Impact Analysis of Intelligent Agents in Automatic Fault-Prone Components Prediction and Testing

2022 ◽  
pp. 746-776
Author(s):  
Jeya Mala Dharmalingam

Software quality is imperative for industrial strength software. This quality will be often determined by a few components present in the software which decides the entire functionality. If any of these components are not rigorously tested, the quality will be highly affected. Without knowing which of these components are really critical, it will not be possible to perform high level testing. Hence, to predict such fault-prone or critical components from the software prior to testing and prioritizing them during the testing process, an agent-based approach is proposed in this chapter. The framework developed as part of this work will certainly reduce the field failures and thus will improve the software quality. Further, this approach has also utilized important metrics to predict such components and also prioritized the components based on their critical value. Also, the work proposed in this research has also been compared with some of the existing approaches and the results reveal that, this work is a novel one and can both predict and test the components from the software.

Author(s):  
Jeya Mala Dharmalingam

Software quality is imperative for industrial strength software. This quality will be often determined by a few components present in the software which decides the entire functionality. If any of these components are not rigorously tested, the quality will be highly affected. Without knowing which of these components are really critical, it will not be possible to perform high level testing. Hence, to predict such fault-prone or critical components from the software prior to testing and prioritizing them during the testing process, an agent-based approach is proposed in this chapter. The framework developed as part of this work will certainly reduce the field failures and thus will improve the software quality. Further, this approach has also utilized important metrics to predict such components and also prioritized the components based on their critical value. Also, the work proposed in this research has also been compared with some of the existing approaches and the results reveal that, this work is a novel one and can both predict and test the components from the software.


Author(s):  
Pratik K. Biswas

The desire to flexibly customize software, manage it efficiently, and empower it with intelligence has driven research and development-related efforts toward intelligent agents. The benefits in terms of rapid delivery, reduced costs, and enhanced productivity can be realized in the areas of systems and software engineering with the proliferation of this technology. Intelligent agents represent an alternate approach to distributed software engineering. Agent-oriented conceptualization provides a new paradigm for the design and development of these agent-based systems. This chapter extends and formalizes this agent oriented modeling approach to the conceptualization process. It defines agent models and proposes a high-level methodology for agent-oriented analysis and design. It also looks at the heart of agent-oriented programming and outlines its advantages over traditional approaches to distributed computing and interoperability. The chapter includes analogies with the object-oriented methodologies and other existing agent-oriented methodologies wherever applicable. It reviews the Foundation of Intelligent Physical Agents-compliant infrastructure for building agent-based systems and suggests a multi-agent systems framework that merges this infrastructure with the emerging J2EE technologies. The chapter concludes with a case study and an insight to future challenges.


Author(s):  
Lucas Meyer de Freitas ◽  
Oliver Schuemperlin ◽  
Milos Balac ◽  
Francesco Ciari

This paper shows an application of the multiagent, activity-based transport simulation MATSim to evaluate equity effects of a congestion charging scheme. A cordon pricing scheme was set up for a scenario of the city of Zurich, Switzerland, to conduct such an analysis. Equity is one of the most important barriers toward the implementation of a congestion charging system. After the challenges posed by equity evaluations are examined, it is shown that agent-based simulations with heterogeneous values of time allow for an increased level of detail in such evaluations. Such detail is achieved through a high level of disaggregation and with a 24-h simulation period. An important difference from traditional large-scale models is the low degree of correlation between travel time savings and welfare change. While traditional equity analysis is based on travel time savings, MATSim shows that choice dimensions not included in traditional models, such as departure time changes, can also play an important role in equity effects. The analysis of the results in light of evidence from the literature shows that agent-based models are a promising tool to conduct more complete equity evaluations not only of congestion charges but also of transport policies in general.


2021 ◽  
Vol 26 (6) ◽  
pp. 549-557
Author(s):  
Venkatasubramanian Srinivasan

Mobile Ad-Hoc Networks (MANETs) due to their reconfigurable nature are being integrated into new and futuristic knowledge such as Internet of Things (IoT), cloud, reconfigurable networks, etc. To attain such credibility of integration, the routing protocols associated with these mobile nodes have to connect, perform and facilitate routing that offers a high level of security and resistance to all possible threats and security issues that may emanate in the network. One of the solutions used to maintain network security is intrusion detection systems (IDSs). This article primarily emphasis on the network's susceptibility to a suction assault known as a black hole attack. The investigations about the employment of intelligent agents called Honeypot Agent-based detection scheme (HPAS) with Long-Short Term Memory (LSTM) in identifying such assaults. Hence, the proposed method is named HPAS-LSTM, where honeypots are roaming virtual software managers that create Route Request (RREQ) packets to attract and entrap black hole attackers. Extensive model results utilizing the ns-2 simulator are used to demonstrate the presence of the suggested detection technique. The simulation outcomes demonstrate that the suggested technique outperforms current black hole detection methods in terms of throughput (TH), packet loss rate (PLR), packet delivery ratio (PDR), and total network delay (TND).


2014 ◽  
Vol 13 (03) ◽  
pp. 133-153 ◽  
Author(s):  
Luo Biao ◽  
Wan Liang ◽  
Liang Liang

The high level of complexity of tourism supply chain and the inherent risks that exist in the demand and supply of resources are viewed as major limiting factors in achieving high level performance. Though emerging literature on risk management in tourism industry or its equivalent exists, progress in this area is uneven, as most research focuses on this problem from the traditional single business risk management perspective, without considering the entire range of different suppliers involved in the provision and consumption of tourism products. This study applies risk management theory to a new research perspective, which is tourism supply chain management (SCM). This paper develops a framework for the design of a multi-agent-based decision support system (DSS) based on multi-agent theory and technique, in order to manage disruptions and mitigate risks in tourism supply chain.


2007 ◽  
Vol 28 (2) ◽  
pp. 146-155 ◽  
Author(s):  
William A. Rutala ◽  
David J. Weber

Background.Disinfection and sterilization are critical components of infection control. Unfortunately, breaches of disinfection and sterilization guidelines are not uncommon.Objective.To describe a method for evaluating a potential breach of guidelines for high-level disinfection and sterilization of medical devices.Methods.The appropriate scientific literature was reviewed to determine the frequency of failures of compliance. A risk assessment model was constructed.Results.A 14-step protocol was constructed to aid infection control professionals in the evaluation of potential disinfection and sterilization failures. In addition, a model is presented for aiding in determining how patients should be notified of the potential adverse event. Sample statements and letters are provided for communicating with the public and individual patients.Conclusion.Use of a protocol can guide an institution in managing potential disinfection and sterilization failures.


Author(s):  
Krishna N. Jha ◽  
Andrea Morris ◽  
Ed Mytych ◽  
Judith Spering

Abstract Designing aircraft parts requires extensive coordination among multiple distributed design groups. Achieving such a coordination is time-consuming and expensive, but the cost of ignoring or minimizing it is much higher in terms of delayed and inferior quality products. We have built a multi-agent-based system to provide the desired coordination among the design groups, the legacy applications, and other resources during the preliminary design (PD) process. A variety of agents are used to model the various design and control functionalities. The agent-representation includes a formal representation of the task-structures. A web-based user-interface provides high-level interface to the users. The agents collaborate to achieve the design goals.


2018 ◽  
pp. 566-603
Author(s):  
Suresh Sankaranarayanan ◽  
Subramaniam Ganesan

Mobile phone usage and its adoption have been growing at exponential rates. It is this exponential growth rate that has led many to predict Mobile Commerce (M-Commerce) as the next major evolution of Electronic Commerce (E-Commerce). While M-Commerce comes rich with unique features, it is currently lacking in usage when compared to traditional e-commerce. There are many challenges that must be addressed in this respect. These challenges are mostly inherent in the mobile devices, communication network, legal and regulatory infrastructure. The use of agents in e-commerce has long been explored in the context, resulting in a number of agent based e-commerce systems. It is not surprising then to note that many researchers believe that the problems that the M-Commerce now faces can be addressed well using agent technology. While there is an abundance of information on the use of agent based systems in other areas, there has been no great surge yet in the use of agent based systems in real world M-Commerce applications. We believe that this slow adoption of this agent technology is due to a lack of standards. There has been a quite an amount of research work carried out in the use of software intelligent agents in the M-Commerce applications like Shopping, Hotel, and Airline industries. These are outlined in the paper with appropriate screenshots and descriptions.


Sign in / Sign up

Export Citation Format

Share Document