Develop the multi agent system, Computer Engineering

Assignment Help:

The new season of AFL, and the excited coming FIFA World Cup in South Africa this June, many sports fans are willing to find the latest results of their beloved sports teams. In this project, you are requested to develop a middleware based multi agent system to track the latest score of your favourite sports team.

The architecture of this multi agent system is given above. There are three types of agents in this system:

  • Yellow Page Agent (YPA): a middle agent acts as yellow page. It keeps a list of records of the currently available service provider agents who can offer information or services to others. The record of a service provider includes agent name, contact information, and the service (team name). The record is registered by a provider agent when it starts, and when it exits from the system the agent will deregister to YPA and its record will be removed from the list.  
  •  Service Provider Agent (SPA): an information agent who can find and extract a piece of requested information, such as the most recent score of Australian soccer team, from the World Wide Web. It first registers its service information to the YPA when it becomes available to the public. After that,  it is able to answer queries from other service consumer agents to search and  extract the score for your team. Finally, when it quits from service, SPA deregisters from YPA so its record will be removed from the list.  
  • Service Consumer Agent (SCA): a software agent as an interface to human users. SCA has a GUI interface for users to input or select sports team. And then, it asks the YPA to allocate an agent who has the capability to find the score for that team. When SCA receives the contact information of a SPA from YPA, it communicates with that SPA to request the latest team result. And it will display the score returned by SPA to the user.

Related Discussions:- Develop the multi agent system

Explain about of unicode, Q. Explain about of Unicode? This is a newer ...

Q. Explain about of Unicode? This is a newer International standard for character representation. Unicode offers a unique code for each character irrespective of Program, platf

Weight training calculations, Weight Training Calculations: However we...

Weight Training Calculations: However we have more weights in our network than in perceptrons but we firstly need to introduce the notation as: w ij just to specify the weigh

Construct a shift register from S-R flip-flops, Construct a shift register ...

Construct a shift register from S-R flip-flops. Explain its working. Ans: S-R Flip-Flop Shift Register: Shift registers can be built through using SR flip-flops. Fig.(a)

What is boundary scan, What is Boundary Scan?  Boundary scan is a board...

What is Boundary Scan?  Boundary scan is a board level design method that provides test access to the input and output pads of ICs on PCBs. Boundary scan changes the IO circuit

Explain the violating basic security principles, Explain the violating basi...

Explain the violating basic security principles There are drawbacks to permitting users to access the Intranet as well as not permitting them. A simple consideration such as a

How the temperature effecting the delays in a chip, How the temperature eff...

How the temperature effecting the delays in a chip The delays are directly proportional to the temperature. As the temperature enhances the delays are enhances and chip wil

What is memory mapped i/o, What is memory mapped I/O? When the I/O devi...

What is memory mapped I/O? When the I/O devices share the similar address space, the arrangement is known as memory mapped I/O.

Show library, Show Library and its types. Libraries constitute a simple...

Show Library and its types. Libraries constitute a simple meaning of gathering many object files together: 1. Static: during link editing Library code is integrated with t

Major task of a computer to carry out instruction execution, The major task...

The major task of a computer is to carry out instruction execution. The key questions that can be asked in this respect are: (a) how are the instructions provided to computer? And

Define security protocols used for e-commerce applications, Define various ...

Define various security protocols used for e-commerce applications. The e-commerce systems of today are composed of very many components as like: a commerce server, client soft

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd