17 research outputs found

    A middle agent based super architecture for scalable and efficient service discovery

    Get PDF
    It is typical that in a multi-agent system there exist service requestor agents that search for suitable service provider agents to solve specific problems.In this environment, service discovery can be achieved with the use of a middle agent (MA) who provides matchmaking services.Multiple federated MAs can be employed and dynamically discovered to avoid bottleneck problem and single point of failure.In addition, a peer-to-peer (P2P)network can be utilized for a wider scope of discovery.In this paper, we propose a middle agent based super peer architecture (MESRA) for wide area service discovery.We explore scalable and efficient discovery through exploration which results in the formation of similar overlay networks and monitoring which caches service requests results.Simulation experiments show that MESRA provides better performance as compared to discovery through purely super peer (PSP) and Gnutella based overlay network

    Product assembly and disassembly sequence optimization based on genetic algorithm and design for assembly methodologies

    Get PDF
    Product assembly and disassembly sequences are the most crucial operations in product lifecycle. In this paper, an Artificial Intelligence (AI) technique, namely Genetic Algorithm (GA) is proposed to optimize product components assembly and disassembly sequences.The proposed methodology is developed and tested on an industrial product made of plastics with no integrated assembly and permanent joint parts.GA method is applied to determine the accuracy and optimum results based on 20 assembly and disassembly sequence solutions that was generated by the Design for Assembly methodology.The results indicated that GA based approach is able to obtain a near optimal solution for assembly and disassembly sequences

    Securing library information system: Vulnerabilities and threats

    Get PDF
    Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet. Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats

    Aplikasi konsep library 2.0 dalam perkhidmatan dan pengurusan sumber maklumat elektronik

    Get PDF
    OPAC merupakan perkhidmatan tradisi perpustakaan yang mengamalkan pendekatan komunikasi sehala.Begitu juga dengan perkhidmatan sumber maklumat elektronik yang ditawarkan oleh kebanyakan pembekal pangkalan data maklumat elektronik.Kertas ini akan membincangkan secara ringkas konsep dan aplikasi Web 2.0 dan Library 2.0 meliputi definisi, teknologi yang digunakan dan beberapa laman web yang mengaplikasikan konsep Web 2.0.Perpustakaan konvensional mengamalkan komunikasi maklumat sehala berbanding dengan konsep Library 2.0 yang menitikberatkan komunikasi maklumat berbagai hala.Library 2.0 memberikan keutamaan kepada pengguna perpustakaan untuk menyumbangkan pengalaman dan pandangan mereka terhadap koleksi dan perkhidmatan perpustakaan.Library 2.0 bolehlah dikatakan perkhidmatan perpustakaan dari perspektif pengguna dan boleh menarik minat pengguna untuk memperkayakan sumber maklumat.‘Enhanced OPAC’ juga dikenali OPAC 2.0 melibatkan perlaksanaan fungsi baru dalam sistem pencari maklumat, penggunaan teknologi terkini untuk pertukaran data, kandungan tambahan yang memberi penerangan lanjut berhubung dengan bahan dalam koleksi perpustakaan, berupaya menggunakan perkhidmatan pihak ketiga dan penggunaan aplikasi Web 2.0.Pengguna akan memperolehi maklumat yang lebih terperinci berkaitan bahan dalam koleksi perpustakaan dan juga boleh menyumbangkan pandangan mereka terhadap koleksi perpustakaan di masa hadapan.Kertas ini menerangkan konsep dan kaedah mengaplikasikan konsep Library 2.0 untuk meningkatkan keupayaan perkhidmatan OPAC dan memuaskan keperluan pengguna terutamanya generasi kini yang dikenali ‘Net Generation’

    RSA algorithm performance in short messaging system exchange environment

    Get PDF
    Short Message Service (SMS) is a widely service for brief communication.With the rise of mobile usage it has become a popular tool for transmitting sensitive information. This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. This report explains and documents the process of implementing an RSA in Experimental SMS Exchange Environment using J2ME language which is available in several mobile devices on the market today

    Product assembly sequence optimization based on genetic algorithm

    Get PDF
    Genetic algorithm (GA) is a search technique used in computing to find approximate solution to optimization and search problem based on the theory of natural selection. This study investigates the application of GA in optimizing product assembly sequences. The objective is to minimize the time taken for the parts to be assembled into a unit product. A single objective GA is used to obtain the optimal assembly sequence, exhibiting the minimum time taken. The assembly experiment is done using a case study product and results were compared with manual assembly sequences using the ‘Design for Assembly’(DFA) method. The results indicate that GA can be used to obtain a near optimal solution for minimizing the process time in sequence assembly. This shows that GA can be applied as a tool for assembly sequence planning that can be implemented at the design process to obtain faster result than the traditional methods

    The vendor and user organizations characteristics for COTS software evaluation and selection

    Get PDF
    Since the Commercial off-the-shelf (COTS) software become widespread components in the market for building the systems with less time and cost, the COTS evaluation and selection becomes a non-trivial task. There are many models attempted to propose a set of characteristics for evaluating and selecting COTS software.However, these models have concentrated on the functional and quality characteristics of COTS software, leaving other effective characteristics related to vendor (the organization that developed, support, and realized COTS software) and user (the organization that integrated and used COTS software) organizations. Therefore, this paper proposed a set of important characteristics relevant to the vendor and user organizations that play important role to discriminate between COTS alternatives in COTS evaluation and selection process.Most of the related studies have been analyzed and carefully studied in the literature to identify and propose these characteristics together with their attributes and associated metrics

    A problem based learning model for IT courses

    Get PDF
    A problem that always occurs in the implementation of PBL is inappropriate course assessment, the out-of-context conversation, unbalanced group formation and improper facilitation.In addition, a comprehensive PBL model that considers those factors has not been performed yet.Thus, this paper aims to determine the effective factors that might influence IT students’ perception on the PBL practices.The study involved three (3) main phases: Initial Study, Modeling, and Validation. Four main factors have been identified: PBL Characteristics, Course Assessment, PBL Practices, and PBL Perception. Based on these four factors, a PBL model hasbeen constructed.Four hypotheses were formulated and analyzed.All hypotheses have been proven significantly acceptable.The results show that the PBL Characteristics and Course Assessment factors significantly influence the PBL Practices and indirectly influence the students’ perception on the PBL implementation for IT courses.This model can assist decision makers in enhancing the PBL teaching and learning strategy for IT courses

    Best practices of problem-based learning implementation for IT courses from students perspectives

    Get PDF
    Problem-based learning (PBL) is a powerful learning approach that leads to enhance and sustain learning towards student centered, problem focused, self-reflective learning, and self-directed learning. This may improve student ability in problem solving, critical thinking, work as a teamwork, and leadership.All these soft skills are important to IT students as a preparation for their future career development. Unfortunately, there is no statistical evidence to support the effectiveness of the PBL implementation as claim by many researchers. Therefore, the top management of Higher Education Institution (HEI) is really concerned with the effectiveness of the Problem-based Learning (PBL) implementation of certain courses in the university.The effectiveness of the PBL implementation is actually depends on the best practices of the PBL implementation of the IT courses.Thus, this study aims to identify the factors and the relationship among factors that influence the best practices of PBL implementation of IT courses from students' perspectives. The student perception of the PBL implementation of IT courses also take-in consideration as one of the effective measurement in this study.The student’s perception is important to ensure the successfulness of the PBL implementation.The study involved three (3) main phases: firstly PBL implementation factors are identified, secondly, a PBL model of IT courses is constructing, and finally, the proposed PBL model is validated using statistical analysis.Four main factors are identified: PBL Course Assessment, PBL Characteristics, PBL Practices, and Students’ Perception.Based on these four factors, a PBL model is constructed. Then, based on the proposed PBL model, six hypotheses are formulated and analyzed to validate the model.The results show that all hypotheses are significantly acceptable. The result also shows that the PBL Characteristics and PBL Course Assessment factors are significantly influenced the PBL Practices and indirectly influenced the Students’ Perception of the PBL Implementation for IT courses. This PBL model can assist instructors, decision makers in enhancing the PBL learning strategy of IT courses. It is also can be tested to other courses in various educational domains in the future
    corecore