Skilled Agent Application as Software Detectives
Journal Title: International Journal of Linguistics and Computational Applications - Year 2014, Vol 1, Issue 1
Abstract
In today's environment each persons and computer are connected with network, a new entity has evolved: skilled agent software. Over the past few decade agents have emerged as a new software paradigm; they are in part distributed systems, autonomous programs and artificial life. The concept of agents is an outgrowth of years of research in the fields of AI and robotics. They represent concepts of reasoning, knowledge representation, and autonomous learning. Agents are automated programs and provide tools for integration across multiple applications and database running across open and closed networks. They are a means of retrieving, filtering, managing, monitoring, analysing and disseminating information over the Internet, intranets and other proprietary networks. Agents represent a new generation of computing systems and are one of the more recent developments in the field of AI. Agents are specific applications with predefined goals, which can run autonomously; for example, an Internet-based agent can retrieve documents based on user – defined criteria. They can also monitor an environment and issue alerts or go into action based on how they are programmed. In the course of investigative data mining projects, for example agents can serve the function of software detectives, monitoring, shadowing, recognizing and retrieving information for analysis and case development or real – time alerts. Agents can be used by investigators and analysts to work on their behalf; for example FinCEN, the U.S. Treasury agency set up to detect money laundering, must review all cash transactions involving dollar amounts of above $ 10000. This amount is roughly 10 million transactions a year, which cannot be manually monitored. The FinCEN Artificial Intelligence System users, an agent to weed through this large data space and search for abnormalities and fraud through the use of neural network and link analysis.
Authors and Affiliations
Anupam .
Desperate Attacks and Performance Parameters of Encryption Algorithms
All the aspects of human life are driven by information in the present era. Hence, need to protect useful information from malicious activities such as attacks. Security is playing a vital role in the field of communicat...
De-Noising of MR Brain Tumor Images by using Noise Filtering Techniques
Image processing is a powerful tool for increasing the reliability and reproducibility of disease diagnostics. Magnetic Resonance Imaging (MRI) is one of the best technologies currently being used for diagnosing brain tu...
Diabetic Retinopathy Detection in Fundus Images
Diabetic retinopathy (DR) is one of the serious eye diseases and it originates from diabetes mellitus and is the most common cause of blindness in diabetic patients. Early treatment can prevent patients from being affect...
Simultaneously Reducing Latency and Power Consumption in Open Flow Switches
Ethernet LAN that uses switches to connect individual hosts of segments. This type of network is sometimes called a desktop switched Ethernet. In the case of segments the hub is replaced with a switching hub. TCMAs takes...
மொழியியல் தொடக்கமும் வளர்ச்சியும் – சில சூழல்களில்
மொழியியல் தொடக்கமும் வளர்ச்சியும் – சில சூழல்களில்