173
Views
1
CrossRef citations to date
0
Altmetric
Research Article

A systematic mapping study on agent mining

, , &

References

  • Abar, S., Theodoropoulos, G. K., Lemarinier, P., & O’Hare, G. M. (2017). Agent based modelling and simulation tools: A review of the state-of-art software. Computer Science Review, 24, 13–33. https://doi.org/10.1016/j.cosrev.2017.03.001
  • Abdalla, S., Huang, B., & Kechadi, T. (2015). An agent-based negotiation approach for knowledge exchange in cloud service platforms. In Proceedings of ICSDM 2015: IEEE int. conf. on spatial data mining and geographical knowledge services, Fuzhou, China (p. 22–27). Institute of Electrical and Electronics Engineers Inc.
  • Adam, E., Grislin-Le Strugeon, E., & Mandiau, R. (2012). MAS architecture and knowledge model for vehicles data communication. Advances in Distributed Computing and Artificial Intelligence Journal, 1(1), 23–31. https://doi.org/10.14201/ADCAIJ2012112331
  • Akoka, J., Comyn-Wattiau, I., & Laoufi, N. (2017). Research on big data – a systematic mapping study. Computer Standards & Interfaces, 54(Part 2), 105–115. https://doi.org/10.1016/j.csi.2017.01.004
  • Anjewierden, A., Gijlers, H., Saab, N., & De Hoog, R. (2011). Brick: mining pedagogically interesting sequential patterns. In EDM 2011 - proceedings of the 4th int. conf. on educational data mining, Eindhoven, The Netherlands (pp. 341–342).
  • Bagga, P., Hans, R., & Sharma, V. (2017). A biological immune system (BIS) inspired Mobile Agent Platform (MAP) security architecture. Expert Systems with Applications, 72, 269–282. https://doi.org/10.1016/j.eswa.2016.10.062
  • Bakar, N. A., & Selamat, A. (2018). Agent systems verification: Systematic literature review and mapping. Applied Intelligence, 48(5), 1251–1274. https://doi.org/10.1007/s10489-017-1112-z
  • Basili, V. R., Caldiera, G., & Rombach, H. D. (1994). The goal question metric approach. In Encyclopedia of Software Engineering, (Vol. 1, pp. 528–532), ISBN 0-471-54004-8. John Wiley & Sons.
  • Bauer, B., Müller, J., & Odell, J. (2001). Agent UML: A formalism for specifying multiagent software systems. International Journal of Software Engineering and Knowledge Engineering, 11(3), 207–230. https://doi.org/10.1142/S0218194001000517
  • Belabed, I., Talibi Alaoui, M., El Miloud, J., & Belabed, A. (2020). Association rules algorithms for data mining process based on multi agent system. In: Boumerdassi S., Renault É., Mühlethaler P. (eds) Machine Learning for Networking. MLN 2019. Lecture Notes in Computer Science, (Vol. 12081 pp. 431–443). Springer, Cham. https://doi.org/10.1007/978-3-030-45778-5_30.
  • Bell, D., & Mgbemena, C. (2018). Data-driven agent-based exploration of customer behavior. Simulation, 94(3), 195–212. https://doi.org/10.1177/0037549717743106
  • Benjemmaa, A., Ltifi, H., & Ayed, M. (2020). Design of remote heart monitoring system for cardiac patients. In: Barolli L., Takizawa M., Xhafa F., Enokido T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, (Vol. 926 pp. 963–976). Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_81
  • Bloembergen, D., Tuyls, K., Hennes, D., & Kaisers, M. (2015). Evolutionary dynamics of multi-agent learning: A survey. Journal of Artificial Intelligence Research, 53, 659–697. https://doi.org/10.1613/jair.4818
  • Bonabeau, E., Dorigo, M., & Theraulaz, G. (1999). Swarm intelligence: From natural to artificial systems. Oxford.
  • Bonisoli, A., Gerevini, A. E., Saetti, A., & Serina, I. (2018). A privacy-preserving model for multi-agent propositional planning. Journal of Experimental and Theoretical Artificial Intelligence, 30(4), 481–504. https://doi.org/10.1080/0952813X.2018.1456786
  • Boo, V. K., & Anthony, P. (2012). Agent for mining of significant concepts in DBpedia. In: Lukose D., Ahmad A.R., Suliman A. (eds) Knowledge Technology. KTW 2011. Communications in Computer and Information Science, (Vol 295 pp. 313–322). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32826-8_32
  • Brungger, R. R., Kadar, C., & Pletikosa, I. (2016). Design of an agent-based model to predict crime (WIP). In 48th summer computer simulation conference, SCSC 2016@SummerSim, Montreal, Canada (Vol. 48, p. 392–397). The Society for Modeling and Simulation International.
  • Burkov, A., & Chaib-Draa, B. (2014). Repeated games for multiagent systems: A survey. Knowledge Engineering Review, 29(1), 1–30. https://doi.org/10.1017/S026988891300009X
  • Cao, L., Luo, C., & Zhang, C. (2007). Agent-mining interaction: An emerging area. In V. Gorodetsky, C. Zhang, V. A. Skormin, & L. Cao (Eds.), Autonomous intelligent systems: Multi-agents and data mining (pp. pp. 60–73). Springer Berlin Heidelberg.
  • Cao, L. (2017a June).Data science: A comprehensive overview. ACM Comput. Surv, 50(3), 43: 1–43:42. https://doi.org/10.1145/3076253
  • Cao, L. (2017b, July). Data science: Challenges and directions. Communications of the ACM, 60(8), 59–68. https://doi.org/10.1145/3015456
  • Cao, L., Weiss, G., & Yu, P. S. (2012). A brief introduction to agent mining. Autonomous Agents and Multi-agent Systems, 25(3), 419–424. https://doi.org/10.1007/s10458-011-9191-4
  • Carrasquel, J., & Lomazova, I. (2019). Modelling and validation of trading and multi-agent systems: An approach based on process mining and petri nets. In 1st international conference on process mining (ICPM 2019), Aachen, Germany (Vol. 2432). CEUR Workshop Proceedings.
  • Carvalho, R. M., de Castro Andrade, R. M., Marc¸al de Oliveira, K., de Sousa Santos, I., & Bezerra, C. I. M. (2017). Quality characteristics and measures for human–computer interaction evaluation in ubiquitous systems. Software Quality Journal, 25(3), 743–795. https://doi.org/10.1007/s11219-016-9320-z
  • Chemchem, A., Alin, F., & Krajecki, M. (2018). Deep learning and data mining classification through the intelligent agent reasoning. In Proceedings - 2018 IEEE 6th international conference on future internet of things and cloud workshops, W-FiCloud 2018, Barcelona, Spain (p. 13–20).
  • Chen, C., & Chen, X. (2017). Scheduling optimization in restricted channels based on the agent technology and bayesian network. In X. Yan, M. Zhong, M. Lu, C. Wu, Z. Qiu, & Z. Hu (Eds.), 2017 4th international conference on transportation information and safety, ICTIS 2017, Banff, Canada -proceedings (pp. 291–295). Institute of Electrical and Electronics Engineers Inc.
  • Chen, Y., Hao, Y., Rakthanmanon, T., Zakaria, J., Hu, B., & Keogh, E. (2015). A general framework for never-ending learning from time series streams. Data Mining and Knowledge Discovery, 29(6), 1622–1664. https://doi.org/10.1007/s10618-014-0388-4
  • Crockett, K., Latham, A., & Whitton, N. (2017). On predicting learning styles in conversational intelligent tutoring systems using fuzzy decision trees. Int. J. Of Human- Computer Studies, 97, 98–115. https://doi.org/10.1016/j.ijhcs.2016.08.005. January.
  • D’Andreagiovanni, M., Baiardi, F., Lipilini, J., Ruggieri, S., & Tonelli, F. (2018). Sequential pattern mining for ICT risk assessment and prevention. In: Cerone A., Roveri M. (eds) Software Engineering and Formal Methods. SEFM 2017. Lecture Notes in Computer Science, (Vol. 10729 pp. 25–39). Springer, Cham. https://doi.org/10.1007/978-3-319-74781-1_2 .
  • da Silva, J. C., Giannella, C., Bhargava, R., Kargupta, H., & Klusch, M. (2005). Distributed data mining and agents. Eng. Appl. Of AI, 18(7), 791–807. https://doi.org/10.1016/j.engappai.2005.06.004
  • Deloach, S., Wood, M., & Sparkman, C. (2001). Multiagent systems engineering. Int. J. Of Software Engineering and Knowledge Engineering, 11(3), 231–258. https://doi.org/10.1142/S0218194001000542
  • Di Nuovo, A., Acampora, G., & Schlesinger, M. (2017, March). Cognitive agents and robots for human-centered systems special issue. IEEE Transactions on Cognitive and Developmental Systems, 9(1), 1. https://doi.org/10.1109/TCDS.2017.2670787
  • Dixit, V., & Gupta, S. (2020). Personalized recommender agent for e-commerce products based on data mining techniques. In: Thampi S. et al. (eds) Intelligent Systems, Technologies and Applications. Advances in Intelligent Systems and Computing, (Vol. 910 pp. 77–90). Springer, Singapore. https://doi.org/10.1007/978-981-13-6095-4_6.
  • Edwards, M., Rashid, A., & Rayson, P. (2015, September). A systematic survey of online data mining technology intended for law enforcement. ACM Comput. Surv, 48(1), 15:1–15: 54. https://doi.org/10.1145/2811403
  • Fayyad, U., Piatetsky-Shapiro, G., & Smyth, P. (1996). From data mining to knowledge discovery in databases. AI Magazine, 17(3), 37–53.
  • Feng, Z., Zhu, S., Wu, J., & Guo, H. (2019). Theory and method of time-varying computational experiments for the fully mechanized mining process in an artificial system environment. IEEE Access, 7, 168162–168174. https://doi.org/10.1109/ACCESS.2019.2954591
  • Fleiss, J. L. (1971). Measuring nominal scale agreement among many raters. Psychological Bulletin, 76(5), 378–382. https://doi.org/10.1037/h0031619
  • Foo, Y. S. E., Gooi, H. B., & Chen, S. X. (2015, January). Multi-agent system for distributed management of microgrids. IEEE Transactions on Power Systems, 30(1), 24–34. https://doi.org/10.1109/TPWRS.2014.2322622
  • Fournier-Viger, P., He, G., Cheng, C., Li, J., Zhou, M., Lin, J.-W., & Yun, U. (2020). A survey of pattern mining in dynamic graphs. Wiley Interdisciplinary Reviews. Data Mining and Knowledge Discovery,10(2), e1372. https://doi.org/10.1002/widm.1372
  • Fu, J., Tanner, H. G., & Heinz, J. (2015). Concurrent multi-agent systems with temporal logic objectives: Game theoretic analysis and planning through negotiation. IET Control Theory and Applications, 9(3), 465–474. https://doi.org/10.1049/iet-cta.2014.0611
  • Gan, W., Lin, J. C.-W., Chao, H.-C., & Zhan, J. (2017 nov/dec). Data mining in distributed environment: A survey. Wiley Interdisciplinary Reviews. Data Mining and Knowledge Discovery, 7(6), e1216. https://doi.org/10.1002/widm.1216
  • Gomes, H. M., Barddal, J. P., Enembreck, F., & Bifet, A. (2017). A survey on ensemble learning for data stream classification. ACM Computing Surveys, 50(2), 2. https://doi.org/10.1145/3054925
  • Gong, X., Liu, L., Fong, S., Xu, Q., Wen, T., & Liu, Z. (2019). Comparative research of swam intelligence clustering algorithms for analyzing medical data. IEEE Access, 7, 137560–137569. https://doi.org/10.1109/ACCESS.2018.2881020
  • Gorodetsky, V. (2013). Agents and distributed data mining in smart space: Challenges and perspectives. In L. Cao, Y. Zeng, A. Symeonidis, V. Gorodetsky, P. Yu, & M. Singh (Eds.), Agents and data mining interaction. ADMI 2012 (Vol. 7607, pp. 153–165). Springer.
  • Gorunescu, F. (2011). Data mining. concepts, models and techniques Vol. 12. [Intelligent Systems Reference Library]. Springer.
  • Hilbert, M., & López, P. (2011). The world’s technological capacity to store, communicate, and compute information. Science, 332(6025), 60–65. https://doi.org/10.1126/science.1200970
  • Horling, B., & Lesser, V. (2004). A survey of multi-agent organizational paradigms. Knowledge Engineering Review, 19(4), 281–316. https://doi.org/10.1017/S0269888905000317
  • Hortensius, R., Hekele, F., & Cross, E. S. (2018, December). The perception of emotion in artificial agents. IEEE Transactions on Cognitive and Developmental Systems, 10(4), 852–864. https://doi.org/10.1109/TCDS.2018.2826921
  • Iqbal, M., Saleem, Y., Naseer, K., & Kim, M. (2018). Multimedia based student-teacher smart interaction framework using multi-agents in elearning. Multimedia Tools and Applications, 77(4), 5003–5026. https://doi.org/10.1007/s11042-017-4615-z
  • Isern, D., & Moreno, A. (2016). A systematic literature review of agents applied in healthcare. Journal of Medical Systems, 40(2), 1–14. https://doi.org/10.1007/s10916-015-0376-2
  • Izquierdo, J., Montalvo, I., Campbell, E., & Pérez-García, R. (2016). A hybrid, auto-adaptive and rule-based multi-agent approach using evolutionary algorithms for improved searching. Engineering Optimization, 48(8), 1365–1377. https://doi.org/10.1080/0305215X.2015.1107434
  • Jahani, A., Akhavan, P., Jafari, M., & Fathian, M. (2016, May). Conceptual model for knowledge discovery process in databases based on multi-agent system. VINE Journal of Information and Knowledge Management Systems, 46(2), 207–231. https://doi.org/10.1108/VJIKMS-01-2015-0003
  • Jennings, N., Sycara, K., & Wooldridge, M. (1998). A roadmap of agent research and development. Autonomous Agents and Multi-agent Systems, 1(1), 7–38. https://doi.org/10.1023/A:1010090405266
  • Kato, T., Takahashi, H., & Kinoshita, T. (2017, June). Multiagent-based autonomic and resilient service provisioning architecture for the internet of things. Int. J. Of Computer Science and Network Security, 17(6), 36–58. http://paper.ijcsns.org/07_book/201706/20170606.pdf
  • Kim, Y., & Baylor, A. L. (2016, March). Research-based design of pedagogical agent roles: A review, progress, and recommendations. Int. J. Of Artificial Intelligence in Education, 26(1), 160–169. https://doi.org/10.1007/s40593-015-0055-y
  • Kitchenham, B., & Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering ( Tech. Rep. No. EBSE 2007–001). Keele University and Durham University Joint Report.
  • Kolajo, T., Daramola, O., & Adebiyi, A. (2019). Big data stream analysis: A systematic literature review. Journal of Big Data, 6(1), 1. https://doi.org/10.1186/s40537-019-0210-7
  • Kozak, J., & Boryczka, U. (2016). Collective data mining in the ant colony decision tree approach. Information Sciences, 372, 126–147. https://doi.org/10.1016/j.ins.2016.08.051
  • Kruger, G., Shih, A., Hattingh, D., & Van Niekerk, T. (2011). Intelligent machine agent architecture for adaptive control optimization of manufacturing processes. Advanced Engineering Informatics, 25(4), 783–796. https://doi.org/10.1016/j.aei.2011.08.003
  • Kundu, S., & Garg, M. L. (2017). Web mining intelligent agents (WEBMINTEL) system. Int. J. Of Advanced Science and Technology, 104, 1–12. https://doi.org/10.14257/ijast.2017.104.01
  • Larsen, J., Burattin, A., Davis, C., Hjardem-Hansen, R., & Villadsen, J. (2019). A data driven agent elicitation pipeline for prediction models. In: Di Francescomarino C., Dijkman R., Zdun U. (eds) Business Process Management Workshops. BPM 2019. Lecture Notes in Business Information Processing, (Vol. 362 pp. 570–582). Springer, Cham. https://doi.org/10.1007/978-3-030-37453-2_46 .
  • Le, T., & Vo, B. (2016). The lattice-based approaches for mining association rules: A review. Wiley Interdisciplinary Reviews. Data Mining and Knowledge Discovery, 6(4), 140–151. https://doi.org/10.1002/widm.1181
  • Leitão, P., & Karnouskos, S. (2015). Industrial agents: Emerging applications of software agents in industry. Elsevier B.V.
  • Lewis, R., & Bihn, M. (2018). Artificial intelligent agent for autonomous prediction and dynamic feedback for high performance athletes. In Proceedings of 2017 international conference on computational science and computational intelligence, CSCI 2017, Las Vegas, Nevada, USA (p. 755–759).
  • Li, C.-T., & Lin, S.-D. (2012). EvaPlanner: An evacuation planner with social-based flocking kinetics. In Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining, Beijing, China (p. 1568–1571). ACM.
  • Li, X., & Ni, J. (2007). Deploying mobile agents in distributed data mining. In: Washio T. et al. (eds) Emerging Technologies in Knowledge Discovery and Data Mining. PAKDD 2007. Lecture Notes in Computer Science, (Vol. 4819 pp. 322–331). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77018-3_33
  • Liao, S.-H., Chu, P.-H., & Hsiao, P.-Y. (2012). Data mining techniques and applications – A decade review from 2000 to 2011. Expert Systems with Applications, 39(12), 11303–11311. https://doi.org/10.1016/j.eswa.2012.02.063
  • Lin, J. C.-W., Hong, T.-P., Fournier-Viger, P., Liu, Q., Wong, J.-W., & Zhan, J. (2017). Efficient hiding of confidential high-utility itemsets with minimal side effects. Journal of Experimental and Theoretical Artificial Intelligence, 29(6), 1225–1245. https://doi.org/10.1080/0952813X.2017.1328462
  • Liu, J., Kong, X., Zhou, X., Wang, L., Zhang, D., Lee, I., Xu, B., & Xia, F. (2019). Data mining and information retrieval in the 21st century: A bibliographic review. Computer Science Review, 34, 100193. https://doi.org/10.1016/j.cosrev.2019.100193
  • Luviano, D., & Yu, W. (2017). Continuous-time path planning for multi-agents with fuzzy reinforcement learning. Journal of Intelligent & Fuzzy Systems, 33(1), 491–501. https://doi.org/10.3233/JIFS-161822
  • Maes, P. (1994). Agents that reduce work and information overload. Communications of the ACM, 37(7), 30–40. https://doi.org/10.1145/176789.176792
  • Mahmoud, M., Ahmad, M. S., & Mohd Yusoff, M. Z. (2016). Development and implementation of a technique for norms-adaptable agents in open multi-agent communities. Journal of Systems Science and Complexity, 29(6), 1519–1537. https://doi.org/10.1007/s11424-016-5036-1
  • Mariscal, G., Marbán, O., & Fernández, C. (2010). A survey of data mining and knowledge discovery process models and methodologies. The Knowledge Engineering Review, 25(2), 137–166. https://doi.org/10.1017/S0269888910000032
  • Martens, D., Baesens, B., & Fawcett, T. (2011). Editorial survey: Swarm intelligence for data mining. Machine Learning, 82(1), 1–42. https://doi.org/10.1007/s10994-010-5216-5
  • Matei, O., Di Orio, G., Jassbi, J., Barata, J., & Cenedese, C. (2016). Collaborative data mining for intelligent home appliances. In: Afsarmanesh H., Camarinha-Matos L., Lucas Soares A. (eds) Collaboration in a Hyperconnected World. PRO-VE 2016. IFIP Advances in Information and Communication Technology, (Vol. 480 pp. 313–323). Springer, Cham. https://doi.org/10.1007/978-3-319-45390-3_27 .
  • Maxwell, J. (1992). Understanding and validity in qualitative research. Harvard Educational Review, 62(3), 279–301. https://doi.org/10.17763/haer.62.3.8323320856251826
  • McLaughlan, B., & Hexmoor, H. (2011). Emergent command and control architecture for dynamic agent communities. Journal of Experimental and Theoretical Artificial Intelligence, 23(4), 363–387. https://doi.org/10.1080/09528130701664608
  • Meidan, A., García-García, J. A., Ramos, I., & Escalona, M. J. (2018, June). Measuring software process: A systematic mapping study. ACM Comput. Surv, 51(3), 58:1–58: 32. https://doi.org/10.1145/3186888
  • Melgoza-Gutiérrez, J., Guerra-Hernández, A., & Cruz-Ramírez, N. (2014). Collaborative data mining on a bdi multi-agent system over vertically partitioned data. In Proceedings of special session 2014 13th mexican international conference on artificial intelligence: Advances in artificial intelligence, MICAI 2014, Tuxtla Gutiérrez, Mexico (pp. 215–220). Institute of Electrical and Electronics Engineers Inc.
  • Mishra, P., Hadfi, R., & Ito, T. (2016). Multiagent social influence detection based on facial emotion recognition. In: Bajo J. et al. (eds) Highlights of Practical Applications of Scalable Multi-Agent Systems. The PAAMS Collection. PAAMS 2016. Communications in Computer and Information Science, (Vol. 616 pp. 148–160). Springer, Cham. https://doi.org/10.1007/978-3-319-39387-2_13.
  • Mohammad, Y., & Nishida, T. (2010, August). Using physiological signals to detect natural interactive behavior. Applied Intelligence, 33(1), 79–92. SI. https://doi.org/10.1007/s10489-010-0241-4
  • Müller, J. P., & Fischer, K. (2014). Application impact of multi-agent systems and technologies: A survey. In O. Shehory & A. Sturm (Eds.), Agent-oriented software engineering: Reflections on architectures, methodologies, languages, and frameworks (pp. 27–53). Springer Berlin Heidelberg.
  • Munoz, S., Araque, O., Llamas, A., & Iglesias, C. (2018). A cognitive agent for mining bugs reports, feature suggestions and sentiment in a mobile application store. In Proceedings - 2018 int. conf. on big data innovations and applications, Innovate-Data 2018, Barcelona, Spain (pp. 17–24).
  • Naili, M., Bourahla, M., & Naili, M. (2019). Stability-based model for evacuation system using agent-based social simulation and monte carlo method. Int. J. Of Simulation and Process Modelling, 14(1), 1–16. https://doi.org/10.1504/IJSPM.2019.097702
  • Nair, R., Tambe, M., Yokoo, M., Pynadath, D., & Marsella, S. (2003). Taming decentralized POMDPs: Towards efficient policy computation for multiagent settings. In IJCAI international joint conference on artificial intelligence, Acapulco, Mexico (pp. 705–711). Morgan Kaufmann.
  • Neto, H., & Julia, R. (2018). ACE-RL-checkers: Decision-making adaptability through integration of automatic case elicitation, reinforcement learning, and sequential pattern mining. Knowledge and Information Systems, 57(3), 603–634. https://doi.org/10.1007/s10115-018-1175-0
  • Ngai, E. W., Xiu, L., & Chau, D. C. (2009). Application of data mining techniques in customer relationship management: A literature review and classification. Expert Systems with Applications, 36(2), 2592–2602. https://doi.org/10.1016/j.eswa.2008.02.021
  • Nwana, H. S. (1996). Software agents: An overview. Knowledge Engineering Review, 11(3), 205–244. https://doi.org/10.1017/S026988890000789X
  • Pai, M., Mcculloch, M., Gorman, J. D., Pai, N., Enanoria, W., Kennedy, G., … Kennedy, G. (2004). Clinical research methods systematic reviews and meta-analyses: An illustrated, step-by-step guide. The National Medical Journal of India, 17(2), 86–95. http://archive.nmji.in/Issue%2017-2%20PDF/Systematic-reviews-and-meta-analyses.pdf
  • Pandey, S. C., & Nandi, G. C. (2016). Convergence of knowledge, nature and computations: A review. Soft Computing, 20(1), 319–342. https://doi.org/10.1007/s00500-014-1510-7
  • Parsons, S., & Wooldridge, M. (2002). Game theory and decision theory in multi-agent systems. Autonomous Agents and Multi-agent Systems, 5(3), 243–254. https://doi.org/10.1023/A:1015575522401
  • Pérez, J., Cerezo, E., Seron, F. J., & Rodriguez, L.-F. (2016, Oct). A cognitive-affective architecture for ECAs. Biologically Inspired Cognitive Architectures, 18(1), 33–40. https://doi.org/10.1016/j.bica.2016.10.002
  • Petersen, K., Feldt, R., Mujtaba, S., & Mattsson, M. (2008). Systematic mapping studies in software engineering. In G. Visaggio & M. T. Baldassarre (Eds.), Proceedings of the 12th int. conf. on evaluation and assessment in software engineering (EASE’08), Bari, Italy (Vol. 17). BCS Learning & Development Ltd.
  • Petersen, K., & Gencel, C. (2013). Worldviews, research methods, and their relationship to validity in empirical software engineering research. In Proc. of the 2013 joint conf. of the 23nd int. w. on software measurement (IWSM) and the 8th int. conf. on software process and product measurement, Ankara, Turkey (pp. 81–89). Washington, DC, USA: IEEE Computer Society.
  • Petersen, K., Vakkalanka, S., & Kuzniarz, L. (2015). Guidelines for conducting systematic mapping studies in software engineering: An update. Information and Software Technology, 64, 1–18. https://doi.org/10.1016/j.infsof.2015.03.007
  • Pisarev, I., Kotova, E., Pisarev, A., & Stash, N. (2019). Development of scenarios for automatic processing and data mining in a multi-agent environment. In Proceedings of the 2019 IEEE conference of russian young researchers in electrical and electronic engineering, ElConRus 2019,St. Petersburg and Moscow,Russia (pp. 630–633).
  • Ponte, B., De La Fuente, D., Pino, R., & Rosillo, R. (2015). Real-time water demand forecasting system through an agent-based architecture. Int. J. Of Bio-Inspired Computation, 7(3), 147–156. https://doi.org/10.1504/IJBIC.2015.069559
  • Portmann, E., Meier, A., Cudre-Mauroux, P., & Pedrycz, W. (2015, June). FORA - A fuzzy set based framework for online reputation management. Fuzzy Sets and Systems, 269, 90–114. https://doi.org/10.1016/j.fss.2014.06.004
  • Portugal, I., Alencar, P., & Cowan, D. (2018). The use of machine learning algorithms in recommender systems: A systematic review. Expert Systems with Applications, 97, 205–227. https://doi.org/10.1016/j.eswa.2017.12.020
  • Poslad, S. (2007). Specifying protocols for multi-agent systems interaction. ACM Transactions on Autonomous and Adaptive Systems, 2(4), 15. https://doi.org/10.1145/1293731.1293735
  • Pruengkarn, R., Wong, K. W., & Fung, C. C. (2017). A review of data mining techniques and applications. Journal of Advanced Computational Intelligence and Intelligent Informatics, 21(1), 31–48. https://doi.org/10.20965/jaciii.2017.p0031
  • Qadori, H. Q., Zulkarnain, Z. A., Hanapi, Z. M., & Subramaniam, S. (2017). Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: A review paper. Int. J. Of Distributed Sensor Networks, 13(1), 1. https://doi.org/10.1177/1550147716684841
  • Qin, Z., Wan, T., Dong, Y., & Du, Y. (2015). Evolutionary collective behavior decomposition model for time series data mining. Applied Soft Computing Journal, 26, 368–377. https://doi.org/10.1016/j.asoc.2014.09.036
  • Rahman, M. S., Mahmud, M. A., Than Oo, A., & Pota, H. (2017, April). Multi-agent approach for enhancing security of protection schemes in cyber-physical energy systems. IEEE Transactions on Industrial Informatics, 13(2), 436–447. https://doi.org/10.1109/TII.2016.2612645
  • Rao, A. S., & Georgeff, M. P. (1995, 12–14 June). BDI agents: From theory to practice. In V. Lesser & L. Gasser (Eds.), Proceedings of the first international conference on multiagent systems (ICMAS’95) (pp. 312–319). San Francisco, CA: AAAI Press/MIT.
  • Recamonde-Mendoza, M., & Bazzan, A. L. (2016). Social choice in distributed classification tasks: Dealing with vertically partitioned data. Information Sciences, 332, 56–71. https://doi.org/10.1016/j.ins.2015.11.001
  • Richards, D., Bilgin, A., & Ranjbartabar, H. (2018). Users’ perceptions of empathic dialogue cues: A data-driven approach to provide tailored empathy. In Proceedings of the 18th international conference on intelligent virtual agents, IVA 2018, Sydney, Australia (p. 35–42).
  • Ropero, J., Gomez, A., Carrasco, A., & Leon, C. A fuzzy logic intelligent agent for information extraction: Introducing a new fuzzy logic-based term weighting scheme. (2012). Expert Systems with Applications, 39(4), 4567–4581. MAR. https://doi.org/10.1016/j.eswa.2011.10.009
  • Rosé, C. P., & Ferschke, O. (2016). Technology support for discussion based learning: From computer supported collaborative learning to the future of massive open online courses. International Journal of Artificial Intelligence in Education, 26(2), 660–678. https://doi.org/10.1007/s40593-016-0107-y
  • Rousset, A., Herrmann, B., Lang, C., & Philippe, L. (2016, November). A survey on parallel and distributed multi-agent systems for high performance computing simulations. Computer Science Review, 22, 27–46. https://doi.org/10.1016/j.cosrev.2016.08.001
  • Samper Zapater, J. J., Llido Escriva, D. M., Soriano Garcia, F. R., & Martinez Dura, J. J. (2015). Semantic web service discovery system for road traffic information services. Expert Systems with Applications, 42(8), 3833–3842. https://doi.org/10.1016/j.eswa.2015.01.005
  • San Pedro, M. O. C. Z., Baker, R. S. J. D., & Rodrigo, M. M. T. (2011). Detecting carelessness through contextual estimation of slip probabilities among students using an intelligent tutor for mathematics. I In: Biswas G., Bull S., Kay J., Mitrovic A. (eds) Artificial Intelligence in Education. AIED 2011. Lecture Notes in Computer Science, (Vol. 6738 pp. 304–311). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21869-9_40
  • Shan, M., Worrall, S., Masson, F. R., & Nebot, E. M. (2014). Using delayed observations for long-term vehicle tracking in large environments. IEEE Transactions on Intelligent Transportation Systems, 15(3), 967–981. https://doi.org/10.1109/TITS.2013.2292934
  • Shehory, O., & Sturm, A. (2014). Agent-oriented software engineering: Revisiting the state of the art. In O. Shehory & A. Sturm (Eds.), Agent-oriented software engineering (pp. 13–26). Springer Berlin Heidelberg.
  • Sherief, A. (2017). Mining dynamics: Using data mining techniques to analyze multi-agent learning. Journal of Intelligent Systems, 26(4), 613–624. https://doi.org/10.1515/jisys-2016-0136
  • Shoham, Y., & Leyton-Brown, K. (2008). Multiagent systems: Algorithmic, game-theoretic, and logical foundations. Cambridge University Press.
  • Silla Jr., C., & Freitas, A. (2011). A survey of hierarchical classification across different application domains. Data Mining and Knowledge Discovery, 22(1–2), 31–72. https://doi.org/10.1007/s10618-010-0175-9
  • Sreeja, N., & Sankar, A. (2016). A hierarchical heterogeneous ant colony optimization based approach for efficient action rule mining. Swarm and Evolutionary Computation, 29, 1–12. https://doi.org/10.1016/j.swevo.2016.02.004
  • Strauss, A., & Corbin, J. (1998). Basics of qualitative research: Techniques and procedures for developing grounded theory. SAGE Publications.
  • Symeonidis, A. L., Chatzidimitriou, K. C., Athanasiadis, I. N., & Mitkas, P. A. (2007). Data mining for agent reasoning: A synergy for training intelligent agents. Engineering Applications of Artificial Intelligence, 20(8), 1097–1111. https://doi.org/10.1016/j.engappai.2007.02.009
  • Tangod, K., & Kulkarni, G. (2020). Secure communication through multiagent system-based diabetes diagnosing and classification. Journal of Intelligent Systems, 29(1), 703–718. https://doi.org/10.1515/jisys-2017-0353
  • Thanudas, B., Sreelal, S., Cyril Raj, V., Purnesh Sairam, A., Gajmoti, V., & Joshi, P. (2019). A novel architecture for an integrated enterprise network security system. International Journal of Security and Networks, 14(1), 47–60. https://doi.org/10.1504/IJSN.2019.098919
  • Tounsi, Y., Anoun, H., & Hassouni, L. (2020). CSMAS: Improving multi-agent credit scoring system by integrating big data and the new generation of gradient boosting algorithms. In Proceedings of the 3rd international conference on networking, information systems & security. New York, NY, USA: Association for Computing Machinery.
  • Uschold, M., & Gruninger, M. (1996). Ontologies: Principles, methods and applications. The Knowledge Engineering Review, 11(2), 93–136. https://doi.org/10.1017/S0269888900007797
  • Vidhya, K. A., & Geetha, T. V. (2017). Rough set theory for document clustering: A review. Journal of Intelligent and Fuzzy Systems, 32(3), 2165–2185. https://doi.org/10.3233/JIFS-162006
  • Vimala, S., Khanaa, V., & Nalini, C. (2019). A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks. Cluster Computing, 22(S2), 4065–4074. https://doi.org/10.1007/s10586-018-2686-x
  • Wieringa, R., Maiden, N., Mead, N., & Rolland, C. (2005, December). Requirements engineering paper classification and evaluation criteria: A proposal and a discussion. Requirements Engineering, 11(1), 102–107. https://doi.org/10.1007/s00766-005-0021-6
  • Wooldridge, M. (2009). An introduction to multiagent systems (2nd edition ed.). Wiley.
  • Xu, J., Tekin, C., Zhang, S., & van der Schaar, M. (2015). Distributed multi-agent online learning based on global feedback. IEEE Transactions on Signal Processing, 63(9), 2225–2238. https://doi.org/10.1109/TSP.2015.2403288
  • Xue, J., & Jarvis, S. (2018). Mining association rules for admission control and service differentiation in e-commerce applications. Wiley Interdisciplinary Reviews. Data Mining and Knowledge Discovery, 8(3), e1241. https://doi.org/10.1002/widm.1241
  • Yakopcic, C., Rahman, N., Atahary, T., Taha, T., Beigh, A., & Douglass, S. (2019). High speed cognitive domain ontologies for asset allocation using loihi spiking neurons. In Proceedings of the international joint conference on neural networks, Budapest, Hungary (Vol. 2019- July).
  • Zambonelli, F., Jennings, N. R., & Wooldridge, M. (2003). Developing multiagent systems: The gaia methodology. ACM Transactions on Software Engineering and Methodology, 12(3), 317–370. https://doi.org/10.1145/958961.958963
  • Zamzami, N., & Schiffauerova, A. (2017, June). The impact of individual collaborative activities on knowledge creation and transmission. Scientometrics, 111(3), 1385–1413. https://doi.org/10.1007/s11192-017-2350-x
  • Zhan, Z.-H., Zhang, J., Li, Y., & Chung, -H.-H. (2009). Adaptive particle swarm optimization. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39(6), 1362–1381. https://doi.org/10.1109/TSMCB.2009.2015956
  • Zhou, T.-Y., Zang, Y.-C., Zhu, J.-H., & Wang, Q.-X. (2019). Nig-ap: A new method for automated penetration testing. Frontiers of Information Technology and Electronic Engineering, 20(9), 1277–1288. https://doi.org/10.1631/FITEE.1800532
  • Zimmermann, A. (2020). Method evaluation, parameterization, and result validation in unsupervised data mining: A critical survey. Wiley Interdisciplinary Reviews. Data Mining and Knowledge Discovery, 10(2), e1330. https://doi.org/10.1002/widm.1330

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.