Multiagent Systems are autonomous intelligent systems. In many academic institutions student
admissions are performed after generating merit lists. Generation of merit lists is preceded by
manual scrutiny of admission forms. This manual scrutiny is a knowledge-intensive, tedious and
error-prone task. In this paper the design, implementation and testing of Multiagent System for
Scrutiny of Admission Forms (MASAF) using Automatic Knowledge Capture is presented.
MASAF consists of three agents namely: Form agent, Record agent, and Scrutiny agent. These
three agents, using ontology, cooperatively fulfill the goal of highlighting the discrepancies
in filled forms. MASAF has been tested by scrutinizing about 1000 forms and all of
discrepancies found were correct as verified by human scrutinizer. Thus it can be concluded
that using Multiagent system for scrutiny of forms can reduce human intervention, improve
performance in terms of speed and accuracy. The system can be enhanced to automatically
correct the discrepancies in forms.
WEB-BASED DATA MINING TOOLS : PERFORMING FEEDBACK ANALYSIS AND ASSOCIATION RU...IJDKP
Â
This paper aims to explain the web-enabled tools for educational data mining. The proposed web-based
tool developed using Asp.Net framework and php can be helpful for universities or institutions providing
the students with elective courses as well improving academic activities based on feedback collected from
students. In Asp.Net tool, association rule mining using Apriori algorithm is used whereas in php based
Feedback Analytical Tool, feedback related to faculty and institutional infrastructure is collected from
students and based on that Feedback it shows performance of faculty and institution. Using that data, it
helps management to improve in-house training skills and gains knowledge about educational trends which
is to be followed by faculty to improve the effectiveness of the course and teaching skills.
Review and analysis of machine learning and soft computing approaches for use...IJwest
Â
The adequacy of user models depends mainly on the accuracy and precision of information that is retrieved to the user. The real challenge in user modelling studies is due to the inadequacy of data, improper use of techniques, noise within the data and imprecise nature of human behavior. For the best results of user modelling, one should choose an appropriate way to do it i.e. by selecting the best suitable approach for the desired domain. Machine learning and Soft computing Techniques have the ability to handle the uncertainty and are extensively being used for user modeling purpose. This paper reviews various approaches of user modeling and critically analyzes the machine learning and soft computing techniques that have successfully captured and formally modelled the human behavior.
This paper introduces the competency models for Operations Manager, User Interface
Designer, and Application Developers. It will serve as a guide for Information Systems students
to identify which among the three of the offered tracks would be most suited for them to pursue
according to their knowledge, skills, values and interests. The Hollandâs RIASEC model and the
Values Search model of Bronwyn and Holt were utilized to determine the most dominant interest
and most dominant values of the industry computing experts. Survey assessment forms were sent
to IT Operations Manager, User Interface Designer, and Application Developer. Most dominant
values and interests of industry computing experts were determined as well as the knowledge
and skills which are mostly required by the industry in their particular area. Based on the result
of the survey, it shows that application developer and user interface designer have a closely
related values. Thus a second round of a survey would be needed to come up with the most
exclusive dominant values for the particular information systems specialization track.
The development of information technology should be ordered to improve the services including job fair information system
services. This work aimed to develop of web-based job fair information system. The methods used in this work consists of collecting
data method, and software development method. Collecting data method using observations, interview, and literature study. Software
development method using waterfall model comprising the steps of requirements, specfification and design, implementation, testing,deployment, and maintenance. The results of this work is software web-based information system provided a job information,registration, and test schedule information.
Evaluating a restructured university portal framework with reusable componentseSAT Journals
Â
Abs tract The loose coupling relation between components of a students' portal at a university is an essential concept to reduce the
dependency between these components on each others, and to increase the reusability of these components. This loose coupling
feature can be achieved by applying the distribution and interoperability between the components of the studentsâ portal. A recent
research has redefined the studentsâ portal framework and included distribution between the framework components to support
the reusability of these components, while no researches have been done to evaluate this framework that has distributed
interoperable components. This paper evaluates involving distribution and interoperability in the students' portal framework
using case study approach. The evaluation results have proved efficiency of componentsâ distribution and interoperability of the
students' portal framework.
Keywords: University Portal, Student Portal, Portal Framework, Reusable Components.
Buddi health class imbalance based deep learningRam Swaminathan
Â
BUDDI Health is a disruptive Deep Learning Platform which helps automate healthcare administrative functions such as Medical Coding, Claims Denial Prediction, Clinical Documentation Improvement and more.
WEB-BASED DATA MINING TOOLS : PERFORMING FEEDBACK ANALYSIS AND ASSOCIATION RU...IJDKP
Â
This paper aims to explain the web-enabled tools for educational data mining. The proposed web-based
tool developed using Asp.Net framework and php can be helpful for universities or institutions providing
the students with elective courses as well improving academic activities based on feedback collected from
students. In Asp.Net tool, association rule mining using Apriori algorithm is used whereas in php based
Feedback Analytical Tool, feedback related to faculty and institutional infrastructure is collected from
students and based on that Feedback it shows performance of faculty and institution. Using that data, it
helps management to improve in-house training skills and gains knowledge about educational trends which
is to be followed by faculty to improve the effectiveness of the course and teaching skills.
Review and analysis of machine learning and soft computing approaches for use...IJwest
Â
The adequacy of user models depends mainly on the accuracy and precision of information that is retrieved to the user. The real challenge in user modelling studies is due to the inadequacy of data, improper use of techniques, noise within the data and imprecise nature of human behavior. For the best results of user modelling, one should choose an appropriate way to do it i.e. by selecting the best suitable approach for the desired domain. Machine learning and Soft computing Techniques have the ability to handle the uncertainty and are extensively being used for user modeling purpose. This paper reviews various approaches of user modeling and critically analyzes the machine learning and soft computing techniques that have successfully captured and formally modelled the human behavior.
This paper introduces the competency models for Operations Manager, User Interface
Designer, and Application Developers. It will serve as a guide for Information Systems students
to identify which among the three of the offered tracks would be most suited for them to pursue
according to their knowledge, skills, values and interests. The Hollandâs RIASEC model and the
Values Search model of Bronwyn and Holt were utilized to determine the most dominant interest
and most dominant values of the industry computing experts. Survey assessment forms were sent
to IT Operations Manager, User Interface Designer, and Application Developer. Most dominant
values and interests of industry computing experts were determined as well as the knowledge
and skills which are mostly required by the industry in their particular area. Based on the result
of the survey, it shows that application developer and user interface designer have a closely
related values. Thus a second round of a survey would be needed to come up with the most
exclusive dominant values for the particular information systems specialization track.
The development of information technology should be ordered to improve the services including job fair information system
services. This work aimed to develop of web-based job fair information system. The methods used in this work consists of collecting
data method, and software development method. Collecting data method using observations, interview, and literature study. Software
development method using waterfall model comprising the steps of requirements, specfification and design, implementation, testing,deployment, and maintenance. The results of this work is software web-based information system provided a job information,registration, and test schedule information.
Evaluating a restructured university portal framework with reusable componentseSAT Journals
Â
Abs tract The loose coupling relation between components of a students' portal at a university is an essential concept to reduce the
dependency between these components on each others, and to increase the reusability of these components. This loose coupling
feature can be achieved by applying the distribution and interoperability between the components of the studentsâ portal. A recent
research has redefined the studentsâ portal framework and included distribution between the framework components to support
the reusability of these components, while no researches have been done to evaluate this framework that has distributed
interoperable components. This paper evaluates involving distribution and interoperability in the students' portal framework
using case study approach. The evaluation results have proved efficiency of componentsâ distribution and interoperability of the
students' portal framework.
Keywords: University Portal, Student Portal, Portal Framework, Reusable Components.
Buddi health class imbalance based deep learningRam Swaminathan
Â
BUDDI Health is a disruptive Deep Learning Platform which helps automate healthcare administrative functions such as Medical Coding, Claims Denial Prediction, Clinical Documentation Improvement and more.
Design an expert system for students graduation projects in Iraq universities...IJECEIAES
Â
A graduation project is a form or work that the study authority requests from the student to measure what he made during the study. Designed an expert system for studentsâ graduation projects at the University of Basrah for students who are obligated to submit a project that qualifies them to graduate from the university. The system works according to a set of requirements, the most important is first: The student's possession of a high rate that qualifies him for the project. Second: he must possess half of the skills required for the project provided that it includes at least one programming language example (c ++, java, PHP, c #, etc ...). The system has many features that help the Supervisors and Students Committee to manage students' projects efficiently. System is built as a web-based system, with access limited only to the university's local network.
An Approach to Automate the Relational Database Design Process ijdms
Â
Information and Communication Technology improves the business competitiveness in both large scale
enterprises as well as small and medium scale enterprises. Lack of technical knowledge in Information
Communication Technology and the cost have been identified as challenges forsmall and medium
enterprises to adopt ICT for their businesses. They can overcome this problem by using freely available
tools/systems which aid to generate information systems automatically. However,they require the database
structure; therefore, it is desirable to have a tool to automate the relational database design process. In the
proposed approach, business forms were considered as the database requirement input sources among:
learning from examples, natural language, structured input/output definition and schema definition and
forms. The approach uses a functional dependency algorithm on the un-normalized data which is fed
through the business form and then apply a normalization algorithm onthe discovered functional
dependencies to have the normalized database structure. User intervention is needed to have the domain
knowledgeof this approach. Finally, it develops the normalized database with all the keys and
relationships; the accuracy of the out-come totally depend on the data fed by end users.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
VII Jornadas eMadrid "Education in exponential times". Learning Analytics Imp...eMadrid network
Â
VII Jornadas eMadrid "Education in exponential times". Learning Analytics Implementation in a Multidomain Computer-Based Learning Environment. Omar Alvarez-Xochihua Universidad AutĂłnoma de Baja California. 04/07/2017.
Towards a new ontology of the Moroccan Post-baccalaureate learner profile for...iosrjce
Â
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
STUDENTSâ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUEIJDKP
Â
A high prediction accuracy of the studentsâ performance is more helpful to identify the low performance students at the beginning of the learning process. Data mining is used to attain this objective. Data mining techniques are used to discover models or patterns of data, and it is much helpful in the decision-making.Boosting technique is the most popular techniques for constructing ensembles of classifier to improve the classification accuracy. Adaptive Boosting (AdaBoost) is a generation of boosting algorithm. It is used for
the binary classification and not applicable to multiclass classification directly. SAMME boosting
technique extends AdaBoost to a multiclass classification without reduce it to a set of sub-binaryclassification.In this paper, studentsâ performance prediction system usingMulti Agent Data Mining is proposed to predict the performance of the students based on their data with high prediction accuracy and provide helpto the low students by optimization rules.The proposed system has been implemented and evaluated by investigate the prediction accuracy ofAdaboost.M1 and LogitBoost ensemble classifiers methods and with C4.5 single classifier method. The results show that using SAMME Boosting technique improves the prediction accuracy and outperformed
C4.5 single classifier and LogitBoost.
Transformation of WSDL files using ETL in the E-orientation domain IJECEIAES
Â
The E-orientations platforms become an essential space for students to base their choice on tangible elements, as they offer a macroscopic view of the different academic and professional fields. In this context the Center for Engineering Sciences and Applied Sciences âSISAâ funded the MMS orientation project to focus on student orientation in Morocco. With respect to the peculiarity and the different characteristics of the E-orientation platforms, a comparative study is essential. In this article we will proceed by a comparative study of a sample of platforms in order to highlight the major functionalities that we will model through descriptive files. The work is divided into two parts: The first part will be a comparison and description of existing platforms using descriptive language (WSDL), the second part will use ETL as a transformation technology in order to highlight generic files that will serve as a basis for work. The expected meta model.
Chapter 2 Evaluation of E-Portfolio Systems Klaus Himpsl & Peter BaumgartnerDaniel Dufourt
Â
Buzzetto-More, N. (Eds.). (2010).
The E-Portfolio Paradigm:
Informing, Educating, Assessing and Managing with E-Portfolios
Santa Rosa, California: Informing Science Press. (pp. 19-33).
Predicting students' performance using id3 and c4.5 classification algorithmsIJDKP
Â
An educational institution needs to have an approximate prior knowledge of enrolled students to predict
their performance in future academics. This helps them to identify promising students and also provides
them an opportunity to pay attention to and improve those who would probably get lower grades. As a
solution, we have developed a system which can predict the performance of students from their previous
performances using concepts of data mining techniques under Classification. We have analyzed the data
set containing information about students, such as gender, marks scored in the board examinations of
classes X and XII, marks and rank in entrance examinations and results in first year of the previous batch
of students. By applying the ID3 (Iterative Dichotomiser 3) and C4.5 classification algorithms on this data,
we have predicted the general and individual performance of freshly admitted students in future
examinations.
Larmer Brown & dominKnow Learning Systems Learning Technologies Seminar Prese...Larmer Brown
Â
Larmer Brown & dominKnow Learning Systems provide an insight into combining Process Modelling, Content Development and Content Management to deliver a bespoke and affordable Learning solution.
Design an expert system for students graduation projects in Iraq universities...IJECEIAES
Â
A graduation project is a form or work that the study authority requests from the student to measure what he made during the study. Designed an expert system for studentsâ graduation projects at the University of Basrah for students who are obligated to submit a project that qualifies them to graduate from the university. The system works according to a set of requirements, the most important is first: The student's possession of a high rate that qualifies him for the project. Second: he must possess half of the skills required for the project provided that it includes at least one programming language example (c ++, java, PHP, c #, etc ...). The system has many features that help the Supervisors and Students Committee to manage students' projects efficiently. System is built as a web-based system, with access limited only to the university's local network.
An Approach to Automate the Relational Database Design Process ijdms
Â
Information and Communication Technology improves the business competitiveness in both large scale
enterprises as well as small and medium scale enterprises. Lack of technical knowledge in Information
Communication Technology and the cost have been identified as challenges forsmall and medium
enterprises to adopt ICT for their businesses. They can overcome this problem by using freely available
tools/systems which aid to generate information systems automatically. However,they require the database
structure; therefore, it is desirable to have a tool to automate the relational database design process. In the
proposed approach, business forms were considered as the database requirement input sources among:
learning from examples, natural language, structured input/output definition and schema definition and
forms. The approach uses a functional dependency algorithm on the un-normalized data which is fed
through the business form and then apply a normalization algorithm onthe discovered functional
dependencies to have the normalized database structure. User intervention is needed to have the domain
knowledgeof this approach. Finally, it develops the normalized database with all the keys and
relationships; the accuracy of the out-come totally depend on the data fed by end users.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
VII Jornadas eMadrid "Education in exponential times". Learning Analytics Imp...eMadrid network
Â
VII Jornadas eMadrid "Education in exponential times". Learning Analytics Implementation in a Multidomain Computer-Based Learning Environment. Omar Alvarez-Xochihua Universidad AutĂłnoma de Baja California. 04/07/2017.
Towards a new ontology of the Moroccan Post-baccalaureate learner profile for...iosrjce
Â
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
STUDENTSâ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUEIJDKP
Â
A high prediction accuracy of the studentsâ performance is more helpful to identify the low performance students at the beginning of the learning process. Data mining is used to attain this objective. Data mining techniques are used to discover models or patterns of data, and it is much helpful in the decision-making.Boosting technique is the most popular techniques for constructing ensembles of classifier to improve the classification accuracy. Adaptive Boosting (AdaBoost) is a generation of boosting algorithm. It is used for
the binary classification and not applicable to multiclass classification directly. SAMME boosting
technique extends AdaBoost to a multiclass classification without reduce it to a set of sub-binaryclassification.In this paper, studentsâ performance prediction system usingMulti Agent Data Mining is proposed to predict the performance of the students based on their data with high prediction accuracy and provide helpto the low students by optimization rules.The proposed system has been implemented and evaluated by investigate the prediction accuracy ofAdaboost.M1 and LogitBoost ensemble classifiers methods and with C4.5 single classifier method. The results show that using SAMME Boosting technique improves the prediction accuracy and outperformed
C4.5 single classifier and LogitBoost.
Transformation of WSDL files using ETL in the E-orientation domain IJECEIAES
Â
The E-orientations platforms become an essential space for students to base their choice on tangible elements, as they offer a macroscopic view of the different academic and professional fields. In this context the Center for Engineering Sciences and Applied Sciences âSISAâ funded the MMS orientation project to focus on student orientation in Morocco. With respect to the peculiarity and the different characteristics of the E-orientation platforms, a comparative study is essential. In this article we will proceed by a comparative study of a sample of platforms in order to highlight the major functionalities that we will model through descriptive files. The work is divided into two parts: The first part will be a comparison and description of existing platforms using descriptive language (WSDL), the second part will use ETL as a transformation technology in order to highlight generic files that will serve as a basis for work. The expected meta model.
Chapter 2 Evaluation of E-Portfolio Systems Klaus Himpsl & Peter BaumgartnerDaniel Dufourt
Â
Buzzetto-More, N. (Eds.). (2010).
The E-Portfolio Paradigm:
Informing, Educating, Assessing and Managing with E-Portfolios
Santa Rosa, California: Informing Science Press. (pp. 19-33).
Predicting students' performance using id3 and c4.5 classification algorithmsIJDKP
Â
An educational institution needs to have an approximate prior knowledge of enrolled students to predict
their performance in future academics. This helps them to identify promising students and also provides
them an opportunity to pay attention to and improve those who would probably get lower grades. As a
solution, we have developed a system which can predict the performance of students from their previous
performances using concepts of data mining techniques under Classification. We have analyzed the data
set containing information about students, such as gender, marks scored in the board examinations of
classes X and XII, marks and rank in entrance examinations and results in first year of the previous batch
of students. By applying the ID3 (Iterative Dichotomiser 3) and C4.5 classification algorithms on this data,
we have predicted the general and individual performance of freshly admitted students in future
examinations.
Larmer Brown & dominKnow Learning Systems Learning Technologies Seminar Prese...Larmer Brown
Â
Larmer Brown & dominKnow Learning Systems provide an insight into combining Process Modelling, Content Development and Content Management to deliver a bespoke and affordable Learning solution.
IluminaciĂłn Online, apliques de pared, lĂĄmparas rĂșsticas, lĂĄmparas clĂĄsicas de brazos, lĂĄmparas retro, lĂĄmparas de pared, lĂĄmparas empotrables, lĂĄmparas de techo, lĂĄmparas de estudio y lĂĄmparas de jardĂn y exterior. Puedes contactar con nosotros en www.iluminable.com. Somo distribuidores de MIMAX ILUMINACIĂN
Innovation/Public: Denken in GeschÀfts- und Gemeindemodellen?Roland Schegg
Â
PwC als Partner an der ersten Tagung fĂŒr das Gemeinde- und StĂ€dtepersonal mit einem konkreten Workshop. --> Braucht die öffentliche Hand Innovation? Falls ja, wie viel? Wie könnte Innovation konkret aussehen, und wie bekommen wir diese besser in die öffentliche Verwaltung? Ist vielleicht schon mehr Innovation vorhanden, als wir zunĂ€chst erkennen? Viel Innovation kommt gerade in der Schweiz von der Basis, also von den Mitarbeitenden, die tĂ€glich nahe bei Prozessen oder BĂŒrgerschaft arbeiten. Teils sind es viele, unauffĂ€llige Teilschritte, die zu innovativer VerĂ€nderung fĂŒhren. Wie könnte das Potential und die KreativitĂ€t besser gefördert werden? Dieser Workshop stellt die GeschĂ€ftsmodell-Perspektive als pragmatische Diskussionsgrundlage vor. In einer offenen Diskussion folgt sogleich die Anwendung dieses bewĂ€hrten Ansatzes. Gemeinsam denken wir ĂŒber VerĂ€nderungen, Potentiale und letztlich Innovation konkret nach.
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVALijcsit
Â
In this current technological era, there is an enormous increase in the information available on web and
also in the online databases. This information abundance increases the complexity of finding relevant
information. To solve such challenges, there is a need for improved and intelligent systems for efficient
search and retrieval. Intelligent Agents can be used for better search and information retrieval in a
document collection. The information required by a user is scattered in a large number of databases. In this
paper, the object oriented modeling for agent based information retrieval system is presented. The paper
also discusses the framework of agent architecture for obtaining the best combination terms that serve as
an input query to the information retrieval system. The communication and cooperation among the agents
are also explained. Each agent has a task to perform in information retrieval.
Requirement analysis, architectural design and formal verification of a multi...ijcsit
Â
This paper presents an approach based on the analysis, design, and formal verification of a multi-agent
based university Information Management System (IMS). University IMS accesses information, creates
reports and facilitates teachers as well as students. An orchestrator agent manages the coordination
between all agents. It also manages the database connectivity for the whole system. The proposed IMS is
based on BDI agent architecture, which models the system based on belief, desire, and intentions. The
correctness properties of safety and liveness are specified by First-order predicate logic.
Building a recommendation system based on the job offers extracted from the w...IJECEIAES
Â
Recruitment, or job search, is increasingly used throughout the world by a large population of users through various channels, such as websites, platforms, and professional networks. Given the large volume of information related to job descriptions and user profiles, it is complicated to appropriately match a user's profile with a job description, and vice versa. The job search approach has drawbacks since the job seeker needs to search a job offers in each recruitment platform, manage their accounts, and apply for the relevant job vacancies, which wastes considerable time and effort. The contribution of this research work is the construction of a recommendation system based on the job offers extracted from the web and on the e-portfolios of job seekers. After the extraction of the data, natural language processing is applied to structured data and is ready for filtering and analysis. The proposed system is a content-based system, it measures the degree of correspondence between the attributes of the e-portfolio with those of each job offer of the same list of competence specialties using the Euclidean distance, the result is classified with a decreasing way to display the most relevant to the least relevant job offers
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...IJCI JOURNAL
Â
There has always been a struggle for programmers to identify the errors while executing a program- be it
syntactical or logical error. This struggle has led to a research in identification of syntactical and logical
errors. This paper makes an attempt to survey those research works which can be used to identify errors as
well as proposes a new model based on machine learning and data mining which can detect logical and
syntactical errors by correcting them or providing suggestions. The proposed work is based on use of
hashtags to identify each correct program uniquely and this in turn can be compared with the logically
incorrect program in order to identify errors.
Agent-SSSN: a strategic scanning system network based on multiagent intellige...IJERA Editor
Â
This article reports a development of a strategic scanning system network prototype system based on multi agent
system and ontology, called Agent-SSSN, for developing business intelligent strategies. This is a cooperative
approach to integrate the knowledge of experts in business intelligent system. The approach presented in this
chapter is targeted towards using ontologies. The use of ontologies in MAS environment enables agent to share
a common set of concept about context, expert user profiles and other domain elements while interacting with
each other. In this paper, we focus especially on the modeling of the system Multi-Agents using O-MaSE
(Organization-based Multiagent Systems Engineering Methodology) and a conceptual diagram of the ontology
database.
Information Extraction using Rule based Software Agents in Knowledge Grididescitation
Â
For the successful information processing and
handling of document collections, effective information
extraction methods are necessary. A distributed team work
environment requires team knowledge management. A
knowledge flow exists in team work processes and this
knowledge flow reflects the knowledge level cooperation in
team work, which in turn defines the effectiveness of team
work. Distributed software development team focuses on work
co-operation and resource sharing between members during
software development life cycle and knowledge flow should
reflect cognitive cooperation process dynamically. Hence each
team member can use experience of predecessor accumulated
during previous projects and avoid redundant work. With the
advent of the networks, the system specification is done in
one geographic area and the design in some other place. The
entire software development process has distributed resources
such as five generic up-level ontologies and a knowledge based
[KB] issues and solutions ontology. An issue and solution pair
criteria is based on organizational goals, priorities, cost and
timeliness. In this paper, we present the challenges in
distributed team environment and information extraction
mechanisms focusing on text marker system and its
applications.
An Elite Model for COTS Component Selection ProcessIJEACS
Â
Component-based software development (CBD) promises development of high-quality trustworthy software systems within specified budget and deadline. The selection of the most appropriate component based on specific requirement plays a vital role for high-quality software product. Multi-Agent software (MAS) engineering approach played a crucial role for selection of the most appropriate component based on a specific requirement in a distributed environment. In this paper, multi agent technique is used for component selection. A semi-automated solution to COTS component selection is proposed. It is evident from the result that (MAS) plays an essential role and is suitable for component selection in a distributed environment keeping in view of the system design and testing strategies.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Â
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Â
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as âpredictable inferenceâ.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Â
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
Â
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more âmechanicalâ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
Â
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatâs changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Â
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Â
As AI technology is pushing into IT I was wondering myself, as an âinfrastructure container kubernetes guyâ, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefitâs both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
2. 44 Computer Science & Information Technology (CS & IT)
examination. These parameters are course specific. The information about these parameters is
obtained from the forms. The next step is to verify the information provided in the forms. This
scrutiny is done by responsible persons of institution on the basis of documents attached along
with forms. Thus scrutiny is a tedious, error-prone and knowledge intensive task. There is a need
to automate the above task and this is feasible by employing agents to capture knowledge
automatically from the web and to compare with the information available in the forms. Such an
automated system based on agents with knowledge capturing capabilities is presented in this
paper and referred to as MASAF in the rest of the paper. Section 2 highlights the review of
literature. Design of MASAF is presented in section 3. Section 4 includes implementation details,
testing and results. Section 5 contains conclusions and scope for future work.
2. RELATED WORK
In this section work performed by many researchers related to Multiagent system and
applications in academics and knowledge capture is reviewed and presented.
The authors in [1] present knowledge and information network approach for managing research
assets in a knowledge-oriented organization using a Multiagent system. The integration of
existing knowledge and information technologies to develop new ways to manage scientific and
technical knowledge in modern organizations is the challenge addressed in this article.
Multi-Agent System for University Course Timetable Scheduling: MAS_UP-UCT is described in
[2]. The problem is divided into two sub problems: 1. Faculty course timetable scheduling (which
involves only allocation of course day and time), and 2. University course rooms allocation
(which involves allocation of rooms for courses). Four types of agents are used by the system:
Main Scheduler Agent (MSA), Faculty Scheduler Agent (FSA), Expert Assistant Agent (EAA),
and Personal Agent (PA). Each faculty has a FSA which has to schedule the courses of that
faculty.
The details of Campus Automation Web Information System (CAWIS) project is discussed in
[3]. The Multi agent System is used for course planning, resource allocation, class timetabling,
and office allocation, exam scheduling and other administrative and organizational activities of
the university. The six basic agents defined are: (i) Students Agent (ii) Training and Learning
Agent (iii) Lecturer Agent (iv) Infrastructure Agent (v) Task Agent (vi) Strategical / Goal Agent
.
In [4] authors explain how wrappers are able to accept a query against the source and return a set
of structured results, thus enabling applications to access web data in a similar manner to that of
information from databases. A significant problem in this approach arises as Web sources may
undergo changes that invalidate the current wrappers. Thus authors have presented novel
heuristics and algorithms to address this problem.
In [5] Authors present their experience in building Information Retrieval (IR) systems using
Multiagent technology. In particular they presented their results in using X.MAS, a generic
Multiagent architecture aimed at retrieving, filtering and reorganizing information according to
user interests.
3. Computer Science & Information Technology (CS & IT) 45
3. DESIGN OF MULTIAGENT SYSTEM FOR SCRUTINY OF ADMISSION
FORMS (MASAF)
In this section roles and responsibilities of agents, ontology design, agentsâ design and agent
interaction are discussed.
3.1 Agents and their Responsibilities
Based on requirement to achieve goals as specified in goal diagram (created using agent tool [6])
shown in Figure 1, three agents are defined in MASAF model: Form agent, Record agent and
Scrutiny agent. These three agents together perform the job of persons who are responsible for
checking a list of application forms for validity of various fields by verifying certificates, marks
lists and other documents and pointing out the discrepancies observed.
The Multiagent model of MASAF is shown in Figure 2. MASAF mainly consists of three agents
but fourth agent gateway agent is kept as mediator between user and system thus it is not
considered as part of the system itself. In the model the capabilities possessed by all the three
agents are shown with âpossessâ tag. Three agents are chosen because there are three cohesive
tasks which need to be performed namely: retrieving applications, capturing knowledge about
key fields and comparison of information. Individual responsibilities of these three agents are as
follows:
Form Agent:
This agent retrieves the applications one by one from the website (in case third party is
employed), or database of the organisation which is going to admit the students and save it in the
database specifically created for MASAF. The key fields like roll number of qualifying
examination, year of passing are communicated to the next agent i.e. record agent using Agent
Communication Language (ACL) messages.
Record Agent:
Based on the key field values received from form agent the record agent logs on to relevant
websites such as the board/university in which student studied. From these websites record agent
captures knowledge about various attributes of the candidate like total marks, subjects studied
etc. These attributes contribute to assignment of different weightages in the creation of merit list.
The captured knowledge is kept in database as well as communicated to scrutiny agent using
ACL messages.
Scrutiny Agent:
The scrutiny agent performs the comparison of information in the application forms, stored in
local database, with that communicated by record agent. On the basis of comparison Scrutiny
agent points out discrepancies (if any) present in the application forms.
Thus the scrutiny of applications by accessing relevant data, verifying and highlighting
discrepancies is performed with the cooperative and joint efforts of all the three agents in
MASAF.
4. 46 Computer Science & Information Technology (CS & IT)
Figure 1. Goal diagram for MASAF
Figure 2. Agent Model for MASAF
3.2 Ontology Design
In the context of knowledge sharing and agent communication, the term ontology is used as
a specification of a conceptualization. That is, an ontology is a description (like a formal
specification of a program) of the concepts and relationships that can exist for an agent or a
community of agents. In MASAF Ontology is stored in a frame-based knowledge model [7] .This
model consists of classes i.e. concepts in the domain of discourse, slots i.e. properties or
attributes of these classes and Facets which describe properties of slots. The design of the
ontology for MASAF is called AcademicOntology. Conforming the model the following Agent
Actions are defined:
âą StartRetrievingForms, i.e. start retrieval of forms from website.
âą StartRetrievingRecords i.e. start capturing knowledge about admission seekers.
âą StartScrutiny i.e. start finding discrepancies in forms (if any)
The agent actions use both concepts and relations. The following primitive concepts are defined:
âą Form: An entity which contains entire information about individual admission seeker.
âą PrimInfo: Primitive Information about admission seeker required to capture knowledge
about him/her from web.
6. 48 Computer Science & Information Technology (CS & IT)
form is new or not by checking whether form with same form number is present in systemâs
database already or not. However while retrieving forms form agent keeps sending values of key
fields to record agent so that it can keep working in parallel.
Record Agent: This agent implements the cyclic behavior i.e. whenever form agent sends key
fields this agent starts its work on the basis of these key fields. Firstly this agent on the basis of
previous board/university wraps up the website of that board/university. Wrapping simply means
controlling the website by means of code rather than by human [4]. After that it retrieves detailed
record of the student from website on the basis of roll number. Detailed record retrieved contains
knowledge on the basis of which scrutiny takes place. The attributes in detailed record include
total marks, subjects studied, subjects passed and so on. In order to retrieve information about
various attributes of student this agent has to parse the detailed record page of different board
websites. Parsing is required because data presented in websites is semi-structured in nature. So
agent makes use of defined algorithm to capture required knowledge from semi-structured
information in web page. This knowledge is passed to scrutiny agent as well as saved in systemâs
database for future reference.
Scrutiny Agent: This agent implements cyclic behavior, i.e. whenever request for scrutiny
comes this agent executes behavior of verifying information in application form with that
provided by record agent. If there are any discrepancies they are reported to the user and also
saved in database for future reference.
Gateway Agent: This agent acts as a mediator between user interface and MASAF. This agent
passes requests made on user interface to the system by converting the request into proper ACL
messages and returns results to user interface from MASAF which are in different format than to
be shown on user interface.
3.4 Agent Interaction
The three agents in MASAF communicate with each other using Agent communication Language
(ACL) messages on the basis of predefined ontology. ACL is a specification by Foundation for
Intelligence Agents (FIPA) for intercommunication of agents.
In MASAF model firstly gateway agent sends ACL message to form agent with intention
REQUEST, action specifying âStartFormRetrievalâ and content containing ontology concept
âCourseWeightageâ class which specify course for which scrutiny to take place.
Further Form agent sends ACL message to Record agent with intention REQUEST, action
specifying âStartRecordsRetrievalâ and content containing ontology concept âPrimInfoâ which
contains key fields.
In next interaction record agent sends ACL message to scrutiny agent with intention REQUEST,
action specifying âStartScrutinyâ and content containing ontology class âCaptKnowledgeâ which
contains values of key attributes. On the basis of provided information scrutiny agent verifies
application form and saves discrepancies and sends them to gateway agent as ACL message with
content having âDiscrepancyâ ontology class. The gateway agent finally retrieves information
from this class and shows it on user interface. Interaction amongst agents expressed in Agent
Unified Modelling Language is shown in Figure 4.
7. Computer Science & Information Technology (CS & IT)
Figure 4. Interaction diagram of agents
4. IMPLEMENTATION
In section 4.1 tools and techniques used for creation of MASAF are discussed and in section 4.2
testing and results are presented.
4.1 Tools and Techniques
Agents are created in Java Agent Development Environment (JADE). User interface of the
system is provided by means of Java
is working as a mediator between Java EE user interface and multiagent system created on JADE
platform. Agents Communicate with each other using messages created using Agent
Communication Language (ACL) frame
In order to retrieve data from websites both form and record agent use similar technique. This
technique involves wrapping the website [4] and parsing the semi
Computer Science & Information Technology (CS & IT)
Figure 4. Interaction diagram of agents
niques used for creation of MASAF are discussed and in section 4.2
testing and results are presented.
Agents are created in Java Agent Development Environment (JADE). User interface of the
system is provided by means of Java Enterprise Edition (Java EE) Servlets. JADE Gateway agent
is working as a mediator between Java EE user interface and multiagent system created on JADE
Communicate with each other using messages created using Agent
ACL) framework which is available with JADE.
Figure 5. Results of Scrutiny
In order to retrieve data from websites both form and record agent use similar technique. This
technique involves wrapping the website [4] and parsing the semi-structured data in HTML and
49
niques used for creation of MASAF are discussed and in section 4.2
Agents are created in Java Agent Development Environment (JADE). User interface of the
Enterprise Edition (Java EE) Servlets. JADE Gateway agent
is working as a mediator between Java EE user interface and multiagent system created on JADE
Communicate with each other using messages created using Agent
In order to retrieve data from websites both form and record agent use similar technique. This
structured data in HTML and