• Title/Summary/Keyword: mobile agent systems

Search Result 204, Processing Time 0.033 seconds

A Study on the Agent Component Development Support to PDA (PDA 지원 에이전트 컴포넌트 개발에 대한 연구)

  • Kim Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.37-50
    • /
    • 2006
  • In the focusing on the important of wireless internet, mobile terminal device plays a central role in tracking and coordinating terms in mobile business processing. Especially, mobile device has been considered as a key technology for embedded software and ubiquitous era. Because existing web environments is moving to wireless internet, the new concepts for wireless internet computing environments has gained increasing interest. Mobile agents provide a new abstraction for deploying over the existing infrastructures. Mobile application systems require the flexibility, adaptability, extensibility, and autonomous. New software developments methodology is required to meet the requirements. In this paper, we present an agent architectures model that allows compassable components with pluggable and independable. Our approach involves wrapping components inside a servlet. We have used the model and components to develop the PDA mobile agent.

A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agen (오용침입탐지시스템에서보바일에이전트를이용한보안규칙관리에관한연구)

  • Kim, Tae-Kyoung;Seo, Hee-Suk;Kim, Hee-Wan
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.8
    • /
    • pp.781-790
    • /
    • 2004
  • This paper describes intrusion detection rule mangement using mobile agents. Intrusion detection can be divided into anomaly detection and misuse detection. Misuse detection is best suited for reliably detecting known use patterns. Misuse detection systems can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods. Therefore, the introduction of mobile agents to provide computational security by constantly moving around the Internet and propagating rules is presented as a solution to misuse detection. This work presents a new approach for detecting intrusions, in which mobile agent mechanisms are used for security rules propagation. To evaluate the proposed appraoch, we compared the workload data between a rules propagation method using a mobile agent and a conventional method. Also, we simulated a rules management using NS-2(Network Simulator) with respect to time.

  • PDF

Cooperative Control of the Multi-Agent System for Teleoperation (원격조종 다개체 로봇의 협동제어)

  • 황정훈;권동수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.154-154
    • /
    • 2000
  • The cooperative strategy for the teleoperated multi-agent system is presented. And this scheme has been applied to the teleoperated robot soccer system that is newly proposed. For the teleoperated robot soccer system, we made mapping functions to control a 2-wheeled mobile robot using a 2 DoF stickcontroller. The simulation with a real stickcontroller has been evaluated the performance of the proposed mapping function. Then, the basic cooperation strategy has been tested between teleoperated robot and autonomous robot It is shown that the multi-agent system for teleoperation can have a good performance for a job Like a scoring a goal

  • PDF

Studying Retailer Strategies through an Integrated E-Business Model: a Multi-Agent Approach

  • Xie Ming;Chen Jian
    • Management Science and Financial Engineering
    • /
    • v.11 no.3
    • /
    • pp.1-17
    • /
    • 2005
  • Agent technology has been widely applied in today's electronic business, such as mobile agents, multi-agent information systems, etc. In particular, multi-agent systems have been applied as powerful simulation tools to study complex business networks composed of various self-interested trading firms and/or human beings. In this paper, we build an integrated model that consists of a multi-agent B2C market model and a B2B trade network model, and incorporate more reality than much of prior work. Then with this model, we carry out experimental studies on two different strategies that are common in electronic business - 'loyal' strategy (retailers try to build stable cooperation with suppiers to ensure material supply) and 'cost-saving' strategy (retailers try to reduce cost by choosing suppliers with lower wholesale price).

Frameworks and Environments for Mobile Agents

  • Kim Haeng Kon;Chung Youn-Ky
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.48-52
    • /
    • 2005
  • The Mobile agent-based distributed systems become obtaining significant popularity as a potential vehicle to allow software components to be executed on heterogeneous environments despite mobility of users and computations. However, as these systems generally force mobile agents to use only common functionalities provided in every execution environment, the agents may not access environment-specific resources. In this paper, we propose a new framework using Aspect Oriented Programming technique to accommodate a variety of static resources as well as dynamic ones whose amount is continually changed at runtime even in the same execution environment. Unlike previous works, this framework divides roles of software developers into three groups to relieve application programmers from the complex and error prone parts of implementing dynamic adaptation and allowing each developer to only concentrate on his own part. Also, the framework enables policy decision makers to apply various adaptation policies to dynamically changing environments for adjusting mobile agents to the change of their resources.

  • PDF

Exact Modeling and Performance Analysis of Paging Schemes Using Paging Agents (페이징 에이전트를 이용한 페이징 방법의 정확한 모델링 및 성능 분석)

  • Moon, Yu-Ri;Lee, Tae-Han;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.24 no.1
    • /
    • pp.15-23
    • /
    • 2011
  • This study considers paging schemes that can page some cells or only one cell within the location area to reduce paging cost by using PAs (Paging Agents) and compares their performances by using a new analytic method. There are three ways of paging schemes using PAs; BSPA (Base Staton Paging Agent), 2SPA (2-Step Paging Agent), LAPA (Location Area Paging Agent). This study proposes exact performance of BSPA and 2SPA using a new analytic method based on Markov chain modeling to find the most efficient paging scheme. Numerical results for various circumstances are presented by using proposed analytic method to select a proper paging scheme in mobile communication networks.

LQ Inverse Optimal Consensus Protocol for Continuous-Time Multi-Agent Systems and Its Application to Formation Control (연속시간 다개체 시스템에 대한 LQ-역최적 상태일치 프로토콜 및 군집제어 응용)

  • Lee, Jae Young;Choi, Yoon Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.5
    • /
    • pp.526-532
    • /
    • 2014
  • In this paper, we present and analyze a LQ (Linear Quadratic) inverse optimal state-consensus protocol for continuous-time multi-agent systems with undirected graph topology. By Lyapunov analysis of the state-consensus error dynamics, we show the sufficient conditions on the algebraic connectivity of the graph to guarantee LQ inverse optimality and closed-loop stability. A more relaxed stability condition is also provided in terms of the algebraic connectivity. Finally, a formation control protocol for multiple mobile robots is proposed based on the target LQ inverse optimal consensus protocol, and the simulation results are provided to verify the performance of the proposed LQ inverse formation control method.

Implementation of a Mobile Agent Platform for Handheld Devices to Access the SNMP MIB (SNMP MIB 액세스를 위한 휴대단말기용 이동에이전트 플랫폼)

  • 전병국;김영철
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2002
  • Due to rapid development of high speed wire/wireless internet technologies, at the current age, it cares into being one phenomenon that the internet business is able to work on anyplace and anytime. In this environment, a technology of mobile agent provides very useful mechanism for personal handheld devices because of supporting migration as autonomously executable software object Instead of users. Therefore, this paper focuses on Implementing a mobile agent platform for personal handheld devices, which supports mobile agents in wire/wireless internet environment. To do this, we construct the system with modified JAMAS, based on Java, in our previous research. Based on our proposed system, we implement the browsing application in personal handheld devices to access the MIB(Management Information Base) on SNMP(Simple Network Management Protocol), which supervises network environment on wire/wireless internet. This proposed application system is easily to access the MIB managed by SNMP agent. then provides network map viewer and updates the MIB through the browser to network administrator. As a result, we can support application area of mobile agents such as hare network management. M-Commerce, integration of remote database systems, active message and active network with personal handheld devices.

  • PDF

An Efficient Checkpointing Method for Mobile Hosts via the Software Agent (이동 기기에 적합한 소프트웨어 에이전트 기반의 효율적 체크포인팅 기법)

  • Lim, Sung-Chae
    • The KIPS Transactions:PartA
    • /
    • v.15A no.2
    • /
    • pp.111-118
    • /
    • 2008
  • With the advance in mobile communication systems, the need for distributed applications running on multiple mobile devices also grows gradually. As such applications are subject to H/W failures of the mobile device or communication disruptions, compared to the traditional applications in fixed networks, it is crucial to develop any recovery mechanism suitable for them. For this, checkpointing is widely used to restart interrupted applications. In this paper, we devise an efficient checkpointing method that adopts the software agent executed at the mobile support station. The agent, called the checkpointing agent, is aimed at supporting the concept of rollback-distance (R-distance) that bounds the maximum number of roll-backed local checkpoints. By means of the R-distance, our method can prevent undesirable domino effects and heavy checkpoint overhead, while providing high flexibility in checkpoint creation.

Path Planning of Swarm Mobile Robots Using Firefly Algorithm (Firefly Algorithm을 이용한 군집 이동 로봇의 경로 계획)

  • Kim, Hue-Chan;Kim, Je-Seok;Ji, Yong-Kwan;Park, Jahng-Hyon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.5
    • /
    • pp.435-441
    • /
    • 2013
  • A swarm robot system consists of with multiple mobile robots, each of which is called an agent. Each agent interacts with others and cooperates for a given task and a given environment. For the swarm robotic system, the loss of the entire work capability by malfunction or damage to a single robot is relatively small and replacement and repair of the robot is less costly. So, it is suitable to perform more complex tasks. The essential component for a swarm robotic system is an inter-robot collaboration strategy for teamwork. Recently, the swarm intelligence theory is applied to robotic system domain as a new framework of collective robotic system design. In this paper, FA (Firefly Algorithm) which is based on firefly's reaction to the lights of other fireflies and their social behavior is employed to optimize the group behavior of multiple robots. The main application of the firefly algorithm is performed on path planning of swarm mobile robots and its effectiveness is verified by simulations under various conditions.