Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 44 in total
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Thomas Hacker, Purdue University, West Lafayette; Krishna Madhavan, Purdue University
Tagged Divisions
Information Systems
the College of Technology atPurdue University is in the process of developing a new curriculum in the areas of highperformance computing and cyberinfrastructure. This effort, which is a collaborative effort thatincludes faculty from across the College of Technology as well as researchers and faculty fromPurdue University Discovery Park, and Rosen Center for Advanced Computing, is working tointegrate research and development efforts in the area of cyberinfrastructure and highperformance computing that are taking place across campus, which are focused on developinginformation technology solutions to address significant problems in science and engineering.As part of this effort, two years ago the College initiated plans to develop a research
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Matthew Verleger, Purdue University; Heidi Diefes-Dux, Purdue University
Tagged Divisions
Information Systems
of the two full-time lab coordinators tasked withmanaging the day-to-day course activities. The size of the course is not trivial, and the effortrequired to implement any component of the curriculum is time consuming.One of the largest pieces of that curriculum are Model-Eliciting Activities (MEAs). MEAs arerealistic, open-ended, client-driven problems that require teams of students to develop a memo tothe client describing a procedure for solving the problem. When MEAs were first implementedin 2002, the goal was to investigate improving gender equity through small group mathematicalmodeling1. To facilitate their work during the initial research, students developed a single draft
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Stephen Gilbert, Iowa State University; Pam Shill, Iowa State University; Kevin Saunders, Iowa State University
Tagged Divisions
Information Systems
content but also the critical practices ofworking as a team and taking initiative to study whatever is necessary to address a challenge.While such a configuration is not physically possible in all research contexts, these results offerthe reader key insights into building an REU experience that successfully uses teams andmotivates faculty and graduate students to be strong mentors. Page 14.1255.2The Structure of the REU Site: SPIRE-EITSPIRE-EIT (Summer Program for Interdisciplinary Research and Education – EmergingInterface Technologies) at Iowa State University is a 10-week interdisciplinary summerexperience for 15 undergraduates that integrates
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Guy Johnson, Rochester Institute of Technology; Brian Tomaszewski, RIT
Tagged Divisions
Information Systems
students to achieve maximum successes in their careers or research disciplines.Background technologies and the anticipated future of the fieldGeospatial Technologies (GTs) have evolved from initial beginnings as simple computer-basedmap making tools to complex visual and computational environments. GTs are used world-wide in diverse application domains ranging from community planning to the exploration ofouter space. The increased use of GTs has led the development of new tools, techniques andtheory that have imbued GTs with new forms of geographic visualization, support for spatialthinking, and opportunities for research and education. It is an exciting time for GT researchand education. Industry standard, commercial desktop Geographic
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University; Guy Hembroff, Michigan Technological University
Tagged Divisions
Information Systems
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION ANDDEFENSE SIMULATIONYu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological University. His research interests include network protocols, distributed systems and cyber security. He received his Ph.D. in Computer Science from University of Colorado in 2005. He is a memeber of IEEE and ACM.Guy Hembroff, Michigan Technological University Mr. Guy Hembroff is an Assistant Professor within Michigan Tech University's School of Technology Department. His research interests are within the areas of cyber security, network protocols, encryption methods, health-care
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Barry Cumbie, Auburn University; Chetan Sankar, Auburn University; P.K. Raju, Auburn University
Tagged Divisions
Information Systems
documents, mailing lists, and electronic data interchange forms from vendors andcustomers, social security numbers, and credit card numbers6,16,17,18,19. These critical data andinformation reported in the literature provide and initial understanding to the question addressedin this research.Research Methodology: Focus GroupThis section discusses the methodology used in this research, namely a focus group discussion,and demonstrates its appropriateness for addressing the research questions. The value of thismethodology lies not only in the individual responses of the participants but also in thediscussions that arise among the respondents that reflect a shared, social understanding of aparticular topic. Additionally the opportunity exists for
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Nestor Osorio, Northern Illinois University; Andrew Otieno, Northern Illinois University
Tagged Divisions
Information Systems
and practices, admissions and graduation requirements, advising, research opportunities, retention, and minority groups. Topics relating to faculty include specific teaching methods, publications and research methods, hiring, promotion, tenure, and strategies and tools used in the classroom. Practitioners and alumni address subjects relating to industry and collaborations. Assessment and evaluation refer to improving specific courses as well as overall engineering programs, plus distance learning, design, and ethics courses. Other topics include history of engineering education, and education and learning theory. Taken together they comprise the foundational subjects of engineering
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Alan Price, DeVry University-Pomona
Tagged Divisions
Information Systems
2006-754: ASSESSMENT OF COGNITIVE STYLE PREFERENCE THROUGHCLICK-STREAM ANALYSIS OF EDUCATIONAL HYPERMEDIA USER CHOICEAND BROWSING PATTERNS: A CONCEPTUAL MODELAlan Price, DeVry University-Pomona Alan Price is the Associate Dean of Technology Programs at DeVry University, Pomona campus. He holds a Masters of Engineering degree from Cornell University and he is currently working on his Ph.D. in Management of Information Systems from Claremont Graduate University. His research interest include security of wireless sensor networks and effective learning and pedagogical support through use of adaptive hypermedia technologies
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Thomas Hacker, Purdue University, West Lafayette
Tagged Divisions
Information Systems
, and engineering research.Algorithms that form the “computational engine” and heart of these analysis and simulationefforts have grown in capability and complexity as the physical and temporal scales andresolutions of the problems posed by researchers increase. The increasing computational scaleand complexity have created an increased demand for greater computational capacity and storageresources. This trend in computational demand has naturally led to a significant increase in theuse of HPC and supercomputing to provide an effective computational platform on which tosolve these problems.4-9 In the past, supercomputing systems were designed and builtexclusively from custom-engineered components, and thus they were rare and expensive
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Warith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman; P Mani Joseph, Modern College of Business and Science-Sultanate of Oman; Saeid Moslehpour, University of Hartford
Tagged Divisions
Information Systems
AC 2007-1360: A STUDY ON THE PERFORMANCE OF BLUETOOTH AND IEEE802.11B COEXISTENCEWarith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman Warith Al-Sulaimani is a Lecturer and Consultant at the Modern College of Business and Science, Oman. Warith earned a Bachelor’s Degree in Electronic & Electrical Engineering from the University of Strathclyde (UK), a Diploma in Computers and Information Systems from Sultan Qaboos University (Oman) and Master’s Degree in Advanced Computer networking from Glasgow Caledonian University (UK). His primary research focus is in the areas of Wireless Networking, Internet Technologies and Network Security. He holds certifications in A
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Kirk Love, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Information Systems
AC 2010-1838: RECRUITMENT AND RETENTION OF WOMEN IN COMPUTERSCIENCE & ENGINEERINGAfsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Science at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Data Bases, and Digital Signal Processing.Kirk Love, Utah Valley University Kirk Love is an associate Professor of Computer Science at Utah Valley University. His research interests include gender issues in the academic sciences, Digital Image Processing and Robotics.Paymon Sanati-Mehrizy, University of Pennsylvania Paymon Sanati-Mehrizy is an undergraduate student at the University
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
David Dampier, Mississippi State University
Tagged Divisions
Information Systems
, portableforensics workstations. Additionally, the Mississippi Cyber Crime Fusion Center inJackson provides a training facility as well as a research facility where graduate studentscan intern and gather real-time analysis data from a working forensics lab. We will talkmore about that in the next section of the paper.FTC Course offerings have grown over time. Initially, the only courses offered were theIntroduction to Cyber Crime and the Forensics Tools and Techniques classes. Since 2005,course offerings available to law enforcement have increased five-fold. The following isa current list of courses offered to law enforcement professionals, including a briefdescription of each: • CF-100 Computer Basics This course was developed by Jackson State
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
such as installing and Page 14.1160.5doing the initial configuration of server software. Many instructors may not consider these asserious limitations.Course ResultsThere are 8 laboratory assignments in the semester of this web development course. Over thecourse of each assignment, students will use a new technology for delivering dynamic webcontent: Cascading Style Sheets, Javascript, PHP, Perl, MySQL, etc. In order to effectivelydebug each assignment, development is done on a local machine. Since many of thetechnologies learned execute on the server, this local machine must also have the necessary webserver software installed
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Afsaneh Minaie, Utah Valley University; Chad Dean, Utah Valley University
Tagged Divisions
Information Systems
school teaches this course according to their individual methodology.This paper will study different teaching approaches used by different institutions around thecountry and makes some appropriate teaching recommendations based on the conclusionsreached.IntroductionTo research how data mining courses are being taught at the undergraduate level, we searchedthe websites of computer science departments of various universities around the United Stateslooking for data mining course syllabus, schedule and related supporting materials. The syllabus,schedule and material were then analyzed to discern the basic structure and focus of the class.Not all schools that offer courses in data mining offer them at the undergraduate level. Graduatelevel courses
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Yi-Cheng Chen, Meiho Institute of Technology; Yi-Chien Lin, Meiho Institute of Technology; Ron Chuen Yeh, Meiho Institute of Technology, Taiwan; Kuo-Hung Tseng, Meiho Institute of Technology
Tagged Divisions
Information Systems
each of the course in their formal education, are now familiar with aboutit as well as how practical the topic will be in their career. The research findings may beinstrumental for e-commerce training programs, licensing bodies, departments and curriculumdesigners in field of software engineering. The results of this study can provide usefulsuggestions to help software engineers for selecting the suitable and right learning courses aswell as to act as practicable guidelines for EC curriculum planning and development.Keywords: software engineer, e-commerce, EC education, curriculum development, knowledge topicIntroductionWith the invention of World Wide Web (WWW) by 1990, the global network is applied tovariety of domains. The digital
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
AC 2007-173: USING DATA MINING TO DETECT INTRUSIONS IN COMPUTERNETWORKSMario Garcia, Texas A&M University-Corpus Christi Page 12.1542.1© American Society for Engineering Education, 2007 Using Data Mining to Detect Intrusions in Computer NetworksAbstractIn recent years Data mining techniques have been applied in many different fields includingmarketing, manufacturing, process control, fraud detection and network management. Over thepast several years a growing number of research projects have applied data mining to variousproblems in intrusion detection. The goal of this research is to design and implement an anomalydetector using data mining. The project
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Shuju Wu, Southeast Missouri State University; Ragu Athinarayanan, Southeast Missouri State University; Xiaobing Hou, Southeast Missouri State University; Sophia Scott, Southeast Missouri State University
Tagged Divisions
Information Systems
AC 2008-1887: INTEGRATED CURRICULUM AND LABORATORYDEVELOPMENT OF AN UNDERGRADUATE TELECOMMUNICATIONS ANDCOMPUTER NETWORKING PROGRAMShuju Wu, Southeast Missouri State University Shuju Wu (swu@semo.edu) is an Assistant Professor in the Department of Industrial and Engineering Technology at Southeast Missouri State University. She received her Ph.D. degree from the University of Pittsburgh. Her current teaching and research interests include telecommunications and computer networking, IP and overlay multicast, system design and analysis, and wireless ad hoc networks.Ragu Athinarayanan, Southeast Missouri State University Ragu Athinarayanan received his Masters and PhD degree in Electrical Engineering
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
Tagged Divisions
Information Systems
2006-2586: E-STADIUM: REAL-TIME GAME STATISTICS, HIGHLIGHTS, ANDENTERTAINMENTRonald Glotzbach, Purdue University Ronald J. Glotzbach is an Assistant Professor for the Interactive Multimedia Development area in the Department of Computer Graphics Technology at Purdue University’s West Lafayette campus. He is also the Purdue football e-Stadium Project Manager for ITaP. Ronald’s research interests include leading-edge technologies that expand the boundaries of dynamic and interactive content delivered and collaborated on via the graphical communication tool that is the web. Related interests include web-enabling software, dynamic content delivery methods, programming graphics, and integration
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Abul Azad, Northern Illinois University; Ghayasuddin Mohammed, Northern Illinois University; Mohammed Murtuza, Northern Illinois University; Muhammed Abedur Rahman, Northern Illinois University
Tagged Divisions
Information Systems
AC 2008-1844: WEB-BASED SIMULATION OF FLEXIBLE MANIPULATORSYSTEMSAbul Azad, Northern Illinois University ABUL K M AZAD is an Associate Professor of Engineering Technology with the Technology Department of Northern Illinois University. He obtained Ph.D. (control engineering) from the University of Sheffield (UK) in 1994. He has worked at various academic and industrial establishments since graduation in 1987. His research interests include mechatronics, vibration control, real-time computer control of engineering systems, adaptive/intelligent control, and mobile robotics. In these areas, Dr. Azad has over 94 referred journal and conference papers, one edited book, and a book chapter. So far
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Philip Lunsford, East Carolina University; Chip Popoviciu, Cisco Systems, Inc.
Tagged Divisions
Information Systems
USfederal government agencies.Motivation behind the class……IPv6 is going to happenAs stated, the United States is lagging behind many parts of the world in IPv6 research,deployments, and training.Japan, Korea, China, and the European Union have taken a global lead in gaining IPv6operational deployment expertise. A fact that is highlighted by Microsoft’s decision to use aJapanese subsidiary for testing and verifying the IPv6 stacks in its newest operating system,Vista.1Japan, recognized as the world leader in IPv6, was the first country to put forth a nationalstrategy for IPv6, called u-Japan, and has the most significant commercial IPv6 servicesdeployments in the world.In 2004 Korea unveiled U-Korea, a government subsidized initiative to provide
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
C. Richard Helps, Brigham Young University; Bret Swan, Brigham Young University
Tagged Divisions
Information Systems

examples.
Capstone
courses
in
mechanical
engineering
have
included
projects
that
 require
either
the
design
or
the
design
and
manufacture
of
a
project’s
solution.
Courses
in
civil
 engineering
generally
emphasize
only
the
design.
Many
capstone
courses
in
electrical
and
computer
 engineering
include
design,
fabrication,
and
testing
of
a
product.
Chemical
engineering
capstone
 courses
focus
mainly
on
experimental
research.”
(Citations
from
original
article
omitted)
In 2005 Howe and Wilbarger followed up the 1995 study with a second comprehensive nationalstudy2 where they list the primary concerns or topics of programs in engineering and technologyoffering capstone experiences. Table 1 shows these topics ranked by frequency of
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Robert MacDonald, Purdue University; Raheel Malik, Whirlpool Corp.; Anthony Smith, Purdue University; James Goldman, Purdue University
Tagged Divisions
Information Systems
AC 2008-2591: COMPARATIVE FRAMING ANALYSIS FOR TEACHINGWIRELESS NETWORK MOBILITYRobert MacDonald, Purdue University Robert MacDonald is a graduate student with the College of Technology at Purdue University. He completed his undergraduate degree in 2006, obtaining his BS in Network Engineering Technology from Purdue University as well. Robert is expecting to complete his MS in December of 2008. His interests lie in advanced internetwork design, wireless networking, and applied network security. His thesis research is focused on the implementation of secure routing protocols.Raheel Malik, Whirlpool Corp. Raheel A. Malik is a senior analyst with the Information Security and Audit Compliance
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Judith Challinger, California State University, Chico; Rachael Teasdale, California State University, Chico
Tagged Divisions
Information Systems
collection in the field andsubsequent graphing and analysis are important skills for students in many different scientificdisciplines. This paper presents a project currently underway by computer science andenvironmental science faculty at the California State University, Chico to address these needs. Amulti-tier system is being developed to serve as a repository for data collected in the field byenvironmental science students, facilitate graphing and analysis of data, and provide a platformfor interdisciplinary teams of students to collaborate on both software development and dataanalysis tasks.IntroductionIn 2005, Microsoft Research Cambridge brought together an international panel of scientists forthe Towards 2020 Science workshop.1 Their goal
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
Susan Miertschin, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
to deepen and broaden her knowledge of a key application domain for information systems. She has taught both online and hybrid courses and is interested in enhancing the quality of online learning experiences.Cheryl Willis, University of Houston Cheryl Willis is an Associate Professor of Information Systems Technology at the University of Houston. She received her Ph.D. in Curriculum and Instruction from the University of Florida. Her teaching focus is primarily on applications development and database management. Her research interests include curriculum revision processes for career and technology programs; service learning in information technology undergraduate programs and the use of
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Tal Rusak, Cornell University; Christopher Barnes, Cornell University; G. Scott Russ, Cornell University; Vincent Kam, Cornell University; David Gries, Cornell University
Tagged Divisions
Information Systems
AC 2009-2507: CPAS: ON THE STRUCTURE AND USABILITY OF ACOURSE-PLANNING AND AUDIT SYSTEMTal Rusak, Cornell University Tal Rusak is an undergraduate student at the Department of Computer Science at Cornell University, graduating May 2009. Tal's interests lie in understanding the structure of networks and novel computing systems as well as in the theory and practice of engineering and computer science education. Tal was recognized as the 2009 Computing Research Association (CRA) Outstanding Undergraduate Award Winner. Tal's research in modeling the temporal variations of low-power wireless network links has been published internationally and was recognized by the Best Paper Award at ACM
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Kyle Lutes, Purdue University; John Springer, Purdue University; Kelly Howard, Purdue University
Tagged Divisions
Information Systems
design, although generally on a much smaller scale than that of DBMSs such as Oracleor DB25. There are several flavors of embedded database systems or models including in-memory, disk-based, XML, hierarchical, embedded SQL, and navigational APIs. As the demandfor “smarter” devices increases, the market (and diversity of products) will continue to grow.Survey of Products and FeaturesThere are a variety of commercial and open source embedded database products available on themarket today. Some vendors, such as Birdstep, have been working on embedded databaseproducts for nearly 20 years, whereas other products, such as db4o (database for objects), havemade their debut within the last five years.For our study, we initially researched the features
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Tokunbo Ogunfunmi, Santa Clara University
Tagged Divisions
Information Systems
AC 2009-2454: IEEE 802.11N WIRELESS LOCAL AREA NETWORKS STANDARD:Tokunbo Ogunfunmi, Santa Clara University TOKUNBO OGUNFUNMI, Ph.D., P.E. is an Associate Professor of Electrical Engineering at Santa Clara University, Santa Clara, California. He earned his BSEE (First Class Honors) from Obafemi Awolowo University (formerly University of Ife), Nigeria, his MSEE and PhDEE from Stanford University, Stanford, California. His teaching and research interests span the areas of Digital Signal Processing (theory, applications and implementations), Adaptive Systems, VLSI/ASIC Design and Multimedia Signal Processing. He is a Senior Member of the IEEE, Member of Sigma Xi, AAAS and
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
Tagged Divisions
Information Systems
2006-1411: LESSONS LEARNED FROM THE IMPLEMENTATION OF ANINTERNETWORKING REMOTE ACCESS LABORATORYShelton Houston, University of Southern Mississippi Dr. Houston is a professor in the School of Computing at the University of Southern Mississippi teaching in the Information Technology program. He is in his 26th year at the university and has 10 years of consulting experience in personal computer systems. His current research interest is in cryogenic-instrumentation.Christopher Herrod, University of Southern Mississippi Mr. Herrod is an Instructor in the School of Computing at the University of Southern Mississippi. He has a M.S. from the University of Southern Mississippi and has 10 years of
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Akram Al-Rawi, Zayed University; Azzedine Lansari, Zayed University; Faouzi Bouslama, Zayed University
Tagged Divisions
Information Systems
2006-818: INTEGRATING IT CERTIFICATIONS IN NETWORKING COURSES:CISCO CCNA VERSUS COMPTIA NETWORK+Akram Al-Rawi, Zayed University Akram is a Professor of CIS at Zayed University, UAE. He has worked at several academic institutions of which the last two were the University of Missouri-Columbia and Columbia College, MO. His teaching interests include programming languages, logic design, Networks, and computer architecture. His research interests include computer simulation, web caching architecture, and curriculum design. He holds certifications in A+ , Network+ , i-Net+, Sun Certified Java Programmer, ICDL, and CCNA Intro. Akram is also a Cisco certified instructor.Azzedine Lansari, Zayed University
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
Aloundeth Oupraxay, National University, San Diego, USA; Mudasser Wyne, National University, San Diego, USA; Patrick Olson, National University, San Diego, USA
Tagged Divisions
Information Systems
; they show advancement inhardware as well as software in comparison to the devices that were introduced in the past.Android was first released in 2008 and called G1 (HTC) and is developed by Open HandsetAlliance (OHA) [3, 8], .Oliver in [2] provides an extensive survey and evaluation of current mobileplatforms such as, Blackberry, iPhone, Symbian and Android. He concludes that these platformsdo not satisfy the needs of today’s researchers. However, people have used Android platform todevelop agent based, peer-to-peer mobile applications with JADE [7] and a lightweight distributed Page 15.180.3implementation of IMS LD [9]. In order to avoid