26 research outputs found

    Multi-agent reinforcement learning for route guidance system

    Get PDF
    Nowadays, multi-agent systems are used to create applications in a variety of areas, including economics, management, transportation, telecommunications, etc. Importantly, in many domains, the reinforcement learning agents try to learn a task by directly interacting with its environment. The main challenge in route guidance system is to direct vehicles to their destination in a dynamic traffic situation, with the aim of reducing travel times and ensuring efficient use of available road network capacity. This paper proposes a multi-agent reinforcement learning algorithm to find the best and shortest path between the origin and destination nodes. The shortest path such as the lowest cost is calculated using multi-agent reinforcement learning model and it will be suggested to the vehicle drivers in a route guidance system. The proposed algorithm has been evaluated based on Dijkstra's algorithm to find the optimal solution using Kuala Lumpur (KL) road network map. A number of route cases have been used to evaluate the proposed approach based on the road network problems. Finally, the experiment results demonstrate that the proposed approach is feasible and efficient

    Clustering of Indonesian forest fires using self organizing maps

    Get PDF
    This paper focuses on clustering the locations of Indonesian forest fires and visualizing them into a two-dimensional map using a self-organizing map (SOM) algorithm. The input data is based on the quantity of the hot spots of forest fires that spread in several locations within ten months period. We analyze the distributions of the hot spots locations of the regions that may have the high frequencies to risk of the forest fires disaster using the SOM algorithm. We have used a principal component analysis (PCA) to reduce the size of the original datasets in order to improve the accuracy of the clustering results. The SOM algorithm has been used to cluster and visualize the map of the hot spots locations into four groups based on the relative similarity of the risks of forest fires on each of the regions such as danger level, low level, high risks, and low risks. From the analysis we have found that a time period where the highest level of quantity and intensity of the forest fires occurs in some regions can be clearly classified

    Route selection of mobile agent for query retrieval using GA

    Get PDF
    Mobile agents often have a task to collect data from several predefined sites. This should be done in an efficient way by minimizing the elapsed time. Usually these agents only know the list of sites but not the distances between them. This paper proposes a method to minimize a network routing time taken by the mobile agents to collect information from different sites using genetic algorithm (GA). The mobile agents repeat travelling over short routes and avoid longer ones. Mobile agents for query retrieval have used the GA to select the best routes that minimize the query retrieval time. The result shows that the proposed method provides good time minimization in retrieving the query results by the mobile agents based on different GA parameters

    Web mining for Malaysia’s political social networks using artificial immune system

    Get PDF
    Currently, politic is one of the critical and hot issues in Malaysia. There are many aspects that are related with politics. These politic aspects are mainly about spreading rumors and information through cyberspace that created positive and negative effects to the political situations in Malaysia. There are many branches of cyberspace that can be used by the Internet users to channel their opinions such as websites, forums and blogs which contain the political issues in Malaysia. In this paper, we have analyzed an adaptive model of web mining using Artificial Immune System (AIS) to retrieve the list of URLs that have relevant information on political issues in Malaysia. In addition, we have also used a concept of social network analysis in order to understand the relationships among the websites and web pages related to the political issues in Malaysia. The results from this model have been used to analyze the social networks and the impact of online community which contribute to the outcome of Malaysia's 12th general election

    Analysis on the performance of mobile agents for query retrieval

    Get PDF
    The factors that affect the performance of mobile agents in retrieving information from the Internet are the number of agents and the total of routing time taken by the participated agents to complete the assigned tasks. Fewer numbers of mobile agents used to execute the tasks will cause lower network traffic and consume less bandwidth, and the total time taken to retrieve the query results can be minimized. In this paper, the performance of mobile agents for query retrieval is analyzed. Specifically, the performance of mobile agent in obtaining a query result from the remote hosts using an extended hierarchical query retrieval (EHQR) approach is proposed. It is based on a hierarchical and a parallel dispatching of mobile agents to the remote servers in order to retrieve the query results. Experimental results show that the proposed approach reduces the number of mobile agents and also improve the total time taken to retrieve the query results compared with other approaches

    Discrete mathematics for computer scientist

    Get PDF
    This book serves as an introduction to computer sciences students in the undergraduate levels. It will be used as the foundation to understand the discrete mathematic in developing the logic of computer programs. Since there are also similar undergraduate computer science programmes in other local and overseas institutions, this book is expected to find wider local and international readership. Topics covered in this book include set theory and relations, functions sequence and string, propositional logic, predicate logic, matrices, graph theory and trees. As the book serves as an introductory level to computer science students, it is expected that once the students are already familiar with the presented contents, it will enable them to understand the advanced topics in computer science such as advanced theory of computer science and computational complexity theories. The chapters in this book have been organized for the students to learn and understand the main concepts of discrete mathematics for developing computer applications during the period of their studies. In information technology (IT) and computer science fields, most of information is represented in digital electronics based on the basic knowledge of discrete mathematics. Therefore, discrete mathematics is one of the relevant courses to support students for better learning and understanding the nature of computer science and IT. It is expected that by using the materials presented in this book students should be able to write statements using mathematical language, develop mathematical arguments using logic, apply the concept of integers and its role in modeling and solving problems in IT, and apply the concept of graph and tree for modeling and solving problems related to real situations

    Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)

    Get PDF
    Strategic information systems planning and strategic information security are two different atributes in information systems world. Information systems security must be integrated with business plan (Wylder, 2003) and strategic information systems planning must be align with business plan. This study aims to investigate the contribution of information security attributes to the strategic information systems planning in the organization. Strategic information system planning (SISP) is an exercise or ongoing activities that enable organization to develop priorities for information system (IS) development (Doherty, 1999). SISP approach is a combination of method, process and implementation (Earl, 1993). As a new business strategies and information technologies are both rapidly moving targets, it is a very challenging task to produce an effective plan that achieves business objectives with efficient information systems support (Hevner et al. 2000). Organization invest very large amount of time and money in the SISP project. In a typical SISP project, term of key managers, users, selected clients, and IS specialist are formed (Hevner et al. 2000) and planning methodology is chosen. On the other hand, Information security planning is to mitigate risk associated with the processing of information with confidentially, integrity and authenticity (Wylder, 2003). Finally, this study will introduce a new model of SISP embedded with information security attributes based on previous literature on both SISP and strategic information security

    Strategic Information Systems Planning (SISP) and Strategic Information Security Planning (SISecP) In Malaysian Government Agencies

    Get PDF
    Strategic information systems and strategic information security are two different atributes in information systems world. Information systems security must be integrated with business plan[6] and strategic information systems planning must be align with business plan. This study aims to investigate the contribution of information security attributes to the strategic information systems planning in the organization especially to the Malaysian Government Agencies. Strategic information system planning (SISP) is an exercise or ongoing activities that enable organization to develop priorities for information system (IS) development[1]. A completes SISP approach is a combination of methods, processes and implementation[2]. As a new business strategies and information technologies are both rapidly moving targets, it is a very challenging task to produce an effective plan that achieves business objectives with efficient information systems support[3]. Organization invest very large amount of time and money in the SISP project. In a typical SISP project, term of key managers, users, selected clients, and IS specialist are formed[3] and planning methodology is chosen. On the other hand, Information security planning is to mitigate risk associated with the processing of information with confidentially, integrity and authenticity[6] with ten main domain areas as common body of knowledge in information security. Finally, this study will explore both attribute of SISP and SISecP usage in information systems planning

    A review on Geographical Information System (GIS) in town planning: Malaysia experience

    Get PDF
    Development growth in most developing countries has become one of the issues, as rapid planning process can no longer be controlled. Planning process is a widely accepted way to handle complex problems of resource allocation and decision making. Apparently, the planning system has an important role in managing and controlling the development trends. In Malaysia, to control, monitor and planning systematically town, the method used is development plan preparation method and urban development monitoring and the blue print method. However, the process has changed and planning process have to faced with complex town problems due to rapid development of the country. The rapid town development due to increasing population and economic growth have to faced an uncontrolled planning process and takes a long time to complete the process. Hence, to overcome the town planning problem by implementation Geographical Information System [GIS] as the main tool in plan making operations. GIS is able to support the town planning process in capable of input, storage, manipulation, analysis of data useful in planning, decision making and implementation. It is a powerful tool which helps the user to view the different scenarios so that the best strategy may be chosen for planning development. The use of GIS in town planning can develop database for the both data which attribute and spatial data. From that, it can generate planning needs analysis according to the Town and Country Planning Department. Therefore, this paper discusses the use of GIS in town planning. This paper will also highlight on how GIS is applied for town planning process in Malaysia level. The findings showed the implementation of GIS in town planning can improve the result based on quality of town planning process, saving time and costs and data can be obtained faster
    corecore