Mobile Agent 1 Mobile Agent 1.1 Mobile Agent 1.2 Mobile Agent

Size: px
Start display at page:

Download "Mobile Agent 1 Mobile Agent 1.1 Mobile Agent 1.2 Mobile Agent"

Transcription

1 /2002/13(07) Journal of Software Vol13, No7 Mobile Agent,,, (, ) http//wwwsjtueducn Mobile Agent, Mobile Agent Mobile Agent, Mobile Agent Mobile Agent Lucent Inferno Mobile Agent Mobile Agent; TP393 A Mobile Agent( MA) Agent, Mobile Agent, Mobile Agent, Mobile Agent 1 Mobile Agent 11 Mobile Agent MA Agent, Agent, Agent,,, MA,Agent,, Agent 12 Mobile Agent MA Client/Server,MA (1) MA Client/Server, Agent, Agent MA, Agent,, (2) MA, Agent, (3) MA,,, [1] ; (1970 ),,,, ; (1931 ),,,,,, ; (1977 ),,,, ; (1976 ),,,,

2 1332 Journal of Software 2002,13(7) (4) MA, MA, (5), Agent, MA, (6) Agent,,, WAN [2] 13 Mobile Agent MA, MA, (principal), ;, API,,,MA MA MA 4 [4] ; (CE), Agent (AEE); CE ; CE ( 1 ) [3] Host Host Computation environment Mobile object system Network Computation environment Mobile object system Fig1 MA (1) AEE Agent ; (2) Agent AEE ; The component of the MA system 1 MA (3) Agent Agent ; (4) AEE AEE ; (5) AEE ; (6) AEE MA [5],, 2 MA, 21,, a 1,a 2,a 3, gcd(a i,a j )=1

3 Mobile Agent 1333 MAXNUM A K N 1,N 2,,N K N i, a i a i 1( ), gcd(a i,a j )=1, i,j,1 i<j K; MAXNUM=min(a 1,a 2,,a K ) 1, A Base MAXNUM Base,A N i m (1 m MAXNUM) stamp(i,m)=base+a i m a 1,a 2,,a K, a K 1,a K a K 1<a K, 22 BaseIncr=a K 1 a K (FROM ) (TO ) FROM, (1) N i ;(2) Basei;(3) a i ;(4) ;(5) TO (1) ;(2) j (Base i +j a i ), j 0, 1; 0,,,,,,,,, 23 (1) (replay attack) Mobile Agent N i ( Mobile Agent stamp(i,m)), m N i FROM, 1,, 0, 1 3 (2) Mobile Agent Mobile Agent,,, Mobile Agent A, X,, X, Mobile Agent Y,,, Mobile Agent A X Y A N 1,N 2,,N K, X {N 1,N 2,,N K },Y {N 1,N 2,,N K }, A TO Agent 1 m MAXNUM, Local stamp base Host name Stamp increase N 1 a 1 X a X A Y a Y N K stamp(x,m)=base A +a X m, (1) a K

4 1334 Journal of Software 2002,13(7) MAXNUM=min(a 1,a 2,,a K ) 1 (2) Agent A X Y, 1 n MAXNUM, (1) (3),a X m=a Y n a X m=0 mod a Y gcd(a X,a Y )=1, X,Y,1 X<Y K; stamp(x,m)=base A +a Y n, (3) MAXNUM=min(a 1,a 2,,a K ) 1 m=0 mod a Y (4) (2), m MAXNUM a Y m 0 mod a Y, (5) (4) (5), (3) Mobile Agent Mobile Agent,,,,, Mobile Agent A B Mobile Agent Mobile Agent A B Mobile Agent, B N 1,N 2,,N K, A {N 1,N 2,,N K }, Agent B stamp=stamp(b,m)=base T1 +a A m Agent 1 B, B FROM a NK a NK 1 a N1 Host name Remote stamp base Stamp increase Used stamp bitmap N 1 Base N1 a N1 A Base T1 a A N K Base NK a NK Agent 2 B, B FROM Host name Remote stamp base Stamp increase Used stamp bitmap N 1 Base N1 a N1 A Base T2 a A N K Base NK a NK 22, Agent 1 B, Agent 2 B, (1) Base T1 =Base T2, (replay attack), B Agent (2) Base T1 Base T2, Base T2 =Base T1 +BaseIncr n,(n Z +,n 1), BaseIncr=a NK a NK 1 ; B stamp, stamp=base T1 +a A m Base T1 +a A MAXNUM Base T1 +a NK MAXNUM Base T1 +a NK a NK 1 =Base T1 +BaseIncr Base T1 +BaseIncr n=base T2 B Mobile Agent, MA, A B ( )( 3 ), ( 4 ), MA, MA

5 Mobile Agent , 3 PC, Lucent Inferno V20, Inferno Limbo 2,A,B,C 3, FROM TO, SERVER A FROM TABLE A SERVER B TO TABLE A SERVER C FROM TABLE C TO TABLE C FROM TABLE B TO TABLE B Fig2 A structure sketch map of the incremental timestamp s example 2 3, FROM TO FROM TABLE A REMOTE USED BITMAP LOCAL TO TABLE A B B C C 10 REMOTE FROM TABLE B USED BITMAP LOCAL TO TABLE B A A C C 12 REMOTE FROM TABLE C USED BITMAP LOCAL TO TABLE C A A C B 5 Fig3 Sometime the contents of table FROM and table TO at servers A, B, C 3 A,B,C FROM TO A, A FROM 1 B,B (remote stamp base) 1000, B (stamp increase) 7, (used stamp bitmap) B, A 6 (6 6 ) 6 1,2,4 ( ) A B i (1000 i 7)( 1 i 6), i 0, 1 0, ( ) 2 C, A TO, 500, B C

6 1336 Journal of Software 2002,13(7) 11 10, 9( 2 MAXNUM=min(11,10) 1) A 9, MA A, 110( 2 BaseIncr=10 11), TO (local stamp base) 610, B,C A, A FROM 610, B,C A, 4, MA Java, Java,Aglets [6],Mole [7],MOA [8] Concordia [2] MOA Mole Java IBM Aglets MA Aglet,,Aglet (owner) Aglet, Aglet (capability), CPU Concordia, Agent Agent, (passport),agent passport,passport Agent, Agent ( ) MA, Telescript TACOMA Telescript 1 MA,Agent (permit) Agent Telescript Troms Cornell TACOMA, Agent (principal)( Agent ) Agent MA MA MA, MA 5 Mobile Agent, Mobile Agent Mobile Agent, Mobile Agent References [1] Ma, Jun-tao, Liu, Ji-ren Architecture and technology of mobile agent system Mini-Micro Systems, 1998,19(2)7 14 (in Chinese) [2] Walsh, T, Paciorek, N, Wong, D Security and reliability in Concordia In ElRewini, H, ed Proceedings of the 31st Annual Hawaii International Conference on System Science (HICSS 31) Los Alamitos, CA IEEE Computer Society Press, [3] Peine, H Security concepts and implementation in the ara mobile agent system In ElRewini, H, ed Proceedings of the 31st Annual Hawaii International Conference on System Science (HICSS 31), Los Alamitos, CA IEEE Computer Society Press, [4] Pham, Vu A Karmouch, A Mobile software agents an overview IEEE Communications Magazine, 1998,7(7)26 37 [5] Farmer, WM, Guttman, JD, Swarup, V Security for mobile agents issues and requirements In Proceedings of the 19th National Information Systems Security Conference (NISSC 96), http//csrcnistgov/ nissc/ 1996/ papers/ NISSC96/ paper033/ SWARUP96PDF [6] Karjoth, G, Lange, DB, Oshima, M A security model for aglets IEEE Internet Computing, 1997,1(4) [7] Baumann, J, Hohl, F, Strasser, M Mole concepts of a mobile agent system Journal of World Wide Web, 1997,1(3) [8] Milojicic, D, Laforge, W, Chauhan, D Mobile objects and agents (MOA) design, implementation and lessons learned In Proceedings of the USENIX Conference on Object Oriented Technology and Systems (COOTS 98), Vol 4 New Mexico USENIX, http//wwwinfosystuwienacat/research/agents/ archive/ara-securitypsgz

7 Mobile Agent 1337 [1], Mobile Agent,1998,19(2)7 14 Mobile Agent System by Incremental Timestamp Security Technique WAN Yan, SUN Yong-qiang, ZHU Xiang-hua, TANG Jin (Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai , China) http//wwwsjtueducn Abstract The security technology decides the realization of the mobile agent The primary problem solved by this paper is to prevent replay attacks and acts beyond its authorities of malicious mobile agent The concepts, characters and security of mobile agent are described Afterwards, the concepts and advantages of incremental timestamp are proposed, and a specific example and the demonstrations are also presented The mobile agent system that adopts incremental timestamp can protect execute system from damages of hostile mobile agents The incremental timestamp technology has been verified and realized in the mobile agent system which is developed based on the Lucent Company s Inferno system Key words mobile agent; incremental timestamp; security Received September 30, 2000; accepted April 3, OA OA (1) OA ;(2) ;(3) OA ;(4) OA OA ;(5) / ;(6) OA ;(7) / ;(8) OA ;(9) (025) yangming@seueducn

Simulating a Finite State Mobile Agent System

Simulating a Finite State Mobile Agent System Simulating a Finite State Mobile Agent System Liu Yong, Xu Congfu, Chen Yanyu, and Pan Yunhe College of Computer Science, Zhejiang University, Hangzhou 310027, P.R. China Abstract. This paper analyzes

More information

A Mobile Agent-Based Framework for Active Networks. Ichiro Satoh

A Mobile Agent-Based Framework for Active Networks. Ichiro Satoh A Mobile -Based Framework for Active Networks Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610, Japan E-mail: ichiro@is.ocha.ac.jp IEEE Systems,

More information

DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS

DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS Journal of Engineering Science and Technology Vol. 7, No. 5 (2012) 614-622 School of Engineering, Taylor s University DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS AHMED Y. YOUSUF*,

More information

Mobile Agents as an Architectural Concept for Internet-based Distributed Applications

Mobile Agents as an Architectural Concept for Internet-based Distributed Applications Mobile Agents as an Architectural Concept for Internet-based Distributed Applications The WASP Project Approach Stefan Fünfrocken, Friedemann Mattern Department of Computer Science, Darmstadt University

More information

MOBILE AGENTS TECHNOLOGY AND MOBILITY

MOBILE AGENTS TECHNOLOGY AND MOBILITY MOBILE AGENTS TECHNOLOGY AND MOBILITY Adel Aneiba, S. J. Rees Faculty of Computing, Engineering and Technology, Staffordshire University, PO BOX 334, Beaconside, Stafford ST18 ODG, UK Email :{ A.Aneiba,

More information

A Security Framework for Mobile Agent Systems

A Security Framework for Mobile Agent Systems A Security Framework for Mobile Agent Systems Omer Mansoor Paracha DISSERTATION.COM Boca Raton A Security Framework for Mobile Agent Systems Copyright 2006 Omer Mansoor Paracha All rights reserved. No

More information

An Algorithmic Theory of Mobile Agents

An Algorithmic Theory of Mobile Agents An Algorithmic Theory of Mobile Agents Evangelos Kranakis 1 and Danny Krizanc 2 1 School of Computer Science, Carleton University, Ottawa, ON, Canada. 2 Department of Mathematics and Computer Science,

More information

Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System

Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System Taesoon Park 1,IlsooByun 1, and Heon Y. Yeom 2 1 Department of Computer Engineering, Sejong University, Seoul

More information

Mobile Agent Paradigm in Computer Networks

Mobile Agent Paradigm in Computer Networks Mobile Agent Paradigm in Computer Networks Nguyen Hong Van DSV, Stockholm University, Forum 100, SE-164 40 Kista, Sweden Email: si-hvan@dsv.su.se ABSTRACT : Mobile agent technology has recently emerged

More information

A Finite State Mobile Agent Computation Model

A Finite State Mobile Agent Computation Model A Finite State Mobile Agent Computation Model Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, and Yunhe Pan College of Computer Science, Zhejiang University Hangzhou 310027, PR China Abstract In this paper,

More information

XML-based agent communication and migration for distributed applications in Mobile-C

XML-based agent communication and migration for distributed applications in Mobile-C Vol.2, Issue.1, Jan-Feb 2012 pp-403-407 ISSN: 2249-6645 XML-based agent communication and migration for distributed applications in Mobile-C Khaoula ADDAKIRI Mohamed BAHAJ Noreddine GHERABI Abstract Agent

More information

2002 Journal of Software

2002 Journal of Software 0-9825/2002/13(01)0051-08 2002 Journal of Software Vol13, No1,, (,0) E-mail qiaoyingbj@hotmailcom http//ieliscasaccn,,,,,,, ; ; ; TP301 A,,,,,Mok [1],,, Krithi Ramamritham [2],,,,GManimaran [3] Anita Mittal

More information

Mobile agent technology has great potential

Mobile agent technology has great potential RESEARCH FEATURE Mailbox-Based Scheme for Mobile Communications The authors present a flexible and adaptive scheme that associates each mobile agent with a mailbox but lets them decouple. Their 3D model

More information

Performance Evaluation of Mobile Agents for E-Commerce Applications

Performance Evaluation of Mobile Agents for E-Commerce Applications Performance Evaluation of Mobile Agents for E-Commerce Applications Rahul Jha and Sridhar Iyer Kanwal Rekhi School of Information Technology, Indian Institute of Technology Bombay, Powai, Mumbai - 4 76.

More information

ANALYSIS OF MOBILE AGENT

ANALYSIS OF MOBILE AGENT Volume 2, No. 11, November 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info ANALYSIS OF MOBILE AGENT Lect. Prakash V. Rajguru* 1, Dr. Sushant B.Deshmukh

More information

Creating and Running Mobile Agents with XJ DOME

Creating and Running Mobile Agents with XJ DOME Creating and Running Mobile Agents with XJ DOME Kirill Bolshakov, Andrei Borshchev, Alex Filippoff, Yuri Karpov, and Victor Roudakov Distributed Computing & Networking Dept. St.Petersburg Technical University

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

2002 Journal of Software.. (stacking).

2002 Journal of Software.. (stacking). 1000-9825/2002/13(02)0245-05 2002 Journal of Software Vol13, No2,,, (,200433) E-mail: {wyji,ayzhou,zhangl}@fudaneducn http://wwwcsfudaneducn : (GA) (stacking), 2,,, : ; ; ; ; : TP18 :A, [1],,, :,, :,,,,

More information

2002 Journal of Software

2002 Journal of Software 1000-9825/2002/13(01)0092-07 2002 Journal of Software Vol13, No1,, (,100871) E-mail {zouwei,sjs,sunyc}@cspkueducn http//wwwpkueducn,,,,, ; ; ; TP311 A, (component-based software development, CBSD) CBSD,,,,

More information

Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents

Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents Ichiro Satoh National Institute of Informatics / Japan Science and Technology Corporation 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo

More information

Middleware Design Framework for Mobile Computing

Middleware Design Framework for Mobile Computing ISSN: 2222-4254 IJES Middleware Design Framework for Mobile Computing Imran Sarwar Bajwa School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK i.s.bajwa@cs.bham.ac.uk Abstract.

More information

Mobile Agent Programming in Ajanta

Mobile Agent Programming in Ajanta Mobile Agent Programming in Ajanta Anand R. Tripathi Neeran M. Karnik Manish K. Vora Tanvir Ahmed Ram D. Singh Department of Computer Science University of Minnesota, Minneapolis MN 55455 Abstract This

More information

Time Series Clustering Ensemble Algorithm Based on Locality Preserving Projection

Time Series Clustering Ensemble Algorithm Based on Locality Preserving Projection Based on Locality Preserving Projection 2 Information & Technology College, Hebei University of Economics & Business, 05006 Shijiazhuang, China E-mail: 92475577@qq.com Xiaoqing Weng Information & Technology

More information

Research on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c

Research on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c Applied Mechanics and Materials Submitted: 2014-07-18 ISSN: 1662-7482, Vols. 644-650, pp 1950-1953 Accepted: 2014-07-21 doi:10.4028/www.scientific.net/amm.644-650.1950 Online: 2014-09-22 2014 Trans Tech

More information

Risk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective

Risk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective Risk-Aware Vulnerability Analysis of Electric Grids Presenter: Yihai Zhu Authors: Yihai Zhu, Jun Yan Yan Sun, Haibo He Dept. of Electrical, Computer & Biomedical Engineering University of Rhode Island

More information

Securing Mobile Agents for Electronic Commerce: an Experiment

Securing Mobile Agents for Electronic Commerce: an Experiment Securing Mobile Agents for Electronic Commerce: an Experiment Anthony H. W. Chan, Caris K. M. Wong, T. Y. Wong, Michael R. Lyu Department of Computer Science and Engineering The Chinese University of Hong

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

THREATS AND SECURITY MEASURES FOR SYSTEMS USING MOBILE AGENTS

THREATS AND SECURITY MEASURES FOR SYSTEMS USING MOBILE AGENTS THREATS AND SECURITY MEASURES FOR SYSTEMS USING MOBILE AGENTS Vinay Sridhara vsridhar@usc.edu University of Southern California, Los Angeles CS555 Advanced Operating Systems Abstract The main disadvantage

More information

Remote Control System Based on Compressed Image

Remote Control System Based on Compressed Image Remote Control System Based on Compressed Image Weichuan Liao School of Fundamental Science, East China Jiaotong University, Nanchang, Jiangxi, P.R. China Abstract. Client computer controlling remote server

More information

Fast Grain Shape Determination Algorithm Based on Parallel Processing

Fast Grain Shape Determination Algorithm Based on Parallel Processing 39 3 Vol.39, No.3 3 Opto-Electronic Engineering March, 3 5X(3 66 6,,,, (. ( Britton Chance 4374. 4374 (GPU (CUDA GPU (CPU 4 TP39 A.3969/j.issn.3-5X..3. Fast Grain Shape Determination Algorithm Based on

More information

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS RESUME WEI LI Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Fort Lauderdale-Davie, FL 33314 Office: (954) 262-2068 Fax: (954) 262-3915 Email: lwei@nova.edu

More information

AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION ALGORITHM FOR GENERALIZED DEADLOCKS. Wei Lu, Chengkai Yu, Weiwei Xing, Xiaoping Che and Yong Yang

AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION ALGORITHM FOR GENERALIZED DEADLOCKS. Wei Lu, Chengkai Yu, Weiwei Xing, Xiaoping Che and Yong Yang International Journal of Innovative Computing, Information and Control ICIC International c 2017 ISSN 1349-4198 Volume 13, Number 2, April 2017 pp. 703 710 AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION

More information

Vol. 1, Issue VIII, Sep ISSN

Vol. 1, Issue VIII, Sep ISSN Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,

More information

Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System

Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System Shi Chuan, Zhang Yang and Zhou Yuefei 1 Introduction Command automation system provides an effective

More information

Mole 3.0: A Middleware for Java-Based Mobile Software Agents

Mole 3.0: A Middleware for Java-Based Mobile Software Agents Mole 3.0: A Middleware for Java-Based Mobile Software Agents J. Baumann, F. Hohl, K. Rothermel, M. Schwehm, M.Straßer Institute of Parallel and Distributed High-Performance Systems University of Stuttgart

More information

A Scalable Hash-Based Mobile Agent Location Mechanism

A Scalable Hash-Based Mobile Agent Location Mechanism A Scalable Hash-Based Mobile Agent Location Mechanism Georgia Kastidou, Evaggelia Pitoura George Samaras Department of Computer Science Department of Computer Science University of Ioannina, Greece University

More information

Remote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c

Remote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Remote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c

More information

Agent Fabrication and Its Implementation for Agent-based Electronic Commerce

Agent Fabrication and Its Implementation for Agent-based Electronic Commerce Agent Fabrication and Its Implementation for Agent-based Electronic Commerce Sheng-Uei Guan and Fangming Zhu Department of Electrical and Computer Engineering National University of Singapore 10 Kent Ridge

More information

Application of Autonomous Software Agents for Internet Security

Application of Autonomous Software Agents for Internet Security SFWR 4C03 Winter 2005 Application of Autonomous Software Agents for Internet Security Researcher: Balwant Kamboj Revision History: 2005/03/28 Introduction As the Internet is becoming a major player in

More information

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol International Journal of Network Security, Vol.14, No.1, PP.39 46, Jan. 2012 39 An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol Sandeep Kumar Sood Department of Computer

More information

Design and Implementation of Portable Development Framework in Signal Processing Platform

Design and Implementation of Portable Development Framework in Signal Processing Platform 2017 2nd International Conference on Software, Multimedia and Communication Engineering (SMCE 2017) ISBN: 978-1-60595-458-5 Design and Implementation of Portable Development Framework in Signal Processing

More information

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology 2010 China International Conference on Electricity Distribution 1 Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology Zhang Hong-tao, Ye Ying, An Qing China Zhoukou Power

More information

A Secure Data Transmission Scheme in Wireless Sensor Networks

A Secure Data Transmission Scheme in Wireless Sensor Networks Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Secure Data Transmission Scheme in Wireless Sensor Networks,2 Mingxin YANG, 3 Jingsha HE, 4 Ruohong LIU College of Computer Science and

More information

Study on Improving the Quality of Reconstructed NURBS Surfaces

Study on Improving the Quality of Reconstructed NURBS Surfaces Study on Improving the Quality of Reconstructed NURBS Surfaces Shufeng jiang, Shigang Wang, Yong Yan School of Mechatronic Engineering, Qiqihar University, Qiqihar 161006, China Abstract In aspect of surface

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

Approaching the coordinates of 3D objects alternately from multiple orthogonal views

Approaching the coordinates of 3D objects alternately from multiple orthogonal views 16 11 011 11 Journal of Image and Graphics Vol. 16 No. 11 Nov. 011 TP16. 1 A 1006-8961 011 11-1996-06. 3 J. 011 16 11 1996-001 3 1 1 10093 10016 3 Approaching the coordinates of 3D objects alternately

More information

Tag Based Image Search by Social Re-ranking

Tag Based Image Search by Social Re-ranking Tag Based Image Search by Social Re-ranking Vilas Dilip Mane, Prof.Nilesh P. Sable Student, Department of Computer Engineering, Imperial College of Engineering & Research, Wagholi, Pune, Savitribai Phule

More information

The Study and Implementation of Text-to-Speech System for Agricultural Information

The Study and Implementation of Text-to-Speech System for Agricultural Information The Study and Implementation of Text-to-Speech System for Agricultural Information Huoguo Zheng 1,2,*, Haiyan Hu 1,2, Shihong Liu 1,2, and Hong Meng 1,2 1 Agricultural Information Institute, Chinese Academy

More information

Context-Aware Adaptive Object Migration

Context-Aware Adaptive Object Migration Universität Ulm Fakultät für Informatik Verteilte Systeme Context-Aware Adaptive Object Migration Rüdiger Kapitza Holger Schmidt Franz J. Hauck Bericht Nr. VS-R04-2006 2006-08-30 Context-Aware Adaptive

More information

Double Vertex Graphs and Complete Double Vertex Graphs. Jobby Jacob, Wayne Goddard and Renu Laskar Clemson University April, 2007

Double Vertex Graphs and Complete Double Vertex Graphs. Jobby Jacob, Wayne Goddard and Renu Laskar Clemson University April, 2007 Double Vertex Graphs and Complete Double Vertex Graphs Jobby Jacob, Wayne Goddard and Renu Laskar Clemson University April, 2007 Abstract Let G = (V, E) be a graph of order n 2. The double vertex graph,

More information

Security Mechanisms for Using Mobile Agents in Electronic Commerce

Security Mechanisms for Using Mobile Agents in Electronic Commerce Security Mechanisms for Using Mobile Agents in Electronic Commerce Paulo Jorge Marques, Luís Moura Silva, João Gabriel Silva Departamento de Engenharia Informática, Universidade de Coimbra, Portugal {pmarques,

More information

A Framework for Building Reusable Mobile Agents for Network Management

A Framework for Building Reusable Mobile Agents for Network Management A Framework for Building Reusable Mobile Agents for Network Management Ichiro Satoh Λ National Institute of Informatics / Japan Science and Technology Corporation 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo

More information

Cryptanalysis of a timestamp-based password authentication scheme 1

Cryptanalysis of a timestamp-based password authentication scheme 1 Cryptanalysis of a timestamp-based password authentication scheme 1 Lizhen Yang a Kefei Chen a a Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, P.R.China

More information

Design and Implementation of a Random Access File System for NVRAM

Design and Implementation of a Random Access File System for NVRAM This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Design and Implementation of a Random Access

More information

FSRM Feedback Algorithm based on Learning Theory

FSRM Feedback Algorithm based on Learning Theory Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 699-703 699 FSRM Feedback Algorithm based on Learning Theory Open Access Zhang Shui-Li *, Dong

More information

Jacquard Control System of Warp Knitting Machine Based on Embedded System

Jacquard Control System of Warp Knitting Machine Based on Embedded System IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Control System of Warp Knitting Machine Based on Embedded System To cite this article: Li Ce et al 2018 IOP Conf. Ser.: Mater.

More information

A framework for an Operating System-based Mobile Agent Interoperability

A framework for an Operating System-based Mobile Agent Interoperability IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 6 (Sep. - Oct. 2013), PP 01-06 A framework for an Operating System-based Mobile Agent Interoperability

More information

Compiled Visual Programs by VisPro

Compiled Visual Programs by VisPro Compiled Visual Programs by VisPro Ke -Bing Zhang 1 Mehmet A. Orgun 1 Kang Zhang 2 1 Department of Computing, ICS, Macquarie University, Sydney, NSW 2109, Australia {kebing, mehmet}@ics.mq.edu.au 2 Department

More information

Research on Availability of Virtual Machine Hot Standby based on Double Shadow Page Tables

Research on Availability of Virtual Machine Hot Standby based on Double Shadow Page Tables International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013) Research on Availability of Virtual Machine Hot Standby based on Double Shadow Page Tables Zhiyun Zheng, Huiling

More information

A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment*

A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment* A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment* Ying Liu, Jingbo Xia, and Jing Dai Telecommunication Engineering Institute, Air Force Engineering University, Xi an,

More information

D Agents: Security in a multiple-language, mobile-agent system

D Agents: Security in a multiple-language, mobile-agent system D Agents: Security in a multiple-language, mobile-agent system Robert S. Gray 1 and David Kotz 2 and George Cybenko 1 and Daniela Rus 2 1 Thayer School of Engineering, Dartmouth College, Hanover NH 03755,

More information

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 950 954 c International Academic Publishers Vol. 45, No. 5, May 15, 2006 Small World Properties Generated by a New Algorithm Under Same Degree of All

More information

A flexible biometrics remote user authentication scheme

A flexible biometrics remote user authentication scheme Computer Standards & Interfaces 27 (2004) 19 23 www.elsevier.com/locate/csi A flexible biometrics remote user authentication scheme Chu-Hsing Lin*, Yi-Yi Lai Department of Computer Science and Information

More information

CO 2 Flow Metering through Multi-Modal Sensing and Statistical Data Fusion. Yong Yan, Xue Wang, Tao Wang Lijun Sun, Lijuan Wang, Jinyu Liu

CO 2 Flow Metering through Multi-Modal Sensing and Statistical Data Fusion. Yong Yan, Xue Wang, Tao Wang Lijun Sun, Lijuan Wang, Jinyu Liu CO 2 Flow Metering through Multi-Modal Sensing and Statistical Data Fusion Yong Yan, Xue Wang, Tao Wang Lijun Sun, Lijuan Wang, Jinyu Liu Flow Test Facility for Flowmeter Calibration and Evaluation under

More information

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 1

More information

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn

More information

Design of Intelligent System for Watering Flowers Based on IOT

Design of Intelligent System for Watering Flowers Based on IOT 4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) Design of Intelligent System for Watering Flowers Based on IOT Hong-Jun GU a, Shi-Dong Zhu, Yan-Fen

More information

2002 Journal of Software

2002 Journal of Software 1000-9825/2002/13(09)1846-06 2002 Journal of Software Vol13, No9,,, (,100080) E-mail: lijie@ieliscasaccn http://ieliscasaccn :,,,,, : ; ; ; ; ; : TP391 : A Takeo Igarashi 3D Teddy [1] Teddy, 3D Teddy Teddy,

More information

An Internet router level topology automatically discovering system

An Internet router level topology automatically discovering system 2002 12 Vol.23 No.12 23 12 JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS October 2002 1 Internet 1,2 1,2 1,2,3 1,2 (1. 150001 2. 150001 3., 100031) Internet CERNET IP Internet Internet TP393.02 B 1000-436X(2002)12-0054-09

More information

Intelligent Mobile Monitoring and Control Network of Oil Pipeline Based on Internet of Things

Intelligent Mobile Monitoring and Control Network of Oil Pipeline Based on Internet of Things Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Intelligent Mobile Monitoring and Control Network of Oil

More information

World Scientific Research Journal (WSRJ) ISSN: Design and Implementation of Stepper Motor Control System Based on 52 MCU

World Scientific Research Journal (WSRJ) ISSN: Design and Implementation of Stepper Motor Control System Based on 52 MCU World Scientific Research Journal (WSRJ) ISSN: 2472-3703 www.wsr-j.org Design and Implementation of Stepper Motor Control System Based on 52 MCU Xinglan Zhang a, Xianda Zhang b, * and Xin Zhong c School

More information

Content-based Indexing and Retrieval supported by Mobile Agent Technology

Content-based Indexing and Retrieval supported by Mobile Agent Technology Content-based Indexing and Retrieval supported by Mobile Agent Technology Harald Kosch, Mario Döller and László Böszörményi Institute of Information Technology, University Klagenfurt, Austria harald.kosch(mdoeller,laszlo.boeszoermenyi)@itec.uni-klu.ac.at

More information

Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b

Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b 3rd International Conference on Management, Education Technology and Sports Science (METSS 2016) Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b 1 Basic Teaching

More information

Approaches to Capturing Java Threads State

Approaches to Capturing Java Threads State Approaches to Capturing Java Threads State Abstract This paper describes a range of approaches to capturing the state of Java threads. The capture and restoration of Java threads state have two main purposes:

More information

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China

More information

Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2

Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2 International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1,

More information

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , ) ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software

More information

The Application of Wireless Sensor in Aquaculture Water Quality Monitoring

The Application of Wireless Sensor in Aquaculture Water Quality Monitoring The Application of Wireless Sensor in Aquaculture Water Quality Monitoring Wen Ding, Yinchi Ma Beijing Fisheries Research Institute, Beijing, 100068, China {dingwen, mayinchi}@bjfishery.com Abstract. The

More information

A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios

A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios John Page, Arkady Zaslavsky, Maria Indrawan School of Computer Science and Software Engineering Monash University,

More information

Research on Community Structure in Bus Transport Networks

Research on Community Structure in Bus Transport Networks Commun. Theor. Phys. (Beijing, China) 52 (2009) pp. 1025 1030 c Chinese Physical Society and IOP Publishing Ltd Vol. 52, No. 6, December 15, 2009 Research on Community Structure in Bus Transport Networks

More information

Research on An Electronic Map Retrieval Algorithm Based on Big Data

Research on An Electronic Map Retrieval Algorithm Based on Big Data Research on An Electronic Map Retrieval Algorithm Based on Big Data 1 College of Computer Science and Technology,Jilin Agricultural University Changchun, 130118,China E-mail: liemperor@163.com Rujing Yao

More information

Department of CSE. The Chinese University of Hong Kong. 1 Introduction. academic as well as in the commercial and legal

Department of CSE. The Chinese University of Hong Kong. 1 Introduction. academic as well as in the commercial and legal -based Multimedia Data Sharing Platform Anson Lee, Michael Lyu, Irwin King Department of CSE The Chinese University of Hong Kong Shatin, New Territories, Hong Kong Abstract This paper proposes an agentbased

More information

Application of Wang-Yu Algorithm in the Geometric Constraint Problem

Application of Wang-Yu Algorithm in the Geometric Constraint Problem Application of Wang-u Algorithm in the Geometric Constraint Problem 1 Department of Computer Science and Technology, Jilin University Changchun, 130012, China E-mail: liwh@jlu.edu.cn Mingyu Sun 2 Department

More information

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS Pardeep Saini* Computer sci. & engg. & YIET Ravinder Chouhan Computer sci.engg. & YIET Abstract - An adhoc network is a collection of

More information

Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA

Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA 2009 Fifth International Conference on Information Assurance and Security Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA GAO Qiang, HAN Miao, HU Shu-liang, DONG Hai-jie ianjin

More information

[Telchy, 4(11): November, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Telchy, 4(11): November, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 [Telchy, 4(): November, 5] ISSN: 77-9655 (IOR), Publication Impact Factor:.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLIGENT OPTIMIZATION AND SCHEDULING OF NETWORKED

More information

Short-term Linkable Group Signatures with Categorized Batch Verification

Short-term Linkable Group Signatures with Categorized Batch Verification Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical

More information

An Improved DV-Hop Algorithm for Resisting Wormhole Attack

An Improved DV-Hop Algorithm for Resisting Wormhole Attack Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1443-1448 1443 Open Access An Improved DV-Hop Algorithm for Resisting Wormhole Attack Xiaoying

More information

The Research of Collision Detection Algorithm Based on Separating axis Theorem

The Research of Collision Detection Algorithm Based on Separating axis Theorem The Research of Collision Detection lgorithm Based on Separating axis Theorem bstract Cheng Liang a, Xiaojian Liu School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China a

More information

An Architecture for Next Generation Mobile Agent Infrastructure

An Architecture for Next Generation Mobile Agent Infrastructure An Architecture for Next Generation Mobile Agent Infrastructure Ichiro Satoh Department of Information Sciences, Ochanomizu University / Japan Science and Technology Corporation Abstract This paper presents

More information

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip

More information

Distributed Communication for Highly Mobile Agents

Distributed Communication for Highly Mobile Agents Distributed Communication for Highly Mobile Agents Mohammad Samarah and Philip Chan The division of Electrical and Computer Science and Engineering Florida Institute of Technology, Melbourne, FL 32901

More information

Evaluation of the μcontroller Networks Communication for EtherCAT Process Data Interface

Evaluation of the μcontroller Networks Communication for EtherCAT Process Data Interface Evaluation of the μcontroller Networks Communication for EtherCAT Process Data Interface Li Jiang 1, Mingxin Hou 1, Fanshao Wei*,1, Minghe Jin 1, Hong Liu 1 Harbin Institute of Technology, Harbin, China

More information

A method of three-dimensional subdivision of arbitrary polyhedron by. using pyramids

A method of three-dimensional subdivision of arbitrary polyhedron by. using pyramids 5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) A method of three-dimensional subdivision of arbitrary polyhedron by using pyramids LIU Ji-bo1,a*, Wang Zhi-hong1,b,

More information

Development of Database and Establishment of Information Network for Agricultural Byproducts Processing

Development of Database and Establishment of Information Network for Agricultural Byproducts Processing Development of Database and Establishment of Information Network for Agricultural Byproducts Processing Zhang Shuming, Yan Chuliang April 5, 2004 No,1,Beisatan,Deshengmenwai Beijing 100083,P.R.China 1

More information

The Analysis of Communication Architecture and Control Mode of Wide Area Power Systems Control

The Analysis of Communication Architecture and Control Mode of Wide Area Power Systems Control The Analysis of Communication Architecture and Control Mode of Wide Area Power Systems Control Tong Xiaoyang, Liao Guodong, Wang Xiaoru, Zhong Shan School of Electrical Engineering, Southwest Jiaotong

More information

A SECURE DOMAIN NAME SYSTEM BASED ON INTRUSION TOLERANCE

A SECURE DOMAIN NAME SYSTEM BASED ON INTRUSION TOLERANCE Proceedings of the Seventh International Conference on Learning and Cybernetics, Kunming, 12-15 July 2008 A SECURE DOMAIN NAME SYSTEM BASED ON INTRUSION TOLERANCE WEI ZHOU 1, 2, LIU CHEN 3, 4 1 School

More information

Research on the safety of the communication link of the Radio Based Cab Signaling system

Research on the safety of the communication link of the Radio Based Cab Signaling system Research on the safety of the communication link of the Radio Based Cab Signaling system C. Li, Y. Zhang, J. Wang & H. Wang Automation Research Institute of Transportation Science & Technology, Beijing

More information

A Modular k-nearest Neighbor Classification Method for Massively Parallel Text Categorization

A Modular k-nearest Neighbor Classification Method for Massively Parallel Text Categorization A Modular k-nearest Neighbor Classification Method for Massively Parallel Text Categorization Hai Zhao and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University, 1954

More information

A New Method Of VPN Based On LSP Technology

A New Method Of VPN Based On LSP Technology 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing

More information