SlideShare une entreprise Scribd logo
1  sur  16
Agent Technology
K6213 KM Technologies Presentation



                                     Aravind Sesagiri Raamkumar
                                     Nirmala Selvaraju
Agenda
• Introduction
• Typology of Agents
• Popular Examples of Software Agents
• Agent Technology in aid of KM
 • Application of IA for KM Integration
 • Information Agents
 • Agent based Customer Knowledge Management
• References
Introduction
 Agents can be defined to be autonomous, problem-solving
 computational entities capable of effective operation in dynamic
 and open environments.(Luck et al)

 Often deployed in ‘Multi-agent’ environments in which they
 interact and co-operate with each other.

 Main Characteristics:
 Autonomous
 Cooperation
 Adaptation
Typology of Agents
  • Classified by Mobility, Type of Response(deliberative or
    reactive), Identity and Roles
  • Agents exist in a truly multi-dimensional space
Popular examples of Software
Agents
•   Buyer agents or shopping bots
•   User or personal agents
•   Monitoring-and-surveillance agents
•   Data Mining agents

• Web Crawlers(used by Google) are best examples for Agents
Agent Technology in aid of KM
                      Knowledge
                      Engineering
 Knowledge
  Discovery




                     Collaboration
     High level
    connectivity
Application of IA for KM
integration - Expectations
                           Decision
                           Support
                         System(DSS)




                                  Transformation        Analyze
 Dealing with      Quicker
                                  of conventional      incoming
huge amounts     Retrieval of
                                       search          ‘lessons-
  of data in a    data from
                                  mechanism with     learnt’ and
  distributed      various
                                   self-adaption      immediate
 environment       systems
                                       ability      dissemination
KM in an organization
Implementation Framework
       Agents were chosen for DSS
implementation due to following factors:-
 Distribution of data
 Integrity of organizational structure
  and its autonomy must be maintained
 The system needed sophisticated
  interactions for information sharing
  and coordination



                              Local Data      Model Base      Knowledge
            Multiagents
                             Base Model        Model         based module
           • Different     • Knowledge      • Generating     • Stores
             tasks           Gathering        alternatives     knowledge
           • Different     • Storage in     • Storing        • Incorporates
             sources         relational       decision         mathematical
           • Different       databases        making           solvers
             Roles                            models
System Architecture
Modeling of Multi-Agents and Standards
Used
   Application Manager Agent(AM-agent):
   Agents that run on intranet network management station. Exhibits
   authority in management of functionality of system

   Application Agents(A-agent):
   Agents that run on network and on abstract locations. Represented
   by interfaces on which operations can be performed




                   Tool & Standards
                 FIPA-OS(Foundation for Intelligent Physical Agent)


                          JESS (Java Expert System Shell)


                                  XML and SOAP
Information Agents




    Scope for usage in E-business
    Built on top of Knowledge Discovery and Data Mining
      concepts
    Facilitates Knowledge Sharing between Buyers and Sellers
   Article :
   Knowledge Management and Intelligent Agents in an E-
   Business Environment
   http://www.economyinformatics.ase.ro/content/EN8/MOGOS%
   20Radu%20Ioab%20sa.pdf
Agent based Customer Knowledge
  Management
Premise:
To test the feasibility of agent technology concepts aided customer knowledge
management.
                                                              Social        Agent
            Reactive               Proactive                  Ability       Characteristics


                                     Needs
                                     of CKM
Agent based Customer Knowledge
Management




    Article :
    The role of intelligent agents in customer knowledge
    Management
    http://www.academicjournals.org/ajbm/PDF/pdf2011/18Aug/T
    ang%20et%20al.pdf
References
• Software Agents: An Overview Hyacinth S. Nwana
• Agent Technology: Enabling Next Generation Computing Luck
  et al
• Application of Intelligent Agent Technology for Knowledge
  Management Integration Houari et al
• Knowledge Management and Intelligent Agents in an E-
  Business Environment MOGOŞ et al
• The role of intelligent agents in customer knowledge
• Management Tan et al
Thank You

Contenu connexe

Tendances

Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud ComputingJosh Folgado
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its TypesHTS Hosting
 
IT Strategy in Airlines Industry
IT Strategy in Airlines IndustryIT Strategy in Airlines Industry
IT Strategy in Airlines IndustryChris Furton
 
Telecom Performance Management System: Overview
Telecom Performance Management System: OverviewTelecom Performance Management System: Overview
Telecom Performance Management System: OverviewPavel Lechenko
 
Cloud Computing - ISO/IEC 17788
Cloud Computing - ISO/IEC 17788Cloud Computing - ISO/IEC 17788
Cloud Computing - ISO/IEC 17788Hamid Reza Qavami
 
Model-driven architecture (MDA)
Model-driven architecture (MDA) Model-driven architecture (MDA)
Model-driven architecture (MDA) Alia Hamwi
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioHCL Technologies
 
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...Enterprise Management Associates
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 

Tendances (20)

Enterprise Computing
Enterprise ComputingEnterprise Computing
Enterprise Computing
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud Computing
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
IT Strategy in Airlines Industry
IT Strategy in Airlines IndustryIT Strategy in Airlines Industry
IT Strategy in Airlines Industry
 
Telecom Performance Management System: Overview
Telecom Performance Management System: OverviewTelecom Performance Management System: Overview
Telecom Performance Management System: Overview
 
Cloud Computing - ISO/IEC 17788
Cloud Computing - ISO/IEC 17788Cloud Computing - ISO/IEC 17788
Cloud Computing - ISO/IEC 17788
 
Model-driven architecture (MDA)
Model-driven architecture (MDA) Model-driven architecture (MDA)
Model-driven architecture (MDA)
 
Managed Services Overview
Managed Services OverviewManaged Services Overview
Managed Services Overview
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
 
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
 
ISO 27701
ISO 27701ISO 27701
ISO 27701
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 

Similaire à Agent Technology

Intelligent Content Management
Intelligent Content ManagementIntelligent Content Management
Intelligent Content ManagementJoe Gollner
 
Enterprise Content Management in Microsoft SharePoint 2007
Enterprise Content Management in Microsoft SharePoint 2007Enterprise Content Management in Microsoft SharePoint 2007
Enterprise Content Management in Microsoft SharePoint 2007ukdpe
 
Unit i introduction to grid computing
Unit i   introduction to grid computingUnit i   introduction to grid computing
Unit i introduction to grid computingsudha kar
 
Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)Denodo
 
SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview Rajesh Menon
 
Pariveda ECM Patterns for Large Enterprises - chicago
Pariveda   ECM Patterns for Large Enterprises - chicagoPariveda   ECM Patterns for Large Enterprises - chicago
Pariveda ECM Patterns for Large Enterprises - chicagomsteinbergtx
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityHaluk Demirkan
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Business and Online Services - Ben Kepes
Business and Online Services - Ben KepesBusiness and Online Services - Ben Kepes
Business and Online Services - Ben KepesIntergen
 
Private Cloud Adoption: Patterns for the Enterprise
Private Cloud Adoption: Patterns for the  EnterprisePrivate Cloud Adoption: Patterns for the  Enterprise
Private Cloud Adoption: Patterns for the EnterpriseIBM India Smarter Computing
 
ON event - May 2010
ON event - May 2010ON event - May 2010
ON event - May 2010Ben Kepes
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudStanton Jones
 
Application architecture for cloud
Application architecture for cloudApplication architecture for cloud
Application architecture for cloudMarco Parenzan
 
Introduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesIntroduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesEduardo Castro
 
AI Overview and Capabilities
AI Overview and CapabilitiesAI Overview and Capabilities
AI Overview and CapabilitiesAnandSRao1962
 
IBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Sverige
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412OracleIDM
 
C19013010 the tutorial to build shared ai services session 1
C19013010  the tutorial to build shared ai services session 1C19013010  the tutorial to build shared ai services session 1
C19013010 the tutorial to build shared ai services session 1Bill Liu
 

Similaire à Agent Technology (20)

Intelligent Content Management
Intelligent Content ManagementIntelligent Content Management
Intelligent Content Management
 
Enterprise Content Management in Microsoft SharePoint 2007
Enterprise Content Management in Microsoft SharePoint 2007Enterprise Content Management in Microsoft SharePoint 2007
Enterprise Content Management in Microsoft SharePoint 2007
 
Unit i introduction to grid computing
Unit i   introduction to grid computingUnit i   introduction to grid computing
Unit i introduction to grid computing
 
Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)
 
SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview
 
Pariveda ECM Patterns for Large Enterprises - chicago
Pariveda   ECM Patterns for Large Enterprises - chicagoPariveda   ECM Patterns for Large Enterprises - chicago
Pariveda ECM Patterns for Large Enterprises - chicago
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT Security
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Business and Online Services - Ben Kepes
Business and Online Services - Ben KepesBusiness and Online Services - Ben Kepes
Business and Online Services - Ben Kepes
 
Private Cloud Adoption: Patterns for the Enterprise
Private Cloud Adoption: Patterns for the  EnterprisePrivate Cloud Adoption: Patterns for the  Enterprise
Private Cloud Adoption: Patterns for the Enterprise
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
ON event - May 2010
ON event - May 2010ON event - May 2010
ON event - May 2010
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the Cloud
 
Application architecture for cloud
Application architecture for cloudApplication architecture for cloud
Application architecture for cloud
 
Introduccion M D S
Introduccion M D SIntroduccion M D S
Introduccion M D S
 
Introduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesIntroduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data Services
 
AI Overview and Capabilities
AI Overview and CapabilitiesAI Overview and Capabilities
AI Overview and Capabilities
 
IBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureData
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412
 
C19013010 the tutorial to build shared ai services session 1
C19013010  the tutorial to build shared ai services session 1C19013010  the tutorial to build shared ai services session 1
C19013010 the tutorial to build shared ai services session 1
 

Plus de Nirmala Selvaraju

communities of practice proposal
communities of practice proposalcommunities of practice proposal
communities of practice proposalNirmala Selvaraju
 
Structured and unstructured information in enterprise
Structured and unstructured  information in enterpriseStructured and unstructured  information in enterprise
Structured and unstructured information in enterpriseNirmala Selvaraju
 
VICIOUS AND VIRTUOUS CIRCLES IN THE MANAGEMENT OF KNOWLEDGE
VICIOUS AND VIRTUOUS CIRCLES IN THE MANAGEMENT OF KNOWLEDGEVICIOUS AND VIRTUOUS CIRCLES IN THE MANAGEMENT OF KNOWLEDGE
VICIOUS AND VIRTUOUS CIRCLES IN THE MANAGEMENT OF KNOWLEDGENirmala Selvaraju
 
Knowledge management techonology
Knowledge management techonologyKnowledge management techonology
Knowledge management techonologyNirmala Selvaraju
 
Singapore immigration causal loop diagram
Singapore immigration causal loop diagramSingapore immigration causal loop diagram
Singapore immigration causal loop diagramNirmala Selvaraju
 

Plus de Nirmala Selvaraju (9)

communities of practice proposal
communities of practice proposalcommunities of practice proposal
communities of practice proposal
 
Communities of practice
Communities of practice Communities of practice
Communities of practice
 
Temple tourism
Temple tourismTemple tourism
Temple tourism
 
Structured and unstructured information in enterprise
Structured and unstructured  information in enterpriseStructured and unstructured  information in enterprise
Structured and unstructured information in enterprise
 
VICIOUS AND VIRTUOUS CIRCLES IN THE MANAGEMENT OF KNOWLEDGE
VICIOUS AND VIRTUOUS CIRCLES IN THE MANAGEMENT OF KNOWLEDGEVICIOUS AND VIRTUOUS CIRCLES IN THE MANAGEMENT OF KNOWLEDGE
VICIOUS AND VIRTUOUS CIRCLES IN THE MANAGEMENT OF KNOWLEDGE
 
Unilever Lipton
Unilever Lipton  Unilever Lipton
Unilever Lipton
 
Knowledge management techonology
Knowledge management techonologyKnowledge management techonology
Knowledge management techonology
 
Singapore immigration causal loop diagram
Singapore immigration causal loop diagramSingapore immigration causal loop diagram
Singapore immigration causal loop diagram
 
Communities of practice
Communities of practice Communities of practice
Communities of practice
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Agent Technology

  • 1. Agent Technology K6213 KM Technologies Presentation Aravind Sesagiri Raamkumar Nirmala Selvaraju
  • 2. Agenda • Introduction • Typology of Agents • Popular Examples of Software Agents • Agent Technology in aid of KM • Application of IA for KM Integration • Information Agents • Agent based Customer Knowledge Management • References
  • 3. Introduction Agents can be defined to be autonomous, problem-solving computational entities capable of effective operation in dynamic and open environments.(Luck et al) Often deployed in ‘Multi-agent’ environments in which they interact and co-operate with each other. Main Characteristics: Autonomous Cooperation Adaptation
  • 4. Typology of Agents • Classified by Mobility, Type of Response(deliberative or reactive), Identity and Roles • Agents exist in a truly multi-dimensional space
  • 5. Popular examples of Software Agents • Buyer agents or shopping bots • User or personal agents • Monitoring-and-surveillance agents • Data Mining agents • Web Crawlers(used by Google) are best examples for Agents
  • 6. Agent Technology in aid of KM Knowledge Engineering Knowledge Discovery Collaboration High level connectivity
  • 7. Application of IA for KM integration - Expectations Decision Support System(DSS) Transformation Analyze Dealing with Quicker of conventional incoming huge amounts Retrieval of search ‘lessons- of data in a data from mechanism with learnt’ and distributed various self-adaption immediate environment systems ability dissemination
  • 8. KM in an organization
  • 9. Implementation Framework Agents were chosen for DSS implementation due to following factors:-  Distribution of data  Integrity of organizational structure and its autonomy must be maintained  The system needed sophisticated interactions for information sharing and coordination Local Data Model Base Knowledge Multiagents Base Model Model based module • Different • Knowledge • Generating • Stores tasks Gathering alternatives knowledge • Different • Storage in • Storing • Incorporates sources relational decision mathematical • Different databases making solvers Roles models
  • 11. Modeling of Multi-Agents and Standards Used Application Manager Agent(AM-agent): Agents that run on intranet network management station. Exhibits authority in management of functionality of system Application Agents(A-agent): Agents that run on network and on abstract locations. Represented by interfaces on which operations can be performed Tool & Standards FIPA-OS(Foundation for Intelligent Physical Agent) JESS (Java Expert System Shell) XML and SOAP
  • 12. Information Agents  Scope for usage in E-business  Built on top of Knowledge Discovery and Data Mining concepts  Facilitates Knowledge Sharing between Buyers and Sellers Article : Knowledge Management and Intelligent Agents in an E- Business Environment http://www.economyinformatics.ase.ro/content/EN8/MOGOS% 20Radu%20Ioab%20sa.pdf
  • 13. Agent based Customer Knowledge Management Premise: To test the feasibility of agent technology concepts aided customer knowledge management. Social Agent Reactive Proactive Ability Characteristics Needs of CKM
  • 14. Agent based Customer Knowledge Management Article : The role of intelligent agents in customer knowledge Management http://www.academicjournals.org/ajbm/PDF/pdf2011/18Aug/T ang%20et%20al.pdf
  • 15. References • Software Agents: An Overview Hyacinth S. Nwana • Agent Technology: Enabling Next Generation Computing Luck et al • Application of Intelligent Agent Technology for Knowledge Management Integration Houari et al • Knowledge Management and Intelligent Agents in an E- Business Environment MOGOŞ et al • The role of intelligent agents in customer knowledge • Management Tan et al