SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Computer Science and Engineering Research and Development (IJCSERD),
  International Journal   Computer Science and Engineering
                                                                       IJCSERD
Research and Development (IJCSERD), (Online) Volume 1, (Print), 2, May-October (2011)
  ISSN 2248-9363 (Print), ISSN 2248-9371 ISSN 2248-9363 Number
ISSN 2248-9371 (Online), Volume 1,
Number 2, May-October (2011)
                                                                      © PRJ PUBLICATION
pp. 47-51 © PRJ Publication
http://www.prjpublication.com/IJCSERD.asp




      OPEN AGENT BASED SYSTEM FOR STRATEGIC DECISIONS
                  USING JADE ARCHITECTURE
  Dr. Priyanka Sharma#1, Hassan Mathkour *2, Mr. Mijal Mistry*3 Mr. Pranav Pathak*4
 #1
        Professor in MCA , Institute of Science and Technology for Advanced Studies and
                                       Research (ISTAR),
                              Vallabh Vidya Nagar , Gujarat. India
                                    pspriyanka@yahoo.com
      #2
         Department of Computer Science, College of Computer & Information Sciences,
                               King Saud University, Saudi Arabia
                                     mathkour@ksu.edu.sa
       #3
          Assistant Professor in MCA, Institute of Science and Technology for Advanced
                                 Studies and Research (ISTAR),
                              Vallabh Vidya Nagar , Gujarat. India
                                  mijalmistry@rediffmail.com
      #4
          Department of Computer Science, College of Computer & Information Sciences,
                               King Saud University, Saudi Arabia
                                      pranavpp@gmail.com


 ABSTRACT

 Strategy is difficult decision for human manger So if we have Right information at
 right time for right person manager can take best decision not to regret in future. In
 this paper Communication based Open Agents based system is designed and
 developed having different agents like knowledge, interface, analysis, communication
 and Jade technology based agent tech_agent to answer tough question for strategy and
 policy formation in order to achieve goal of any company.

 Keywords: Agents, Strategy, Decision Making
 I.                STRATEGIC DECISION MAKING

    This document is a template. An electronic copy can be downloaded from the
 conference website. For questions on paper guidelines, please contact the conference
 publications committee as indicated on the conference website. Information about
 final paper submission is available from the conference website.

 Decision is settlement, a fixed intention bringing to a conclusive result, a judgment
 and a resolution.“A Decision is the choice out of several options made by the decision
 maker to achieve some objective in a given situation. Major characteristics of the
 business decision making are:



                                             47
International Journal of Computer Science and Engineering Research and Development (IJCSERD),
ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011)

      •   Sequential in nature.
      •   Exceedingly complex due to risks and trade offs.
      •   Influenced by personal values.

Problem in Making Rational Decisions

Ascertaining the problem: Management focuses on finding right answer rather than
right question and that is most common source of mistakes. Instead of defining “sales
is symptomatic” management defines “sales are declining”
Insufficient knowledge: Total information leading to complete knowledge, if it is
missing than not perfect rationality
Not enough time to be rational: If not enough time allocated to make rational
decision
The environment may not cooperate: Decision may fail the test of rationality
because of not cooperation. e.g. product pricing, factor oil and petroleum product
price.

Other limitations

      •   Compromise among the different positions
      •   Misjudging the motives and values of people
      •   Poor communications
      •   Misappraisal of uncertainties and risks
      •   Inability to handle the available knowledge and human behaviour.


II.               AGENT BASED SYSTEM

An Agent is the fundamental actor on an AP which combines one or more service
capabilities into a unified and integrated execution model that may include access to
external software, human users and communications facilities. An agent may have
certain resource brokering capabilities for accessing software (see [FIPA00079]).

An agent must have at least one owner, for example, based on organisational
affiliation or human user ownership, and an agent may support several notions of
identity. An Agent Identifier (AID) labels an agent so that it may be distinguished
unambiguously within the Agent Universe. An agent may be registered at a number of
transport addresses at which it can be contacted and it may have certain resource
brokering capabilities for accessing software.[3]




                                             48
International Journal of Computer Science and Engineering Research and Development (IJCSERD),
ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011)




III.               OPEN AGENT BASED SYSTEM FOR STRATEGIC DECISIONS USING
       JADE ARCHITECTURE

Following is architecture for Agent based System for strategic decisions:



                             Quest                          Analysis          Res
                             ion                            Agent             ult
                                          Knowledge
                                          Agent




                                                        Communication
                                                        Agent




                                                            Tech Agent



             Figure 1 Architecture of Agent based system for strategic decisions

For eg If a manager poses question to Open Why sales are declining: Find reasons and
solution this agent based system can be useful for same. Jade Architecture as
described below is used for communicating between different agents in the proposed
architecture .Following figure shows the main architectural elements of a JADE
platform. A JADE platform is composed of agent containers that can be distributed
over the network. Agents live in containers which are the Java process that provides
the JADE run-time and all the services needed for hosting and executing agents.
There is a special container, called the main container, which represents the bootstrap
point of a platform: it is the first container to be launched and all other containers
must join to a main container by registering with it. The UML diagram in Figure 3.2
schematizes the relationships between the main architectural elements of JADE. The
programmer identifies containers by simply using a logical name; by default the main
container is named ‘Main Container’ while the others are named ‘Container-1’,
‘Container-2’, etc. Command-line options are available to override default names.As
a bootstrap point, the main container has the following special responsibilities:[3]

       •   Managing the container table (CT), which is the registry of the object
           references and transport addresses of all container nodes composing the
           platform
       •   Managing the global agent descriptor table (GADT), which is the registry of
           all agents present in the platform, including their current status and location


                                             49
International Journal of Computer Science and Engineering Research and Development (IJCSERD),
   ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011)

       •     Hosting the AMS and the DF, the two special agents that provide the agent
             management and white page service, and the default yellow page service of
             the platform, respectively.




           Figure 2 Architecture Relationship between the main architectural elements


     We have designed several agents based on the system, following table summarize
   the agents, its purpose and whom it communicates.

Agent Name                     Purpose                                     Communicates
                                                                           with Agents
Query/Problem/interface/input User who is mainly form upper and middle Knowledge
                              Management poses to Interface
Knowledge_Agent               This agent has knowledge ,precious Tech_agent,
                              experience ,data etc. about Organization and Analysis
                              External resources useful for inference the
                              knowledge
Tech_agent                    Here Jade Architecture is considered as tool Knowledge_Agent
                              for establishing communication between two Analysis
                              very important agents K and A as they are
                              responsible for new strategy formation
Analysis_Agent                Analysis of problem through Model or data Tech_ agent
                              based for result
Communication_Agent           Represent output to user which is policy Tech_           agent
                              making /strategy formation with analysis of Analysis
                              problem and justification of solution

                    TABLE I: The summarized of different agents is as below:

                                                50
International Journal of Computer Science and Engineering Research and Development (IJCSERD),
ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011)

IV.              CONCLUSIONS
Strategy is difficult decision for human manger so if we have Right information at
right time for right person manager can take best decision not to regret ion future. For
this communication agents system as developed in this paper can be very helpful as it
is modularity and agent based divided.
V       REFERENCES
1. D. Chess and B. Grosof and C. Harrison and D. Levine and C. Parris and G. Tsudik,
“Itinerant Agents for Mobile Computing”, Journal IEEE Personal Communications,
Vol.             2,            No.            5,          October,            1995.
2. E. Turban, J. E. Aronson: Decision Support Systems and Intelligence systems,
Pearson                                Education,                             2001
3. J Russell, Peter Norvig : Artificial Intelligence : A modern approach ,
Pearson     Education      Asia     ,2003systems,    Pearson    Education,    2001
4. Jim Blythe ,An Integrated Environment for Knowledge Acquisition ,Information
Sciences Institute University of Southern California
5 Wiley.Developing.Multi.Agent.Systems.with.JADE by Fabio Bellifemine,
6. http://www.cs.uga.edu
7. http://www.csc.liv.ac.uk
8. http://www.daac.gsfc.nasa.gov
9. http://www.diglib.tums.ac.ir
10. http://www.doi.ieeecomputersociety.org
11http://www.isnar.cgiar.or




                                             51

Más contenido relacionado

Similar a Open agent based system for strategic decisions

Infrastructure for co ordination of multi-agents
Infrastructure for co ordination of multi-agentsInfrastructure for co ordination of multi-agents
Infrastructure for co ordination of multi-agents
Jovenary Muta
 
CRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOL
CRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOLCRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOL
CRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOL
ijseajournal
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
Shivananda Rai
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
Winstina Kennedy
 

Similar a Open agent based system for strategic decisions (20)

STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKETSTOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
 
Dossier 2008 V3
Dossier 2008 V3Dossier 2008 V3
Dossier 2008 V3
 
The Role Of An Architect
The Role Of An ArchitectThe Role Of An Architect
The Role Of An Architect
 
Infrastructure for co ordination of multi-agents
Infrastructure for co ordination of multi-agentsInfrastructure for co ordination of multi-agents
Infrastructure for co ordination of multi-agents
 
Cm24585587
Cm24585587Cm24585587
Cm24585587
 
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
 
Single object detection to support requirements modeling using faster R-CNN
Single object detection to support requirements modeling using faster R-CNNSingle object detection to support requirements modeling using faster R-CNN
Single object detection to support requirements modeling using faster R-CNN
 
CRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOL
CRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOLCRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOL
CRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOL
 
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
IRJET- Recruitment Chatbot
IRJET- Recruitment ChatbotIRJET- Recruitment Chatbot
IRJET- Recruitment Chatbot
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 
Basics of Software Architecture for .NET Developers
Basics of Software Architecture for .NET DevelopersBasics of Software Architecture for .NET Developers
Basics of Software Architecture for .NET Developers
 
Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...
 
IRJET - Scrutinizing Attributes Influencing Role of Information Communication...
IRJET - Scrutinizing Attributes Influencing Role of Information Communication...IRJET - Scrutinizing Attributes Influencing Role of Information Communication...
IRJET - Scrutinizing Attributes Influencing Role of Information Communication...
 
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMSDEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
NIS.docx
NIS.docxNIS.docx
NIS.docx
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 

Más de prjpublications

Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurement
prjpublications
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
prjpublications
 
An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...
prjpublications
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...
prjpublications
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applications
prjpublications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...
prjpublications
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
prjpublications
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
prjpublications
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
prjpublications
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
prjpublications
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality model
prjpublications
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
prjpublications
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
prjpublications
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...
prjpublications
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood management
prjpublications
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
prjpublications
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...
prjpublications
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
prjpublications
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
prjpublications
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...
prjpublications
 

Más de prjpublications (20)

Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurement
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
 
An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality model
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood management
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...
 

Open agent based system for strategic decisions

  • 1. International Journal of Computer Science and Engineering Research and Development (IJCSERD), International Journal Computer Science and Engineering IJCSERD Research and Development (IJCSERD), (Online) Volume 1, (Print), 2, May-October (2011) ISSN 2248-9363 (Print), ISSN 2248-9371 ISSN 2248-9363 Number ISSN 2248-9371 (Online), Volume 1, Number 2, May-October (2011) © PRJ PUBLICATION pp. 47-51 © PRJ Publication http://www.prjpublication.com/IJCSERD.asp OPEN AGENT BASED SYSTEM FOR STRATEGIC DECISIONS USING JADE ARCHITECTURE Dr. Priyanka Sharma#1, Hassan Mathkour *2, Mr. Mijal Mistry*3 Mr. Pranav Pathak*4 #1 Professor in MCA , Institute of Science and Technology for Advanced Studies and Research (ISTAR), Vallabh Vidya Nagar , Gujarat. India pspriyanka@yahoo.com #2 Department of Computer Science, College of Computer & Information Sciences, King Saud University, Saudi Arabia mathkour@ksu.edu.sa #3 Assistant Professor in MCA, Institute of Science and Technology for Advanced Studies and Research (ISTAR), Vallabh Vidya Nagar , Gujarat. India mijalmistry@rediffmail.com #4 Department of Computer Science, College of Computer & Information Sciences, King Saud University, Saudi Arabia pranavpp@gmail.com ABSTRACT Strategy is difficult decision for human manger So if we have Right information at right time for right person manager can take best decision not to regret in future. In this paper Communication based Open Agents based system is designed and developed having different agents like knowledge, interface, analysis, communication and Jade technology based agent tech_agent to answer tough question for strategy and policy formation in order to achieve goal of any company. Keywords: Agents, Strategy, Decision Making I. STRATEGIC DECISION MAKING This document is a template. An electronic copy can be downloaded from the conference website. For questions on paper guidelines, please contact the conference publications committee as indicated on the conference website. Information about final paper submission is available from the conference website. Decision is settlement, a fixed intention bringing to a conclusive result, a judgment and a resolution.“A Decision is the choice out of several options made by the decision maker to achieve some objective in a given situation. Major characteristics of the business decision making are: 47
  • 2. International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011) • Sequential in nature. • Exceedingly complex due to risks and trade offs. • Influenced by personal values. Problem in Making Rational Decisions Ascertaining the problem: Management focuses on finding right answer rather than right question and that is most common source of mistakes. Instead of defining “sales is symptomatic” management defines “sales are declining” Insufficient knowledge: Total information leading to complete knowledge, if it is missing than not perfect rationality Not enough time to be rational: If not enough time allocated to make rational decision The environment may not cooperate: Decision may fail the test of rationality because of not cooperation. e.g. product pricing, factor oil and petroleum product price. Other limitations • Compromise among the different positions • Misjudging the motives and values of people • Poor communications • Misappraisal of uncertainties and risks • Inability to handle the available knowledge and human behaviour. II. AGENT BASED SYSTEM An Agent is the fundamental actor on an AP which combines one or more service capabilities into a unified and integrated execution model that may include access to external software, human users and communications facilities. An agent may have certain resource brokering capabilities for accessing software (see [FIPA00079]). An agent must have at least one owner, for example, based on organisational affiliation or human user ownership, and an agent may support several notions of identity. An Agent Identifier (AID) labels an agent so that it may be distinguished unambiguously within the Agent Universe. An agent may be registered at a number of transport addresses at which it can be contacted and it may have certain resource brokering capabilities for accessing software.[3] 48
  • 3. International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011) III. OPEN AGENT BASED SYSTEM FOR STRATEGIC DECISIONS USING JADE ARCHITECTURE Following is architecture for Agent based System for strategic decisions: Quest Analysis Res ion Agent ult Knowledge Agent Communication Agent Tech Agent Figure 1 Architecture of Agent based system for strategic decisions For eg If a manager poses question to Open Why sales are declining: Find reasons and solution this agent based system can be useful for same. Jade Architecture as described below is used for communicating between different agents in the proposed architecture .Following figure shows the main architectural elements of a JADE platform. A JADE platform is composed of agent containers that can be distributed over the network. Agents live in containers which are the Java process that provides the JADE run-time and all the services needed for hosting and executing agents. There is a special container, called the main container, which represents the bootstrap point of a platform: it is the first container to be launched and all other containers must join to a main container by registering with it. The UML diagram in Figure 3.2 schematizes the relationships between the main architectural elements of JADE. The programmer identifies containers by simply using a logical name; by default the main container is named ‘Main Container’ while the others are named ‘Container-1’, ‘Container-2’, etc. Command-line options are available to override default names.As a bootstrap point, the main container has the following special responsibilities:[3] • Managing the container table (CT), which is the registry of the object references and transport addresses of all container nodes composing the platform • Managing the global agent descriptor table (GADT), which is the registry of all agents present in the platform, including their current status and location 49
  • 4. International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011) • Hosting the AMS and the DF, the two special agents that provide the agent management and white page service, and the default yellow page service of the platform, respectively. Figure 2 Architecture Relationship between the main architectural elements We have designed several agents based on the system, following table summarize the agents, its purpose and whom it communicates. Agent Name Purpose Communicates with Agents Query/Problem/interface/input User who is mainly form upper and middle Knowledge Management poses to Interface Knowledge_Agent This agent has knowledge ,precious Tech_agent, experience ,data etc. about Organization and Analysis External resources useful for inference the knowledge Tech_agent Here Jade Architecture is considered as tool Knowledge_Agent for establishing communication between two Analysis very important agents K and A as they are responsible for new strategy formation Analysis_Agent Analysis of problem through Model or data Tech_ agent based for result Communication_Agent Represent output to user which is policy Tech_ agent making /strategy formation with analysis of Analysis problem and justification of solution TABLE I: The summarized of different agents is as below: 50
  • 5. International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011) IV. CONCLUSIONS Strategy is difficult decision for human manger so if we have Right information at right time for right person manager can take best decision not to regret ion future. For this communication agents system as developed in this paper can be very helpful as it is modularity and agent based divided. V REFERENCES 1. D. Chess and B. Grosof and C. Harrison and D. Levine and C. Parris and G. Tsudik, “Itinerant Agents for Mobile Computing”, Journal IEEE Personal Communications, Vol. 2, No. 5, October, 1995. 2. E. Turban, J. E. Aronson: Decision Support Systems and Intelligence systems, Pearson Education, 2001 3. J Russell, Peter Norvig : Artificial Intelligence : A modern approach , Pearson Education Asia ,2003systems, Pearson Education, 2001 4. Jim Blythe ,An Integrated Environment for Knowledge Acquisition ,Information Sciences Institute University of Southern California 5 Wiley.Developing.Multi.Agent.Systems.with.JADE by Fabio Bellifemine, 6. http://www.cs.uga.edu 7. http://www.csc.liv.ac.uk 8. http://www.daac.gsfc.nasa.gov 9. http://www.diglib.tums.ac.ir 10. http://www.doi.ieeecomputersociety.org 11http://www.isnar.cgiar.or 51