Skip to main content

Cognitive Agent for Automated Software Installation – CAASI

  • Conference paper
Visioning and Engineering the Knowledge Society. A Web Science Perspective (WSKS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5736))

Included in the following conference series:

Abstract

With the evolution in the computer networks, many companies are trying to come up with efficient products which can make life easier for network administrators. Silent automated installation is one category among such products. In this paper, we have proposed Cognitive Agent for Automated Software Installation (CAASI) which provides silent, automated and intelligent installation of software(s) over the network. CAASI will intelligently install any kind of software on request of the network administrator. CAASI uses an efficient algorithm to transfer the software installation setup on the network nodes. The system is fully autonomous and does not require any kind of user interaction or intervention and performs the task(s) over the network with the help of mobile agents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Manzoor, U., Nefti, S.: An agent based system for activity monitoring on network – ABSAMN. Expert Systems with Applications 36(8), 10987–10994 (2009)

    Article  Google Scholar 

  2. Manzoor, U., Nefti, S.: Silent Unattended Installation / Un-Installation of Software’s on Network Using NDMAS – Network Deployment Using Multi-Agent System. In: Proceeding of The Fourth European Conference on Intelligent Management Systems in Operations (IMSIO), Manchester, UK, July 7-8 (2009) (accepted for publication)

    Google Scholar 

  3. Manzoor, U., Nefti, S.: Silent Unattended Installation Package Manager – SUIPM. In: Proceeding of IEEE International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA), Vienna, Austria, December 10-12 (2008) ISBN: 978-174-0882-98-9

    Google Scholar 

  4. EMCO Remote Installer (2009), http://www.emco.is/products/remote-installer/features.php

  5. Compulsion Software Remote Installer (2008), http://www.compulsionsoftware.com/

  6. Ilarri, S., Mena, E., Illarramendi, A.: Using cooperative mobile agents to monitor distributed and dynamic environments. Information Sciences 178, 2105–2127 (2008)

    Article  Google Scholar 

  7. Manzoor, U., Nefti, S., Hasan, H., Mehmood, M., Aslam, B., Shaukat, O.: A Multi-Agent Model for Mine Detection – MAMMD. In: Lytras, M.D., Carroll, J.M., Damiani, E., Tennyson, R.D. (eds.) WSKS 2008. LNCS (LNAI), vol. 5288, pp. 139–148. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Summiya, I.K., Manzoor, U., Shahid, A.A.: A Fault Tolerance Infrastructure for Mobile Agents. In: Proceeding of IEEE Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), Sydney, Australia, November 29 – December 01 (2006)

    Google Scholar 

  9. Milojicic, D., Douglis, F., Wheeler, R.: Mobility: Processes, Computers, and Agents. ACM Press, New York (1999)

    Google Scholar 

  10. Manzoor, U., Ijaz, K., Shahid, A.A.: Distributed Dependable Enterprise Business System – DDEBS. In: Proceeding of Springer Communications in Computer and Information Science, Greece, Athens, September 24-28, vol. 19, pp. 537–542 (2008) ISBN 978-3-540-87782-0

    Google Scholar 

  11. Koffron Micah, A.: System and method for optimized distributed file transfer. In: Microsoft Corporation, WA, US (December 2006), http://www.freepatentsonline.com/y2006/0282405.html

  12. Rajah, K., Ranka, S., Xia, Y.: Scheduling bulk file transfers with start and end times. Computer Networks 52, 1105–1122 (2008)

    Article  MATH  Google Scholar 

  13. Manzoor, U., Nefti, S.: Agent Based Activity Monitoring System – ABAMS. In: Proceeding of IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), Dayton, USA, November 3-5, pp. 200–203 (2008) ISSN: 1082-3409 ISBN: 978-0-7695-3440-4

    Google Scholar 

  14. Niazi, M., Manzoor, U., Ijaz, K.: Applying Color Code Coordinated LRTA* (C3LRTA*) Algorithm on Multiple Targets. In: Proceeding of 9th IEEE International Multitopic Conference (INMIC), pp. 27–32 (2005)

    Google Scholar 

  15. Niazi, M., Manzoor, U., Summiya, I.K., Saleem, H.: Eliminating duplication and ensuring file integrity in Multisync: A multiagent system for ubiquitous file synchronization. In: Proceeding of 9th IEEE International Multitopic Conference (INMIC), pp. 767–772 (2005)

    Google Scholar 

  16. Java Agent Development Framework (JADE), http://jade.tilab.com/

  17. Microsoft Windows (2009), http://www.microsoft.com/WINDOWS/

  18. AML Free Registry Cleaner (2009), http://www.amltools.com/free-registry-cleaner-tutorial.html

  19. Matthieu, L., Walter, W.: Complex computer and communication networks. Computer Networks 52(15), 2817–2818 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Manzoor, U., Nefti, S. (2009). Cognitive Agent for Automated Software Installation – CAASI. In: Lytras, M.D., et al. Visioning and Engineering the Knowledge Society. A Web Science Perspective. WSKS 2009. Lecture Notes in Computer Science(), vol 5736. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04754-1_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04754-1_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04753-4

  • Online ISBN: 978-3-642-04754-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics