In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices...In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices. The proposed encoding scheme has the advantages of simplicity for encoding and decoding, ease for GA operations, and better equilibrium between exploration and exploitation. It is also adaptive in that, with few restrictions on the length of code, it can be freely lengthened or shortened according to the characteristics of the problem space. Furthermore, the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node. The simulation results demonstrate the higher performance of our algorithm, with fast convergence to the optima or sub-optima on various problem sizes. Comparing with the binary string encoding of vertices, when the problem size is large, our algorithm runs remarkably faster with comparable search capability. Key words distributed information retrieval - mobile agents - migration problem - genetic algorithms CLC number TP 301. 6 Foundation item: Supported by the National Natural Science Foundation of China (90104005), the Natural Science Foundation of Hubei Province and the Hong Kong Polytechnic University under the grant G-YD63Biography: He Yan-xiang (1952-), male, Professor, research direction: distributed and parallel processing, multi-agent systems, data mining and e-business.展开更多
Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, ...Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, by providing mechanisms that ensure attack detection and provide integrity to mobile agents. This noble technique involves encapsulating partial results obtained on each intermediate host and binding these results together using a hash function, thus forming a strong bonded chain that cannot be compromised. An analytical model to explore the system performance was also developed.展开更多
Dear Editor, As a promising multi-agent systems(MASs) operation, autonomous interception has attracted more and more attentions in these years, where defenders prevent intruders from reaching destinations.So far, most...Dear Editor, As a promising multi-agent systems(MASs) operation, autonomous interception has attracted more and more attentions in these years, where defenders prevent intruders from reaching destinations.So far, most of the relevant methods are applied in ideal environments without agent damages. As a remedy, this letter proposes a more realistic interception method for MASs suffered by damages.展开更多
Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achie...Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achieved good results. For example, it is possible to launch a code with a guarantee that it cannot attack the hosting sites. The main problem remaining, however, is protecting the mobile code against malicious service providers, the host problem. This paper proposed a Mobile Agent management scheme in a hierarchical level that provides to user a reliable and flexible global access to internet/network information services. We further described a protection mechanism to Mobile Agents against malicious hosts. As an effort to address host problems we first identify the kinds of attack that may be performed by malicious hosts, and propose a mechanism to prevent these attacks. At each agent host we introduce a trusted third party entity on each server called Secure Service Station (SSS) to carry out security actions.展开更多
We analyze the deficiencies of current application systems, and discuss the key requirements of distributed Geographie Information serviee (GIS), We construct the distributed GIS on grid platform. Considering the fl...We analyze the deficiencies of current application systems, and discuss the key requirements of distributed Geographie Information serviee (GIS), We construct the distributed GIS on grid platform. Considering the flexibility and efficiency, we integrate the mobile agent technology into the system. We propose a new prototype system, the Geographic Information Grid System (GIGS) based on mobile agent. This system has flexible services and high performance, and improves the sharing of distributed resources. The service strategy of the system and the examples are also presented.展开更多
This paper analyzes the existing spatial structure of mobile information services and the current new characteristics of the service, proposes a new service model. The model adopts a unified deployment solution of spa...This paper analyzes the existing spatial structure of mobile information services and the current new characteristics of the service, proposes a new service model. The model adopts a unified deployment solution of spatial data. It extends the spatial data management and lightweight computing to the embedded computing devices, and enhanced the service flexibility and scalability. The design of mobile side achieves the integration of spatial data management, mobile computing and wireless communication, and it can meet the various needs of spatial information mobile services. The paper introduces the composition of the new model and the key contents, and pointing out that this model is the inevitable trend of spatial information mobile services.展开更多
To improve the scalability of RMON-based network management, the concept of Mobile RMON Agent (MRA) was presented by combining the mobile agent technology with RMON. Then an MRA-based Network Management System (MRANMS...To improve the scalability of RMON-based network management, the concept of Mobile RMON Agent (MRA) was presented by combining the mobile agent technology with RMON. Then an MRA-based Network Management System (MRANMS) was designed and implemented. RMON functions were achieved by programming the mobile agent to make it capture and analyze packets locally. The experimental result on the Grasshopper platform indicates that MRA as a mobile agent can migrate to another subnet and calculate a RMON MIB value and TrafficMatrix in a subnet with 29 hosts. Furthermore, the behavior of MRA can be customized to achieve new RMON functions, such as the statistics of hostTable in RMON MIB. It can be concluded that MRANMS is based on the mode of distribution, and besides the compatibility with standard RMON, the system possesses scalability of management function.展开更多
With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention ...With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.展开更多
Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study o...Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study of mobile agent system and most of these researches focus on agent behavior analysis resulting in that models are hard to apply to mobile agent systems. To bridge the gap, a new performance evaluation model derived from operation mechanisms of mobile agent platforms is proposed. Details are discussed for the design of companion simulation software, which can provide the system performance such as response time of platform to mobile agent. Further investigation is followed on the determination of model parameters. Finally comparison is made between the model-based simulation results and measurement-based real performance of mobile agent systems. The results show that the proposed model and designed software are effective in evaluating performance characteristics of mobile agent systems. The proposed approach can also be considered as the basis of performance analysis for large systems composed of multiple mobile agent platforms.展开更多
Forecasting orders accurately plays a crucial role for household electric appliance (HEA) enterprises keeping low inventory level. In order to reduce the influence of bullwhip effect, sales data are applied to forecas...Forecasting orders accurately plays a crucial role for household electric appliance (HEA) enterprises keeping low inventory level. In order to reduce the influence of bullwhip effect, sales data are applied to forecast orders of the next period instead of ordering data. Mobile agent is applied to achieve the sales data from retailers in the data preparation. And the converting approach from sales data of retailers to prediction data is proposed. Autoregressive and moving average (ARMA) model is introduced to forecast orders and a comparison amongst final prediction error (FPE), Akaike information criterion(AIC), Bayes information criterion(BIC) and Akaike's corrected information criterion(AICC) criterion is shown. The sample test verifies the superiority of AICC; therefore it is applied to identify ARMA order. Forecasting architecture is established and then the prototype system is tested, at last a case shows the orders prediction of the next quarter and verifies the effectiveness of the proposed method.展开更多
In E-Commerce, consumers and service suppliers can find the services through the searching of Mobile Agents (MA). The suppliers disassemble the service requests of consumers into the sub-requests. Then suppliers respo...In E-Commerce, consumers and service suppliers can find the services through the searching of Mobile Agents (MA). The suppliers disassemble the service requests of consumers into the sub-requests. Then suppliers respond the sub-requests cooperatively. Thus the Service Supply Chain (SSC) can be formed. But the existing bottom-up and up-bottom supply chain formation fashions cannot be adapted to the SSC in distributed environment of E-Commerce. Task Dependency Network is exploited to illustrate the service relationship among consumers and suppliers. The formation of SSC with some simulations is elaborated. Then the influence on the formation of SSC caused by the type of service suppliers, the quantities of MA and its variety in number is elucidated.展开更多
The aim of this paper is to present a distributed algorithm for big data classification, and its application for Magnetic Resonance Images (MRI) segmentation. We choose the well-known classification method which is th...The aim of this paper is to present a distributed algorithm for big data classification, and its application for Magnetic Resonance Images (MRI) segmentation. We choose the well-known classification method which is the c-means method. The proposed method is introduced in order to perform a cognitive program which is assigned to be implemented on a parallel and distributed machine based on mobile agents. The main idea of the proposed algorithm is to execute the c-means classification procedure by the Mobile Classification Agents (Team Workers) on different nodes on their data at the same time and provide the results to their Mobile Host Agent (Team Leader) which computes the global results and orchestrates the classification until the convergence condition is achieved and the output segmented images will be provided from the Mobile Classification Agents. The data in our case are the big data MRI image of size (m × n) which is splitted into (m × n) elementary images one per mobile classification agent to perform the classification procedure. The experimental results show that the use of the distributed architecture improves significantly the big data segmentation efficiency.展开更多
The human immune system has the function of selfdiscern.It can identify the non-self antigen and clear it through the immune response automatically.So,human body has the power of resisting disease.The anti-spam system...The human immune system has the function of selfdiscern.It can identify the non-self antigen and clear it through the immune response automatically.So,human body has the power of resisting disease.The anti-spam system basing on immune system is proposed by using immune system′s theory,and it is introduced in the mail service of enterprise VPN.Regard VPN as the human body,the mobile agent is simulated the antibody because of its movable and intelligent,and the spam is simulated the antigen.It can clear the spam by using immune mechanism.This method is a new thinking of anti-spam mail.The advantage is overcoming the weakness on independence of traditional antispam system.展开更多
文摘In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices. The proposed encoding scheme has the advantages of simplicity for encoding and decoding, ease for GA operations, and better equilibrium between exploration and exploitation. It is also adaptive in that, with few restrictions on the length of code, it can be freely lengthened or shortened according to the characteristics of the problem space. Furthermore, the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node. The simulation results demonstrate the higher performance of our algorithm, with fast convergence to the optima or sub-optima on various problem sizes. Comparing with the binary string encoding of vertices, when the problem size is large, our algorithm runs remarkably faster with comparable search capability. Key words distributed information retrieval - mobile agents - migration problem - genetic algorithms CLC number TP 301. 6 Foundation item: Supported by the National Natural Science Foundation of China (90104005), the Natural Science Foundation of Hubei Province and the Hong Kong Polytechnic University under the grant G-YD63Biography: He Yan-xiang (1952-), male, Professor, research direction: distributed and parallel processing, multi-agent systems, data mining and e-business.
文摘Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, by providing mechanisms that ensure attack detection and provide integrity to mobile agents. This noble technique involves encapsulating partial results obtained on each intermediate host and binding these results together using a hash function, thus forming a strong bonded chain that cannot be compromised. An analytical model to explore the system performance was also developed.
基金supported by the Science and Technology Project of State Grid Corporation of China, China (5100202199557A-0-5-ZN)。
文摘Dear Editor, As a promising multi-agent systems(MASs) operation, autonomous interception has attracted more and more attentions in these years, where defenders prevent intruders from reaching destinations.So far, most of the relevant methods are applied in ideal environments without agent damages. As a remedy, this letter proposes a more realistic interception method for MASs suffered by damages.
文摘Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achieved good results. For example, it is possible to launch a code with a guarantee that it cannot attack the hosting sites. The main problem remaining, however, is protecting the mobile code against malicious service providers, the host problem. This paper proposed a Mobile Agent management scheme in a hierarchical level that provides to user a reliable and flexible global access to internet/network information services. We further described a protection mechanism to Mobile Agents against malicious hosts. As an effort to address host problems we first identify the kinds of attack that may be performed by malicious hosts, and propose a mechanism to prevent these attacks. At each agent host we introduce a trusted third party entity on each server called Secure Service Station (SSS) to carry out security actions.
基金Supported by the National Technology Research and De-velopment Programof China (863 Program,2002AA135340) and the Na-tional Key Basic Research and Development Program ( 973 Program,2004CB318206)
文摘We analyze the deficiencies of current application systems, and discuss the key requirements of distributed Geographie Information serviee (GIS), We construct the distributed GIS on grid platform. Considering the flexibility and efficiency, we integrate the mobile agent technology into the system. We propose a new prototype system, the Geographic Information Grid System (GIGS) based on mobile agent. This system has flexible services and high performance, and improves the sharing of distributed resources. The service strategy of the system and the examples are also presented.
文摘This paper analyzes the existing spatial structure of mobile information services and the current new characteristics of the service, proposes a new service model. The model adopts a unified deployment solution of spatial data. It extends the spatial data management and lightweight computing to the embedded computing devices, and enhanced the service flexibility and scalability. The design of mobile side achieves the integration of spatial data management, mobile computing and wireless communication, and it can meet the various needs of spatial information mobile services. The paper introduces the composition of the new model and the key contents, and pointing out that this model is the inevitable trend of spatial information mobile services.
基金Projects 60475007 and 02029 supported by National Natural Science Foundation of China and Key Research of Science and Technology of Ministry ofEducation of China
文摘To improve the scalability of RMON-based network management, the concept of Mobile RMON Agent (MRA) was presented by combining the mobile agent technology with RMON. Then an MRA-based Network Management System (MRANMS) was designed and implemented. RMON functions were achieved by programming the mobile agent to make it capture and analyze packets locally. The experimental result on the Grasshopper platform indicates that MRA as a mobile agent can migrate to another subnet and calculate a RMON MIB value and TrafficMatrix in a subnet with 29 hosts. Furthermore, the behavior of MRA can be customized to achieve new RMON functions, such as the statistics of hostTable in RMON MIB. It can be concluded that MRANMS is based on the mode of distribution, and besides the compatibility with standard RMON, the system possesses scalability of management function.
文摘With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.
基金Supported by the National Natural Science Foundation of China (No.60072047) and Huawei Science and Technology Foundation (No.YJIN2003004)
文摘Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study of mobile agent system and most of these researches focus on agent behavior analysis resulting in that models are hard to apply to mobile agent systems. To bridge the gap, a new performance evaluation model derived from operation mechanisms of mobile agent platforms is proposed. Details are discussed for the design of companion simulation software, which can provide the system performance such as response time of platform to mobile agent. Further investigation is followed on the determination of model parameters. Finally comparison is made between the model-based simulation results and measurement-based real performance of mobile agent systems. The results show that the proposed model and designed software are effective in evaluating performance characteristics of mobile agent systems. The proposed approach can also be considered as the basis of performance analysis for large systems composed of multiple mobile agent platforms.
基金Hubei International Cooperation Projects,China(No.2007CA008)
文摘Forecasting orders accurately plays a crucial role for household electric appliance (HEA) enterprises keeping low inventory level. In order to reduce the influence of bullwhip effect, sales data are applied to forecast orders of the next period instead of ordering data. Mobile agent is applied to achieve the sales data from retailers in the data preparation. And the converting approach from sales data of retailers to prediction data is proposed. Autoregressive and moving average (ARMA) model is introduced to forecast orders and a comparison amongst final prediction error (FPE), Akaike information criterion(AIC), Bayes information criterion(BIC) and Akaike's corrected information criterion(AICC) criterion is shown. The sample test verifies the superiority of AICC; therefore it is applied to identify ARMA order. Forecasting architecture is established and then the prototype system is tested, at last a case shows the orders prediction of the next quarter and verifies the effectiveness of the proposed method.
文摘In E-Commerce, consumers and service suppliers can find the services through the searching of Mobile Agents (MA). The suppliers disassemble the service requests of consumers into the sub-requests. Then suppliers respond the sub-requests cooperatively. Thus the Service Supply Chain (SSC) can be formed. But the existing bottom-up and up-bottom supply chain formation fashions cannot be adapted to the SSC in distributed environment of E-Commerce. Task Dependency Network is exploited to illustrate the service relationship among consumers and suppliers. The formation of SSC with some simulations is elaborated. Then the influence on the formation of SSC caused by the type of service suppliers, the quantities of MA and its variety in number is elucidated.
文摘The aim of this paper is to present a distributed algorithm for big data classification, and its application for Magnetic Resonance Images (MRI) segmentation. We choose the well-known classification method which is the c-means method. The proposed method is introduced in order to perform a cognitive program which is assigned to be implemented on a parallel and distributed machine based on mobile agents. The main idea of the proposed algorithm is to execute the c-means classification procedure by the Mobile Classification Agents (Team Workers) on different nodes on their data at the same time and provide the results to their Mobile Host Agent (Team Leader) which computes the global results and orchestrates the classification until the convergence condition is achieved and the output segmented images will be provided from the Mobile Classification Agents. The data in our case are the big data MRI image of size (m × n) which is splitted into (m × n) elementary images one per mobile classification agent to perform the classification procedure. The experimental results show that the use of the distributed architecture improves significantly the big data segmentation efficiency.
文摘The human immune system has the function of selfdiscern.It can identify the non-self antigen and clear it through the immune response automatically.So,human body has the power of resisting disease.The anti-spam system basing on immune system is proposed by using immune system′s theory,and it is introduced in the mail service of enterprise VPN.Regard VPN as the human body,the mobile agent is simulated the antibody because of its movable and intelligent,and the spam is simulated the antigen.It can clear the spam by using immune mechanism.This method is a new thinking of anti-spam mail.The advantage is overcoming the weakness on independence of traditional antispam system.