To see the other types of publications on this topic, follow the link: Mobile Agent Server.

Journal articles on the topic 'Mobile Agent Server'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile Agent Server.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Haroon, Mohd, Dr Mohd Husain, Manish Madhav Tripathi, Tameem ahmad, and vandana kumari. "Server Controlled Mobile Agent." International Journal of Computer Applications 11, no. 4 (2010): 13–16. http://dx.doi.org/10.5120/1572-2101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tie, Zhixin. "A Mobile Agent-Based System for Server Resource Monitoring." Cybernetics and Information Technologies 13, no. 4 (2013): 104–17. http://dx.doi.org/10.2478/cait-2013-0057.

Full text
Abstract:
Abstract Mobile agent technology has become an important approach for the design and development of distributed systems. Currently, there is little research regarding the efficiency of mobile agent-based monitoring of the server resource. Based on the Mobile-C library, a mobile agent-based system called Mobile Agent- Based Server Resource Monitoring System (MABSRMS) is presented. In MABSRMS mobile agents can call low level functions in binary dynamic or static libraries, and thus can monitor server resource conveniently and efficiently. The experiment was conducted in a university computer cen
APA, Harvard, Vancouver, ISO, and other styles
3

Osunade, O., and R. D. Oloritun. "MOBILE AGENT APPLICATION DEVELOPMENT IN A SIMPLE JAVA-BASED MOBILE AGENT SYSTEM (SIMMAS)." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 7, no. 2 (2013): 565–73. http://dx.doi.org/10.24297/ijct.v7i2.3458.

Full text
Abstract:
As network information resources grew in size, it was most efficient to process queries and updates at the site where the data was located. The processing accomplished by a traditional client-server network interface constrained the client to the set of queries supported by the server, or required the server to send all data to the client for processing. The former was inflexible and the latter was inefficient. Mobile agents support the movement of the client computation to the location of the remote resource. It has the potential to be flexible and efficient. Mobile agents are capable of susp
APA, Harvard, Vancouver, ISO, and other styles
4

Ojesanmi, O. A. "Security Issues in Mobile Agent Applications." International Journal of Agent Technologies and Systems 2, no. 4 (2010): 39–55. http://dx.doi.org/10.4018/jats.2010100104.

Full text
Abstract:
An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many
APA, Harvard, Vancouver, ISO, and other styles
5

Jiao, Yu, and Ali R. Hurson. "Performance Analysis of Mobile Agents in Mobile Distributed Information Retrieval System – A Quantitative Case Study." Journal of Interconnection Networks 05, no. 03 (2004): 351–72. http://dx.doi.org/10.1142/s0219265904001210.

Full text
Abstract:
The traditional client/server-based distributed system design paradigm demonstrates deficiencies in the mobile computing environment because it relies on network connectivity and reliable communication. The advances in mobile agent technology alleviate these problems. The execution autonomy of mobile agents relaxes the requirement on network connectivity and provides opportunities for conserving energy. To the best of our knowledge, in spite of the large body of research in the application and exploitation of agent-based technology, a quantitative comparison of systems implemented using the cl
APA, Harvard, Vancouver, ISO, and other styles
6

Kasi, Mumraiz Khan, Sarah Abu Ghazalah, Raja Naeem Akram, and Damien Sauveron. "Secure Mobile Edge Server Placement Using Multi-Agent Reinforcement Learning." Electronics 10, no. 17 (2021): 2098. http://dx.doi.org/10.3390/electronics10172098.

Full text
Abstract:
Mobile edge computing is capable of providing high data processing capabilities while ensuring low latency constraints of low power wireless networks, such as the industrial internet of things. However, optimally placing edge servers (providing storage and computation services to user equipment) is still a challenge. To optimally place mobile edge servers in a wireless network, such that network latency is minimized and load balancing is performed on edge servers, we propose a multi-agent reinforcement learning (RL) solution to solve a formulated mobile edge server placement problem. The RL ag
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Ying, Bao Fang Hu, and Chen Lin Wei. "A Security Strategy of Mobile Agent System." Applied Mechanics and Materials 336-338 (July 2013): 2401–5. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2401.

Full text
Abstract:
The paper aims at the security issues of the mobile agent system to propose a mobile agent system based on tracking mechanism which has a third-party certification center similar to an authority sector, whose hosts and mobile agents in mobile agent system are required to be registered in the third-party certification center so as to obtain a digital certificate issued by the third-party certification center. Each server launching mobile agent has a static communication agent Tracker, responsible for maintaining the context information launched by the mobile agent and agent migration thereby so
APA, Harvard, Vancouver, ISO, and other styles
8

O., I. Araoye, Adewale O.S., Alese B.K., and R. Akinyede O. "Developing a Secured Mobile-Agent-Based Electronic Commerce Using Crypto-Steganography." International Journal of Sciences Volume 7, no. 2018-02 (2018): 82–88. https://doi.org/10.5281/zenodo.3350231.

Full text
Abstract:
Mobile agent is gaining attention in the research community because of its potential to replace traditional client-Server application in computer network system. Mobile agent has the ability to migrate autonomously from one server to another server as specified in its itinerary in computer network. Areas where mobile agent profit includes network management, information retrieval and electronic commerce. Mobile agent can be delegated to carry out all stages that are involved in electronic commerce such as Product brokering, Merchant brokering, Negotiation and Purchase. However there are securi
APA, Harvard, Vancouver, ISO, and other styles
9

M., O. Lawal, G. Akintola K., K. Boyinbode O., and Onyeka N.C. "A Framework for Monitoring Network Node Failure using Mobile Agents." A Framework for Monitoring Network Node Failure using Mobile Agents 8, no. 10 (2023): 11. https://doi.org/10.5281/zenodo.10065925.

Full text
Abstract:
Fault detection is an essential aspect of conducting fault diagnosis for computer networks. It comprises of two phases: fault detection and fault localization. The use of mobile agents for detecting faulty nodes on a network is a concept aimed at ensuring the proper functioning of networks. This research aims to design a fault detection framework for a network system using a mobile agent. Light Weight Agent (LWA) travels within the nodes to detect nodes that are down on the network and returns true or false along with other information as the status of each node visited. The system is designed
APA, Harvard, Vancouver, ISO, and other styles
10

Wen, Cheng-Kang, Shang-Rong Tsai, and Jin-Pei Su. "Using mobile agent technology to build a scalable server." International Journal of Computer Applications in Technology 15, no. 6 (2002): 264. http://dx.doi.org/10.1504/ijcat.2002.000301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Baousis, Vasileios, Stathes Hadjiefthymiades, George Alyfantis, and Lazaros Merakos. "Autonomous mobile agent routing for efficient server resource allocation." Journal of Systems and Software 82, no. 5 (2009): 891–906. http://dx.doi.org/10.1016/j.jss.2008.12.029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wei, Zhen Gang, Xi Zhou Sun, and Xiao Hua Wang. "An Agent-Based Load Balancing Approach for RFID MiddleWares." Applied Mechanics and Materials 541-542 (March 2014): 1458–62. http://dx.doi.org/10.4028/www.scientific.net/amm.541-542.1458.

Full text
Abstract:
For company to extend their RFID applications ceaselessly, the fundamental challenge is how to satisfy enterprise applications more effectively, while avoids mainframe server purchased and existed servers leave unused. It needs to decentralize work by using several RFID middlewares. So load balancing method is required for preventing centralization work in certain RFID middleware. In this paper, as a solution of tackle the challenge, we proposed a new load balancing approach based on mobile agent for RFID middlewares, which includes: information gathering policy, transfer policy, selection pol
APA, Harvard, Vancouver, ISO, and other styles
13

Tang, Fei, Hongda Li, Qihua Niu, and Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.

Full text
Abstract:
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator) to delegate its signing right to another entity (proxy) to sign some specified messages on b
APA, Harvard, Vancouver, ISO, and other styles
14

Chung, Sheng-Hung, and Ean-Teng Khor. "Mobile Agents Approach for Transaction Processing in Mobile Database Systems – Mobile Learning Environment." Asian Association of Open Universities Journal 6, no. 1 (2011): 74–83. http://dx.doi.org/10.1108/aaouj-06-01-2011-b008.

Full text
Abstract:
This paper describes the architecture of using the Mobile Agent and ACID (Atomicity, Consistency, Isolation and Durability) in Mobile e-Learning (mLearning). In the coming years, there will be an incremental amount of mobile learning experiments for the purpose of implementing mobile ICTs into mainstream education. In this article, the Replication Agent and Snapshot Agent architecture is proposed as an effective way to overcome the problem of heavy loading on the limited bandwidth used in wireless transmission for mobile learning environment merge replication process. The implementation of mob
APA, Harvard, Vancouver, ISO, and other styles
15

KOLSI, NADER, ABDELAZIZ ABDELLATIF, and KHALED GHEDIRA. "AGENT BASED DATA STORAGE AND DISTRIBUTION IN DATA WAREHOUSES." International Journal of Software Engineering and Knowledge Engineering 18, no. 05 (2008): 597–617. http://dx.doi.org/10.1142/s0218194008003842.

Full text
Abstract:
The data warehouse (DWH) is usually presented as a centralized database. In this paper, we propose a new approach to manage data storage and distribution in a data warehouse environment. This approach deals with the dynamic data distribution of the DWH on a set of servers. The data distribution that we consider is different from the "classical" one which depends on the data use. The distribution in our approach consists in distributing data when the server reaches its storage capacity limit. This distribution assures the scalability and exploits the storage and processing resources available i
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Xiaoyu, Guojun Xiong, Houwei Cao, Jian Li, and Yong Liu. "Decentralized Federated Learning with Model Caching on Mobile Agents." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 20 (2025): 21296–303. https://doi.org/10.1609/aaai.v39i20.35429.

Full text
Abstract:
Federated Learning (FL) trains a shared model using data and computation power on distributed agents coordinated by a central server. Decentralized FL (DFL) utilizes local model exchange and aggregation between agents to reduce the communication and computation overheads on the central server. However, when agents are mobile, the communication opportunity between agents can be sporadic, largely hindering the convergence and accuracy of DFL. In this paper, we propose Cached Decentralized Federated Learning (Cached-DFL) to investigate delay-tolerant model spreading and aggregation enabled by mod
APA, Harvard, Vancouver, ISO, and other styles
17

Kumar, Pradeep, Niraj Singhal, Mohammad Asim, and Avimanyou Vatsa. "An Optimized Authentication Mechanism for Mobile Agents by Using Machine Learning." International Journal of Computer Network and Information Security 15, no. 6 (2023): 30–39. http://dx.doi.org/10.5815/ijcnis.2023.06.03.

Full text
Abstract:
A mobile agent is a small piece of software which works on direction of its source platform on a regular basis. Because mobile agents roam around wide area networks autonomously, the protection of the agents and platforms is a serious worry. The number of mobile agents-based software applications has increased dramatically over the past year. It has also enhanced the security risks associated with such applications. Most of the security mechanisms in the mobile agent architecture focus solely on platform security, leaving mobile agent safety to be a significant challenge. An efficient authenti
APA, Harvard, Vancouver, ISO, and other styles
18

Moukafih, Nabil, Ghizlane Orhanou, and Said Elhajji. "Mobile agent-based SIEM for event collection and normalization externalization." Information & Computer Security 28, no. 1 (2019): 15–34. http://dx.doi.org/10.1108/ics-01-2019-0008.

Full text
Abstract:
Purpose This paper aims to propose a mobile agent-based security information and event management architecture (MA-SIEM) that uses mobile agents for near real-time event collection and normalization on the source device. The externalization of the normalization process, executed by several distributed mobile agents on interconnected computers and devices, proposes a SIEM server dedicated mainly for correlation and analysis. Design/methodology/approach The architecture has been proposed in three stages. In the first step, the authors described the different aspects of the proposed approach. The
APA, Harvard, Vancouver, ISO, and other styles
19

ZHANG, LIANG, QINGPING LIN, ROBERT GAY, GUANGBIN HUANG, and NORMAN NEO. "AN AUTONOMOUS DECENTRALIZED MULTI-SERVER FRAMEWORK FOR LARGE SCALE COLLABORATIVE VIRTUAL ENVIRONMENTS." International Journal of Image and Graphics 07, no. 02 (2007): 353–75. http://dx.doi.org/10.1142/s0219467807002684.

Full text
Abstract:
Collaborative Virtual Environment (CVE) is a promising technology which provides an online shared virtual world to the geographically dispersed people to interact with each other. However, the scalability of existing CVE system is limited due to the constraints in processing power and network speed of each participating host. Large scale CVE (LCVE) that supports a large number of concurrent participants and a large amount of evolving virtual entities is not easy to achieve. In this paper, an autonomous decentralized grid based mobile agent framework for large scale CVE — MACVE is proposed. In
APA, Harvard, Vancouver, ISO, and other styles
20

Vashistha, Jyoti. "Mobile Agent Based Approach Load Balancing in Heterogeneous Web Server System." IOSR Journal of Engineering 4, no. 6 (2014): 44–47. http://dx.doi.org/10.9790/3021-04624447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rwiza, Sigsbert, Mussa Kissaka, and Kosmas Kapis. "Security Model for Tracking Creation of Mobile Money Using Transport Layer Security Protocol." Tanzania Journal of Science 46, no. 3 (2020): 791–806. http://dx.doi.org/10.4314/tjs.v46i3.19.

Full text
Abstract:
Mobile Network Operator (MNO) financial service model has security vulnerabilities in addressing verification of cash and mobile money. For instance, monthly returns are transferred in plain text from banks and MNOs to financial regulators. This may result to failure of financial regulators in detecting creation of fake mobile money. This study was conducted to develop a security model for tracking creation of mobile money using Transport Layer security protocol as a way of protecting returns in transit from banks and MNOs to financial regulators. The proposed model was developed using insight
APA, Harvard, Vancouver, ISO, and other styles
22

Sallow, Amira B., and Sarkawt R. Hussain. "Multi-Agent System for Supporting and Managing Real Estate Marketing." Academic Journal of Nawroz University 9, no. 3 (2020): 54. http://dx.doi.org/10.25007/ajnu.v9n3a703.

Full text
Abstract:
Recently there have been major changes in the real estate market, where everyone is investing in sell or buy properties, which meet their needs and suit their pockets. In this paper, a multi-agent system for real estate marketing where considered. The proposed system provides the clients with an easy and practical solution through advertising their property and searches for a buyer or seller on behalf of them. And The system makes use of agent’s technology as its core function for locating a suitable property among hundreds or even thousands of the offers. The proposed system provides clients
APA, Harvard, Vancouver, ISO, and other styles
23

Singh, Rahul, and Rajesh Purohit. "Study of Mobile Agent Server Architectures for Homogeneous and Heterogeneous Distributed Systems." International Journal of Computer Applications 156, no. 4 (2016): 32–37. http://dx.doi.org/10.5120/ijca2016912420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sugiantoro, Bambang, Retantyo Wardoyo, Sri Hartati, and Jazi Eko Istiyanto. "APPLICATION FOR MOBILE AGENT TO ACCESS MYSQL." IJID (International Journal on Informatics for Development) 1, no. 2 (2017): 22. http://dx.doi.org/10.14421/ijid.2012.01204.

Full text
Abstract:
Availability of information is increasing rapidly, the method for encoding and storage of information also increased. The number of sources of information brings several problems, among them about how to combine the distributed data storage and different. Information on an organization or company is usually stored in separate locations and different formats. When there is an increase in storage capacity and the amount of information search costs, the company faced with an abundance amount of data. System development methodology used is Rapid Application Development (RAD) with a development fra
APA, Harvard, Vancouver, ISO, and other styles
25

Ojesanmi, O. A., S. O. Ojesanmi, B. Akinnuwesi, and M. Odim. "A Framework for Deployment of 3g Wireless Network and Mobile Agent in Health Care Delivery System." International Journal of Agent Technologies and Systems 2, no. 4 (2010): 10–16. http://dx.doi.org/10.4018/jats.2010100102.

Full text
Abstract:
The extent of the AIDS crisis is becoming clear in many African countries, as increasing numbers of people with HIV are becoming ill. The technology of mobile phones has brought ubiquitous access to information coupled with software agents and health care delivery systems in hospitals. It enables patient-physician contact to be more frequent. Such an environment can provide personalized monitoring services to patients and decision support to physicians, as well as maintenance for cost control. This paper proposes the deployment of 3G wireless technology with mobile agents for health care deliv
APA, Harvard, Vancouver, ISO, and other styles
26

Kotsilieris, Theodore. "An Efficient Agent Based Data Management Method of NoSQL Environments for Health Care Applications." Healthcare 9, no. 3 (2021): 322. http://dx.doi.org/10.3390/healthcare9030322.

Full text
Abstract:
Background: As medical knowledge is continuously expanding and diversely located, Health Information Technology (HIT) applications are proposed as a good prospect for improving not only the efficiency and the effectiveness but also the quality of healthcare services delivery. The technologies expected to shape such innovative HIT architectures include: Mobile agents (Mas) and NoSQL technologies. Mobile agents provide an inherent way of tackling distributed problems of accessing heterogeneous and spatially diverse data sources. NoSQL technology gains ground for the development of scalable appli
APA, Harvard, Vancouver, ISO, and other styles
27

Garrido, Pilar, Irene Ruiz, and Miguel Gómez-Nieto. "An Alert System for People Monitoring Based on Multi-Agents using Maps." JUCS - Journal of Universal Computer Science 19, no. (9) (2013): 1257–74. https://doi.org/10.3217/jucs-019-09-1257.

Full text
Abstract:
This paper describes an alert system for people monitoring based on multi-agent using maps. This system monitors the users' physical context using their mobile phone. The data acquisition is made using the available sensors on mobile phone. A set of agents on mobile phones are responsible for collecting, processing and sending data to the server. Another set of agents on server stores the data and checks the preconditions of the restrictions associated with the user, in order to trigger the appropriate alarms. These alarms are sent not only to the user that violates a restriction, but also to
APA, Harvard, Vancouver, ISO, and other styles
28

D., D., D. .., and B. Samitha. "Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network." International Journal of Wireless and Ad Hoc Communication 9, no. 1 (2025): 61–65. https://doi.org/10.54216/ijwac.090105.

Full text
Abstract:
A novel honey pot deception trace back model, or honey pot IDS, is offered. The system is located on the server, which is the site of network intrusion deceptions. From there, it keeps an eye on all incoming traffic and uses nodes that carry out network weight age studies to continuously weigh the data. For every client connected to the server, it serves as a construct to look at the packet analysis and transmission path to which the IP processed the intrusion detection system. This LF-IDS detects intrusions using both anomaly-based and rule-based intrusion detection methods. By gathering and
APA, Harvard, Vancouver, ISO, and other styles
29

Lin, Chia Chia, and Huan Ming Chuang. "Fundamental Framework of Supporting M-Learning in RFID System." Advanced Materials Research 1014 (July 2014): 476–79. http://dx.doi.org/10.4028/www.scientific.net/amr.1014.476.

Full text
Abstract:
Existing E-Learning courses are designed to guide users acquire information or to help users undertake specific tasks. User is expected to increase proficiency about the context via the stationary computer. However, such design cannot allow multiple users to access the system simultaneously, thus leading inefficiency and lack of expandability. A framework to support M-learning in RFID system is therefore proposed. A mobile user first can use a mobile computer to communicate with home agent to acquire the related server information he may be interested in. The framework can navigate mobile agen
APA, Harvard, Vancouver, ISO, and other styles
30

Ke, Hongchang, Hui Wang, and Hongbin Sun. "Multi-Agent Deep Reinforcement Learning-Based Partial Task Offloading and Resource Allocation in Edge Computing Environment." Electronics 11, no. 15 (2022): 2394. http://dx.doi.org/10.3390/electronics11152394.

Full text
Abstract:
In the dense data communication environment of 5G wireless networks, with the dramatic increase in the amount of request computation tasks generated by intelligent wireless mobile nodes, its computation ability cannot meet the requirements of low latency and high reliability. Mobile edge computing (MEC) can utilize its servers with mighty computation power and closer to tackle the computation tasks offloaded by the wireless node (WN). The physical location of the MEC server is closer to WN, thereby meeting the requirements of low latency and high reliability. In this paper, we implement an MEC
APA, Harvard, Vancouver, ISO, and other styles
31

Huey-Der, Chu *1. "AN INTELLIGENT FRAMEWORK FOR DYNAMIC TEST PLAN OF CLIENT/SERVER APPLICATIONS." International Journal of Engineering Technologies and Management Research 5, no. 5 (2018): 1–10. https://doi.org/10.5281/zenodo.1255316.

Full text
Abstract:
To assist a solution to the problem of the test environment spanning multiple platforms, this paper proposes a decision support framework with the blackboard model to integrate all complementary features into a single automated test environment for multi-platform client/server applications. Before testing client/server applications, the input into this framework are testing tools with different approaches and client sites which are going to run the test. The planning agent will make a decision dynamically and produce a testing plan to allocate testing tasks to these testing tools to client sit
APA, Harvard, Vancouver, ISO, and other styles
32

Ashwaq Maghraby, Ashwaq Maghraby. "Geographic Information System Based on Mobile Agent and Ontology." journal of King Abdulaziz University Engineering Sciences 23, no. 1 (2012): 39–57. http://dx.doi.org/10.4197/eng.23-1.3.

Full text
Abstract:
A Geographic Information System (GIS) is an important distributed information resource. GIS technology is being utilized in many areas of research. Based on the concept of agent, we introduce a multi-agent architecture to develop a GIS Multi-Agent System based on Ontology (GISMAO) that enables cooperation to assist different users to locate and retrieve spatial GIS file information in large networks based on ontological relationship between GIS concepts. GISMAO consists of two subsystems: Gathering subsystem; and Query subsystem. The Gathering Sub-System is used to collect spatial GIS files in
APA, Harvard, Vancouver, ISO, and other styles
33

Zhou, Jian Lan. "A Comprehensive Agent-Based Safety Solution Meeting the Controllable Work System." Key Engineering Materials 467-469 (February 2011): 1493–98. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1493.

Full text
Abstract:
This paper proposes and implements a comprehensive software system based on agents and mobile agents techniques, which firstly deals with the network admission control and authorization, adopting the traditional password authentication schema and an intelligent, flexible sensor whose kernel is the NDIS-hooking driver. Agent Message Protocol over UDP/TCP is proposed to secure and encrypt the communication data among stationary agents and server components, which eradicates malicious codes embedded or spread in the internal network. In order to avoid the above software agents mangled or destroye
APA, Harvard, Vancouver, ISO, and other styles
34

Adi, Wiranata, Sarkadi, and Ibrahim Nurzengky. "THE INFLUENCE OF INQUIRY LEARNING MODEL AND LEARNING MOTIVATION ON RESULTS LEARNING HISTORY AT STATE 6 HIGH SCHOOL BANDAR LAMPUNG." International Journal of Engineering Technologies and Management Research 6, no. 7 (2019): 74–78. https://doi.org/10.5281/zenodo.3341539.

Full text
Abstract:
To assist a solution to the problem of the test environment spanning multiple platforms, this paper proposes a decision support framework with the blackboard model to integrate all complementary features into a single automated test environment for multi-platform client/server applications. Before testing client/server applications, the input into this framework are testing tools with different approaches and client sites which are going to run the test. The planning agent will make a decision dynamically and produce a testing plan to allocate testing tasks to these testing tools to client sit
APA, Harvard, Vancouver, ISO, and other styles
35

WU, YEU, YONGHONG TIAN, and WANLEI ZHOU. "THE DEVELOPMENT OF A MOBILE DECISION SUPPORT SYSTEM." Journal of Interconnection Networks 02, no. 03 (2001): 379–90. http://dx.doi.org/10.1142/s0219265901000452.

Full text
Abstract:
The emergence of mobile computing environments brings out various changes in the requirements and applications involving distributed data and has made the traditional Intelligent Decision Support System (IDSS) architectures based on the client/server model ineffective in mobile computing environments. This paper discusses the deficiencies of the current IDSS architectures based on data warehouse, on-line analysis processing (OLAP), model base (MB) and knowledge based (KB) technologies. By adopting the agent technology, the paper extends the IDSS system architecture to the Mobile Decision Suppo
APA, Harvard, Vancouver, ISO, and other styles
36

Huey-Der Chu. "AN INTELLIGENT FRAMEWORK FOR DYNAMIC TEST PLAN OF CLIENT/SERVER APPLICATIONS." International Journal of Engineering Technologies and Management Research 5, no. 5 (2020): 1–10. http://dx.doi.org/10.29121/ijetmr.v5.i4.2018.220.

Full text
Abstract:
To assist a solution to the problem of the test environment spanning multiple platforms, this paper proposes a decision support framework with the blackboard model to integrate all complementary features into a single automated test environment for multi-platform client/server applications. Before testing client/server applications, the input into this framework are testing tools with different approaches and client sites which are going to run the test. The planning agent will make a decision dynamically and produce a testing plan to allocate testing tasks to these testing tools to client sit
APA, Harvard, Vancouver, ISO, and other styles
37

Лютикова, М. Н. "Multi-Agent Autonomous Group Management Network offshore mobile facilities." MORSKIE INTELLEKTUAL`NYE TEHNOLOGII)</msg>, no. 2(60) (May 25, 2023): 144–54. http://dx.doi.org/10.37220/mit.2023.60.2.018.

Full text
Abstract:
В работе рассматриваются вопросы построения системы мультиагентной сети автономного судовождения в порту Новороссийск. В исследовании решается задача безэкипажного судовождения и буксирного обеспечения в порту на основе мультиагентного подхода. В статье описывается система, состоящая из интеллектуального агента (швартуемое судно), группы смышлёных агентов, которыми являются статические навигационные точки, привязанные к причалу и существующим маякам и действительно интеллектуальных агентов – это буксиры-автоматы, которые имеют интеллектуальную управляющую систему. В состав интеллектуальной упр
APA, Harvard, Vancouver, ISO, and other styles
38

Rocha-Hernández, July Andrea, Roxana Andrea Jaramillo-Cobos, and Luis Felipe Wanumen-Silva. "Architecture for ports scan using mobile agents." Visión electrónica 2, no. 2 (2019): 313–23. http://dx.doi.org/10.14483/22484728.18433.

Full text
Abstract:
This article proposes a software architecture for port scanning using mobile agents (AM), in order to facilitate the monitoring of network traffic or detect vulnerabilities in the logical ports of the operating system. The exposed architecture allows: to execute resident processes in each one of the stations to be monitored; include communication mechanisms that provide a high degree of autonomy to the AM; and include route planning mechanisms that choose the optimal route for each agent assigned to perform tasks on a network host. Consequently, a high availability of information in distribute
APA, Harvard, Vancouver, ISO, and other styles
39

Ramu Kuchipudi, Ramu, Dr Ahmed Abdul Moiz Qyser, and Dr V V S S S Balaram. "Energy efficient Key Distribution for Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 4.6 (2018): 45. http://dx.doi.org/10.14419/ijet.v7i4.6.20234.

Full text
Abstract:
Key distribution in Wireless sensor networks is crucial whenever they deployed in critical applications. Cryptography is used to protect sensitive information from disclosure. Key management is important component in cryptography. Cryptography is not useful if keys are disclosed to attackers. Designing an efficient key management for sensor network is a difficult task because of scarcity of computing and memory resources. An efficient key distribution approach is proposed by using mobile agent paradigm rather than client server model. The proposed approach will use good features of both symmet
APA, Harvard, Vancouver, ISO, and other styles
40

Kumar, Pradeep, Sur Singh Rawat, Kakoli Banerjee, Ayodeji Olalekan Salau, Gyanendra Kumar, and Niraj Singhal. "Secure mobile agents for efficient medical information retrieval: A verifiable variable threshold secret sharing approach." PLOS One 20, no. 6 (2025): e0325950. https://doi.org/10.1371/journal.pone.0325950.

Full text
Abstract:
Mobile Agents are a new type of computing that is replacing the client-server approach. Mobile agents are little pieces of code that function automatically on behalf of the owner. Many applications, such as e-commerce, parallel computing, network management, and health care, use mobile agents. The healthcare industry is one of the most growing fields in any country. As the population increases day by day the requirement of medical resources is proportionally increasing. Due to high patient demand and a severe lack of medical resources, a remote medical healthcare system is required. However, t
APA, Harvard, Vancouver, ISO, and other styles
41

Vitalii, Diduk, Hrytsenko Valerii, and Yeromenko Andrii. "BUILDING A MODEL OF NETWORK INTERACTION BETWEEN THE COMPONENTS OF A MULTIAGENT SYSTEM OF MOBILE ROBOTS." Eastern-European Journal of Enterprise Technologies 5, no. 9 (107) (2020): 57–63. https://doi.org/10.15587/1729-4061.2020.213989.

Full text
Abstract:
The results reported here represent the first stage in the development of a full-featured laboratory system aimed at studying machine learning algorithms. The relevance of the current work is predetermined by the lack of network small-size mobile robots and appropriate control software that would make it possible to conduct field experiments in real time. This paper reports the selection of network data transmission technology for managing mobile robots in real time. Based on the chosen data transmission protocol, a complete stack of technologies of the network model of a multi-agent system of
APA, Harvard, Vancouver, ISO, and other styles
42

Goldin, Alexander, and Craig Gotsman. "Geometric Message-Filtering Protocols for Distributed Multiagent Environments." Presence: Teleoperators and Virtual Environments 13, no. 3 (2004): 279–95. http://dx.doi.org/10.1162/1054746041422352.

Full text
Abstract:
Message filtering is important for distributed multiagent systems, where a large number of dynamic agents participate in the system activity, but a typical agent is interested in only a very small dynamic subset of the other agents. The agent must be constantly informed on the status of this subset, and this is achieved by message passing between relevant agents. Message filtering is required to reduce the communications load on the system, which could be prohibitive if each agent must communicate with all others in order to obtain the information it needs. This paper deals with the case of a
APA, Harvard, Vancouver, ISO, and other styles
43

Jiang, Nan, Xiang Dong Liu, Zhi Jie Li, Bing Li, and Chun Fang Ning. "A Study on Simulative System of Mobile Payment." Applied Mechanics and Materials 571-572 (June 2014): 1110–14. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.1110.

Full text
Abstract:
Present a mobile payment Simulative system, in the process of paying, the system requires three parts to join in which are business server, paying agent sever and mobile client for users. Analyze the system flow, includes registration and login, confirm the identity information, submit orders, payment, fund temporarily custody, shipping the goods, user received the goods, payment complete and sellers get the money. Design the module, the system mainly includes the registration and login module, order management module, shopping cart module etc. Implement the functions of the Web browsing, comm
APA, Harvard, Vancouver, ISO, and other styles
44

Nouri, Bassant, and Mohamed Gaafar. "Association Rules Elicitation for Customer’s Shopping on E-commerce Applications." International Journal of Computers and Informatics 3, no. 1 (2024): 9–22. http://dx.doi.org/10.59992/ijci.2024.v3n1p1.

Full text
Abstract:
This research provides an approach for eliciting association rules for customers’ shopping on e-commerce applications based on the Apriori algorithm. The proposed system shows and displays some offers and deals from various branches. The system provides the analytics for the seller as the demand for some varieties and the weakness in other varieties and the whole application is organized on the Cloud. The architecture includes three levels; the front-end, middle, and back-end. The front-end level of the site-based Mobile shopping application is made up of Android Mobile devices, to buy miscell
APA, Harvard, Vancouver, ISO, and other styles
45

Xiong, Yonghua, Suzhen Huang, Min Wu, Yaoxue Zhang, and Jinhua She. "A Novel Resource Management Method of Providing Operating System as a Service for Mobile Transparent Computing." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/153847.

Full text
Abstract:
This paper presents a framework for mobile transparent computing. It extends the PC transparent computing to mobile terminals. Since resources contain different kinds of operating systems and user data that are stored in a remote server, how to manage the network resources is essential. In this paper, we apply the technologies of quick emulator (QEMU) virtualization and mobile agent for mobile transparent computing (MTC) to devise a method of managing shared resources and services management (SRSM). It has three layers: a user layer, a manage layer, and a resource layer. A mobile virtual termi
APA, Harvard, Vancouver, ISO, and other styles
46

Que, Haohua, Haojia Gao, Weihao Shan, Xinghua Yang, and Rong Zhao. "A Lightweight, Centralized, Collaborative, Truncated Signed Distance Function-Based Dense Simultaneous Localization and Mapping System for Multiple Mobile Vehicles." Sensors 24, no. 22 (2024): 7297. http://dx.doi.org/10.3390/s24227297.

Full text
Abstract:
Simultaneous Localization And Mapping (SLAM) algorithms play a critical role in autonomous exploration tasks requiring mobile robots to autonomously explore and gather information in unknown or hazardous environments where human access may be difficult or dangerous. However, due to the resource-constrained nature of mobile robots, they are hindered from performing long-term and large-scale tasks. In this paper, we propose an efficient multi-robot dense SLAM system that utilizes a centralized structure to alleviate the computational and memory burdens on the agents (i.e. mobile robots). To enab
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Xining, and Jiazao Lin. "Call U Back." International Journal of E-Entrepreneurship and Innovation 2, no. 2 (2011): 1–13. http://dx.doi.org/10.4018/jeei.2011040101.

Full text
Abstract:
Mobile commerce (M-commerce) is an attractive research area due to its relative novelty, rapid growth, and great potential in business applications. Over the last decade, various M-commerce applications have been geared to target mobile users and achieved great success. However, most M-commerce applications are developed by different retailers for special purposes and thus lack fully automated business processes to integrate various existing services. This paper presents a novel infrastructure, Call U Back (CUB), for M-commerce applications. The proposed scheme integrates concepts of agent and
APA, Harvard, Vancouver, ISO, and other styles
48

N. Vijayalakshmi, Sagar Gulati, B. Ben Sujin, B. Madhav Rao, and K. Kiran Kumar. "Deep Reinforcement Learning Based Secure Transmission for UAV-Assisted Mobile Edge Computing." International Journal of Interactive Mobile Technologies (iJIM) 18, no. 17 (2024): 154–69. http://dx.doi.org/10.3991/ijim.v18i17.50729.

Full text
Abstract:
The increasing computational demand for real-time mobile applications has led to the development of mobile edge computing (MEC), with support from unmanned aerial vehicles (UAVs), as a promising paradigm for constructing high-throughput line-of-sight links for ground users and pushing computational resources to network edges. Users can reduce processing latency and the load on their local computers by delegating tasks to the UAV in its role as an edge server. The coverage capacity of a single UAV is, however, very limited. Moreover, it will be easy to intercept the data that is transferred to
APA, Harvard, Vancouver, ISO, and other styles
49

Hartono, Fajar Fani, Hendry H, and Ramos Somya. "Aplikasi Reservasi Tiket Bus pada Handphone Android menggunakan Web Service (Studi Kasus: PO. Rosalia Indah)." d'CARTESIAN 2, no. 1 (2013): 21. http://dx.doi.org/10.35799/dc.2.1.2013.2119.

Full text
Abstract:
Abstract Presentation of ticket availability information is still a manual one problems faced by the travel services for passengers have come to the ticket agent to check availability.Therefore the need for a reservation system applications.Bus ticket reservation system used for passengers booking a trip without having to come to the agency. To facilitate passengers to access this system, the bus ticket reservation application built Android -based mobile. Android is a collection of software intended for mobile devices includes an operating system. This application runs on the Android platform
APA, Harvard, Vancouver, ISO, and other styles
50

Puliafito, Antonio, Salvatore Riccobene, and Marco Scarpa. "Which paradigm should I use? An analytical comparison of the client-server, remote evaluation and mobile agent paradigms." Concurrency and Computation: Practice and Experience 13, no. 1 (2001): 71–94. http://dx.doi.org/10.1002/cpe.548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!