Mobile agents have emerged as a very promising approach for eWork and eBussiness. We have developed an extensive mobile agent infrastructure that supports diverse applications in these fields. Our infrastructure is built around two basic components: a mobile-agent based framework for distributed database access and the PaCMAn (Parallel Computing with Java Mobile Agents) metacomputer. The major functionality of our database framework includes (a) the ability to dynamically create personalized views for the mobile client, (b) dynamic creation and configuration of Web-based warehouses and (c) dynamic support of mobile transactions. PaCMAn offers the necessary tools for Web-based distributed High Performance Computing (HPC) and distributed data mining. Our infrastructure provides the basis for developing eWork applications in many fields. We have utilized it for applications, both wireless and wireline, such as: Electronic commerce, Health Telematics, Teleworking, Distributed Data-mining and Web-based supercomputing.
Service Oriented Software Engineering: Services as reusable components, Service Engineering, Software Development with Services. Service-oriented architectures, RESTful services
With the increasing usage of smartphones and other devices, digitization of banking sector is expected to catch up the increasing expectations of the customer. Banks have a significant role in our lives. Every one of us will execute at least a single financial transaction in a day. Hence, it becomes necessary for banks to enrich customer experience. Digitization becomes mandate feature for banks since it is being adopted in all industries in day to day life. Banks love mainframes because only mainframes can provide a single, unified, efficient solution to a host of different problems. Most of the banks uses Mainframe because of it robust, reliable and secured processing power. It also supports the new technologies like mobile, cloud etc., A business case is presented in this paper to explain Micro service and API framework for existing legacy system. Existing architecture is tightly coupled services with less standardization and fair performance. The aim of this paper is to provide solutions to convert the existing architecture to flexible service to support business for time-to-market, increase in performance and operational efficiency and improve customer experience.
Finite State Machine Based Evaluation Model For Web Service Reliability Analysisdannyijwest
Today’s world economy demands that both market access and customer service be available anytime and
anywhere. The Web is the only way to supply global economic needs and, due to expand the development of
comprehensive web service, it does so relatively inexpensively. The ability of web service is to provide a
relatively inexpensive way to deploy customer services. As days goes on the business logic of a system
emerges out at a great extent where it has to react to several different competitors under different
situations. Through means of a business logic system we can able to achieve faster communication of
information, rampant change and increasing business complexity
Service Oriented Software Engineering: Services as reusable components, Service Engineering, Software Development with Services. Service-oriented architectures, RESTful services
With the increasing usage of smartphones and other devices, digitization of banking sector is expected to catch up the increasing expectations of the customer. Banks have a significant role in our lives. Every one of us will execute at least a single financial transaction in a day. Hence, it becomes necessary for banks to enrich customer experience. Digitization becomes mandate feature for banks since it is being adopted in all industries in day to day life. Banks love mainframes because only mainframes can provide a single, unified, efficient solution to a host of different problems. Most of the banks uses Mainframe because of it robust, reliable and secured processing power. It also supports the new technologies like mobile, cloud etc., A business case is presented in this paper to explain Micro service and API framework for existing legacy system. Existing architecture is tightly coupled services with less standardization and fair performance. The aim of this paper is to provide solutions to convert the existing architecture to flexible service to support business for time-to-market, increase in performance and operational efficiency and improve customer experience.
Finite State Machine Based Evaluation Model For Web Service Reliability Analysisdannyijwest
Today’s world economy demands that both market access and customer service be available anytime and
anywhere. The Web is the only way to supply global economic needs and, due to expand the development of
comprehensive web service, it does so relatively inexpensively. The ability of web service is to provide a
relatively inexpensive way to deploy customer services. As days goes on the business logic of a system
emerges out at a great extent where it has to react to several different competitors under different
situations. Through means of a business logic system we can able to achieve faster communication of
information, rampant change and increasing business complexity
Overview of how Juniper is changing the landscape of software development by exposing APIs to use network data in applications. Included is overview of APIs we offer, Big Data information, and more.
Enhancement in Web Service ArchitectureIJERA Editor
Web services provide a standard means of interoperating between different software applications, running on a
variety of platforms and/or frameworks. Web services are increasingly used to integrate and build business
application on the internet. Failure of web services is not acceptable in many situations such as online banking,
so fault tolerance is a key challenge of web services. This paper elaborates the concept of web service
architecture and its enhancement. Traditional web service architecture lacks facilities to support fault tolerance.
To better cope with the fundamental issues of the traditional client-server based web service architecture, peer to
peer web service architecture have been introduced. The purpose of this paper is to elaborate the architecture,
construction methods and steps of web services and possible weaknesses in scalability and fault tolerance in
traditional client server architecture and a solution for that, peer to peer web service technology has evolved.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Cloud computing is a sort of dispersed registering over the web i.e. it can run a venture or
application on more than one PC meanwhile. It is isolated into three classes to be specific: (i) IaaS (ii)
PaaS and (iii) SaaS Software as a service is a sort of administration which gives numerous advantages to
the administration shoppers. A tweaked quality model is important to assess the nature of SaaS cloud
services. The paper perceives the segments of SaaS. The ordinary model does not consider components
of SaaS like security and nature of organization. Along these lines, in this paper, we come out with
another model for the security, nature of services, and programming quality for programming as an
administration. Also the results are used as recognizing verification for the SaaS quality organization.
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...acijjournal
This paper proposes a Dynamic resource allocation method for Cloud computing. Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Users can set up
and boot the required resources and they have to pay only for the required resources. Thus, in the future providing a mechanism for efficient resource management and assignment will be an important objective of Cloud computing. In this project we propose a method, dynamic scheduling and consolidation mechanism that allocate resources based on the load of Virtual Machines (VMs) on Infrastructure as a service (IaaS). This method enables users to dynamically add and/or delete one or more instances on the basis of the load and the conditions specified by the user. Our objective is to develop an effective load balancing algorithm using Virtual Machine Monitoring to
maximize or minimize different performance parameters(throughput for example) for the Clouds of
different sizes (virtual topology de-pending on the application requirement).
Overview of how Juniper is changing the landscape of software development by exposing APIs to use network data in applications. Included is overview of APIs we offer, Big Data information, and more.
Enhancement in Web Service ArchitectureIJERA Editor
Web services provide a standard means of interoperating between different software applications, running on a
variety of platforms and/or frameworks. Web services are increasingly used to integrate and build business
application on the internet. Failure of web services is not acceptable in many situations such as online banking,
so fault tolerance is a key challenge of web services. This paper elaborates the concept of web service
architecture and its enhancement. Traditional web service architecture lacks facilities to support fault tolerance.
To better cope with the fundamental issues of the traditional client-server based web service architecture, peer to
peer web service architecture have been introduced. The purpose of this paper is to elaborate the architecture,
construction methods and steps of web services and possible weaknesses in scalability and fault tolerance in
traditional client server architecture and a solution for that, peer to peer web service technology has evolved.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Cloud computing is a sort of dispersed registering over the web i.e. it can run a venture or
application on more than one PC meanwhile. It is isolated into three classes to be specific: (i) IaaS (ii)
PaaS and (iii) SaaS Software as a service is a sort of administration which gives numerous advantages to
the administration shoppers. A tweaked quality model is important to assess the nature of SaaS cloud
services. The paper perceives the segments of SaaS. The ordinary model does not consider components
of SaaS like security and nature of organization. Along these lines, in this paper, we come out with
another model for the security, nature of services, and programming quality for programming as an
administration. Also the results are used as recognizing verification for the SaaS quality organization.
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...acijjournal
This paper proposes a Dynamic resource allocation method for Cloud computing. Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Users can set up
and boot the required resources and they have to pay only for the required resources. Thus, in the future providing a mechanism for efficient resource management and assignment will be an important objective of Cloud computing. In this project we propose a method, dynamic scheduling and consolidation mechanism that allocate resources based on the load of Virtual Machines (VMs) on Infrastructure as a service (IaaS). This method enables users to dynamically add and/or delete one or more instances on the basis of the load and the conditions specified by the user. Our objective is to develop an effective load balancing algorithm using Virtual Machine Monitoring to
maximize or minimize different performance parameters(throughput for example) for the Clouds of
different sizes (virtual topology de-pending on the application requirement).
Web Application Architecture: A Comprehensive Guide for Success in 2023stevefary
Delve into the world of web app architecture - from components to best practices. Uncover the secrets of successful design and implementation. Explore now!
A Comprehensive Guide to Web Application Architecturestevefary
Discover the intricate world of Web Application Architecture. From Monolithic to Microservices and Serverless, explore the core components, best practices, and the importance of choosing the right architecture. Learn it all in this comprehensive guide and optimize your digital experience.
Fast Synchronization In IVR Using REST API For HTML5 And AJAXIJERA Editor
Need a web service is just a web page meant for a computer to request and process. IVR system uses REST API for data access while calling. When in call process user want to access data, server need to validate it and while validation data accessing must be synchronize with mysql server. For large data accessing API is essential. This method is for HTML5 and AJAX for fast data synchronization. REST can support any media type, but XML is expected to be the most popular transport for structured information. In IVR System problems with fast data access because before uses HTML4. Proposed work is for HTML5 with AJAX implementation.
People frequently use the terms IaaS, PaaS, FaaS, and SaaS interchangeably when discussing cloud computing service because all of these technologies operate behind the cloud.
An Algorithm to synchronize the local database with cloud DatabaseAM Publications
Since the cloud computing [1] platform is widely accepted by the industry, variety of applications are designed targeting to a cloud platform. Database as a Service (DaaS) is one of the powerful platform of cloud computing. There are many research issues in DaaS platform and one among them is the data synchronization issue. There are many approaches suggested in the literature to synchronise a local database by being in cloud environment. Unfortunately, very few work only available in the literature to synchronise a cloud database by being in the local database. The aim of this paper is to provide an algorithm to solve the problem of data synchronization from local database to cloud database.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
Similar to An Infrastructure Based on a Mobile-Agent for Applications of Ebussiness & Ework (20)
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
The increasing demand for natural river sand supply for the use in construction industry along
with the issue of environmental problem posed by the dumping of cockle shell, a by-product from cockle
business have initiated research towards producing a more environmental friendly concrete. This research
explores the potential use of cockle shell as partial sand replacement in concrete production. Cockle shell used
in this experimental work were crushed to smaller size almost similar to sand before mixed in concrete. A total
of six concrete mixtures were prepared with varying the percentages of cockle shell viz. 0%, 5%, 10%, 15%,
20% and 25%. All the specimens were subjected to continuous water curing. The compressive strength test was
conducted at 28 days in accordance to BS EN 12390. Finding shows that integration of suitable content of
crushed cockle shell of 10% as partial sand replacement able to enhance the compressive strength of concrete.
Adopting crushed cockle shell as partial sand replacement in concrete would reduce natural river sand
consumption as well as reducing the amount of cockle shell disposed as waste.
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
The vertical (trans-placental) transmission of the parasite Plasmodium falciparum from
pregnant mother to fetus during gestational period was investigated in a clinical research involving 43 full term
pregnant women in selected Hospitals in Jimeta Yola, Adamawa State Nigeria. During the observational study,
parasitemia was determined by light microscopic examination of umbilical and maternal peripheral blood film
for the presence of the trophozoites of Plasmodium falciparum. Correlational analysis was then carried on the
result obtained at p<0.05.><0.05) was established between maternal peripheral blood and umbilical cord
blood parasitemia with Pearson’s correlation coefficient of 0.762. Thus, in a malaria endemic area like Yola,
Adamawa State, Nigeria, with a stable transmission of parasite, there is a high probability of vertical
transmission of Plasmodium falciparum parasite from mother to fetus during gestation that can be followed by
the presentation of the symptoms of malaria by the newborn and other malaria related complications. Families
are advised to consistently sleep under appropriately treated insecticide mosquito net to avoid mosquito bite and
subsequent infestation.
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
Heart rate variability (HRV) is a measure of the balance between sympathetic mediators of heart
rate that is the effect of epinephrine and norepinephrine released from sympathetic nerve fibres acting on the
sino-atrial and atrio-ventricular nodes which increase the rate of cardiac contraction and facilitate conduction at
the atrio-ventricular node and parasympathetic mediators of heart rate that is the influence of acetylcholine
released by the parasympathetic nerve fibres acting on the sino-atrial and atrio-ventricular nodes leading to a
decrease in the heart rate and a slowing of conduction at the atrio-ventricular node. Sympathetic mediators
appear to exert their influence over longer time periods and are reflected in the low frequency power(LFP) of
the HRV spectrum (between 0.04Hz and 0.15 Hz).Vagal mediators exert their influence more quickly on the
heart and principally affect the high frequency power (HFP) of the HRV spectrum (between 0.15Hz and 0.4
Hz). Thus at any point in time the LFP:HFP ratio is a proxy for the sympatho- vagal balance. Thus HRV is a
valuable tool to investigate the sympathetic and parasympathetic function of the autonomic nervous system.
Study of HRV enhance our understanding of physiological phenomenon, the actions of medications and disease
mechanisms but large scale prospective studies are needed to determine the sensitivity, specificity and predictive
values of heart rate variability regarding death or morbidity in cardiac and non-cardiac patients. This paper
presents the linear and nonlinear to analysis the HRV.
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
A two-phase model is proposed for describing the dynamics of a fluidized bed reactor used for
polypropylene production. In the proposed model, the fluidized bed is divided into an emulsion and bubble
phase where the flow of gas is considered to be plug flow through the bubbles and perfectly mixed through the
emulsion phase. Similar previous models, consider the reaction in the emulsion phase only. In this work the
contribution of reaction in the bubble phase is considered and its effect on the overall polypropylene production
is investigated the kinetic model is combined with hydrodynamic model in order to develop a comprehensive
model for gas-phase propylene copolymerization reactor. Simulation profiles of the proposed model were
compared with those of well mixed model for the emulsion phase temperature. The simulated temperature
profile showed a lower rate of change compared to the previously reported models due to lower polymerization
rate. Model simulation showed that about 13% of the produced polymer comes from the bubble phase and this
considerable amount of polymerization in the bubbles should not be neglected in any modeling attempt.
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
Sudanese crude oil is regarded as one of the sweet types of crude in the world, Sulphur containing
compounds are un desirable in petroleum because they de activate the catalyst during the refining processes and
are the main source of acid rains and environmental pollution.(Mark Cullen 2001),Since it contains considerable
amount of salts and acids, it negatively impact the production facilities and transportation lines with corrosive
materials. However it suffers other problems in flow properties represented by the high viscosity and high
percentage of wax. Samples were collected after the initial and final treatment at CPF, and tested for
physical and chemical properties.wax content is in the range 23-31 weight % while asphalting content is about
0.1 weight% . Resin content is 13-7 weight % and deposits are 0.01 weight%. The carbon number distribution in
the crude is in the range 7-35 carbon atoms. The pour point vary between 39°C-42°C and the boiling point is in
the range 70 °C - 533 °C.
A Short Report on Different Wavelets and Their StructuresIJRES Journal
This article consists of basics of wavelet analysis required for understanding of and use of wavelet
theory. In this article we briefly discuss about HAAR wavelet transform their space and structures.
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
Recently, Mobile Cloud Computing reveals many modern development areas in the Information
Technology industry. Several software engineering frameworks and methodologies have been developed to
provide solutions for deploying cloud computing resources on mobile application development. Agile
methodology is one of the most commonly used methodologies in the field. This paper presents the MCCAS a
Web and Mobile application that provide feature for the Palestinian higher education/academic institutions. An
Agile methodology was used in the development of the MCCAS but in parallel with emphasis on Cloud
computing resources deployment. Also many related issues is discussed such as how software engineering
modern methodologies (advances) influenced the development process.
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
Firstly, the kinetic equation of spatial cylindrical cam with flexible rod has been established. Then, an
accurate cylindrical cam mechanism model has been established based on the spatial modeling software
Solidworks. The dynamic effect of flexible rod on mechanical system was studied in detail based on the
mechanical system dynamics analytical software Adams, and Archard wear model is used to predict the wear of
the cam. We used Ansys to create finite element model of the cam link, extracted the first five order mode to
export into Adams. The simulation results show that the dynamic characteristics of spatial cylindrical cam
mechanical system with flexible rod is closed to ideal mechanism. During the cam rotate one cycle, the collision
in the linkage with a clearance occurs in some special location, others still keep a continuous contact, and the
prediction of wear loss is smaller than rigid body.
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the internet.
According to a self-service,on-demand and pay as you use business model,the customers will obtain the cloud
resources and services.It is a virtual shared service.Cloud Computing has three basic abstraction layers System
layer(Virtual Machine abstraction of a server),Platform layer(A virtualized operating system, database and
webserver of a server and Application layer(It includes Web Applications).Denial of Service attack is an attempt
to make a machine or network resource unavailable to the intended user. In DOS a user or organization is
deprived of the services of a resource they would normally expect to have.A Successful DOS attack is a highly
noticeable event impacting the entire online user base.DOS attack is found by First Mathematical Metrical
Method (Rate Controlling,Timing Window,Worst Case and Pattern Matching)DOS attack not only affect the
Quality of the service and also affect the performance of the server. DDOS attacks are launched from Botnet-A
large Cluster of Connected device(cellphone,pc or router) infected with malware that allow remote control by an
attacker. Intruder using SIPDAS in DDOS to perform attack.SIPDAS attack strategies are detected using Heap
Space Monitoring Algorithm.
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
Aiming at the poor dynamic performance and low navigation precision of traditional fading
Kalman filter in BDS dynamic positioning, an improved fading Kalman filter based on fading factor vector is
proposed. The fading factor is extended to a fading factor vector, and each element of the vector corresponds to
each state component. Based on the difference between the actual observed quantity and the predicted one, the
value of the vector is changed automatically. The memory length of different channel is changed in real time
according to the dynamic property of the corresponding state component. The actual observation data of BDS is
used to test the algorithm. The experimental results show that compared with the traditional fading Kalman filter
and the method of the third references, the positioning precision of the algorithm is improved by 46.3% and
23.6% respectively.
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
Positioning error is a widely problem exists in mechanism, the important factors affecting machining
precision. In order to reduce the error caused by positioning problem processing, based on the differential
workbench as the research object, using the method of theoretical analysis and experimental verification, the
analysis of positioning error mechanism and source of complete differential precision workbench error
compensation, improve the accuracy of the device, provides a method for the application of modern machine
tools. table.
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
The Mithi River runs through the heart of suburban Mumbai. Its path of flow has been severely
damaged due to industrialization and urbanization. The quality of water has been deteriorating ever since. The
Municipal and industrial effluents are discharged in unchecked amounts. The municipal discharge comprises
untreated domestic and sewage wastes whereas the industries are majorly discharge chemicals and other toxic
effluents which are responsible in increasing the metal load of the river. In the current study, the water is
analysed for heavy metals- Copper, Cadmium, Chromium, Lead and Nickel. It also includes a brief
understanding on the fluctuations that have occurred in the heavy metal pollution, through the compilation of
studies carried out in the area previously.
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
In order to analyze the temperature distribution of the low-temperature radiant floor heating system
that uses the condensing wall-hung boiler as the heat source, the heating system is designed according to a typical
house facing south in Shanghai. The experiments are carried out to study the effects of the supply water
temperature on the thermal comfort of the system. Eventually, the supply water temperature that makes people in
the room feel more comfortable is obtained. The result shows that in the condition of that the outside temperature
is 8~15℃ and the relative humidity is 30~70%RH, the temperature distribution in the room is from high to low
when the height is from bottom to top. The floor surface temperature is highest, but its uniformity is very poor.
When the heating system reaches the steady state, the air temperature of the room is uniform. When the supply
water temperature is 63℃ The room is relatively comfortable at the above experimental condition.
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
In the process of oil and gas exploitation of mudstone-fractured reservoir in Daqing oilfield, the
permeability of fracture is easily affected by the influence of stress change, which is shown by the sensitivity of
the permeability to the stress. With the extension of time mining in the fractured mudstone reservoir, fracture
stress sensitivity is obvious in vast decline of production and great influence on reduced yields. In order to
reasonably determine the way of developing method, working system and the exploitation rate of the reservoir,
correspondingly protecting reservoir productivity, improve ultimate recovery. On the basis of the previous
research on the stress sensitivity of fractured mudstone, this essay studied the critical closing pressure of the
simulated underground fractured mudstone under the laboratory condition.
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
With the classic signal analysis and processing method, the cutting of the audio signal in time
domain and frequency domain analysis. We reached the following conclusions: in the time domain analysis,
cutting audio signals mean and the variance associated with tool wear state change occurred did not change
significantly, and tool wear is not high degree of correlation, and the mean-square value of the audio signal
changes in the size and tool wear the state has a good relationship.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
Rice stem borer is one of the important pests that attack plants so as to reduce production. One way
to control pests is to use organic fertilizers that make the plant stronger and healthier. This study was conducted
to determine the effects of organic fertilizers with various doses without the use of pesticides in controlling stem
borer, Scirpophaga incertulas. Methods using split-split plot design which consists of two levels of the whole
plot factor (solid and liquid organic fertilizers), two levels of the subplot factor (conventional and industry,
Tiens and Mitraflora), and four levels of the sub-subplot factor of conventional and industry (5, 10, 15, 20
tonnes/ha), and one level of the sub-subplot factor of Tiens and Mitraflora (each 2 ml/l). Based on the results
Statistical analysis there were no significant differences among treatments and this shows that the use of organic
fertilizers that only a dose of 5 tonnes/ha is sufficient available nutrients that make plants more robust and
resistant to control stem borer, besides that can reduce production costs and friendly to the environment when
compared with using inorganic fertilizers.
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
A novel high-precision curvature-compensated bandgap reference (BGR) without using op-amp
is presented in this paper. It is based on second-order curvature correction principle, which is a weighted sum of
two voltage curves which have opposite curvature characteristic. One voltage curve is achieved by first-order
curvature-compensated bandgap reference (FCBGR) without using op-amp and the other found by using W
function is achieved by utilizing a positive temperature coefficient (TC) exponential current and a linear
negative TC current to flow a linear resistor. The exponential current is gained by using anegative TC voltage to
control a MOSFET in sub-threshold region. In the temperature ranging from -40℃ to 125℃, experimental
results implemented with SMIC 0.18μm CMOS process demonstrate that the presented BGR can achieve a TC
as low as 2.2 ppm/℃ and power-supply rejection ratio(PSRR)is -69 dB without any filtering capacitor at 2.0 V.
While the range of the supply voltage is from 1.7 to 3.0 V, the output voltage line regulation is about1 mV/ V
and the maximum TC is 3.4 ppm/℃.
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
In this work we reported the carbon dioxide adsorption (CO2) in six different nanostructures in order
to investigate the capturing capacity of the materials at nanoscale. Here we have considered the three different
nanotubes including zinc oxide nanotube (ZnONT), silicon carbide nanotube (SiCNT) and single walled carbon
nanotube (SWCNT). Three different chiralities such as zigzag (9,0), armchair (5,5) and chiral (6,4) having
approximately same diameter are analyzed. The adsorption binding energy values under various cases are
estimated with density functional theory (DFT). We observed CO2 molecule chemisorbed on ZnONT and
SiCNT’s whereas the physisorption is predominant in CNT. To investigate the structural aspect, the tubes with
defects are studied and compared with defect free tubes. We have also analyzed the electrical properties of tubes
from HOMO, LUMO energies. Our results reveal the defected structure enhance the CO2 capture and is
predicted to be a potential candidate for environmental applications.
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
In this paper, the brake driving intention identification parameters based on the fuzzy control are
summarized and analyzed, the necessary parameters based on the fuzzy control of the brake driving intention
recognition are found out, and I pointed out the commonly corrupt parameters, and through the relevant
parameters , I establish the corresponding driving intention model.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
An Infrastructure Based on a Mobile-Agent for Applications of Ebussiness & Ework
1. International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 5 ǁ May. 2014 ǁ PP.63-67
www.ijres.org 63 | Page
An Infrastructure Based on a Mobile-Agent for Applications of
Ebussiness & Ework
Asst.Prof. Dipayan Kumar Ghosh, Namita Ghosh
Assistant Professor in Computer Science & Engineering ( CSE ) Depratment Calcutta Institute of Technology(
CIT ) Uluberia , Howrah – 711316 , West Bengal , India .
MCA, Haldia Institute of Technology( HIT ) Midnapore , West Bengal , India.
Abstract: Mobile agents have emerged as a very promising approach for eWork and eBussiness. We have
developed an extensive mobile agent infrastructure that supports diverse applications in these fields. Our
infrastructure is built around two basic components: a mobile-agent based framework for distributed database
access and the PaCMAn (Parallel Computing with Java Mobile Agents) metacomputer. The major functionality
of our database framework includes (a) the ability to dynamically create personalized views for the mobile
client, (b) dynamic creation and configuration of Web-based warehouses and (c) dynamic support of mobile
transactions. PaCMAn offers the necessary tools for Web-based distributed High Performance Computing
(HPC) and distributed data mining. Our infrastructure provides the basis for developing eWork applications in
many fields. We have utilized it for applications, both wireless and wireline, such as: Electronic commerce,
Health Telematics, Teleworking, Distributed Data-mining and Web-based supercomputing.
I. Introduction
Currently we are experiencing tremendous growth in the use of the Internet and the Web. At the same
time, we are in the mist of an explosive growth in the use of wireless communications. These two technologies
are transforming the way business is contacted. Over the past few years, we have been developing a mobile
agent infrastructure that supports business functions on both the Internet and the wireless communication
environment. Our infrastructure is built around two basic components: a mobile-agent based framework for
distributed database access and the PaCMAn (Parallel Computing with Java Mobile Agents) metacomputer.
Our database framework is based on an extended client/server model and the deployment of mobile
agents and provides a new framework for Web-based distributed access to database systems, a fundamental
need for eCommerce and virtual enterprises. We have developed a library of database-enabled mobile agents
able to support a variety of database functions including: (i) Web database access, (ii) personalized views of
databases (iii) a dynamic warehouse infrastructure, and (iv) distributed transactional support.
The PaCMAn (Parallel Computing with Mobile Agents) metacomputer launches multiple Java-mobile
agents that communicate and cooperate to solve problems in parallel. Each mobile agent can travel anywhere in
the Web to perform its tasks. A number of brokers/load forecasters keep track of the available resources and
provide load forecast to the clients. The clients select which servers to use based on the specific resource
requirements and the load forecast. We have utilized PaCMAn to harness the, otherwise idle, resources of the
Web. PaCMAn provides the basis for Web-based distributed High Performance Computing (HPC) and
distributed data mining. We have developed a PaCMAn based Association Rule Mining (ARP) application for
Market based analysis and utilized this application to develop association rules for points of sales data from
geographically distributed stores.
The remainder of this paper is structured as follows. In Section 2, we present our database framework
and in Section 3 the PaCMAn metacomputer along with their deployment in various electronic commerce
applications. Section 4 concludes the paper.
II. Mobile Agents for Distributed Information Retrieval
2.1 Mobile Agents for Web Database Access: The DBMS-Agent
Web-based access to databases is an integral part of e-commerce systems and applications. The real
challenge is the formation of smart, lightweight, flexible, independent and portable Java DBMS client programs
that will support database connectivity over the Internet. The currently proposed methodologies [4] overload the
client and offer limited flexibility and scalability. Our approach is based on using mobile agents [1, 8], between
the client program and the server machine, to provide database connectivity, processing and communication,
and consequently eliminate the overheads of the existing methodologies. Our database framework is comprised
of a set of such Java based agents that cooperate to efficiently support Web database connectivity. The main
agent, called DBMS-agent, acquires its database capabilities dynamically not at the client but at the server. The
other agents of the framework assist this dynamic acquisition.
2. An Infrastructure based on a Mobile-Agent for Applications of eBussiness & eWork
www.ijres.org 64 | Page
In particular, in most current approaches to Web database connectivity, an applet at the client machine
downloads from the remote SQL server and initiates a JDBC driver, and then handles a complex set of JDBC
interfaces. Instead, our proposed DBMS-applet creates and fires a mobile agent (or agents if necessary) that
travels directly to the remote SQL server. At the SQL server, the mobile agent initiates a local JDBC driver,
connects to the database and performs any queries specified by the sending client. When the mobile agent
completes its task at the SQL server, it dispatches itself back to the client machine directly into the DBMS-
applet from where it was initially created and fired. Since our mobile agents possess database capabilities, they
are called DBMS-agents. The DBMS-agent is independent of the various JDBC driver implementations. The
DBMS mobile agent can not (and is not supposed to) be aware of which JDBC driver to load when it arrives at
an SQL server. Upon arrival at the SQL server's context, the DBMS-agent is informed of all available JDBC
drivers and corresponding data sources. The DBMS-agent is then capable of attaching itself to one or more of
these vendor data sources.
Our framework promotes a much more efficient way of utilizing the JDBC API and the JDBC driver
API and eliminates the overheads of the various conventional approaches. It supports lightweight, portable and
autonomous clients as well as operation on slow or expensive networks. The implementation of the framework
shows [3] that its performance is comparable to, and in many cases outperforms, the performance of current
approaches. In fact, in wireless and dial-up environments and for average size transactions, a client/agent/server
adaptation of the framework provides a performance improvement of approximately a factor of ten. For the
fixed network, the gains are about 40% and 30% respectively. These performance results were gained while
using the Aglets Workbench [5] for the implementation of mobile agents. Since the Aglets Workbench is more
tuned towards functionality than performance, we expect our framework to perform even better. This
assumption is substantiated by early experiments conducted by other mobile agent technologies (i.e., Voyager,
Concordia and Grasshopper) as our implementation platforms.
Furthermore, this new form of Web-based database access supported by the ''DBMS-Agent
Framework'' is [3]: (a) flexible: it can be set up dynamically and efficiently, (b) scalable: its extension to support
multidatabase systems not only maintained but also increased its performance benefits, and (c) robust: the
statistical analysis performed found the DBMS-agent framework more stable than the current JDBC-based
database connectivity. The framework is generic and portable and can be used not only within the Web but
stand-alone as well for direct Java database connectivity.
2.2 Dynamic Mobile Agents and Task Handlers
E-commerce system and virtual enterprises are very dynamic by nature. It is also often needed to
maintain this infrastructure for a long duration of time but with different responsibilities assigned to the various
participants. Participants may switch roles; for example, a site might be a buyer in one transaction, a seller in
another and a mediator in a third. This requires a more dynamic and flexible framework. In our framework, we
generalize the notion of mobile agent by separating the mobile shell from the specific task code of the target
application [6]. We achieve this with the introduction of TaskHandlers, which are Java objects capable of
performing the various tasks. TaskHandlers are dynamically assigned to our agents. Each agent can carry with it
any number of TaskHandlers and it can dynamically choose when and where to use them.
A TaskHandler Library is a collection of Java objects that are serializable, and thus can travel along
with our mobile agents. The TaskHandler is an object that is in the disposal of an agent to use when it needs to
perform a specific computational task. For example, when the need arise for a database query, the agent can
utilize the DBMS-TaskHandler. The TaskHandlers can be used to dynamically change the role of an agent.
2.3 Views for Wireless and Mobile Clients: Mobile Agents as View Holders
Large-scale Internet queries applied directly to the source databases are often quite expensive. Such
queries are even more expensive for wireless clients due to the severe limitations of the wireless links that are in
general characterized by high communication costs, limited bandwidth and high latency [7]. The efficient
creation and materialization of personalized views provides an attractive alternative. To this end, we have
proposed a Dynamic View Framework, DVF, that allows the automatic definition, creation and maintenance of
such materialized views.
DVF’s multitier architecture is based on mobile agents [10] and is built upon the DBMS-agent
Framework. Through DVF, wireless clients identify Web databases of interest, access their metadata, set up
dynamically via mobile agents the necessary view infrastructure and create personalized views encapsulated in
mobile agents [11] (i.e., the View-agent). The system allows these views to be shared by other mobile clients.
DVF also supports view maintenance in the case of updates at the sources. View maintenance can be
achieved in various ways [9]. The proposed infrastructure, via the notion of Task-Handlers, can be dynamically
adapted to serve any existing approach. Each agent can carry with it various materialization protocols, as
TaskHandlers, and it can dynamically choose (or be directed to) when and where to use them.
3. An Infrastructure based on a Mobile-Agent for Applications of eBussiness & eWork
www.ijres.org 65 | Page
DVF brings data close to the clients thus eliminating the overhead of transmitting data over slow
networks. In addition, it allows the sharing of views among the clients of the system. Accessing remote views
and databases is done both synchronously and asynchronously [2]. With asynchronous communication, clients
can pose their query, disconnect and connect later to receive the results. Analogously, busy servers can
postpone processing of selected submitted queries. Furthermore, the implementation of the framework through
mobile agents allows dynamic code deployment and relocation of views [10, 3].
2.4 Dynamic Warehouse Infrastructure: Mobile Agents as Warehouse Holders
A natural extension of the Dynamic View Framework, (DVF) is the Dynamic Warehouse Framework
(DWF). A warehouse can be considered as a collection of materialized views over one or more operational
databases. However, this entails many new issues and challenges. New types of mobile agents to deal with these
new issues are required. The most vital one is the Warehouse_Agent that dynamically provides the
functionality of a warehouse. From an object oriented perspective one might view the Warehouse_Agent as an
extension of the View-Agent of the DVF framework.
The current DWF’s implementation gives the ability to its user to create data warehouses over
distributed databases, which are query and update independent [12]. Query independence means that every
query Q that can be posed to the base relations can be answered in terms of executing a corresponding query Q´
over the warehouse. Update independence means that no queries over base relations are required in order to
keep the warehouse data consistent with the base data.
The infrastructure, however, is built in such away that allows the dynamic deployment of any type of
data maintenance in much the same way as in the DVF via the notion of Task-Handlers.
2.5 Transactional Mobile Agents
Providing distributed transactional support is crucial for emerging cooperative information systems
such as e-commerce, virtual enterprises and the new notion of migrating workflow. These systems operate in a
dynamic and distributed environment, dealing with large number of heterogeneous information sources with
evolving content and dynamic availability. One feature that distinguishes e-commerce and virtual enterprises is
that enterprises can form dynamic partnerships that exist only for as long as they are needed. The stormy,
however, explosion of the Internet and the Web found most of these sources unprepared to participate
cohesively in distributed cooperative transactions.
Mobile agents provide the ability to dynamically attach the needed transactional functionality to the
participating sources. A suite of mobile agents has been developed to support this dynamic transactional
infrastructure [13]. The most vital one is the TranMan_Agent that provides the functionality of a transaction
manager. This agent is sent to the resource that will join the virtual consortium to manage the various mobile
transactions. Since participation in the virtual team is decided dynamically by the current participants each one
of them can direct or clone its TranMan_Agent to the new site as needed.
The TranMan_Agent supports the presumed abort variation of the two-phase commit protocol and
timestamping for ensuring the isolation property of a transaction. Note that the transaction tree pertaining to an
Internet transaction is set up dynamically. The use of mobile agents can produce an optimized commit tree,
namely a flat tree.
III. PaCMAn Metacomputer
The PaCMAn (Parallel Computing with Mobile Agents) metacomputer launches multiple mobile
agents that cooperate and communicate to solve problems in parallel. Each agent supports the basic
communication and synchronization tasks of the classical parallel worker assuming the role of a process in a
parallel processing application. It consists of three major components:
Broker: It keeps track of the system configuration. All participating clients and servers and their
capabilities are registered with the broker. The broker also monitors the systems resources and performs
network traffic/load forecasting.
Server: It is a Java enabled computer (has installed the Java runtime environment) that runs the PaCMAn
daemon, in order to host incoming PaCMAn mobile agents.
Client: It is a Java enabled computer that runs the PaCMAn daemon in order to launch/host PaCMAn
mobile agents.
The main responsibility of the PaCMAn mobile agent is to create and coordinate other PaCMAn
mobile agents. The PaCMAn mobile agent can assume various roles in the PaCMAn framework the most
common are:
4. An Infrastructure based on a Mobile-Agent for Applications of eBussiness & eWork
www.ijres.org 66 | Page
Mobile-Worker (MW): This is the workhorse of the PaCMAn system. It performs all the necessary
computation, communication and synchronization tasks. The MW initializes and uses the appropriate
TaskHandler.
Mobile-Coordinator/Dispatcher(MCD): The MCD does not participate in the computation. Instead, it
performs task-specific coordination among the mobile-workers. This is done by dynamically assigning
tasks to the MWs through the use of TaskHandlers.
3.1 PaCMAn as a Model for Purchasing/Trading Computing Cycles
At any given time, there are a vast number of computers connected to the Internet that are idle. The
collective computational power of these computers dwarfs the computational power of all the world's high
performance computers put together. At any given time, a client can use all the servers that are registered as
available at that time. For example, companies can register their computer as available after workhours on
weekdays and for the entire weekends. Home computers on the other hand can register as available during work
hours. Of course, users have the ability to make their computer unavailable explicitly by turning off the
PaCMAn daemon or implicitly when the local load reaches a predetermined threshold. These are the resources
that PaCMAn is targeting. The topology of these loosely coupled resources changes very dynamically.
The PaCMAn model for using computer cycles from idle machines can be effectively used with
different business models. For example an accounting system can be setup that supports micro-payments so that
any client that uses the system resources will have to pay according to usage. Similarly the account of each
server used will be credited with the appropriate payment.
3.2 Data Mining with PaCMAn
Data mining algorithms have extremely large runtimes even for modest amount of data. The
proliferation of the Web and the globalization of business have given rise to huge amounts of data been
collected and stored in large-scale distributed data warehouses. Thus, the need for efficient data mining is ever
more important under the current conditions. The obvious solution is to employ parallel and distributed
processing techniques for data mining. In our approach, we go one step further and employ mobile agents that
travel to the data sources and communicate and coordinate among themselves to perform data mining. More
specifically, we utilize the PaCMAn metacomputer to extract association rules for points of sales data from
geographically distributed stores.
3.3 Query Multiple Database Systems
PaCMAn agents are launched to different hosts on the Web, cooperate and communicate with each
other to perform complicated tasks efficiently. Thus, PaCMAn agents can be used to query multiple databases
in parallel. There are various ways to use PaCMAn agents for querying multiple and possibly heterogeneous
database systems. The straightforward way is to create multiple Mobile-Workers (MWs) with
DBMS_TaskHandlers (these MW agents are in essence DBMS-agents), load each one of them with an SQL
query and dispatch them to the various destinations. The client is responsible for combining the results provided
by the various “DBMS-agents”.
A more efficient approach is for the client to create an MCD, to whom the responsibility is assigned of
creating the multiple “DBMS-agents” (aka MW), loading them with the queries and dispatching them to their
destination. The MCD is also responsible for receiving and manipulating the intermediate results provided by
the various “DBMS-agents”. Only the final result is reported to the client. This approach is in line with our
general objective of keeping the client light since the MCD does not necessarily reside at the client. Processing
can be done remotely with only the final result transmitted to the client.
IV. Conclusions
Two key technologies, the Internet/Web and mobile communications, are transforming the way we
contact business. Over the past few years, there is a tremendous effort in developing appropriate business
models and technologies that will utilize these new technologies for business. Most of the current approaches
work well with only one of the two. E-commerce systems and virtual enterprises have a very dynamic nature;
they often need to form dynamic partnerships that exist only for as long as they are needed. This is a crucial
requirement that the current approaches fail to effectively fulfill. Mobile agents provide an efficient platform for
distributed dynamic processing which works equally well with both the fixed and wireless networks.
We have developed a mobile agent infrastructure that supports many of the functionalities that are
needed for eWork and eCommerce. Our infrastructure provides support for distributed information retrieval:
database queries on single and multiple databases, personalized views, dynamic data warehousing and
transaction processing. PaCMAn is a Web-based metacomputer that supports collaborative processing.
PaCMAn can be utilized for eBussiness functions such as queries to multiple databases and distributed data
5. An Infrastructure based on a Mobile-Agent for Applications of eBussiness & eWork
www.ijres.org 67 | Page
mining. Furthermore, PaCMAn itself provides a model for trading idle computer cycles. Finally, our mobile
agent infrastructure is heavily dynamic thus effectively serving the dynamic nature of E-commerce systems and
virtual enterprises
References
[1] Colin G. Harrison, David M. Chessm, Aaron Kershenbaum. Mobile Agents: are they a good idea? Research Report, IBM
Research Division.
[2] Panos K. Chrysanthis, Sujata Banerjee, Shi-Kuo Chang, “Establishing Virtual Enterprises by means of Mobile Agents”, RIDE
Workshop, Sidney, March, 1999.
[3] S. Papastavrou, G. Samaras, and E. Pitoura, “Mobile Agents for WWW Distributed Database Access”, Proc. 15th International
Data Engineering Conference (IEEE-ICDE´99) (Best Paper Award), Sydney, Australia, March 1999.
[4] Roedy Greem. Article: Java Access to SQL Databases. Canadian Mind Products, 1997.
[5] Aglets Workbench, by IBM Japan Research Group. Web site: <http:/ aglets.trl.ibm.co.jp>.
[6] P. Evripidou, G. Samaras, E. Pitoura and C. Panayiotou, “PacMan: Parallel Computing Using Java Mobile Agents”, 13th
ACM
International Conference on Supercomputing (ICS), Workshop on “Java for High Performance Computing”, Rhodes, Greece,
June 1999.
[7] E. Pitoura and G. Samaras, "Data Management for Mobile Computing", Kluwer Academic Publishers, ISBN 0-7923-8053-3,
1998.
[8] Nick Roussopoulos: Materialized Views and Data Warehouses. KRDB 1997: 12.1-12.6
[9] Constantinos Spyrou, George Samaras, Evaggelia Pitoura, Evripidou Paraskevas “Mobile Agents for Wireless Computing: The
Convergence of Wireless Computational Models with Mobile-Agent Technologies”, Journal of ACM/Baltzer Mobile Networking
and Applications (MONET), special issue on “Mobility in Databases & Distributed Systems", 2000. (in print).
[10] Constantinos Spyrou. "A Library of Java Mobile Agents for Distributed Database Access." Undergraduate thesis supervised by
George Samaras, Computer Science Department, University of Cyprus, June 1999.
[11] D. Laurent, N. Spyratos, et.al, “Complements for Data Warehouses”, Proc. 15th International Data Engineering Conference
(IEEE-ICDE´99), Sydney, Australia, March 1999.
[12] Evgenios Charalampous. "Mobile Agents for Distributed Transactions." Undergraduate thesis supervised by George Samaras,
Computer Science Department, University of Cyprus, May 2000.