An Artificial Immune System Model for Multi Agents Resource Sharing in Distributed Environments
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Natural Immune system plays a vital role in the survival of the all living being. It provides a mechanism to defend itself from external predates making it consistent systems, capable of adapting itself for survival incase of changes. The human immune system has motivated scientists and engineers for finding powerful information processing algorithms that has solved complex engineering tasks. This paper explores one of the various possibilities for solving problem in a Multiagent scenario wherein multiple robots are deployed to achieve a goal collectively. The final goal is dependent on the performance of individual robot and its survival without having to lose its energy beyond a predetermined threshold value by deploying an evolutionary computational technique otherwise called the artificial immune system that imitates the biological immune system.
Authors and Affiliations
Tejbanta Singh Chingtham , G. Sahoo , M. K. Ghose
Safety Measures Using Sextic Curve Cryptography
This paper proposes Sextic Curve Cryptography, which is used to increase the safety measures. The methods to find the critical points in the SCC based on Atriphtaloid symmetric curve using point addition and point doubli...
On Human Intelligence
This paper presents some detailed discussions regarding the human natural intelligence, along with various types of intelligences. The authors have also given some important factors on which the intelligence depends. The...
Superresolution: A Novel Application to Image Restoration
The subject of extracting particular high-resolution data from low-resolution images is one of the most important digital image processing applications in recent years, attracting much research. This paper shows how to i...
A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping
The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a...
Efficient Storage Reduction of Frequency of Items in Vertical Data Layout
The digital databases are immersed with large amount of data. The explosive growth of massive amounts of data leads to space complexity, performance degradation, scalability and time complexity. We cannot stop the incomi...