您现在的位置: 首页> 研究主题> Mobile Agent

Mobile Agent

Mobile Agent的相关文献在1999年到2022年内共计114篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、经济计划与管理 等领域,其中期刊论文97篇、会议论文17篇、相关期刊60种,包括电脑知识与技术、计算机工程、计算机工程与科学等; 相关会议14种,包括中国通信学会国防通信技术委员会第五届学术年会暨现代通信技术学术研讨会、2008年中国信息技术与应用学术论坛、第二十四届中国数据库学术会议等;Mobile Agent的相关文献由273位作者贡献,包括刘锦德、吴吉义、张大方等。

Mobile Agent—发文量

期刊论文>

论文:97 占比:85.09%

会议论文>

论文:17 占比:14.91%

总计:114篇

Mobile Agent—发文趋势图

Mobile Agent

-研究学者

  • 刘锦德
  • 吴吉义
  • 张大方
  • 蔡洪波
  • 华蓓
  • 卢显良
  • 吕建
  • 唐家益
  • 庄力可
  • 张以利
  • 期刊论文
  • 会议论文

搜索

排序:

年份

    • Tarig Mohamed Ahmed
    • 摘要: Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent protection against malicious hosts.A new security mechanism called Checkpoints has been proposed.Checkpoint Mechanism(CPM)aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks.CPM assumes using a free-roaming mobility mechanism by Mobile agent systems.The main idea behind CPM is to generate multiple versions of Mobile Agent.The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts.MA versions are kept in Recovery Host(RH).RH plays a key role in CPM by controlling and monitoring MAs’recovery processes.A prototype method has been used to prove the feasibility of CPM.The p https://dsr.kau.edu.sa/Default-305-ARrototype was implemented by using the.Net framework and C#.full discussion for several scenarios has been done to analyze the feasibility and performance for CPM.As found from this research,CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely.In addition,there is no negative impact on the overall performance of the mobile agent system.
    • Gulzar Mehmood; Muhammad Zahid Khan; Muhammad Fayaz; Mohammad Faisal; Haseeb Ur Rahman; Jeonghwan Gwak
    • 摘要: Due to the advancement in wireless technology and miniaturization,Wireless Body Area Networks(WBANs)have gained enormous popularity,having various applications,especially in the healthcare sector.WBANs are intrinsically resource-constrained;therefore,they have specific design and development requirements.One such highly desirable requirement is an energy-efficient and reliable Data Aggregation(DA)mechanism for WBANs.The efficient and reliableDAmay ultimately push the network to operate without much human intervention and further extend the network lifetime.The conventional client-serverDAparadigm becomes unsuitable and inefficient for WBANs when a large amount of data is generated in the network.Similarly,in most of the healthcare applications(patient’s critical conditions),it is highly important and required to send data as soon as possible;therefore,reliable data aggregation in WBANs is of great concern.To tackle the shortcomings of the client-serverDAparadigm,theMobile Agent-Basedmechanismproved to be a more workable solution.In aMobile Agent-Based mechanism,a taskspecific mobile agent(code)traverses to the intended sources to gather data.Thesemobile agents travel on a predefined path called itinerary;however,planning a suitable and reliable itinerary for a mobile agent is also a challenging issue inWBANs.This paper presents a new Mobile Agent-Based DA scheme for WBANs,which is energy-efficient and reliable.Firstly,in the proposed scheme,the network is divided into clusters,and cluster-heads are selected.Secondly,a mobile agent is generated from the base station to collect the required data from cluster heads.In the case,if any fault occurs in the existing itinerary,an alternate itinerary is planned in real-time without compromising the network performance.In our simulation-based validation,we have found that the proposed system delivers significantly improved fault-tolerance and reliability with energy-efficiency and extended network lifetime in WBANs.
    • Nadia Ben Seghir; Okba Kazar; Khaled Rezeg; Samir Bourekkache
    • 摘要: Purpose-The success of web services involved the adoption of this technology by different service providers through the web,which increased the number of web services,as a result making their discovery a tedious task.The UDDI standard has been proposed for web service publication and discovery.However,it lacks sufficient semantic description in the content of web services,which makes it difficult to find and compose suitable web services during the analysis,search,and matching processes.In addition,few works on semantic web services discovery take into account the user’s profile.The purpose of this paper is to optimize the web services discovery by reducing the search space and increasing the number of relevant services.Design/methodology/approach-The authors propose a new approach for the semantic web services discovery based on the mobile agent,user profile and metadata catalog.In the approach,each user can be described by a profile which is represented in two dimensions:personal dimension and preferences dimension.The description of web service is based on two levels:metadata catalog and WSDL.Findings-First,the semantic web services discovery reduces the number of relevant services through the application of matching algorithm“semantic match”.The result of this first matching restricts the search space at the level of UDDI registry,which allows the users to have good results for the“functional match”.Second,the use of mobile agents as a communication entity reduces the traffic on the network and the quantity of exchanged information.Finally,the integration of user profile in the service discovery process facilitates the expression of the user needs and makes intelligible the selected service.Originality/value-To the best knowledge of the authors,this is the first attempt at implementing the mobile agent technology with the semantic web service technology.
    • 屈应照; 胡晓辉; 宗永胜; 张荣光
    • 摘要: MA(Mobile Agent)技术作为一种分布式中间件的方法,它很适合应用于WSN中自主性的数据融合和能量均衡方面。但是现有的一些MA路径规划方法确定的路径只考虑节点间的物理距离,此时网络会出现数据负载不均衡、延迟和安全性等一系列问题。针对上述问题,提出一种基于MA协议的路径规划方法(LDLM),该算法采用K-means聚类算法对网络分簇,然后由Sink节点根据每个簇节点规模派发若干个MA;并且在确定每个MA节点访问组时,综合考虑了节点采集数据量的规模和MA可用存储空间。最后,根据每个MA节点访问组,使用LCF算法确定MA对其节点访问组的访问路径。仿真实验结果表明:该算法在能量消耗、网络生命周期、任务工作周期三个方面性能表现优于现有的一些算法。%As a distributed middleware,Mobile Agent technology is suitable for autonomic data fusion and energy balance in wireless sensor networks. Several heuristic methods have been widely applied to the way the Itinerary planning of Mobile Agent,but some of these methods just consider the geographical distance among nodes as the unique factor when planning the Itinerary. There will cause the emergence of the data load unbalancing,large delay and security problems when WSN uses these methods. For tackling above problems,the Larger Data size in the Larger Memory(LDLM)algorithm is proposed. In this proposed scheme,we don’t only consider the geographical distance among nodes but take into account the data size from source nodes. Extensive simulation experiments show that the LDLM algorithm behaves better performance than other approaches on these three aspects consumption en⁃ergy,life cycle and task duration.
    • Chandrakant Jain; Aumreesh Kumar Saxena
    • 摘要: The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The evidence of intrusions is to be associated from all the held up nodes. From the last few years, mobile agent based technique in intrusion detection system (IDS) has been widely used to detect intrusion over distributed network. This paper presented survey of several existing mobile agent based intrusion detection system and comparative analysis report between them. Furthermore we have focused on each attribute of analysis, for example technique (NIDS, HIDS or Hybrid), behavior layer, detection techniques for analysis, uses of mobile agent and technology used by existing IDS, strength and issues. Their strengths and issues are situational wherever appropriate. We have observed that some of the existing techniques are used in IDS which causes low detection rate, behavior layers like TCP connection for packet capturing which is most important activity in NIDS and response time (technology execution time) with memory consumption by mobile agent as major issues.
    • 刘国岩; 朱国银
    • 摘要: 随着近年来突发事件的不断发生,对杭州市经济发展和社会稳定产生较多负面影响,因而建立杭州市突发事件的应急决策机制十分重要。通过可拓理论对突发事件中各种矛盾的分析和处理,再使用Mobile Agent进行多目标动态决策,能够建立起有效的突发事件应急决策机制。
    • 柳蒙蒙; 王华; 卓翠敏; 宫恩超
    • 摘要: 为了解决RIA手机应用中的访问效率问题,提出一种基于Mobile Agent的手机动漫阅读器构建模型,该模型采用带Mobile Agent的混合拓扑结构,将服务器计算量转移到Agent节点进行,并针对该系统建立了排队模型和系统费用模型,通过分析和仿真得出了一定目标下的系统最优解.
    • 张以利
    • 摘要: 针对网上课程自动答疑系统中的知识库答疑资源不足问题,提出采用Agent技术,通过移动Agent到多个资源共享站点搜索,完成答疑任务并补充和完善本地知识库;分析基类agent及其子类继承关系并讨论了功能agent的设计与实现.认为该方法能够实现多站点共享,解决答疑资源不足问题.
    • 魏华; 纪辉进; 金妮娅
    • 摘要: 为解决基于Mobile Agent技术的电子商务系统中的安全性问题,结合电子商务系统工作特点,设计基于Mobile Agent的安全电子商务系统MASEC(Secure Electronic Commerce Based On Mobile Agent),可以采用IBM公司的Aglets系统,对该模型进行仿真实验.
    • 孙名松; 李卿; 刘鑫
    • 摘要: 传统入侵检测系统的能力在迅猛发展的互联网面前日显薄弱.探讨了将P2P技术、Mobile-agent技术引入到传统入侵检测系统中,构建一个基于P2P的Mobile-agent入侵检测系统.组成该系统的Agent在网络的各个节点间流动,实时监测网络状况,同时Agent能够互相识别各自的行为并能根据潜在的策略采取适当的反应.该系统与传统系统相比具有灵活性、分布式、智能化等特点,能全面、深入地实现入侵的检测和防御.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号