A Review of Computation Solutions by Mobile Agents in an Unsafe Environment

Abstract

Exploration in an unsafe environment is one of the major problems that can be seen as a basic block for many distributed mobile protocols. In such environment we consider that either the nodes (hosts) or the agents can pose some danger to the network. Two cases are considered. In the first case, the dangerous node is a called black hole, a node where incoming agents are trapped, and the problem is for the agents to locate it. In the second case, the dangerous agent is a virus; an agent moving between nodes infecting them, and the problem is for the “good” agents to capture it, and decontaminate the network. In this paper, we present several solutions for a black–hole and network decontamination problems. Then, we analyze their efficiency. Efficiency is evaluated based on the complexity, and the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination techniques.

Authors and Affiliations

Anis Zarrad, Yassine Daadaa

Keywords

Related Articles

Comparative Analysis of ALU Implementation with RCA and Sklansky Adders In ASIC Design Flow

An Arithmetic Logic Unit (ALU) is the heart of every central processing unit (CPU) which performs basic operations like addition, subtraction, multiplication, division and bitwise logic operations on binary numbers. This...

Enhancing Gray Scale Images for Face Detection under Unstable Lighting Condition

Facial expression plays a vital role in no verbal communication between human beings. The brain, in a quarter of second, can determine the state of mind and the behaviour of a person using different traits in a stable li...

Variability Management in Business-IT Alignment: MDA based Approach

The expansion of PAIS (Process Aware Information Systems) has created the need for reuse in business processes. In fact, companies are left with directories containing several variants of the same business processes, whi...

Risk Factors for Software Requirements Change Implementation

Requirements change has been regarded as a substantial risk in software development projects. The factors that contribute to the risk are identified through impact analysis, which later determine the planning of the chan...

Gaussian Mixture Model and Deep Neural Network based Vehicle Detection and Classification

The exponential rise in the demand of vision based traffic surveillance systems have motivated academia-industries to develop optimal vehicle detection and classification scheme. In this paper, an adaptive learning rate...

Download PDF file
  • EP ID EP146264
  • DOI 10.14569/IJACSA.2013.040415
  • Views 95
  • Downloads 0

How To Cite

Anis Zarrad, Yassine Daadaa (2013). A Review of Computation Solutions by Mobile Agents in an Unsafe Environment. International Journal of Advanced Computer Science & Applications, 4(4), 87-92. https://europub.co.uk/articles/-A-146264