Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 92

Full-Text Articles in Physical Sciences and Mathematics

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer Aug 2009

Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer

International Conference on Information and Communication Technologies

Security is amongst one of the major issues in broadband wireless access (BWA) networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been presented along with the description of the threats posed to them. The paper also describes security sub-layer and limitations of the existing architecture. An approach has also been presented for the prevention of these threats like the …


Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang Aug 2009

Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang

International Conference on Information and Communication Technologies

This paper gives some considerations on the validity constraints for spaceborne/airborne configurations, based on Loffeld's bistatic formula (LBF) for unequal azimuth contribution of transmitter and receiver phase terms.


Software Engineering: Application Of 80/20 Rule In Software Engineering Waterfall Model, Muzaffar Iqbal, Muhammad Rizwan Aug 2009

Software Engineering: Application Of 80/20 Rule In Software Engineering Waterfall Model, Muzaffar Iqbal, Muhammad Rizwan

International Conference on Information and Communication Technologies

Software process is the most important part of software project management, and software process models are important means of implementing the software process in any software organization. When there is need to improve the software process, then the need to improve the work-task part (software process models) of the software process must arise. As, there is need of increasing the commitment of software project managers through out the software development life cycle (SDLC), so we need to give them the list of activities in Waterfall Model, which should be made efficient by the software development team, to get the 80% …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


Networks - Ii: Development Of Symmetric Cryptosystem Using Matrices With Less Overhead On Communication Channel, Jalal F. Al-Muhtadi, Abdul Basit, Maqsood Mahmud Aug 2009

Networks - Ii: Development Of Symmetric Cryptosystem Using Matrices With Less Overhead On Communication Channel, Jalal F. Al-Muhtadi, Abdul Basit, Maqsood Mahmud

International Conference on Information and Communication Technologies

Many systems have been developed by mathematicians using symmetric and Asymmetric Cryptography e.g. Ceaser Cipher, Stream Ciphers, RSA, DES, IDEA, RC-4, ElGamal signatures, LFSR, Ext. Euclidean Algorithm, Lamport Signatures, Merkle Hellman Knapsack. Etc [1]. Some of them are very strong to be broken by cryptanalysts. Some are very easy and even can be broken by the measuring the frequency of alphabets in a specific cipher text. All these system carries some overhead of key with which a plain text is encrypted, for the communication channel. I thought of an idea in which product component which will be 5*1 matrix will …


Networks - Ii: A New Rough Set Based Approach For Optimized Detection Of Available Resources In Grid Computing, Asgarali Bouyer, Mohd Noor Md Sap, Abdul Hanan Abdullah Aug 2009

Networks - Ii: A New Rough Set Based Approach For Optimized Detection Of Available Resources In Grid Computing, Asgarali Bouyer, Mohd Noor Md Sap, Abdul Hanan Abdullah

International Conference on Information and Communication Technologies

Since the grid is a dynamic environment, the prediction and detection of available resources in near future is important for resource scheduling. Economic-based grid management has been viewed as a feasible approach to carry out fair, efficient and reliable scheduling. One key issue in economic-based grid strategy is to inform about available resources. In this paper, we present a novel predictable method to specify available resource in economic-based grid. This method use a rough set analysis by scheduler to divide resources in groups and then grant a priority to each group based on cost price and efficiency of nodes. The …


Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel Aug 2009

Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel

International Conference on Information and Communication Technologies

Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true …


Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood Aug 2009

Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood

International Conference on Information and Communication Technologies

In this paper we have analyzed and developed a formal specification of a trust model in semantic grid registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in pi-calculus. Finally we transformed the specification to pi- ADL and generated code using Archware tool. We have already developed a semantic grid registry.


Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida Aug 2009

Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida

International Conference on Information and Communication Technologies

Quality of features determines the maximum achievable accuracy by any arbitrary classifier in pattern classification problem. In this paper, we have proposed an index that can assess the quality of features in discrimination of patterns in different classes. This index is in-sensitive to the complexity of boundary separating different classes if there is no overlap among features of different classes. Proposed index is model free and requires no clustering algorithm to discover the clustering structure present in the feature space. It is only based on the information of local neighborhood of feature vectors in the feature space. This index can …


Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit Aug 2009

Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit

International Conference on Information and Communication Technologies

Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.


Data Mining: Analyzing Impact Of Outliers' Detection And Removal From The Test Sample In Blind Source Extraction Using Multivariate Calibration Techniques, S. R. Naqvi, F. Rehman, S. S. Naqvi, A. Amin, I. Qayyum, S. Khan, W. A. Khan Aug 2009

Data Mining: Analyzing Impact Of Outliers' Detection And Removal From The Test Sample In Blind Source Extraction Using Multivariate Calibration Techniques, S. R. Naqvi, F. Rehman, S. S. Naqvi, A. Amin, I. Qayyum, S. Khan, W. A. Khan

International Conference on Information and Communication Technologies

Blind source extraction (BSE) may be an essential but a challenging task where multiple sources are convolved and/or time delayed. In this article we discuss the performance of multivariate calibration techniques that comprise of classical least square (CLS), inverse linear regression (ILS), principal component regression (PCR) and partial least square regression (PLS) in achieving this task in robust speech recognition systems with varying signal-to-noise ratios (SNR). We specifically analyze two methods for identifying and removing outliers from the sample, namely; outlier sample removal (OSR) and descriptor selection (DS) for classical least square and factor Based regression respectively, which results in …


Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan Aug 2009

Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan

International Conference on Information and Communication Technologies

The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.


Networks - I: Investigating Access To Heterogeneous Storage Systems Using Linked Data In Unicore Grid Middleware, Roger Menday, M. Shahbaz Memon, A. Shiraz Memon, Achim Streit Aug 2009

Networks - I: Investigating Access To Heterogeneous Storage Systems Using Linked Data In Unicore Grid Middleware, Roger Menday, M. Shahbaz Memon, A. Shiraz Memon, Achim Streit

International Conference on Information and Communication Technologies

The Grid provides access to execution and storage resources - through middleware - by normalizing the access to resources. UNICORE calls this quality dasiaseamlessnesspsila. One result of this is that a request for some action at one resource can, with relative ease, be re-targeted to another, making possible the coordinated usage of multiple resources. In this paper we describe a seamless interface to heterogeneous storage systems, using the (Semantic) Web as middleware for the Grid. Data is accumulated by experiments and simulations running on execution systems, instruments and sensors, and by importing data from other locations. Storage systems are regular …


Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood Aug 2009

Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood

International Conference on Information and Communication Technologies

New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …


Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain Aug 2009

Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain

International Conference on Information and Communication Technologies

An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …


Networks - I: Collaborative 3d Digital Content Creation Exploiting A Grid Network, M. Gkion, M. Z. Patoli, A. Al-Barakati, W. Zhang, P. Newbury, M. White Aug 2009

Networks - I: Collaborative 3d Digital Content Creation Exploiting A Grid Network, M. Gkion, M. Z. Patoli, A. Al-Barakati, W. Zhang, P. Newbury, M. White

International Conference on Information and Communication Technologies

The increase in ease of the production of computer simulated graphics has opened new opportunities in the 3D industry. There are unlimited applications for the delivery of 3D Graphics especially concerning 3D multimedia presentation of digital content. Apart from aesthetic and entertaining reasons, experts apply computer simulations to visualize environments and to identify early errors or costs in order to limit the need of making real prototypes. Thus, 3D Graphics also minimize the time required for developing the final product. Existing 3D applications give partial support to users to engage in collaborative contribution for the production of a 3D model. …


Networks - I: Cooperative Friendship Networks Through Slac With Newscast, M. Usman Akram, Anam Tariq Aug 2009

Networks - I: Cooperative Friendship Networks Through Slac With Newscast, M. Usman Akram, Anam Tariq

International Conference on Information and Communication Technologies

The effective cooperation and coordination of nodes is necessary for performance improvement in the P2P network. In this paper, we focus on the problem of maintaining considerable amount of cooperation and friendship in P2P networks of selfish peers. For this purpose we will analyze the performance of SLAC. It is a simple algorithm that maintains excessive levels of cooperation and friendship in a network while performing tasks. A simulation model ldquoPrisoners' Dilemmardquo is presented that puts this algorithm to work in a Peersim environment. For providing random sampling, an existing protocol called ldquoNEWSCASTrdquo has been used. The extensive computer simulations …


Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik Aug 2009

Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik

International Conference on Information and Communication Technologies

In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …


Quantified Model Of Cobit For Corporate It Governance, M. Sibghatullah Siddiqui, Dr. Syed Jamal Hussain Aug 2005

Quantified Model Of Cobit For Corporate It Governance, M. Sibghatullah Siddiqui, Dr. Syed Jamal Hussain

International Conference on Information and Communication Technologies

Now organizations are more concerned about the appropriate IT governance. The growing dependency on IT due to the increasing volume of business process automation further challenges the role of Information System Auditor. IT Governance Institute has developed COBIT1 as a model for this purpose [1][2]. The model proposed in this research quantifies the COBIT by developing matrices for all four domains of COBIT; hence it provides a quantitative approach for better implementation of corporate IT governance through effective audit and control.


Making Decision In Requirement Change Management, Saffena Ramzan, Naveed Ikram Aug 2005

Making Decision In Requirement Change Management, Saffena Ramzan, Naveed Ikram

International Conference on Information and Communication Technologies

Requirement change management a significant activity, which is performed through out the development of the software and even during the maintenance phase. It is the core activity to obtain one of the main objectives of software development, which is to satisfy the evolving needs of the customers. Software requirements are linked and dependent on other requirements and changing one requirement definitely affects interlinked requirements. Impact analysis is the crux of requirement change management which is to obtain with the change of requirements, so that the scope of that change is identified. Traceability is the pre-requisite to acquire proper impact analysis. …


Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman Aug 2005

Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman

International Conference on Information and Communication Technologies

Software development has always been a supply side affair, in which domain experts were the main requirement providers. Software engineers have been creating new technologies, frameworks and methodologies but this has made the software engineering job more complex. Recently all this has been looked at from demand-side prospective. So a new concept of Service Based Software Engineering is shaping up which look at the software as a service rather then a product. This paper is going to analysis the fundamental requirements of such a paradigm shift, by first gathering the concept and then translating this to a workable solution. Different …


An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan Aug 2005

An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan

International Conference on Information and Communication Technologies

Software Industry workers require an adequate skill set to gain maximum output from the effective use of technology. The purpose of this study is to explore the nature of actual and desired software developer, jobs skill set. Survey methodology will be used to obtain reports of actual skill level and those desired to define common dimensions of the software developer skill set. Anticipated results will add to the existing body of IT job skills knowledge and may provide practice with job development and career planning guidance. We also intend to propose a skill standard for the software industry of Pakistan …


Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman Aug 2005

Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman

International Conference on Information and Communication Technologies

Enterprise Resource Planner (ERP) is a strategically important tool as integrated business application for long-term success in an increasingly competitive global market. This system requires the integration of data and business processes across the whole enterprise. In order to develop a good quality product there is a need of applying proper model. It becomes more costly in terms of training, appraisals, and improvement activities while applying multiple models that are not integrated within and across an organization. Where as Capability Maturity Model Integration is a set of integrated models that successfully addresses multiple disciplines and has integrated training support. Objective …


Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel Aug 2005

Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel

International Conference on Information and Communication Technologies

Internet is a vital source to disseminate and share information to the masses. This has made information available in abundance on the Web. However, finding relevant information is difficult if not impossible. This difficulty is bilateral between information providers and seekers in terms of information presentation and accessibility respectively. This paper proposed an online Peer-to-Peer Expertise Matching system. The approach provides a highly scalable and self-organizing system and helps individuals in presenting and accessing the information in a consistent format on the Web. This makes the sharing of information among the autonomous organizations successful.


Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan Aug 2005

Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan

International Conference on Information and Communication Technologies

Software engineering is an area of development which always has the risk factor present and software engineering can hardly be done on some straight line. So, the manager has to handle the dynamically changing circumstances in order to complete the job. The target of development team is to develop the software according to the requirements within specified time. Wide variety of risks I are present that may grab the development effort. A good manager must ensure that all measures have been taken against the risks that may possibly come. This paper focuses on determining the relative impact of risk factors …


Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid Aug 2005

Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid

International Conference on Information and Communication Technologies

This paper presents a fuzzy control of coupled liquid tank system. The Coupled Liquid Tank system is developed at PIEAS. It has three liquid tanks coupled together. The liquid level in tank 2 is maintained using fuzzy logic. The results are compared with the PID control, mostly used in industries.


A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed Aug 2005

A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed

International Conference on Information and Communication Technologies

Networks of Workstations (NOWs) based on various operating systems are globally accepted as the standard for computing environments in the IT industry. To harness the tremendous potential for computing capability represented by these NOWs, various new tools are being developed. Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) have existed on UNIX workstations for some time, and are maturing in their capability for handling Distributed Parallel Processing (DPP). This research is aimed to explore each of these two vehicles for DPP, considering capability, ease of use, and availability, and compares their distinguishing features; and also explores programmer interface and …


Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman Aug 2005

Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman

International Conference on Information and Communication Technologies

The Capability Maturity Model Integration (CMMI) version 1.1, developed by the Software Engineering Institute (SEI), USA and the PRoject IN Controlled Environment (PRINCE) version 2 developed by Central Computing and Telecommunications Agency (CCTA) now Office of Government Commerce (OGC) as UK Government standard for IT Project Management, share a common concern with Project and Quality management by improved process management. Both are driven by similar concerns and intuitively correlated. Organizations concerned with PRINCE 2 certification often question its overlap with the CMMI. We have looked into OGC PRINCE 2 process/components and map it to the different goals/practices in the SEI …


Service-Oriented E-Learning Architecture Using Web Service-Based Intelligent Agents, Nasir Hussain, M. Khalid Khan Aug 2005

Service-Oriented E-Learning Architecture Using Web Service-Based Intelligent Agents, Nasir Hussain, M. Khalid Khan

International Conference on Information and Communication Technologies

There is no doubt that e-learning has found its way in our lives. From the very start to the Ph.D. level one can find e-learning courses every where and all the big names are supporting it. One thing that is needed to be understood is that e-learning is basically the integration of various technologies. Now this technology is maturing and we can find different standards for e-learning .New technologies such as agents and web services are promising better results. In this paper we have proposed an e-learning architecture that is dependent on multi-agent systems and web services. These communication technologies …