Beruflich Dokumente
Kultur Dokumente
INTELLIGENT AGENTS
DEFINITION
Intelligent
Agent based
programming provides
three important
abstractions:
1. the autonomous agent abstraction;
2. the cognitive agent abstraction;
3. the society of agents abstraction.
Approaches to
implementation.
Architectures for
Agents
Simple reflex agent The agent works by finding a rule
approach: use a
scripting language or write
mobile code (such as Java
applets);
declarative approach: define a
universal agent communication
language.
Procedural approach
A universal language is needed for all
platforms and applications.
Major issues:
Portability: scripts must run
everywhere. Higher level language is
better.
Connectivity: language must be
embeddable. Must allow gluing and
composition.
Security: environment needs to be
protected from agent (and vice versa)
Declarative approach
Contractor. A Contractor is an
agent who has a plan to satisfy
some goal, and needs resources
outside its direct control in order to
carry out that plan.
the Supplier. In response to a callfor-bids, some Supplier agents may
offer to provide the requested
resources or services, for specified
prices, over specified time periods.
ESSENTIAL PROPERTIES
OTHER PROPERTIES
mobility: agents can move around
from one machine to another and
across different system architectures
and platforms;
veracity: agents do not knowingly
communicate false information;
benevolence: agents always try to do
what they are asked of;
rationality: agents will try to achieve
their goals and not act in such a way to
prevent their goals from being
achieved.
INTELLIGENT AGENT
CAPABILITIES
Connectivity via:
TCP-IP
sockets,
Remote Method Invocation (RMI),
and
Common Object Request Broker
Architecture (CORBA)
Protocols supported:
Foundation
Security methods
supported:
Authentication
Database Management
Database
query generation
compatible with most common
databases including:
Microsoft Access and SQLServer,
DB2,
MySQL,
Oracle, and
Other databases supported via
JDBC drivers.
Data Analysis
Data
Autonomous Operation
Agent
state monitoring /
awareness
Agent state configuration
management
Agent auto restart, state
recovery and synchronization
- GUI access by
way of an Applet
Stand alone - GUI access by way of
an application installed locally.
Web-based - Java-based
application that allows full-featured
Java client applications to be
launched, deployed, and updated
from a standard Web server.
Intelligent Agents as
Personal Assistants to a
Financial Trader
LIMITATIONS OF
INTELLIGENT AGENTS
brokering.
Condition monitoring and alarm
generation.
Workflow management.
Personal assistance.
Simulation and gaming.
Advantages of intelligent
agents
Higher
efficiency in work, i. e.
less time is
needed by the user as agents
work autonomously and more
effectively
SECURITY
Security Overview
Computer security is the protection of assets from
unauthorized access, use, alteration, or
destruction.
Two types of security:
Computer Security
Classification
Three computer security categories:
Secrecy: Secrecy refers to
protecting against unauthorized
data disclosure and ensuring the
authenticity of the datas source.
Integrity: Integrity refers to
preventing unauthorized data
modification.
Necessity: Necessity refers to
preventing data delays or denials.
Computer Security
Classification
An
eavesdropper is a person or
device that can listen in on and
copy Internet transmissions.
People
The
Ecommerce Security
Issues
What about
authentication?
Customer
SSL
PROCEDURE
Peripheral Component
Interconnect
Credit
by Visa and
Mastercard, SET uses PKI for
privacy, and digital certificates to
authenticate the three parties:
merchant, customer and bank.
sensitive information is not seen
by the merchant, and is not kept
on the merchant's server.
Firewalls
Firewalls
(software or hardware)
protect a server, a network and
an individual PC from attack by
viruses and hackers.
Many companies use the
Kerberos protocol, which uses
symmetric secret key
cryptography to restrict access to
authorized employees.
Practical Consequences
store
Security
Market Mixing
Small
Level 3. IndustryBrains
B2c
Level 7: Webinar
Sponsorships
TYPES OF ADS
Floating
Wallpaper
Video
Interstitial
WHAT MARKETING
COMMUNITY SAYS?
4 CS OF COMMUNITY
Content:
Quality
Context:
Context
Connectivity
Designing
Continuity
Communities
2.
It is instant:
Compared to other marketing tools, email
marketing has two major advantages.
Firstly, the independent tools enables
anybody
to create and send inducing
email news-mails,
announcements,
offers and schemes etc.
Secondly, you get an instant response.
The call to action is evident: Click here to
gain benefit for this scheme or Click here
to learn more about the product etc. The
resulting response may take around 48
hours of the time the emails are sent.
3. It is measurable:
Results can be measured easily
with this effective marketing tool.
The results are clearly presented as
opens which shows the number of
people who saw your news letter
CTRs- Click Through Rates, this
shows how many people clicked the
link provided in emails.
4. It is simple:
For small and medium sized business,
there are several web-based email
marketing tools available.
Majority of them contain HTML
templates, targeting abilities, list
segmentation along with automated
tracking and reporting.
This helps you to focus on your special
message whereas the remaining is taken
care of.
machine.
Get Top 10 rankings in Google, Yahoo and MSN
for your Website's Keywords.
Select Keywords that drive the most traffic to
your site.
Optimize your Internet marketing campaigns to
meet specific revenue or profit goals.
Get noticed by the very prospects you are trying
to reach.
Connect to customers when they are seeking
the products and services you sell.
Convert leads into new business.
In
Web pages
Other formats
Deep Web
search forms
results
content
search
functionali
ty
Making a Searchable
Index
Store
Security
Sou
Full
text of item
More metadata
Product name, picture ID
Category, topic, or subject
Other attributes, for relevance ranking and
display
Search Engine
Positioning
sort the matching items, so the most
relevant ones appear first
Sorting documents on various criteria
Start with words matching query terms
Can't really know what the user wants
Relevance is hard to define and situational
What do people mean when they type bank?
First
search
Nothing on the site on that topic
(scope)
Misspelling or typing mistakes
Vocabulary differences
Restrictive search defaults
Restrictive search choices
Software failure
Obtaining
URL
The
Attracting New
Customers
A web presence
The
Company information /
customer
Websites areservice
increasingly being
used as a contact point.
This may just be providing the
contact telephone number, but
often also an email address or
contact form.
Contact forms are increasingly
important with the recent ecommerce regulations in consent to
email marketing.
On-line Catalogue
An
On-line payments
Any
Setting up an Ecommerce
Website
Setting up Ecommerce
Website
Domain
Names
Unless you are adding
ecommerce functionality to an
established website you will have
to think about a domain name.
The words used in the domain
names can have a major impact
on an ecommerce website's
ability to get found in the search
engines.
Finding an Ecommerce
Website
You must Hosting
decide if you are going
Company
to set up your ecommerce website
on a shared or dedicated server.
Shared servers are shared by
several websites
while dedicated servers have only
one website installed on them.
Dedicated servers cost much
more than shared servers.
Ecommerce Website
Setup
Open
Source
groups using
of people
who contribute
Software
to the development of software
applications as volunteers.
The finished applications are
offered for download at no
charge.
For Ex: OSCommerce.
One of the problems with Open
Source software is security.
Search Engine
Optimization (SEO) on
People won't visit
Ecommerce
Websites
your website
5 common e-commerce
site
mistakes
1. Too many
dynamic pages that take
2.
3.
4.
5.