• Title/Summary/Keyword: Software Agents

Search Result 222, Processing Time 0.02 seconds

An Adaptive Web Surfing System for Supporting Autonomous Navigation (자동항해를 지원하는 적응형 웹 서핑 시스템)

  • 국형준
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.4
    • /
    • pp.439-446
    • /
    • 2004
  • To design a user-adaptive web surfing system, we nay take the approach to divide the whole process into three phases; collecting user data, processing the data to construct and improve the user profile, and adapting to the user by applying the user profile. We have designed three software agents. Each privately works in each phase and they collaboratively support adaptive web surfing. They are IIA(Interactive Interface Agent), UPA(User Profile Agent), and ANA(Autonomous Navigation Agent). IIA provides the user interface, which collects data and performs mechanical navigation support. UPA processes the collected user data to build and update the user profile while user is web-surfing. ANA provides an autonomous navigation mode in which it automatically recommends web pages that are selected based on the user profile. The proposed approach and design method, through extensions and refinements, may be used to build a practical adaptive web surfing system.

Animation Support for Networked Virtual Environments (네트웍으로 연결된 가상환경을 위한 애니메이션 지원)

  • Ko, Hyeongseok;Lee, Ee-Taek;Jang, Ho-Wook
    • Journal of the Korea Computer Graphics Society
    • /
    • v.2 no.2
    • /
    • pp.29-36
    • /
    • 1996
  • This paper presents animation techniques and issues involved in virtual environments where the participants interact with each other through a network. The state of the participant should be collected at each local site, and broadcasted to the other sites. Because information exchange is minimal, animation techniques are applied to convert the incoming low DOF parameters into high DOF joint angles that completely determine the configuration of the agents at each frame. As a case study, a software system VRLOCO is introduced, which has been developed by the author over the last five years.

  • PDF

Multi-Agent System for On-line Bookstore Customers (온라인 서점 고객을 위한 멀티에이전트 시스템)

  • Kim, Jong-Wan;Kim, Sang-Dae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.2
    • /
    • pp.109-114
    • /
    • 2002
  • E-commerce customers can reduce purchasing cost by the help of comparison shopping agents that collect price information of products in the shopping malls. However, user expects a software agent that can recommend product information satisfying various purchase conditions besides price. In this paper, we present a MAS (multi-agent system) which retrieves and recommends book information suitable for various user needs to realize an agent-based E-Commerce. We implemented and tested our MAS to help on-line bookstore customers. From the results, we could provide E-commerce customers various book purchase conditions for several online bookstores in real-time.

Evolution and Maintenance of Proxy Networks for Location Transparent Mobile Agent and Formal Representation By Graph Transformation Rules

  • Kurihara, Masahito;Numazawa, Masanobu
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.151-155
    • /
    • 2001
  • Mobile agent technology has been the subject of much attention in the last few years, mainly due to the proliferation of distributed software technologies combined with the distributed AI research field. In this paper, we present a design of communication networks of agents that cooperate with each other for forwarding messages to the specific mobile agent in order to make the overall system location transparent. In order to make the material accessible to general intelligent system researchers, we present the general ideas abstractly in terms of the graph theory. In particular, a proxy network is defined as a directed acyclic graph satisfying some structural conditions. In turns out that the definition ensures some kind of reliability of the network, in the sense that as long as at most one proxy agent is abnormal, there agent exists a communication path, from every proxy agent to the target agent, without passing through the abnormal proxy. As the basis for the implementation of this scheme, an appropriate initial proxy network is specified and the dynamic nature of the network is represented by a set of graph transformation rules. It is shown that those rules are sound, in the sense that all graphs created from the initial proxy network by zero or more applications of the rules are guaranteed to be proxy networks. Finally, we will discuss some implementation issues.

  • PDF

One-stop System Model of Port and Logistics using SCM (공급사슬망체계하에서의 수출입화물 원스톱서비스 시스템 개발에 관한 연구)

  • 박남규;김현수;조재형
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2000.11a
    • /
    • pp.43-51
    • /
    • 2000
  • Since 1996, the document exchange method by EDI has been introduced in port and logistics industries to enhance the declaration activities to the Pusan Port Authority and Customs. In spite of these efforts, users such as shipping companies, shipping agents, and freight forwarders have complained the inconvenience of using EDI systems. The major reasons can be summarized as too much transfer time, inconvenient EDI software, and problems on message receiving confirmation. To solve these problems, although we have developed an Internet based EDI system for Port-MIS users, we have failed its implementation practically for the short of Governments readiness, the complexity of systems and separation with in-house systems. So, the writers have changed the direction of research to applying the concept of SCM to logistics system by XML/EDI. In this Paper, the prototype systems to integrate processes of shipping company, Port Authority, Customs and stevedoring company will be suggested. The new method of EDI gives us advantages, which are the accuracy of cargo data and integration of processes among firms and keeping the service of cargo trace.

  • PDF

A Supply Chain Management based on Mobile Agents with Flexible Reply Scheme (유연한 응답 기능을 가지는 이동 에이전트에 기반을 둔 공급 체인 관리)

  • Jeong, Won-Ho;Nam, Hui-Jeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.439-450
    • /
    • 2001
  • Mobile agent is one of the promising ways of overcoming network load and latency. It is also a new software paradigm including those concepts of client/server, applet/servelet, and code-on-demand. In this paper, a new mobile agent concept with flexible replay scheme is proposed, which can deal with embarrassing situation when replying results should be accomplished in various distributed applications. For example, they are 1) a burden of bulky result, 2) a need of different replay scheme dependent on work type, 3) connection failure to the target node, and 4) a need of fast migration to next node to keep the itinerary. Regarding the source node, there may be another situation that it wants to be aware of whether its wi가 is completed or not. Three kinds of reply schemes are proposed for dealing flexibly with such situations. They are based on priority reply list where nodes to be replied are stored according to their priorities. An experimental supply chain management model using the proposed reply schemes is designed and implemented. It is one of good distributed applications appropriate for our reply schemes, because it requires different reply schemes according to work types and it is important to gather required information in time.

  • PDF

A Comparative Study on Behavior-based Agent Control for Computer Games

  • Kim, Tae-Hee
    • Journal of Korea Game Society
    • /
    • v.2 no.2
    • /
    • pp.37-45
    • /
    • 2002
  • Computer games could be regarded as simulation of the real world. Control problems of software agents have long been studied in the field of Artificial Intelligence (AI), resulting in giving a birth to the behavior-based approach. three main approaches might be categorized out of the history of AI study. First, Cognitivists propose that intelligence could be represented and manipulated in terms of symbols. Second, Connectionists claim that symbols could not be isolated but they are embedded in the body structure. Third, the behavior-based approach is an approach to AI which suggests that intelligence is dynamic property that exists nowhere but emerges in the relationship of an agent and the world including observers while the agent performs behavior. This paper explains and compares the three approaches to AI, then discusses the plausibility of the behavior-based approach and problems. Finally, this paper proposes application of behavior-based approach to computer games in terms of agent control.

  • PDF

Comparative Proteome Analysis of Cyanidin 3-O-glucoside Treated Helicobacter pylori

  • Kim, Sa-Hyun;Kim, Jong-Bae
    • Biomedical Science Letters
    • /
    • v.21 no.4
    • /
    • pp.233-240
    • /
    • 2015
  • Some virulence proteins of Helicobacter pylori, such as vacuolating cytotoxic protein A (VacA) and cytotoxin-associated gene protein A (CagA) have been reported to be causative agents of various gastric diseases including chronic gastritis, gastric ulcer or gastric adenocarcinoma. The expression level of these virulence proteins can be regulated when H. pylori is exposed to the antibacterial agent, cyanidin 3-O-glucoside (C3G) as previously reported. In this study, we analyzed the quantitative change of various virulence proteins including CagA and VacA by C3G treatment. We used 2-dimensional electrophoresis (2-DE) to analyze the quantitative change of representative ten proteome components of H. pylori 60190 ($VacA^+/CagA^+$; standard strain of Eastern type). After 2-DE analysis, spot intensities were analyzed using ImageMaster$^{TM}$ 2-DE Platinum software then each spot was identified using matrix assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF-MS) or peptide sequencing using Finnigan LCQ ion trap mass spectrometer (LC-MS/MS). Next, we selected major virulence proteins of H. pylori among quantitatively meaningful ten spots and confirmed the 2-DE results by Western blot analysis. These results suggest that cyanidin 3-O-glucoside can modulate a variety of H. pylori pathogenic determinants.

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

Differential Gene Expression Profiling in Human Promyelocytic Leukemia Cells Treated with Benzene and Ethylbenzene

  • Sarma, Sailendra Nath;Kim, Youn-Jung;Ryu, Jae-Chun
    • Molecular & Cellular Toxicology
    • /
    • v.4 no.4
    • /
    • pp.267-277
    • /
    • 2008
  • Benzene and ethylbenzene (BE), the volatile organic compounds (VOCs) are common constituents of cleaning and degreasing agents, paints, pesticides, personal care products, gasoline and solvents. VOCs are evaporated at room temperature and most of them exhibit acute and chronic toxicity to human. Chronic exposure of benzene is responsible for myeloid leukemia and also ethylbenzene is also recognized as a possible carcinogen. To evaluate the BE effect on human, whole human genome 35 K oligonucleotide microarray were screened for the identification of the differential expression profiling. We identified 280 up-regulated and 201 down-regulated genes changed by more than 1.5 fold by BE exposure. Functional analysis was carried out by using DAVID bioinformatics software. Clustering of these differentially expressed genes were associated with immune response, cytokine-cytokine receptor interaction, toll-like signaling pathway, small cell lung cancer, immune response, apoptosis, p53 signaling pathway and MAPKKK cascade possibly constituting alternative or subordinate pathways of hematotoxicity and immune toxicity. Gene ontology analysis methods including biological process, cellular components, molecular function and KEGG pathway thus provide a fundamental basis of the molecular pathways through BEs exposure in human lymphoma cells. This may provides a valuable information to do further analysis to explore the mechanism of BE induced hematotoxicity.