A Proposal for a Mobile Platform for a Knowledge-Based Integrated Proxy Network Embedded in a Real-Time Data Center

Dax H. Bradley*
Department of Industrial Technology, Johnston Community College, USA.
Periodicity:July - September'2018
DOI : https://doi.org/10.26634/jse.13.1.15026

Abstract

In recent years, the concept of asset life extension has become increasingly important in a safety critical environment. All agents acting in a complex system act in their capacity to create a positive outcome for the organization and tasks at hand using available data and history. Decision-making tools in such areas as telecommunications, healthcare, and utility industries play an integral part in the establishment and maintenance of such environments. A broad range of potential errors, both technical and human, contribute to resolutions which may be less-then-optimal, leading to loss of resources, including time, money, and in severe situations, human life. With greater access to available data, a higher the potential for positive outcomes in decision-making is made possible. The goal is to produce an examination of the available tools in machine learning and algorithm design which aid in decision-making. The strengths and weaknesses of network architectures and algorithmic models is discussed, followed by conclusions and proposed solutions for improved efficiency and access to appropriate information systems.

Keywords

Artificial Intelligence, Machine Learning, Regression, Data Management

How to Cite this Article?

Bradley, D. H. (2018). A Proposal for a Mobile Platform for a Knowledge-Based Integrated Proxy Network Embedded in a Real-Time Data Center. i-manager's Journal on Software Engineering, 13(1), 22-30. https://doi.org/10.26634/jse.13.1.15026

References

[1]. Abrams, L. (2004). The hosts file and what it can do for you. Retrieved from http://www.bleepingcomputer.com/ tutorials/ hosts-files-explained/
[2]. Achenbach, J. (2015, December 10). Researchers create a computer program that learns the way humans do. The Washington Post. Retrieved from https://www.washingtonpost.com/news/speaking-of-science/ wp/2015/12/10/ researchers-create-a-computer-  program- that-learns-the-way-humans-do/ ?utm_term=. c43cd13cd536
[3]. Anderson, J. (1997). Guidelines for indexes and related information retrieval devices [White paper]. Retrieved from National Information Standards Organization: http://www.niso.org/publications/tr/tr02.pdf
[4]. Anjali, M., & Babu, P. (2014, October). Ambiguities in natural language processing. International Journal of Innovative Research in Computer and Communication Engineering, 2(5), 392-394.
[5]. Aquin, L., & Ling, X. (2014). An outlier mining algorithm based on attribute entropy and weighted cosine similarity. Journal of Taiyuan University of Science and Technology.
[6]. Assiotis, M., & Tzanov, V. (2005). A distributed architecture for massive multiplayer onlinerole-playing games (Master's Thesis). Retrieved from http://pdos.csail. mit.edu/6.824-2005/reports/assiotis.pdf
[7]. Baker, M. (1994). Fast crash recovery in distributed file system (Doctoral Dissertation, University of California Berkeley).
[8]. Berg, R., Hemphill, R., Abella, B., Aufderheide, T., Cave, D., Hazinski, M., Rea, T. (2010). Basic life support. American Heart Association Guide lines for Cardiopulmonary Resuscitation and Emergency Cardiovascular Care, 685-705. https://doi.org/10.1161/ CIRCULATIONAHA.110.970939
[9]. Borysowich, C. (2010, September 21). Network architecture types [Blog post]. Retrieved from http://it.toolbox.com/blogs/enterprise-solutions/networkarchitecture- types-41375
[10]. Brafman, R., & Tennenholtz, M. (2002, October). R-max – a general polynomial time algorithm for near-optimal reinforcement learning. Journal of Machine Learning Research, 3(1), 213-231.
[11]. Brown, M. H. (1991). Zeus: A system for algorithm animation and multi-view editing. Proceedings 1991 IEEE Workshop on Visual Languages(pp. 4-9). DOI: 10.1109/WVL.1991.238857
[12]. Cao, X., Chen, J., Xiao, Y., & Sun, Y. (2012). Building environment control with wireless sensor and actuator networks: Centralized vs distributed. IEEE Transactions on Industrial Electronics, 57(11),3596-3605. DOI: 10.1109/TIE.2009.2029585
[13]. Chesney, D. (2004). Brute force algorithms greedy algorithms [PowerPoint slides]. Retrieved from https://www.eecs.umich.edu/courses/eecs281/f04/lecnot es/25-greedybrute.pdf
[14]. Christensen, L., Johnson, R., & Turner, L. (2011). Research Methods, Design, and Analysis (11th Ed.). Boston, MA: Allyn & Bacon.
[15]. Cunningham, K. (2014, January 6). Python and your phone: Let's talk about Kivy. Inform IT. Retrieved from http://www.informit.com/articles/article.aspx?p=2170160
[16]. DeNero, J. (2011). Distributed and parallel computing [Lecture notes]. Retrieved from http://wla.berkeley.edu/~cs61a/fa11/lectures/ communication.html
[17]. Devadas, S. (2009). Lecture 18: Dynamic programming I: Memoization, Fibonacci, crazy eights [Lecture notes]. Retrieved from MIT Computer Science and Artificial Intelligence Laboratory: courses.csail.mit.edu/ 6.006/fall09/lecture_notes/lecture18.pdf
[18]. Dickhausa, T., & Royen, T. (2015). A survey on multivariate chi-square distributions and their applications in testing multiple hypotheses. Statistics, 49(2), 427-454. https://doi.org/10.1080/02331888.2014.993639
[19]. Flage, R., & Avan, T. (2008). Expressing and communicating uncertainty in relation to quantitative risk analysis. Reliability & Risk Analysis: Theory & Application, 2(13), 9-18.
[20]. Geise, H., Burmester, S., Klein, F., Schilling, D., & Tichy, M. (2003). Multi-agent system design for safety-critical self-optimizing mechatronic systems with UML. Proceedings of the 2nd Workshop on Agent-Oriented Methodologies. Retrieved from http://www-old.cs.uni-paderborn.de/ uploads/tx_sibibtex/OOPSLA2003_AOM.pdf
[21]. Grunkemeier, G., & MPhil, N. (2002, December). Bayesian analysis: A new statistical paradigm for new technology. The Annals of Thoracic Surgery, 74(6), 1901- 1908. https://doi.org/10.1016/S0003-4975(02)04535-6
[22]. Gupta, A. (2013, January). Fourier transform and its application in cell phones. International Journal of Scientific and Research Publications, 3(1), 1-2.
[23]. Kim, S., Oh, S., & Cho, K. (2017). Development of machine learning models for diagnosis of glaucoma. PLoS One, 12(5). https://doi.org/10.1371/journal.pone.0177726
[24]. Kingsford, C. (2012). Dynamic programming [Lecture notes]. Retrieved from Computer Science University of Maryland: https://www.cs.cmu.edu/~ckingsf/bioinfolectures/ dynamicp.pdf
[25]. Kossiakoff, A., Sweet, W., Seymour, S., & Biemer, S. (2011). Systems Engineering Principles and Practice (2nd Ed.). Hoboken, NJ: John Wiley & Sons, Inc.
[26]. Levitin, A. (2007). Introduction to the Design and Analysis of Algorithms (2nd Ed.). Retrieved from www.cs.ucr.edu/~jiang/cs141/ch06n.ppt
[27]. Luan, W. (2011, June 6). Parallel feeder operation scheme based on distributed automation logic. 21st International Conference on Electricity Distribution. Retrieved from https://pdfs.semanticscholar.org/3fbd/ 83911532acac45a378d741f873080631d96f.pdf
[28]. Nigam, S. (2009). Choosing the best algorithm strategies for a particular problem (Master's Thesis, Thapar University).
[29]. Rosen, B. (2009). Hopfield network [Lecture notes]. Retrieved from UCLA Engineering Computer Science Department: http://web.cs.ucla.edu/~rosen/161/notes/ hopfield.html
[30]. Peng, T. S., & Jun, Z. (2011, August). A research on multi agent modeling language. Procedia Engineering, 15(1), 1842-1847. https://doi.org/10.1016/j.proeng.2011. 08.343
[31]. Sinclair, A. (2011). Randomness & computation [PowerPoint slides]. Retrieved from https://people.eecs. berkeley.edu/~sinclair/cs271/n3.pdf
[32]. Smith, E., Szidarovszky, F., Karnavas, W., & Bahill, T. (2008, February 21). Sensitivity analysis, a powerful system validation technique. The Open Cybernetics & Systemics Journal, 2(1), 39-56. https://doi.org/10.2174/1874110X 00802010039
[33]. Spencer, B. (2017, July 4). Fatal heart conditions are being misdiagnosed as stress: Six in ten patients with inherited illnesses had symptoms attributed to other causes. Daily Mail. Retrieved from http://www.dailymail. co.uk/news/article-4666032/Fatal-heart-conditions-misdiagnosed- stress.html
[34]. Spiegelhalter, D., Miles, J., & Jones, D. (2008). An introduction to Bayesian methods in health technology. The BMJ, 319(1). Retrieved from ncbi.nlm.nih.gov/pmc/ articles/PMC1116393
[35]. Subirats, I., Onyancha, I., Salokhe, G., & Keizer, J. (2003). Towards an architecture for open archive networks in agricultural sciences and technology [White paper]. Retrieved from Food and Agriculture Organization of the United Nations, Rome, Italy: www.fao.org/3/a-ah766e.pdf
[36]. Sun, G., Giles, C., Chen, H., & Lee, Y. (2017). The neural network pushdown automaton: Model, stack and learning simulations [White paper]. Retrieved from University of Maryland Institute for Advanced Computer Studies Laboratory for Plasma Research: https://arxiv.org/ abs/1711.05738
[37]. Tyson, J. (2001). Hashing algorithm. Retrieved from http://computer.howstuffworks.com/encryption5.html
[38]. Tetsche, F., Schneider, U., & Schleussner, E. (2016). Assessment of fetal maturation age by heart rate variability measures using random forest methodology. Computer Biology Medicine, 70(1), 157-62.
[39]. Werro, N. (2015). Fuzzy Classification of Online Customers. Fuzzy Management Methods. DOI 10.1007/978-3-319-15970-6_2
[40]. Wilson, E. (2013). Network architecture review checklist [Power Point slides]. Retrieved from https://www.slideshare.net/EberlyWilson/networkarchitecture- review-checklist
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.