A Review of Computation Solutions by Mobile Agents in an Unsafe Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 4
Abstract
Exploration in an unsafe environment is one of the major problems that can be seen as a basic block for many distributed mobile protocols. In such environment we consider that either the nodes (hosts) or the agents can pose some danger to the network. Two cases are considered. In the first case, the dangerous node is a called black hole, a node where incoming agents are trapped, and the problem is for the agents to locate it. In the second case, the dangerous agent is a virus; an agent moving between nodes infecting them, and the problem is for the “good” agents to capture it, and decontaminate the network. In this paper, we present several solutions for a black–hole and network decontamination problems. Then, we analyze their efficiency. Efficiency is evaluated based on the complexity, and the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination techniques.
Authors and Affiliations
Anis Zarrad, Yassine Daadaa
Comparative Analysis of ALU Implementation with RCA and Sklansky Adders In ASIC Design Flow
An Arithmetic Logic Unit (ALU) is the heart of every central processing unit (CPU) which performs basic operations like addition, subtraction, multiplication, division and bitwise logic operations on binary numbers. This...
Enhancing Gray Scale Images for Face Detection under Unstable Lighting Condition
Facial expression plays a vital role in no verbal communication between human beings. The brain, in a quarter of second, can determine the state of mind and the behaviour of a person using different traits in a stable li...
Variability Management in Business-IT Alignment: MDA based Approach
The expansion of PAIS (Process Aware Information Systems) has created the need for reuse in business processes. In fact, companies are left with directories containing several variants of the same business processes, whi...
Risk Factors for Software Requirements Change Implementation
Requirements change has been regarded as a substantial risk in software development projects. The factors that contribute to the risk are identified through impact analysis, which later determine the planning of the chan...
Gaussian Mixture Model and Deep Neural Network based Vehicle Detection and Classification
The exponential rise in the demand of vision based traffic surveillance systems have motivated academia-industries to develop optimal vehicle detection and classification scheme. In this paper, an adaptive learning rate...