SlideShare a Scribd company logo
A Review of Intelligent Agent Systems in Animal
Health Care
Omankwu, Obinnaya Chinecherem, Nwagu, Chikezie Kenneth, and Inyiama, Hycient
1
Computer Science Department, Michael Okpara University of Agriculture, Umudike
Umuahia, Abia State, Nigeria
saintbeloved@yahoo.com
2
Computer Science Department, Nnamdi Azikiwe University, Awka Anambra State, Nigeria,
Nwaguchikeziekenneth@hotmail.com
3
Electronics & Computer Engineering Department, Nnamdi Azikiwe University, Awka
Anambra State, Nigeria.
ABSTRACT
This paper discusses the several research methodologies that can
be used in Computer Science (CS) and Information Systems
(IS). The research methods vary according to the science
domain and project field. However a little of research
methodologies can be reasonable for Computer Science and
Information System.
Keywords- Computer Science (CS), Information Systems (IS),
Research Methodologies.
1. INTRODUCTION
Science is an organized or systematic body of knowledge (Jain,
1997). Science embraces many different domains however those
domains are related. Logic and mathematics sciences are the
core of all sciences. From there and descending it emerge the
natural sciences such as physic, chemistry and biology. In the
next come the social sciences.
As (Denning, 2005) reported Computer Science (CS) should not
be called as a science. Although CS is definitely a recent
discipline, few will still argued that it is not provided with
attributes to be qualified as a science. Computer Science has its
specificity and has its bases in logic and mathematics.
However CS is transversal to very different domains in science.
To understand which research methodologies that can be used in
CS and IS we have to understand the differences between CS
and IS.
Computer science (CS) characterized as an empirical discipline,
in which each new program can be seen as an experiment, the
structure and behavior of which can be studied (Allen ,2003). In
particular, the field of CS is concerned with a number of
different issues seen from a technological Perspective, e.g.
theoretical aspects, such as numerical analysis, data Structures
and algorithms; how to store and manipulate, the relationship
between different pieces of software and techniques and tools
for developing software .The field of Information Systems (IS)
is concerned with the interaction between social and
technological issues (Allen ,2003).
In other words, it is a field which focuses on the actual
“link” between the human and social aspects (within an
organization or other broader social setting), and the
hardware, Software and data aspects of information
technology (IT). In the next sections we will discuss the
different methods of research methodology and its
reasonability for the CS and IS domains.
Research Methods
Before we start in discuss the different types of research
methodologies we have to define the research. In an
academic context, research is used to refer to the activity of
a diligent and systematic inquiry or investigation in an area,
with the objective of discovering or revising facts, theories,
applications etc. The goal is to discover and disseminate
new knowledge. There are several methods that can be used
in CS and IS in next subsection we will show these
methodologies.
Experimental Method
Experimental shows the experiments that will occur in
order extract results from real world implementations.
Experiments can test the veracity of theories. This method
within CS is used in several different fields like artificial
neural networks, automating theorem proving, natural
languages, analyzing performances and behaviors, etc. It is
important to restate that all the experiments and results
should be reproducible. Concerning, for example, network
environments with several connection resources and users,
the experiments are an important methodology Also in CS
fields and especially IS fields that take in consideration the
Human- Computer Interaction. It is mandatory the usage of
experimental approaches. If we use the experimental
method in IS field we may need to use some methods or
tools in conjunction with the experimental method. These
methods or tools used to support and prove the legibility of
the developed project. For example if a student wants to
implement new social network with new concepts or
develop an existing social network, who he can measure the
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 4, April 2018
115 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
legibility of his implementation? The answer of this question
consists of two parts according to the nature of the project. The
technical issue is the first part of the project that can be tested by
benchmarks like (availability, reliability, scalability, stability,
etc.). The usability of the project is the second part of testing
that needs a feedback from the users of the system; the results
for the second part can be obtained by the statistical analysis of
a questionnaire which is a tool the used in conjunction with the
experimental method.
Simulation Method
Simulation method used especially in CS because it offers the
possibility to investigate systems or regimes that are outside of
the experimental domain or the systems that is under invention
or construction. Normally complex phenomena that cannot be
implemented in laboratories evolution of the universe. Some
domains that adopt computer simulation methodologies are
sciences such as astronomy, physics or economics; other areas
more specialized such as the study of non-linear systems, virtual
reality or artificial life also exploit these methodologies. A lot of
projects can use the simulation methods, like the study of a new
developed network protocol. To test this protocol you have to
build a huge network with a lot of expensive network tools, but
this network can't be easily achieved. For this reason we can use
the simulation method.
Theoretical Method
The theoretical approaches to CS are based on the classical
methodology since they are related to logic and mathematics.
Some ideas are the existence of conceptual and formal models
(data models and algorithms). Since theoretical CS inherits its
bases from logic and mathematics, some of the main techniques
when dealing with problems are iteration, recursion and
induction. Theory is important to build methodologies, to
develop logic and semantic models and to reason about the
programs in order to prove their correctness. Theoretical CS is
dedicated to the design and algorithm analysis in order to find
solutions or better solutions (performance issues, for example).
Encompassing all fields in CS, the theoretical methodologies
also tries to define the limits of computation and the
computational paradigm. In other words we can say that we can
use the theoretical method to model a new system. However the
theoretical method can help in finding new mathematical models
or theories, but this method still needs other methods to prove
the efficiency of the new models or theories. For example when
a student need to develop a new classifier in AI by using the
mathematical representation and theoretical method, he need to
prove the efficiency of this model by using one of the previous
methods.
Conclusion
In this paper we try to differentiate between the domains of
science and CS and IS to understand the best methods that can
be used in CS and IS. Each project in CS or IS have its free
nature so the paper give examples of different kinds of projects
in CS and IS and the prober research methodologies that can
used in these projects.
References
1. R. K. Jain and H. C. Triandis: Management of Research
and Development Organizations: Managing the
Unmanageable. John Wiley & Sons, (1997).
2. Gordana Dodig-Crnkovic: Scientific Methods in
Computer Science. Conference for the Promotion of
Research in IT at New Universities and at University
Colleges in Sweden (2002).
3. Denning Peter J.: Is Computer Science Science?.
COMMUNICATIONS OF THE ACM, Vol. 48, No. 4
(2005).
4. Allen Newell, Herbert A. Simon: Computer Science as
Empirical Inquiry: Symbols and Search. Communication.
ACM 19(3): 113-126(1976).
5. Suprateek Sarker, Allen S. Lee: Using A Positivist Case
Research Methodology To Test Three Competing Theories-
In-Use Of Business Process Redesign. J. AIS (2001).
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 4, April 2018
116 https://sites.google.com/site/ijcsis/
ISSN 1947-5500

More Related Content

What's hot

Oral Presentation (McNair)
Oral Presentation (McNair)Oral Presentation (McNair)
Oral Presentation (McNair)Robyn Harper
 
A systematic literature review of cloud
A systematic literature review of cloudA systematic literature review of cloud
A systematic literature review of cloud
hiij
 
IJET-V2I6P22
IJET-V2I6P22IJET-V2I6P22
Ijciet 10 02_007
Ijciet 10 02_007Ijciet 10 02_007
Ijciet 10 02_007
IAEME Publication
 
The Architecture of System for Predicting Student Performance based on the Da...
The Architecture of System for Predicting Student Performance based on the Da...The Architecture of System for Predicting Student Performance based on the Da...
The Architecture of System for Predicting Student Performance based on the Da...
Thada Jantakoon
 
Software Effort Estimation using Neuro Fuzzy Inference System: Past and Present
Software Effort Estimation using Neuro Fuzzy Inference System: Past and PresentSoftware Effort Estimation using Neuro Fuzzy Inference System: Past and Present
Software Effort Estimation using Neuro Fuzzy Inference System: Past and Present
rahulmonikasharma
 
An introduction to machine learning in biomedical research: Key concepts, pr...
An introduction to machine learning in biomedical research:  Key concepts, pr...An introduction to machine learning in biomedical research:  Key concepts, pr...
An introduction to machine learning in biomedical research: Key concepts, pr...
FranciscoJAzuajeG
 
The trend analysis of the level of fin metrics and e-stat tools for research ...
The trend analysis of the level of fin metrics and e-stat tools for research ...The trend analysis of the level of fin metrics and e-stat tools for research ...
The trend analysis of the level of fin metrics and e-stat tools for research ...Alexander Decker
 
11.the trend analysis of the level of fin metrics and e-stat tools for resear...
11.the trend analysis of the level of fin metrics and e-stat tools for resear...11.the trend analysis of the level of fin metrics and e-stat tools for resear...
11.the trend analysis of the level of fin metrics and e-stat tools for resear...Alexander Decker
 
Bibliography (Microsoft Word, 61k)
Bibliography (Microsoft Word, 61k)Bibliography (Microsoft Word, 61k)
Bibliography (Microsoft Word, 61k)butest
 
Application statistics in software engineering
Application statistics in software engineeringApplication statistics in software engineering
Application statistics in software engineering
md emran
 
Data Mining Techniques for School Failure and Dropout System
Data Mining Techniques for School Failure and Dropout SystemData Mining Techniques for School Failure and Dropout System
Data Mining Techniques for School Failure and Dropout System
Kumar Goud
 
Challenges and opportunities for machine learning in biomedical research
Challenges and opportunities for machine learning in biomedical researchChallenges and opportunities for machine learning in biomedical research
Challenges and opportunities for machine learning in biomedical research
FranciscoJAzuajeG
 
An Overview of Data Mining Concepts Applied in Mathematical Techniques
An Overview of Data Mining Concepts Applied in Mathematical TechniquesAn Overview of Data Mining Concepts Applied in Mathematical Techniques
An Overview of Data Mining Concepts Applied in Mathematical Techniques
ijcoa
 
Find your interest
Find your interestFind your interest
Find your interest
Rayhan Ferdous
 
A Model of Decision Support System for Research Topic Selection and Plagiaris...
A Model of Decision Support System for Research Topic Selection and Plagiaris...A Model of Decision Support System for Research Topic Selection and Plagiaris...
A Model of Decision Support System for Research Topic Selection and Plagiaris...
theijes
 
Significant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational SciencesSignificant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational Sciences
Editor IJCATR
 
Machine learning advances in 2020
Machine learning advances in 2020Machine learning advances in 2020
Machine learning advances in 2020
AIRCC Publishing Corporation
 

What's hot (20)

Oral Presentation (McNair)
Oral Presentation (McNair)Oral Presentation (McNair)
Oral Presentation (McNair)
 
A systematic literature review of cloud
A systematic literature review of cloudA systematic literature review of cloud
A systematic literature review of cloud
 
IJET-V2I6P22
IJET-V2I6P22IJET-V2I6P22
IJET-V2I6P22
 
Drijvers et al_two_lenses
Drijvers et al_two_lensesDrijvers et al_two_lenses
Drijvers et al_two_lenses
 
Ijciet 10 02_007
Ijciet 10 02_007Ijciet 10 02_007
Ijciet 10 02_007
 
The Architecture of System for Predicting Student Performance based on the Da...
The Architecture of System for Predicting Student Performance based on the Da...The Architecture of System for Predicting Student Performance based on the Da...
The Architecture of System for Predicting Student Performance based on the Da...
 
Software Effort Estimation using Neuro Fuzzy Inference System: Past and Present
Software Effort Estimation using Neuro Fuzzy Inference System: Past and PresentSoftware Effort Estimation using Neuro Fuzzy Inference System: Past and Present
Software Effort Estimation using Neuro Fuzzy Inference System: Past and Present
 
An introduction to machine learning in biomedical research: Key concepts, pr...
An introduction to machine learning in biomedical research:  Key concepts, pr...An introduction to machine learning in biomedical research:  Key concepts, pr...
An introduction to machine learning in biomedical research: Key concepts, pr...
 
The trend analysis of the level of fin metrics and e-stat tools for research ...
The trend analysis of the level of fin metrics and e-stat tools for research ...The trend analysis of the level of fin metrics and e-stat tools for research ...
The trend analysis of the level of fin metrics and e-stat tools for research ...
 
11.the trend analysis of the level of fin metrics and e-stat tools for resear...
11.the trend analysis of the level of fin metrics and e-stat tools for resear...11.the trend analysis of the level of fin metrics and e-stat tools for resear...
11.the trend analysis of the level of fin metrics and e-stat tools for resear...
 
Bibliography (Microsoft Word, 61k)
Bibliography (Microsoft Word, 61k)Bibliography (Microsoft Word, 61k)
Bibliography (Microsoft Word, 61k)
 
Application statistics in software engineering
Application statistics in software engineeringApplication statistics in software engineering
Application statistics in software engineering
 
Data Mining Techniques for School Failure and Dropout System
Data Mining Techniques for School Failure and Dropout SystemData Mining Techniques for School Failure and Dropout System
Data Mining Techniques for School Failure and Dropout System
 
Challenges and opportunities for machine learning in biomedical research
Challenges and opportunities for machine learning in biomedical researchChallenges and opportunities for machine learning in biomedical research
Challenges and opportunities for machine learning in biomedical research
 
Technologyandinquiry
TechnologyandinquiryTechnologyandinquiry
Technologyandinquiry
 
An Overview of Data Mining Concepts Applied in Mathematical Techniques
An Overview of Data Mining Concepts Applied in Mathematical TechniquesAn Overview of Data Mining Concepts Applied in Mathematical Techniques
An Overview of Data Mining Concepts Applied in Mathematical Techniques
 
Find your interest
Find your interestFind your interest
Find your interest
 
A Model of Decision Support System for Research Topic Selection and Plagiaris...
A Model of Decision Support System for Research Topic Selection and Plagiaris...A Model of Decision Support System for Research Topic Selection and Plagiaris...
A Model of Decision Support System for Research Topic Selection and Plagiaris...
 
Significant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational SciencesSignificant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational Sciences
 
Machine learning advances in 2020
Machine learning advances in 2020Machine learning advances in 2020
Machine learning advances in 2020
 

Similar to A Review of Intelligent Agent Systems in Animal Health Care

IRJET- Characteristics of Research Process and Methods for Web-Based Rese...
IRJET-  	  Characteristics of Research Process and Methods for Web-Based Rese...IRJET-  	  Characteristics of Research Process and Methods for Web-Based Rese...
IRJET- Characteristics of Research Process and Methods for Web-Based Rese...
IRJET Journal
 
340
340340
Lect1 intro-cs-research
Lect1 intro-cs-researchLect1 intro-cs-research
Lect1 intro-cs-research
Adi Chandra Setiawan
 
Annotated Bibliography On Research Methodologies
Annotated Bibliography On Research MethodologiesAnnotated Bibliography On Research Methodologies
Annotated Bibliography On Research Methodologies
Jeff Nelson
 
Chapter 5 theory and methodology
Chapter 5 theory and methodology Chapter 5 theory and methodology
Chapter 5 theory and methodology grainne
 
chapter 2 by YAN LIU
chapter 2 by YAN LIUchapter 2 by YAN LIU
chapter 2 by YAN LIU
Webometrics Class
 
Knowledge Management Cultures: A Comparison of Engineering and Cultural Scien...
Knowledge Management Cultures: A Comparison of Engineering and Cultural Scien...Knowledge Management Cultures: A Comparison of Engineering and Cultural Scien...
Knowledge Management Cultures: A Comparison of Engineering and Cultural Scien...
Ralf Klamma
 
A Design Theory For Software Engineering
A Design Theory For Software EngineeringA Design Theory For Software Engineering
A Design Theory For Software Engineering
Leslie Schulte
 
Design Science in Information Systems
Design Science in Information SystemsDesign Science in Information Systems
Design Science in Information Systems
Sergej Lugovic
 
Recruitment Based On Ontology with Enhanced Security Features
Recruitment Based On Ontology with Enhanced Security FeaturesRecruitment Based On Ontology with Enhanced Security Features
Recruitment Based On Ontology with Enhanced Security Features
theijes
 
An Essay Concerning Human Understanding Of Genetic Programming
An Essay Concerning Human Understanding Of Genetic ProgrammingAn Essay Concerning Human Understanding Of Genetic Programming
An Essay Concerning Human Understanding Of Genetic Programming
Jennifer Roman
 
Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...
Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...
Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...
remAYDOAN3
 
Figuring out Computer Science
Figuring out Computer ScienceFiguring out Computer Science
Figuring out Computer Science
nTier Custom Solutions
 
Hevner design-science
Hevner design-scienceHevner design-science
Hevner design-scienceshmushmu
 
MELJUN CORTES research seminar_1__theoretical_framework_2nd_updated
MELJUN CORTES research seminar_1__theoretical_framework_2nd_updatedMELJUN CORTES research seminar_1__theoretical_framework_2nd_updated
MELJUN CORTES research seminar_1__theoretical_framework_2nd_updated
MELJUN CORTES
 
A Qualititative Approach To HCI Research
A Qualititative Approach To HCI ResearchA Qualititative Approach To HCI Research
A Qualititative Approach To HCI Research
Nathan Mathis
 
Lecture 3 Computer Science Research SEM1 22_23 (1).pptx
Lecture 3 Computer Science Research SEM1 22_23 (1).pptxLecture 3 Computer Science Research SEM1 22_23 (1).pptx
Lecture 3 Computer Science Research SEM1 22_23 (1).pptx
NabilaHassan13
 
IRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect InformationIRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect Information
IRJET Journal
 
MELJUN CORTES research seminar_1_theoretical_framework
MELJUN CORTES research seminar_1_theoretical_frameworkMELJUN CORTES research seminar_1_theoretical_framework
MELJUN CORTES research seminar_1_theoretical_framework
MELJUN CORTES
 

Similar to A Review of Intelligent Agent Systems in Animal Health Care (20)

IRJET- Characteristics of Research Process and Methods for Web-Based Rese...
IRJET-  	  Characteristics of Research Process and Methods for Web-Based Rese...IRJET-  	  Characteristics of Research Process and Methods for Web-Based Rese...
IRJET- Characteristics of Research Process and Methods for Web-Based Rese...
 
340
340340
340
 
Lect1 intro-cs-research
Lect1 intro-cs-researchLect1 intro-cs-research
Lect1 intro-cs-research
 
Annotated Bibliography On Research Methodologies
Annotated Bibliography On Research MethodologiesAnnotated Bibliography On Research Methodologies
Annotated Bibliography On Research Methodologies
 
Chapter 5 theory and methodology
Chapter 5 theory and methodology Chapter 5 theory and methodology
Chapter 5 theory and methodology
 
chapter 2 by YAN LIU
chapter 2 by YAN LIUchapter 2 by YAN LIU
chapter 2 by YAN LIU
 
Knowledge Management Cultures: A Comparison of Engineering and Cultural Scien...
Knowledge Management Cultures: A Comparison of Engineering and Cultural Scien...Knowledge Management Cultures: A Comparison of Engineering and Cultural Scien...
Knowledge Management Cultures: A Comparison of Engineering and Cultural Scien...
 
A Design Theory For Software Engineering
A Design Theory For Software EngineeringA Design Theory For Software Engineering
A Design Theory For Software Engineering
 
Design Science in Information Systems
Design Science in Information SystemsDesign Science in Information Systems
Design Science in Information Systems
 
Recruitment Based On Ontology with Enhanced Security Features
Recruitment Based On Ontology with Enhanced Security FeaturesRecruitment Based On Ontology with Enhanced Security Features
Recruitment Based On Ontology with Enhanced Security Features
 
An Essay Concerning Human Understanding Of Genetic Programming
An Essay Concerning Human Understanding Of Genetic ProgrammingAn Essay Concerning Human Understanding Of Genetic Programming
An Essay Concerning Human Understanding Of Genetic Programming
 
Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...
Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...
Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...
 
Figuring out Computer Science
Figuring out Computer ScienceFiguring out Computer Science
Figuring out Computer Science
 
Hevner design-science
Hevner design-scienceHevner design-science
Hevner design-science
 
MELJUN CORTES research seminar_1__theoretical_framework_2nd_updated
MELJUN CORTES research seminar_1__theoretical_framework_2nd_updatedMELJUN CORTES research seminar_1__theoretical_framework_2nd_updated
MELJUN CORTES research seminar_1__theoretical_framework_2nd_updated
 
A Qualititative Approach To HCI Research
A Qualititative Approach To HCI ResearchA Qualititative Approach To HCI Research
A Qualititative Approach To HCI Research
 
Lecture 3 Computer Science Research SEM1 22_23 (1).pptx
Lecture 3 Computer Science Research SEM1 22_23 (1).pptxLecture 3 Computer Science Research SEM1 22_23 (1).pptx
Lecture 3 Computer Science Research SEM1 22_23 (1).pptx
 
IRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect InformationIRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect Information
 
Collnet_Conference_Turkey
Collnet_Conference_TurkeyCollnet_Conference_Turkey
Collnet_Conference_Turkey
 
MELJUN CORTES research seminar_1_theoretical_framework
MELJUN CORTES research seminar_1_theoretical_frameworkMELJUN CORTES research seminar_1_theoretical_framework
MELJUN CORTES research seminar_1_theoretical_framework
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

A Review of Intelligent Agent Systems in Animal Health Care

  • 1. A Review of Intelligent Agent Systems in Animal Health Care Omankwu, Obinnaya Chinecherem, Nwagu, Chikezie Kenneth, and Inyiama, Hycient 1 Computer Science Department, Michael Okpara University of Agriculture, Umudike Umuahia, Abia State, Nigeria saintbeloved@yahoo.com 2 Computer Science Department, Nnamdi Azikiwe University, Awka Anambra State, Nigeria, Nwaguchikeziekenneth@hotmail.com 3 Electronics & Computer Engineering Department, Nnamdi Azikiwe University, Awka Anambra State, Nigeria. ABSTRACT This paper discusses the several research methodologies that can be used in Computer Science (CS) and Information Systems (IS). The research methods vary according to the science domain and project field. However a little of research methodologies can be reasonable for Computer Science and Information System. Keywords- Computer Science (CS), Information Systems (IS), Research Methodologies. 1. INTRODUCTION Science is an organized or systematic body of knowledge (Jain, 1997). Science embraces many different domains however those domains are related. Logic and mathematics sciences are the core of all sciences. From there and descending it emerge the natural sciences such as physic, chemistry and biology. In the next come the social sciences. As (Denning, 2005) reported Computer Science (CS) should not be called as a science. Although CS is definitely a recent discipline, few will still argued that it is not provided with attributes to be qualified as a science. Computer Science has its specificity and has its bases in logic and mathematics. However CS is transversal to very different domains in science. To understand which research methodologies that can be used in CS and IS we have to understand the differences between CS and IS. Computer science (CS) characterized as an empirical discipline, in which each new program can be seen as an experiment, the structure and behavior of which can be studied (Allen ,2003). In particular, the field of CS is concerned with a number of different issues seen from a technological Perspective, e.g. theoretical aspects, such as numerical analysis, data Structures and algorithms; how to store and manipulate, the relationship between different pieces of software and techniques and tools for developing software .The field of Information Systems (IS) is concerned with the interaction between social and technological issues (Allen ,2003). In other words, it is a field which focuses on the actual “link” between the human and social aspects (within an organization or other broader social setting), and the hardware, Software and data aspects of information technology (IT). In the next sections we will discuss the different methods of research methodology and its reasonability for the CS and IS domains. Research Methods Before we start in discuss the different types of research methodologies we have to define the research. In an academic context, research is used to refer to the activity of a diligent and systematic inquiry or investigation in an area, with the objective of discovering or revising facts, theories, applications etc. The goal is to discover and disseminate new knowledge. There are several methods that can be used in CS and IS in next subsection we will show these methodologies. Experimental Method Experimental shows the experiments that will occur in order extract results from real world implementations. Experiments can test the veracity of theories. This method within CS is used in several different fields like artificial neural networks, automating theorem proving, natural languages, analyzing performances and behaviors, etc. It is important to restate that all the experiments and results should be reproducible. Concerning, for example, network environments with several connection resources and users, the experiments are an important methodology Also in CS fields and especially IS fields that take in consideration the Human- Computer Interaction. It is mandatory the usage of experimental approaches. If we use the experimental method in IS field we may need to use some methods or tools in conjunction with the experimental method. These methods or tools used to support and prove the legibility of the developed project. For example if a student wants to implement new social network with new concepts or develop an existing social network, who he can measure the International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 4, April 2018 115 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 2. legibility of his implementation? The answer of this question consists of two parts according to the nature of the project. The technical issue is the first part of the project that can be tested by benchmarks like (availability, reliability, scalability, stability, etc.). The usability of the project is the second part of testing that needs a feedback from the users of the system; the results for the second part can be obtained by the statistical analysis of a questionnaire which is a tool the used in conjunction with the experimental method. Simulation Method Simulation method used especially in CS because it offers the possibility to investigate systems or regimes that are outside of the experimental domain or the systems that is under invention or construction. Normally complex phenomena that cannot be implemented in laboratories evolution of the universe. Some domains that adopt computer simulation methodologies are sciences such as astronomy, physics or economics; other areas more specialized such as the study of non-linear systems, virtual reality or artificial life also exploit these methodologies. A lot of projects can use the simulation methods, like the study of a new developed network protocol. To test this protocol you have to build a huge network with a lot of expensive network tools, but this network can't be easily achieved. For this reason we can use the simulation method. Theoretical Method The theoretical approaches to CS are based on the classical methodology since they are related to logic and mathematics. Some ideas are the existence of conceptual and formal models (data models and algorithms). Since theoretical CS inherits its bases from logic and mathematics, some of the main techniques when dealing with problems are iteration, recursion and induction. Theory is important to build methodologies, to develop logic and semantic models and to reason about the programs in order to prove their correctness. Theoretical CS is dedicated to the design and algorithm analysis in order to find solutions or better solutions (performance issues, for example). Encompassing all fields in CS, the theoretical methodologies also tries to define the limits of computation and the computational paradigm. In other words we can say that we can use the theoretical method to model a new system. However the theoretical method can help in finding new mathematical models or theories, but this method still needs other methods to prove the efficiency of the new models or theories. For example when a student need to develop a new classifier in AI by using the mathematical representation and theoretical method, he need to prove the efficiency of this model by using one of the previous methods. Conclusion In this paper we try to differentiate between the domains of science and CS and IS to understand the best methods that can be used in CS and IS. Each project in CS or IS have its free nature so the paper give examples of different kinds of projects in CS and IS and the prober research methodologies that can used in these projects. References 1. R. K. Jain and H. C. Triandis: Management of Research and Development Organizations: Managing the Unmanageable. John Wiley & Sons, (1997). 2. Gordana Dodig-Crnkovic: Scientific Methods in Computer Science. Conference for the Promotion of Research in IT at New Universities and at University Colleges in Sweden (2002). 3. Denning Peter J.: Is Computer Science Science?. COMMUNICATIONS OF THE ACM, Vol. 48, No. 4 (2005). 4. Allen Newell, Herbert A. Simon: Computer Science as Empirical Inquiry: Symbols and Search. Communication. ACM 19(3): 113-126(1976). 5. Suprateek Sarker, Allen S. Lee: Using A Positivist Case Research Methodology To Test Three Competing Theories- In-Use Of Business Process Redesign. J. AIS (2001). International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 4, April 2018 116 https://sites.google.com/site/ijcsis/ ISSN 1947-5500