Abstract: multi-agent systems and particularly bdi agents are mostly used in a wide range of projects, from agent-based simulations to air-traffic control. They all benefit from the autonomy and proactive behavior that provides agent-based architectures, as well as the characteristics of reasoning that are outlined by the bdi architecture. Thereforethe belief desire intention agent model and agentspeak language have becomea state-of-the-art and one of the challenging research subjects in the agent modeling and programming area.
In particular the bdi architecture is frequently used in the development of agents that try to simulate certainaspects of human behavior, and precisely perception and formulation of beliefs are two of the elements of bdiagents that require special attention in the development of such agents. Thiswork propose a way to extend the reasoning cycle algorithm on bdi agents, in a way that it allows to process inaccurate perceptions in the formulation of beliefs in such agents; it also shows an example implemented in agentspeak as well as the results of its execution within the jason interpreter.Keywords: Agent, Agent Speak, Beliefs, BDI, Fuzzy-BDI, Fuzzy Perceptions, Simulation.
Title :An Extended Reasoning Cycle Algorithm for BDI Agents
Author: Donald Rodriguez-Ubeda, Dora-Luz Flores, Luis Palafox, Manuel Castanon-Puga, Carelia Gaxiola-Pacheco, Ricardo Rosales
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN: 2350- 1022
Paper Publications
Requirement analysis, architectural design and formal verification of a multi...ijcsit
This paper presents an approach based on the analysis, design, and formal verification of a multi-agent
based university Information Management System (IMS). University IMS accesses information, creates
reports and facilitates teachers as well as students. An orchestrator agent manages the coordination
between all agents. It also manages the database connectivity for the whole system. The proposed IMS is
based on BDI agent architecture, which models the system based on belief, desire, and intentions. The
correctness properties of safety and liveness are specified by First-order predicate logic.
Designing and modeling of a multi-agent adaptive learning system (MAALS) usin...IJECEIAES
Several researches in the field of adaptive learning systems has developed systems and techniques to guide the learner and reduce cognitive overload, making learning adaptation essential to better understand preferences, the constraints and learning habits of the learner. Thus, it is particularly advisable to propose online learning systems that are able to collect and detect information describing the learning process in an automatic and deductive way, and to rely on this information to follow the learner in real time and offer him training according to his dynamic learning pace. This article proposes a multi-agent adaptive learning system to make a real decision based on a current learning situation. This decision will be made by performing a hypride cycle of the Case-Based Reasonning approach in order to follow the learner and provide him with an individualized learning path according to Felder Silverman learning style model and his learning traces to predict his future learning status.To ensure this decision, we assign at each stage of the Incremental Hybrid Case-Based Reasoning at least one active agent performing a particular task and a broker agent that collaborates between the different agents in the system.
[Decisions2013@RecSys]The Role of Emotions in Context-aware RecommendationYONG ZHENG
Context-aware recommender systems try to adapt to users' preferences across different contexts and have been proven to provide better predictive performance in a number of domains. Emotion is one of the most popular contextual variables, but few researchers have explored how emotions take effect in recommendations -- especially the usage of the emotional variables other than the effectiveness alone. In this paper, we explore the role of emotions in context-aware recommendation algorithms. More specifically, we evaluate two types of popular context-aware recommendation algorithms -- context-aware splitting approaches and differential context modeling. We examine predictive performance, and also explore the usage of emotions to discover how emotional features interact with those context-aware recommendation algorithms in the recommendation process.
Adaptive guidance model based similarity for software process development pro...ijseajournal
This paper describes a modeling approach SAGM (Similarity for Adaptive Guidance Model) that provides
adaptive and recursive guidance for software process development. This approach, in accordance to
developer needs, allows specific tailored guidance regarding the profile of developers. A profile is partially
or completely defined from a model of developers, through their roles, their qualifications, and through the
relationships between the context of the current activity and the model of the defined activities. This
approach aims to define the generic profile of development context and a similarity measure that evaluates
the similarities between the profiles created from the model of developers and those of the development
team involved in the execution of a software process. This is to identify the profiles classification and to
deduce the appropriate type of assistance to developers (that can be corrective, constructive or specific).
Requirement analysis, architectural design and formal verification of a multi...ijcsit
This paper presents an approach based on the analysis, design, and formal verification of a multi-agent
based university Information Management System (IMS). University IMS accesses information, creates
reports and facilitates teachers as well as students. An orchestrator agent manages the coordination
between all agents. It also manages the database connectivity for the whole system. The proposed IMS is
based on BDI agent architecture, which models the system based on belief, desire, and intentions. The
correctness properties of safety and liveness are specified by First-order predicate logic.
Designing and modeling of a multi-agent adaptive learning system (MAALS) usin...IJECEIAES
Several researches in the field of adaptive learning systems has developed systems and techniques to guide the learner and reduce cognitive overload, making learning adaptation essential to better understand preferences, the constraints and learning habits of the learner. Thus, it is particularly advisable to propose online learning systems that are able to collect and detect information describing the learning process in an automatic and deductive way, and to rely on this information to follow the learner in real time and offer him training according to his dynamic learning pace. This article proposes a multi-agent adaptive learning system to make a real decision based on a current learning situation. This decision will be made by performing a hypride cycle of the Case-Based Reasonning approach in order to follow the learner and provide him with an individualized learning path according to Felder Silverman learning style model and his learning traces to predict his future learning status.To ensure this decision, we assign at each stage of the Incremental Hybrid Case-Based Reasoning at least one active agent performing a particular task and a broker agent that collaborates between the different agents in the system.
[Decisions2013@RecSys]The Role of Emotions in Context-aware RecommendationYONG ZHENG
Context-aware recommender systems try to adapt to users' preferences across different contexts and have been proven to provide better predictive performance in a number of domains. Emotion is one of the most popular contextual variables, but few researchers have explored how emotions take effect in recommendations -- especially the usage of the emotional variables other than the effectiveness alone. In this paper, we explore the role of emotions in context-aware recommendation algorithms. More specifically, we evaluate two types of popular context-aware recommendation algorithms -- context-aware splitting approaches and differential context modeling. We examine predictive performance, and also explore the usage of emotions to discover how emotional features interact with those context-aware recommendation algorithms in the recommendation process.
Adaptive guidance model based similarity for software process development pro...ijseajournal
This paper describes a modeling approach SAGM (Similarity for Adaptive Guidance Model) that provides
adaptive and recursive guidance for software process development. This approach, in accordance to
developer needs, allows specific tailored guidance regarding the profile of developers. A profile is partially
or completely defined from a model of developers, through their roles, their qualifications, and through the
relationships between the context of the current activity and the model of the defined activities. This
approach aims to define the generic profile of development context and a similarity measure that evaluates
the similarities between the profiles created from the model of developers and those of the development
team involved in the execution of a software process. This is to identify the profiles classification and to
deduce the appropriate type of assistance to developers (that can be corrective, constructive or specific).
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...cscpconf
Communicating an organisation's requirements in a semantically consistent and understandable manner and then reflecting the potential impact of those requirements on the IT infrastructure presents a major challenge among stakeholders. Initial research findings indicate a desire among business executives for a tool that allows them to communicate organisational changes using natural language and a simulation of the IT infrastructure that supports those changes. Building on a detailed analysis and evaluation of these findings, the innovative CRESUS tool was designed and implemented. The purpose of this research was to investigate to what extent CRESUS both aids communication in the development of a shared understanding and supports collaborative requirements elicitation to bring about organisational, and associated IT infrastructural, change. This paper presents promising results that show how such a tool can facilitate collaborative requirements elicitation through increased communication around organisational change and the IT infrastructure.
In context-aware trust evaluation, using ontology tree is a popular approach to represent the relation
between contexts. Usually, similarity between two contexts is computed using these trees. Therefore, the
performance of trust evaluation highly depends on the quality of ontology trees. Fairness or granularity
consistency is one of the major limitations affecting the quality of ontology tree. This limitation refers to
inequality of semantic similarity in the most ontology trees. In other words, semantic similarity of every two
adjacent nodes is unequal in these trees. It deteriorates the performance of contexts similarity computation.
We overcome this limitation by weighting tree edges based on their semantic similarity. Weight of each
edge is computed using Normalized Similarity Score (NSS) method. This method is based on frequencies of
concepts (words) co-occurrences in the pages indexed by search engines. Our experiments represent the
better performance of the proposed approach in comparison with established trust evaluation approaches.
The suggested approach can enhance efficiency of any solution which models semantic relations by
ontology tree.
Abstract: This paper presents a new face parts information analyzer, as a promising model for detecting faces and locating the facial features in images. The main objective is to build fully automated human facial measurements systems from images with complex backgrounds. Detection of facial features such as eye, nose, and mouth is an important step for many subsequent facial image analysis tasks. The main study of face detection is detect the portion of part and mention the circle or rectangular of the every portion of body. In this paper face detection is depend upon the face pattern which is match the face from the pattern reorganization. The study present a novel and simple model approach based on a mixture of techniques and algorithms in a shared pool based on viola jones object detection framework algorithm combined with geometric and symmetric information of the face parts from the image in a smart algorithm.Keywords: Face detection, Video frames, Viola-Jones, Skin detection, Skin color classification, Face reorganization, Pattern reorganization. Skin Color.
Title: Face Detection Using Modified Viola Jones Algorithm
Author: Alpika Gupta, Dr. Rajdev Tiwari
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Abstract: Every program whether in c, java or any other language consists of a set of commands which are based on the logic behind the program as well as the syntax of the language and does the task of either fetching or storing the data to the computer, now here comes the role of the word known as “data structure”. In computer science, a data structure is a particular way of organizing data in a computer so that it can be used efficiently. Data structures provide a means to manage large amounts of data efficiently, such as large databases and internet indexing services. Usually, efficient data structures are a key in designing efficient algorithms. Some formal design methods and programming languages emphasize data structures, rather than algorithms, as the key organizing factor in software design. Storing and retrieving can be carried out on data stored in both main memory and in secondary memory. Now as different data structures are having their different usage and benefits, hence selection of the same is a task of importance. “Therefore the paper consists of the basic terms and information regarding data structures in detail later on will be followed by the practical usage of different data structures that will be helpful for the programmer for selection of a perfect data structure that would make the programme much more easy and flexible.Keywords: Data structures, Arrays, Lists, Trees.
Title: Data Structure the Basic Structure for Programming
Author: Shubhangi Johri, Siddhi Garg, Sonali Rawat
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN: 2350-1022
Paper Publications
LANGUAGE ASSIMILATION THROUGH TYPE-2 FUZZY GRAMMARS: AN APPLICATION IN COMPUT...paperpublications3
Abstract:In computer entertainment and video games users interact with machine controlled agents often referred to as Non-Player Characters (NPC). An NPC is generally intended as an antagonist for the user, but frequently helpful NPCs designed to aid the player are employed. These types of NPCs are referred to as companions. This paper presents a novel method for improving companion NPC by way of Language Acquisition through the use of Fuzzy Set theory in the form of Type-2 Fuzzy Grammar, which is an extension of the canonical Fuzzy Grammar by Lee and Zadeh. Type-2 Fuzzy Grammar captures the ambiguity of natural language and can easily model the level of expertise with said language. A case study is presented where humans participate in a multi player Predator-Prey pursuit game. The text messages that players exchange during the game are used to teach the language to a companion NPC so that it may directly interact with the players to test its communication capability. Results show how the companion NPC acquired language and its impact on the game.Keyword:Fuzzy Grammar, Fuzzy Language, Fuzzy Sets, Intelligent Agents, Language Acquisition, Natural Language Processing, Video Games.
Title:LANGUAGE ASSIMILATION THROUGH TYPE-2 FUZZY GRAMMARS: AN APPLICATION IN COMPUTER ENTERTAINMENT
Author:Juan Paulo Alvarado-Magaña, Antonio Rodriguez-Diaz, Juan R. Castro, Olivia Mendoza, Oscar Castillo, Guillermo Licea
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN: 2350-1022
Paper Publications
A Study on Isolation, Partial Characterisation and antifungal activity of Pse...paperpublications3
Abstract: Pseudomonas fluorescens are organisms which are abundant in soil and influence plant by growth promotion and disease control. Of 50 samples, thirty isolated samples obtained from soil was partially characterized as Pseudomonas fluorescens. They were classified into 5 biovars BV1,II,III,IV and V . Among the Biovars BV II is the most abundant (26.6%)followed by BV IV(23.3%),BV I(20%),BV V(16.6%) and BV III (13.3%)All of them produced siderophores in CAS medium.Minimal Inhibitory Concentrations(MIC) of the two heavy metals) and two antibiotics (Penicillin and Streptomycin) were observed as shown in table 3.All biovars showed resistance to 2 heavy metals(Lead and mercury and 2 antibiotics(Penicillin and Streptomycin). So they can be used in soil contaminated with heavy metals and also in the presence of antibiotics. Strain BV V was found to be the most resistant strain and was used for further studies. Four basal media supplemented with different concentration of iron, were employed to study the effect of iron and different organic carbon sources on siderophore production in Pseudomonas fluorescens. The highest siderophore production was obtained in KB medium(24.3 µM) and the lowest production was in glycerol medium(2.45 µM) with no Iron added. The standard KB medium without added iron permitted the synthesis of greater amount of siderophores. Fusarium. All the isolates of Pseudomonas fluorescens inhibited the pathogenic fungi Fusarium isolated from soil. Both the culture containing cells and cell free extract shown inhibition of Fusarium. Among broth cultures Pseudomonas fluorescens BV III showed more inhibition (63.3%) on third day of inoculation.Cell free extract of Pseudomonas fluorescens BV V on third day of incubation showed more inhibition (67.7%)than culture containing cells(46.6%). Special analysis of crude extract of culture filtrate, revealed the production of siderophores by fluorescent Pseudomonas. The maximum absorption was found it to be at 373nm. Further studies are needed to confirm the specific molecule which causes inhibition in Pseudomonas fluorescens.Keywords: Antibiotics, Biovars, CAS medium, Cell free extract Fusarium, Heavy metals, MIC, Pseudomonas fluorescens ,Siderophore.
Title: A Study on Isolation, Partial Characterisation and antifungal activity of Pseudomonas fluorescens from soil
Author: Smitha Mathews
International Journal of Recent Research in Life Sciences (IJRRLS)
ISSN 2349-7823
Paper Publications
Learning Process Interaction Aided by an Adapter Agentpaperpublications3
Abstract: Computational models have played an important role in the discovery and understanding of the complexities during the learning process. One complexity is the distraction factor on educator-learner interaction affecting the quality of the learning process.
We model an adaptive system model able to dynamically adapt considering user’s performance, simulating the learner as a museum user and the educator as an exhibition module using BDI agents; we adapt the BDI architecture using Type-2 fuzzy inference system to add perceptual human-like capability on agents in order to describe the interaction on user's experience. The resulting model allows content adaptation by creating a personalized interaction environment.Keywords:Learning Process, Adaptive System, Interaction, BDI Agents, Type-2 Fuzzy System.
Title:Learning Process Interaction Aided by an Adapter Agent
Author:Ricardo Rosales, Dora-Luz Flores, Luis Palafox, Manuel Castanon-Puga, Donald Rodriguez, Carelia Gaxiola-Pacheco
International Journal of Recent Research in Mathematics Computer Science and Information Technology (IJRRMCSIT)
ISSN: 2350-1022
Paper Publications
Abstract: In an online security, authentication plays a crucial role in shielding resources against unauthorized and illegal use of information. Authentication processes may differ from simple password based authentication system to complex, costly and computation strengthened authentication systems. In recent days, increasing security has always been an important issue since Internet and Web Development came into actuality. Text based password is not enough to counter such problems, which is also an obsolete approach now. Consequently, this demands the need for something more secure along with being more user-friendly. Therefore, we have strained to rise the security by involving a multiple level security tactic, involving Text based using Cryptography, Grid Authentication and Image Based Password. The cryptography technique is very essential for the text based password while encrypting it with the principle of substitution method like Caesar Cipher. Session passwords are also necessary for eliminating the time factor attacks such as Brute Force attack. Grid Authentication makes the system more dynamic due ever changing nature. Image based authentication makes the system more user friendly, reliable and secure.Keywords: Cryptography, Grid Authentication, Image Based Password, Shoulder Attack.
Title: Multilevel Security and Authentication System
Author: Pratik Anap, Sanjay Gholap, Prasad Anpat, Abhijit Bhapkar
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...paperpublications3
Abstract: De-Duplication improves Storage and bandwidth efficiency is incompatible with traditional encryption. In traditional model encryption requires different users to encrypt their own data with their own master key, thus identical data copies of different users will lead to different cipher texts, making de-duplication impossible. Each such copy can be defined based on different granularities: it may refer to either a whole file (i.e., file level deduplication), or data block (i.e., block-level deduplication). To applying deduplication to user data to save maintenance cost in cloud. Apart from normal encryption and decryption process we have proposed Master key concept with DeKey concept. For Encryption and Decryption we have used Triple Data Encryption Standard Algorithm where the plain text is encrypted triple times with the key so that the data is secure and reliable from hackers. We reduced the cost and time in uploading and downloading with storage space.Keywords: De-Duplication improves Storage; bandwidth efficiency is incompatible with traditional encryption.
Title: Secure Deduplication with Efficient and Reliable Dekey Management with the Proof of Ownership
Author: M. Shankari, V. Sheela, S. Rajesh
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Graphical Password Authentication Using Modified Persuasive Cued Click-Pointpaperpublications3
Abstract: There are many authentication systems which are used for computer based authentication purpose. Generally user have put username and password in alphanumeric form. But alphanumeric password which is easy for remember can be guess by any hacker/attacker. But strong password given by user which is hard to remember sometime. This paper introduces modified persuasive cued click point authentication system. In persuasive cued click point authentication system, due to viewport chances of hotspot creation is increased. Due to elimination of viewport, hotspot creation is reduced in the modified PCCP, which gives more security to system.Keywords: Cued Click Points, Graphical Password, Modified PCCP, Server side images, and security.
Title: Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Author: Mohite Sandhya, Kare Rohini, Bhongale Pooja, Bhosale Priyanka, Prof. Parchure S.V.
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Pediatric Nurses’ Knowledge and Practices Regarding Nursing Management of Pre...paperpublications3
Abstract: Prematurity used to be a major cause of infant deaths. The premature babies need improved medical and nursing techniques by highly competence nursing team.
Material and Methods: This descriptive hospital based study was conducted at Soba university hospital, Khartoum state in the period from January to March 2014. The study aimed at assessing the knowledge and practices of pediatric nurses in neonatal intensive care unit concerning nursing management of preterm babies. The sample size compromised of 50 nurses that constituted the total coverage of study population during the period of the study. Data were collected using structured interview questionnaire and observation check list designed f or the study. The data was analyzed using statistical package for social sciences (SPSS). Results:The results obtained that the majority of nurses were knowledgeable about the characteristics of preterm babies, causes of prematurity, immediate nursing care of preterm, signs of hypothermia were adequate (100%, 92%, 100%,100% respectively). Half of them (50%) identify the breathing pattern of preterm baby. The nurses clinical performance were inadequate where 70% of them recorded pulse rate only when recorded the baby pulse.100% did not wear mask, 80% find a difficulty on selecting appropriate vein for sampling . Also 48% of nurses gave feeding incorrect and 60% of them did not aspirate gastric contents before feeding.
Conclusion: The study concluded that the majority of pediatric nurses had adequate knowledge about prematurity, but they were lacking in their clinical skills to manage the preterm baby. So the study recommended continuous training programs for the nurses to refresh their knowledge and practices towards management of preterm babies to ideal standards.Keywords: Pediatric Nurses’ Knowledge, Practices Regarding Nursing Management, Premature Babies.
Title: Pediatric Nurses’ Knowledge and Practices Regarding Nursing Management of Premature Babies in Neonatal Intensive Care Unit at Soba University Hospital, Khartoum State, Sudan
Author: Widad Ibrahim A/gadir A/moula, Ietimad Ibrahim Abd Elrahman kambal
ISSN 2349-7823
International Journal of Recent Research in Life Sciences (IJRRLS)
Paper Publications
Trend Analysis in Budgetary Allocation to Crop Research Program: The Case of ...paperpublications3
Abstract: The study estimated trend equations for budgetary allocation on crop research program in Ethiopian Institute of Agricultural Research between 1992 E.C and 2008 E.C. Secondary data in the form of capital budget allocation records were obtained from Planning, monitoring and Evaluation directorate of Ethiopian Institute of Agricultural Research. Results from the fitted trend equations showed that the capital budget allocation to the research program were high and significant at 1 percent. Annual compound growth rate of expenditure on the sector was also high (12% in crop research program, 6% in cereal crops research sub program, 14% in POFCRSP, 28 in AMBCRSP and 21% in PPRSP). And insignificant growth rate were exhibited by the CSTCRSP, Furthermore, the fitted quadratic equations in time variable showed the significant acceleration in budget allocation growth on crop research program. the cuddy della instability index come with the result of moderate instability in CRP, CRCSP, POFCRSP and PPRSP, while a high degree of instability index in CSTCSP and a severe instability in AMBCRSP. Further during the study period 0.8 million birr were utilized per varietal development by the research program. The mean difference test depicted that, there is a significant budget allocation difference between PASDEP I and GTP I. The mean budget allocated during GTP I was less than the mean budget allocated during PASDEP I by 36.4 million birr.Keywords: CSTCRSP, AMBCRSP, CRP, CRCSP, POFCRSP and PPRSP.
Title: Trend Analysis in Budgetary Allocation to Crop Research Program: The Case of EIAR
Author: Eyob Bezabeh
ISSN 2349-7823
International Journal of Recent Research in Life Sciences (IJRRLS)
Paper Publications
Abstract: Face Recognition appears to be an integral part in human-computer interfaces and eservices. To carry out security and fault tolerance various Image Processing techniques have been incorporated using ‘Curse of Dimensionality’ that refers to Classifying a pattern with high dimensions that requires a large number of training data. A face recognition & Detection system is a computer-driven application for automatically identifying or verifying a person from still or video image. It does that by comparing selected facial features in the live image and a facial database where the system returns a possible list of faces corresponding to training samples from the database. The nodal points are measured creating a numerical code, called a faceprint, representing the face in the database. Relatively many techniques are used. Image processing technique has been implemented using Feature extraction by Gabor Filters and database training data using Neural Networks. Multiscale resolution and matrix sampling is efficiently performed using this technique.
Keywords: Image Processing techniques, Curse of Dimensionality, Faceprint, Feature extraction, Gabor Filters, Neural Networks.
Title: Face Recognition & Detection Using Image Processing
Author: Chandani Sharma
International Journal of Recent Research in Mathematics Computer Science and Information Technology (IJRRMCSIT)
Paper Publications
Abstract: Aflatoxicosis is among the major cause of economic losses in poultry production. Aflatoxins are a group of hepatotoxic compounds produced by the fungus of Aspergillus sps. when growing on feedstuffs. Aflatoxins are hepatotoxic, mutagenic and carcinogenic fungal toxin which is capable of producing diseases in farm animals as well as poultry. There are four primary aflatoxins: aflatoxin B1 (AFB1), aflatoxin B2 (AFB2), aflatoxin G1 (AFG1) and aflatoxin G2 (AFG2). Among these AFB1 is the most toxic aflatoxin. Aflatoxicosis in poultry is characterized by decreased growth rate, poor feed conversion, immunosuppression, passage of undigested food in the dropping, anemia, decrease egg production in layers quantitatively and qualitatively, decrease hatchability, embryonic mortality, reduced fertility due to decrease testicular weight, decrease semen volume and sometimes there may be lamness, ataxia, convulsions & death. In humans being acute aflatoxicosis is manifested by vomiting, abdominal pain, pulmonary edema, coma, convulsions, and death with cerebral edema and fatty involvement of the liver, kidney and heart. Keywords: Aflatoxin, Poultry, Hepatotoxic.
Title: Aflatoxicosis in Poultry
Author: Sakshi Tiwari, Vikash Sharma, Amrender Nath Tiwari, Amit Shukla
ISSN 2349-7823
International Journal of Recent Research in Life Sciences (IJRRLS)
Paper Publications
Review Paper on an Open Source Content Management System: Joomla CMSpaperpublications3
Abstract: Joomla is a free and open source content management system (CMS) for publishing content on the World Wide Web and intranets and a Web application framework that can also be used separately. Joomla is written in PHP, uses object-oriented programming (OOP) techniques and software drawing pattern, supplies data in a MySQL database, and include features such as page caching, RSS feed, printable version of pages, information flashes, blogs, polls, investigate, and sustain for language internationalization.
A content management system (CMS) is a system providing a collection of procedures used to manage work flow in a two-way environment. These procedures can be physical or computer-based. Here a CMS, data can be defined as nearly anything: papers, movies, text, pictures, phone information, scientific data, and so forward. CMSs are frequently used for storing, calculating, revising, semantically elevating, and publishing documentation. Serving as a central storehouse, the CMS increases the version level of new updates to an already presented file. Version control is one of the primary advantages of a CMS.[1]Keywords: Joomla, Drupal, Content Management Systems.
Title: Review Paper on an Open Source Content Management System: Joomla CMS
Author: Miss. Vaishali Sunil Bhirud
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...cscpconf
Communicating an organisation's requirements in a semantically consistent and understandable manner and then reflecting the potential impact of those requirements on the IT infrastructure presents a major challenge among stakeholders. Initial research findings indicate a desire among business executives for a tool that allows them to communicate organisational changes using natural language and a simulation of the IT infrastructure that supports those changes. Building on a detailed analysis and evaluation of these findings, the innovative CRESUS tool was designed and implemented. The purpose of this research was to investigate to what extent CRESUS both aids communication in the development of a shared understanding and supports collaborative requirements elicitation to bring about organisational, and associated IT infrastructural, change. This paper presents promising results that show how such a tool can facilitate collaborative requirements elicitation through increased communication around organisational change and the IT infrastructure.
In context-aware trust evaluation, using ontology tree is a popular approach to represent the relation
between contexts. Usually, similarity between two contexts is computed using these trees. Therefore, the
performance of trust evaluation highly depends on the quality of ontology trees. Fairness or granularity
consistency is one of the major limitations affecting the quality of ontology tree. This limitation refers to
inequality of semantic similarity in the most ontology trees. In other words, semantic similarity of every two
adjacent nodes is unequal in these trees. It deteriorates the performance of contexts similarity computation.
We overcome this limitation by weighting tree edges based on their semantic similarity. Weight of each
edge is computed using Normalized Similarity Score (NSS) method. This method is based on frequencies of
concepts (words) co-occurrences in the pages indexed by search engines. Our experiments represent the
better performance of the proposed approach in comparison with established trust evaluation approaches.
The suggested approach can enhance efficiency of any solution which models semantic relations by
ontology tree.
Abstract: This paper presents a new face parts information analyzer, as a promising model for detecting faces and locating the facial features in images. The main objective is to build fully automated human facial measurements systems from images with complex backgrounds. Detection of facial features such as eye, nose, and mouth is an important step for many subsequent facial image analysis tasks. The main study of face detection is detect the portion of part and mention the circle or rectangular of the every portion of body. In this paper face detection is depend upon the face pattern which is match the face from the pattern reorganization. The study present a novel and simple model approach based on a mixture of techniques and algorithms in a shared pool based on viola jones object detection framework algorithm combined with geometric and symmetric information of the face parts from the image in a smart algorithm.Keywords: Face detection, Video frames, Viola-Jones, Skin detection, Skin color classification, Face reorganization, Pattern reorganization. Skin Color.
Title: Face Detection Using Modified Viola Jones Algorithm
Author: Alpika Gupta, Dr. Rajdev Tiwari
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Abstract: Every program whether in c, java or any other language consists of a set of commands which are based on the logic behind the program as well as the syntax of the language and does the task of either fetching or storing the data to the computer, now here comes the role of the word known as “data structure”. In computer science, a data structure is a particular way of organizing data in a computer so that it can be used efficiently. Data structures provide a means to manage large amounts of data efficiently, such as large databases and internet indexing services. Usually, efficient data structures are a key in designing efficient algorithms. Some formal design methods and programming languages emphasize data structures, rather than algorithms, as the key organizing factor in software design. Storing and retrieving can be carried out on data stored in both main memory and in secondary memory. Now as different data structures are having their different usage and benefits, hence selection of the same is a task of importance. “Therefore the paper consists of the basic terms and information regarding data structures in detail later on will be followed by the practical usage of different data structures that will be helpful for the programmer for selection of a perfect data structure that would make the programme much more easy and flexible.Keywords: Data structures, Arrays, Lists, Trees.
Title: Data Structure the Basic Structure for Programming
Author: Shubhangi Johri, Siddhi Garg, Sonali Rawat
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN: 2350-1022
Paper Publications
LANGUAGE ASSIMILATION THROUGH TYPE-2 FUZZY GRAMMARS: AN APPLICATION IN COMPUT...paperpublications3
Abstract:In computer entertainment and video games users interact with machine controlled agents often referred to as Non-Player Characters (NPC). An NPC is generally intended as an antagonist for the user, but frequently helpful NPCs designed to aid the player are employed. These types of NPCs are referred to as companions. This paper presents a novel method for improving companion NPC by way of Language Acquisition through the use of Fuzzy Set theory in the form of Type-2 Fuzzy Grammar, which is an extension of the canonical Fuzzy Grammar by Lee and Zadeh. Type-2 Fuzzy Grammar captures the ambiguity of natural language and can easily model the level of expertise with said language. A case study is presented where humans participate in a multi player Predator-Prey pursuit game. The text messages that players exchange during the game are used to teach the language to a companion NPC so that it may directly interact with the players to test its communication capability. Results show how the companion NPC acquired language and its impact on the game.Keyword:Fuzzy Grammar, Fuzzy Language, Fuzzy Sets, Intelligent Agents, Language Acquisition, Natural Language Processing, Video Games.
Title:LANGUAGE ASSIMILATION THROUGH TYPE-2 FUZZY GRAMMARS: AN APPLICATION IN COMPUTER ENTERTAINMENT
Author:Juan Paulo Alvarado-Magaña, Antonio Rodriguez-Diaz, Juan R. Castro, Olivia Mendoza, Oscar Castillo, Guillermo Licea
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN: 2350-1022
Paper Publications
A Study on Isolation, Partial Characterisation and antifungal activity of Pse...paperpublications3
Abstract: Pseudomonas fluorescens are organisms which are abundant in soil and influence plant by growth promotion and disease control. Of 50 samples, thirty isolated samples obtained from soil was partially characterized as Pseudomonas fluorescens. They were classified into 5 biovars BV1,II,III,IV and V . Among the Biovars BV II is the most abundant (26.6%)followed by BV IV(23.3%),BV I(20%),BV V(16.6%) and BV III (13.3%)All of them produced siderophores in CAS medium.Minimal Inhibitory Concentrations(MIC) of the two heavy metals) and two antibiotics (Penicillin and Streptomycin) were observed as shown in table 3.All biovars showed resistance to 2 heavy metals(Lead and mercury and 2 antibiotics(Penicillin and Streptomycin). So they can be used in soil contaminated with heavy metals and also in the presence of antibiotics. Strain BV V was found to be the most resistant strain and was used for further studies. Four basal media supplemented with different concentration of iron, were employed to study the effect of iron and different organic carbon sources on siderophore production in Pseudomonas fluorescens. The highest siderophore production was obtained in KB medium(24.3 µM) and the lowest production was in glycerol medium(2.45 µM) with no Iron added. The standard KB medium without added iron permitted the synthesis of greater amount of siderophores. Fusarium. All the isolates of Pseudomonas fluorescens inhibited the pathogenic fungi Fusarium isolated from soil. Both the culture containing cells and cell free extract shown inhibition of Fusarium. Among broth cultures Pseudomonas fluorescens BV III showed more inhibition (63.3%) on third day of inoculation.Cell free extract of Pseudomonas fluorescens BV V on third day of incubation showed more inhibition (67.7%)than culture containing cells(46.6%). Special analysis of crude extract of culture filtrate, revealed the production of siderophores by fluorescent Pseudomonas. The maximum absorption was found it to be at 373nm. Further studies are needed to confirm the specific molecule which causes inhibition in Pseudomonas fluorescens.Keywords: Antibiotics, Biovars, CAS medium, Cell free extract Fusarium, Heavy metals, MIC, Pseudomonas fluorescens ,Siderophore.
Title: A Study on Isolation, Partial Characterisation and antifungal activity of Pseudomonas fluorescens from soil
Author: Smitha Mathews
International Journal of Recent Research in Life Sciences (IJRRLS)
ISSN 2349-7823
Paper Publications
Learning Process Interaction Aided by an Adapter Agentpaperpublications3
Abstract: Computational models have played an important role in the discovery and understanding of the complexities during the learning process. One complexity is the distraction factor on educator-learner interaction affecting the quality of the learning process.
We model an adaptive system model able to dynamically adapt considering user’s performance, simulating the learner as a museum user and the educator as an exhibition module using BDI agents; we adapt the BDI architecture using Type-2 fuzzy inference system to add perceptual human-like capability on agents in order to describe the interaction on user's experience. The resulting model allows content adaptation by creating a personalized interaction environment.Keywords:Learning Process, Adaptive System, Interaction, BDI Agents, Type-2 Fuzzy System.
Title:Learning Process Interaction Aided by an Adapter Agent
Author:Ricardo Rosales, Dora-Luz Flores, Luis Palafox, Manuel Castanon-Puga, Donald Rodriguez, Carelia Gaxiola-Pacheco
International Journal of Recent Research in Mathematics Computer Science and Information Technology (IJRRMCSIT)
ISSN: 2350-1022
Paper Publications
Abstract: In an online security, authentication plays a crucial role in shielding resources against unauthorized and illegal use of information. Authentication processes may differ from simple password based authentication system to complex, costly and computation strengthened authentication systems. In recent days, increasing security has always been an important issue since Internet and Web Development came into actuality. Text based password is not enough to counter such problems, which is also an obsolete approach now. Consequently, this demands the need for something more secure along with being more user-friendly. Therefore, we have strained to rise the security by involving a multiple level security tactic, involving Text based using Cryptography, Grid Authentication and Image Based Password. The cryptography technique is very essential for the text based password while encrypting it with the principle of substitution method like Caesar Cipher. Session passwords are also necessary for eliminating the time factor attacks such as Brute Force attack. Grid Authentication makes the system more dynamic due ever changing nature. Image based authentication makes the system more user friendly, reliable and secure.Keywords: Cryptography, Grid Authentication, Image Based Password, Shoulder Attack.
Title: Multilevel Security and Authentication System
Author: Pratik Anap, Sanjay Gholap, Prasad Anpat, Abhijit Bhapkar
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...paperpublications3
Abstract: De-Duplication improves Storage and bandwidth efficiency is incompatible with traditional encryption. In traditional model encryption requires different users to encrypt their own data with their own master key, thus identical data copies of different users will lead to different cipher texts, making de-duplication impossible. Each such copy can be defined based on different granularities: it may refer to either a whole file (i.e., file level deduplication), or data block (i.e., block-level deduplication). To applying deduplication to user data to save maintenance cost in cloud. Apart from normal encryption and decryption process we have proposed Master key concept with DeKey concept. For Encryption and Decryption we have used Triple Data Encryption Standard Algorithm where the plain text is encrypted triple times with the key so that the data is secure and reliable from hackers. We reduced the cost and time in uploading and downloading with storage space.Keywords: De-Duplication improves Storage; bandwidth efficiency is incompatible with traditional encryption.
Title: Secure Deduplication with Efficient and Reliable Dekey Management with the Proof of Ownership
Author: M. Shankari, V. Sheela, S. Rajesh
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Graphical Password Authentication Using Modified Persuasive Cued Click-Pointpaperpublications3
Abstract: There are many authentication systems which are used for computer based authentication purpose. Generally user have put username and password in alphanumeric form. But alphanumeric password which is easy for remember can be guess by any hacker/attacker. But strong password given by user which is hard to remember sometime. This paper introduces modified persuasive cued click point authentication system. In persuasive cued click point authentication system, due to viewport chances of hotspot creation is increased. Due to elimination of viewport, hotspot creation is reduced in the modified PCCP, which gives more security to system.Keywords: Cued Click Points, Graphical Password, Modified PCCP, Server side images, and security.
Title: Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Author: Mohite Sandhya, Kare Rohini, Bhongale Pooja, Bhosale Priyanka, Prof. Parchure S.V.
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Pediatric Nurses’ Knowledge and Practices Regarding Nursing Management of Pre...paperpublications3
Abstract: Prematurity used to be a major cause of infant deaths. The premature babies need improved medical and nursing techniques by highly competence nursing team.
Material and Methods: This descriptive hospital based study was conducted at Soba university hospital, Khartoum state in the period from January to March 2014. The study aimed at assessing the knowledge and practices of pediatric nurses in neonatal intensive care unit concerning nursing management of preterm babies. The sample size compromised of 50 nurses that constituted the total coverage of study population during the period of the study. Data were collected using structured interview questionnaire and observation check list designed f or the study. The data was analyzed using statistical package for social sciences (SPSS). Results:The results obtained that the majority of nurses were knowledgeable about the characteristics of preterm babies, causes of prematurity, immediate nursing care of preterm, signs of hypothermia were adequate (100%, 92%, 100%,100% respectively). Half of them (50%) identify the breathing pattern of preterm baby. The nurses clinical performance were inadequate where 70% of them recorded pulse rate only when recorded the baby pulse.100% did not wear mask, 80% find a difficulty on selecting appropriate vein for sampling . Also 48% of nurses gave feeding incorrect and 60% of them did not aspirate gastric contents before feeding.
Conclusion: The study concluded that the majority of pediatric nurses had adequate knowledge about prematurity, but they were lacking in their clinical skills to manage the preterm baby. So the study recommended continuous training programs for the nurses to refresh their knowledge and practices towards management of preterm babies to ideal standards.Keywords: Pediatric Nurses’ Knowledge, Practices Regarding Nursing Management, Premature Babies.
Title: Pediatric Nurses’ Knowledge and Practices Regarding Nursing Management of Premature Babies in Neonatal Intensive Care Unit at Soba University Hospital, Khartoum State, Sudan
Author: Widad Ibrahim A/gadir A/moula, Ietimad Ibrahim Abd Elrahman kambal
ISSN 2349-7823
International Journal of Recent Research in Life Sciences (IJRRLS)
Paper Publications
Trend Analysis in Budgetary Allocation to Crop Research Program: The Case of ...paperpublications3
Abstract: The study estimated trend equations for budgetary allocation on crop research program in Ethiopian Institute of Agricultural Research between 1992 E.C and 2008 E.C. Secondary data in the form of capital budget allocation records were obtained from Planning, monitoring and Evaluation directorate of Ethiopian Institute of Agricultural Research. Results from the fitted trend equations showed that the capital budget allocation to the research program were high and significant at 1 percent. Annual compound growth rate of expenditure on the sector was also high (12% in crop research program, 6% in cereal crops research sub program, 14% in POFCRSP, 28 in AMBCRSP and 21% in PPRSP). And insignificant growth rate were exhibited by the CSTCRSP, Furthermore, the fitted quadratic equations in time variable showed the significant acceleration in budget allocation growth on crop research program. the cuddy della instability index come with the result of moderate instability in CRP, CRCSP, POFCRSP and PPRSP, while a high degree of instability index in CSTCSP and a severe instability in AMBCRSP. Further during the study period 0.8 million birr were utilized per varietal development by the research program. The mean difference test depicted that, there is a significant budget allocation difference between PASDEP I and GTP I. The mean budget allocated during GTP I was less than the mean budget allocated during PASDEP I by 36.4 million birr.Keywords: CSTCRSP, AMBCRSP, CRP, CRCSP, POFCRSP and PPRSP.
Title: Trend Analysis in Budgetary Allocation to Crop Research Program: The Case of EIAR
Author: Eyob Bezabeh
ISSN 2349-7823
International Journal of Recent Research in Life Sciences (IJRRLS)
Paper Publications
Abstract: Face Recognition appears to be an integral part in human-computer interfaces and eservices. To carry out security and fault tolerance various Image Processing techniques have been incorporated using ‘Curse of Dimensionality’ that refers to Classifying a pattern with high dimensions that requires a large number of training data. A face recognition & Detection system is a computer-driven application for automatically identifying or verifying a person from still or video image. It does that by comparing selected facial features in the live image and a facial database where the system returns a possible list of faces corresponding to training samples from the database. The nodal points are measured creating a numerical code, called a faceprint, representing the face in the database. Relatively many techniques are used. Image processing technique has been implemented using Feature extraction by Gabor Filters and database training data using Neural Networks. Multiscale resolution and matrix sampling is efficiently performed using this technique.
Keywords: Image Processing techniques, Curse of Dimensionality, Faceprint, Feature extraction, Gabor Filters, Neural Networks.
Title: Face Recognition & Detection Using Image Processing
Author: Chandani Sharma
International Journal of Recent Research in Mathematics Computer Science and Information Technology (IJRRMCSIT)
Paper Publications
Abstract: Aflatoxicosis is among the major cause of economic losses in poultry production. Aflatoxins are a group of hepatotoxic compounds produced by the fungus of Aspergillus sps. when growing on feedstuffs. Aflatoxins are hepatotoxic, mutagenic and carcinogenic fungal toxin which is capable of producing diseases in farm animals as well as poultry. There are four primary aflatoxins: aflatoxin B1 (AFB1), aflatoxin B2 (AFB2), aflatoxin G1 (AFG1) and aflatoxin G2 (AFG2). Among these AFB1 is the most toxic aflatoxin. Aflatoxicosis in poultry is characterized by decreased growth rate, poor feed conversion, immunosuppression, passage of undigested food in the dropping, anemia, decrease egg production in layers quantitatively and qualitatively, decrease hatchability, embryonic mortality, reduced fertility due to decrease testicular weight, decrease semen volume and sometimes there may be lamness, ataxia, convulsions & death. In humans being acute aflatoxicosis is manifested by vomiting, abdominal pain, pulmonary edema, coma, convulsions, and death with cerebral edema and fatty involvement of the liver, kidney and heart. Keywords: Aflatoxin, Poultry, Hepatotoxic.
Title: Aflatoxicosis in Poultry
Author: Sakshi Tiwari, Vikash Sharma, Amrender Nath Tiwari, Amit Shukla
ISSN 2349-7823
International Journal of Recent Research in Life Sciences (IJRRLS)
Paper Publications
Review Paper on an Open Source Content Management System: Joomla CMSpaperpublications3
Abstract: Joomla is a free and open source content management system (CMS) for publishing content on the World Wide Web and intranets and a Web application framework that can also be used separately. Joomla is written in PHP, uses object-oriented programming (OOP) techniques and software drawing pattern, supplies data in a MySQL database, and include features such as page caching, RSS feed, printable version of pages, information flashes, blogs, polls, investigate, and sustain for language internationalization.
A content management system (CMS) is a system providing a collection of procedures used to manage work flow in a two-way environment. These procedures can be physical or computer-based. Here a CMS, data can be defined as nearly anything: papers, movies, text, pictures, phone information, scientific data, and so forward. CMSs are frequently used for storing, calculating, revising, semantically elevating, and publishing documentation. Serving as a central storehouse, the CMS increases the version level of new updates to an already presented file. Version control is one of the primary advantages of a CMS.[1]Keywords: Joomla, Drupal, Content Management Systems.
Title: Review Paper on an Open Source Content Management System: Joomla CMS
Author: Miss. Vaishali Sunil Bhirud
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: Privacy is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). Different communities of computer science researchers have framed the ‘OSN privacy problem’ as one of surveillance, institutional or social privacy. In this article, first we provide an introduction to the surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their assumptions and goals. This paper mainly addresses visitors events (population) on an users account and updates the account holders log information. And thus the evolutionary aspects of Surveillance are reflected in User's Log, this needs the implementation of Genetic Algorithm. Further, this requires a bridge module between every interaction between the user and social network server. This paper implements mutation aspects through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross Over issues of a guest Clicking Friend of a friend.Title: MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
Author: C. Narasimham, Jacob
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN: 2350-1022
Paper Publications
Abstract: Johne’s disease (Paratuberculosis) is a chronic enteritis of ruminants caused by Mycobacterium avium subsp. paratuberculosis (MAP). MAP is a subspecies of M. avium, effects wide range of animals including domestic cattle, sheep, goats, buffaloes, camelids and wild ruminants resulting in progressive and chronic enteritis known as Johne’s disease. Clinically indected animals show watery diarrhea, emaciation and eventually death due to lack of effective treatment. Clinically as well as subclinically infected animals shed bacteria in feces and milk. Fecal-oral rout is the main rout of transmission. It is economically very important disease in livestock due to decrease in milk yield, working efficiency and culling of infected animals. Enlargement of mesenteric lymph node and transverse corrugation in intestine is characterstic finding in post-mortem. Strategies to control this disease include improved management practices, testing and culling and vaccination.Keywords: Johne’s disease, diarrhoea, corrugation.
Title: Johne’s Disease: A Review Article
Author: Vikash Sharma, Lalit, Sakshi Tiwari
International Journal of Recent Research in Life Sciences (IJRRLS)
ISSN 2349-7823
Paper Publications
Improving Service Recommendation Method on Map reduce by User Preferences and...paperpublications3
Abstract: Service recommender systems have been shown as valuable tools for providing appropriate recommendations to users. In the last decade, the amount of customers, services and online information has grown rapidly, yielding the big data analysis problem for service recommender systems. Consequently, traditional service recommender systems often suffer from scalability and inefficiency problems most of existing service recommender systems present the same ratings and rankings of services to different users without considering diverse users' preferences, and therefore fails to meet users' personalized requirements. In this paper, to address the above challenges and presenting a personalized service recommendation list and recommending the most appropriate services to the users effectively. Specifically, keywords are used to indicate users' preferences, and a user-based Collaborative filtering algorithm is adopted to generate appropriate recommendations.Keywords: recommender system, user preference, keyword, Big Data, mapreduce, Hadoop.
Title: Improving Service Recommendation Method on Map reduce by User Preferences and Reviews
Author: Dayanand Bhovi, Mr. Ashwin Kumar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Implementing Map Reduce Based Edmonds-Karp Algorithm to Determine Maximum Flo...paperpublications3
Abstract: Maximum-flow problem are used to find Google spam sites, discover Face book communities, etc., on graphs from the Internet. Such graphs are now so large that they have outgrown conventional memory-resident algorithms. In this paper, we show how to effectively parallelize a maximum flow problem based on the Edmonds-Karp Algorithm (EKA) method on a cluster using the MapReduce framework. Our algorithm exploits the property that such graphs are small-world networks with low diameter and employs optimizations to improve the effectiveness of MapReduce and increase parallelism. We are able to compute maximum flow on a subset of the a large network graph with approximately more number of vertices and more number of edges using a cluster of 4 or 5 machines in reasonable time.Keywords: Algorithm, MapReduce, Hadoop.
Title: Implementing Map Reduce Based Edmonds-Karp Algorithm to Determine Maximum Flow in Large Network Graph
Author: Dhananjaya Kumar K, Mr. Manjunatha A.S
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
A persuasive agent architecture for behavior change interventionIJICTJOURNAL
A persuasive agent makes use of persuasion attributions to ensure that its predefined objective(s) is achieved within its immediate environment. This is made possible based on the five unique features namely sociable, persuasive, autonomy, reactive, and proactive natures. However, there are limited successes recorded within the behavioural intervention and psychological reactance is responsible for these failures. Psychological reactance is the stage where rejection, negative response and frustration are felt by the users of the persuasive system. Thus, this study proposes a persuasive agent (PAT) architecture that limits the experience of psychological reactance to achieve an improved behavioural intervention. PAT architecture adopted the combination of the reactance model for behavior change and the persuasive design principle. The architecture is evaluated by conducting an experimental study using a user-centred approach. The evaluation reflected that there is a reduction in the number of users who experienced psychological reactance from 70 per cent to 3 per cent. The result is a better improvement compared with previous outcomes. The contribution made in this study would provide a design model and a steplike approach to software designers on how to limit the effect of psychological reactance on persuasive system applications and interventions.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Agent Assisted Methodologies have become an
important subject of research in advance Software Engineering.
Several methodologies have been proposed as, a theoretical
approach, to facilitate and support the development of complex
distributed systems. An important question when facing the
construction of Agent Applications is deciding which
methodology to follow. Trying to answer this question, a
framework with several criteria is applied in this paper for the
comparative analysis of existing multiagent system
methodologies. The results of the comparative over two of them,
conclude that those methodologies have not reached a sufficient
maturity level to be used by the software industry. The
framework has also proved its utility for the evaluation of any
kind of Agent Assisted Software Engineering Methodology.
The Evaluation of Generic Architecture for Information Availability (GAIA) an...inventionjournals
Along with the growing interest in agent applications, there has been an increasing number of agentoriented software engineering methodologies proposed in recent years. These methodologies were developed and specially tailored to the characteristics of agents. The roles of these methodologies can provide methods, models, techniques, and tools so that the development of agent based system can be carried out in a former and systematic way. The goal of this paper is to understand the relationship between two key agent-oriented methodologies: Gaia, and MaSE. More specially, we evaluate and compare these three methodologies by performing a feature analysis, on them, which is carried out by evaluating the strengths and weaknesses of each participating methodology using an attribute-based evaluation framework. This evaluation framework addresses some areas of an agent-oriented methodology: concepts, modeling language, process and pragmatics
The Evaluation of Generic Architecture for Information Availability (GAIA) an...inventionjournals
Along with the growing interest in agent applications, there has been an increasing number of agentoriented software engineering methodologies proposed in recent years. These methodologies were developed and specially tailored to the characteristics of agents. The roles of these methodologies can provide methods, models, techniques, and tools so that the development of agent based system can be carried out in a former and systematic way. The goal of this paper is to understand the relationship between two key agent-oriented methodologies: Gaia, and MaSE. More specially, we evaluate and compare these three methodologies by performing a feature analysis, on them, which is carried out by evaluating the strengths and weaknesses of each participating methodology using an attribute-based evaluation framework. This evaluation framework addresses some areas of an agent-oriented methodology: concepts, modeling language, process and pragmatics
TOWARDS AUDITABILITY REQUIREMENTS SPECIFICATION USING AN AGENT-BASED APPROACHijseajournal
Transparency is an important factor in democratic societies composed of characteristics such as accessibility, usability, informativeness, understandability and auditability. In this research we focus on auditability since it plays an important role for citizens that need to understand and audit public information. Although auditability has been a subject of discussion when designing systems, there is a lack of systematization in its specification. We propose an approach to systematically add auditability requirements specification during the goal-oriented agent-based Tropos methodology. We used the Transparency Softgoal Interdependency Graph that captures the different facets of transparency while considering their operationalization. An empirical evaluation was conducted through the design and implementation of LawDisTrA system that distributes lawsuits among judges in an appellate court. Experiments included the distribution of over 300,000 lawsuits at the Brazilian Superior Labor Court. We theorize that the presented approach for auditability provides adequate techniques to address the cross-organizational nature of transparency
State of the art of agile governance a systematic reviewijcsit
Context: Agility at the business level requires Information Technology (IT) environment flexible and
customizable, as well as effective and responsive governance in order to deliver value faster, better, and
cheaper to the business. Objective: To understand better this context, our paper seeks to investigate how
the domain of agile governance has evolved, as well as to derive implications for research and practice.
Method: We conducted a systematic review about the state of art of the agile governance up to and
including 2013. Our search strategy identified 1992 studies in 10 databases, of which 167 had the potential
to answer our research questions. Results: We organized the studies into four major groups: software
engineering, enterprise, manufacturing and multidisciplinary; classifying them into 16 emerging
categories. As a result, the review provides a convergent definition for agile governance, six metaprinciples,
and a map of findings organized by topic and classified by relevance and convergence.
Conclusion: The found evidence lead us to believe that agile governance is a relatively new, wide and
multidisciplinary area focused on organizational performance and competitiveness that needs to be more
intensively studied. Finally, we made improvements and additions to the methodological approach for
systematic reviews and qualitative studies.
CONSIDERATION OF HUMAN COMPUTER INTERACTION IN ROBOTIC FIELD ijcsit
Technological progress leads the apparition of robot in human environment; we began to find them in hospitals, museums, and homes. However these situations require an interaction of robots with humans and an adoption of social behaviors. We have shown in this paper how disciplines like computer science in general and human computer interaction in particular are used to improve human robot interaction. Then we indicated how we can use action theory into design of interaction between human and Robot. Finally we proposed some practical scenarios for illustrations.
Intelligent Buildings: Foundation for Intelligent Physical AgentsIJERA Editor
FIPA is an IEEE Computer Society standards organization that promotes agent-based technology and the interoperability of its standards with other technologies. In the design phase of Intelligent Buildings, it is essential to manage many services and facilities, to do this, multi-agent systems are a good tool to manage them. In this paper, we will gereneral description of the features and elements of multiagent systems described by Foundation for Intelligent Physical Agents (FIPA). Secondly, we will focus on the architectures of these multiagent systems. And finally, we will propose a multi-agent system design to see the application in the design of a detached house where the lighting, air conditioning and security systems will be integrated.
BDI Model with Adaptive Alertness through Situational AwarenessKarlos Svoboda
In this paper, we address the problems faced by a group of agents that possess situational awareness, but lack a security mechanism, by the introduction of a adaptive risk management system.
Name _____________________Bipedal AustralopithOBJECTIVES.docxroushhsiu
Name: _____________________Bipedal Australopith?
OBJECTIVES
After completing this exercise, you should be able to:
Understand bipedalism
Compare and contrast the feet of several primates to identify bipedal abilities.
INTRODUCTION
Bipedalism is the act of walking on two feet. This can be habitually or for brief periods of time. The ability to walk bipedally in an efficient manner depends on great changes to the structure of the body. One of those changes comes from the foot.
EXERCISE
Anthropologists have argued about the bipedal abilities of our potential ancestors Australopithecus afarensis. Here you will compare your own foot to the foot of an Australopith and a chimpanzee to see where they fall. More human? More ape?
Part A:
Foot Measurements:
Determine whether A. afarensis had feet that more closely resembled modern humans or modern chimpanzees. (Remember that the primitive, or earliest, condition is expected to be more like that of a modern chimpanzee).
·
In this section of the activity, you will take three measurements: the distance between the hallux (big toe)
and the second toe, foot length (the length from the tip of the longest toe to the back of the heel), and foot width (the widest part of the foot usually around the toe area).
Actual size outlines of a chimpanzee foot and from an A. afarensis foot print preserved at Laetoli have
been provided for you.
1. Trace your bare foot on a clean sheet of paper (you can use the back of this lesson).
2. Using digital calipers or a ruler, measure in cm the distances according to the instructions.
Write your results in the space provided on the graph.
3. Calculate the hallux divergence index by dividing the foot width by the foot length.
4. Answer these questions based on your results:
What is bipedalism?
What are the earliest fossil hominins that show bipedalism?
What anatomical features are indicative of bipedalism?
Did Australopiths have a toe more similar to humans or apes? Give your reasoning.
RESEARCH ARTICLE
MUTUAL UNDERSTANDING IN INFORMATION SYSTEMS
DEVELOPMENT: CHANGES WITHIN AND ACROSS PROJECTS1
Tracy A. Jenkin and Yolande E. Chan
Smith School of Business, Queen’s University,
Kingston, ON CANADA K7L 3N6 {[email protected]} {[email protected]}
Rajiv Sabherwal
Sam M. Walton College of Business, University of Arkansas,
Fayetteville, AR 72701 U.S.A. {[email protected]}
Although information systems development (ISD) projects are critical to organizations and improving them has
been the focus of considerable research, successful projects remain elusive. Focusing on the cognitive aspects
of ISD projects, we investigate how and why mutual understanding (MU) among key stakeholder groups
(business and information technology managers, users, and developers) changes within and across projects,
and how it affects project success. We examine relationships among project planning and control mechanisms;
sense ...
leewayhertz.com-Auto-GPT Unleashing the power of autonomous AI agents.pdfKristiLBurns
Autonomous agents in artificial intelligence refer to systems or entities that can perceive their environment, make decisions and take actions to achieve specific goals without direct human intervention. These agents are designed to operate independently and adapt to environmental changes. They are commonly used in various applications, such as robotics, computer games, natural language processing and self-driving cars.
Useful and Effectiveness of Multi Agent Systemijtsrd
A multi agent system MAS or self cooperating system is a computerized system organized of multiple interacting intelligent agents. The problems that are difficult to solve for an individual agent or a monolithic system can be solved by multi agent system easily. MAS is a loosely coupled of software agents' network that interact to solve problems that are beyond the individual capacities or knowledge of each software agent. Distributed systems with a group of intelligent agents that communicate with other agents to achieve goals are directed by their masters. MAS group aims to develop new theory and computational models of higher order social cognition between people and computer systems by producing their abilities to reason about one another automatically. More specifically, multi agent control systems are fundamental parts of a wide range of safety critical engineering systems, and are commonly found in aerospace, traffic control, chemical process, power generation and distribution, flexible manufacturing, chemical processes, power generation and distribution, flexible manufacturing, robotic system design and self assembly structures. Moe Myint Myint ""Useful and Effectiveness of Multi-Agent System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23036.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/23036/useful-and-effectiveness-of-multi-agent-system/moe-myint-myint
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to An Extended Reasoning Cycle Algorithm for BDI Agents (20)
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
An Extended Reasoning Cycle Algorithm for BDI Agents
1. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (27-35), Month: October 2014 – March 2015, Available at: www.paperpublications.org
Page | 27
Paper Publications
An Extended Reasoning Cycle Algorithm
for BDI Agents
Donald Rodriguez-Ubeda1
, Dora-Luz Flores2
, Luis Palafox3
, Manuel Castanon-Puga4
,
Carelia Gaxiola-Pacheco5
, Ricardo Rosales6
1
Faculty of Chemical Sciences and Engineering, Autonomous University of Baja California, Department of Mathematics,
University of Sonora.
2,3,4,5,6
Faculty of Chemical Sciences and Engineering, Autonomous University of Baja, California.
Abstract: Multi-agent systems and particularly BDI agents are mostly used in a wide range of projects, from agent-
based simulations to air-traffic control. They all benefit from the autonomy and proactive behavior that provides
agent-based architectures, as well as the characteristics of reasoning that are outlined by the BDI architecture.
Therefore the Belief Desire Intention agent model and Agent Speak language have become a state-of-the-art and
one of the challenging research subjects in the agent modeling and programming area.
In particular the BDI architecture is frequently used in the development of agents that try to simulate certain
aspects of human behavior, and precisely perception and formulation of beliefs are two of the elements of BDI
agents that require special attention in the development of such agents. This work propose a way to extend the
reasoning cycle algorithm on BDI agents, in a way that it allows to process inaccurate perceptions in the
formulation of beliefs in such agents; it also shows an example implemented in Agent Speak as well as the results of
its execution within the Jason interpreter.
Keywords: Agent, Agent Speak, Beliefs, BDI, Fuzzy-BDI, Fuzzy Perceptions, Simulation.
I. INTRODUCTION
Many of the systems we need to build in practice have a reactive characteristic, in the sense that they have to maintain a
long-term, ongoing interaction with their environment; they do not simply compute some function processing an input,
generating an output and then terminate.
Reactive software systems are systems that cannot adequately be described by the relational or functional view. The
relational view regards programs as functions starting from an initial state following a set of state transitions until they
reach a terminal state, so we always can predict the function's output for a given input, which is known as deterministic.
These plain systems also have the characteristic that can be paused and resumed without any data loss, because they don't
have a close and a long term interaction with the environment.
On the other side, the main role of reactive systems is to maintain a frequent interaction with their environment,
accordingly, must be described and specified in terms of their on-going behaviour. The best way to study a concurrent
system is through the analysis of the behaviour exhibited. This is because each individual module in a concurrent system
is a reactive subsystem, interacting with its own environment which consists of the other modules [1].
Examples of reactive systems include computer operating systems, process control systems, on-line banking systems, web
servers, and the like. Many of those systems are developed using the agent-oriented paradigm.
2. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (27-35), Month: October 2014 – March 2015, Available at: www.paperpublications.org
Page | 28
Paper Publications
A. Agents
An agent is a reactive system that exhibits some degree of autonomy in the sense that we can delegate some task to it, and
the system itself will determine the best way to achieve it. These systems are named agents because they are perceived as
active entities, a kind of purposeful producers of actions; it is possible to send them out into the environment to achieve
some goals, and they will actively pursue them, figuring out for themselves the best way to accomplish such goals, so they
don't need any human guide that tell them in a low-level detail how to do it. We can imagine such agents being delegated
a goal like booking a flight and hotel for us, bidding on our behalf in an on-line auction, or cleaning our office space for
us if they are robotic agents [2].
As mentioned above, agents are systems situated within some environment which maintain a frequent interaction with it.
Therefore, agents need to perceive their environment (using sensors), and must have a repertoire of possible actions that
they can perform (via effectors or actuators) in order to interact with (or modify) such environment.
The key question facing the agent behaviour is how to go from sensor input to action output: decide what to do based on
the information obtained via sensors. There are many approaches trying to explain and solve that question; such
approaches are known as cognitive models or agent architectures, like SOAR [3], [4], ACT-R [5] and BDI [6], [7].
B. The BDI Agent Architecture
Agent systems are becoming increasingly popular for solving a wide range of complex problems. BDI agent systems have
a substantial base in theory as well as a number of medium-to-large-scale implemented systems that are used for
challenging applications such as air-traffic control, space systems and human decision making simulation [8].
The BDI model (called the belief-desire-intention model or architecture) originated in the work of the Rational Agency
project at Stanford Research Institute in the mid-1980s. The spirit of the model is located within the theory of human
practical reasoning developed by the philosopher Michael Bratman [6], which focuses particularly on the role of
intentions in practical reasoning.
One of the strengths of the BDI based systems is their strong link to theoretical work, in particular that of Rao and
Georgeff [9], Bratman et al. [7] and Wooldridge [10]. Although the theory is not implemented directly in the systems, it
does inform and guide the implementations [11].
The concepts of the BDI paradigm allow the use of a programming language to describe human reasoning and actions in
everyday life [12]. Because of this straightforward representation, the BDI paradigm can easily map extracted human
knowledge into its framework. The conceptual framework of the BDI model is described in [7], which also describes a
specific BDI agent architecture called IRMA.
Therefore, BDI is a software model developed for programming intelligent agents, which is characterized by the
implementation of an agent's beliefs, desires and intentions, it actually uses these concepts to solve a particular problem in
agent programming. BDI also provides a mechanism for separating the activity of selecting a plan (from a plan library or
an external planner application) from the execution of currently active plans. To achieve this separation, the BDI software
model implements the principal aspects of Michael Bratman's theory of human practical reasoning [6], [7]. In other
words, BDI implements the notions of belief, desire and intention, in a manner inspired by Bratman.
Intention and desire are both pro-attitudes, in fact, both of them are mental attitudes concerned with action, but intention
is distinguished as a conduct-controlling pro-attitude. Commitment is the distinguishing factor between desire and
intention, noting that it leads to temporal persistence in plans and further plans, being made on the basis of those to which
it is already committed.
The hierarchical nature of plans is easily implemented: a plan consists of a number of steps, some of which may invoke
other plans. The hierarchical definition of plans itself implements the kind of temporal persistence mentioned above since
the overarching plan remains in effect while subsidiary plans are being executed.
However, it should be observed that before an agent can achieve his goals, first must formulate a course of actions (the
plans). Those actions successfully will be executed as long as his beliefs about the state of the world around him are true.
3. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (27-35), Month: October 2014 – March 2015, Available at: www.paperpublications.org
Page | 29
Paper Publications
In fact, the trustworthy of the agent's beliefs is a consequence of his skills to perceive (with some degree of confidence)
the changes in the environment.
It is noteworthy that the BDI architecture does not provide a method so that agents can formulate their beliefs, only states
[2] that can be obtained in several ways, of course suggests that perceptions influence the process of formulation of
beliefs, but is left open for everyone to solve it. In this paper, we show how a notion of belief like inaccurate (or vague)
perceptions can be integrated into the BDI logic of Rao and Georgeff [9], preserving the features of the logic while adding
to it in ways that complements and aids in the building of BDI agents that have the skills to construct their own beliefs
taking as input inaccurate perceptions. We argue that our method allows those BDI agents to get a more real picture of the
world where they live than those BDI agents which perceptions are limited to crisps values.
II. RELATED WORKS
This work has been inspired by the works of various authors who have made significant contributions in review of beliefs
from the perspective of logic [13], [14] and artificial intelligence [15], [16]. Its focus is to understand how an agent should
change his belief in the light of new information.
In their paper Kacprzak and Kosinski [17] propose a new approach in which ordered fuzzy numbers (OFN) are applied.
They focus on multi-agent systems and concentrate on agents’ beliefs. In particular, they want: first to make agents able to
use ordered fuzzy numbers in their thinking and making decisions. Second used ordered fuzzy numbers for evaluating
agents’ beliefs about their beliefs.
In the logic above, the beliefs are all formulated from crisp perceptions. However in real life, it is not always the case
[18], as Jing and Luo said [19] our belief is often fuzzy. For example, "I think the temperature will be high tomorrow".
Here, "high" is a fuzzy conception because there is not any crisp division between "high" and "low".
Moreover, we believe that the perceptions of the agents cannot be crisp because in the real world everything is perceived
diffusely; for example is very usual to hear the expression “I feel that the water’s temperature is warm”, nobody says “I
feel that the water’s temperature is 123 degrees”. Even if we use a sensor to measure it, that sensor will measure it with
some degree of imprecision, and we would have to formulate a belief from that measurement.
III. DISCUSSION
The BDI (Beliefs-Desires-Intentions) architecture is one of the most studied architectures for cognitive agents. In the area
of agent-oriented programming languages in particular, AgentSpeak(L) is one of the best known languages based on the
BDI architecture.
Agent Speak (L) is an abstract logic-based agent-oriented programming language introduced by Rao [20]. In such
language practical BDI agents are implemented as reactive planning systems: they run continuously, reacting to events
(e.g., perceived changes in the environment) by executing plans given by the programmer. Plans are courses of actions
that agents commit to execute so as achieve their goals. The pro-active behaviour of agents is possible through the notion
of goals (desired states of the world) that are also part of the language in which plans are written.
Jason is a software framework that interprets an extension of the Agent Speak language; Bordini et al. [2] argue in their
book that the interpretation of the agent program effectively determines the agent’s reasoning cycle. An agent constantly
perceives the environment, reasoning about how to act so as to achieve its goals, then acting so as to change the
environment. The (practical) reasoning part of the agent’s cyclic behaviour, in an Agent Speak agent, is done according
to the plans that the agent has in its plan library. Initially, this library is formed by the plans the programmer writes as an
Agent Speak program.
We modified the algorithm proposed by [2] as the reasoning cycle for a BDI agent, in a way that it includes a perception
mechanism that allows handling vague perceptions and processing them to formulate the agent beliefs. The changes are
showed on Figure 1, we introduced a knowledge base (K), because any agent that need to perceive the environment must
have the necessary knowledge to perform some processing on the perceptions.
4. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (27-35), Month: October 2014 – March 2015, Available at: www.paperpublications.org
Page | 30
Paper Publications
The perceptions or signals are obtained from the agent’s sensors, and passed to the Belief Construction Process (BCP),
such process starts by converting the signals to a fuzzy representation, then it infers over those signals and the knowledge
base (K), the result is a new belief (B’) which is introduced to the agent’s belief base by the Belief Registration Process
(BRP). The algorithm for the BCP is showed on Figure 2.
Fig. 1: Algorithm for a BDI practical reasoning agent.
Fig. 2: Belief Construction Process Algorithm for a BDI agent.
A. A BDI Agent with Fuzzy Perceptions Example
Below we show an example to demonstrate our proposal to extend BDI architecture as well as the reasoning cycle on
Jason’s agents to provide such agents with the ability to process inaccurate perceptions and use them to build their own
beliefs.
The example consists of a BDI agent (adjust water temperature agent) which aims to regulate the combination of water on
a sprinkler to obtain the ideal temperature for a person. Table 1 describes the agent of this example.
TABLE I: Agent Properties
Beliefs Hot(water), Cold(water), Warm(water)
Desires Get water with a warm temperature
Intentions Open cold water, Open hot water
5. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (27-35), Month: October 2014 – March 2015, Available at: www.paperpublications.org
Page | 31
Paper Publications
To reach its desire the agent formulates a course of actions, which is headed by the intention to open the hot sprinkler, as
can be observed on Figure 3.
Fig. 3: Mind Inspector showing the agent Intentions (open the hot sprinkler).
After opening the hot water sprinkler, the agent starts perceiving the temperature of the water and formulating its beliefs,
it will be mixing hot and cold water until it reach the warm temperature. The agent’s knowledge base is described by three
fuzzy membership functions (see Figure 4), which are passed to the BCP algorithm to build the agent’s beliefs. The BCP
algorithm was implemented in java and used a Fuzzy Inference Library developed at our University [21] to evaluate the
agent’s input signals.
Fig. 4: Knowledge Base for the Agent (K).
6. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (27-35), Month: October 2014 – March 2015, Available at: www.paperpublications.org
Page | 32
Paper Publications
The Figure 5 show the “hot(water)” agent’s belief, as a result of the agent’s processing on its perception. Such processing
was made using the signal obtained from the agent's temperature sensor and it’s knowledge base.
Fig. 5: Mind Inspector showing agent Beliefs (hot water).
As the results from it’s belief the agent reacts formulating the corresponding intention to get more cold water on the mix,
as it shows on Figure 6.
Fig. 6: Mind Inspector showing the agent Intentions (open the cold sprinkler).
7. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (27-35), Month: October 2014 – March 2015, Available at: www.paperpublications.org
Page | 33
Paper Publications
The agent keeps perceiving the environment and reacting until it reaches the desire of getting “warm(water)”, that is
confirmed when it formulates the corresponding belief (See Figure 7).
Fig. 7: Mind Inspector showing the agent Beliefs “warm (water)” and the message “The water is ready”.
IV. CONCLUSION
After having performed the relevant tests, we have enough evidence to affirm that our algorithm allows to incorporate
fuzzy perceivers in BDI agents in a way that it does not interferes with the reasoning cycle of the BDI agents. Therefore it
is of great benefit, because our method allows the development of BDI agents whose perceptions may be inaccurate, but
regardless of them such agents have the ability to build their beliefs without affecting the rest of his reasoning logic.
Additionally we believe that our method allows us to develop software agents whose perceptions become more like the
way the humans perceive since they can perceive the world as vaguely the humans perceive it.
Another benefit of our method is that it allows performing the analysis and processing of fuzzy perceptions at an earlier
stage, before the agent starts to perform any kind of reasoning about the beliefs that it has about the environment. In other
words, all the numerical processing of fuzzy logic is done in java and its output are the beliefs, which are inserted into the
(BDI) agent's beliefs database, who takes them to perform further processing according to the logic of reasoning that has
been implemented in Agent Speak, for the execution within the Jason interpreter.
The progress of this work will allow us to continue with our projects related to agent-based simulation, including
simulators to assist researchers focused on social simulation as well as other researchers who study human behaviour,
which require agent-based simulators, whose behaviour resembles that of humans.
8. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (27-35), Month: October 2014 – March 2015, Available at: www.paperpublications.org
Page | 34
Paper Publications
ACKNOWLEDGEMENT
This work was supported by the National Council of Science and Technology from Mexico, the Autonomous University
of Baja California and the University of Sonora.
REFERENCES
[1] Pnueli, “Specication and development of reactive systems,” Information Processing 86, pp. 845-858. Elsevier
Science, Amsterdam, 1986.
[2] R. H. Bordini, J. F. Hübner and M. Wooldridge, “Programming Multi-Agent Systems in AgentSpeak using Jason,”
West Sussex: Wiley, 2007.
[3] J. E. Laird, A. Newell and S. Rosenbloom, “SOAR: An Architecture for General Intelligence,” Carnegie-Mellon
University Technical Report AIP-9, 1987.
[4] J. E. Laird, “The Soar Cognitive Architecture,” MIT Press, ISBN 978-0-262-12296-2, 2012.
[5] J. R. Anderson, “How can the human mind occur in the physical universe?,” New York, NY: Oxford University
Press. ISBN 0-19-532425-0, 2007.
[6] M. E. Bratman, “Intention, plans, and practical reason,” Cambridge, MA: Harvard University Press, 1987.
[7] M. E. Bratman, D. J. Israel and M. E. Pollack, “Plans and resource-bounded practical reasoning,” Computational
Intelligence 4, pp. 349-355, 1988.
[8] S. Rao and M. Georgeff, “BDI agents: From theory to practice,” In: L. Gasser and V. Lesser, eds. Proceedings of
the First International Conference on Multi-Agent Systems - ICMAS 95, San Francisco, USA, 1995, pp. 312-319.
[9] S. Rao and M. P. Georgeff, “Modeling rational agents within a BDI-architecture,” In: J. Allen, R. Fikes and E.
Sandewall, eds., Proceedings of the Second International Conference on Principles of Knowledge Representation
and Reasoning. Morgan Kaufmann Publishers, San Mateo, CA, 1991.
[10] M. Wooldridge (2001), “Reasoning about rational agents,” Robotica, 4: 459-462.
[11] S. Rao and M. Georgeff, “An abstract architecture for rational agents,” Morgan Kaufmann, eds., In Principles of
Knowledge Representation and Reasoning: Proceedings of the Third International Conference - KR 92, California,
USA, 1992, pp. 439-449.
[12] S. Lee, Y. J. Son and J. Jin, “An integrated human decision making model for evacuation scenarios under a BDI
framework, “ ACM Transactions on Modeling and Computer Simulation, 2010. 20(4):1-24.
[13] G. Aucher, “A combined system for update logic and belief revision,” In: Intelligent Agents and Multi-Agent
Systems, Intelligent Agents and Multi-Agent Systems, 2006. 3371(132):1-18.
[14] S. Shapiro, M. Pagnucco, Y. Lesperance, et al. “Iterated belief change in the situation calculus,” Artificial
Intelligence, 2011. 175(1):165-192.
[15] S. Sardina, L. Padgham, “A BDI agent programming language with failure handling, declarative goals, and
planning,” Autonomous Agents and Multi-Agent Systems, 2011. 23(1):18-70.
[16] Casalia, L. Godob and C. Sierra, “A graded BDI agent model to represent and reason about preferences,” Artificial
Intelligence, 2011. 175(7-8): 1468-1478.
[17] M. Kacprzak and W. Kosinski, “Modelling fuzzy beliefs of agents, “ Zeszyty Naukowe Politechniki Biatostockiej,
2012. 9: 45-60.
[18] X. Wu and J. Zhang, “Rough set models based on random fuzzy sets and belief function of fuzzy sets,”
International Journal of General Systems, 2012. 41(2): 123-141.
9. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (27-35), Month: October 2014 – March 2015, Available at: www.paperpublications.org
Page | 35
Paper Publications
[19] X. Jing and X. Luo, “A fuzzy dynamic belief logic, “ In: Nguyen N T, eds. ICAART 2013 - International
Conference on Agents and Artificial Intelligence, Barcelona, Spain, 2013, pp. 289-294.
[20] S. Rao, “AgentSpeak(L): BDI agents speak out in a logical computable language,” In: Van de Velde W, Perram J
W, eds. Springer-Verlag New York, Inc.,Secaucus, NJ, USA, Proceedings of the 7th European workshop on
Modelling autonomous agents in a multi-agent world: agents breaking away: agents breaking away, Einhoven, The
Netherlands. 1996, pp. 42-55.
[21] M. Castanon-Puga, J. Castro, J. Flores-Parra, “JT2FIS a java type-2 fuzzy inference systems class library for
building object-oriented intelligent applications,” In: L. N. in Computer Science (Ed.), Advances in Soft
Computing and Its Applications, 2013, pp. 204-215.