Abstract: The increasing complexity of software development based on peer to peer networks makes necessary the creation of new frameworks in order to simplify the developer-s task. Additionally, some applications, e.g. fire detection or security alarms may require real-time constraints and the high level definition of these features eases the application development. In this paper, a service model based on a component model with real-time features is proposed. The high-level model will abstract developers from implementation tasks, such as discovery, communication, security or real-time requirements. The model is oriented to deploy services on small mobile devices, such as sensors, mobile phones and PDAs, where the computation is light-weight. Services can be composed among them by means of the port concept to form complex ad-hoc systems and their implementation is carried out using a component language called UM-RTCOM. In order to apply our proposals a fire detection application is described.
Abstract: Multi-agent system approach has proven to be an effective and appropriate abstraction level to construct whole models of a diversity of biological problems, integrating aspects which can be found both in "micro" and "macro" approaches when modeling this type of phenomena. Taking into account these considerations, this paper presents the important computational characteristics to be gathered into a novel bioinformatics framework built upon a multiagent architecture. The version of the tool presented herein allows studying and exploring complex problems belonging principally to structural biology, such as protein folding. The bioinformatics framework is used as a virtual laboratory to explore a minimalist model of protein folding as a test case. In order to show the laboratory concept of the platform as well as its flexibility and adaptability, we studied the folding of two particular sequences, one of 45-mer and another of 64-mer, both described by an HP model (only hydrophobic and polar residues) and coarse grained 2D-square lattice. According to the discussion section of this piece of work, these two sequences were chosen as breaking points towards the platform, in order to determine the tools to be created or improved in such a way to overcome the needs of a particular computation and analysis of a given tough sequence. The backwards philosophy herein is that the continuous studying of sequences provides itself important points to be added into the platform, to any time improve its efficiency, as is demonstrated herein.
Abstract: Mobile agent has motivated the creation of a new
methodology for parallel computing. We introduce a methodology
for the creation of parallel applications on the network. The proposed
Mobile-Agent parallel processing framework uses multiple Javamobile
Agents. Each mobile agent can travel to the specified
machine in the network to perform its tasks. We also introduce the
concept of master agent, which is Java object capable of
implementing a particular task of the target application. Master agent
is dynamically assigns the task to mobile agents. We have developed
and tested a prototype application: Mobile Agent Based Parallel
Computing. Boosted by the inherited benefits of using Java and
Mobile Agents, our proposed methodology breaks the barriers
between the environments, and could potentially exploit in a parallel
manner all the available computational resources on the network.
This paper elaborates performance issues of a mobile agent for
parallel computing.
Abstract: This paper describes the two actual tendencies in the
software development process usage: 'Scrum' and 'work in home
office'. It-s exposed the four main challenges to adopt Scrum
framework for distributed teams in this cited kind of work. The
challenges are mainly based on the communication problems due
distances since the Scrum encourages the team to work together in
the same room, and this is not possible when people work distributed
in their homes.
Abstract: Generally, administrative systems in an academic
environment are disjoint and support independent queries. The
objective in this work is to semantically connect these independent
systems to provide support to queries run on the integrated platform.
The proposed framework, by enriching educational material in the
legacy systems, provides a value-added semantics layer where
activities such as annotation, query and reasoning can be carried out
to support management requirements. We discuss the development of
this ontology framework with a case study of UAE University
program administration to show how semantic web technologies can
be used by administration to develop student profiles for better
academic program management.
Abstract: This paper proposes a “soft systems" approach to
domain-driven design of computer-based information systems. We
propose a systemic framework combining techniques from Soft
Systems Methodology (SSM), the Unified Modelling Language
(UML), and an implementation pattern known as “Naked Objects".
We have used this framework in action research projects that have
involved the investigation and modelling of business processes using
object-oriented domain models and the implementation of software
systems based on those domain models. Within the proposed
framework, Soft Systems Methodology (SSM) is used as a guiding
methodology to explore the problem situation and to generate a
ubiquitous language (soft language) which can be used as the basis
for developing an object-oriented domain model. The domain model
is further developed using techniques based on the UML and is
implemented in software following the “Naked Objects"
implementation pattern. We argue that there are advantages from
combining and using techniques from different methodologies in this
way.
The proposed systemic framework is overviewed and justified as
multimethodologyusing Mingers multimethodology ideas.
This multimethodology approach is being evaluated through a
series of action research projects based on real-world case studies. A
Peer-Tutoring case study is presented here as a sample of the
framework evaluation process
Abstract: This paper explores gender related barriers to interagency collaboration in statutory children safeguard partnerships against a theoretical framework that considers individuals, professions and organisations interacting as part of a complex adaptive system. We argue that gender-framed obstacles to effective communication between culturally discrepant agencies can ultimately impact on the effectiveness of policy delivery,. We focused our research on three partnership structures in Sefton Metropolitan Borough in order to observe how interactions occur, whether the agencies involved perceive their occupational environment as being gender affected and whether they believe this can hinder effective collaboration with other biased organisations. Our principal empirical findings indicate that there is a general awareness amongst professionals of the role that gender plays in each of the agencies reviewed, that gender may well constitute a barrier to effective communication, but there is a sense in which there is little scope for change in the short term. We aim to signal here, however, the need to change against the risk of service failure.
Abstract: Scheduling of diversified service requests in
distributed computing is a critical design issue. Cloud is a type of
parallel and distributed system consisting of a collection of
interconnected and virtual computers. It is not only the clusters and
grid but also it comprises of next generation data centers. The paper
proposes an initial heuristic algorithm to apply modified ant colony
optimization approach for the diversified service allocation and
scheduling mechanism in cloud paradigm. The proposed optimization
method is aimed to minimize the scheduling throughput to service all
the diversified requests according to the different resource allocator
available under cloud computing environment.
Abstract: The increase in energy demand has raised concerns
over adverse impacts on the environment from energy generation. It
is important to understand the status of energy consumption for
institutions such as Curtin Sarawak to ensure the sustainability of
energy usage, and also to reduce its costs. In this study, a preliminary
audit framework was developed and was conducted around the
Malaysian campus to obtain information such as the number and
specifications of electrical appliances, built-up area and ambient
temperature to understand the relationship of these factors with
energy consumption. It was found that the number and types of
electrical appliances, population and activities in the campus
impacted the energy consumption of Curtin Sarawak directly.
However, the built-up area and ambient temperature showed no clear
correlation with energy consumption. An investigation of the diurnal
and seasonal energy consumption of the campus was also carried out.
From the data, recommendations were made to improve the energy
efficiency of the campus.
Abstract: Serious games have proven to be a useful instrument
to engage learners and increase motivation. Nevertheless, a broadly
accepted, practical instructional design approach to serious games
does not exist. In this paper, we introduce the use of an instructional
design model that has not been applied to serious games yet, and has
some advantages compared to other design approaches. We present
the case of mechanics mechatronics education to illustrate the close
match with timing and role of knowledge and information that the
instructional design model prescribes and how this has been
translated to a rigidly structured game design. The structured
approach answers the learning needs of applicable knowledge within
the target group. It combines advantages of simulations with
strengths of entertainment games to foster learner-s motivation in the
best possible way. A prototype of the game will be evaluated along a
well-respected evaluation method within an advanced test setting
including test and control group.
Abstract: We propose a formal framework for the specification of
the behavior of a system of agents, as well as those of the constituting
agents. This framework allows us to model each agent-s effectoric
capability including its interactions with the other agents. We also
provide an algorithm based on Milner-s "observation equivalence" to
derive an agent-s perception of its task domain situations from its
effectoric capability, and use "system computations" to model the
coordinated efforts of the agents in the system . Formal definitions
of the concept of "behavior equivalence" of two agents and that of
system computations equivalence for an agent are also provided.
Abstract: This paper proposes a simple model of economic geography within the Dixit-Stiglitz-Iceberg framework that may be used to analyze migration patterns among three cities. The cost–benefit tradeoffs affecting incentives for three types of migration, including echelon migration, are discussed. This paper develops a tractable, heterogeneous-agent, general equilibrium model, where agents share constant human capital, and explores the relationship between the benefits of echelon migration and gross human capital. Using Chinese numerical solutions, we study the manifestation of echelon migration and how it responds to changes in transportation cost and elasticity of substitution. Numerical results demonstrate that (i) there are positive relationships between a migration-s benefit-and-wage ratio, (ii) there are positive relationships between gross human capital ratios and wage ratios as to origin and destination, and (iii) we identify 13 varieties of human capital convergence among cities. In particular, this model predicts population shock resulting from the processes of migration choice and echelon migration.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: Within the framework of a method of the information
theory it is offered statistics and probabilistic model for definition of
cause-and-effect relations in the coupled multicomponent
subsystems. The quantitative parameter which is defined through
conditional and unconditional entropy functions is introduced. The
method is applied to the analysis of the experimental data on
dynamics of change of the chemical elements composition of plants
organs (roots, reproductive organs, leafs and stems). Experiment is
directed on studying of temporal processes of primary soil formation
and their connection with redistribution dynamics of chemical
elements in plant organs. This statistics and probabilistic model
allows also quantitatively and unambiguously to specify the
directions of the information streams on plant organs.
Abstract: In this paper, we present a framework to determine Haar solutions of Bratu-type equations that are widely applicable in fuel ignition of the combustion theory and heat transfer. The method is proposed by applying Haar series for the highest derivatives and integrate the series. Several examples are given to confirm the efficiency and the accuracy of the proposed algorithm. The results show that the proposed way is quite reasonable when compared to exact solution.
Abstract: Major social changes in the last century had significant impact on the Kazakh literature. Participants of the World War II, writers and poets imprisoned during the war, formed the Kazakh literature in emigration within the framework of 'Turkistan Legion'. This was a topic which remained closed until Kazakhstan gained its independence, though even after the independence, there were few research works done about the literature in emigration. The article studies the formation of the Kazakh literature in emigration, its prominent figures, its artistic heritage, and notes of emigration in works of poets and writers.
Abstract: The primary education system in Indonesia involved the community recognized as the school committee, to take a part in the process of achieving the quality of education via the school facility performance, the low level of school committee involvement in the education system has become the issue in the development of education and reflected to the quality of education. This paper will discuss the conceptual framework and methodology for the performance of school committees within the management of school facilities in Batubara district of Indonesia. The concepts of Community based Facility Management (CbFM) and Logometrix are used as a basis to measure the school committee performance in order to address the needs of quality school management. The data will be taken from questionnaires distributed for those who work and use school facilities spread over seven sub district of Batubara, Indonesia. The result of this study is expected to provide a guide for evaluating the performance of existing school committee in improving the quality of education in Indonesia.
Abstract: Lurking behavior is common in information-seeking oriented communities. Transferring users with lurking behavior to be contributors can assist virtual communities to obtain competitive advantages. Based on the ecological cognition framework, this study proposes a model to examine the antecedents of lurking behavior in information-seeking oriented virtual communities. This study argues desire for emotional support, desire for information support, desire for performance-approach, desire for performance -avoidance, desire for mastery-approach, desire for mastery-avoidance, desire for ability trust, desire for benevolence trust, and desire for integrity trust effect on lurking behavior. This study offers an approach to understanding the determinants of lurking behavior in online contexts.
Abstract: We propose a multi-agent based utilitarian approach
to model and understand information flows in social networks that
lead to Pareto optimal informational exchanges. We model the
individual expected utility function of the agents to reflect the net
value of information received. We show how this model, adapted
from a theorem by Karl Borch dealing with an actuarial Risk
Exchange concept in the Insurance industry, can be used for social
network analysis. We develop a utilitarian framework that allows us
to interpret Pareto optimal exchanges of value as potential
information flows, while achieving a maximization of a sum of
expected utilities of information of the group of agents. We examine
some interesting conditions on the utility function under which the
flows are optimal. We illustrate the promise of this new approach to
attach economic value to information in networks with a synthetic
example.
Abstract: This study extends research on the relationship
between marketing strategy and market segmentation by
investigating on market segments in the cement industry.
Competitive strength and rivals distance from the factory were used
as business environment. A three segment (positive, neutral or
indifferent and zero zones) were identified as strategic segments. For
each segment a marketing strategy (aggressive, defensive and
decline) were developed. This study employed data from cement
industry to fulfill two objectives, the first is to give a framework to
the segmentation of cement industry and the second is developing
marketing strategy with varying competitive strength. Fifty six
questionnaires containing close-and open-ended questions were
collected and analyzed. Results supported the theory that segments
tend to be more aggressive than defensive when competitive strength
increases. It is concluded that high strength segments follow total
market coverage, concentric diversification and frontal attack to their
competitors. With decreased competitive strength, Business tends to
follow multi-market strategy, product modification/improvement and
flank attack to direct competitors for this kind of segments. Segments
with weak competitive strength followed focus strategy and decline
strategy.