1) The document discusses JADE Mobile Agents as an efficient solution for distance evaluation systems. JADE Mobile Agents can conserve bandwidth, reduce latency and completion time, support disconnected operations, and enable load balancing.
2) Key benefits of using the JADE platform for mobile agents include reducing network traffic, providing more scalability, enabling disconnected computing, and increasing flexibility in application development and maintenance.
3) The JADE platform aims to simplify agent application development while ensuring compliance with FIPA standards through a set of system services and agents. It provides an agent runtime environment and tools to build efficient FIPA-compliant multi-agent systems.
Mobilizing Oracle Applications ERP - A Whitepaper by RapidValue SolutionsRapidValue
Enterprise mobility has transformed the way businesses engage
with their customers, partners and staff,using innovative applications that enhance and accelerate the exchange of critical information. However, mobile applications are only part of the overall solution – integration with existing systems in a scalable manner is equally important and challenging. Enterprises are recognizing the importance of extending their ERP(Enterprise Resource Planning) systems to mobile devices and providing employees with access to internal systems while on the move. This paper examines the approaches for extending Oracle E-Business Suite ERP
modules to mobile. It describes the overall architecture and solution, and includes an example of extending the Oracle Applications Field Service module to mobile. In the
example, a mobile application is built on the Android platform to leverage the capabilities of the mobile device. Oracle Integrated SOA module is leveraged to expose web services to outside the firewall. Web services can be
generated using pre-built packages or custom packages so as to enable required behavior of the mobile application. A middle layer is introduced to ensure security and mobile device management capabilities. The middle layer ensures that the ERP system is not exposed to outside the firewall to protect the system and its data.
Once web services for requisite functions are exposed, mobile client application can be developed using multiple options: native, cross-platform and mobile web. The technology used depends on business requirements for usability, functionality and the long-term technology roadmap. Oracle ADF Mobile is an excellent option for
extending Oracle Applications modules, as it fits well into the overall architecture stack.
An Infrastructure Based on a Mobile-Agent for Applications of Ebussiness & EworkIJRES Journal
Mobile agents have emerged as a very promising approach for eWork and eBussiness. We have developed an extensive mobile agent infrastructure that supports diverse applications in these fields. Our infrastructure is built around two basic components: a mobile-agent based framework for distributed database access and the PaCMAn (Parallel Computing with Java Mobile Agents) metacomputer. The major functionality of our database framework includes (a) the ability to dynamically create personalized views for the mobile client, (b) dynamic creation and configuration of Web-based warehouses and (c) dynamic support of mobile transactions. PaCMAn offers the necessary tools for Web-based distributed High Performance Computing (HPC) and distributed data mining. Our infrastructure provides the basis for developing eWork applications in many fields. We have utilized it for applications, both wireless and wireline, such as: Electronic commerce, Health Telematics, Teleworking, Distributed Data-mining and Web-based supercomputing.
In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced
application and desktop computing costs and provided greater IT and user flexibility compared to
traditional application and desktop management models. Among the various SaaS technologies, XenApp
that allow numerous end users to connect to their corporate applications from any device. XenApp enables
organizations to improve application management by centralizing applications in the datacenter to reduce
costs, controlling and encrypting access to data and applications to improve security and delivering
applications instantly to users anywhere by remotely accessing or streaming. As per old architecture we
were using the oracle or MS-SQL in the backend of XenApp on Windows Server itself. But as we know for
this we have to pay for database especially because we are not using it for any other purpose. And as we
know windows is GUI based so running database over it consumes much more resources. So, it can lead to
single point of failure. For this, this paper proposes a scheme for removing this problem by using the HA
failover cluster based SQL server (mysql or Oracle) which will run over Linux box having concept of VIP
(Virtual IP).
Axsys Technologies provides software development services using a systematic SDLC model. They have competence in various technologies like .NET, Java, PHP, and tools like Visual Studio.NET, Microsoft SharePoint. They have developed applications in domains like banking, travel, and disaster management. Axsys has infrastructure like a dedicated offshore development center and uses project management tools like Basecamp.
Middleware technologies like RPC, RMI, CORBA, and web services define standards for distributed computing by allowing programs and objects located on different machines to communicate. They provide location transparency so clients can access remote objects as if they were local. Middleware sits above basic communication mechanisms and hides differences in operating systems, networks, and programming languages.
LimeDS is a toolkit for rapidly building cloud applications using Java. It allows developers to visually or programmatically combine modular components into data flows. Components have JSON inputs and outputs and handle tasks like processing, storage, or invoking external APIs. LimeDS provides capabilities like caching, validation, security, and failure handling to components. It is lightweight, dynamically wires and rewires components, and facilitates application robustness. LimeDS will be released as open source to build a community around sharing and reusing components.
The document discusses middleware technologies, providing an overview of middleware categories and services. It describes middleware as software that connects diverse computer systems and formats. The main categories of middleware services discussed are data management, communication, distribution, object management, application cooperation, presentation, and system management services. Examples of specific middleware technologies like CORBA, COM/DCOM, and TAPI are also summarized. The document outlines some advantages of middleware like enabling real-time access and streamlining processes, as well as disadvantages such as high costs and immature products.
Mobilizing Oracle Applications ERP - A Whitepaper by RapidValue SolutionsRapidValue
Enterprise mobility has transformed the way businesses engage
with their customers, partners and staff,using innovative applications that enhance and accelerate the exchange of critical information. However, mobile applications are only part of the overall solution – integration with existing systems in a scalable manner is equally important and challenging. Enterprises are recognizing the importance of extending their ERP(Enterprise Resource Planning) systems to mobile devices and providing employees with access to internal systems while on the move. This paper examines the approaches for extending Oracle E-Business Suite ERP
modules to mobile. It describes the overall architecture and solution, and includes an example of extending the Oracle Applications Field Service module to mobile. In the
example, a mobile application is built on the Android platform to leverage the capabilities of the mobile device. Oracle Integrated SOA module is leveraged to expose web services to outside the firewall. Web services can be
generated using pre-built packages or custom packages so as to enable required behavior of the mobile application. A middle layer is introduced to ensure security and mobile device management capabilities. The middle layer ensures that the ERP system is not exposed to outside the firewall to protect the system and its data.
Once web services for requisite functions are exposed, mobile client application can be developed using multiple options: native, cross-platform and mobile web. The technology used depends on business requirements for usability, functionality and the long-term technology roadmap. Oracle ADF Mobile is an excellent option for
extending Oracle Applications modules, as it fits well into the overall architecture stack.
An Infrastructure Based on a Mobile-Agent for Applications of Ebussiness & EworkIJRES Journal
Mobile agents have emerged as a very promising approach for eWork and eBussiness. We have developed an extensive mobile agent infrastructure that supports diverse applications in these fields. Our infrastructure is built around two basic components: a mobile-agent based framework for distributed database access and the PaCMAn (Parallel Computing with Java Mobile Agents) metacomputer. The major functionality of our database framework includes (a) the ability to dynamically create personalized views for the mobile client, (b) dynamic creation and configuration of Web-based warehouses and (c) dynamic support of mobile transactions. PaCMAn offers the necessary tools for Web-based distributed High Performance Computing (HPC) and distributed data mining. Our infrastructure provides the basis for developing eWork applications in many fields. We have utilized it for applications, both wireless and wireline, such as: Electronic commerce, Health Telematics, Teleworking, Distributed Data-mining and Web-based supercomputing.
In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced
application and desktop computing costs and provided greater IT and user flexibility compared to
traditional application and desktop management models. Among the various SaaS technologies, XenApp
that allow numerous end users to connect to their corporate applications from any device. XenApp enables
organizations to improve application management by centralizing applications in the datacenter to reduce
costs, controlling and encrypting access to data and applications to improve security and delivering
applications instantly to users anywhere by remotely accessing or streaming. As per old architecture we
were using the oracle or MS-SQL in the backend of XenApp on Windows Server itself. But as we know for
this we have to pay for database especially because we are not using it for any other purpose. And as we
know windows is GUI based so running database over it consumes much more resources. So, it can lead to
single point of failure. For this, this paper proposes a scheme for removing this problem by using the HA
failover cluster based SQL server (mysql or Oracle) which will run over Linux box having concept of VIP
(Virtual IP).
Axsys Technologies provides software development services using a systematic SDLC model. They have competence in various technologies like .NET, Java, PHP, and tools like Visual Studio.NET, Microsoft SharePoint. They have developed applications in domains like banking, travel, and disaster management. Axsys has infrastructure like a dedicated offshore development center and uses project management tools like Basecamp.
Middleware technologies like RPC, RMI, CORBA, and web services define standards for distributed computing by allowing programs and objects located on different machines to communicate. They provide location transparency so clients can access remote objects as if they were local. Middleware sits above basic communication mechanisms and hides differences in operating systems, networks, and programming languages.
LimeDS is a toolkit for rapidly building cloud applications using Java. It allows developers to visually or programmatically combine modular components into data flows. Components have JSON inputs and outputs and handle tasks like processing, storage, or invoking external APIs. LimeDS provides capabilities like caching, validation, security, and failure handling to components. It is lightweight, dynamically wires and rewires components, and facilitates application robustness. LimeDS will be released as open source to build a community around sharing and reusing components.
The document discusses middleware technologies, providing an overview of middleware categories and services. It describes middleware as software that connects diverse computer systems and formats. The main categories of middleware services discussed are data management, communication, distribution, object management, application cooperation, presentation, and system management services. Examples of specific middleware technologies like CORBA, COM/DCOM, and TAPI are also summarized. The document outlines some advantages of middleware like enabling real-time access and streamlining processes, as well as disadvantages such as high costs and immature products.
MyMobileWeb is an open source platform that simplifies development of mobile web applications. It provides modules that cover basic requirements for mobile solutions, hiding complexity of multiple delivery contexts. The platform uses a "channel model" based on service-oriented architectures, with applications publishing services that can be invoked from traditional and mobile channels. The IDEAL language is used for authoring user interfaces, with components like labels, text fields, menus and tables that are styled using CSS and bind application data from the context.
Specializing in Spring, Hibernate, IVR, Webfocus, Microsoft DataStage, Oracle DB, web analytics, Quartz scheduler, etc in multiple platform (OS) and also have experience in migrating .net application to J2EE application.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
The document provides a professional summary for T Chandrasekaran including his contact information, education, work experience, technical skills, achievements and project experience. He has over 9 years of experience in software design, development and implementation across various domains. His most recent role is as a Senior Software Engineer at AVEVA India where he has been working since 2016 on projects like Aveva DataSheet.
- The document provides a summary of Ramanathan's professional experience including over 9 years of experience in development, testing, and analysis of internet applications with a focus on banking and insurance industries.
- He has strong skills in technologies like Java, JSP, Servlets, XML, Oracle, and frameworks such as Spring and Hibernate.
- Ramanathan has worked on projects for clients in the US and UK including Capital One, Lloyds Bank, and The Hartford.
Mueen Akhtar is a software developer with over 15 years of experience developing applications using Java/J2EE technologies. He has extensive experience working on medical, financial, and retail projects for companies such as HCL, Dell, and CareCloud. Some of the key projects he has worked on include the Onyx system for Qatar Biobank, the DCCA medical archiving system, and various claims processing applications. He is proficient in technologies such as Java, J2EE, SQL, Spring, Hibernate, and Android. Mueen holds an MCA degree and seeks a position where he can continue contributing to team-based software development work.
This document provides an overview of Service Oriented Architecture (SOA) and its enabling technologies. It discusses key SOA principles like loose coupling, standardized service contracts, and service reusability. The document also covers major SOA objectives, benefits, architecture layers, and the differences between SOA and web services. Web services are described as a standardized way for applications to communicate over the web using XML, SOAP, WSDL and other standards. The document contrasts SOA with public-subscribe and pull-based vs push-based messaging architectures.
The document provides an overview of J2ME (Java 2 Micro Edition). It discusses key topics such as:
- J2ME is used to develop applications for small computing devices like phones and PDAs.
- J2ME addresses the limited resources of these devices by using configurations like CLDC that use stripped-down versions of the JVM.
- It also uses profiles that define features for classes of devices. The main configurations are CLDC for small memory devices and CDC for devices with more resources.
The paper focuses on the architecture of JBoss Application Server and how it helps to automate the
development, deployment, and operation of business-critical and mission-critical applications. The paper
also describes about the Dynamic application implemented by JBoss.
The document discusses the architecture and components of J2ME, including:
1) J2ME has three layers - the configuration layer which includes the JVM, profile layer providing Java APIs, and MIDP layer for user interface and storage.
2) MIDlets are Java applications that run on small devices and extend the MIDlet class. They have lifecycle methods like startApp(), pauseApp(), destroyApp().
3) The SDK includes packages like CLDC, MIDP, and the Wireless Toolkit for developing MIDlets. MIDlets are compiled into a JAR file and described in a JAD file.
Nethaji Sundaravadivelu is a senior software engineer with over 3 years of experience developing and enhancing SCADA and network automation applications. He has led teams in delivering projects across Microsoft technologies and platforms. His areas of expertise include C#, ASP.NET, SQL Server, and developing web and Windows applications. Currently he is working on projects involving ADMS software deployment and smart grid solutions for state electricity boards in India.
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...RapidValue
There are two commonly used approaches for building integrated mobility solutions: Point-to-point integration and Mobile Enterprise Application Platform (MEAP).
This paper explains why an enterprise mobility integration solution is needed, describes and compares the two approaches, and provides a guide for how to choose the right mobility integration technique for your organization. The paper also examines various MEAP platforms available and the key differences between popular platforms - Kony and SAP Unwired Platform.
From a mobile application development standpoint, there is another widely used approach: cross-platform development frameworks. These frameworks allow
developers to build once and deploy across multiple device platforms. However, these frameworks lack integration and mobile device management capabilities,
and therefore we have excluded them from consideration for the purposes of this whitepaper. To learn more about cross-platform development, download our whitepaper: “How to Choose the Right Architecture for your Mobile Application” -
http://www.rapidvaluesolutions.com/whitepaper/
This document provides an overview of resource management and security in cloud computing. It discusses inter-cloud resource management, resource provisioning models including advance, dynamic and user self-provisioning, and the global exchange of cloud resources. It also covers why cloud security governance is needed, what cloud security governance entails, common challenges around lack of management buy-in, controls, roles and metrics. Finally, it discusses key objectives for an effective cloud security governance model and what virtualized security is compared to traditional physical security.
Software Engineering 101 provides an overview of key concepts in software engineering including:
- Software engineering is the application of a systematic approach to software design, development, and maintenance.
- Software architecture establishes the high-level structure of a system, while software development focuses on implementation details. Both are important.
- Common software architectures include client-server, peer-to-peer, REST, service-oriented, and multi-tier architectures.
- Popular software development methodologies include waterfall, iterative, agile (e.g. Scrum, XP), and design patterns help solve common problems.
- Software development also involves object-oriented programming, databases, testing, and release management.
The document provides an overview of cloud architecture, services, and storage. It defines cloud architecture as the components and relationships between databases, software, applications, and other resources leveraged to solve business problems. The main components are on-premise resources, cloud resources, software/services, and middleware. Three common cloud service models are also defined - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Amazon Simple Storage Service (S3) is discussed as a cloud storage service that stores unlimited data in buckets with fine-grained access controls and analytics capabilities.
Implementation of Agent Based Dynamic Distributed ServiceCSCJournals
This document proposes a design for agent migration between distributed systems using ACL (Agent Communication Language) messages. It involves serializing an agent's code and state into an ACL message that is sent from one system to another. The receiving system deserializes the agent to restore its execution. The design includes defining an ontology for migration messages, a migration protocol specifying the message flow, and components for handling class loading, agent migration, and conversation protocols. The performance of this distributed agent migration approach is evaluated by applying it to a distributed prime number calculation application.
The document discusses developing a proof of concept location-based social tracking application using a multi-agent system. It proposes using the JADE platform with the JADE-LEAP extension to create agents that can run on Android devices and allow users to track each other's locations. The research will analyze the performance of the multi-agent system running on Android and other mobile platforms that support Java.
The document summarizes a research paper that proposes a Java-based remote control system for laboratory monitoring. The system allows administrators to remotely control and monitor computers connected over a local area network. It uses Java Remote Method Invocation (RMI) to enable remote access and control of resources like locking/unlocking USB drives and files. The system aims to provide an efficient and automated alternative to existing remote desktop solutions by minimizing processing power usage on both client and server machines.
Report about Software Architecture for Robotics, for class of Introduction to Robotics of Prof. Sukhan Lee, of department of computer engineering of Sungkyunkwan University.
Student: Lorran Pegoretti.
Suwon, South Korea, December 2013
J2EE Notes JDBC database Connectiviy and Programs related to JDBCChaithraCSHirematt
- Java 2 Platform, Enterprise Edition (J2EE) builds upon Java 2 Platform, Standard Edition (J2SE) and is used to create large, distributed, multi-tier enterprise applications. It provides APIs and services for these types of applications.
- J2EE applications typically use a multi-tier architecture with client, web, business, and data tiers. The client tier interacts with users/devices. The web tier contains web components like servlets and JSPs. The business tier houses enterprise beans that implement business logic. The data tier consists of databases.
- Containers in each tier manage components and provide common services. For example, the EJB container manages enterprise beans and provides transactions.
Convertigo Mobility Platform | Mobile Application Development for Enterprises...Convertigo | MADP & MBaaS
Convertigo is a privately held company recognized as a "pure player" in the enterprise Mobility market and the first software vendor to distribute its cloud based or on premise Mobile Application Development Platform (MADP) as Open Source. Convertigo is delivering a secured and scalable disruptive all-in-one solution integrating rapid cross platform mobile development tools and a powerful MBaaS covering challenging backend enablement, featuring a middleware optimized for mobility.
With more of 60.000 installations of its community edition, Convertigo technologies have a proven track record with secured and scalable implementations deployed in global fortune 500 companies in EMEA and North America.
More info on http://www.convertigo.com
MyMobileWeb is an open source platform that simplifies development of mobile web applications. It provides modules that cover basic requirements for mobile solutions, hiding complexity of multiple delivery contexts. The platform uses a "channel model" based on service-oriented architectures, with applications publishing services that can be invoked from traditional and mobile channels. The IDEAL language is used for authoring user interfaces, with components like labels, text fields, menus and tables that are styled using CSS and bind application data from the context.
Specializing in Spring, Hibernate, IVR, Webfocus, Microsoft DataStage, Oracle DB, web analytics, Quartz scheduler, etc in multiple platform (OS) and also have experience in migrating .net application to J2EE application.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
The document provides a professional summary for T Chandrasekaran including his contact information, education, work experience, technical skills, achievements and project experience. He has over 9 years of experience in software design, development and implementation across various domains. His most recent role is as a Senior Software Engineer at AVEVA India where he has been working since 2016 on projects like Aveva DataSheet.
- The document provides a summary of Ramanathan's professional experience including over 9 years of experience in development, testing, and analysis of internet applications with a focus on banking and insurance industries.
- He has strong skills in technologies like Java, JSP, Servlets, XML, Oracle, and frameworks such as Spring and Hibernate.
- Ramanathan has worked on projects for clients in the US and UK including Capital One, Lloyds Bank, and The Hartford.
Mueen Akhtar is a software developer with over 15 years of experience developing applications using Java/J2EE technologies. He has extensive experience working on medical, financial, and retail projects for companies such as HCL, Dell, and CareCloud. Some of the key projects he has worked on include the Onyx system for Qatar Biobank, the DCCA medical archiving system, and various claims processing applications. He is proficient in technologies such as Java, J2EE, SQL, Spring, Hibernate, and Android. Mueen holds an MCA degree and seeks a position where he can continue contributing to team-based software development work.
This document provides an overview of Service Oriented Architecture (SOA) and its enabling technologies. It discusses key SOA principles like loose coupling, standardized service contracts, and service reusability. The document also covers major SOA objectives, benefits, architecture layers, and the differences between SOA and web services. Web services are described as a standardized way for applications to communicate over the web using XML, SOAP, WSDL and other standards. The document contrasts SOA with public-subscribe and pull-based vs push-based messaging architectures.
The document provides an overview of J2ME (Java 2 Micro Edition). It discusses key topics such as:
- J2ME is used to develop applications for small computing devices like phones and PDAs.
- J2ME addresses the limited resources of these devices by using configurations like CLDC that use stripped-down versions of the JVM.
- It also uses profiles that define features for classes of devices. The main configurations are CLDC for small memory devices and CDC for devices with more resources.
The paper focuses on the architecture of JBoss Application Server and how it helps to automate the
development, deployment, and operation of business-critical and mission-critical applications. The paper
also describes about the Dynamic application implemented by JBoss.
The document discusses the architecture and components of J2ME, including:
1) J2ME has three layers - the configuration layer which includes the JVM, profile layer providing Java APIs, and MIDP layer for user interface and storage.
2) MIDlets are Java applications that run on small devices and extend the MIDlet class. They have lifecycle methods like startApp(), pauseApp(), destroyApp().
3) The SDK includes packages like CLDC, MIDP, and the Wireless Toolkit for developing MIDlets. MIDlets are compiled into a JAR file and described in a JAD file.
Nethaji Sundaravadivelu is a senior software engineer with over 3 years of experience developing and enhancing SCADA and network automation applications. He has led teams in delivering projects across Microsoft technologies and platforms. His areas of expertise include C#, ASP.NET, SQL Server, and developing web and Windows applications. Currently he is working on projects involving ADMS software deployment and smart grid solutions for state electricity boards in India.
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...RapidValue
There are two commonly used approaches for building integrated mobility solutions: Point-to-point integration and Mobile Enterprise Application Platform (MEAP).
This paper explains why an enterprise mobility integration solution is needed, describes and compares the two approaches, and provides a guide for how to choose the right mobility integration technique for your organization. The paper also examines various MEAP platforms available and the key differences between popular platforms - Kony and SAP Unwired Platform.
From a mobile application development standpoint, there is another widely used approach: cross-platform development frameworks. These frameworks allow
developers to build once and deploy across multiple device platforms. However, these frameworks lack integration and mobile device management capabilities,
and therefore we have excluded them from consideration for the purposes of this whitepaper. To learn more about cross-platform development, download our whitepaper: “How to Choose the Right Architecture for your Mobile Application” -
http://www.rapidvaluesolutions.com/whitepaper/
This document provides an overview of resource management and security in cloud computing. It discusses inter-cloud resource management, resource provisioning models including advance, dynamic and user self-provisioning, and the global exchange of cloud resources. It also covers why cloud security governance is needed, what cloud security governance entails, common challenges around lack of management buy-in, controls, roles and metrics. Finally, it discusses key objectives for an effective cloud security governance model and what virtualized security is compared to traditional physical security.
Software Engineering 101 provides an overview of key concepts in software engineering including:
- Software engineering is the application of a systematic approach to software design, development, and maintenance.
- Software architecture establishes the high-level structure of a system, while software development focuses on implementation details. Both are important.
- Common software architectures include client-server, peer-to-peer, REST, service-oriented, and multi-tier architectures.
- Popular software development methodologies include waterfall, iterative, agile (e.g. Scrum, XP), and design patterns help solve common problems.
- Software development also involves object-oriented programming, databases, testing, and release management.
The document provides an overview of cloud architecture, services, and storage. It defines cloud architecture as the components and relationships between databases, software, applications, and other resources leveraged to solve business problems. The main components are on-premise resources, cloud resources, software/services, and middleware. Three common cloud service models are also defined - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Amazon Simple Storage Service (S3) is discussed as a cloud storage service that stores unlimited data in buckets with fine-grained access controls and analytics capabilities.
Implementation of Agent Based Dynamic Distributed ServiceCSCJournals
This document proposes a design for agent migration between distributed systems using ACL (Agent Communication Language) messages. It involves serializing an agent's code and state into an ACL message that is sent from one system to another. The receiving system deserializes the agent to restore its execution. The design includes defining an ontology for migration messages, a migration protocol specifying the message flow, and components for handling class loading, agent migration, and conversation protocols. The performance of this distributed agent migration approach is evaluated by applying it to a distributed prime number calculation application.
The document discusses developing a proof of concept location-based social tracking application using a multi-agent system. It proposes using the JADE platform with the JADE-LEAP extension to create agents that can run on Android devices and allow users to track each other's locations. The research will analyze the performance of the multi-agent system running on Android and other mobile platforms that support Java.
The document summarizes a research paper that proposes a Java-based remote control system for laboratory monitoring. The system allows administrators to remotely control and monitor computers connected over a local area network. It uses Java Remote Method Invocation (RMI) to enable remote access and control of resources like locking/unlocking USB drives and files. The system aims to provide an efficient and automated alternative to existing remote desktop solutions by minimizing processing power usage on both client and server machines.
Report about Software Architecture for Robotics, for class of Introduction to Robotics of Prof. Sukhan Lee, of department of computer engineering of Sungkyunkwan University.
Student: Lorran Pegoretti.
Suwon, South Korea, December 2013
J2EE Notes JDBC database Connectiviy and Programs related to JDBCChaithraCSHirematt
- Java 2 Platform, Enterprise Edition (J2EE) builds upon Java 2 Platform, Standard Edition (J2SE) and is used to create large, distributed, multi-tier enterprise applications. It provides APIs and services for these types of applications.
- J2EE applications typically use a multi-tier architecture with client, web, business, and data tiers. The client tier interacts with users/devices. The web tier contains web components like servlets and JSPs. The business tier houses enterprise beans that implement business logic. The data tier consists of databases.
- Containers in each tier manage components and provide common services. For example, the EJB container manages enterprise beans and provides transactions.
Convertigo Mobility Platform | Mobile Application Development for Enterprises...Convertigo | MADP & MBaaS
Convertigo is a privately held company recognized as a "pure player" in the enterprise Mobility market and the first software vendor to distribute its cloud based or on premise Mobile Application Development Platform (MADP) as Open Source. Convertigo is delivering a secured and scalable disruptive all-in-one solution integrating rapid cross platform mobile development tools and a powerful MBaaS covering challenging backend enablement, featuring a middleware optimized for mobility.
With more of 60.000 installations of its community edition, Convertigo technologies have a proven track record with secured and scalable implementations deployed in global fortune 500 companies in EMEA and North America.
More info on http://www.convertigo.com
International Conference on Advances in Computing, Communicati.docxvrickens
This document discusses virtualization in cloud computing. It begins with an abstract that introduces cloud computing and virtualization and how organizations are implementing these technologies to reduce costs. The document then discusses how virtualization is the basis for delivering infrastructure as a service in cloud computing by separating hardware constraints. It provides examples of major cloud computing service providers like Google, Amazon, and Microsoft and compares their various services. Finally, it discusses techniques for virtual machine placement in data centers and some examples of virtual labs.
Performance of Web Services on Smart Phone PlatformsIOSR Journals
This document discusses and compares the performance of Web Services on smart phone platforms using SOAP and REST. It begins with an introduction to Web Services and the problems with using SOAP on mobile devices due to its limitations in processing power, bandwidth usage, and flexibility. It then proposes using RESTful Web Services as an alternative as they avoid XML parsing and are based on the lightweight HTTP protocol. The document analyzes the performance of SOAP versus REST Web Services on a mobile device to determine which is more efficient for smart phones.
The document discusses Node.js and how it provides a runtime environment and libraries for building server-side JavaScript applications. It describes key Node.js components like the V8 JavaScript engine, libuv library, and non-blocking I/O. It also covers the Node package manager NPM and how Express.js is a web framework built on Node.js that simplifies building web apps and APIs using middleware, routing, and other features. The document advocates for building RESTful APIs that follow best practices like using a uniform interface, being stateless and cacheable.
Cloudify your applications: microservices and beyondUgo Landini
The document discusses moving applications to a microservices architecture using Cloudify and Istio. It begins by describing typical customer landscapes today with complex, heterogeneous environments running across virtual and physical infrastructure. It then introduces Cloudify and Istio as platforms that can help modernize existing applications and develop new ones using microservices. Key capabilities of Cloudify and Istio are described such as container platforms, developer tools, and services for integration, automation, security and management.
This document is a resume for Karan Deep Singh, who has 6.5 years of experience working with Java/J2EE technologies. It lists his work experience with various companies like Nagarro Software Pvt Ltd and Hughes Systique India Pvt Ltd, where he worked on projects involving technologies like Java, Spring, Hibernate, Oracle, and more. It also provides details of his academic qualifications and skills in programming languages, frameworks, databases, and other technologies.
This document describes the architecture for mobile computing. It discusses three tiers: the presentation tier which deals with the user interface; the application tier which handles business logic and transactions; and the data tier which manages database access and storage. It also covers various middleware technologies used to connect these tiers, including message-oriented middleware, transaction processing middleware, and database middleware like ODBC and JDBC. Context-awareness and adapting content to different devices based on context is also discussed.
A framework for an Operating System-based Mobile Agent InteroperabilityIOSR Journals
This document proposes a framework for mobile agent interoperability by embedding a static agent into the Windows operating system kernel as a service. This eliminates the need for separate mobile agent platforms, which are typically non-interoperable. The embedded agent would receive incoming mobile agents, provide an execution environment, and allow agents to complete tasks and migrate between hosts. The goal is to provide a common platform where agents from different vendors can execute and interact without additional overhead from separate agent platforms. Currently, the framework has been implemented on Windows XP, Vista and 7, and future work involves implementing it on other operating systems and enabling interoperability between agents from different vendors and platforms.
This document summarizes the experience and skills of Deepthi K Vijaydev, including 10 years of experience in designing, developing, deploying and supporting software applications using technologies like Java, J2EE, C++, databases, and application servers. Some key projects discussed are the development of network management systems like ASTRO/AOR for fault detection and resolution, and the development of various network provisioning systems while working for telecommunications companies. The document highlights her experience in the full software development life cycle from design to testing.
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming and applying it to perform for the same using RPC, RMI and various Mobile Agents and hence comparing different Mobile Agent systems
Open Programmable Architecture for Java-enabled Network DevicesTal Lavian Ph.D.
Current network devices enable connectivity between end systems given a set of protocol software bundled with vendor hardware. It is impossible for customers to add software functionality running locally on top of network devices to augment vendor software. Our vision is to open network devices so that customized software can be downloaded, allowing for more flexibility and with a focus on industry and customer specific solutions. This brings considerable value to the customer. We have chosen to use Java because we can reuse its security mechanism and
dynamically download software. We can isolate the Java VM and downloaded Java programs from the core router functionality. We implemented Java Virtual Machines (JVMs) on a family of network devices,
implemented an Open Services framework, and developed an SNMP MIB API and a Network API upon which we can demonstate the value of openness and programmability of network devices.
Study of SaaS and its Application in CloudIOSR Journals
This document discusses Software as a Service (SaaS) and its application in cloud computing. It begins by defining cloud computing and its key components and characteristics. It then explains the major cloud services including SaaS, PaaS, and IaaS. SaaS is discussed in depth, including how it allows users to access software over the internet without installing it. The document compares traditional software systems with cloud-based "Soft serve" systems. It provides an example implementation of a Soft serve system and discusses security measures. In conclusion, SaaS provides flexibility and low costs for businesses while reducing maintenance costs compared to traditional software systems.
Looking for the best backend frameworks for web development? Discover the top 5 options in our informative .pptx presentation. From robust features to seamless integration, streamline your development process with Silverclouding and stay ahead in the digital era.
Ora_Case_Study_Oracle Application Development FrameworkNeha Singh
The document discusses Oracle Application Development Framework (ADF) and how it enables rapid application development. It provides a visual, drag-and-drop approach and pre-built functionality to simplify development. The document outlines two examples where ADF is being used at Oracle to modernize banking applications and build a new private banking mobile app in a faster, more efficient manner compared to previous technologies and approaches. ADF allows developers to focus on business needs rather than infrastructure and offers consistency across both web and mobile platforms.
The document discusses software risk factors in developing e-governance projects in India. It identifies several risks: unclear project definitions, inaccurate requirements documentation, inefficient design models, inconsistencies in data flow, and language barriers. E-governance projects require huge investments, so risks must be carefully evaluated during feasibility studies. Risks can impact reliability and maintenance efforts. To minimize risks, quality documentation is important throughout the project life cycle, and both technical and non-technical perspectives must be considered.
This document summarizes an Active Congestion Control (ACC) mechanism that uses active networking technology to make feedback congestion control more responsive to network congestion. ACC includes programs in data packets that allow routers to react to congestion without incurring round trip delay. When congestion is detected, the congested router calculates and sends a new congestion control state to endpoints to synchronize distributed states. Simulations show ACC TCP can achieve up to 18% higher throughput than standard TCP under bursty traffic conditions by reacting more quickly to congestion. ACC and TCP perform comparably under stable network conditions.
Effect of Type of School Management and School
Factors on Educational Performance of Primary
School Children in Navi Mumbai: Multiple
Classification Model
Rita Abbi
This document discusses queuing theory and its application to traffic flow modeling. Some key points:
- Queuing theory is the mathematical analysis of waiting lines or queues. It allows prediction of line lengths and waiting times.
- As it relates operations research, queuing theory results are used for business decisions about resource requirements for service provision.
- It is relevant for modeling customer service situations as well as transport and telecom applications. Specifically applicable to traffic systems.
- The document outlines components of a queuing model for traffic, including relationships between traffic flow, density, and speed. Models arrival and service rates to estimate time in the system.
This document discusses the antibacterial effects of Ocimum sanctum (tulsi) against various bacteria. It finds that tulsi has antibacterial activity against E. coli, Salmonella typhi, and Vibrio cholerae. The minimum inhibitory concentration of tulsi against these bacteria was found to be 2mg/ml. There was no change in antibacterial activity of tulsi against E. coli at contact times of 30 minutes, 1 hour, 2 hours, and 5 hours. Tulsi is concluded to have potential as an antibacterial agent.
This document discusses creative learning through visualization and the art of visualization. It discusses:
1) Visualization or spatial intelligence is the ability to mentally visualize and solve spatial problems. Art and design disciplines focus on learner creativity and tend to view knowledge from their own perspectives.
2) Developing creativity has become an important educational goal, and creative pedagogy emphasizes an exciting learning environment to increase student enjoyment and commitment. Students are active participants who determine the pace and content of their learning.
3) Creative potential exists in most people and must be explored and nurtured. Examples of creativity include Steve Jobs creating the iPhone by combining different technologies. Creativity involves expertise, creative thinking skills, and motivation.
This document discusses CLR integration in SQL Server 2008, which allows developers to create database objects using managed code in .NET languages. It provides advantages over T-SQL, including support for object-oriented programming, collections, and access to the .NET framework. The document outlines the steps to implement CLR integration, including creating an assembly in a .NET language, importing and configuring the assembly in the SQL Server database, and creating database objects like triggers, functions, and procedures that reference the managed code. CLR integration allows running complex managed code logic within the database for tasks not easily done in T-SQL.
This document discusses various database programming skills that are useful for efficiently designing and managing databases. It describes how batches allow grouping SQL statements to execute as a single unit. Variables can store temporary values during batch execution. Conditional constructs like IF-ELSE and CASE statements allow branching program flow based on conditions. Loops like WHILE allow repeating statements. Exceptions can be handled using TRY-CATCH blocks or RAISEERROR statements. Good database programming requires understanding and applying these different programming skills and constructs.
The document summarizes a study of the Firozabad bangle industry in India. It discusses that Firozabad is the largest producer of glass bangles in the world. The bangle industry has greatly contributed to the economic development and employment in Firozabad. However, the industry faces several problems including high costs of raw materials like soda ash and natural gas, lack of modern technology, and delays in exporting products. To compete globally, the industry needs to address these issues and improve efficiency through investments in infrastructure, technology, and product innovation.
This document discusses the marketing of toor dall mills in Gulbarga city. It finds that 100% of toor dall mill owners are solely dependent on brokers to sell their production. The mill owners are not willing to take on marketing executives themselves and are completely reliant on brokers. The role of brokers is therefore very significant in the marketing of toor dall.
This document discusses ethics and corporate social responsibility. It begins by defining business ethics and how they relate to a company's socio-economic context and stakeholders. It emphasizes that companies have economic responsibilities to earn returns for investors, but cannot do so at the expense of ethical and social responsibilities to employees, customers, communities, and other stakeholders. The document then examines how companies can identify and address ethical issues, assess global challenges, and design action plans to integrate ethics and social responsibility.
- 63% of dall mill owners in Gulbarga city, India were ready and interested in undergoing training or attending workshops to explore possibilities of multiplying production, turnover and profit of their mills, while 37% were not interested.
- The study aimed to assess the readiness of dall mill owners to undergo training or attend workshops focused on increasing production, revenue, and profits.
- Interviews with 50 dall mill owners found that over half were open to training opportunities, but under half were unwilling or uninterested in such programs.
The document discusses the Java Virtual Machine (JVM) architecture and memory. It covers the following key points:
1. The JVM is the foundation of the Java platform and provides hardware- and operating system-independence for Java programs.
2. The JVM memory is divided into heap spaces like Eden space and survivor space, as well as non-heap spaces like the permanent generation and code cache.
3. Benefits of the JVM include security, cross-platform capability, while drawbacks include slower speed compared to native compilation and lack of platform-specific features.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Mechanical Engineering on AAI Summer Training Report-003.pdf
Ijaprr vol1-3-10-14prajguru
1. International Journal of Allied Practice, Research and Review
Website: www.ijaprr.com (ISSN 2350-1294)
JADE MOBILE AGENTS – AN EFFICIENT SOLUTION
FOR DISTANCE EVALUATION SYSTEM
Dr. Prakash Rajguru
Dept. of Computer Science & IT, Adarsh College Hingoli Maharashtra
09822186940
prakash_rajgure@yahoo.com
ABSTRACT- Mobile Agents are a useful approach for many distributed applications. A Mobile Agent does not require a
permanent connection to the computer from which it was launched. The agent does not care if the computer that launched it
becomes disconnected because it can pursue its search operations independently. Moreover, agents are an efficient paradigm
for information processing and transfer over wireless networks, which typically have low bandwidth and high latency. By
migrating to the location of an electronic resource, an agent can access the resource locally and eliminate costly data transfers
over congested networks. This reduces network traffic and improves data delivery, because it is often faster and cheaper to
send a small agent to a data source than to send all the intermediate data to the requesting site. We analyze various vital
benefits of JADE Mobile Agent (1) conservation of bandwidth, (2) reduction in latency, (3) reduction in total completion time,
(4) support for disconnected operation in mobile computing, (5) load balancing.
Keywords - Mobile Computing, Mobile Agent, JADE, Distance Evaluation, FIPA.
I. INTRODUCTION
In the past few years there has been an growth of interest in mobile agent technology and several platforms
have been developed. Some of them have only been used for research purposes while others have been
deployed as commercial products. The society is now looking for applications where these platforms can be
effectively used. A Mobile Agent is an emerging technology that is gaining momentum in the field of
distributed computing. The use of mobile agents can bring some interesting advantages when compared with
traditional client/server solutions, it can reduce the traffic in the network, it can provide more scalability, it
allows the use of disconnected computing and it provides more flexibility in the development and
maintenance of the applications. In the latest years, several commercial implementations of mobile agent
systems have been presented in the market
II. THE JADE PLATFORM
The platform chosen for implementing migration was JADE, because it is a widely adopted platform within
the software agent development and research communities. It is open source and complies with FIPA
specifications. This platform facilitates its agents’ mobility, but as shown below, does not meet the
requirements for a real migration. The platform is divided into a large number of functional modules, which
can be placed into three categories in general terms: Core. The core of the platform is formed by all
components providing the necessary execution environment for agents’ functioning. This consists of the
agency’s mechanisms for carrying out information processing in ACL messages, and the internal structures
that the agency and agents will use to represent this content. Mechanisms and protocols used to send and
receive messages at both intra-agency and inter-agency level. At the core of the JADE platform is the concept
of the container, which is the minimum execution environment necessary for an agent to operate. Each
IJAPRR Page 10
2. container in JADE is executed in a different Java virtual machine, but they are all interconnected by RMI
(Remote Method Invocation). Containers do not only enable groups of agents to be separated into different
execution groups, but agencies may also be distributed in various machines so that each has one or several of
them. One of the different existing containers is the principal, which represents the agent itself and which
gives orders to all the others. JADE also provides mobility between containers. For this reason, if the agency
is distributed in various machines, agents can move between them. However, accepting this type of mobility
as migration could be considered a mistake. "Satellite" containers are highly dependent on the principal and
many operations carried out by the agents within them end up passing through the central node. Furthermore,
the connections between them (carried out by RMI) must be permanent, as if not, many errors due to the loss
of link may be generated. As we can see, using this type of mobility as a typical migration ends up making
Mobile Agent systems’ scalability disappear because a certain type of operations is centralized in a single
node. However, it may be very useful to use the diagram of containers to distribute the processing of agencies
that have to bear a heavy load or to isolate some agency types within a single agency for security reasons.
These details lead to the necessity for inter-agency migration, which is carried out through a non-permanent
channel and makes a system of Mobile Agents available that is much more scalable, and in which agencies are
totally independent units. This independence is not only desirable from the point of view of fault tolerance,
but also because of privacy.
III. KEY BENEFITS OF JADE
JADE (Java Agent Development Framework) is a software framework fully implemented in the Java
language. It simplifies the implementation of Multi Agent systems through a middle-ware that claims to
comply with the FIP A specifications and through a set of tools that supports the debugging and deployment
phase. JADE agent platform tries to keep high the performance of a distributed agent system implemented
with the Java language. In particular, its communication architecture tries to offer flexible and efficient
messaging, transparently choosing the best transport available and leveraging state-of-the-art distributed
object technology embedded within Java runtime environment. JADE uses an agent model and a Java
implementation that offer a good runtime efficiency and software reuse. This framework is built using the
combination of two main products: a FIPA-compliant agent platform and a package to develop Java agents.
When this tool is selected to build the Multi-Agent System, it has both advantages and disadvantages that
could be summarized in: Jade does not have a powerful programming environment; this framework only
provides to the user a set of interfaces that allow him to debug the implemented agents. One of the better
characteristics in Jade is that it has an excellent documentation, a good API to reuse the provided libraries to
build new agents. Using Jade, a set of communication libraries (or packages) is provided to the software
engineers, those libraries allow them to isolate the communication problem.
JADE allows developers to easily build intricate, real-world business models without being constrained
by the mechanics of storing and accessing data. With JADE, developers can store, retrieve and rapidly
traverse complex, interconnected object structures as though they are always in memory. JADE entirely
eliminates the development effort required to move objects to and from a database (often referred to as
IJAPRR Page 11
Figure 1 : Structure of Mobile Agent
3. impedance mismatch). This makes developers more productive. Coupled with a flexible distributed processing
model, JADE is ideal for solving complex problems. JADE makes it easier to build and run distributed
systems that take advantage of modern, high-performance hardware platforms. Built on more than 25 years of
company experience, JADE reduces the complexity of software development by delivering for Windows and
Linux a seamless fusion of:
A proven, high-performance object database that makes the storage, retrieval and traversal of complex
object models transparent.
An object manager and application servers that provide automatic object caching, powerful distributed
processing capabilities and interfaces to other languages.
Web Services to interoperate with other systems and technologies.
A high-grain, conceptually economic programming model that makes it easier to implement complex
business processes.
A Synchronized Database Service (SDS) that provides hot-standby facilities and the ability to
distribute read-only tasks to secondary databases.
A Relational Population Service (RPS) that makes it easy for JADE systems to populate relational
databases for Business Intelligence (BI) and data warehousing purposes.
An automatic, portable thin client that enables rich user interfaces to be deployed easily over the
Internet to both Windows and Linux desktops.
A clear, concise, easy-to-learn programming language.
A repository-based development environment that enables collaborative thin client development from
anywhere in the world.
HTML frameworks for delivery of browser-based user interfaces.
1) JADE is able to simplify development while ensuring standard compliance through a comprehensive set of
system services and agents and
2) JADE offers an agent runtime system on which implement efficient FIPA 2000 compliant multi-agent
systems and supports their development through the availability of a predefined programmable agent model
and of a set of management and testing tools.
Java Agent DEvelopment Framework (JADE) is a framework that facilitates the development of agent
applications in compliance with the FIPA specifications for interoperable intelligent multi-agent systems. The
JADE agent platform tries to keep the high performance of a distributed agent system implemented with the
Java language. It is also a middleware for developing distributed applications through leveraging state-of-the-
art distributed object technology embedded within the Java runtime environment. Therefore, the goal of JADE
is to simplify the development while ensuring standard compliance through a comprehensive set of system
services and agents. JADE uses an agent model that allows high runtime efficiency, software reuse, agent
mobility, and the realization of different agent architectures.
1. Distributed autonomous applications development - Agents that are autonomous, intelligent, and capable of
communicating and collaborating need to be implemented. JADE simplifies such a development.
2. Negotiation and coordination - JADE provides easy-to-use software libraries (i.e. patterns of interaction
between agents) to solve negotiation and coordination among a set of agent, where the resources and the
control logics are distributed in the environment.
3. Pro-activity - JADE agents have been designed to control their own thread of execution. These agents can
be easily programmed to initiate the execution of actions without human intervention just on the basis of pre-
defined goals and state changes. The property of pro-activity is essential in designing physician agents of
Distance Evaluation, which requires controlling their own actions guided by regulations.
4. Multi-Party applications - Peer-to-peer architectures that JADE used are more efficient than client-server
architectures for developing multi-party applications. Sometimes, the server might become the bottleneck and
the point of failure in the entire system. The implementation of Distance Evaluation based on JADE
architecture that allows clients to communicate each other without the intervention of a central server and
subsequently reduces the network traffic.
5. Interoperability - JADE complies with the FIPA standard that enables end-to-end interoperability between
agents of different agent platforms.
IJAPRR Page 12
4. 6. Versatility - JADE provides a homogeneous set of APIs that are independent from the underlying network
and Java version. It also provides the same APIs for J2EE, J2SE, and J2ME environments. This feature makes
Distance Evaluation a heterogeneous client (PC, PDA, mobile phone, etc.) environment.
7. Ease of use - JADE APIs and ready to use functionalities can shorten the system development cycle The
JADE-implemented Distance Evaluation is hence expected to be capable of integrating disparate information
sources and isolated heterogeneous components to perform autonomous Examination Process.
IV. A TECHNICAL NOTE
JADE Java Agent Development Framework is a software Framework fully implemented in Java language
developed by Tilab for the development of multi-agent applications based on peer-to-peer communication
architecture.
It simplifies the implementation of Agent systems through a middle-ware that complies with the latest
Foundation for intelligent physical agents (FIPA) 2000 specifications. It provides a set of graphical tools that
supports the debugging and deployment phases of agent development. Jade permits the intelligence,
information & resources to be distributed over the network in the form of java compatible mobile devices like
PDA, pagers, cell phones, smart phones, laptops or fixed desktops etc. The communication environment
evolves gradually with the appearance and disappearance of various peers, known as agents in Jade according
to their needs and requirements.
II. JADE MOBILE AGENT & DISTANCE EVALUATION SYSTEM
We have presented the design and development of a mobile agent based application for Distance Evaluation,
the system, known as Mobile Agent Bases System of Distance Evaluation. JADE provides mobile agent
platform. Agents are implemented by extending JADE class. The agents in Mobile Agent Bases System of
Distance Evaluation are made up of from main three elements and sub corresponding elements
1- Examination Setting - Launcher, PaperCoordinator, InstallAgent, FetchAgent, RemoteSetterGUI,
NamingService.
2- Distribution and Testing Stage - PaperCourierAgent, DistributionServer, PaperGUI, AnswerAgent.
3- Evaluation and Result Compilation Stage - AnswerAgent, ObjectiveEvalServer, Examiner,
PublishResultGUI.
These main and sub agents, representing examination system, students and administrators, are capable of
conducting the examination and evaluation tasks. Mobile Agent Bases System of Distance Evaluation
minimizes human intervention in the examination and evaluation registration process. Examiner and
evaluators involvements have been reduced to manual conducting and evaluation of examination. In addition,
the system adopts a distance evaluation of examination style that allows students to give the examination from
remote places and remove complexity and save time to distribution and compilation of result.. Comparisons
made against an existing traditional examination web based system show that the mobile agent approach has
the clear advantages of The capability of intelligent agents to autonomously perform simple tasks has aroused
much interest..
III. ROLE OF MOBILE AGENT IN DISTANCE EVALUATION
As already discussed, a number of factors influence Mobile Agent Technology use in Examination System. In
the proposed model, Examination Process involves three stages as follows:
(i) Examination setting,
(ii) Distribution and testing, and
(iii) Evaluation and result compilation
IJAPRR Page 13
Figure 2 : Examination System
5. This is shown in Figure as seen in the figure, the independent variables to determine a suitable indicator for
Mobile Agent use in Distance Evaluation. The proposed model in this study is derived from Examination
System practice in India.
VII. CONCLUSION
In this research paper, we survey & studies several Mobile Agent Systems, all the systems in this paper
focused mainly on the environment provided by the system for agents, the mechanisms for agent mobility,
agent communication, and language support. The use of Mobile Agents appears to offer certain advantages for
client-server computing but as we’ve noted in the above systems, it also raises some difficult issues with
respect to efficiency, flexibility and security. These issues have an effect on an agent’s ability of mobility.
Many important issues such as how agents determine the available resources/services on a machine it
transferred to mobile agent system-to-OS interaction, the use of persistent storage, and support for failure
were either briefly discussed. Mobile Agents need more applications that take advantage of the characteristics
of mobile agents since there is no single alternative to all of the functionality supported by a Mobile Agent
Framework. A potential application for JADE Mobile Agents would involve the use of the Internet and the
many uses of the Internet. Solutions to the security and virus problems in Mobile Agents could also result in
new and successful methods of Client-Server interaction in network services.
As above discussion, we select the JADE Mobile Agent Framework for implementing the Distance Evaluation
Model.
References
[1]. David M. Chess, Colin G. Harrison, and Aaron Kershenbaum. ―Mobile Agents: Are they a good idea?, IBM Research Report.
[2]. David Kotz and Robert S. Gray. ―Mobile Agents and the Future of the Internet, ACM Operating Systems Review
[3]. JADE-Board. Java Agent DEvelopment Framework. http://jade.tilab.com/ [2006].
[4]. R. Leszczyna, ―Evaluation of agent platforms, European Commission, Joint Research Centre, Institute for the Protection and Security of the
Citizen, Ispra, Italy, Tech. Rep., June 2004.
[5] Zhiyong Weng, Thomas Tran, 2007, “A Mobile Intelligent Agent-Based Architecture for E-Business”, Canada International Journal of Information
Technology and Web Engineering, Volume 2, Issue 4
[6] Su, Chuan Jun, “A JADE Implementation of Mobile Agent Based, Distributed Information Platform (MADIP) for Autonomous Health Care
Monitoring” Department of Industrial Engineering and Management
[7] R. Leszczyna, 2004, “Evaluation of agent platforms,” European Commission, Joint Research Centre, Institute for the Protection and Security of the
Citizen, Ispra, Italy, Tech. Rep.
[8] M. Caramihai, and Irina Sever, 2009, “eLearning Tools Evaluation based on Quality Concept Distance Computing. A Case Study”, World Academy
of Science, Engineering and Technology 53.
[9] J. Zhang, September 1, 2009, “JADE: Adaptive Differential Evolution with Optional External Archive”.
[10] Aarti Singh, Dimple Juneja1, A.K. Sharma, Vol 2, No 1, January 2011, “Agent Development Toolkits”, International Journal of Advancements in
Technology, ISSN 0976-4860
[11] Amanpreet Kaur1, Sukhdeep Kaur2, March 23, 2007, “Role of Mobile Agents in Mobile Computing”, Proceedings of National Conference on
Challenges & Opportunities in Information Technology (COIT-2007).
[12] Ametller, S. Robles, J. A. Ortega-Ruiz, “Self-Protected Mobile Agents”
IJAPRR Page 14