uniform usage of identier names.
One nds synonyms of the concepts being used
heavily. Thus, single concept gets represented
with multiple names in the code. Programming
styles of programmers also create additional
challenges during identifier analysis. Theprogrammers tend to use prexes like I for
interfaces, or may use sufxes like impl for
pure implementation of the types [6].
Recovering the mapping from program
or linguistic lexical tokens to business concepts
that are vehicles of domain semantics is the goal
of our work.
THE RECOVERY PROCESS
A eight phased approach as has been detailed
below has been adopted for ontology extraction.
Identier Extraction: Extractors are built forparsing the programming language artifacts
and the facts are extracted. Reverse engineering
techniques are used for extracting data. The
identiers are part of the facts that are extracted.
Every extracted fact is augmented with the
concept information to which it belongs. For
e.g., sample code:
C l a s s S a v i n g A c c o u n t e x t e n d s
AbstractAccount
{}
Extracted Identiers:
SavingAccount
AbstractAccount
Extracted Relations:
InstanceOf(AbstractAccount, Class)
IsNameOf(AbstractAccount, Class)
InstanceOf(SavingAccount, Class)
IsNameOf (SavingAccount, Class)
Extends(SavingAccount,
AbstractAccount)
Token Extraction: Identiers or terms comprise
of one or more words or tokens. Identiers
are separated either by some separator (e.g.,
underscore, periods) or camel case (e.g.,
AbstractAccount).
For e.g.,
SavingAccount = {t0: Account, t1:
Saving}
AbstractAccount = {t0: Account, t1:
Abstract}
Token Filtering and Validation: WordNet
database of English is used for separating valid
and invalid tokens [6]. The tokens that have
a meaning are valid tokens and are tagged
appropriately.
8/12/2019 Knowledge Engineering Management
29/90
27
Acronym Generation: A list of possibleacronyms/abbreviations is generated for every
valid token detected by WordNet. Criteria for
acronyms are that they begin with the same
letter as the token, maintain letter sequence and
are three letters or longer.
For e.g., Token {Tok, Toe, Ton, Tke,
Tkn, Ten, Toke, Tokn, Tken}
Invalid Token Analysis: Invalid tokens are
mostly popular acronyms of some valid word.
The knowledge base is queried if this invalid
token is acronym of some word. A table is also
maintained where most common acronyms
(also called as stop list) are available, for e.g., str,
int, lang, acnt, etc [7]. This table is also queried
to convert the invalid token to valid meaning
word. If there are multiple possible expansions
then the token with highest frequency isselected.
Valid Token Analysis: Every token is assigned
a part of speech using WordNet. Noun,
adjective, verb, adverb are of our typical
interest as they follow certain grammatical
rules. Identifiers may have multiple parts
of speech. This can be referred to as parts of
speech disambiguation.
In addit ion, a unique stemming
algorithm, also known as stem finder is used
for identification of the stems of each token.The tokens are clustered based on the stem.
Each stem that is discovered by the above
process represents concept in either the
software technology domain or the business
domain. For e.g., Order is stem available in
identifiers:
PurchaseOrder,
SupplierOrder,
ProxyOrder,
ServiceOrder,
CompletedPurchaseOrder,
ShoppingcardEmptyPurchaseOrder,
MailPurchaseOrder,
UnknownPurchaseOrder,
PetStorePurchaseOrder,
AdminServicePurchaseOrder
Stem Filtering: This stage requires programmingdomain concepts to be captured as a stop
list. Post ltering, the domain concepts can
be recovered and can be suitably tagged.
Knowledge-base post ltering has mapping
of domain concepts to the artifact in which
they reside. This information is crucial while
performing impact analysis.
Applying Empirical Rules over the Recovered
Concepts: The last business noun (BN) in a
homogenous sequence is a major concept.
The token position and application ofempirical rules aid in recovery of ontological
concepts and relations
8/12/2019 Knowledge Engineering Management
30/90
28
For e.g., createSavingAccountEJB.
The last business noun is Account and
hence the major concept.
When rst token is a Verb it indicates
action (domain/ technology)
e.g., transferFunds() -> {transfer, Funds}
(transfer i