Agent Based Expert System for Online Assessment in Distributed Database Environment: Prototype Design and Implementation
|
|
|
- Gwen Austin
- 10 years ago
- Views:
Transcription
1 Agent Based Expert System for Online Assessment in Distributed Database Environment: Prototype Design and Implementation Khurshid Alam Borbora 1, Ridip Dev Choudhury 2, Shikhar Kr. Sarma 3 Assistant Professor, Department of Computer Science), Gauhati University Institute of Distance and Open Learning, Guwahati, India 1 Assistant Professor, Department of Computer Science), Gauhati University Institute of Distance and Open Learning, Guwahati, India 2 Professor & HOD, Department of IT, Gauhati University, Guwahati, India 3 ABSTRACT: The Distance Learning scenario has been changed with the advancement of Internet technology. They key issue in Distance Learning is the assessment of students activities. approach can improve the development of Expert System Applications. In this work, we present the design and implementation of a FIPA compliant based Expert System in Distributed Database Environment using JESS in the JADE framework with JIPMS support and it is deployed in J2EE platform using MVC paradigm. Keywords: Mobile agent, expert system, JESS, online assessment, FIPA, J2EE, MVC, JADE, JIPMS, distributed database environment I. INTRODUCTION Over the last decade, mobile agent paradigm and technology [1],[2],[3] have shown high potential and flexibility for the design and implementation of general-purpose distributed applications, particularly in dynamic environments such as those based on the Internet. A mobile agent can be defined as an autonomous software entity which can migrate from one host to another to fulfil a goal-oriented task. Mobile agents are supported and managed by distributed software platforms known as Systems (MASs) [4]. Although plenty of MASs are currently available and several critical advantages deriving from the exploitation of mobile agents have clearly been demonstrated by both academic and industrial research efforts [1],[3],[5], the following major drawbacks still hinder the widespread use of mobile agents: the lack of appropriate security mechanisms, the lack of interoperability, and the lack of software development processes and modelling languages tailored for mobile agents [4]. This paper actually represents the design and implementation of mobile agent and local agent; the mobile agent is used to move server to server and gathers question set. The servers may not have the same DBMS running on them, so therefore a local agent is developed for the different DBMS as a mediator between the mobile agent and DBMS. II. FIPA SPECIFICATIONS FIPA97 specifications [6] which is the first document of FIPA and it specifies the normative rules that allow agents to inter-operate, those are effectively exist, operate and can be managed. A. AGENT PLATFORM: The standard model of an agent platform, as defined by FIPA, is represented in the following Fig. 1. [6] The Agent Management System (AMS) is the agent who exerts supervisory control over access to and use of the Agent Platform. Only one AMS will exist in a single platform. The AMS provides white-page and life-cycle service, maintaining a directory of agent identifiers (AID) and agent state. Each agent must register with an AMS in order to get a valid AID. [7] Copyright to IJIRCCE
2 The Directory Facilitator (DF) is the agent who provides the default yellow page service in the platform. The Message Transport System, also called Agent Communication Channel (ACC), is the software component controlling all the exchange of messages within the platform, including messages to/from remote platforms. [7] Agent Platform Agent Agent Management System (AMS) Directory Facilitator (DF) Message Transport System Fig. 1 Reference architecture of a FIPA Agent Platform There is no restriction for the technology used for the platform implementation but all should be FIPA compliant implementations. The FIPA standard also specifies the Agent Communication Language (ACL). Here, the communication between agents is based on message passing, i.e. agents communicate by formulating message and then sending formulated message to each other. III. MOBILE AGENT DESIGN PATTERNS Though in different case studies ([8],[9],[10] and [11]), the mobile agent technology has been successfully applied but the restrictions in its application in practical scenarios still exists. Different design patterns on mobile agents have been proposed in [12] and [13]. Below are the brief descriptions on various design patterns: A. Itinerary This design pattern is proposed in [13]. Here the agent receives an itinerary on the source agency which indicates the sequence of agencies/servers it should visit. In each of the agencies/servers, the agent executes its task locally and then continues on its itinerary. After visiting the last agency/server, the agent then goes back to its source agency/server. This design pattern is depicted in Fig. 2. Migrating Fig. 2: Itinerary Design Pattern Copyright to IJIRCCE
3 Migrating Fig. 3: Star-Shaped Design Pattern B. Star-Shaped In Star-Shaped design pattern [13], the agent has a list of agencies/servers to migrate. The agent then migrates to the first destination agency/server, executes the task, going back to the source agency/server. The agent repeats this until it visits the last agency/server in its list. Fig. 3 shows this pattern. C. Branching In the Branching design pattern [13], the agent receives a list of agencies/servers to visit. It then clones itself according to the numbers of agencies/servers in the itinerary. Each of the clones has to execute its corresponding task in an agency/server respectively. And the clones notify the source agency/server when the respective task of each of them is completed. Here, in this pattern, parallel execution of the task/tasks can be achieved. This pattern is shown at Fig. 4. D. Master-Slave Here in this Master-Slave [14] design pattern, there are two types of agents, the master agent and the other is the slave agent. The master agent gives a task to be done in a given agency/server to a slave agent. The slave agent then visits the indicated agency/server to accomplish its task and then returns with the results to the source agency/server. The master agent receives the results from the slave agent and then the slave destroys himself. E. MoProxy This design pattern is proposed in [15], proposed when an agent needs a resource, it requests to the Resource Granter, indicating the desired permissions. Then, the resource granter returns a mobile proxy for the agent in order to access the resource with the desired permissions depending on the restrictions of the resource. F. Meeting The Meeting pattern [14] suggests a way to promote local interactions between agents distributed on the net. Such interactions make possible the execution of given tasks, as well as the optimization of results. Then, the Meeting Agent, who will meet others, has a Meeting object that keeps the place and the identification of the meeting. In this way, the Meeting Agent requests the Meeting object the place of the meeting and then migrates to it. A Meeting Manager, which is an entity that manages the meeting, is responsible for notifying the agents located in the meeting place about the arrivals and exits of new ones. The Meeting object is responsible for inter-mediating the register of the agent on the manager. Copyright to IJIRCCE
4 Migrating A Clone Fig. 4: Branching Design Pattern G. Facilitator The Facilitator pattern [14] defines a service that provides a name service and localization of agents with specific abilities, thus facilitating the localization of a given agent. H. Mutual Itinerary Recording This pattern [16] is a general schema that guarantees the itinerary of a given agent will be registered and tracked by other cooperative agent and vice-versa, in a disposal of mutual support. When an agent is moving between platforms, it carries the information from the last platform, the current and the next ones to the cooperative agent through an authenticated channel. The agent keeps the register of the itinerary and it always compares the itinerary that it possesses with the received one. When an inconsistence is detected it should be treated. For instance, it would either disallow the agent to visit the platform that caused the inconsistency, or suspend the functioning of an agent, or send the agent back to the source agency. IV. MOBILE AGENT DESIGN PATTERN USED IN EESOA In the design and implementation of the EESOA [17] framework, we have considered the Itinerary design pattern for our mobile agent, QSGMA. In today s computing world, the speed of the networks: LAN, MAN, WAN, Internet etc., is increasing day-by-day. Therefore, we have given priority to the load on the server where the EESOA resides. We have designed a mobile agent which will start with the list of servers to be visited and then visit each of the servers one-by-one and gather questions and at last goes back to the source server. We also have designed local agent, QSGLA which must be in every server, which is a communicating agent with the DBMS in each of the servers, Fig. 5. V. SOFTWARE TOOLS USED This work is an extension of ESOA, a Web based Expert System for Online Assessment, which has implemented using: JESS (7.1p2): JESS is a Java based Rule Engine and scripting environment and it also supports Java API.[18] J2EE Platform: It is a platform-independent, Java-centric environment from Sun for developing, building and deploying Web-based enterprise applications online. The J2EE platform consists of a set of services, APIs, and protocols that provide the functionality for developing multitiered, Web-based applications. [19] J2SDK (1.5.0): The Java 2 Software Development Kit is the package containing the java compiler and other tools needed to convert your java programs into executable class files which can be run by the java interpreter. The J2SDK can be downloaded from java.sun.com for free. Versions are available for windows, linux and solaris and Mac. [20] Copyright to IJIRCCE
5 MySQL Server (Version 5.5): It is the world's most widely used open source relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. [21] Apache HTTP Server (Version 2.2): The Apache HTTP Server commonly referred to as Apache, is a web server software program notable for playing a key role in the initial growth of the World Wide Web. It became the first web server software to surpass the 100 million website milestone. [22] Apache Tomcat (Version 6.0): Apache Tomcat (or simply Tomcat, formerly also Jakarta Tomcat) is an open source web server and servlet container developed by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the JavaServer Pages (JSP) specifications from Sun Microsystems, and provides a "pure Java" HTTP web server environment for Java code to run. [23] Apart from the above software tools, the following software tools are used in the EESOA implementation: JADE (Version 4.3.0) JIPMS (Version 1.2) Question Fact (RDBMS) Question Fact (RDBMS) QSGLA Question Fact (RDBMS) QSGLA QSGMA QSGMA QSGLA QSGMA NETWORK Migrating (Virtual Path) Question Fact (RDBMS) Question Fact (RDBMS) QSGLA Local Agent QSGLA QSGMA QSGMA Fig. 5: Design Pattern used in EESOA Copyright to IJIRCCE
6 A. JADE and JIPMS JADE (Java Agent Development Framework) is a software development framework aimed at developing multiagent systems and applications conforming to FIPA standards for intelligent agents. It includes two main products: a FIPA-compliant agent platform and a package to develop Java agents. JADE has been fully coded in Java and an agent programmer, in order to exploit the framework. It is written in Java language and is made of various Java packages, giving application programmers both ready-made pieces of functionality and abstract interfaces for custom, application dependent tasks. [7] 1) Components of JADE: JADE is a middleware that facilitates the development of multi-agent systems. It includes [24]: A runtime environment where JADE agents can live and that must be active on a given host before one or more agents can be executed on that host. A library of classes that programmers have to/can use (directly or by specializing them) to develop their agents. A suite of graphical tools that allows administrating and monitoring the activity of running agents. When the JADE platform is launched, both the AMS and the DF (discussed in section 2) are automatically created. Currently, the following tools are available [7]: Remote Management Agent, RMA for short, acting as a graphical console for platform management and control. Moreover, the RMA console is able to start other JADE tools. The Dummy Agent is a monitoring and debugging tool, made of a graphical user interface and an underlying JADE agent. Using the GUI it is possible to compose ACL messages and send them to other agents. The Sniffer is an agent that can intercept ACL messages while they are in flight, and displays them graphically using a notation similar to UML sequence diagrams. It is useful for debugging your agent societies by observing how they exchange ACL messages. The Introspector is an agent that allows to monitoring the life cycle of an agent, its exchanged ACL messages and the behaviours in execution. The DF GUI is a complete graphical user interface that is used by the default Directory Facilitator (DF) of JADE and that can also be used by every other DF that the user might need. In such a way, the user might create a complex network of domains and sub-domains of yellow pages. The LogManagerAgent is an agent that allows setting at runtime logging information, such as the log level, for both JADE and application specific classes that use Java Logging. The SocketProxyAgent is a simple agent, acting as a bidirectional gateway between a JADE platform and an ordinary TCP/IP connection. ACL messages, travelling over JADE proprietary transport service, are converted to simple ASCII strings and sent over a socket connection. Viceversa, ACL messages can be tunnelled via this TCP/IP connection into the JADE platform. This agent is useful, e.g. to handle network firewalls or to provide platform interactions with Java applets within a web browser. 2) Containers and Platforms: Each running instance of the JADE runtime environment is called a Container as it can contain several agents. The set of active containers is called a Platform. A single special Main container must always be active in a platform and all other containers register with it as soon as they start. It follows that the first container to start in a platform must be a main container while all other containers must be normal (i.e. nonmain) containers and must be told where to find (host and port) their main container (i.e. the main container to register with). [24] Copyright to IJIRCCE
7 3) JIPMS: JIPMS (JADE Inter-platform Mobility Service) is a service which allows Inter-platform mobility support to JADE. It is an extra module, which does not come with JADE package and can be downloadable from the net. [17] VI. IMPLEMENTATION OF AGENTS A. Implementation of the (QSGMA) The agent, QSGMA, is the mobile agent and which is running in all the question database servers. This agent is inherited from the built-in class in JADE, jade.core.agent [7,24]. import jade.core.agent; public class QSGMA extends Agent { // Member-Variable Declarations Question[] qarray; int totalqhosts; String[] qhostips; boolean state; int curhostno; // Code the constructors and different methods... protected void setup() {.. One of the member-variables, qarray[], which is an array of type Question, is used to store question obejects after fetching from the servers. Question is a simple class: public class Question { String qid; String question; String qhostip;... The member, totalqhosts, holds the total no of servers and the String array, qhostips, will have the ip-addresses of the servers those are to be visited by the mobile agent. When the agent QSGMA is executed, at first the constructor is executed, where the members- totalqhosts and qhostips[], are initialized, and the Agent is given an identifier and is registered in the AMS, and is put in the ACTIVE state +platformmachine:port+ /JADE The setup() method, is intended to include agent initializations, and is used to: Copyright to IJIRCCE
8 (optionally) modify the data registered with the AMS (optionally) attribute services to the agent, and register with one or more domains (DFs) add behaviours (tasks) which will be scheduled as soon as the setup() method returns protected void dodelete() { The dodelete() method is used to stop the agent execution. protected void takedown() { The takedown() method is used for any cleanup (e.g. unregister from DF) before the agent is destroyed. The actual job an agent has to do is typically carried out within behaviours. A behaviour represents a task that an agent can carry out. In our case the question fetch task is implemented as an object of the class, QFetchBehaviour, that extends jade.core.behaviours.simplebehaviour. public class QFetchBehaviour extends SimpleBehaviour { // Data-member Declarations & Constructor Definition Agent agent; public void action() { if( state == TRUE ){ agent.domove ( destination-machine-location );.. state = FALSE; else { ACLMessage mmessage = new ACLMessage ( ACLMessage.REQUEST ); send ( mmessage ); block(); public boolean done() {.. Copyright to IJIRCCE
9 The action() method actually defines the operations to be performed when the behaviour is in execution and the done() method (returns a boolean value), that specifies whether or not a behaviour has completed and have to be removed from the pool of behaviours an agent is carrying out. [7] domove() method, takes a parameter of type jade.core.location, migrates the agent to a new location identified by the parameter. The ACLMessage class is used for communication between the agents which is basically asynchronous message passing. The performative can be REQUEST, if the sender wants the receiver to perform an action. So, inside the QSGMA agent class, there is a member-variable: QFetchBehaviour hbehaviour; Inside the setup() method, the statement, hbehaviour = new QFetchBehaviour(course, subject, topic, paramvalue); addbehaviour(hbehaviour); The addbehaviour() method adds the behaviour, QFetchBehaviour, to the agent for the tasks to be executed. The parameters: (a) course: indicates the course for the assessment, (b) subject: indicates the subject for the assessment, (c) topic: indicates the topic of the assessment, (d) paramvalue: is of String type and it holds the values, to be treated as percentage of questions to be supplied according to toughness of the questions, separated by. The mobile agent, QSGMA, will communicate with QSGLA for retrieval of question from the respective server. The QSGLA will then communicate with the DBMS and get the result questions and give them to QSGMA. QSGMA then update his question data and then move to the next server and so on until it visits the last server. B. Implementation of the Local Agent (QSGLA) The local agent, QSGLA, is designed in such a way that it can communicate with most of the DBMS for the retrieval of questions. The implementation of the local agent, QSGLA, is given below: public class QSGLA extends Agent { // Member-Variable Declarations static int no_of_agents; Question[] qarray; // Code the constructors and different methods... One of the member-variables, qarray[], which is an array of type Question, is used to store question objects after fetching from the servers. Question is a simple class, whose definition is already mentioned above. protected void setup() { Copyright to IJIRCCE
10 .. The setup() method is intended to include agent initializations. In the setup() method, the method dolisten() is called which will listen for the requests from agent QSGLA. protected void dodelete() { The dodelete() method is used to stop the agent execution. The takedown() method is used for any cleanup (e.g. unregister from DF) before the agent is destroyed. protected void takedown() { The actual job an agent has to do is typically carried out within behaviours. A behaviour represents a task that an agent can carry out. In our case the question fetch task is implemented as an object of the class, QRetBehaviour, that extends jade.core.behaviours.simplebehaviour. public class QRetBehaviour extends SimpleBehaviour { //Code of the Constructors //Code of the different methods public void action() { ACLMessage msg = myagent.receive(); if (msg!= null){.... return true; else { block(); return false;. public boolean done() {.. Copyright to IJIRCCE
11 An agent can pick up messages from its message queue by means of the receive() method [24]. The block() method marks the behaviour of the agent as blocked. So, inside the QSGLA agent class, there is a member-variable: QRetBehaviour hbehaviour; Inside the setup() method, the statement, hbehaviour = new QRetBehaviour(); addbehaviour(hbehaviour); The addbehaviour() method adds the behaviour, QRetBehaviour, to the agent for the tasks to be executed. Inside the code, if (msg!= null){.., the job of question retrieval and sending the result set of questions back to the QSGMA. VII. TESTING The Expert System, EESOA, is implemented and tested in a computer laboratory LAN. Four nodes have been configured in such a way that they can be treated as database servers with local IPs. Out of the four servers, in two servers MySQL DBMS is running and in the other two, PostgreSQL is running. In one of them, the EESOA is running. In the database server, where ESOA is running, has students history data as well as question bank. And in the remaining three database servers, only the question banks exist. In all the database servers, the JRE is installed. Also JADE and JIPMS 1.2 are installed in all the servers. And all the remaining nodes are treated as clients. The system is then tested with a small group of students. The assessment has been done a no. of times and the system performs properly. VIII. CONCLUSION AND FUTURE WORK This paper presents the prototype design and development of a mobile agent based Expert System for Online Assessment (EESOA) in distributed database environment for the students and more specifically for the ODL learners. The prototype of the system is designed, implemented and then tested in a small LAN. Since the environment, where we tested the system, is a computer laboratory LAN where no real-time traffic is there. The system is to be tested in a real-time environment and then we can actually measure the performance of the system. The students history will increase with the enrolment of new students and also with the assessment done by the students. Here this case the students history will be a huge data-bank. In later time, this rapid increase in the students history data will affect the performance of the system. So, for the job of fetching students history, mining-technique can be implemented. The rules in the system are predefined. Here we can make improvement in the generation of rules with the help of machine learning techniques. Also the work can be extended by also distributing the student database as the way the question database was distributed here. This extension will be useful for the universities/institutions in collaboration for introduction of new courses jointly. REFERENCES 1. Kotz, David, George Cybenko, and Daniela Rus. "Mobile agents: Motivations and state-of-the-art systems." (2000). 2. Gschwind, Thomas. "Comparing object oriented mobile agent systems." (2000). 3. Braun, Peter, and Wilhelm R. Rossak. Mobile agents: Basic concepts, mobility models, and the tracy toolkit. Elsevier, Fortino, Giancarlo, Alfredo Garro, and Wilma Russo. "Achieving mobile agent systems interoperability through software layering." Information and software technology 50.4 (2008): Lange, Danny B., and Oshima Mitsuru. Programming and Deploying Java s Aglets. Addison-Wesley Longman Publishing Co., Inc., Foundation for Intelligent Physical Agents. Specifications Available from 7. JADE Programmer s Guide by Fabio Bellifemine, Giovanni Caire, Tiziana Trucco (TILAB, formerly CSELT), Giovanni Rimassa (University of Parma) available from 8. Hayzelden, Alex LG, and John Bigham, eds. Software agents for future communication systems. Springer, Bernardes, Mauro Cesar, and Edson dos Santos Moreira. "Implementation of an intrusion detection system based on mobile agents." Software Engineering for Parallel and Distributed Systems, Proceedings. International Symposium on. IEEE, Copyright to IJIRCCE
12 10. Klein, Cornel, et al. "Extension of the Unified Modeling Language for s." (2001): Glitho, Roch H., Edgar Olougouna, and Samuel Pierre. "Mobile agents and their use for information retrieval: a brief overview and an elaborate case study." Network, IEEE 16.1 (2002): Aridor, Yariv, and Danny B. Lange. "Agent design patterns: elements of agent application design." Proceedings of the second international conference on Autonomous agents. ACM, Yoshioka, Nobukazu, et al. "Security for mobile agents." Agent-Oriented Software Engineering. Springer Berlin Heidelberg, Oshima, M. I. T. S. U. R. U., and DANNY B. Lange. "Programming and Deploying Java s with Aglets." Canada, August (1998). 15. A.Kr. Singh, R. Sankar, and V. Jamwal. Design patterns for mobile agent applications. 16. Jansen, Wayne, Peter Mell, Tom Karygiannis, and Donald Marks. "Mobile agents in intrusion detection and response." In Proceedings of the 12th Annual Canadian Information Technology Security Symposium, vol Borbora, Khurshid Alam, Ridip Dev Choudhury, and Shikhar Kumar Sarma. "A FRAMEWORK FOR AGENT BASED EXPERT SYSTEM FOR ONLINE ASSESSMENT IN DISTRIBUTED DATABASE ENVIRONMENT." International Journal (2013). 18. Menken, Maarten. "JESS tutorial." Vrije Universiteit, Amsterdam, The Netherlands (2002): JADE Tutorial: JADE Programming for Beginners by Giovanni Caire (TILAB, formerly CSELT) available from Copyright to IJIRCCE
JADE: Java Agent Development Framework What is it? How can I use it?
JADE: Java Agent Development Framework What is it? How can I use it? Based on Online documentation of Jade http://jade.tilab.com/ 1 Overview Agent Communication Language Jade Features The agent Platform
http://jade.tilab.com/
http://jade.tilab.com/ JADE A framework for developing multi-agent systems FIPA-compliant Written in JAVA, consists of an API with several packages Agent platform: 2 AMS and DF Agent Management System
Multi-Agent Systems. Mehdi Dastani
Multi-Agent Systems Mehdi Dastani What is JADE? JADE (Java Agent DEvelopment framework) is a FIPA compliant agent platform and a Java framework for the development of MAS. The Jade platform is based on
Java Agent DEvelopment Framework (JADE)
Java Agent DEvelopment Framework (JADE) Laboratory of Multiagent Systems LM Laboratorio di Sistemi Multiagente LM Elena Nardini [email protected] Ingegneria Due Alma Mater Studiorum Università di
NetBeans IDE Field Guide
NetBeans IDE Field Guide Copyright 2005 Sun Microsystems, Inc. All rights reserved. Table of Contents Introduction to J2EE Development in NetBeans IDE...1 Configuring the IDE for J2EE Development...2 Getting
A Monitored Student Testing Application Using Cloud Computing
A Monitored Student Testing Application Using Cloud Computing R. Mullapudi and G. Hsieh Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA [email protected], [email protected]
Mastering Tomcat Development
hep/ Mastering Tomcat Development Ian McFarland Peter Harrison '. \ Wiley Publishing, Inc. ' Part I Chapter 1 Chapter 2 Acknowledgments About the Author Introduction Tomcat Configuration and Management
Case Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB
September Case Studies of Running the Platform NetBeans UML Servlet JSP GlassFish EJB In this project we display in the browser the Hello World, Everyone! message created in the session bean with servlets
FioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential
What Is the Java TM 2 Platform, Enterprise Edition?
Page 1 de 9 What Is the Java TM 2 Platform, Enterprise Edition? This document provides an introduction to the features and benefits of the Java 2 platform, Enterprise Edition. Overview Enterprises today
Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002
Page 1 of 9 Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2002/07/17/tomcluster.html See this if you're having trouble printing code examples Clustering
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
FIPA agent based network distributed control system
FIPA agent based network distributed control system V.Gyurjyan, D. Abbott, G. Heyes, E. Jastrzembski, C. Timmer, E. Wolin TJNAF, Newport News, VA 23606, USA A control system with the capabilities to combine
MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper
Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper
Oracle WebLogic Server 11g: Administration Essentials
Oracle University Contact Us: 1.800.529.0165 Oracle WebLogic Server 11g: Administration Essentials Duration: 5 Days What you will learn This Oracle WebLogic Server 11g: Administration Essentials training
ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
ACM Crossroads Student Magazine The ACM's First Electronic Publication
Page 1 of 8 ACM Crossroads Student Magazine The ACM's First Electronic Publication Crossroads Home Join the ACM! Search Crossroads [email protected] ACM / Crossroads / Columns / Connector / An Introduction
SurfCop for Microsoft ISA Server. System Administrator s Guide
SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know
How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
3.5. cmsg Developer s Guide. Data Acquisition Group JEFFERSON LAB. Version
Version 3.5 JEFFERSON LAB Data Acquisition Group cmsg Developer s Guide J E F F E R S O N L A B D A T A A C Q U I S I T I O N G R O U P cmsg Developer s Guide Elliott Wolin [email protected] Carl Timmer [email protected]
Forward proxy server vs reverse proxy server
Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose
SimWebLink.NET Remote Control and Monitoring in the Simulink
SimWebLink.NET Remote Control and Monitoring in the Simulink MARTIN SYSEL, MICHAL VACLAVSKY Department of Computer and Communication Systems Faculty of Applied Informatics Tomas Bata University in Zlín
Building Java Servlets with Oracle JDeveloper
Building Java Servlets with Oracle JDeveloper Chris Schalk Oracle Corporation Introduction Developers today face a formidable task. They need to create large, distributed business applications. The actual
A framework for web-based product data management using J2EE
Int J Adv Manuf Technol (2004) 24: 847 852 DOI 10.1007/s00170-003-1697-8 ORIGINAL ARTICLE M.Y. Huang Y.J. Lin Hu Xu A framework for web-based product data management using J2EE Received: 8 October 2002
Oracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001
Oracle9i Application Server: Options for Running Active Server Pages An Oracle White Paper July 2001 Oracle9i Application Server: Options for Running Active Server Pages PROBLEM SUMMARY...3 INTRODUCTION...3
Architectural Overview
Architectural Overview Version 7 Part Number 817-2167-10 March 2003 A Sun ONE Application Server 7 deployment consists of a number of application server instances, an administrative server and, optionally,
Introduction to Sun ONE Application Server 7
Introduction to Sun ONE Application Server 7 The Sun ONE Application Server 7 provides a high-performance J2EE platform suitable for broad deployment of application services and web services. It offers
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent Chintan Bhatt 1, Asha Koshti 2,Hemant Agrawal 3, Zakiya Malek 4, Dr Bhushan Trivedi 5 MCA Dept.,GLS Institute of Computer
Extending Desktop Applications to the Web
Extending Desktop Applications to the Web Arno Puder San Francisco State University Computer Science Department 1600 Holloway Avenue San Francisco, CA 94132 [email protected] Abstract. Web applications have
DeskNow. Ventia Pty. Ltd. Advanced setup. Version : 3.2 Date : 4 January 2007
Ventia Pty. Ltd. DeskNow Advanced setup Version : 3.2 Date : 4 January 2007 Ventia Pty Limited A.C.N. 090 873 662 Web : http://www.desknow.com Email : [email protected] Overview DeskNow is a computing platform
MULEP-A Multi Level E-Procurement System with Distributed Agents
MULEP-A Multi Level E-Procurement System with Distributed s Ozgur Koray SAHINGOZ, Emre OZTAS Abstract Supply chain management system satisfies the customer demands through the most efficient use of resources,
PERFORMANCE MONITORING OF JAVA COMPONENT-ORIENTED DISTRIBUTED APPLICATIONS
PERFORMANCE MONITORING OF JAVA COMPONENT-ORIENTED DISTRIBUTED APPLICATIONS Adrian Mos, John Murphy Performance Engineering Lab, Dublin City University Glasnevin, Dublin 9, Ireland Tel: +353 1 700-8762,
2. Accessing Databases via the Web
Supporting Web-Based Database Application Development Quan Xia 1 Ling Feng 2 Hongjun Lu 3 1 National University of Singapore, Singapore, [email protected] 2 Hong Kong Polytechnic University, China,
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT
EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT Dr. Alexander Pons, University of Miami, [email protected] ABSTRACT The deployment of Web applications consisting of dynamic content requires the selection
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Zeenov Agora High Level Architecture
Zeenov Agora High Level Architecture 1 Major Components i) Zeenov Agora Signaling Server Zeenov Agora Signaling Server is a web server capable of handling HTTP/HTTPS requests from Zeenov Agora web clients
Security Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
WebSphere Server Administration Course
WebSphere Server Administration Course Chapter 1. Java EE and WebSphere Overview Goals of Enterprise Applications What is Java? What is Java EE? The Java EE Specifications Role of Application Server What
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved
Mobile Application for News and Interactive Services L. Ashwin Kumar Department of Information Technology, JNTU, Hyderabad, India [email protected] ABSTRACT In this paper, we describe the design and
MD Link Integration. 2013 2015 MDI Solutions Limited
MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY
Application Servers - BEA WebLogic. Installing the Application Server
Proven Practice Application Servers - BEA WebLogic. Installing the Application Server Product(s): IBM Cognos 8.4, BEA WebLogic Server Area of Interest: Infrastructure DOC ID: AS01 Version 8.4.0.0 Application
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It
[1]Oracle Communications Billing and Revenue Management Web Services Manager Release 7.5 E16724-11
[1]Oracle Communications Billing and Revenue Management Web Services Manager Release 7.5 E16724-11 December 2015 Oracle Communications Billing and Revenue Management Web Services Manager, Release 7.5 E16724-11
Glassfish, JAVA EE, Servlets, JSP, EJB
Glassfish, JAVA EE, Servlets, JSP, EJB Java platform A Java platform comprises the JVM together with supporting class libraries. Java 2 Standard Edition (J2SE) (1999) provides core libraries for data structures,
Scalability and Performance of JADE Message Transport System
E.Cortese Telecom Italia LAB Centro Direzionale isola F7 8143 Naples Italy +39819718364 [email protected] Scalability and Performance of JADE Message Transport System F.Quarta Telecom Italia
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
Chapter 3 Technology adapted
Chapter 3 Technology adapted 3.1 Introduction In developing a web enabled solution for laboratory data and document management, there are several options available for system analysis and designing, documentation
Oracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
Java Application Developer Certificate Program Competencies
Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle
Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.
Oracle WebLogic Foundation of Oracle Fusion Middleware Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.com/in/lawrence143 History of WebLogic WebLogic Inc started in 1995 was a company
JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS. Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany
JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS Christof Röhrig, 1 Andreas Jochheim 2 Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany Abstract: This paper
IBM WebSphere Server Administration
IBM WebSphere Server Administration This course teaches the administration and deployment of web applications in the IBM WebSphere Application Server. Duration 24 hours Course Objectives Upon completion
How To Use The Dcml Framework
DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application
File S1: Supplementary Information of CloudDOE
File S1: Supplementary Information of CloudDOE Table of Contents 1. Prerequisites of CloudDOE... 2 2. An In-depth Discussion of Deploying a Hadoop Cloud... 2 Prerequisites of deployment... 2 Table S1.
Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)
Open EMS Suite O&M Agent Functional Overview Version 1.2 Nokia Siemens Networks 1 (18) O&M Agent The information in this document is subject to change without notice and describes only the product defined
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Efficiency of Web Based SAX XML Distributed Processing
Efficiency of Web Based SAX XML Distributed Processing R. Eggen Computer and Information Sciences Department University of North Florida Jacksonville, FL, USA A. Basic Computer and Information Sciences
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 5
Course Page - Page 1 of 5 WebSphere Application Server 7.0 Administration on Windows BSP-1700 Length: 5 days Price: $ 2,895.00 Course Description This course teaches the basics of the administration and
FileMaker 11. ODBC and JDBC Guide
FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
UBS KeyLink Quick reference WEB Installation Guide
ab UBS KeyLink Quick reference WEB Installation Guide Table of contents 1. Introduction 3 1.1. Why is an Installation needed? 3 1.2. Is UBS KeyLink secure? 3 1.3. Information about Secure Sockets Layer
Information and Teleommunications Converged Application Developed Using the SIP Built-in Application Server SipAs on WebLogic
Information and Teleommunications Converged Application Developed Using the Built-in Application Server SipAs on WebLogic Akitoshi Usui Since 2004 competition for converting IP communications has been
INTRODUCTION TO JAVA PROGRAMMING LANGUAGE
INTRODUCTION TO JAVA PROGRAMMING LANGUAGE Today Java programming language is one of the most popular programming language which is used in critical applications like stock market trading system on BSE,
EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
White Paper How to Remotely Access Ethernet I/O Over the Internet
White Paper How to Remotely Access Ethernet I/O Over the Internet ACROMAG INCORPORATED Tel: (248) 295-0880 30765 South Wixom Road Fax: (248) 624-9234 P.O. BOX 437 Wixom, MI 48393-7037 U.S.A. Copyright
Installing Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
CHAPTER 7 SSL CONFIGURATION AND TESTING
CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON
Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, [email protected] Writing a custom web
Oracle Communications WebRTC Session Controller: Basic Admin. Student Guide
Oracle Communications WebRTC Session Controller: Basic Admin Student Guide Edition 1.0 April 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved. Disclaimer This document contains proprietary
Firewall Port Handling in TENA Applications
Firewall Port Handling in TENA Applications The purpose of this report is to describe the manner in which TENA applications handle communications using TCP. This report will also present some insight for
IGEL Universal Management. Installation Guide
IGEL Universal Management Installation Guide Important Information Copyright This publication is protected under international copyright laws, with all rights reserved. No part of this manual, including
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
CA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
Identikey Server Windows Installation Guide 3.1
Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
GWIF: A Generic Web Application Integration Framework
GWIF: A Generic Web Application Integration Framework Fábio Rodrigues Costa 1, Zair Abdelouahab 2 1 Sarah Network of Hospitals, Av. Luis Rocha, Monte Castelo, São Luís/MA, 65035-270, Brazil [email protected]
Central Administration User Guide
User Guide Contents 1. Introduction... 2 Licensing... 2 Overview... 2 2. Configuring... 3 3. Using... 4 Computers screen all computers view... 4 Computers screen single computer view... 5 All Jobs screen...
Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1
Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter
Business Process Management with @enterprise
Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase
Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html
Oracle EXAM - 1Z0-102 Oracle Weblogic Server 11g: System Administration I Buy Full Product http://www.examskey.com/1z0-102.html Examskey Oracle 1Z0-102 exam demo product is here for you to test the quality
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
ActiveVOS Clustering with JBoss
Clustering with JBoss Technical Note Version 1.2 29 December 2011 2011 Active Endpoints Inc. is a trademark of Active Endpoints, Inc. All other company and product names are the property of their respective
