Jacobi computation using mobile agent
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 5
Abstract
Physical phenomena occur in a wide range of mathematical applications: from fluid to solid mechanics, electromagnetic and electrical engineering. Engineers working toward an optimized modelling must develop their software and physical system together. This development follows a standard life-cycle with design, coding and test. Validation is become quite complex and is subdivided into several parts: unit, integration, functional and system. Each piece of validation brings its brick. Entire system is tested as per the requirements. They are about numerical results, performance, architecture and fault tolerance. We defined a distributed architecture for numerical computation based on the use of mobile agents. A group or space of agents manages a whole computation, from its registration until its validation. Their role is multiple: they prepare input data and operate tasks but above they administer distributed architecture. The main impact is failure management. Failure can concern not only software services but also material. Also, the completion of an execution can need task recovery, anomaly reporting or favourite configuration. All these details consist of a main report about validation of distributed application though simulation
Authors and Affiliations
Cyril Dumont , Fabrice Mourlin
Unsupervised Analysis of Arrhythmias using K-means Clustering
The Electrocardiogram provides the valuable information regarding the cardiovascular diseases. Various methods for classification of arrhythmias have been developed by researchers. Classification can be supervised or uns...
Selection of Best Web Site by Applying COPRAS-G method
The presence of multiple websites offering similar services has changed the user outlook. The user now prefers to visit those sites, which are easy to use. Many different methods have been proposed to measure usage of a...
A Journey on WiMAX and its Security Issues
Security has become a primary concern in order to provide protected communication in Wireless environment. We know the basic concept of communication is sent the information from source node to destination node but in my...
An Approach to Secure Larger Size Data with Authenticity and Integrity
The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authen...
PERFORMANCE COMPARISION OF QOS STABILITY METHODS IN WIMAX NETWORKS
Recently IEEE 802.16 WiMAX has attracted a lot of attention in wireless networking research and applications. An attempt had been made to compare DropTail, RED, Proportional fairness and DRR protocol...