Advertisement

Cognitive Agent for Automated Software Installation – CAASI

  • Umar Manzoor
  • Samia Nefti
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5736)

Abstract

With the evolution in the computer networks, many companies are trying to come up with efficient products which can make life easier for network administrators. Silent automated installation is one category among such products. In this paper, we have proposed Cognitive Agent for Automated Software Installation (CAASI) which provides silent, automated and intelligent installation of software(s) over the network. CAASI will intelligently install any kind of software on request of the network administrator. CAASI uses an efficient algorithm to transfer the software installation setup on the network nodes. The system is fully autonomous and does not require any kind of user interaction or intervention and performs the task(s) over the network with the help of mobile agents.

Keywords

Automated Software Installer Network Installation Silent Installation Cognitive Agents Multi-Agent System 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Manzoor, U., Nefti, S.: An agent based system for activity monitoring on network – ABSAMN. Expert Systems with Applications 36(8), 10987–10994 (2009)CrossRefGoogle Scholar
  2. 2.
    Manzoor, U., Nefti, S.: Silent Unattended Installation / Un-Installation of Software’s on Network Using NDMAS – Network Deployment Using Multi-Agent System. In: Proceeding of The Fourth European Conference on Intelligent Management Systems in Operations (IMSIO), Manchester, UK, July 7-8 (2009) (accepted for publication)Google Scholar
  3. 3.
    Manzoor, U., Nefti, S.: Silent Unattended Installation Package Manager – SUIPM. In: Proceeding of IEEE International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA), Vienna, Austria, December 10-12 (2008) ISBN: 978-174-0882-98-9Google Scholar
  4. 4.
  5. 5.
    Compulsion Software Remote Installer (2008), http://www.compulsionsoftware.com/
  6. 6.
    Ilarri, S., Mena, E., Illarramendi, A.: Using cooperative mobile agents to monitor distributed and dynamic environments. Information Sciences 178, 2105–2127 (2008)CrossRefGoogle Scholar
  7. 7.
    Manzoor, U., Nefti, S., Hasan, H., Mehmood, M., Aslam, B., Shaukat, O.: A Multi-Agent Model for Mine Detection – MAMMD. In: Lytras, M.D., Carroll, J.M., Damiani, E., Tennyson, R.D. (eds.) WSKS 2008. LNCS (LNAI), vol. 5288, pp. 139–148. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  8. 8.
    Summiya, I.K., Manzoor, U., Shahid, A.A.: A Fault Tolerance Infrastructure for Mobile Agents. In: Proceeding of IEEE Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), Sydney, Australia, November 29 – December 01 (2006)Google Scholar
  9. 9.
    Milojicic, D., Douglis, F., Wheeler, R.: Mobility: Processes, Computers, and Agents. ACM Press, New York (1999)Google Scholar
  10. 10.
    Manzoor, U., Ijaz, K., Shahid, A.A.: Distributed Dependable Enterprise Business System – DDEBS. In: Proceeding of Springer Communications in Computer and Information Science, Greece, Athens, September 24-28, vol. 19, pp. 537–542 (2008) ISBN 978-3-540-87782-0Google Scholar
  11. 11.
    Koffron Micah, A.: System and method for optimized distributed file transfer. In: Microsoft Corporation, WA, US (December 2006), http://www.freepatentsonline.com/y2006/0282405.html
  12. 12.
    Rajah, K., Ranka, S., Xia, Y.: Scheduling bulk file transfers with start and end times. Computer Networks 52, 1105–1122 (2008)CrossRefMATHGoogle Scholar
  13. 13.
    Manzoor, U., Nefti, S.: Agent Based Activity Monitoring System – ABAMS. In: Proceeding of IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), Dayton, USA, November 3-5, pp. 200–203 (2008) ISSN: 1082-3409 ISBN: 978-0-7695-3440-4Google Scholar
  14. 14.
    Niazi, M., Manzoor, U., Ijaz, K.: Applying Color Code Coordinated LRTA* (C3LRTA*) Algorithm on Multiple Targets. In: Proceeding of 9th IEEE International Multitopic Conference (INMIC), pp. 27–32 (2005)Google Scholar
  15. 15.
    Niazi, M., Manzoor, U., Summiya, I.K., Saleem, H.: Eliminating duplication and ensuring file integrity in Multisync: A multiagent system for ubiquitous file synchronization. In: Proceeding of 9th IEEE International Multitopic Conference (INMIC), pp. 767–772 (2005)Google Scholar
  16. 16.
    Java Agent Development Framework (JADE), http://jade.tilab.com/
  17. 17.
    Microsoft Windows (2009), http://www.microsoft.com/WINDOWS/
  18. 18.
  19. 19.
    Matthieu, L., Walter, W.: Complex computer and communication networks. Computer Networks 52(15), 2817–2818 (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Umar Manzoor
    • 1
  • Samia Nefti
    • 1
  1. 1.Department of Computer Science, School of Computing, Science and EngineeringThe University of SalfordSalfordUnited Kingdom

Personalised recommendations