Academic literature on the topic 'Mobile Agents (MA)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile Agents (MA).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile Agents (MA)"

1

Abdullah Marich Ali, Abdullah Marich Ali. "Network Security Management Using Ontology-Based Mobile Agents." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (2012): 25–44. http://dx.doi.org/10.4197/comp.1-2.2.

Full text
Abstract:
Automatic means to manage the security in moderate and large networks are of extreme importance to avoid error-prone manual techniques. This paper paves the way to develop an automatic network security management (NSM) system that is both flexible in deciding the system’s objectives and efficient in using the valuable network bandwidth with a relatively low transmission overhead. The required flexibility and efficiency are obtained using mobile agents (MA) to collect the required security information from various network components and devices, and using ontology to specify the required security policies in such a way understandable by the MA’s software. A simplified NSM prototype is developed, implemented, and tested over a typical local area network to investigate the validity of the suggested ideas. The MA travels through the network and collects the necessary information using an ontology-based security policy. Next, it may either return back to the network administrator to let him decide and perform the suitable actions, or alternatively the MA may take the appropriate decisions. This prototype is tested to examine its functionality and performance using a simple local area network consisting of three computers with different configurations. The developed MA was able to understand the ontology and move around the network. It has properly detected the components that are wrongly configured. It should be made clear that the design is scalable and can be directly applied to more computers in a local area network or even in a wide area network.
APA, Harvard, Vancouver, ISO, and other styles
2

Hachicha, Hela, Adlen Loukil, and Khaled Ghedira. "MA-UML: a conceptual approach for mobile agents' modelling." International Journal of Agent-Oriented Software Engineering 3, no. 2/3 (2009): 277. http://dx.doi.org/10.1504/ijaose.2009.023640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Wei, Jiannong Cao, Beihong Jin, Jing Li, and Liang Zhang. "GCS-MA: A group communication system for mobile agents." Journal of Network and Computer Applications 30, no. 3 (2007): 1153–72. http://dx.doi.org/10.1016/j.jnca.2006.04.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gondal, Farzana Kausar. "Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review." Innovative Computing Review 1, no. 2 (2021): 85–102. http://dx.doi.org/10.32350/icr.0102.05.

Full text
Abstract:
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks. It is necessary for organizations to install IDS for the protection of sensitive data due to an increase in the number of incidents related to network security. It is difficult to detect intrusions from a segment that is outside a network as well as an intrusion that originated from inside a distributed network. It should be the responsibility of IDS to analyse a huge amount of data without overloading the networks and monitoring systems. Mobile agents (MA) emerged due to the deficiencies and limitations in centralized IDS. These agents can perform predefined actions by detecting malicious activities. From previously published literature, it was deduced that most of the existing IDS based on MA are not significantly effective due to limited intrusion detection and high detection time. This study categorized existing IDS and available MA-IDS to conduct a strategic review focusing on the classification of each category, that is, data collection modes, architecture, analysis techniques, and security. The limitations and strengths of the discussed IDS are presented/showcased wherever applicable. Additionally, this study suggested ways to improve the efficiency of available MA-IDS in order to secure distributed networks in the future. This overview also includes different implementations of agent based IDS.
 INDEX TERMS: data mining, distributed systems, Intrusion Detection System (IDS), Mobile Agents (MA), network security
APA, Harvard, Vancouver, ISO, and other styles
5

Moukafih, Nabil, Ghizlane Orhanou, and Said Elhajji. "Mobile agent-based SIEM for event collection and normalization externalization." Information & Computer Security 28, no. 1 (2019): 15–34. http://dx.doi.org/10.1108/ics-01-2019-0008.

Full text
Abstract:
Purpose This paper aims to propose a mobile agent-based security information and event management architecture (MA-SIEM) that uses mobile agents for near real-time event collection and normalization on the source device. The externalization of the normalization process, executed by several distributed mobile agents on interconnected computers and devices, proposes a SIEM server dedicated mainly for correlation and analysis. Design/methodology/approach The architecture has been proposed in three stages. In the first step, the authors described the different aspects of the proposed approach. Then they implemented the proposed architecture and presented a new vision for the insertion of normalized data into the SIEM database. Finally, the authors performed a numerical comparison between the approach used in the proposed architecture and that of existing SIEM systems. Findings The results of the experiments showed that MA-SIEM systems are more efficient than existing SIEM systems because they leave the SIEM resources primarily dedicated to advanced correlation analysis. In addition, this paper takes into account realistic scenarios and use-cases and proposes a fully automated process for transferring normalized events in near real time to the SIEM server for further analysis using mobile agents. Originality/value The work provides new insights into the normalization security-related events using light mobile agents.
APA, Harvard, Vancouver, ISO, and other styles
6

Yassine, Sabri, and El Kamoun Najib. "Traffic management in vehicular adhoc networks using hybrid deep neural networks and mobile agents." International Journal of Artificial Intelligence (IJ-AI) 12, no. 1 (2023): 114–23. https://doi.org/10.11591/ijai.v12.i1.pp114-123.

Full text
Abstract:
Thel traffic congestion in vehicular adhoc networks (VANETs) is a vital problem duel to its dynamic increase in traffic loads. VANETs undergo inefficient routing capability due to its increasing traffic demands. This has led to the need for intelligent transport system (ITS) to assist VANETs in enabling suitable traffic loads between vehicles and road side units (RSU). Most conventional systems offer distributed solution to manage traffic congestion but fail to regulate real-time traffic flows. In this paper, a dynamic traffic control in VANETs is offered by combining deep neural network (DNN) with mobile agents (MA). An experimental analysis is carried out to test the efficacy of the DNN-MA against conventional machine learning and a deep learning routing algorithm in VANETs. DNN-MA is validated under various traffic congestion metrics like latency, percentage delivery ratio, packet error rate, and throughput. The results show that the proposed method offers reduced energy consumption and latency
APA, Harvard, Vancouver, ISO, and other styles
7

Bendjima, Mostefa, Mohammed Feham, and Mohamed Lehsaini. "Directional Itinerary Planning for Multiple Mobile Agents in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (July 8, 2021): 1–13. http://dx.doi.org/10.1155/2021/5584581.

Full text
Abstract:
Currently, the majority of research in the area of wireless sensor networks (WSNs) is directed towards optimizing energy use during itinerary planning by mobile agents (MAs). The route taken by the MA when migrating can get a significant effect on energy consumption and the lifespan of the network. Conversely, finding an ideal arrangement of Source Nodes (SNs) for mobile agents to visit could be a problematic issue. It is within this framework that this work focused on solving certain problems related to itinerary planning based on a multimobile agent (MMA) strategy in networks. The objective of our research was to increase the lifespan of sensor networks and to diminish the length of the data collection task. In order to achieve our objective, we proposed a new approach in WSNs, which took into consideration the criterion of an appropriate number of MAs, the criterion of the appropriate grouping of SNs, and finally the criterion of the optimal itinerary followed by each MA to visit all its SNs. Thus, we suggested an approach that may be classified as a centralized planning model where the itinerary schedule is entirely shaped by the base station (sink) which, unlike other approaches, is no longer constrained by energy consumption. A series of simulations to measure the performance of the new planning process was also carried out.
APA, Harvard, Vancouver, ISO, and other styles
8

Sabri, Yassine, та Najib El Kamoun. "Traffic management in vehicular adhoc networks using hybrid deep neural networks and mobile agents". IAES International Journal of Artificial Intelligence (IJ-AI) 12, № 1 (2023): 114. http://dx.doi.org/10.11591/ijai.v12.i1.pp114-123.

Full text
Abstract:
<p>The traffic congestion in vehicular adhoc networks (VANETs) is a vital problem due to its dynamic increase in traffic loads. VANETs undergo inefficient routing capability due to its increasing traffic demands. This has led to the need for intelligent transport system (ITS) to assist VANETs in enabling suitable traffic loads between vehicles and road side units (RSU). Most conventional systems offer distributed solution to manage traffic congestion but fail to regulate real-time traffic flows. In this paper, a dynamic traffic control in VANETs is offered by combining deep neural network (DNN) with mobile agents (MA). An experimental analysis is carried out to test the efficacy of the DNN-MA against conventional machine learning and a deep learning routing algorithm in VANETs. DNN-Mal is validated under various traffic congestion metrics like latency, percentage delivery ratio, packet error rate, and throughput. The results show that the proposed method offers reduced energy consumption and latency.</p>
APA, Harvard, Vancouver, ISO, and other styles
9

Kotsilieris, Theodore. "An Efficient Agent Based Data Management Method of NoSQL Environments for Health Care Applications." Healthcare 9, no. 3 (2021): 322. http://dx.doi.org/10.3390/healthcare9030322.

Full text
Abstract:
Background: As medical knowledge is continuously expanding and diversely located, Health Information Technology (HIT) applications are proposed as a good prospect for improving not only the efficiency and the effectiveness but also the quality of healthcare services delivery. The technologies expected to shape such innovative HIT architectures include: Mobile agents (Mas) and NoSQL technologies. Mobile agents provide an inherent way of tackling distributed problems of accessing heterogeneous and spatially diverse data sources. NoSQL technology gains ground for the development of scalable applications with non-static and open data schema from complex and diverse sources. Methods and Design: This paper conducts a twofold study: It attempts a literature review of the applications based on the mobile agent (MA) and NoSQL technologies for healthcare support services. Subsequently, a pilot system evaluates the NoSQL technology against the relational one within a distributed environment based on mobile agents for information retrieval. Its objective is to study the feasibility of developing systems that will employ ontological data representation and task implementation through mobile agents towards flexible and transparent health data monitoring. Results and Discussion: The articles studied focus on applying mobile agents for patient support and healthcare services provision thus as to make a positive contribution to the treatment of chronic diseases. In addition, attention is put on the design of platform neutral techniques for clinical data gathering and dissemination over NoSQL. The experimental environment was based on the Apache Jena Fuseki NoSQL server and the JAVA Agent DEvelopment Framework -JADE agent platform. The results reveal that the NoSQL implementation outperforms the standard relational one.
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Xiao Hu. "An Improved Congestion Control Mechanism Based on Mobile Agent for Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1239–42. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1239.

Full text
Abstract:
An improved congestion control mechanism based on mobile agent for wireless sensor networks is proposed, which includes node-level congestion and link-level congestion control. The formers congestion information is collected and distributed by mobile agents (MA). When mobile agent travels through the networks, it can select a less-loaded neighbor node as its next hop and update the routing table according to the nodes congestion status. Minimum package of node outgoing traffic was preferentially transmitted in the link-level congestion. Simulation result shows that proposed mechanism attains high delivery ratio and throughput with reduced delay when compared with the existing technique.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Mobile Agents (MA)"

1

International Workshop on Mobile Agents (2nd 1998 Stuttgart, Germany). Mobile agents: Second international workshop, MA'98, Stuttgart, Germany, September 9-11, 1998 : proceedings. Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

ASA/MA 2000 (2000 Zurich, Switzerland). Agent systems, mobile agents, and applications: Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents, ASA/MA 2000, Zürich, Switzerland, September 13-15, 2000 : proceedings. Springer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

MA '98 (1998 Stuttgart, Germany). Mobile agents: Second international workshop, MA '98, Stuttgart, Germany, September 9-11, 1998 : proceedings. Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1972-, Suri Niranjan, ed. Mobile agents: 6th international conference, MA 2002, Barcelona, Spain, October 22-25, 2002 : proceedings. Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kurt, Rothermel, and Popescu-Zeletin R, eds. Mobile agents: First international workshop, MA '97, Berlin, Germany, April 7-8, 1997 : proceedings. Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pietro, Picco Gian, ed. Mobile agents: 5th international conference, MA 2001, Atlanta, GA, USA, December 2-4, 2001 : proceedings. Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Suri, Niranjan. Mobile Agents: 6th International Conference, MA 2002, Barcelona, Spain, October 22-25, 2002, Proceedings. Springer London, Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Suri, Niranjan. Mobile Agents: 6th International Conference, MA 2002, Barcelona, Spain, October 22-25, 2002, Proceedings (Lecture Notes in Computer Science). Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kotz, David, and Friedemann Mattern. Agent Systems, Mobile Agents, and Applications: Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents, ASA/MA 2000 Zurich, Switzerland, September 13-15, 2000 Proceedings. Springer London, Limited, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

(Editor), Kurt Rothermel, and Fritz Hohl (Editor), eds. Mobile Agents: Second International Workshop, MA'98, Stuttgart, Germany, September 9-11, 1998 (Lecture Notes in Computer Science). Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Mobile Agents (MA)"

1

Ben Yahya, Zeineb, Farah Barika Ktata, and Khaled Ghedira. "MA-MOrBAC: A Distributed Access Control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76687-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karoui, Kamel. "Interaction between Mobile Agents and Web Services." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch097.

Full text
Abstract:
With the interconnection of computers in networks, particularly through the Internet, it becomes possible to connect applications on distant computers. An application works perfectly whether it isdistant or local. Moreover, a distant applicationallows us to benefit from the following additional advantages: • Data and processes can be stored on a remote server that has a bigger storage capacity than the local host. Data can be shared between users using, for example, Remote Procedure Call (RPC), Remote Method Invocation (RMI), Java Message Service (JMS), and Enterprise JavaBeans (EJB) (Frénot, 2000): • Distant application can be used at the same time by several users; • Updating data and processes can be done only in one host; • Flexibility on distribution of the load: An application can be executed on the available machine; and • High availability: A faulty machine does not affect the others. Many approaches have been proposed and developed for communication between distant hosts on a network such as Message Passing (MP), Remote Evaluation (REV), Remote Object Invocation (ROI), Mobile Agents (MA), Common Object Request Broker Architecture (CORBA), Web Services (WS), RPC, and RMI (Dejan, LaForge, & Chauhan, 1998). In this article, we will focus on two particular paradigms: The Web Services and the Mobile Agents. WS defines a standard to invoke distant applications and to recover results across the Web. Its invocation is made in synchronous mode. MA has the faculty to move easily between a network’s hosts to execute user requests. MA communication is made in asynchronous mode. The fusion of these two complementary technologies will solve many problems. This article is composed of the following sections: In the first two sections, we introduce the concepts of WS and MA, their advantages and disadvantages. In the third section, we present different kinds of interaction between MA and WS. Finally, we study an example in the last section.
APA, Harvard, Vancouver, ISO, and other styles
3

Corradi, Antonio, Alex Landini, and Stefano Monti. "Workflow Management and Mobile Agents." In Ubiquitous Multimedia and Mobile Agents. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-107-8.ch008.

Full text
Abstract:
Service composition is an extremely powerful and versatile way to aggregate and reuse distributed services and software components into richer and complex scenarios. Workflow Management Systems have emerged as one of the leading technologies to execute service compositions but typically fail to support distributed scenarios, where distributed services should be invoked in a scalable and effective way. Mobile Agent platforms propose a suitable framework to distribute the execution of complex service compositions, and therefore to enable scalability and improve performance. However, current proposals for MA-based WFMSs still target rather static and poorly distributed scenarios and exploit agent migration benefits only in a partial and insufficient way. The authors’ model proposes to overcome these problems via a richer and more effective agent delegation strategy that can also cope with dynamic scenarios where services can move and replicate, in order to achieve a better integration by taking advantage of both technologies.
APA, Harvard, Vancouver, ISO, and other styles
4

Corradi, Antonio, Alex Landini, and Stefano Monti. "Workflow Management and Mobile Agents." In Enterprise Resource Planning. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4153-2.ch073.

Full text
Abstract:
Service composition is an extremely powerful and versatile way to aggregate and reuse distributed services and software components into richer and complex scenarios. Workflow Management Systems have emerged as one of the leading technologies to execute service compositions but typically fail to support distributed scenarios, where distributed services should be invoked in a scalable and effective way. Mobile Agent platforms propose a suitable framework to distribute the execution of complex service compositions, and therefore to enable scalability and improve performance. However, current proposals for MA-based WFMSs still target rather static and poorly distributed scenarios and exploit agent migration benefits only in a partial and insufficient way. The authors’ model proposes to overcome these problems via a richer and more effective agent delegation strategy that can also cope with dynamic scenarios where services can move and replicate, in order to achieve a better integration by taking advantage of both technologies.
APA, Harvard, Vancouver, ISO, and other styles
5

Karnouskos, Stamatis. "Towards Autonomic Infrastructures via Mobile Agents and Active Networks." In Mobile Computing. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch055.

Full text
Abstract:
As we move towards service-oriented complex infrastructures, what is needed, security, robustness, and intelligence distributed within the network. Modern systems are too complicated to be centrally administered; therefore, the need for approaches that provide autonomic characteristics and are able to be self-sustained is evident. We present here one approach towards this goal, i.e., how we can build dynamic infrastructures based on mobile agents (MA) and active networks (AN). Both concepts share common ground at the architectural level, which makes it interesting to use a mix of them to provide a more sophisticated framework for building dynamic systems. We argue that by using this combination, more autonomous systems can be built that can effectively possess at least at some level of self-* features, such as self-management, self-healing, etc., which, in conjunction with cooperation capabilities, will lead to the deployment of dynamic infrastructures that autonomously identify and adapt to external/ internal events. As an example, the implementation of an autonomous network-based security service is analyzed, which proves that denial of service attacks can be managed by the network itself intelligently and in an autonomic fashion.
APA, Harvard, Vancouver, ISO, and other styles
6

Karnouskos, Stamatis. "Towards Autonomic Infrastructures via Mobile Agents and Active Networks." In Encyclopedia of Internet Technologies and Applications. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch089.

Full text
Abstract:
As we move towards service-oriented complex infrastructures, what is needed, security, robustness, and intelligence distributed within the network. Modern systems are too complicated to be centrally administered; therefore, the need for approaches that provide autonomic characteristics and are able to be self sustained is evident. We present here one approach towards this goal, i.e., how we can build dynamic infrastructures based on mobile agents (MA) and active networks (AN). Both concepts share common ground at the architectural level, which makes it interesting to use a mix of them to provide a more sophisticated framework for building dynamic systems. We argue that by using this combination, more autonomous systems can be built that can effectively possess at least at some level of self-* features, such as self-management, self-healing, etc., which, in conjunction with cooperation capabilities, will lead to the deployment of dynamic infrastructures that autonomously identify and adapt to external/internal events. As an example, the implementation of an autonomous network-based security service is analyzed, which proves that denial of service attacks can be managed by the network itself intelligently and in an autonomic fashion.
APA, Harvard, Vancouver, ISO, and other styles
7

Karoui, Kamel, and Fakher Ben Ftima. "Effectiveness of Web Services." In Electronic Services. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-967-5.ch106.

Full text
Abstract:
With the development of the Internet, the number of people buying, selling, and performing transactions is expected to increase at a phenomenal rate. The emergence of e-commerce applications has resulted in new net-centric business models. This has created a need for new ways of structuring applications to provide cost-effective and scalable models. Mobile Agents (MA) systems are seen as a promising paradigm for the design and implementation of distributed applications, including e-commerce. MA are also useful in applications requiring distributed information retrieval because they move the location of execution closer to the data to be processed. While MA have generated considerable excitement among the research community, they have not been applied into a significant number of real applications. Web services (WS) are emerging as a dominant paradigm for constructing distributed business applications and enabling enterprise-wide interoperability. A critical factor to the overall utility of WS is a scalable, flexible and robust discovery mechanism; an application can be built by integrating multiple services together to make a more efficient service. WS represent a major development in the e-commerce sector. They enable companies to capitalize on their existing architecture by making their application services accessible via the Internet. The application of MA and WS technologies to e-commerce will provide a new way to conduct business-to-business (B2B), business-to-consumer (B2C), and consumer-to-consumer transactions (C2C) and facilitate the communication between heterogeneous environments. In this article, we first focus on these two technologies of actuality and show their integration in an e-commerce system. Second, we present different kinds of interaction between MA and WS and study their effect on application performance. We also study an example that illustrates an e-commerce system including three categories of transactions: -Shopping transactions: a customer delegates one MA for research and purchase of articles online. The MA will interact with available WS to find the article and its best price. -Salesman transactions: to valorize their products, WS will invoke MA to make publicity for the customers. -Auction transactions: for this type of transaction, a MA (respectively a WS) can sell and buy a product from/to others MA (WS) by auction. Finally, we conclude with a discussion on our inferences and their implications. This work is structured as follows: Section “background” reviews the notions of e-commerce system, WS and MA paradigms. Section “Web services and mobile agents’ technologies on e-commerce system” presents the integration of these two paradigms on the e-commerce system. In section “performance evaluation,” we evaluate the performances of our approach and we study an illustrated example in the section “a case study.” The section “future trends” presents our future perspectives and we end this work with the “conclusion” in the last section.
APA, Harvard, Vancouver, ISO, and other styles
8

Mishra, Priyanka. "Detecting Ballot Stuff Collusion Attack in Reputation System for Mobile Agents Security." In Advances in Computing Communications and Informatics. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/9789815040401122030008.

Full text
Abstract:
A Mobile Agent (MA), when dispatched in a decentralized peer-to-peer (P2P) electronic community, is forced to do a transaction with unfamiliar hosts. Such unfamiliar hosts are malicious in nature and can tamper agent’s code, state, and data. To solve integrity, confidentiality, availability, and authenticity threats from hosts, this paper proposes a soft security approach. Under this approach, a trust-based reputation model called MRep is proposed. The model considers first-hand information called Direct Reputation (DR) obtained from trust gathered through Source Host (SH). The model assumes SH to be a pre-trusted host that possesses past transaction experience from the destination host. The destination host (DH) is the target host with which the agent wishes to do a transaction in the future. Indirect Reputation (IDR) is obtained from recommenders having a past transactional history with the DH. A collusion attack takes place when these recommenders collaborate to give false recommendations about DH. Ballot Stuff and Bad Mouth collusion occur when recommenders collude to give a positive and negative rating to dishonest and honest DH, respectively. The methodology is based on Similarity Filtering (SF) that uses Euclidean Distance (ED) and single linkage clustering techniques. ED is calculated between consecutive recommender’s past recommendation value called ‘F-Score’ and recommendation value given by SH for DH. Clustering merges recommenders into two clusters. Scatter plots give two clusters. One cluster contains recommenders that gave an exceptionally high or low rating to DH while the other cluster gave a rating close to the rating given by SH. Bernoulli's trial helps to know the effect of collusion on the Final Reputation (FR) of DH when the number of colluders increases and decreases in the system. The reputation errors are calculated and statistically verified using Binomial Probability Distribution. Validation graphs show that when the chance of collusion (p) is less than 0.5, the probability of reputation error p(x) decreases with an increase in the number of colluders(x). When p is equal to 0.5, p(x) first increases and then decreases with an increase in x and when p is greater than 0.5, p(x) increases with an increase in the number of colluders(x). We compare SF with Bayesian Filtering (BF), Outlier Filtering (OF), and No Filtering (NF) when 20%, 40%, 60%, and 80% collusion arises in the system. The proposed SF approach helps filter ballot stuff colluders. MRep gives less error in FR of DH, even when 80% collusion arises in the system.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile Agents (MA)"

1

Fujimura, Kikuo. "Safe motion planning for mobile agents: a model of reactive planning for multiple mobile agents." In Fibers '91, Boston, MA, edited by Wendell H. Chun and William J. Wolfe. SPIE, 1991. http://dx.doi.org/10.1117/12.48102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Salem, Hanaa, Gamal Attiya, and Nawal El-Fishawy. "Multi-Agent based Intelligent Decision Support Systems for Cancer Classification." In Agria Média 2020 : „Az oktatás digitális átállása korunk pedagógiai forradalma”. Eszterházy Károly Egyetem Líceum Kiadó, 2021. http://dx.doi.org/10.17048/am.2020.122.

Full text
Abstract:
There is evidence that early detection of cancer diseases can improve the treatment and increase the survival rate of patients. This paper presents an efficient CAD system for cancer diseases diagnosis by gene expression profiles of DNA microarray datasets. The proposed CAD system combines Intelligent Decision Support System (IDSS) and Multi-Agent (MA) system. The IDSS represents the backbone of the entire CAD system. It consists of two main phases; feature selection/reduction phase and a classification phase. In the feature selection/reduction phase, eight diverse methods are developed. While, in the classification phase, three evolutionary machine learning algorithms are employed. On the other hand, the MA system manages the entire operation of the CAD system. It first initializes several IDSSs (exactly 24 IDSSs) with the aid of mobile agents and then directs the generated IDSSs to run concurrently on the input dataset. Finally, a master agent selects the best classification, as the final report, based on the best classification accuracy returned from the 24 IDSSs The proposed CAD system is implemented in JAVA, and evaluated by using three microarray datasets including; Leukemia, Colon tumor, and Lung cancer. The system is able to classify different types of cancer diseases accurately in a very short time. This is because the MA system invokes 24 different IDSS to classify the diseases concurrently in parallel processing manner before taking the decision of the best classification result.
APA, Harvard, Vancouver, ISO, and other styles
3

Adesola Aderounmu, G., Bosede Oyatokun, and Matthew Adigun. "Remote Method Invocation and Mobile Agent: A Comparative Analysis." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/3033.

Full text
Abstract:
This paper presents a comparative analysis of Remote Method Invocation (RMI) and Mobile Agent (MA) paradigm used to implement the information storage and retrieval system in a distributed computing environment. Simulation program was developed to measure the performance of MA and RMI using object oriented programming language (the following parameters: search time, fault tolerance and invocation cost. We used search time, fault tolerance and invocation cost as performance parameters in this research work. Experimental results showed that Mobile Agent paradigm offers a superior performance compared to RMI paradigm, offers fast computational speed; procure lower invocation cost by making local invocations instead of remote invocations over the network, thereby reducing network bandwidth. Finally MA has a better fault tolerance than the RMI. With a probability of failure pr = 0.1, mobile agent degrades gracefully.
APA, Harvard, Vancouver, ISO, and other styles
4

Onashoga, Adebukola, Adebayo Akinde, and Adesina Sodiya. "A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3372.

Full text
Abstract:
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user operations in computer and network systems in search of activities considered undesirable from security perspectives. Applying mobile agent (MA) to intrusion detection design is a recent development and it is aimed at effective intrusion detection in distributed environment. From the literature, it is clear that most MA-based IDS that are available are not quite effective because their time to detection is high and detect limited intrusions.This paper proposes a way of classifying a typical IDS and then strategically reviews the existing mobile agent-based IDSs focusing on each of the categories of the classification, for example architecture, mode of data collection, the techniques for analysis, and the security of these intelligent codes. Their strengths and problems are stated wherever applicable. Furthermore, suggested ways of improving on current MA-IDS designs are presented in order to achieve an efficient mobile agent-based IDS for future security of distributed network.
APA, Harvard, Vancouver, ISO, and other styles
5

Dong, Guoqing, and Weiqin Tong. "MA-GMA: A Mobile Agent-based Grid Monitor Architecture." In 2007 IEEE/ACS International Conference on Computer Systems and Applications. IEEE, 2007. http://dx.doi.org/10.1109/aiccsa.2007.370897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Keerthika, A., and V. Berlin Hency. "Virtuial grid based data gathering technique using mobile agent (VGDG-MA)." In 2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2). IEEE, 2017. http://dx.doi.org/10.1109/icnets2.2017.8067913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Su, Yu'e, Li Hao, Wanrong Wu, and Qing Li. "MA-SWR: A Design of Routing Algorithm for Mobile Agent in WSN." In 2008 Third International Conference on Pervasive Computing and Applications (ICPCA). IEEE, 2008. http://dx.doi.org/10.1109/icpca.2008.4783574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!