首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
和传统的C/S模型相比,移动代理模型在数据融合方面更适合无线传感器网络.在基于移动代理的数据融合算法中,移动代理访问传感节点的顺序以及总数对算法的效率、网络寿命等有着重大影响.为此提出了一种基于数据融合的移动代理曲线动态路由算法设计方案.通过构造特定数据结构的数据报文和数据表,给出了目标节点基本信息收集算法获取目标节点到处理节点的最优路径;将移动代理路由归结为一个优化问题,由静态路由算法求出移动代理迁移的静态最优路由节点序列,进而获得了移动代理基于曲线的动态路由算法.理论分析和模拟实验表明,随着传感器网络规模的增大和传感数据量的增加,和其它算法相比,该算法有更小的网络耗能和延时.  相似文献   

2.
传统电子商务存在的一些问题,移动Agent技术能很好的解决这些问题,讨论了移动Agent在电子商务中的主要应用,并设计了基于移动Agent的网上购物系统模型,最后分析了该模型的优点及不足。  相似文献   

3.
多Agent分布式的市场营销知识获取结构   总被引:4,自引:0,他引:4  
夏火松 《计算机工程》2003,29(7):178-180
探讨了网格计算下的市场营销知识检索与获取的结构,阐明了智能代理在知识检索与获取中的定义及其应用,提出了一种基于蚁群算法混合异构机制的多Agent分布式的市场营销知识获取结构。  相似文献   

4.
柳毅  张凌 《计算机应用》2006,26(9):2109-2110
移动代理数据安全是移动代理系统面临的主要安全问题之一。基于ElGamal公钥体制,提出了一个安全的移动代理数据保护方案。对其分析的结果表明,该协议不仅满足所有的安全要求,而且可以使得同一移动代理多次经过同一主机,弥补了当前方案的不足。  相似文献   

5.
移动代理是一种能在异质网络里各计算机间自主迁移的程序.尽管移动代理技术很适合分布式应用,但是安全问题一直是它得到更广泛应用的主要障碍之一.首先对已有的移动代理路由协议进行分析,然后提出了一个基于基本签字基本加密的移动代理路由协议,并对其安全性和计算复杂度进行了详细分析.结果表明,该协议满足路由协议的所有安全性质,而且相比原有的嵌套签字嵌套加密协议,具有更低的计算复杂度.最后,在此基础上提出了一个基于移动代理的鲁棒路由协议,该协议不需要在主机中配备安全的代理创建环境,对路由主机的配置要求不高,具有更广泛的应用性.  相似文献   

6.
Even though the advantages of mobile agents for distributed electronic commerce applications have been highlighted in numerous research works, mobile agent applications are not in widespread use today. For the success of mobile agent applications, secure, portable, and efficient execution platforms for mobile agents are crucial. However, popular mobile agent systems do not meet the high security requirements of electronic commerce applications, are not portable, or cause high overhead. Currently, the majority of mobile agent platforms is based on Java. These systems simply rely on the security model of Java, although it is not suited to protect agents and service components from each other.In contrast, J-SEAL2 is a mobile agent system designed to meet the high security, portability, and performance requirements of large-scale electronic commerce applications. J-SEAL2 extends the Java environment with a model of strong protection domains. The core of the system is a micro-kernel fulfilling the same functions as a traditional operating system kernel: protection, communication, domain termination, and resource control. For portability reasons, J-SEAL2 is implemented in pure Java. This paper focuses on the design of the new communication model in J-SEAL2, which allows convenient, efficient, and mediated communication in a hierarchy of strong protection domains.  相似文献   

7.
Integrity protection for Code-on-Demand mobile agents in e-commerce   总被引:1,自引:0,他引:1  
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection in mobile agent technology, still hinder the widespread use of software agents: from the agent's perspective, mobile agent integrity should be protected against attacks from malicious hosts and other agents. In this paper, we present Code-on-Demand (CoD) mobile agents and a corresponding agent integrity protection scheme. Compared to the traditional assumption that mobile agents consist of invariant code parts, we propose the use of dynamically upgradeable agent code, in which new agent function modules can be added and redundant ones can be deleted at runtime. This approach will reduce the weight of agent programs, equip mobile agents with more flexibility, enhance code privacy and help the recoverability of agents after attack. In order to meet the security challenges for agent integrity protection, we propose agent code change authorization protocols and a double integrity verification scheme. Finally, we discuss the Java implementation of CoD mobile agents and integrity protection.  相似文献   

8.
移动式网络的动态家乡代理协议   总被引:1,自引:0,他引:1       下载免费PDF全文
为了减轻移动式网络中的三角路由问题,引入一个动态家乡代理为外地的移动式网络提供本地家乡代理的服务。设计了基于AAA机制的动态家乡代理模型,实现了基于数字签名原则和D-H密钥交换算法的移动式网络注册和密钥协商协议,描述了移动式网络节点的数据路由方式。安全性分析表明,动态家乡代理协议安全地实现了移动路由器与动态家乡代理之间的密钥交换,有效防止了中间人攻击和会话拦截攻击,能对实施泛洪攻击的移动节点进行跟踪。  相似文献   

9.
基于Agent的分布式动态作业车间调度   总被引:9,自引:1,他引:8  
Agent技术是分布式工业系统建模的一种重要方法.本文对Agent及多Agent技术进 行了简要总结,综述了Agent技术在制造作业车间调度中的应用研究概况,提出了一种基于 合同网协议投标机制的多Agent分布式动态作业车间调度方案.  相似文献   

10.
Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of proc- essing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual ex- clusion in our previous work. In this paper, we use the framework to propose a novel ap- proach to detecting deadlocks in distributed system by using mobile agents, which dem- onstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detec- tion strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy.  相似文献   

11.
This paper presents research that investigated algorithms for high-precision identification of contextual information in location-aware engineering applications. The primary contribution of the presented work is the design and implementation of a dynamic user-viewpoint tracking scheme in which mobile users’ spatial context is defined not only by their position (i.e., location), but also by their three-dimensional head orientation (i.e., line of sight). This allows the identification of objects and artifacts visible in a mobile user’s field of view with much higher accuracy than was possible by tracking position alone. For outdoor applications, a georeferencing based algorithm has been developed using the Global Positioning System (GPS) and magnetic orientation tracking devices [5] to track a user’s dynamic viewpoint. For indoor applications, this study explored the applicability of wireless technologies, in particular Indoor GPS, for dynamic user position tracking in situations where GPS is unavailable. The objectives of this paper are to describe the details of the three-stage-algorithm that has been designed and implemented, and to demonstrate the extent to which positioning technologies such as GPS and Indoor GPS can be used together with high-precision orientation trackers to accurately interpret the fully-qualified spatial context of a mobile user in challenging environments such as those found on construction sites. The obtained results highlight the potential of using location-aware technologies for rapidly identifying and retrieving contextual information in engineering applications.  相似文献   

12.
基于APIT的三维移动代理路由算法研究*   总被引:3,自引:0,他引:3  
针对现有的移动代理路由算法都是基于二维环境的不足,提出了一种能应用于三维环境中的移动代理路由算法。首先,使用APIT定位法来获取三维空间中的传感器坐标;在获取传感器节点坐标后,引入蚁群算法对移动代理访问传感器节点的路径进行优化,由此,得到了一种全新的基于APIT的三维移动代理路由算法。仿真实验表明,新移动代理路由算法能较好地适应无线传感器网络的实际应用环境,且路径优化效果明显。  相似文献   

13.
The mobile agent‐based computational steering (MACS) for distributed applications is presented in this article. In the MACS, a mobile agent platform, Mobile‐C, is embedded in a program through the Mobile‐C library to support C/C++ mobile agent code. Runtime replaceable algorithms of a program are represented as agent services in C/C++ source code and can be replaced with new ones through mobile agents. In the MACS, a mobile agent created and deployed by a user from the steering host migrates to computing hosts successively to replace algorithms of running programs that constitute a distributed application without the need of stopping the execution and recompiling the programs. The methodology of dynamic algorithm alteration in the MACS is described in detail with an example of matrix operation. The Mobile‐C library enables the integration of Mobile‐C into any C/C++ programs to carry out computational steering through mobile agents. The source code level execution of mobile agent code facilitates handling issues such as portability and secure execution of mobile agent code. In the MACS, the network load between the steering and computing hosts can be reduced, and the successive operations of a mobile agent on multiple computing hosts are not affected whether the steering host stays online or not. The employment of the middle‐level language C/C++ enables the MACS to accommodate the diversity of scientific and engineering fields to allow for runtime interaction and steering of distributed applications to match the dynamic requirements imposed by the user or the execution environment. An experiment is used to validate the feasibility of the MACS in real‐world mobile robot applications. The experiment replaces a mobile robot's behavioral algorithm with a mobile agent at runtime. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

14.
建立强信任关系来实现对移动代理的安全认证方法,是保护移动代理平台在网格环境中免受恶意代理攻击的主要手段。由于网格的异构性以及虚拟组织之间没有信任传递关系,导致移动代理在跨虚拟组织迁移时,存在安全漏洞,所以结合基于D—S理论的资源信任度函数提出动态规划方案是符合网格结构需求的。该方法在移动代理进行迁移时,由移动代理与其所在的网格虚拟组织中的信任调度模块协同工作,完成移动代理的迁移任务,保护了移动代理不遭到恶意平台的攻击。  相似文献   

15.
A mobile agent platform for distributed network and systems management   总被引:3,自引:0,他引:3  
The mobile agent (MA) technology has been proposed for the management of networks and distributed systems as an answer to the scalability problems of the centralized paradigm. Management tasks may be assigned to an agent, which delegates and executes management logic in a distributed and autonomous fashion. MA-based management has been a subject of intense research in the past few years, reflected on the proliferation of MA platforms (MAPs) expressly oriented to distributed management. However, most of these platforms impose considerable burden on network and system resources and also lack of essential functionality, such as security mechanisms, fault tolerance, strategies for building network-aware MA itineraries and support for user-friendly customization of MA-based management tasks. In this paper, we discuss the design considerations and implementation details of a complete MAP research prototype that sufficiently addresses all the aforementioned issues. Our MAP has been implemented in Java and optimized for network and systems management applications. The paper also presents the evaluation results of our prototype in real and simulated networking environments.  相似文献   

16.
Mobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms. We develop application security models that capture initial trust relationships and consider their use for mobile agent security.  相似文献   

17.
This paper presents an agent-based artificial immune system approach for adaptive damage detection in distributed monitoring networks. The presented approach establishes a new monitoring paradigm by embodying desirable immune attributes, such as adaptation, immune pattern recognition, and self-organization, into monitoring networks. In the artificial immune system-based paradigm, a group of autonomous mobile monitoring agents mimic immune cells (such as B-cells) in the natural immune system, interact locally with monitoring environment, and respond to emerging problems through simulated immune responses. The presented immune-inspired monitoring paradigm has been applied to structural health monitoring. The “antibody” of a mobile monitoring agent is a pattern recognition algorithm tuned to a certain type of structural damage pattern. The mobile monitoring agent performs damage diagnosis based on structural dynamic response data. Mobile monitoring agents communicate with each other and collaborate with network components based on agent interaction protocols defined in agent standards, the Foundation for Intelligent Physical Agents standards. A mobile agent system embedded in sensor nodes supports the selective generation, migration, communication, and management of mobile monitoring agents automatically. The active structural health monitoring is achieved by distributing mobile monitoring agents to the sites where they are needed. The structural damage diagnosis using mobile monitoring agents and artificial immune pattern recognition method has been tested using a scaled steel bridge structure. The test result shows the feasibility of using this approach for real-time structural damage diagnosis.  相似文献   

18.
运行中网络的拓扑结构是动态变化的,因此提出了一种针对WAN环境设计的基于移动代理和动态拓扑的分布式入侵检测模型.该模型使用移动代理来实现入侵证据的收集、分析,通信和同步机制,并通过移动代理来跟踪运行中网络拓扑结构的动态变化以及网络入侵检测,并讨论了该模型的更新机制.  相似文献   

19.
Mobile multicast is a research hotspot and can provide many applications. Some mobile multicast schemes have been proposed, but most of them introduce new entities and study construction algorithms of the dynamic multicast delivery structure which is heavyweight for wireless devices. In this paper, we propose a light-weight mobile multicast (LMM) scheme for Fast Mobile IPv6 which reduces the redundant operational overhead by simplifying multicast listener discovery (MLD) proxying. The LMM scheme implements simplified MLD proxying function on home agent to reduce the complicated multicast routing protocol and modifies MLD host part function on mobile node to reduce the multicast membership messages interaction. In order to solve the tunnel convergence problem, LMM also introduces a multicast tunnel combination and reconstruction algorithm. We set up a test-bed to evaluate the performance of LMM, and compare it with other mobile multicast schemes. The experimental results show that LMM reduces the multicast disruption time at handover. Based on the experimental results, we analyze the cost of LMM, and the results show that it has lower protocol cost than other schemes.  相似文献   

20.
In this paper, a resource management for dynamic load balancing in mobile agent by artificial neural network scheme (ANN-DLB) is presented to maximize the number of the served tasks in developing high performance cluster. This dynamic load balance with the growth of the service type and user number in the mobile networks of the higher performance is required in service provision and throughput. Most of the conventional policies are used in load indices with the threshold value to decide the load status of the agent hosts by CPU or memory. The main factor influencing the workload is the competitions among the computing resources such as CPU, memory, I/O and network. There are certain I/O data of the intensive applications where load balancing becomes the important issue. This relationship between the computing resources is very complex to define the rules for deciding the workload. This paper proposed a new dynamic load balancing for evaluating the agent hosts’ workload with the artificial neural network (ANN). By applying the automatic learning of the back-propagation network (BPN) model can establish the ANN model and also can measure the agent host loading with five inputs: CPU, memory, I/O, network and run-queue length. The structure of the load balancing system is composed of three design agents: the load index agent (LIA), the resource management agent (RMA) and the load transfer agent (LTA). These experimental results reveal that the proposed ANN-DLB yields better performance than the other methods. These results demonstrate that the proposed method has high throughput, short response time and turnaround time, and less agent host negotiation complexity and migrating tasks than the previous methods.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号