WorldWideScience

Sample records for twoleveled mobile agent

  1. Mobile Agents

    Science.gov (United States)

    Satoh, Ichiro

    Mobile agents are autonomous programs that can travel from computer to computer in a network, at times and to places of their own choosing. The state of the running program is saved, by being transmitted to the destination. The program is resumed at the destination continuing its processing with the saved state. They can provide a convenient, efficient, and robust framework for implementing distributed applications and smart environments for several reasons, including improvements to the latency and bandwidth of client-server applications and reducing vulnerability to network disconnection. In fact, mobile agents have several advantages in the development of various services in smart environments in addition to distributed applications.

  2. MOBILE AGENT: EMERGING TECHNOLOGY

    OpenAIRE

    RAJGURU P. V. DR. DESHMUKH S. D

    2011-01-01

    Mobile agent technology has been promoted as an emerging technology that makes it much easier to design, implement, and maintain distributed systems, introduction to basic concepts of mobile agents like agent mobility, agent types and places and agent communication. Then benefits of the usage of mobile agents are summarized and illustrated by selected applications. The next section lists requirements and desirable properties for mobile agent languages and systems. We study the main features, ...

  3. Secure Mobile Trade Agent

    Directory of Open Access Journals (Sweden)

    Musbah M. Aqe

    2007-01-01

    Full Text Available E-commerce on the internet has the ability to produce millions of transactions and a great number of merchants whose supply merchandise over the internet. As a result, it is difficult for entities to roam over every site on the internet and choose the best merchandise to trade. So, in this paper we introduced a mobile trade agent that visit the sites to gather and evaluate the information from merchant servers and decide to trade goods on behalf of the user. We observed that the combination of public key cryptosystem with distributed object technology make this proposed scheme more secure and efficient than the already existed schemes.

  4. Mobile Agents - Smart Messages

    OpenAIRE

    Hurst, Leon; Cunningham, Padraig

    1997-01-01

    Wireless communication with Mobile Computing devices is known to be problematic. It is very different in character from conventional communication over wired networks. Since many distributed applications make assumptions about network characteristics, they may not be used in a hostile mobile environment. We are proposing a new kind of messaging system which incorporates adaptive behaviour into the messages themselves. We call these `Smart Messages?, and implement them using ...

  5. Mobile agent driven by aspect

    Directory of Open Access Journals (Sweden)

    Youssef Hannad

    2010-11-01

    Full Text Available Domain application of mobile agents is quite large. They are used for network management and the monitoring of complex architecture. Mobile agent is also essential into specific software architecture such that adaptable grid architecture. Even if the concept of mobile agent seems to be obvious, the development is always complex because it needs to understand network features but also security features and negotiation algorithms. We present a work about an application of aspects dedicated to mobile agent development over a local network. At this level, the underlying protocol is called jini and allows managing several essential concepts such that short transaction and permission management. Three subsets of aspects are defined in this work. A part is for the description of agent host and its security level, accessible resource, etc. A second part is about mobile agent and their collaboration. This means how they can operate on an agent host with the respect of the execution context. All the results are illustrated through a distributed monitoring application called DMA. Its main objective is the observation of component servers.

  6. New agents in HSC mobilization.

    Science.gov (United States)

    Domingues, Mélanie J; Nilsson, Susan K; Cao, Benjamin

    2017-02-01

    Mobilized peripheral blood (PB) is the most common source of hematopoietic stem cells (HSC) for autologous transplantation. Granulocyte colony stimulating factor (G-CSF) is the most commonly used mobilization agent, yet despite its widespread use, a considerable number of patients still fail to mobilize. Recently, a greater understanding of the interactions that regulate HSC homeostasis in the bone marrow (BM) microenvironment has enabled the development of new molecules that mobilize HSC through specific inhibition, modulation or perturbation of these interactions. AMD3100 (plerixafor), a small molecule that selectively inhibits the chemokine receptor CXCR4 is approved for mobilization in combination with G-CSF in patients with Non-Hodgkin's lymphoma and multiple myeloma. Nevertheless, identifying mobilization strategies that not only enhance HSC number, but are rapid and generate an optimal "mobilized product" for improved transplant outcomes remains an area of clinical importance. In recent times, new agents based on recombinant proteins, peptides and small molecules have been identified as potential candidates for therapeutic HSC mobilization. In this review, we describe the most recent developments in HSC mobilization agents and their potential impact in HSC transplantation.

  7. Mobile agent security using proxy-agents and trusted domains

    OpenAIRE

    Mitrovic, Nikola; Arronategui Arribalzaga, Unai

    2009-01-01

    Commercial or wide-network deployment of Mobile Agent Systems is not possible without satisfying security architecture. In this paper we propose architecture for secure Mobile Agent Systems, using Trusted Domains and Proxy agents. Existing approaches are based on security services at the level of an agent system, library or specific objects. Our concept uses proxy agents to enable transparent security services both to security-aware mobile agents and legacy agents. Per-agent and domain-level...

  8. Mobile agents basic concepts, mobility models, and the tracy toolkit

    CERN Document Server

    Braun, Peter

    2005-01-01

    Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are not limited by platform. This emerging field is now poised to become a cornerstone for new Web-based ubiquitous computing environments. Mobile Agents provides a practical introduction to mobile agent technology and surveys the state of the art in mobile agent research. Students and researchers can use the book as an introduction to the concepts and possibilities of this field and as an overview of ongoing research. Developers can use it to identify the capabilities of the technology to decide if mobile agents are the right solution for them. Practioners can also gain hands-on experience in programming mobile agents through exploration of the source code for a complete mobile agent environment available through the companion website.*Summarizes the state of the art in mobile agent research*Identifies the benefits...

  9. Analysis and Optimization for Mobile Agent Communication

    Institute of Scientific and Technical Information of China (English)

    YANGBo; LIUDayou

    2005-01-01

    Communication performance is one of the most important factors affecting the efficiency of mobile agent system. Only traditional optimization techniques for communication performance are not enough, especially in large-scale intelligent mobile agent system, so more intelligent optimization techniques are needed. In the background, the paper studies communication of mobile agent system from the viewpoint of performance. The paper makes qualitative and quantitative analysis of four important factors that will affect the communication performance of mobile agent system and presents the communication performance optimization model. The model hasthree primary functions. First, the model provides a formalism method to describe the communication task and process of mobile agent. Second, the model provides a means to make quantitative analysis of the performance of mobile agent system. Third, the model can plan out an optimal communication scheme for mobile agent to minimize the cost of whole communication. The model could thus be a building block for the optimization of the communication behavior of mobile agent.

  10. Mobile Agents in Networking and Distributed Computing

    CERN Document Server

    Cao, Jiannong

    2012-01-01

    The book focuses on mobile agents, which are computer programs that can autonomously migrate between network sites. This text introduces the concepts and principles of mobile agents, provides an overview of mobile agent technology, and focuses on applications in networking and distributed computing.

  11. Security Measures to Protect Mobile Agents

    Science.gov (United States)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  12. Decentralized network management based on mobile agent

    Institute of Scientific and Technical Information of China (English)

    李锋; 冯珊

    2004-01-01

    The mobile agent technology can be employed effectively for the decentralized management of complex networks. We show how the integration of mobile agent with legacy management protocol, such as simple network management protocol (SNMP), leads to decentralized management architecture. HostWatcher is a framework that allows mobile agents to roam network, collect and process data, and perform certain adaptive actions. A prototype system is built and a quantitative analysis underlines the benefits in respect to reducing network load.

  13. Security of Mobile Agents on the Internet.

    Science.gov (United States)

    Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare

    2001-01-01

    Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)

  14. The Research on Mobile-agent Security

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can suspend its execution in a host computer, transfer itself to another agent-enabled host in the network, and resume execution of the new host. As the sophistication of mobile software has increased with the time, so have the associated threats to security. This paper provides an overview of the range of threats facing the designers of mobile agent. The paper also identifies generic security objectives, and a range of measures for countering the identified threats.

  15. Design of a Two-level Adaptive Multi-Agent System for Malaria Vectors driven by an ontology

    Directory of Open Access Journals (Sweden)

    Etang Josiane

    2007-07-01

    Full Text Available Abstract Background The understanding of heterogeneities in disease transmission dynamics as far as malaria vectors are concerned is a big challenge. Many studies while tackling this problem don't find exact models to explain the malaria vectors propagation. Methods To solve the problem we define an Adaptive Multi-Agent System (AMAS which has the property to be elastic and is a two-level system as well. This AMAS is a dynamic system where the two levels are linked by an Ontology which allows it to function as a reduced system and as an extended system. In a primary level, the AMAS comprises organization agents and in a secondary level, it is constituted of analysis agents. Its entry point, a User Interface Agent, can reproduce itself because it is given a minimum of background knowledge and it learns appropriate "behavior" from the user in the presence of ambiguous queries and from other agents of the AMAS in other situations. Results Some of the outputs of our system present a series of tables, diagrams showing some factors like Entomological parameters of malaria transmission, Percentages of malaria transmission per malaria vectors, Entomological inoculation rate. Many others parameters can be produced by the system depending on the inputted data. Conclusion Our approach is an intelligent one which differs from statistical approaches that are sometimes used in the field. This intelligent approach aligns itself with the distributed artificial intelligence. In terms of fight against malaria disease our system offers opportunities of reducing efforts of human resources who are not obliged to cover the entire territory while conducting surveys. Secondly the AMAS can determine the presence or the absence of malaria vectors even when specific data have not been collected in the geographical area. In the difference of a statistical technique, in our case the projection of the results in the field can sometimes appeared to be more general.

  16. Information Service Model with Mobile Agent Supported

    Institute of Scientific and Technical Information of China (English)

    邹涛; 王继成; 张福炎

    2000-01-01

    Mobile Agent is a kind of novel agent technology characterized by mobile, intelligent, parallel and asynchronous computing. In this paper, a new information service model that adopts mobile agent technology is introduced first,and then an experimental system DOLTRIA system that is implemented based on the model is described. The DOLTRIA system implemented by WWW framework and Java can search for relevant HTML documents on a set of Web servers. The result of experiments shows that performance improvement can be achieved by this model, and both the elapsed time and network traffic are reduced significantly.

  17. NETWORK MANAGEMENT WITH SECURED MOBILE AGENT

    Institute of Scientific and Technical Information of China (English)

    迈克尔; 徐良贤

    2002-01-01

    Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achieved good results. For example, it is possible to launch a code with a guarantee that it cannot attack the hosting sites. The main problem remaining, however, is protecting the mobile code against malicious service providers, the host problem. This paper proposed a Mobile Agent management scheme in a hierarchical level that provides to user a reliable and flexible global access to internet/network information services. We further described a protection mechanism to Mobile Agents against malicious hosts. As an effort to address host problems we first identify the kinds of attack that may be performed by malicious hosts, and propose a mechanism to prevent these attacks. At each agent host we introduce a trusted third party entity on each server called Secure Service Station (SSS) to carry out security actions.

  18. A Highly Secure Mobile Agent System Architecture

    Science.gov (United States)

    Okataku, Yasukuni; Okutomi, Hidetoshi; Yoshioka, Nobukazu; Ohgishi, Nobuyuki; Honiden, Shinichi

    We propose a system architecture for mobile agents to improve their security in the environments of insecure networks and non-sophisticated terminals such as PDAs. As mobile agents freely migrate onto their favorite terminals through insecure networks or terminals, it is not appropriate for them to store some secret information for authentication and encryption/decryption. We introduce one and more secure nodes(OASIS NODE) for securely generating and verifying authentication codes. The each agent’s data are encrypted by a pseudo-chaos cipher mechanism which doesn’t need any floating processing co-processor. We’ve constructed a prototype system on a Java mobile agent framework, “Bee-gent" which implements the proposed authentication and cipher mechanisms, and evaluated their performances and their applicability to business fields such as an auction system by mobile agents.

  19. An Application of Mobile Agent System in Network Management

    Institute of Scientific and Technical Information of China (English)

    YANGChen-xiang; DUJun-ping; YINYi-xin

    2004-01-01

    This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method, an agent can change its route dynamically without making any change to its specific behavior. By classifying mobile agents into two categories, the task agent can be reusable in different networks. In this way, a mobile agent system can easily carry out network management tasks.

  20. Safe motion planning for mobile agents: A model of reactive planning for multiple mobile agents

    Energy Technology Data Exchange (ETDEWEB)

    Fujimura, Kikuo.

    1990-01-01

    The problem of motion planning for multiple mobile agents is studied. Each planning agent independently plans its own action based on its map which contains a limited information about the environment. In an environment where more than one mobile agent interacts, the motions of the robots are uncertain and dynamic. A model for reactive agents is described and simulation results are presented to show their behavior patterns. 18 refs., 2 figs.

  1. AN AGENT BASED TRANSACTION PROCESSING SCHEME FOR DISCONNECTED MOBILE NODES

    Directory of Open Access Journals (Sweden)

    J.L. Walter Jeyakumar

    2010-12-01

    Full Text Available We present a mobile transaction framework in which mobile users can share data which is stored in the cache of a mobile agent. This mobile agent is a special mobile node which coordinates the sharing process. The proposed framework allows mobile affiliation work groups to be formed dynamically with a mobile agent and mobile hosts. Using short range wireless communication technology, mobile users can simultaneously access the data from the cache of the mobile agent. The data Access Manager module at the mobile agent enforces concurrency control using cache invalidation technique. This model supports disconnected mobile computing allowing mobile agent to move along with the Mobile Hosts. The proposed Transaction frame work has been simulated in Java 2 and performance of this scheme is compared with existing frame works.

  2. Brahms Mobile Agents: Architecture and Field Tests

    Science.gov (United States)

    Clancey, William J.; Sierhuis, Maarten; Kaskiris, Charis; vanHoof, Ron

    2002-01-01

    We have developed a model-based, distributed architecture that integrates diverse components in a system designed for lunar and planetary surface operations: an astronaut's space suit, cameras, rover/All-Terrain Vehicle (ATV), robotic assistant, other personnel in a local habitat, and a remote mission support team (with time delay). Software processes, called agents, implemented in the Brahms language, run on multiple, mobile platforms. These mobile agents interpret and transform available data to help people and robotic systems coordinate their actions to make operations more safe and efficient. The Brahms-based mobile agent architecture (MAA) uses a novel combination of agent types so the software agents may understand and facilitate communications between people and between system components. A state-of-the-art spoken dialogue interface is integrated with Brahms models, supporting a speech-driven field observation record and rover command system (e.g., return here later and bring this back to the habitat ). This combination of agents, rover, and model-based spoken dialogue interface constitutes a personal assistant. An important aspect of the methodology involves first simulating the entire system in Brahms, then configuring the agents into a run-time system.

  3. 移动Agent的应用%Application of Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    王继宏; 胡建平

    2000-01-01

    Based on the active ,individuality of the mobile Agent and low-consumption of the network bandwidth,mobile Agent is the newly born network communication and complete distributed computing mode. It has largely developing potential.. This paper presents the role of mobile Agent in present application and discusses the typical mobile Agent area based on the characters of mobile Agent. We provide a new way to classify the applications.

  4. Mobile Agent PLM Architecture for extended enterprise

    Directory of Open Access Journals (Sweden)

    Abdelhak Boulaalam

    2011-01-01

    Full Text Available Nowadays manufacturers are under increased pressure to have an add value for their products to struggle the low-cost production in emerging countries. Distributed control and Intelligent Product are a new and exciting opportunity to build more effective process networks for a wide range of applications in logistics and product development, Radio Frequency Identification is applied increasingly; this technology applied in conjunction with the Mobile Agent system can bring more values in managing and control the lifecycle of products by optimizing the three essential factors: cost, quality and deadline for the survival of a company in the competitive manufacturing world. In this paper we propose Mobile Agent PLM Architecture for extended enterprise, based on Mobile Agent and RFID or, more generally, Product Embedded Information Devices (PEID, for tracking and managing the information of the whole product lifecycle in the extended enterprise, and to satisfy new requirements for increased integrability, traceability, adaptability, extendibility, and closed-loop PLM. Mobile Agents are suitable for tracking information in distributing environment and the mobility aspect, at any time and any place. This paper proposes a first architecture based on these technologies.

  5. Dispatching mobile Agents for DDM applicationss

    Institute of Scientific and Technical Information of China (English)

    LI Xi-ning; Guillaume Autran

    2008-01-01

    Techniques for mining information from distributed data sources accessible over the Internet are a growing area of research. The mobile Agent paradigm opens a new door for distributed data mining and knowledge discovery applications. In this paper we present the design of a mobile agent system which couples service discovery, using a logical language based application programming interface, and database access. Combining mobility with database access provides a means to create more efficient data mining applications. The processing of data is moved to network wide data locations instead of the traditional approach of bringing huge amount of data to the processing location. Our proposal aims at implementing system tools that will enable intelligent mobile Agents to roam the Internet searching for distributed data services. Agents access the data, discover patterns, extract useful information from facts recorded in the databases, then communicate local results back to the user. The user then generates a global data model through the aggregation of results provided by all Agents. This overcomes barriers posed by network congestion, poor security, and unreliability.

  6. FY1995 community support by mobile agents; 1995 nendo mobile agent ni yoru community keisei shien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    The purpose is to develop fundamental technologies for navigation systems and mobile computing systems in museums, theme parks and cities. Concretely, we implement software agents into the mobile computing environment which consists of PHS, mobile computers and mobile robots, and realize various functions to access regional information. We have studied on Communityware which supports human activities and communities by using mobile agents implemented into mobile computers and town robots. The mobile agents, which intelligently process information obtained in physical and virtual worlds, access regional information which is omnipresent in the environment. With respect to the approach using mobile computers, we have provided one hundred mobile computers in the international conference on multiagent systems 1996 and carried out the first experimentation of mobile computing in the world. The mobile computer has two functions: Community Viewer which displays interactions between members of communities and Social Matchmaker which supports to hold meetings by searching for people who have common interests. With respect to the approach using town robots, we have developed a robot system which can robustly behave in a complex outdoor environment by using vision agents embedded in the environment. The system aims at support of people in streets. (NEDO)

  7. A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents

    Institute of Scientific and Technical Information of China (English)

    GUAN Huanmei; MENG Xuejun; ZHANG Huanguo

    2006-01-01

    The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agent. Forward integrity in mobile agents guarantees that offers contained in a mobile agent from previously visited host can not be modified by a malicious host. Itinerary secrecy can prevent mobile agent from being passively attack. This paper proposes a new forward integrity and itinerary secrecy protocol for mobile agent. The protocol can also resist collusion truncation attack.

  8. Mobile Agents Systems in Wireless Applications

    Directory of Open Access Journals (Sweden)

    Mihaela Muntean

    2009-06-01

    Full Text Available The paper presents an introduction in the Mobile Agents Systems and describes how this technology can be used in wireless applications. Also it is shown the possibility of securing wireless applications that use mobile agents and distributed computing. Wireless networks are a relatively new technology in the LAN market. With the weak encryption and security defined in the IEEE standards, wireless LANs, when improperly deployed or administered, can provide a significant risk to those economic sectors. These sectors include health-care, government, and banking in particular. Increasingly diverse heterogeneous wireless infrastructures in combination with more narrowly defined roles of parties participating in the delivery of applications to mobile users pose new challenges for support for delivering these applications.

  9. Application of mobile scanning agent in the network security

    Institute of Scientific and Technical Information of China (English)

    闵君; 冯珊; 唐超; 梅纲

    2004-01-01

    To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent.

  10. Consensus in networks of mobile communicating agents

    Science.gov (United States)

    Baronchelli, Andrea; Díaz-Guilera, Albert

    2012-01-01

    Populations of mobile and communicating agents describe a vast array of technological and natural systems, ranging from sensor networks to animal groups. Here, we investigate how a group-level agreement may emerge in the continuously evolving network defined by the local interactions of the moving individuals. We adopt a general scheme of motion in two dimensions and we let the individuals interact through the minimal naming game, a prototypical scheme to investigate social consensus. We distinguish different regimes of convergence determined by the emission range of the agents and by their mobility, and we identify the corresponding scaling behaviors of the consensus time. In the same way, we rationalize also the behavior of the maximum memory used during the convergence process, which determines the minimum cognitive/storage capacity needed by the individuals. Overall, we believe that the simple and general model presented in this paper can represent a helpful reference for a better understanding of the behavior of populations of mobile agents.

  11. Consensus in evolving networks of mobile agents

    Science.gov (United States)

    Baronchelli, Andrea; Díaz-Guilera, Albert

    2012-02-01

    Populations of mobile and communicating agents describe a vast array of technological and natural systems, ranging from sensor networks to animal groups. Here, we investigate how a group-level agreement may emerge in the continuously evolving networks defined by the local interactions of the moving individuals. We adopt a general scheme of motion in two dimensions and we let the individuals interact through the minimal naming game, a prototypical scheme to investigate social consensus. We distinguish different regimes of convergence determined by the emission range of the agents and by their mobility, and we identify the corresponding scaling behaviors of the consensus time. In the same way, we rationalize also the behavior of the maximum memory used during the convergence process, which determines the minimum cognitive/storage capacity needed by the individuals. Overall, we believe that the simple and general model presented in this talk can represent a helpful reference for a better understanding of the behavior of populations of mobile agents.

  12. Transportation dynamics on networks of mobile agents

    CERN Document Server

    Yang, Han-Xin; Xie, Yan-Bo; Lai, Ying-Cheng; Wang, Bing-Hong

    2011-01-01

    Most existing works on transportation dynamics focus on networks of a fixed structure, but networks whose nodes are mobile have become widespread, such as cell-phone networks. We introduce a model to explore the basic physics of transportation on mobile networks. Of particular interest are the dependence of the throughput on the speed of agent movement and communication range. Our computations reveal a hierarchical dependence for the former while, for the latter, we find an algebraic power law between the throughput and the communication range with an exponent determined by the speed. We develop a physical theory based on the Fokker-Planck equation to explain these phenomena. Our findings provide insights into complex transportation dynamics arising commonly in natural and engineering systems.

  13. Evolution of Cooperation among Mobile Agents

    CERN Document Server

    Chen, Zhuo; Cai, Yun-Ze; Xu, Xiao-Ming

    2010-01-01

    We study the effects of mobility on the evolution of cooperation among self-driven agents, which move at a constant speed v in a two-dimensional plane without boundary restrictions and average directions of neighbors within a radius R for collective motion. Adopting the the prisoner's dilemma game and the snowdrift game as metaphors, we find that cooperation can be maintained and even enhanced for small v and modest values of R, when compared with the case that all agents do not move. Depending on the payoff parameter and the game model, the cooperator frequency may show resonant behavior, or reach an absorbing state of all cooperators as the increase of R and the initial population density. These findings may help understanding the role of individual motion in social systems.

  14. Wireless network topology for monitoring mobile agents

    Science.gov (United States)

    Fraser, Matthew J.; James, Daniel A.; Thiel, David V.

    2005-02-01

    A wireless network of multiple sensor nodes for monitoring large numbers of mobile agents is described and investigated. Wireless monitoring provides time critical information from a number of data sources allowing near real-time analysis of the collected data. The developed wireless network provides a moderate data rate, is able to support many wireless nodes and is a low power solution. Novel network structures have been developed to satisfy all of these requirements. This paper evaluates a number of currently available wireless communication protocols, concluding that a Bluetooth wireless network satisfies the above criteria. To support a large number of devices, topologies using inter-piconet and piconet sharing methods have been developed. These network structures are outlined in detail and have been developed with the current Bluetooth hardware limitations in mind. The proposed wireless networks have been developed to be implemented with current Bluetooth hardware. A summary of network performance is included for each developed network structure, and from these figures an appropriate network structure has been chosen that satisfies the requirements of a wireless sensor network for monitoring mobile agents.

  15. A Novel Security Approach in Mobile Agent Using Encryption

    Directory of Open Access Journals (Sweden)

    Nidhi Gupta

    2012-06-01

    Full Text Available The appearance of software agents has given rise too much discussion of what such an agent is and how it differs from programs in general. An agent is anything that can be viewed as perceiving its environment through sensors & acting upon that environment through actuators. The existing systems can be classified in the context of singleagent systems and multi-agent systems. Mobile agents cantransport themselves from one host to another. Mobile agents have been developed as an extension to and replacement of the client-server model. The proposed system is Mobile Agent System. It reduces network load and latency in which there is usually no transmission ofintermediate result. This conserves the network bandwidth .Since the agents are autonomous; the mobile device that dispatches the agent need not be connected all the time.

  16. Application and Development of Mobile Agent in AN

    Institute of Scientific and Technical Information of China (English)

    XU Li; ZHENG Bao-yu

    2004-01-01

    Active Networks represent a significant step in the evolution of packet-switched networks. It aims to move dynamic computation within the network. Mobile agent technology is a novel paradigm for distributed computation. This paper discusses the applicability of mobile agent technology for the development of active networks, both security policy and resource management, and other expected application as well. Based on the discussion, it describes a general mobile agent based Active Network (AN) architecture at last.

  17. Intelligent Detection System framework using Mobile agents

    CERN Document Server

    Jaisankar, N; Swamy, K Durai

    2010-01-01

    An intrusion detection system framework using mobile agents is a layered framework mechanism designed to support heterogeneous network environments to identify intruders at its best. Traditional computer misuse detection techniques can identify known attacks efficiently, but perform very poorly in other cases. Anomaly detection has the potential to detect unknown attacks; however, it is a very challenging task since its aim is to detect unknown attacks without any priori knowledge about specific intrusions. This technology is still at its early stage. The objective of this paper is that the system can detect anomalous user activity. Existing research in this area focuses either on user activity or on program operation but not on both simultaneously. In this paper, an attempt to look at both concurrently is presented. Based on an intrusion detection framework [1], a novel user anomaly detection system has been implemented and conducted several intrusion detection experiments in a simulated environment by analy...

  18. Secure Web Transaction with Anonymous Mobile Agent over Internet

    Institute of Scientific and Technical Information of China (English)

    WANG ChangJie(王常杰); ZHANG FangGuo(张方国); WANG YuMin(王育民)

    2003-01-01

    A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.

  19. The Study and Perspective of Mobile Agent Security

    Institute of Scientific and Technical Information of China (English)

    MU Hong; WANG Ru-chuan; WANG Hai-yan

    2004-01-01

    Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. So many projects have focused on the security issues of mobile agent and many mechanisms have been proposed to solve the security problem. This paper discusses the security issues and the countermeasures. Then it points out some directions for the research of the mobile agent security.

  20. MODEL-BASED PERFORMANCE EVALUATION APPROACH FOR MOBILE AGENT SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    Li Xin; Mi Zhengkun; Meng Xudong

    2004-01-01

    Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study of mobile agent system and most of these researches focus on agent behavior analysis resulting in that models are hard to apply to mobile agent systems. To bridge the gap, a new performance evaluation model derived from operation mechanisms of mobile agent platforms is proposed. Details are discussed for the design of companion simulation software, which can provide the system performance such as response time of platform to mobile agent. Further investigation is followed on the determination of model parameters. Finally comparison is made between the model-based simulation results and measurement-based real performance of mobile agent systems. The results show that the proposed model and designed software are effective in evaluating performance characteristics of mobile agent systems. The proposed approach can also be considered as the basis of performance analysis for large systems composed of multiple mobile agent platforms.

  1. Mobile Agents for Web-Based Systems Management.

    Science.gov (United States)

    Bellavista, Paolo; Corradi, Antonio; Tarantino, Fabio; Stefanelli, Cesare

    1999-01-01

    Discussion of mobile agent technology that overcomes the limits of traditional approaches to the management of global Web systems focuses on the MAMAS (mobile agents for the management of applications and systems) management environment that uses JAVA as its implementation language. Stresses security and interoperability. (Author/LRW)

  2. Agent-based Multimodal Interface for Dynamically Autonomous Mobile Robots

    Science.gov (United States)

    2003-01-01

    Agent-based Multimodal Interface for Dynamically Autonomous Mobile Robots Donald Sofge, Magdalena Bugajska, William Adams, Dennis...computing paradigm for integrated distributed artificial intelligence systems on autonomous mobile robots (Figure 1). Figure 1 – CoABS Grid...Architecture for Dynamically Autonomous Mobile Robots The remainder of the paper is organized as follows. Section 2 describes our integrated AI

  3. Mobile Agent Based on Internet%基于Internet的移动Agent

    Institute of Scientific and Technical Information of China (English)

    徐练; 周龙骧; 王翰虎

    2001-01-01

    Mobile Agent is a hybrid of Internet technology and Artificial Intelligence. Today there are tremendous amount of information resources distributing among Internet ,but it's very difficult to find the wanted-thing. Internet has increasingly become a vital compute platform for electron commercial which has highly popular through the world. Developing new Internet-based application programs such as shopping online,e-business,search engine etc pose new task. Mobile Agent proffers new clue and technology. Considering Internet,this thesis conducts a research on architecture,mobile mechanism in mobile Agent system. Based on the Agent theory research and engineering ,the thesis focuses point at researching Mobile Agents,which have the ability to rove through the network. Using OMG's "Mobile Agent Facility Specification" for reference,we design a model architecture of Mobile Agent System. Based on the architecture ,the article analyzes the key technology and gives methods to resolving them ,emphases on mobility mechanism of Agent and implementing it. At last a model of java-based Mobile Agent System is given.

  4. Pivotal Technology Research of Grid Based on Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    CHEN Hong-wei; WANG Ru-chuan

    2004-01-01

    Grid Based on Mobile Agent is a new grid scheme. The purpose of the paper is to solve the pivotal technology of Grid Based on Mobile Agent ( GBMA) combined with thought of Virtual Organization ( VO). In GBMA, virtual organization is viewed as the basic management unit of the grid, and mobile agent is regarded as an important interactive means. Grid architecture, grid resource management and grid task management are the core technology problem of GBMA. The simulation results show that Inter- VO pattern has the obvious advantage because it can make full use of resources from other virtual organizations in GBMA environment.

  5. The mobile agent rendezvous problem in the ring

    CERN Document Server

    Kranakis, Evangelos; Marcou, Euripides

    2010-01-01

    Mobile agent computing is being used in fields as diverse as artificial intelligence, computational economics and robotics. Agents' ability to adapt dynamically and execute asynchronously and autonomously brings potential advantages in terms of fault-tolerance, flexibility and simplicity. This monograph focuses on studying mobile agents as modelled in distributed systems research and in particular within the framework of research performed in the distributed algorithms community. It studies the fundamental question of how to achieve rendezvous, the gathering of two or more agents at the same n

  6. Web Crawler Based on Mobile Agent and Java Aglets

    Directory of Open Access Journals (Sweden)

    Md. Abu Kausar

    2013-09-01

    Full Text Available With the huge growth of the Internet, many web pages are available online. Search engines use web crawlers to collect these web pages from World Wide Web for the purpose of storage and indexing. Basically Web Crawler is a program, which finds information from the World Wide Web in a systematic and automated manner. This network load farther will be reduced by using mobile agents.The proposed approach uses mobile agents to crawl the pages. A mobile agent is not bound to the system in which it starts execution. It has the unique ability to transfer itself from one system in a network to another system. The main advantages of web crawler based on Mobile Agents are that the analysis part of the crawling process is done locally rather than remote side. This drastically reduces network load and traffic which can improve the performance and efficiency of the whole crawling process.

  7. Retrieving Information from the Invisible Web Using Mobile Agents

    Directory of Open Access Journals (Sweden)

    Fabien-Kenzo Sato

    2005-01-01

    Full Text Available This study proposes a model of information retrieval on the invisible Web by using the mobile agent paradigm. The developed architecture uses the power of a search engine to provide a list of sites of the invisible Web which are likely to be relevant and launches a dynamic search on these sites, thanks to mobile agents. To compare and experiment in real conditions, two versions were implemented: a version using the traditional client/server paradigm and a version using mobile agents. Client/server tests on actual Websites generated satisfactory qualitative results. A series of comparative experiments of the two versions implemented were carried out using a test site. Results show that the mobile agent version generates much less traffic and is thus faster than the client/server version, especially with low bandwidth. Moreover, as the mobile agents carry out calculations on the server rather than on the client’s site, this approach relieves the resources of the client terminal. Thus, the mobile agent approach seems particularly advantageous in the case of weak resource terminals such as PDAs.

  8. Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    Directory of Open Access Journals (Sweden)

    A. Velmurugan

    2006-01-01

    Full Text Available Internet-based Mobile Ad Hoc Networking (MANET is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in commercial applications for the next generation Internet users. A number of technical challenges are faced today due to the heterogeneous, dynamic nature of this hybrid MANET. A new hybrid routing scheme AODV_ALMA is proposed, which act simultaneously combining mobile agents to find path to the gateway to establish connection with Internet host and on-demand distance vector approach to find path in local MANET is one of the unique solution. An adaptive gateway discovery mechanism based on mobile agents making use of pheromone value, pheromone decay time and balance index is used to estimate the path and next hop to the gateway. The mobile nodes automatically configure the address using mobile agents first selecting the gateway and then using the gateway prefix address. The mobile agents are also used to track changes in topology enabling high network connectivity with reduced delay in packet transmission to Internet. The performance tradeoffs and limitations with existing solutions for various mobility conditions are evaluated using simulation."

  9. Fault Tolerance Mobile Agent System Using Witness Agent in 2-Dimensional Mesh Network

    Directory of Open Access Journals (Sweden)

    Ahmad Rostami

    2010-09-01

    Full Text Available Mobile agents are computer programs that act autonomously on behalf of a user or its owner and travel through a network of heterogeneous machines. Fault tolerance is important in their itinerary. In this paper, existent methods of fault tolerance in mobile agents are described which they are considered in linear network topology. In the methods three agents are used to fault tolerance by cooperating to each others for detecting and recovering server and agent failure. Three types of agents are: actual agent which performs programs for its owner, witness agent which monitors the actual agent and the witness agent after itself, probe which is sent for recovery the actual agent or the witness agent on the side of the witness agent. Communication mechanism in the methods is message passing between these agents. The methods are considered in linear network. We introduce our witness agent approach for fault tolerance mobile agent systems in Two Dimensional Mesh (2D-Mesh Network. Indeed Our approach minimizes Witness-Dependency in this network and then represents its algorithm.

  10. A Flexible and Reliable Architecture for Mobile Agent Security

    Directory of Open Access Journals (Sweden)

    Ghossoon M.W. Al-Saadoon

    2009-01-01

    Full Text Available Problem statement: Wireless application protocol is a protocol that makes it possible to surf the Internet from a cellular phone or other handheld wireless. Many of us that surf the Internet from home with a 56 kbps modem think that it is slow and a cell phone only uses 9.6 kbps so WAP has to take the lesser bandwidth into consideration. For this reason, this study proposed a flexible and reliable system to be implemented by using the characteristic of agents “mobile agent” through wireless application protocol for identification of distributed Intruder. The problem appears when the limitation of data transfer when the distributed systems are used (which includes the heterogeneous database through internet. For this reason the suggested approach will be the solution to the problem of WAP for mobile agent. Approach: The purpose of this study was to present the ability for dispatch mobile agent from a host to carry out operations directly to the remote point of interest, thus agent’s scans provide an appropriate response which is faster than a hierarchical IDS that communicates with a central coordinator based elsewhere on the network. Results: The methodology was used in order to understand the mobile agent mechanism and will introduce the distributed computing mechanisms that are intended for large scale distributed systems. Since the distributed security agent models system was built using mobile agent and net, this will develop small applications for data stores, like sequential query language server. The method used the algorithms built refer to each part of the structure and the rules that implemented (users and the security agent system roles. The result was simulating the intended for business roles for both commercial and government modules, which included the solution to the problem and to architecture to be more flexible and reliable. Conclusion/Recommendations: One of main conclusion for the mobile agent used WAP protocol: To make

  11. An Agent-Based Auction Protocol on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Yu-Fang Chung

    2014-01-01

    Full Text Available This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. The protocol consists of four participants, namely, registration manager, agent house, auction house, and bidder.

  12. Epidemic spreading induced by diversity of agents' mobility

    CERN Document Server

    Zhou, Jie; Chew, Lock Yue; Lai, Choy Heng

    2012-01-01

    In this paper, we study into the impact of the preference of an individual for public transport on the spread of infectious disease, through a quantity known as the public mobility. Our theoretical and numerical results based on a constructed model reveal that if the average public mobility of the agents is fixed, an increase in the diversity of the agents' public mobility reduces the epidemic threshold, beyond which an enhancement in the rate of infection is observed. Our findings provide an approach to improve the resistance of a society against infectious disease, while preserving the utilization rate of the public transportation system.

  13. QoS Negotiation and Renegotiation Based on Mobile Agents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shi-bing; ZHANG Deng-yin

    2006-01-01

    The Quality of Service (QoS) has received more and more attention since QoS becomes increasingly important in the Internet development. Mobile software agents represent a valid alternative to the implementation of strategies for the negotiation. In this paper, a QoS negotiation and renegotiation system architecture based on mobile agents is proposed. The agents perform the task in the whole process. Therefore, such a system can reduce the network load, overcome latency, and avoid frequent exchange information between clients and server. The simulation results show that the proposed system could improve the network resource utility about 10%.

  14. DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS

    Directory of Open Access Journals (Sweden)

    AHMED Y. YOUSUF

    2012-10-01

    Full Text Available There is a trade- off between the agent tracking process and the message delivery process in locating mobile agent systems. In the proposed system we try to strike a balance between these two processes. Communication in Multiagent system requires an efficient mechanism to manage these communications. Reliability and transparency are the design goal for any modern mechanism. In this paper we develop a new mechanism to manage the communication among autonomous mobile agents. This mechanism has the ability to manage agent mobility in an efficient, scalable and transparent way. So no message is lost and all transitions are transparent to the user. The architecture of the proposed mechanism is described and the naming, communication, localization and re-localization ways are given.

  15. Multi-agent cooperative intrusion response in mobile adhoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Zou Futai; Jiang Xinghao; Li Jianhua

    2007-01-01

    The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.

  16. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  17. A Secure Mobile Agent System against Tailgating Attacks

    Directory of Open Access Journals (Sweden)

    P. Marikkannu

    2011-01-01

    Full Text Available Problem statement: A lot of real time applications have extended their hands towards Mobile Agents to accomplish various tasks, due to its flexibility in its functionalities. Since Mobile Agent Systems are used in a distributed environment, it is obvious that they may be vulnerable to various security threats. Most of the security threats faced by the mobile agent systems are overcome by existing security algorithms and architectures. One of the major threats which are not of much focus in a mobile agent system is the Tailgating attack. Approach: In this study, mobile agent system architecture has been proposed to overcome Tailgating. The proposed architecture uses the mechanism of Dual Check-point to preclude Tailgating attacks. Also, to support the mechanism, we use fragmentation and defragmentation techniques. This assures a free flow of data within the system. Results: The results obtained prove that the system is much efficient in its operations as well is immune to Tailgating attacks. Conclusion: The security of the system is improved with the implementation of the Dual Check-point method.

  18. A Method for Interaction of Mobile Agent and SNMP

    Institute of Scientific and Technical Information of China (English)

    ZHANGPuhan; SUNYufang

    2003-01-01

    Typically, most of existing network man-agement applications are based on protocol SNMP(Simple network management protocol). The protocol is based on static, centralized and non-scalable client/server architec-tures, where some central entity processes large amounts of raw data gathered from each network element. By this reason, the management applications are not flexible, have problems of scalability and produce too much traffic in the network. Mobile agents have been proposed as a so-lution to the problems. However, most of proposed solu-tions often ignore the existing of legacy network manage-ment frameworks and have to change them. This paper presents a method to extend an existing legacy network management framework targeted at network management with an interface for integration with mobile agents and implemented it by using java technology and aglet which is a mobile agent system from IBM.

  19. A mobile agent approach for secure integrated medical information systems.

    Science.gov (United States)

    Liu, Chia-Hui; Chung, Yu-Fang; Chiang, Te-Wei; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-10-01

    Different patient-related information in medical organizations is the primary reference for medical personnel diagnosing, treating, and caring patients. With the rapid development of information technology, paper-based medical records have gradually been changed to electronic forms. However, different medical organizations present individual system specifications and data-saving formats so that the medical information of the same patient cannot be exchanged, shared, and securely accessed. In order not to largely change the present medical information systems as well as not to increase abundant costs, Virtual Integrated Medical-information Systems (VIMS) is proposed to assist various hospitals in information exchange. Furthermore, with Mobile Agent, the dispersed medical information can be securely integrated. It presents confidentiality, non-repudiation, source authentication, and integrity in network transmission. Virtual Integrated Medical-information Systems (VIMS) is a virtual electronic integration system combined with Mobile Agent technology. With the features of independence, adaptability, mobility, objectives, and autonomy, Mobile Agent is applied to overcome the problems from heterogeneous systems. With the features, the over-dispersed medical records can be integrated. Moreover, Mobile Agent can ensure the instantaneity and usability of medical records from which doctors can make the most appropriate evaluation and diagnoses. It will avoid the waste of medical resources, such as repetition medication, as well as become the reference of further consultation or health check. Not only can it improve the medical care quality, but it can be provided for medical research.

  20. The Geographic Information Grid System Based on Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    We analyze the deficiencies of current application systems, and discuss the key requirements of distributed Geographic Information service (GIS). We construct the distributed GIS on grid platform. Considering the flexibility and efficiency, we integrate the mobile agent technology into the system. We propose a new prototype system, the Geographic Information Grid System (GIGS) based on mobile agent. This system has flexible services and high performance, and improves the sharing of distributed resources. The service strategy of the system and the examples are also presented.

  1. Mobile Agents需求及体系结构%MOBILE AGENTS' REQUIREMENT AND ARCHITECTURE

    Institute of Scientific and Technical Information of China (English)

    何炎祥; 宋志凯; 李锋

    2000-01-01

    Mobile Agents 是分布系统的一种新体系结构和实现方法.Mobile Agents适用的应用有:网络管理、信息获取、远程设备控制、电子商务、移动计算等.本文主要从底层讨论了Mobile Agents的运行需求和体系结构.

  2. Emergence of metapopulations and echo chambers in mobile agents

    CERN Document Server

    Starnini, Michele; Baronchelli, Andrea

    2016-01-01

    Multi-agent models often describe populations segregated either in the physical space, i.e. subdivided in metapopulations, or in the ecology of opinions, i.e. partitioned in echo chambers. Here we show how the interplay between homophily and social influence controls the emergence of both kinds of segregation in a simple model of mobile agents, endowed with a continuous opinion variable. In the model, physical proximity determines a progressive convergence of opinions but differing opinions result in agents moving away from each others. This feedback between mobility and social dynamics determines to the onset of a stable dynamical metapopulation scenario where physically separated groups of like-minded individuals interact with each other through the exchange of agents. The further introduction of confirmation bias in social interactions, defined as the tendency of an individual to favor opinions that match his own, leads to the emergence of echo chambers where different opinions can coexist also within the ...

  3. Distributed formation stabilization for mobile agents using virtual tensegrity structures

    NARCIS (Netherlands)

    Yang, Qingkai; Cao, Ming; Fang, Hao; Chen, Jie

    2015-01-01

    This paper investigates the distributed formation control problem for a group of mobile Euler-Lagrange agents to achieve global stabilization by using virtual tensegrity structures. Firstly, a systematic approach to design tensegrity frameworks is elaborately explained to confine the interaction rel

  4. Interaction with autonomous, mobile agents in a hazard monitoring context

    NARCIS (Netherlands)

    Cramer, H.; Evers, V.; Winterboer, A.; Pavlin, G.; Maris, M.; Groen, F.; Olsen Jr., D.R.; Arthur, R.B.; Hinckley, K.; Ringel Morris, M.; Hudson, S.E.; Greenberg, S.

    2009-01-01

    This paper discusses our ongoing research on user interaction with autonomous mobile agents. The overarching project, DIADEM, involves the development of a (semi-)autonomous system that detects potential environmental hazards in heavily populated urban-industrial areas by using input from both a

  5. Mobile Agent-Based Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Victor C. M. Leung

    2007-01-01

    Full Text Available In the environments where the source nodes are close to one another and generate a lot of sensory data traffic with redundancy, transmitting all sensory data by individual nodes not only wastes the scarce wireless bandwidth, but also consumes a lot of battery energy. Instead of each source node sending sensory data to its sink for aggregation (the so-called client/server computing, Qi et al. in 2003 proposed a mobile agent (MA-based distributed sensor network (MADSN for collaborative signal and information processing, which considerably reduces the sensory data traffic and query latency as well. However, MADSN is based on the assumption that the operation of mobile agent is only carried out within one hop in a clustering-based architecture. This paper considers MA in multihop environments and adopts directed diffusion (DD to dispatch MA. The gradient in DD gives a hint to efficiently forward the MA among target sensors. The mobile agent paradigm in combination with the DD framework is dubbed mobile agent-based directed diffusion (MADD. With appropriate parameters set, extensive simulation shows that MADD exhibits better performance than original DD (in the client/server paradigm in terms of packet delivery ratio, energy consumption, and end-to-end delivery latency.

  6. Smart Agent Based Mobile Tutoring and Querying System

    Directory of Open Access Journals (Sweden)

    Suresh Sankaranarayanan

    2012-08-01

    Full Text Available With our busy schedules today and the rising cost of education there is a need to find a convenient and cost effective means of maximizing our educational/training experiences. New trends in the delivery/access of information are becoming more technology based in all areas of society with education being no exception. The ubiquitous use of mobile devices has led to a boom in m-commerce. Mobile devices provide many services in commercial environments such as mobile banking, mobile purchasing, mobile learning, etc. It is therefore fitting that we seek to use mobile devices as a platform in delivering our convenient and cost effective solution. The proposed agent based Mobile tutoring system seeks to provide a student with a rich learning experience that will provide them with the relevant reading material based on their stage of development which allows them to move at their own pace. The system will allow the user to be able to ask certain questions and get explanations as if they were interacting with a human tutor but with the added benefit of being able to do this anytime in any location via their mobile phone.

  7. High Efficiency and Light Mobile Electronic Business System Based on Mobile Agent Middleware

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yunyong; LIU Jinde

    2004-01-01

    Mobile Network technology has been being the research focus during the 1990's.The middleware technology is imported for the sake of running distributed transaction smoothly.In this paper,a mobile agent based middleware high efficiency mobile electronic business oriented middleware (HEMEBOM) is designed and implemented based on the requirement and background of collaborative electronic business.Its architecture,elements and excellent properties are mainly focused.Then high efficiency mobile electronic business systemμMcommerce is built using HEMEBOM.

  8. A Transport Model of Mobile Agent Based on Secure Hybrid Encryption

    Institute of Scientific and Technical Information of China (English)

    SUNZhixin; CHENZhixian; WANGRuchuan

    2005-01-01

    The solution of security problems of mobile agents is a key issue, which will decide whether mobile agents can be widely used. The paper analyzes main security problems, which currently are confronted with mobile agent systems and existing protection solutions. And then the paper presents a Security Transport model of mobile agents based on a hybrid encryption algorithm (TMSHE).Meanwhile, it expatiates on implementation of the algorithm. The algorithm of TMSHE model mainly consists of two parts, i.e., employing a hybrid encryption algorithm to encrypt mobile agents and using Transport layer security (TLS) to encrypt communication channel. Mobile agents by hybrid encryption move through communication channels, which are encrypted by TLS. The simulation results indicate that the model can protect mobile agents' security effectively, and consequently the security and steadiness of the whole mobile agent system are also improved. The model has succeeded in getting application in a prototypesystem- Intrusion detection system based on mobile agents.

  9. Mobile Agents for Service Personalization in Smart Environments

    Directory of Open Access Journals (Sweden)

    Iván Marsá-Maestre

    2008-05-01

    Full Text Available Service personalization is an important goal for any smart environment. Comfort systems may be adjusted in an automatic way when a given user is present, and multimedia devices may offer a music or movie catalog with favorite contents or may even pick one of them for the user. To achieve this goal, we propose a Service Oriented Architecture implementation based on multiagent systems. We specially take advantage of the mobility features of software agents. In particular, we have developed a hierarchical, agent-based solution intended to be applicable to different smart space scenarios, ranging from small environments, like smart homes or smart offices, to large smart spaces like cities. In this paper we describe the global architecture and focus on our approach to service personalization using mobile agents that follow the users as they move through different smart spaces.

  10. A Mobile Agent-Based Prototype of Heterogeneous Distributed Virtual Environment Systems

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Mobile agents provide a new method for the distributed computation. This paper presents the advantages of using mobile agents in a distributed virtual environment (DVE) sys tem, and describes the architecture of heterogeneous computer's distributed virtual environment system (HCNVES) designed to populate some mobile agents as well as stationary agents. Finally, the paper introduces how heterogeneous computer network communication is to be realized.

  11. Mobile Agents and Their Security Problems%Mobile Agent及其安全性问题

    Institute of Scientific and Technical Information of China (English)

    刘建勋; 李仁发; 张申生

    2000-01-01

    该文首先简单介绍了mobile agent的概念与mobile agent 所具有的一些优点,并介绍了mobile agent系统的应用领域及研究现状,然后详细分析了mobile agent系统的安全性问题,即(1)保护运行mobile agent的主机或实体不受恶意Agent的攻击;(2)保护mobile agent不受恶意的运行环境以及不协作的或者有敌意的其它Agent的攻击.并对已有的一些解决方案的思想作了分析介绍.

  12. Control of Synchronization Regimes in Networks of Mobile Interacting Agents

    Science.gov (United States)

    Perez-Diaz, Fernando; Zillmer, Ruediger; Groß, Roderich

    2017-05-01

    We investigate synchronization in a population of mobile pulse-coupled agents with a view towards implementations in swarm-robotics systems and mobile sensor networks. Previous theoretical approaches dealt with range and nearest-neighbor interactions. In the latter case, a synchronization-hindering regime for intermediate agent mobility is found. We investigate the robustness of this intermediate regime under practical scenarios. We show that synchronization in the intermediate regime can be predicted by means of a suitable metric of the phase response curve. Furthermore, we study more-realistic K -nearest-neighbor and cone-of-vision interactions, showing that it is possible to control the extent of the synchronization-hindering region by appropriately tuning the size of the neighborhood. To assess the effect of noise, we analyze the propagation of perturbations over the network and draw an analogy between the response in the hindering regime and stable chaos. Our findings reveal the conditions for the control of clock or activity synchronization of agents with intermediate mobility. In addition, the emergence of the intermediate regime is validated experimentally using a swarm of physical robots interacting with cone-of-vision interactions.

  13. Using Mobile Agents and Overlay Networks to Secure Electrical Networks

    Energy Technology Data Exchange (ETDEWEB)

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-02-11

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats.

  14. Using Mobile Agents and Overlay Networks to Secure Electrical Netoworks

    Energy Technology Data Exchange (ETDEWEB)

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-04-01

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats

  15. Swarm Dynamics of a Group of Mobile Autonomous Agents

    Institute of Scientific and Technical Information of China (English)

    LIU Bo; CHU Tian-Guang; WANG Long; WANG Zhan-Feng

    2005-01-01

    @@ We propose a simple swarm model to study collective behaviour ofa group of mobile autonomous agents interact ing through a long range attraction and short range repulsion function. It is shown that the individuals (agents) will aggregate and eventually form a cohesive cluster of finite size around the swarm centre in a finite time, and the size depends only on the parameters of the swarm model. Furthermore, it is also shown that all the individuals will converge to equilibrium positions of the swarm model, and thus the configuration of the swarm converges to a constant constellation. Numerical simulations are also worked out to illustrate the analytical results.

  16. Building Distributed Web GIS: A Mobile-Agent Based Approach

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The diversity of GISs and the wide-spread availability of WWWhave l e d to an increasing amount of research on integrating a variety of heterogeneous and autonomous GISs in a cooperative environment to construct a new generation o f GIS characterizing in open architecture, distributed computation, interoperabi lity, and extensibility. Our on-going research project MADGI S (Mobile Agent based Distributed Geographic Information System) is reported, in which we pro pose the architecture of MADGIS to meet the requirements of integrating distribu ted GIS applications under Internet environment. We first describe the architect ure of MADGIS, and detailed discussions focusing on the structure of client site , server site and mobile agent in MADGIS. Then we explore key techniques for MAD GIS implementation.

  17. Mobile Agent Based Framework for Integrating Digital Library System

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Few of the current approaches to achieve the integration of digital library system have considered the influence of network factors on quality of service for the integration system of digital libraries. For this reason, a mobile agent based framework for integrating digital library system is proposed. Based on this framework, a prototype system is implemented and the key technique for it are described. Compared with the current approaches, using mobile agent technique to achieve the integration of digital library system can not only avoid transmitting a lot of data on the network, lower the dependence on network bandwidth for the system, but also improve the quality of service for the integration system of digital libraries in intermitted or unreliable network connection settings.

  18. Applying Web Services with Mobile Agents for Computer Network Management

    Directory of Open Access Journals (Sweden)

    Mydhili K.Nair

    2011-03-01

    Full Text Available The exponential rise in complexity of the underlying network elements of a computer network makes itsManagement an intricate, multifaceted and complex problem to solve. With every passing decade, newtechnologies are developed to ease this problem of Network Management. The last decade of the premillenniumera saw the peak of CORBA and Mobile Agent Based implementations, while the first decadeof post millennium saw the emergence of Web Services. All of these technologies evolved as independent,self-contained implementation streams. There is a genuine dearth in finding authentic research outcomeswhere quantifiable, measureable benefits of convergence of these technologies applied to NetworkManagement are put forth. This paper aims to fill this research gap. Here we put forth the experimentalresults obtained of a framework we developed in-house for Network Management that combined twoseemingly divergent distributed computing technologies, namely, Web Services and Mobile Agents.

  19. The Study of Mobile Agent Technology%移动Agent技术研究

    Institute of Scientific and Technical Information of China (English)

    董红斌; 石纯一

    2000-01-01

    Mobile Agent is a new distributed computing model. This articte introduces the concepts,origin,behavior,development language,general structure of mobile agent,and attempts to present an account of current research efforts.

  20. Load Balancing on Open Networks: A Mobile Agent Approach

    Directory of Open Access Journals (Sweden)

    R. B. Patel

    2006-01-01

    Full Text Available In order to disperse the load on a Web server, generally the server cluster is configured to distribute access requests, or mirror servers are distributed geographically on different networks. Use of the Internet and the World-Wide-Web (WWW has become widespread in recent years and mobile agent technology has proliferated at an equally rapid rate to evenly distribute the requests to web servers through load balancing. There are various loads balancing policies came into picture. Primitive one is Message Passing Interface (MPI. Its wide availability and portability make it an attractive choice, however the communication requirements are sometimes inconventior and inefficient when implementing the primitives provided by MPI. Mobile agent (MA based approach have the merits of high flexibility, efficiency, low network traffic, less communication latency as well as highly asynchronous. In this study we present dynamic load balancing using mobile agent technology in which when a node is overloaded, task migrates to less utilized nodes so as to share the workload. However, the decision of which nodes receive migrating task is made in real-time by design and implementation of a framework called Platform for Load balancing (PLB. It is implemented on PMADE (A Platform for Mobile Agent Distribution and Execution. PLB integrated web servers can dispatch MAs to retrieve load information and accomplish load redistribution on all servers. The performance evaluation demonstrates that the PLB framework provides a foundation to develop efficient load balancing schemes on wide range of web server systems from cluster to open network and the results of a comparison of PLB, with some existing ones, is also reported.

  1. Emergence of metapopulations and echo chambers in mobile agents

    Science.gov (United States)

    Starnini, Michele; Frasca, Mattia; Baronchelli, Andrea

    2016-08-01

    Multi-agent models often describe populations segregated either in the physical space, i.e. subdivided in metapopulations, or in the ecology of opinions, i.e. partitioned in echo chambers. Here we show how both kinds of segregation can emerge from the interplay between homophily and social influence in a simple model of mobile agents endowed with a continuous opinion variable. In the model, physical proximity determines a progressive convergence of opinions but differing opinions result in agents moving away from each others. This feedback between mobility and social dynamics determines the onset of a stable dynamical metapopulation scenario where physically separated groups of like-minded individuals interact with each other through the exchange of agents. The further introduction of confirmation bias in social interactions, defined as the tendency of an individual to favor opinions that match his own, leads to the emergence of echo chambers where different opinions coexist also within the same group. We believe that the model may be of interest to researchers investigating the origin of segregation in the offline and online world.

  2. Employ a Mobile Agent for Making a Payment

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2008-01-01

    Full Text Available The mobile agent paradigm offers flexibility and autonomy to e-commerce applications. But it is challenging to employ a mobile agent to make a payment due to the security consideration. In this paper, we propose a new agent-assisted secure payment protocol, which is based on SET payment protocol and aims at enabling the dispatched consumer-agent to autonomously sign contracts and make the payment on behalf of the cardholder after having found the best merchant, without the possibility of disclosing any secret to any participant. This is realized by adopting the Signature-Share scheme, and employing a Trusted Third Party (TTP. In the proposed protocol, the principle that each participant knows what is strictly necessary for his/her role is followed as in SET. In addition, mechanisms have been devised for preventing and detecting double payment, overspending and overpayment attacks. Finally the security properties of the proposed protocol are studied analytically. In comparison with other existing models, the proposed protocol is more efficient and can detect more attacks.

  3. Percolation and cooperation with mobile agents: Geometric and strategy clusters

    CERN Document Server

    Vainstein, Mendeli H; Arenzon, Jeferson J

    2014-01-01

    We study the conditions for persistent cooperation in an off-lattice model of mobile agents playing the Prisoner's Dilemma game with pure, unconditional strategies. Each agent has an exclusion radius rP, which accounts for the population viscosity, and an interaction radius rint, which defines the instantaneous contact network for the game dynamics. We show that, differently from the rP=0 case, the model with finite-sized agents presents a coexistence phase with both cooperators and defectors, besides the two absorbing phases, in which either cooperators or defectors dominate. We provide, in addition, a geometric interpretation of the transitions between phases. In analogy with lattice models, the geometric percolation of the contact network (i.e., irrespective of the strategy) enhances cooperation. More importantly, we show that the percolation of defectors is an essential condition for their survival. Differently from compact clusters of cooperators, isolated groups of defectors will eventually become extin...

  4. A MOBILE AGENT BASED INTRUSION DETECTION SYSTEM ARCHITECTURE FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Binod Kumar Pattanayak

    2014-01-01

    Full Text Available Applications of Mobile Ad Hoc Networks (MANETs have become extensively popular over the years among the researchers. However, the dynamic nature of MANETs imposes a set of challenges to its efficient implementation in practice. One of such challenges represents intrusion detection and prevention procedures that are intended to provide secured performance of ad hoc applications. In this study, we introduce a mobile agent based intrusion detection and prevention architecture for a clustered MANET. Here, a mobile agent resides in each cluster of the ad hoc network and each cluster runs a specific application at any point of time. This application specific approach makes the network more robust to external intrusions directed at the nodes in an ad hoc network.

  5. New Framework for Improving Big Data Analysis Using Mobile Agent

    Directory of Open Access Journals (Sweden)

    Youssef M. ESSA

    2014-01-01

    Full Text Available the rising number of applications serving millions of users and dealing with terabytes of data need to a faster processing paradigms. Recently, there is growing enthusiasm for the notion of big data analysis. Big data analysis becomes a very important aspect for growth productivity, reliability and quality of services (QoS. Processing of big data using a powerful machine is not efficient solution. So, companies focused on using Hadoop software for big data analysis. This is because Hadoop designed to support parallel and distributed data processing. Hadoop provides a distributed file processing system that stores and processes a large scale of data. It enables a fault tolerant by replicating data on three or more machines to avoid data loss.Hadoop is based on client server model and used single master machine called NameNode. However, Hadoop has several drawbacks affecting on its performance and reliability against big data analysis. In this paper, a new framework is proposed to improve big data analysis and overcome specified drawbacks of Hadoop. These drawbacks are replication tasks, Centralized node and nodes failure. The proposed framework is called MapReduce Agent Mobility (MRAM. MRAM is developed by using mobile agent and MapReduce paradigm under Java Agent Development Framework (JADE.

  6. Research on Mobile Agent System Construction%移动Agent系统构建研究

    Institute of Scientific and Technical Information of China (English)

    贾志勇; 谢立

    2003-01-01

    Mobile agent technology has strong adaptability to the status of network and executing environment, and provides a flexible and uniform framework for Web and distributed applications.Mobile agent system, as the foundation of agent computing, should provide the basic supports like executing support, agent migration, andcommunication, as well the extensive supports like naming service, security, fault tolerance, interoperation,application development and management tools. Based on the analysis of current mobile agent system, this article discusses these supports deeply, and also points out the main challenges to the development of mobile agent system.

  7. Decentralized formation control of mobile agents: A unified framework

    Science.gov (United States)

    Chen, Fei; Chen, Zengqiang; Liu, Zhongxin; Xiang, Linying; Yuan, Zhuzhi

    2008-08-01

    This paper studies the formation control problem for systems consisting of multiple mobile agents that are described by first-order differential equations and second-order differential equations respectively. The following issues are investigated: bounded input, disturbance, and time delay. In derivation of the main results, a blend of graph-theoretic and system-theoretic tools is employed, where local potential functions and LaSalle’s Invariant Principle play central roles. Finally, numerical examples which support the analytical results very well are also included.

  8. Mobile intelligent agent entity model towards QoS guarantee

    Institute of Scientific and Technical Information of China (English)

    LI Jie; WANG Ru-chuan; BIAN Zhen-gai

    2006-01-01

    Implementing a flexible configuration of the QoS parameter in a distributed computing network has become a problem due to the weak scalability of current approaches.In an effort to solve this problem,an inner basic model of an intelligent agent (IA) is presented.The IA functionality was extended by introducing a primarily mobile agent.A QoS guarantee scheme was subsequently designed and implemented based on the model as well.By utilizing the proposed scheme,the IA can sense,predict and configure the data flow traffic.Since the communicating ability was considered and provided,the competition among different devices could be eliminated effectively and the global traffic can be optimized.The results of the simulations have shown that the proposed model can provide a QoS guarantee.

  9. An Experimental Approach for Optimising Mobile Agent Migrations

    CERN Document Server

    Gavalas, Damianos

    2010-01-01

    The field of mobile agent (MA) technology has been intensively researched during the past few years, resulting in the phenomenal proliferation of available MA platforms, all sharing several common design characteristics. Research projects have mainly focused on identifying applications where the employment of MAs is preferable compared to centralised or alternative distributed computing models. Very little work has been made on examining how MA platforms design can be optimised so as the network traffic and latency associated with MA transfers are minimised. The work presented in this paper addresses these issues by investigating the effect of several optimisation ideas applied on our MA platform prototype. Furthermore, we discuss the results of a set of timing experiments that offers a better understanding of the agent migration process and recommend new techniques for reducing MA transfers delay.

  10. Impact of mobility structure on the optimization of small-world networks of mobile agents

    CERN Document Server

    Lee, Eun

    2015-01-01

    In ad hoc wireless networking, units are connected to each other rather than to a central, fixed, infrastructure. Constructing and maintaining such networks create several trade-off problems between robustness, communication speed, power consumption, etc., that bridges engineering, computer science and the physics of complex systems. In this work, we address the role of mobility patterns of the agents on the optimal tuning of a small-world type network construction method. By this method, the network is updated periodically and held static between the updates. We investigate the optimal updating times for different scenarios of the movement of agents (modeling, for example, the fat-tailed trip distances, and periodicities, of human travel). We find that these mobility patterns affect the power consumption in non-trivial ways and discuss how these effects can best be handled.

  11. Impact of mobility structure on optimization of small-world networks of mobile agents

    Science.gov (United States)

    Lee, Eun; Holme, Petter

    2016-06-01

    In ad hoc wireless networking, units are connected to each other rather than to a central, fixed, infrastructure. Constructing and maintaining such networks create several trade-off problems between robustness, communication speed, power consumption, etc., that bridges engineering, computer science and the physics of complex systems. In this work, we address the role of mobility patterns of the agents on the optimal tuning of a small-world type network construction method. By this method, the network is updated periodically and held static between the updates. We investigate the optimal updating times for different scenarios of the movement of agents (modeling, for example, the fat-tailed trip distances, and periodicities, of human travel). We find that these mobility patterns affect the power consumption in non-trivial ways and discuss how these effects can best be handled.

  12. A Handoff Mechanism in VANET Using Mobile Agent

    Directory of Open Access Journals (Sweden)

    Anshu Garg

    2012-06-01

    Full Text Available Nowadays, everything is moving towards theinfrastructure less wireless environment to bring thesmartness of the society. In this situation, it isnecessary to bring the smart technologies in the adhocnetwork environment. As vehicular traffic is aforemost problem in modern cities and on highway.Huge amount of time and resources are wasted whiletraveling due to traffic congestion. VANET isproviding comfort and safety for passengers.Moreover, various transactions like information onaccident, roadcondition, petrol bank details, menu inthe restaurant, and discount sales can be provided tothe drivers and passengers. The speed and time inwhich the message is sent and received plays anessential part in the Intelligent Transport System(ITS. For this the VANET requires efficient andreliable methods for data communication, gatheringand retrieving information for seamless handoff inVANET. In this paper we discusses the architecture ofVANET consists clusters that’s designed by mobileagents having instantaneous conditions of MobileNodes available in VANET. For efficient datacommunication, an attempt has been made to create anew clustering concept with the help of mobile agentsamong the VANET nodes. Subsequently for smoothand seamless handoff we have considered the calladmission control mechanism with the help of Geneticalgorithms applied over information retrieval systemmanaged by mobile agent with the effect of shadowingfor reducing the data overhead over VANET.

  13. Cost-Effective Location Management for Mobile Agents on the Internet

    Directory of Open Access Journals (Sweden)

    Chien-Sheng Chen

    2015-01-01

    Full Text Available Many mobile agent system-related services and applications require interacting with a mobile agent by passing messages. However, an agent’s mobility raises several challenges in delivering messages to a mobile agent accurately. Consisting of tracking and message delivery phases, most mobile agent location management schemes create or receive many update messages and interaction messages to ensure the effectiveness of the schemes. In addition to downgrading the overall performance of a mobile agent location management scheme, excessive transmission of messages increases the network load. The migration locality of a mobile agent and the interaction rate between mobile agents significantly affect the performance of a mobile agent location management scheme with respect to location management cost. This work presents a novel Dual Home based Scheme (DHS that can lower the location management costs in terms of migration locality and interaction rate. While the DHS scheme uniquely adopts dual home location management architecture, a selective update strategy based on that architecture is also designed for cost-effective location management of mobile agents. Moreover, DHS is compared with available schemes based on formulations and simulation experiments from the perspective of location management costs. Simulation results demonstrate that the proposed DHS scheme performs satisfactorily in terms of migration locality and interaction rate.

  14. A Skeleton Based Programming Paradigm for Mobile Multi-Agents on Distributed Systems and Its Realization within the MAGDA Mobile Agents Platform

    Directory of Open Access Journals (Sweden)

    R. Aversa

    2008-01-01

    Full Text Available Parallel programming effort can be reduced by using high level constructs such as algorithmic skeletons. Within the MAGDA toolset, supporting programming and execution of mobile agent based distributed applications, we provide a skeleton-based parallel programming environment, based on specialization of Algorithmic Skeleton Java interfaces and classes. Their implementation include mobile agent features for execution on heterogeneous systems, such as clusters of WSs and PCs, and support reliability and dynamic workload balancing. The user can thus develop a parallel, mobile agent based application by simply specialising a given set of classes and methods and using a set of added functionalities.

  15. SECURING MOBILE ANT AGENT USING CHINESE REMAINDER THEOREM

    Directory of Open Access Journals (Sweden)

    Srinath Doss

    2013-01-01

    Full Text Available Recent days, research in wireless network becomes major area for the past few decades. In wireless routing many routing methods such as table driven, source driven; many characteristics such as reactive routing, proactive routing; many routing algorithms such as dijikstra’s shortest path, distributed bell-man ford algorithm are proposed in the literature. For effective wireless routing, the recent ant colony optimization proves better result than the existing methodologies. The ant colony optimization is a swarm intelligence technique which widely used for combinatorial optimization problems such as travelling salesman, network routing, clustering. The ant colony optimization is a real time routing protocol which offers highly reliable and optimal routing for both single path and multi path routing. As the ant is a small tiny mobile agent, providing security is critical issue. In this study, a secured ant colony optimization using Chinese remainder theorem is proposed.

  16. Simulation of Service Supply Chain Formation Based on Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    YANG Zhe; ZHANG Da-lu; XU Jian

    2005-01-01

    In E-Commerce, consumers and service suppliers can find the services through the searching of Mobile Agents (MA).The suppliers disassemble the service requests of consumers into the sub-requests. Then suppliers respond the subrequests cooperatively. Thus the Service Supply Chain(SSC) can be formed. But the existing bottom-up and upbottom supply chain formation fashions cannot be adapted to the SSC in distributed environment of E-Commerce. Task Dependency Network is exploited to illustrate the service relationship among consumers and suppliers. The formation of SSC with some simulations is elaborated. Then the influence on the formation of SSC caused by the type of service suppliers, the quantities of MA and its variety in number is elucidated.

  17. An Overview of Workflow Management on Mobile Agent Technology

    Directory of Open Access Journals (Sweden)

    Anup Patnaik

    2014-07-01

    Full Text Available Mobile agent workflow management/plugins is quite appropriate to handle control flows in open distributed system; basically it is the emerging technology which can bring the process oriented tasks to run as a single unit from diverse frameworks. This workflow technology offers organizations the opportunity to reshape business processes beyond the boundaries of their own organizations so that instead of static models, modern era incurring dynamic workflows which can respond the changes during its execution, provide necessary security measures, great degree of adaptivity, troubleshoot the running processes and recovery of lost states through fault tolerance. The prototype that we are planning to design makes sure to hold reliability, security, robustness, scalability without being forced to make tradeoffs the performance. This paper is concerned with design, implementation and evaluation of performance on the improved methods of proposed prototype models based on current research in this domain.

  18. 移动代理系统综述%A SURVEY OF MOBILE AGENT SYSTEM

    Institute of Scientific and Technical Information of China (English)

    朱淼良; 邱瑜

    2001-01-01

    Mobile agent technology is a new distributed computation paradigm. With its potential power, the technology aroused a great interest and experienced a rapid development in the last ten years. Various mobile agent systems were made for different targets and were implemented in different means. It is necessary to explore the current mobile agent systems and to summarize the implementation technologies for further research. In this paper a comprehensive explanation of mobile agent systems is given. First the definition and peculiarities of mobile agents and mobile agent systems are stated. Its advantages are enumerated. Then eight representative mobile agent systems are surveyed and the design issues about mobile agent programming language, mobility, communication, fault tolerance and security are discussed. Finally, the deficiencies and the trends of mobile agent technology are pointed out.%移动代理技术是新型的分布计算技术,具有很好的应用前景.移动代理系统是实现移动代理应用的基础框架.简述了移动代理(mobile agent)的定义和特点、移动代理系统(mobile agent system)的定义和基本内容、移动代理技术的优点和应用范围.着重讨论了8个有代表性的移动代理系统,就各自的体系结构和特色作出说明,并且综合分析了实现移动代理系统所需的技术和当前研究中存在的问题及可能的发展趋势.

  19. CACM: A New Coordination Model in Mobile Agent-Based Information Retrieval Applications

    Institute of Scientific and Technical Information of China (English)

    TANGXinhuai; ZHANGYaying; YAOYinxiong; YOUJinyuan

    2005-01-01

    In mobile agent systems, an application may be composed of several mobile agents that cooperatively perform a task. Multiple mobile agents need to communicate and interact with each other to accomplish their cooperative goal. Coordination model aims to provide solutions to interactions between concurrent activities, hiding the computing details and focusing on interaction between activities. A Context-aware coordination model (CACM), which combines mobility and coordination, is proposed for mobile agent applications, i.e. in mobile agent based information retrieval applications. The context-aware coordination model transfers interactions between agents from globally coupling interactions to locally uncoupling tuple space interactions. In addition, programmable tuple space is adopted to solve the problems of context-aware coordination introduced by mobility and data heterogeneity in mobile agent systems. Furthermore, environment specific and application specific coordination policy can be integrated into the programmable tuple space for customized requirements. Finally an application sample system-information retrieval in mobile agent applications is carried out to test the performance of the proposed model.

  20. Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce

    Institute of Scientific and Technical Information of China (English)

    MENG Xiangsong; HAN Fengwu

    2006-01-01

    The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI(public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA(certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.

  1. Mobile agent application and integration in electronic anamnesis system.

    Science.gov (United States)

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    Electronic anamnesis is to transform ordinary paper trails to digitally formatted health records, which include the patient's general information, health status, and follow-ups on chronic diseases. Its main purpose is to let the records could be stored for a longer period of time and could be shared easily across departments and hospitals. Which means hospital management could use less resource on maintaining ever-growing database and reduce redundancy, so less money would be spent for managing the health records. In the foreseeable future, building up a comprehensive and integrated medical information system is a must, because it is critical to hospital resource integration and quality improvement. If mobile agent technology is adopted in the electronic anamnesis system, it would help the hospitals to make the medical practices more efficiently and conveniently. Nonetheless, most of the hospitals today are still using paper-based health records to manage the medical information. The reason why the institutions continue using traditional practices to manage the records is because there is no well-trusted and reliable electronic anamnesis system existing and accepted by both institutions and patients. The threat of privacy invasion is one of the biggest concerns when the topic of electronic anamnesis is brought up, because the security threats drag us back from using such a system. So, the medical service quality is difficult to be improved substantially. In this case, we have come up a theory to remove such security threats and make electronic anamnesis more appealing for use. Our theory is to integrate the mobile agent technology with the backbone of electronic anamnesis to construct a hierarchical access control system to retrieve the corresponding information based upon the permission classes. The system would create a classification for permission among the users inside the medical institution. Under this framework, permission control center would distribute an

  2. Adaptive Remote-Sensing Techniques Implementing Swarms of Mobile Agents

    Energy Technology Data Exchange (ETDEWEB)

    Asher, R.B.; Cameron, S.M.; Loubriel, G.M.; Robinett, R.D.; Stantz, K.M.; Trahan, M.W.; Wagner, J.S.

    1998-11-25

    In many situations, stand-off remote-sensing and hazard-interdiction techniques over realistic operational areas are often impractical "and difficult to characterize. An alternative approach is to implement an adap- tively deployable array of sensitive agent-specific devices. Our group has been studying the collective be- havior of an autonomous, multi-agent system applied to chedbio detection and related emerging threat applications, The current physics-based models we are using coordinate a sensor array for mukivanate sig- nal optimization and coverage as re,alized by a swarm of robots or mobile vehicles. These intelligent control systems integrate'glob"ally operating decision-making systems and locally cooperative learning neural net- works to enhance re+-timp operational responses to dynarnical environments examples of which include obstacle avoidance, res~onding to prevailing wind patterns, and overcoming other natural obscurants or in- terferences. Collectively',tkensor nefirons with simple properties, interacting according to basic community rules, can accomplish complex interconnecting functions such as generalization, error correction, pattern recognition, sensor fusion, and localization. Neural nets provide a greater degree of robusmess and fault tolerance than conventional systems in that minor variations or imperfections do not impair performance. The robotic platforms would be equipped with sensor devices that perform opticaI detection of biologicais in combination with multivariate chemical analysis tools based on genetic and neural network algorithms, laser-diode LIDAR analysis, ultra-wideband short-pulsed transmitting and receiving antennas, thermal im- a:ing sensors, and optical Communication technology providing robust data throughput pathways. Mission scenarios under consideration include ground penetrating radar (GPR) for detection of underground struc- tures, airborne systems, and plume migration and mitigation. We will describe our

  3. Modeling Multi-Mobile Agents System Based on Coalition Signature Mechanism Using UML

    Institute of Scientific and Technical Information of China (English)

    SUNZhixin; HUANGHaiping; WANGRuchuan

    2004-01-01

    With the development of electronic commerce and agent techniques, multi-mobile agents cooperation can not only improve the efficiency of electronic business trade, but more importantly, it has a comprehensive applicative value in solving the security issues of mobile agent system. This paper firstly describes the mechanism of multi-mobile agents coalition signature aiming at the system security. Subsequently it brings forward a basic architecture of Multi-mobile agents system (MMAS) based on the design pattern of multi-mobile agents. The paper uses the diagrs_rn of UML, such as use case diagram, class diagram and sequence diagram to build the detailed model of the coalition signature and multi-mobile agents cooperation results. Through security analysis, we find that multimobile agents cooperation and interaction can solve some security problems of mobile agents in transfer, and also it can improve the efficiency of business trade. These results indicate that MMAS has a high security performance and can be widely used in E-commerce trade.

  4. Reliability of Mobile Agents for Reliable Service Discovery Protocol in MANET

    CERN Document Server

    Neogy, Roshni; Neogy, Sarmistha; 10.5121/ijwmn.2011.3518

    2011-01-01

    Recently mobile agents are used to discover services in mobile ad-hoc network (MANET) where agents travel through the network, collecting and sometimes spreading the dynamically changing service information. But it is important to investigate how reliable the agents are for this application as the dependability issues(reliability and availability) of MANET are highly affected by its dynamic nature.The complexity of underlying MANET makes it hard to obtain the route reliability of the mobile agent systems (MAS); instead we estimate it using Monte Carlo simulation. Thus an algorithm for estimating the task route reliability of MAS (deployed for discovering services) is proposed, that takes into account the effect of node mobility in MANET. That mobility pattern of the nodes affects the MAS performance is also shown by considering different mobility models. Multipath propagation effect of radio signal is considered to decide link existence. Transient link errors are also considered. Finally we propose a metric t...

  5. Research on Applications of Cryptography for Multi-Mobile Agent System

    Institute of Scientific and Technical Information of China (English)

    HUANG Hai-ping; WANG Ru-chuan; XU Xiao-long

    2004-01-01

    With the development of information network and agent technology, Multi-Mobile Agents' Cooperation can not only improve the computing efficiency, but also have a comprehensive applicative value in solving the security issues of mobile agent system. Aiming at the security and flexibility, this paper proposes a kind of basic architecture and the design pattern of Multi-Mobile Agent System (MMAS). Combined with cryptography, it builds the security mechanism on keys' distribution and management and Coalition Signature of MMAS. Through the analysis of security and validity, the introduction and application of cryptography can improve the performance of MMAS.

  6. Access Path Planning of Mobile Agent in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chaoyu Yang

    2014-02-01

    Full Text Available Adopting the two-stage optimization model and hybrid optimized algorithm based on evolutionary computation, a new two-stage optimization model that more conforms to the actual demand is proposed on the basis of formal description of Mobile Agent access path planning. This new model divides the access path planning problem into two sub problems of integer linear programming --data integration sub paths and return sub paths, which can reduce search space and improve the efficiency of algorithm. Then a hybrid optimized method named GAPSO, combined with GA (Genetic Algorithm and PSO (Particle Swarm Optimization, is advanced to solve this model, which integrates discrete PSO into the interlace operation of GA to avoid infeasible solution and improve search quality. Meanwhile convergence can be accelerated by optimizing the GA population with PSO in search of return sub paths. By means of virtual connected topology graph, the high-quality to-be-accessed candidate node set is acquired, the number of to-be-selected nodes is reduced,and the complexity of solution space is decreased, making planning algorithm performance not rely on network scale directly any more. Simulation results show that the advantages of the optimization model is obvious as the node number increases, and GASPO has a better performance than GA and BPSO in the same model

  7. MAST – A Mobile Agent-based Security Tool

    Directory of Open Access Journals (Sweden)

    Marco Carvalho

    2004-08-01

    Full Text Available One of the chief computer security problems is not the long list of viruses and other potential vulnerabilities, but the vast number of systems that continue to be easy prey, as their system administrators or owners simply are not able to keep up with all of the available patches, updates, or needed configuration changes in order to protect them from those known vulnerabilities. Even up-to-date systems could become vulnerable to attacks, due to inappropriate configuration or combined used of applications and services. Our mobile agent-based security tool (MAST is designed to bridge this gap, and provide automated methods to make sure that all of the systems in a specific domain or network are secured and up-to-date with all patches and updates. The tool is also designed to check systems for misconfigurations that make them vulnerable. Additionally, this user interface is presented in a domain knowledge model known as a Concept Map that provides a continuous learning experience for the system administrator.

  8. Epidemic spreading on dual-structure networks with mobile agents

    Science.gov (United States)

    Yao, Yiyang; Zhou, Yinzuo

    2017-02-01

    The rapid development of modern society continually transforms the social structure which leads to an increasingly distinct dual structure of higher population density in urban areas and lower density in rural areas. Such structure may induce distinctive spreading behavior of epidemics which does not happen in a single type structure. In this paper, we study the epidemic spreading of mobile agents on dual structure networks based on SIRS model. First, beyond the well known epidemic threshold for generic epidemic model that when the infection rate is below the threshold a pertinent infectious disease will die out, we find the other epidemic threshold which appears when the infection rate of a disease is relatively high. This feature of two thresholds for the SIRS model may lead to the elimination of infectious disease when social network has either high population density or low population density. Interestingly, however, we find that when a high density area is connected to a low density may cause persistent spreading of the infectious disease, even though the same disease will die out when it spreads in each single area. This phenomenon indicates the critical role of the connection between the two areas which could radically change the behavior of spreading dynamics. Our findings, therefore, provide new understanding of epidemiology pertinent to the characteristic modern social structure and have potential to develop controlling strategies accordingly.

  9. Mobile Agent Platform and Naming Scheme of Agents%移动代理平台及其代理命名方法

    Institute of Scientific and Technical Information of China (English)

    Sudin SHRESTHA; 徐拾义; Jagath RATNAYEKE

    2004-01-01

    Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as well as offering a new approach to human-computer-interaction. In mobile agent systems, the mobile agent travels autonomously from one computer to another within the agent enabled networks, executes itself in the agent execution environment, collects useful information and makes its own decision on behalf of its owner. This mobility nature of mobile agent demands its unique name in the whole network otherwise it gets lost or conflicts with other mobile agent having same name. This paper proposes a naming scheme which promises a unique name for a mobile agent within that network.

  10. Trust Level and Routing Selection for Mobile Agents in a Smart Home

    NARCIS (Netherlands)

    Nasution, Sandy; Hartel, Pieter; Suryana, Nanna; Azman, Nur; Shahib, Shahrin

    2010-01-01

    The central security concern for systems where agents roam is how to establish trust in the agent. We present a Fuzzy Logic mechanism to calculate a level of trust and an optimal route for a mobile agent system in a smart home. The mechanism consists of two parts. The first part calculates a trust l

  11. Trust Level and Routing Selection for Mobile Agents in a Smart Home

    NARCIS (Netherlands)

    Nasution, S.; Hartel, P.H.; Suryana, N.; Azman, N.; Shahib, S.

    2009-01-01

    The central security concern for systems where agents roam is how to establish trust in the agent. We present a Fuzzy Logic mechanism to calculate a level of trust and an optimal route for a mobile agent system in a smart home. The mechanism consists of two parts. The first part calculates a trust l

  12. Key Management and Authentication in Ad Hoc Network based on Mobile Agent

    Directory of Open Access Journals (Sweden)

    Yi Zhang

    2009-08-01

    Full Text Available Key management and authentication is important to security of Mobile Ad Hoc network (MANET. Based on the (t, n threshold cryptography, this paper introduced mobile agents to exchange private key and network topological information with nodes in the network. This method avoids a centralized certification authority to distribute the public keys and the certificates, thus enhances security. Carrying private key and some state variables, mobile agents navigate in the network according to visitsbalance policy, namely, node with the least visits would be first visited by mobile agent. Any t nodes in the network can cooperate to perform an authentication upon a new node wanting to join the network. Experimental results show that the mobile agent performs very well for improving the success ratio of authentication and enhance security while reducing the communication overhead and resource consumption.

  13. Adaptive Remote-Sensing Techniques Implementing Swarms of Mobile Agents

    Energy Technology Data Exchange (ETDEWEB)

    Cameron, S.M.; Loubriel, G.M.; Rbinett, R.D. III; Stantz, K.M.; Trahan, M.W.; Wagner, J.S.

    1999-04-01

    This paper focuses on our recent work at Sandia National Laboratories toward engineering a physics-based swarm of mobile vehicles for distributed sensing applications. Our goal is to coordinate a sensor array that optimizes sensor coverage and multivariate signal analysis by implementing artificial intelligence and evolutionary computational techniques. These intelligent control systems integrate both globally operating decision-making systems and locally cooperative information-sharing modes using genetically-trained neural networks. Once trained, neural networks have the ability to enhance real-time operational responses to dynamical environments, such as obstacle avoidance, responding to prevailing wind patterns, and overcoming other natural obscurants or interferences (jammers). The swarm realizes a collective set of sensor neurons with simple properties incorporating interactions based on basic community rules (potential fields) and complex interconnecting functions based on various neural network architectures, Therefore, the swarm is capable of redundant heterogeneous measurements which furnishes an additional degree of robustness and fault tolerance not afforded by conventional systems, while accomplishing such cognitive tasks as generalization, error correction, pattern recognition, and sensor fission. The robotic platforms could be equipped with specialized sensor devices including transmit/receive dipole antennas, chemical or biological sniffers in combination with recognition analysis tools, communication modulators, and laser diodes. Our group has been studying the collective behavior of an autonomous, multi-agent system applied to emerging threat applications. To accomplish such tasks, research in the fields of robotics, sensor technology, and swarms are being conducted within an integrated program. Mission scenarios under consideration include ground penetrating impulse radar (GPR) for detection of under-ground structures, airborne systems, and plume

  14. Computational Analysis of .NET Remoting and Mobile agent in Distributed Environment

    CERN Document Server

    Tiwari, Vivek; Tiwari, Renu; Kirar, Malam

    2010-01-01

    A mobile agent is a program that is not bound to the system on which it began execution, but rather travels amongst the hosts in the network with its code and current execution state (i.e. Distributed Environment).The implementation of distributed applications can be based on a multiplicity of technologies, e.g. plain sockets, Remote Procedure Call (RPC), Remote Method Invocation (RMI), Java Message Service (JMS), .NET Remoting, or Web Services. These technologies differ widely in complexity, interoperability, standardization, and ease of use. The Mobile Agent technology is emerging as an alternative to build a smart generation of highly distributed systems. In this work, we investigate the performance aspect of agent-based technologies for information retrieval. We present a comparative performance evaluation model of Mobile Agents versus .Net remoting by means of an analytical approach. A quantitative measurements are performed to compare .Net remoting and mobile agents using communication time, code size (...

  15. Integration of a mobile autonomous robot in a surveillance multi-agent system

    OpenAIRE

    Dias, Bruno Miguel Morais

    2014-01-01

    This dissertation aims to guarantee the integration of a mobile autonomous robot equipped with many sensors in a multi-agent distributed and georeferenced surveillance system. The integration of a mobile autonomous robot in this system leads to new features that will be available to clients of surveillance system may use. These features may be of two types: using the robot as an agent that will act in the environment or by using the robot as a mobile set of sensors. As an agent in the syst...

  16. Study of the Security in Network Management Based on Mobile Agents

    Institute of Scientific and Technical Information of China (English)

    CHEN Zhi; WANG Ru-chuan

    2004-01-01

    Security of mobile-agent based network management must be considered due to the widespread adoption of mobile agents in network management, which involves the protections of mobile agents, management station and managed devices. The integrated security model proposed in our paper incorporates the effective security countermeasures of these entities into a trusted execution environment and two security protection layers. Sandbox based on Java virtual machine and Java card independent on the network devices also with the cryptography technology in this model together protect the network management process.

  17. On the Migration Mechanism of Mobile Agent System%移动Agent系统的迁移机制研究

    Institute of Scientific and Technical Information of China (English)

    张冠群; 陶先平; 李新; 冯新宇; 吕建

    2001-01-01

    Mobility is inherent in Internet,traditional message passing,RPC,or Remote Evaluation,can not meet more and more various mobility requirements. Mobile Agent implements computation migration,including data,code and control,is a good way to suit Internet. Migration mechanism is the key technology of mobile Agent. We discuss it from the perspective of both system programmer and application programmer and introduce migration mechanisms of some famous Java based mobile Agent system.At last,present the structured migration mechanism of self-designed mobile Agent system Mogent.

  18. An Intelligent Mobile-Agent Based Scalable Network Management Architecture for Large-Scale Enterprise System

    CERN Document Server

    Sharma, A K; Singh, Vijay

    2012-01-01

    Several Mobile Agent based distributed network management models have been proposed in recent times to address the scalability and flexibility problems of centralized (SNMP or CMIP management models) models. Though the use of Mobile Agents to distribute and delegate management tasks comes handy in dealing with the previously stated issues, many of the agent-based management frameworks like initial flat bed models and static mid-level managers employing mobile agents models cannot efficiently meet the demands of current networks which are growing in size and complexity. Moreover, varied technologies, such as SONET, ATM, Ethernet, DWDM etc., present at different layers of the Access, Metro and Core (long haul) sections of the network, have contributed to the complexity in terms of their own framing and protocol structures. Thus, controlling and managing the traffic in these networks is a challenging task. This paper presents an intelligent scalable hierarchical agent based model for the management of large-scal...

  19. Secure Route Structures for Parallel Mobile Agents Based Systems Using Fast Binary Dispatch

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2005-01-01

    Full Text Available In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present a fast binary dispatch model and corresponding secure route structures for mobile agents dispatched in parallel to protect the dispatch routes of agents while ensuring the dispatch efficiency. The fast binary dispatch model is simple but efficient with a dispatch complexity of O(log2n. The secure route structures adopt the combination of public-key encryption and digital signature schemes and expose minimal route information to hosts. The nested structure can help detect attacks as early as possible. We evaluated the various models both analytically and empirically.

  20. Ion mobility spectrometry and its applications in detection of chemical warfare agents.

    Science.gov (United States)

    Mäkinen, Marko A; Anttalainen, Osmo A; Sillanpää, Mika E T

    2010-12-01

    When fast detection of chemical warfare agents in the field is required, the ion mobility spectrometer may be the only suitable option. This article provides an essential survey of the different ion mobility spectrometry detection technologies. (To listen to a podcast about this feature, please go to the Analytical Chemistry multimedia page at pubs.acs.org/page/ancham/audio/index.html.).

  1. Changes of lymphocyte kinetics in the normal rat, induced by the lymphocyte mobilizing agent polymethacrylic acid

    NARCIS (Netherlands)

    Ormai, S.; Hagenbeek, A.; Palkovits, M.; Bekkum, D.W. van

    1973-01-01

    The changes in lymphocyte kinetics induced by the lymphocyte mobilizing agent polymethacrylic acid (PMAA) were studied in the normal rat. Quantitative data are presented concerning the degree of lymphocyte mobilization in the spleen and in various lymph nodes at different times after PMAA administra

  2. An Agent Driven Human-centric Interface for Autonomous Mobile Robots

    Science.gov (United States)

    2003-01-01

    An Agent Driven Human-centric Interface for Autonomous Mobile Robots Donald Sofge, Dennis Perzanowski, Magdalena Bugajska, William Adams...Human-centric, Multimodal, Dynamic Autonomy, CoABS Grid, Mobile Robots 1. INTRODUCTION One of the challenges in implementing dynamically...autonomous behaviors in mobile robots is achieving a truly human-centric interface so that human operators can interact with the robots as naturally as they

  3. Domain-Partitioned Element Management Systems Employing Mobile Agents for Distributed Network Management

    Directory of Open Access Journals (Sweden)

    Anish Saini

    2014-06-01

    Full Text Available Network management systems based on mobile agents are efficiently a better alternative than typicalclient / server based architectures. Centralized management models like SNMP or CMIP based management models suffer from scalability and flexibility issues which are addressed to great extent by flat bed or static mid-level manager models based on mobile agents, yet the use of mobile agents to distribute and delegate management tasks for above stated agent-based management frameworks like initial flat bed models and static mid-level managers cannot efficiently meet the demands of current networks which are growing in size and complexity. In view of the above mentioned limitations, we proposed a domain partitioned network management model based-on mobile agent & Element Management Systems in order to minimize management data flow to a centralized server. Intelligent agent allocated to specific EMS performs local network management and reports the results to the superior manager and finally the global manager performs global network management using those submitted management results. Experimental results of various scenarios of the proposed model have been presented to support the arguments given in favor of the prototype system based on mobile agents..

  4. Stable Flocking Motion of Mobile Agents Following a Leader in Fixed and Switching Networks

    Institute of Scientific and Technical Information of China (English)

    Hui Yu; Yong-Ji Wang

    2006-01-01

    Multiple mobile agents with double integrator dynamics, following a leader to achieve a flocking motion formation, are studied in this paper. A class of local control laws for a group of mobile agents is proposed. From a theoretical proof, the following conclusions are reached: (i) agents globally align their velocity vectors with a leader, (ii) they converge their velocities to the leaders velocity, (iii) collisions among interconnected agents are avoided, and (iv) agent's artificial potential functions are minimized. We model the interaction and/or communication relationship between agents by algebraic graph theory. Stability analysis is achieved by using classical Lyapunov theory in a fixed network topology, and differential inclusions and nonsmooth analysis in a switching network topology respectively. Simulation examples are provided.

  5. Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent

    Directory of Open Access Journals (Sweden)

    Chintan Bhatt

    2011-10-01

    Full Text Available This paper is a survey of the work, done for making an IDS fault tolerant.Architecture of IDS that usesmobile Agent provides higher scalability. Mobile Agent uses Platform for detecting Intrusions using filterAgent, co-relater agent, Interpreter agent and rule database. When server (IDS Monitor goes down,other hosts based on priority takes Ownership. This architecture uses decentralized collection andanalysis for identifying Intrusion. Rule sets are fed based on user-behaviour or applicationbehaviour.This paper suggests that intrusion detection system (IDS must be fault tolerant; otherwise, theintruder may first subvert the IDS then attack the target system at will.

  6. A Mobile Agent-based Web Page Constructing Framework MiPage

    Science.gov (United States)

    Fukuta, Naoki; Ozono, Tadachika; Shintani, Toramatsu

    In this paper, we present a programming framework, `MiPage', for realizing intelligent WWW applications based on the mobile agent technology. On the framework, an agent is programmed by using hyper text markup language and logic programming language. To realize the framework, we designed a new logic programming environment `MiLog', and an agent program compiler `MiPage Compiler'. The framework enables us to enhance both richness of the services and manageability of the application.

  7. Research on Mobile Agent Security%移动Agent安全性研究

    Institute of Scientific and Technical Information of China (English)

    董春冻; 王聪; 周星; 李戈

    2013-01-01

    Mobile Agent technology is a distributed network-computing mode,it combines the characteristic of Agent with the idea of mobile and solves the problem of task assigning and cooperation between network. It makes the use of network technology more and more extensive. But at the same time,the security problems of mobile Agent become more and more important. On the basis of simply introdu-cing mobile Agent technology,analyze its security requirements,and emphasize on security problems of mobile Agent and security policy of mobile Agent,give the solution for mobile Agent security.%移动Agent技术是一种分布式的网络计算模式,它将Agent的特点和移动的思想相结合,很好地解决了网络间任务分配与合作问题,使得一些网络技术的应用越来越广泛。但与此同时,移动Agent安全性问题的重要性也显得更为突出。文中在简要介绍移动Agent技术的基础上,分析了移动Agent的安全需求,重点讨论了移动Agent在安全性方面的问题,并给出了针对移动Agent安全问题的解决方法。

  8. Multi-agent Optimal Control of Ball Balancing on a Mobile

    Directory of Open Access Journals (Sweden)

    Adel Akbarimajd

    2015-12-01

    Full Text Available Multi-agent systems have origin in computer engineering however, they have found applications in different field. One of the newly emerged problems in multi-agent systems is multi-agent control. In multi-agent control it is desired that the control is done in distributed manner. That is the controller of each agent should be implemented based on local feedback. In this a mechanism is introuded as a test bed for multi-agent control systems. The introduced mechanism is balancing of a ball on link located on a planar mobile robot. Dynamic equations of the mechanism is derived and the control task is distributed among two agents. For each agent a two loop controller designed wherein external loop is a LQR controller and inner loop is a simple proportional controller. Regulation and fault tolerance performance of controller scheme is evaluated by simulations.

  9. Cooperative mobile agents search using beehive partitioned structure and Tabu Random search algorithm

    Science.gov (United States)

    Ramazani, Saba; Jackson, Delvin L.; Selmic, Rastko R.

    2013-05-01

    In search and surveillance operations, deploying a team of mobile agents provides a robust solution that has multiple advantages over using a single agent in efficiency and minimizing exploration time. This paper addresses the challenge of identifying a target in a given environment when using a team of mobile agents by proposing a novel method of mapping and movement of agent teams in a cooperative manner. The approach consists of two parts. First, the region is partitioned into a hexagonal beehive structure in order to provide equidistant movements in every direction and to allow for more natural and flexible environment mapping. Additionally, in search environments that are partitioned into hexagons, mobile agents have an efficient travel path while performing searches due to this partitioning approach. Second, we use a team of mobile agents that move in a cooperative manner and utilize the Tabu Random algorithm to search for the target. Due to the ever-increasing use of robotics and Unmanned Aerial Vehicle (UAV) platforms, the field of cooperative multi-agent search has developed many applications recently that would benefit from the use of the approach presented in this work, including: search and rescue operations, surveillance, data collection, and border patrol. In this paper, the increased efficiency of the Tabu Random Search algorithm method in combination with hexagonal partitioning is simulated, analyzed, and advantages of this approach are presented and discussed.

  10. Mobile Agents: A Distributed Voice-Commanded Sensory and Robotic System for Surface EVA Assistance

    Science.gov (United States)

    Clancey, William J.; Sierhuis, Maarten; Alena, Rick; Crawford, Sekou; Dowding, John; Graham, Jeff; Kaskiris, Charis; Tyree, Kim S.; vanHoof, Ronnie

    2003-01-01

    A model-based, distributed architecture integrates diverse components in a system designed for lunar and planetary surface operations: spacesuit biosensors, cameras, GPS, and a robotic assistant. The system transmits data and assists communication between the extra-vehicular activity (EVA) astronauts, the crew in a local habitat, and a remote mission support team. Software processes ("agents"), implemented in a system called Brahms, run on multiple, mobile platforms, including the spacesuit backpacks, all-terrain vehicles, and robot. These "mobile agents" interpret and transform available data to help people and robotic systems coordinate their actions to make operations more safe and efficient. Different types of agents relate platforms to each other ("proxy agents"), devices to software ("comm agents"), and people to the system ("personal agents"). A state-of-the-art spoken dialogue interface enables people to communicate with their personal agents, supporting a speech-driven navigation and scheduling tool, field observation record, and rover command system. An important aspect of the engineering methodology involves first simulating the entire hardware and software system in Brahms, and then configuring the agents into a runtime system. Design of mobile agent functionality has been based on ethnographic observation of scientists working in Mars analog settings in the High Canadian Arctic on Devon Island and the southeast Utah desert. The Mobile Agents system is developed iteratively in the context of use, with people doing authentic work. This paper provides a brief introduction to the architecture and emphasizes the method of empirical requirements analysis, through which observation, modeling, design, and testing are integrated in simulated EVA operations.

  11. Embeded Mobile Database Based on Mobile Agent%基于Mobile Agent的嵌入式移动数据库

    Institute of Scientific and Technical Information of China (English)

    王乐; 杨永福

    2009-01-01

    With the development of mobile computing technology, Mobile Database is moving towards the application gradually,and disphying its superiority in Embedded Operating System.There are so many characteristics in Mobile Environment, such as mobility,frequent breaking receiver,low bandwidth,limited battery power and so on,which determined there must be some differences between Computing Environment of Mobile Database and Distributed Database and put forward a number of new requirements to the Mobile Database. This article introduces the Development Status of embedded Mobile Database,analyses characteristics of Mobile Database and its architecture and introduces the technology of Agent and the application of Mobile Agent in Mobile Database.%随着移动计算技术的发展,移动数据库逐步走向应用,在嵌入式操作系统中移动数据库更显示出其优越性.移动环境中所具有移动性、频繁断接收、低带宽、电池电量有限性等特性,决定了移动数据库中计算环境不同于分布式数据库,给移动数据库研究提出了许多新的要求.该文从分析移动数据库特点、体系结构;介绍移动数据库系统中一些关键性技术;Agent技术及移动Agent在移动数据库中的应用.

  12. Control of the mobile robot based on the Mobile-C mobile agent%基于Mobile-C移动代理的移动机器人的控制

    Institute of Scientific and Technical Information of China (English)

    张楠; 葛为民

    2011-01-01

    本文提出一种使用Mobile-C移动代理控制移动机器人的方法,详细介绍了Mobile-C的结构和报文格式,以及与Ch结合的优势.机器人通过Mobile-C移动代理的控制,可以在运行中动态地切换成新的算法,来处理意料之外的情况.文章最后用一个分布式应用的实验说明了Mobile-C移动代理控制机器人的方法.%This article presents a method of controlling mobile robot using the Mobile-C mobile agent, details of the Mobile-Cs structure and message format, and the advantages of combined with Ch. By the control of Mobile-C mobile agent, the ro-bot can dynamically switch to the new algorithm at runtime to deal with unexpected situations. At last, the distributed appli-cation experiment illustrates the Mobile-C mobile agent approach to control the robot.

  13. Investigation of oil recovery improvement by coupling an interfacial tension agent and a mobility control agent in light oil reservoirs. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Pitts, M.

    1995-12-01

    This research studied the oil recovery potential of flooding light oil reservoirs by combining interfacial tension reducing agent(s) with a mobility control agent. The specific objectives were: To define the mechanisms and limitations of co-injecting interfacial tension reduction agent(s) and a mobility control agent to recover incremental oil. Specifically, the study focused on the fluid-fluid and fluid-rock interactions. To evaluate the economics of the combination technology and investigate methods to make the process more profitable. Specific areas of study were to evaluate different chemical concentration tapers and the volume of chemical injection required to give optimal oil recovery.

  14. Disinfection of biological agents in the field using a mobile ...

    Science.gov (United States)

    Report The Army’s Net Zero Initiative is an energy-conservation program that focuses on energy as well as water and waste usage procedures. All Net Zero projects are geared toward helping the military installation or community become more sustainable and resilient, with an emphasis on taking a systems approach. Net Zero projects must advance the state of the science and are focused on three general topic areas: water, energy, and waste, and the nexuses among them. This project examined the inactivation and/or removal of biological contaminants in dirty wash water using a portable ozone-UV AOP process. The strain of E. coli used in these experiments is not a biological warfare agent, but acts as a surrogate for certain of the vegetative biological agents such as the enterohemorrhagic strain designated E. coli 0157:H7.

  15. Control of group of mobile autonomous agents via local strategies

    Institute of Scientific and Technical Information of China (English)

    Lixin GAO; Daizhan CHENG; Yiguang HONG

    2008-01-01

    This paper considers the formation control problem of multi-agent systems in a distributed fashion.Two cases of the information propagating topologies among multiple agents,characterized by graphics model,are considered.One is fixed topology.The other is switching topology which represents the limited and less reliable information exchange.The local formation control strategies established in this paper are based on a simple modification of the existing consensus control strategies.Moreover,some existing convergence conditions ale shown to be a special case of our model even in the continuous-time consensus case.Therefore.the results of this paper extend the existing results about the consensus problem.

  16. Searching dynamic agents with a team of mobile robots.

    Science.gov (United States)

    Juliá, Miguel; Gil, Arturo; Reinoso, Oscar

    2012-01-01

    This paper presents a new algorithm that allows a team of robots to cooperatively search for a set of moving targets. An estimation of the areas of the environment that are more likely to hold a target agent is obtained using a grid-based Bayesian filter. The robot sensor readings and the maximum speed of the moving targets are used in order to update the grid. This representation is used in a search algorithm that commands the robots to those areas that are more likely to present target agents. This algorithm splits the environment in a tree of connected regions using dynamic programming. This tree is used in order to decide the destination for each robot in a coordinated manner. The algorithm has been successfully tested in known and unknown environments showing the validity of the approach.

  17. Searching Dynamic Agents with a Team of Mobile Robots

    Directory of Open Access Journals (Sweden)

    Miguel Juliá

    2012-06-01

    Full Text Available This paper presents a new algorithm that allows a team of robots to cooperatively search for a set of moving targets. An estimation of the areas of the environment that are more likely to hold a target agent is obtained using a grid-based Bayesian filter. The robot sensor readings and the maximum speed of the moving targets are used in order to update the grid. This representation is used in a search algorithm that commands the robots to those areas that are more likely to present target agents. This algorithm splits the environment in a tree of connected regions using dynamic programming. This tree is used in order to decide the destination for each robot in a coordinated manner. The algorithm has been successfully tested in known and unknown environments showing the validity of the approach.

  18. An Anonymous Payment Protocol with Mobile Agents in Hostile Environments

    Institute of Scientific and Technical Information of China (English)

    LIU Yi; XIANG Ming-sen; WANG Yu-min

    2005-01-01

    By using Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features:protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.

  19. Mobile Agent-Based Software Systems Modeling Approaches: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Aissam Belghiat

    2016-06-01

    Full Text Available Mobile agent-based applications are special type of software systems which take the advantages of mobile agents in order to provide a new beneficial paradigm to solve multiple complex problems in several fields and areas such as network management, e-commerce, e-learning, etc. Likewise, we notice lack of real applications based on this paradigm and lack of serious evaluations of their modeling approaches. Hence, this paper provides a comparative study of modeling approaches of mobile agent-based software systems. The objective is to give the reader an overview and a thorough understanding of the work that has been done and where the gaps in the research are.

  20. A mobile-agent based wireless sensing network for structural monitoring applications

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Stuart G [Los Alamos National Laboratory; Farinholt, Kevin M [Los Alamos National Laboratory; Figueiredo, Eloi [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory; Farrar, Charles R [Los Alamos National Laboratory; Flynn, Eric B [UCSD; Mascarenas, David L [UCSD; Todd, Michael D [UCSD

    2008-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field.

  1. Research and Application of Mobile Agents Based CORBA%基于CORBA的移动Agent研究及其应用

    Institute of Scientific and Technical Information of China (English)

    王建国; 李增智

    2000-01-01

    Current CORBA and Mobile Agents are two new technologies. They have own characteristics and shortcoming or the difference of implementation. This article analyzes their compensatory relation each other,and tries integrating them to construct tile architecture for network management with mobile agents based CORBA. At the same time,this paper expatiates how mobile agents work in the architecture,and summarizes the new characteristics brought with by this combinative technology.

  2. Mobile agent-enabled framework for structuring and building distributed systems on the internet

    Institute of Scientific and Technical Information of China (English)

    CAO Jiannong; ZHOU Jingyang; ZHU Weiwei; LI Xuhui

    2006-01-01

    Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of processing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual exclusion in our previous work. In this paper, we use the framework to propose a novel approach to detecting deadlocks in distributed system by using mobile agents, which demonstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detection strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy.

  3. Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network

    CERN Document Server

    Kumar, Rakesh

    2011-01-01

    Vehicular traffic is a foremost problem in modern cities. Huge amount of time and resources are wasted while traveling due to traffic congestion. With the introduction of sophisticated traffic management systems, such as those incorporating dynamic traffic assignments, more stringent demands are being placed upon the available real time traffic data. In this paper we have proposed mobile agent as a mechanism to handle the traffic problem on road. Mobile software agents can be used to provide the better QoS (Quality of Service) in vehicular ad hoc network to improve the safety application and driver comfort.

  4. An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response

    Science.gov (United States)

    Hein, Daniel M.; Toegl, Ronald

    Modern communication and computing devices have the potential to increase the efficiency of disaster response. Mobile agents are a decentralized and flexible technology to leverage this potential. While mobile agent platforms suffer from a greater variety of security risks than the classic client-server approach, Trusted Computing is capable of alleviating these problems. Unfortunately, Remote Attestation, a core concept of Trusted Computing, requires a powerful networked entity to perform trust decisions. The existence and availability of such a service in a disaster response scenario cannot be relied upon.

  5. Instance-oriented delegation: A solution for providing security to Grid-based mobile agent middleware

    Institute of Scientific and Technical Information of China (English)

    MA Tian-chi; LI Shan-ping

    2005-01-01

    New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid environment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an encapsulation of one set of authorizations and their validity specifications with respect to the agent's specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit's security support for mobile agent applications.

  6. A Multi-Agent Emotion Generating System for Mobile Robots System

    Science.gov (United States)

    Nair, Shivashankar B.; Kim, Dong Hwa

    Emotions are a complex phenomenon and are in constant research for so long. Emotions can be presupposed as a dynamic association of cells on elicitation. The use of agents for emotions generation and emotion modeling are on the rise in the recent years. In this work, we propose a dynamic emotion generation system based on multiple agents. A Multi-Agent System (MAS) to generate emotions targeted towards a mobile robot has been implemented. The agent-robot communication is still being investigated. An illustration of the use of this emotion generation module is explained in the context of the emotion system. Some ancillary investigations performed in using mobile robots for localization and terrain mapping have also been described.

  7. Secure Mobile Agent for Telemedicine Based on P2P Networks

    OpenAIRE

    Hsu, Wen-Shin; Pan, Jiann-I

    2013-01-01

    Exploring intelligent mobile agent (MA) technology for assisting medical services or transmitting personal patient-health information in telemedicine applications has been widely investigated. Conversely, peer-to-peer (P2P) networking has become one of the most popular applications used in the Internet because of its benefits for easy-to-manage resources and because it balances workloads. Therefore, constructing an agent-based telemedicine platform based on P2P networking architecture is nece...

  8. Research and Design of Network Management Construction Based on Mobile AGENT

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construc- tion based on agent (NMCA) is then proposed. The NMCA structure features are elaborated in detail. A prototype design of NMCA is given by using the jKQML programming. The establishment of NMCA platform will be helpful to reduce the correspondence load of network management and improves the efficiency and the expansion ability of network management systems.

  9. Auto-agent: a behavior-based architecture for mobile navigation

    Science.gov (United States)

    Hwang, Kaoshing; Ju, Ming-Yi

    1998-10-01

    The design and construction of mobile robots is as much art as a science. In hardware architecture, researchers tend to construct a low-cost and reliable platform which equips with various sensory system for sensing the change of the environment to offer useful information to the navigation system. An autonomous navigation system plays a role in an mobile robot as the brain in human being. It generates action command according to those sensory data from the perception system to direct the mobile robot to go to desired positions or accomplish useful tasks without human intervention in real-world. An important problem in autonomous navigation is the need to cope with the large amount of uncertainty that is inherent of natural environment. Therefore the development of techniques for autonomous navigation in real-world environments constitutes one of the major trends in the current research on robotics. Inspired with the concept of software agents, reactive control and behavior-based control, a modular architecture, called Auto-agent, for mobile navigation is proposed. The main characteristic of Auto-agent is as following: Behavioral agents cooperate by means of communicating with other behavioral agents intermittently to achieve their local goal and the goals of the community as a whole because no one individually has sufficient competence, resources and information to solve the entire problem. Auto-agent gains advantages from the characteristics of distributed system, it offers the possibility to find an acceptable solution with a reasonable time and complexity range. Besides, the modular structure is convenient for an engineer to construct a new behavioral agent and to add it into Auto-agent.

  10. Flocking Control of Multiple Mobile Agents with the Rules of Avoiding Collision

    Directory of Open Access Journals (Sweden)

    Hongtao Zhou

    2015-01-01

    Full Text Available This paper investigates the flocking and the coordinative control problems of multiple mobile agents with the rules of avoiding collision. We propose a set of control laws using hysteresis in adding new links and applying new potential function to guarantee that the fragmentation of the network can be avoided, under which all agents approach a common velocity vector, and asymptotically converge to a fixed value of interagent distances and collisions between agents can be avoided throughout the motion. Furthermore, we extend the flocking algorithm to solve the flocking situation of the group with a virtual leader agent. The laws can make all agents asymptotically approach the virtual leader and collisions can be avoided between agents in the motion evolution. Finally, some numerical simulations are showed to illustrate the theoretical results.

  11. Formation Control of Mobile Agents with Second-order Nonlinear Dynamics in Unknown Environments Containing Obstacles

    NARCIS (Netherlands)

    Huang, Jie; Cao, Ming; Zhou, Ning

    2016-01-01

    This paper investigates the formation control problem of multiple mobile agents with second-order nonlinear dynamics in complex environments containing multiple obstacles. By employing the null-space-based behavioral (NSB) control architecture, a novel fast terminal sliding mode based adaptive contr

  12. A Context-Aware Self-Adaptive Fractal Based Generalized Pedagogical Agent Framework for Mobile Learning

    Science.gov (United States)

    Boulehouache, Soufiane; Maamri, Ramdane; Sahnoun, Zaidi

    2015-01-01

    The Pedagogical Agents (PAs) for Mobile Learning (m-learning) must be able not only to adapt the teaching to the learner knowledge level and profile but also to ensure the pedagogical efficiency within unpredictable changing runtime contexts. Therefore, to deal with this issue, this paper proposes a Context-aware Self-Adaptive Fractal Component…

  13. Quantization effects on synchronized motion of teams of mobile agents with second-order dynamics

    NARCIS (Netherlands)

    Liu, Hui; Cao, Ming; De Persis, Claudio

    2012-01-01

    For a team of mobile agents governed by second-order dynamics, this paper studies how different quantizers affect the performances of consensus-type schemes to achieve synchronized collective motion. It is shown that when different types of quantizers are used for the exchange of relative position a

  14. Cryptanalysis of the One- Time Proxy Signature Scheme Used in Mobile Agents

    Institute of Scientific and Technical Information of China (English)

    FU Xiao-tong; XIAO Hong; XIAO Guo-zhen

    2005-01-01

    We cryptanalyze Kim et al ' s one-time proxy signature scheme used in mobile agents, and then a successful forgery is introduced. It is showed that a dishonest customer can successfully forge a valid one-time proxy signature by impersonating the server. Furthermore, he can request the server with responsibility for the forged bidding information.

  15. An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. M. Reshmi

    2006-01-01

    Full Text Available Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based mobile wireless ad hoc network environment. The model comprises of a set of static and mobile agents, which are used to detect intrusions, respond to intrusions, and distribute selected and aggregated intrusion information to all other nodes in the network in an intelligent manner. The model is simulated to test its operation effectiveness by considering the performance parameters such as, detection rate, false positives, agent overheads, and intrusion information distribution time. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, flexibility, and customization.

  16. 'Do you smell rotten eggs?' Evaluating interactions with mobile agents in crisis response situations

    NARCIS (Netherlands)

    A. Winterboer; H.S.M. Cramer; G. Pavlin; F.C.A. Groen; V. Evers

    2009-01-01

    In this paper, we present ongoing research concerning the interaction between users and autonomous mobile agents in the environmental monitoring domain. The overarching project, DIADEM, deals with developing a system that detects potentially hazardous situations in populated industrial areas using i

  17. MAPPS: A Framework of Peer-to-Peer Systems Based on JXTA and Mobile Agents

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Due to the success of Napster, Gnutella and Freenet, peer to peer (P2P) computing has suddenly emerged at the forefront of Internet computing. And a lot of problems including security, reliability and rooting are urgent to be solved.Unfortunately, traditional techniques are not directly applicable to P2P systems. This paper presents a new framework called MAPPS for designing P2P applications based on JXTA and mobile agents. The MAPPS framework is structured as three layers:the MAPPS infiastmcture based on mobile agents, MAPPS services and MAPPS applications. In this way, MAPPS not only follows the ootstanding architecture of JXTA, but also enhances the mobility and flexibility of P2P systems. Using MAPPS,developers of new P2P systems can design and implement P2P systems more efficiently.

  18. Sub-head Transmission of Heterogeneous Data by Cloned Agent to Android Mobile

    Directory of Open Access Journals (Sweden)

    S. Karthikeyan

    2014-07-01

    Full Text Available The occurrence of an event can be detected using sensor nodes. The eminent constraint of these sensor nodes is the non-replenishing battery. Conservation of energy is an important aspect due to its limited battery power. Energy utilization using cloned mobile agents is the ultimate aim in this proposed work. The network is divided into clusters and 2 subheads are elected from each cluster. The event occurred is sensed by a sensor and is transmitted to the subhead. The cloned mobile agent collects data from the subhead and transmits it to the sink. The gathered data from sink is then transferred to android mobile. The advantages of this mechanism are less delay and reduced energy consumption. When the energy of existing subhead is reduced to half of its initial energy, new subhead is selected. Thus energy utilization is minimized and overall lifetime of network is increased.

  19. Multiple Servers - Queue Model for Agent Based Technology in Cache Consistence Maintenance of Mobile Environment

    Directory of Open Access Journals (Sweden)

    G.Shanmugarathinam

    2013-01-01

    Full Text Available Caching is one of the important techniques in mobile computing. In caching, frequently accessed data is stored in mobile clients to avoid network traffic and improve the performance in mobile computing. In a mobile computing environment, the number of mobile users increases and requests the server for any updation, but most of the time the server is busy and the client has to wait for a long time. The cache consistency maintenance is difficult for both client and the server. This paper is proposes a technique using a queuing system consisting of one or more servers that provide services of some sort to arrive mobile hosts using agent based technology. This services mechanism of a queuing system is specified by the number of servers each server having its own queue, Agent based technology will maintain the cache consistency between the client and the server .This model saves wireless bandwidth, reduces network traffic and reduces the workload on the server. The simulation result was analyzed with previous technique and the proposed model shows significantly better performance than the earlier approach.

  20. AN INTELLIGENT MOBILE-AGENT BASED SCALABLE NETWORK MANAGEMENT ARCHITECTURE FOR LARGE-SCALE ENTERPRISE SYSTEM

    Directory of Open Access Journals (Sweden)

    A.K. Sharma

    2012-02-01

    Full Text Available Several Mobile Agent based distributed network management models have been proposed in recent times toaddress the scalability and flexibility problems of centralized (SNMP or CMIP management modelsmodels. Though the use of Mobile Agents to distribute and delegate management tasks comes handy indealing with the previously stated issues, many of the agent-based management frameworks like initial flatbed models and static mid-level managers employing mobile agents models cannot efficiently meet thedemands of current networks which are growing in size and complexity. Moreover, varied technologies,such as SONET, ATM, Ethernet, DWDM etc., present at different layers of the Access, Metro and Core(long haul sections of the network, have contributed to the complexity in terms of their own framing andprotocol structures. Thus, controlling and managing the traffic in these networks is a challenging task. Thispaper presents an intelligent scalable hierarchical agent based model for the management of large-scalecomplex networks to address aforesaid issues. The cost estimation, carried out with a view to compute theoverall management cost in terms of management data overhead, is being presented. The results obtainedthereafter establish the usefulness of the presented architecture as compare to centralized and flat bedagent based models.

  1. Performance Analysis of a Highly Available Home Agent in Mobile Networks

    Directory of Open Access Journals (Sweden)

    Abdelgadir T. Abdelgadir

    2011-01-01

    Full Text Available Problem statement: Network Mobility as a service is provided by the NEMO protocol in IPv6 environments. NEMO is an extension to MIPv6 and thus inherits the same reliability problems of MIPv6. MIPv6 is not reliable because the Home Agent (HA is a single point of failure. In order to provide real-time services for MIPv6 networks, reliability should be considered as part of any high availability solution used to deploy Mobile IPv6 networks. Approach: Many approaches have been taken to solve the problem of HA as a single point of failure. In our proposed solution, failure detection and recovery is handled by the home agent. Therefore, recovery is transparent to the mobile network. Results: In this study we opted for using HA redundancy to provide a highly available home agent solution which achieves recovery times suitable for real-time applications. Conclusion: The results show that achieving high availability in IPv6 based mobile networks which support NEMO is possible.

  2. RESEARCH ON SECURITY PROTOCOL FOR COLLABORATING MOBILE AGENTS IN NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Olumide Simeon Ogunnusi

    2013-01-01

    Full Text Available Despite the popularity of mobile agents in academic and commercial arena, the security issues associated with them have hindered their adoption on large scale distributed applications. However, researchers are making relentless effort to overcome the security impediments so that the interesting properties inherent in mobile agent application, especially in the field of intrusion detection, can be harnessed. Such properties include: adaptability, autonomous nature, low bandwidth utilization, latency eradication, mobility and intelligence. A number of protocols have been developed by researchers for different key distribution techniques to enhance their performance and to protect communicating entities against malicious attacks that can hinder their activities. However, they do not take into account the availability and fault tolerance of the protocols in case of any possible attack despite the authentication methods offered by encryption. This study therefore, proposes a fault-tolerant key distribution protocol for distributed mobile agents (communicating entities in network intrusion detection system to facilitate hitch-free collaboration geared towards intrusive packets detection in Wireless Local Area Network (WLAN.

  3. Agent based User Interface Design for Mobile Cloud Computing Environment (AUID

    Directory of Open Access Journals (Sweden)

    A. Viswanatha Reddy

    2012-06-01

    Full Text Available Mobility is the need of the hour and the Mobile Clouds are becoming popular and are able to meet the needs of the current day customers. Cloud computing being the state of art technology enables the individuals, entrepreneurs, small and medium companies to carry on their personal and business activities at all levels, without any interruption. Provisioning and offering an exactly matching service to the highly demanding customer has been a night mare and will continue to be the same in the mobile environment. In this paper, we propose an Interactive Multi Agent based User Interface that interacts with the end user on one side and with the mobile network cloud on the other side and offers an optimal solution so as to balance the interests of both the parties. Here the Mobile Agent Manager with its simple architecture and interactive capability, understands, analyzes and organizes the services being offered by the cloud to achieve customer satisfaction always and every time and on demand to meet explicit needs

  4. Electrophoretic mobilities of dissolved polyelectrolyte charging agent and suspended non-colloidal titanium during electrophoretic deposition

    Energy Technology Data Exchange (ETDEWEB)

    Lau, Kok-Tee [School of Materials Science and Engineering, University of New South Wales, Sydney, NSW 2052 (Australia); Faculty of Manufacturing Engineering, Universiti Teknikal Malaysia Melaka, 76109 Durian Tunggal, Melaka (Malaysia); Sorrell, C.C., E-mail: C.Sorrell@unsw.edu.au [School of Materials Science and Engineering, University of New South Wales, Sydney, NSW 2052 (Australia)

    2011-03-25

    Coarse ({<=}20 {mu}m) titanium particles were deposited on low-carbon steel substrates by cathodic electrophoretic deposition (EPD) with ethanol as suspension medium and poly(diallyldimethylammonium chloride) (PDADMAC) as polymeric charging agent. Preliminary data on the electrophoretic mobilities and electrical conductivities on the suspensions of these soft particles as well as the solutions themselves as a function of PDADMAC level were used as the basis for the investigation of the EPD parameters in terms of the deposition yield as a function of five experimental parameters: (a) PDADMAC addition level, (b) solids loading, (c) deposition time, (d) applied voltage, and (e) electrode separation. These data were supported by particle sizing by laser diffraction and deposit surface morphology by scanning electron microscopy (SEM). The preceding data demonstrated that Ti particles of {approx}1-12 {mu}m size, electrosterically modified by the PDADMAC charging agent, acted effectively as colloidal particles during EPD. Owing to the non-colloidal nature of the particles and the stabilization of the Ti particles by electrosteric forces, the relevance of the zeta potential is questionable, so the more fundamental parameter of electrophoretic mobility was used. A key finding from the present work is the importance of assessing the electrophoretic mobilities of both the suspensions and solutions since the latter, which normally is overlooked, plays a critical role in the ability to interpret the results meaningfully. Further, algebraic uncoupling of these data plus determination of the deposit yield as a function of charging agent addition allow discrimination between the three main mechanistic stages of the electrokinetics of the process, which are: (1) surface saturation; (2) compression of the diffuse layer, growth of polymer-rich layer, and/or competition between the mobility of Ti and PDADMAC; and (3) little or no decrease in electrophoretic mobility of Ti

  5. A Solution Model to Protect Mobile Agents Against Malicious Host Attack

    Institute of Scientific and Technical Information of China (English)

    迈克尔; 徐良贤

    2003-01-01

    Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non-hardware component and is intended to prevent most attacks performed by malicioushosts, by providing mechanisms that ensure attack detection and provide integrity to mobile agents. This nobletechnique involves encapsulating partial results obtained on each intermediate host and binding these results togeth-er using a hash function, thus forming a strong bonded chain that cannot be compromised. An analytical model toexplore the system performance was also developed.

  6. Establishing Efficient C2C E-alliance Based on Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    YU Xiao-bing; GUO Shun-sheng; GUO Jun

    2010-01-01

    In order to alleviate difficulties of conducting consumer-to-consumer(C2C)e-commerce transaction,establishing efficient e-alliance was proposed.E-alliance is the union of e-commerce sites.It is constructed by mobile agents.The mobile agent architecture was discussed.The process of selecting suitable e-commerce site to e-alliance was presented based on support vector machine(SVM)and fuzzy method.A prototype of the proposed system is implemented on a web platform.To enable data exchange between e-alliance and e-commerce,the system employs XML as data format.The prototype has demonstrated that the efficient C2C e-alliance is reasonable.

  7. Study of the Improvement on Network Management Performance with Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    LI Jie; WANG Ru-chuan

    2003-01-01

    Owing to the increasing great complexity, computer network systems require more sophisticated management strategies to be adopted so as to guarantee adequate levels of performance. The classic centralized paradigm, adopted by SNMP, which was once appropriate in the prevenient phrase, has posed problems with the explosive expansion of networks, as well as other centralized models. Mobile Agent (MA), owing to its capability of implementing a distributed system, represents a challenging approach to provide network management with high performance. In this paper we analyze the network management structure model based on MA at first, and then we put forward a reference scenario based on MA and compare it with the traditional model. We also describe a prototype implementation based on our mobile agent system named MAS. Finally, we do some experiments to verify the performance of our framework prototype.

  8. Enhancement of QoS in Mobile Network through Channel Allocation using Software Agents

    Directory of Open Access Journals (Sweden)

    Nitin Muchhal

    2011-05-01

    Full Text Available In the last two decades the demand for mobile hosts is increasing rapidly. One of the biggest challenges in cellular systems is to fulfill the mobile user demand under the constraint of the limited spectrum. Some of the most common methods to increase the channel allocation and utilization are resource allocation schemes. Various channel allocation schemes have been proposed to provide Quality of Service (QoS and efficient channel utilization in cellular networks. This paper proposes architecture of Multi-agent system consisting of software agents to implement distributed dynamic channel allocation strategy. The strategy is based on the channel reassignment within the cell boundary and chained channel borrowing in neighboring cell areas. The QoS parameters analyzed are Call dropping probability and Call blocking probability.

  9. Secure mobile agent for telemedicine based on P2P networks.

    Science.gov (United States)

    Hsu, Wen-Shin; Pan, Jiann-I

    2013-06-01

    Exploring intelligent mobile agent (MA) technology for assisting medical services or transmitting personal patient-health information in telemedicine applications has been widely investigated. Conversely, peer-to-peer (P2P) networking has become one of the most popular applications used in the Internet because of its benefits for easy-to-manage resources and because it balances workloads. Therefore, constructing an agent-based telemedicine platform based on P2P networking architecture is necessary. The main purpose of this paper is to construct a safe agent-based telemedicine that based on P2P networking architecture. Two themes are addressed in this paper: (a) the P2P network architecture for an agent-based telemedicine service, and (b) the security mechanisms for the proposed telemedicine networking architecture. When an MA contains patient information and migrates from one host to another through the Internet, it can be attacked by other software agents or agent platforms that can illegally access patient information. The proposed P2P network architecture is based on the JXTA protocol and provides two types of telemedicine service models: the predictable service model and unpredictable service model. This architecture employs a two-layer safety mechanism for MAs (i.e., time-limited black boxes and RSA undetachable signature technologies), to provide a secure solution for agent-based telemedicine services.

  10. 移动Agent互操作性研究%The Research of the Interoperability of Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    张云勇; 刘锦德

    2001-01-01

    Mobile Agent has taken a very momentous influence on some fields such as collaborative system and workflow management system because of its unique technical advantages. Until today,a large number of mobile Agent platforms have been developed but it is very difficult to collaborate those different Agent systems since the difference among their design structure and the technology which they take. Solving the interoperability of mobile Agent becomes the primary task. In this paper, the specification of MASIF is studied in detail,a clue of solving the interoperability is put forward and an addon for the interoperability of mobile Agent system called MASIF addon is developed by ourselves based on the specification.

  11. Computational Research on Mobile Pastoralism Using Agent-Based Modeling and Satellite Imagery.

    Directory of Open Access Journals (Sweden)

    Takuto Sakamoto

    Full Text Available Dryland pastoralism has long attracted considerable attention from researchers in diverse fields. However, rigorous formal study is made difficult by the high level of mobility of pastoralists as well as by the sizable spatio-temporal variability of their environment. This article presents a new computational approach for studying mobile pastoralism that overcomes these issues. Combining multi-temporal satellite images and agent-based modeling allows a comprehensive examination of pastoral resource access over a realistic dryland landscape with unpredictable ecological dynamics. The article demonstrates the analytical potential of this approach through its application to mobile pastoralism in northeast Nigeria. Employing more than 100 satellite images of the area, extensive simulations are conducted under a wide array of circumstances, including different land-use constraints. The simulation results reveal complex dependencies of pastoral resource access on these circumstances along with persistent patterns of seasonal land use observed at the macro level.

  12. Mobile-Agent的空洞避免路由算法%Hole Avoiding Routing Algorithm with Mobile-Agent

    Institute of Scientific and Technical Information of China (English)

    杨云; 顾沈君; 徐文春; 田浩澄; 韩龙生

    2012-01-01

    为了解决空洞恢复路由算法在能耗、路由开销及可扩展性等方面的问题,提出了使用移动代理(mobileagent,MA)进行网间处理来避免“路由空洞”的算法(hole avoiding routing algorithm with mobile-agent,HAMA).HAMA将网络中的节点分为“空洞相关节点”或“空洞无关节点”,通过采用MA方式,对“空洞相关节点”进行路由处理,为其找到一个最优下一跳节点,最终成功建立到Sink节点的路由,从而达到避免“路由空洞”的目的.HAMA使节点提前意识到“路由空洞”的存在,尽可能绕开路由空洞,从而降低网络能耗,均衡网络负载.与经典空洞路由算法GPSR(greedy perimeter stateless routing)相比,HAMA能够成功避免“路由空洞”,即使遇到“空洞相关节点”,也能较为成功地启用各种恢复机制绕过空洞,具有低成本、高性能的特点.%To solve problems such as energy consumption, routing efficiency and scalability in routing recovery algorithms, this paper proposes a hole avoiding routing algorithm with mobile-agent (HAMA). For the purpose of avoiding routing hole, HAMA divides the routing nodes into "hole relevant nodes" or "hole irrelevant nodes", deals with hole relevant nodes by routing algorithm with mobile-agent to find their optimal next node, and finally sets up a routing path to the Sink. The HAMA nodes are aware of the existence of "routing hole" in advance as much as possible to bypass the routing hole. The proposed algorithm is superior to other hole avoiding algorithms in reducing energy consumption and balancing network load. Compared with classic hole routing algorithm GPSR (greedy perimeter stateless routing), HAMA with low cost and high performance characteristics, can avoid hole successfully, and even has recovery mechanism when encountering hole relevant node.

  13. A mobile-agent-based approach to software coordination inthe HOOPE system

    Institute of Scientific and Technical Information of China (English)

    马晓星; 吕建; 陶先平; 李英军; 胡昊

    2002-01-01

    Software coordination is central to the construction of large-scale high-performance distributed applications with software services scattered over the decentralized Internet. In this paper, a new mobile-agent-based architecture is proposed for the utilization and coordination of geographically distributed computing resources. Under this architecture, a user application is built with a set of software agents that can travel across the network autonomously. These agents utilize the distributed resources and coordinate with each other to complete their task. This approach's advantages include the natural expression and flexible deployment of the coordination logic, the dynamic adaptation to the network environment and the potential of better application performance. This coordination architecture, together with an object-oriented hierarchical parallel application framework and a graphical application construction tool, is implemented in the HOOPE environment, which provides a systematic support for the development and execution of Internet-based distributed and parallel applications in the petroleum exploration industry.

  14. Behaviour Study of a Multi-Agent Mobile Robot System during Potential Field Building

    Directory of Open Access Journals (Sweden)

    István Nagy

    2009-12-01

    Full Text Available In this paper a multi-agent based mobile robot simulation system will bepresented where the behaviour of the system is studied with different number of agents (1,3,6 and also with different number of ultrasonic range sensors on agents (8 or 16 USsensors on individual agents. The task of the autonomous agents is to create the potentialfield (PF of an unknown environment. The classic problems of PF building, like oscillationand trapping, are not the focus of the article, but instead, the article is concerned with theagents’ self-organizing ability where self-organizing is controlled by a genetic algorithm(GA. The GA is equipped with two fitness functions where one “maintains” the distancesbetween certain agents (spat distr, while another “watches” the area coverage (areacover. In fact, the paper can be divided into three main parts. The first part describes theultrasonic sensing and range measuring with systematic errors, the potential field (PFbuilding and the moving strategies. The second part contains description of the GA, theoperation of the GA, the structure of the system, the fitness functions and a general systemerrordetermination. In the final third part, the obtained results are analyzed and presentedin the appendices.

  15. Designing a meta-level architecture in Java for adaptive parallelism by mobile software agents

    Science.gov (United States)

    Dominic, Stephen Victor

    Adaptive parallelism refers to a parallel computation that runs on a pool of processors that may join or withdraw from a running computation. In this dissertation, a functional system of agents and agent behaviors for adaptive parallelism is developed. Software agents have the properties of robustness and have capacity for fault-tolerance. Adaptation and fault-tolerance emerge from the interaction of self-directed autonomous software agents for a parallel computation application. The multi-agent system can be considered an object-oriented system with a higher-level architectural component, i.e., a meta level for agent behavior. The meta-level object architecture is based on patterns of behavior and communication for mobile agents, which are developed to support cooperative problem solving in a distributed-heterogeneous computing environment. Although parallel processing is a suggested application domain for mobile agents implemented in the Java language, the development of robust agent behaviors implemented in an efficient manner is an active research area. Performance characteristics for three versions of a pattern recognition problem are used to demonstrate a linear speed-up with efficiency that is compared to research using a traditional client-server protocol in the C language. The best ideas from existing approaches to adaptive parallelism are used to create a single general-purpose paradigm that overcomes problems associated with nodefailure, the use of a single-centralized or shared resource, requirements for clients to actively join a computation, and a variety of other limitations that are associated with existing systems. The multi-agent system, and experiments, show how adaptation and parallelism can be exploited by a meta-architecture for a distributed-scientific application that is of particular interest to design of signal-processing ground stations. To a large extent the framework separates concern for algorithmic design from concern for where and

  16. Emergence of a snake-like structure in mobile distributed agents: an exploratory agent-based modeling approach.

    Science.gov (United States)

    Niazi, Muaz A

    2014-01-01

    The body structure of snakes is composed of numerous natural components thereby making it resilient, flexible, adaptive, and dynamic. In contrast, current computer animations as well as physical implementations of snake-like autonomous structures are typically designed to use either a single or a relatively smaller number of components. As a result, not only these artificial structures are constrained by the dimensions of the constituent components but often also require relatively more computationally intensive algorithms to model and animate. Still, these animations often lack life-like resilience and adaptation. This paper presents a solution to the problem of modeling snake-like structures by proposing an agent-based, self-organizing algorithm resulting in an emergent and surprisingly resilient dynamic structure involving a minimal of interagent communication. Extensive simulation experiments demonstrate the effectiveness as well as resilience of the proposed approach. The ideas originating from the proposed algorithm can not only be used for developing self-organizing animations but can also have practical applications such as in the form of complex, autonomous, evolvable robots with self-organizing, mobile components with minimal individual computational capabilities. The work also demonstrates the utility of exploratory agent-based modeling (EABM) in the engineering of artificial life-like complex adaptive systems.

  17. 基于Mobile-C移动代理的函数库封装与应用%Encapsulation and apply of the function library based on the Mobile-C mobile agent

    Institute of Scientific and Technical Information of China (English)

    李闯; 葛为民; 王肖峰

    2012-01-01

    本文基于Mobile-C移动代理控制移动机器人,简述了Mobile-C与Ch的优势,详细介绍了Mobile-C移动代理函数库的原理机制与封装调用.移动机器人通过Mobile-C移动代理来实现控制,可以在运行中动态地切换成新的算法,函数库的使用使得代理传送的代码量大大减少,减少网络延时,同时使程序的结构简单明了,为复杂控制的实现做好基础.文章最后用一个简单的实验验证了Mobile-C移动代理函数库封装的正确性.%This paper, based on the control of mobile robot by the Mobile-C mobile agent, introduces the advantages of mobile agent combined with Cb, details the mechanism and encapsulation of the Mobile-C function library. By the control of Mobile-C mobile agent, robots can dynamically switch to the new algorithm at runtime. The function library makes the agent transfer code decrease greatly, reduce the network time delay, at the same time makes program structure simple and clear, it does a good job in basic for the realization of complex control. At last, a simple experiment verifies the correctness of the Mobile-C mobile agent function library encapsulation.

  18. Migration Mechanism for the Mobile Agent Based on .Net%.NET环境下的移动代理迁移机制

    Institute of Scientific and Technical Information of China (English)

    王丹; 于戈; 王国仁

    2003-01-01

    The migration mechanism is one of the most important techniques for the mobile agent techniques. In this paper, migration mechanism for the mobile agent based on Microsoft .NET developing environment is researched. First, the two serialized techniques provided by .NET platform are analyzed and compared,and Binary serialization techniques are adopted to implement the data state migration of the mobile agent. Then, the Web serviceapproach is introduced to realize the code state migration of the mobile agent and the corresponding Web service is constructed. At last, the whole migration process of the mobile agent is described.

  19. An Agent Location Transparent Communication Method in Mobile Agent System%可移动agent系统位置透明通信的一种实现

    Institute of Scientific and Technical Information of China (English)

    王红; 林守勋; 曾广周

    2001-01-01

    在可移动的软件Agent(Mobile Software Agent,MSA)的应用中, Agent并不是孤立地完成计算任务,它们需要不断地与其它agent进行信息交换,而agent的位置又是经常变动的.文中提出了一种实现agent位置透明通信的方法,主要解决agent位置追踪问题和agent迁移时的消息处理问题.%Mobile Software Agent (MSA) is a new computing model that is more suitable for current distributed computing environment. In a MSA system, an agent is not isolate in accomplishing computing tasks. It needs to exchange some information with other agents continuously. But the location of an agent is often changed, so two problems have to be solved. First is the Agent Location Tracking, that is how to inform the current location of an agent to other agents when it migrates. Second is the message storage and transfer, that is how to handle the information that is sent to an agent when it is in the procedure of migration. This paper presents a Location Transparent Agent Communication method by using the AgentTracer and the AgentShadow. The AgentTracer is a mapping of each agent ID and its current location. When an agent is created, it gets an AgentShadow which mainly records the agent ID and the address of the AgentTracer to which it belongs. By using the AgentTracer and the AgentShadow, an agent can be traced all through its lifetime. In this paper we first describe the structure of the AgentTracer and the AgentShadow, then we present the procedure of message storage and transfer by using the AgentProxy. It has been realized in a MSA system based on Java.

  20. A mobile multi-agent information system for ubiquitous fetal monitoring.

    Science.gov (United States)

    Su, Chuan-Jun; Chu, Ta-Wei

    2014-01-02

    Electronic fetal monitoring (EFM) systems integrate many previously separate clinical activities related to fetal monitoring. Promoting the use of ubiquitous fetal monitoring services with real time status assessments requires a robust information platform equipped with an automatic diagnosis engine. This paper presents the design and development of a mobile multi-agent platform-based open information systems (IMAIS) with an automated diagnosis engine to support intensive and distributed ubiquitous fetal monitoring. The automatic diagnosis engine that we developed is capable of analyzing data in both traditional paper-based and digital formats. Issues related to interoperability, scalability, and openness in heterogeneous e-health environments are addressed through the adoption of a FIPA2000 standard compliant agent development platform-the Java Agent Development Environment (JADE). Integrating the IMAIS with light-weight, portable fetal monitor devices allows for continuous long-term monitoring without interfering with a patient's everyday activities and without restricting her mobility. The system architecture can be also applied to vast monitoring scenarios such as elder care and vital sign monitoring.

  1. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  2. Improve information retrieval and e-learning using mobile agent based on semantic web technology

    Directory of Open Access Journals (Sweden)

    Maged Elazony

    2015-07-01

    Full Text Available The Web-based education and E-Learning has become a very important branch of new educational technology. E-learning and Web-based courses offer advantages for learners by making access to resources and learning objects very fast, just-in-time and relevance, at any time or place. Web based Learning Management Systems should focus on how to satisfy the e-learners needs and it may advise a learner with most suitable resources and learning objects. But Because of many limitations using web 2.0 for creating E-learning management system, now-a-days we use Web 3.0 which is known as Semantic web. It is a platform to represent E-learning management system that recovers the limitations of Web 2.0.In this paper we present “improve information retrieval and e-learning using mobile agent based on semantic web technology”. This paper focuses on design and implementation of knowledge-based industrial reusable, interactive, web-based training activities at the sea ports and logistics sector and use e-learning system and semantic web to deliver the learning objects to learners in an interactive, adaptive and flexible manner. We use semantic web and mobile agent to improve Library and courses Search. The architecture presented in this paper is considered an adaptation model that converts from syntactic search to semantic search. We apply the training at Damietta port in Egypt as a real-world case study. we present one of possible applications of mobile agent technology based on semantic web to management of Web Services, this model improve the information retrieval and E-learning system.

  3. Research of Network Security Situational Assessment Quantization Based on Mobile Agent

    Science.gov (United States)

    Xiaorong, Cheng; Su, Lang; Mingxuan, Li

    As the security situational assessment widely applying to the computer network field, scholars have designed and implemented a large number of network security situational assessment methods. However, most works are based on local area network and single host, which is hardly to meet the demand of large-scale network security assessment. In this paper, we based on quantitative hierarchical network security situational assessment model, introduced the mobile agent technology, designed the distributed computing for large-scale network and evaluated the whole network security situation for future prediction.

  4. A Schelling model with switching agents: decreasing segregation via random allocation and social mobility

    Science.gov (United States)

    Hazan, Aurélien; Randon-Furling, Julien

    2013-10-01

    We study the behaviour of a Schelling-class system in which a fraction f of spatially-fixed switching agents is introduced. This new model allows for multiple interpretations, including: (i) random, non-preferential allocation (e.g. by housing associations) of given, fixed sites in an open residential system, and (ii) superimposition of social and spatial mobility in a closed residential system. We find that the presence of switching agents in a segregative Schelling-type dynamics can lead to the emergence of intermediate patterns (e.g. mixture of patches, fuzzy interfaces) as the ones described in [E. Hatna, I. Benenson, J. Artif. Soc. Social. Simul. 15, 6 (2012)]. We also investigate different transitions between segregated and mixed phases both at f = 0 and along lines of increasing f, where the nature of the transition changes.

  5. AN AGENT BASED APPROACH TO AVOID SELFISH NODE DYNAMICALLY IN MOBILE NETWORKS

    Directory of Open Access Journals (Sweden)

    Radhika Garg

    2012-09-01

    Full Text Available Mobile Networks is one of the busy networks on which lotof data is transferred at very high speed. Security andefficiency are the main challenges for such open network.One of the common attacks on such network is themisbehavior of a node as a Selfish Node. A selfish nodeitself utilizes the communication medium and will not helpin forwarding the packet. The proposed work is the agentbased analysis of network. For this work, an Agent is setupwhich will perform the analysis while communicating overthe network. The agent will observe the averagecommunication of each node and based on analysis, adynamic fuzzy rule will be decided. Now each nodetransmission will be checked on this fuzzy rule. A specificrule will be decided to identify the selfish node. The workis about to decide the compromising node that will replacethe selfish node to improve the throughput over thenetwork.

  6. An Active Networks Architecture Based on Mobile Agent%一种基于移动Agent的主动网络体系结构

    Institute of Scientific and Technical Information of China (English)

    张君雁; 闵帆; 杨国纬

    2003-01-01

    This paper proposes an active networks architecture which supports both integrated and discrete operationmodel based on mobile Agent technology. Mobile Agent is the component for customized function transferring, activenode provides software application layer, and Agent server processes mobile Agent specific customization. For devel-opment and deployment of specific application protocol, this paper also proposes an abstract protocol framework and aprotocol loading mechanism to enhance network performance.

  7. Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations

    Science.gov (United States)

    Görbil, Gökçe; Gelenbe, Erol

    The simulation of critical infrastructures (CI) can involve the use of diverse domain specific simulators that run on geographically distant sites. These diverse simulators must then be coordinated to run concurrently in order to evaluate the performance of critical infrastructures which influence each other, especially in emergency or resource-critical situations. We therefore describe the design of an adaptive communication middleware that provides reliable and real-time one-to-one and group communications for federations of CI simulators over a wide-area network (WAN). The proposed middleware is composed of mobile agent-based peer-to-peer (P2P) overlays, called virtual networks (VNets), to enable resilient, adaptive and real-time communications over unreliable and dynamic physical networks (PNets). The autonomous software agents comprising the communication middleware monitor their performance and the underlying PNet, and dynamically adapt the P2P overlay and migrate over the PNet in order to optimize communications according to the requirements of the federation and the current conditions of the PNet. Reliable communications is provided via redundancy within the communication middleware and intelligent migration of agents over the PNet. The proposed middleware integrates security methods in order to protect the communication infrastructure against attacks and provide privacy and anonymity to the participants of the federation. Experiments with an initial version of the communication middleware over a real-life networking testbed show that promising improvements can be obtained for unicast and group communications via the agent migration capability of our middleware.

  8. Agent based Bandwidth Reservation Routing Technique in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Vishnu Kumar Sharma,

    2011-12-01

    Full Text Available In mobile ad hoc networks (MANETs, inefficient resource allocation causes heavy losses to the service providers and results in inadequate user proficiency. For improving and automating the quality of service of MANETs, efficient resource allocation techniques are required. In this paper, we propose an agent based bandwidth reservation technique for MANET. The mobile agent from the source starts forwarding the data packets through the path which has minimum cost, congestion and bandwidth. The status of every node is collected which includes the bottleneck bandwidth field and the intermediate node computes the available bandwidth on the link. At the destination, after updating the new bottleneck bandwidth field, the data packet is feedback to the source. In resource reservation technique, if the available bandwidth is greater than bottleneck bandwidth, then bandwidth reservation for the flow is done. Using rate monitoring and adjustment methodologies, rate control is performed for the congested flows. By simulation results, we show that the resource allocation technique reduces the losses and improves the network performance.

  9. Application of sustainable foaming agents to control the mobility of carbon dioxide in enhanced oil recovery

    Directory of Open Access Journals (Sweden)

    Roozbeh Rafati

    2012-12-01

    Full Text Available Carbon dioxide (CO2 flooding is a conventional process in which the CO2 is injected into the oil reservoir to increase the quantity of extracting oil. This process also controls the amount of released CO2 as a greenhouse gas in the atmosphere which is known as CO2 sequestration process. However, the mobility of the CO2 inside the hydrocarbon reservoir is higher than the crude oil and always viscous fingering and gravity override problems occur during a CO2 injection. The most common method to overcome these problems is to trap the gas bubbles in the liquid phase in the form of aqueous foam prior to CO2 injection. Although, the aqueous foams are not thermodynamically stable, special care should be considered to ensure bulk foam preparation and stability. Selection of a proper foaming agent from a large number of available surfactants is the main step in the bulk foam preparation. To meet this purpose, many chemical and crude oil based surfactants have been reported but most of them are not sustainable and have disposal problems. The objective of this experimental study is to employ Lignosulfonate and Alkyl Polyglucosides (APGs as two sustainable foaming agents for the bulk foam stability investigations and foam flooding performance in porous media. In the initial part, the bulk foam stability results showed that APGs provided more stable foams in comparison with Lignosulfonate in all surfactant concentrations. In the second part, the results indicated that the bulk foam stability measurements provide a good indication of foam mobility in porous media. The foaming agent’s concentration which provided the maximum foam stability also gave the highest value of mobility reduction in porous media.

  10. Distributed Resource Exploitation for Autonomous Mobile Sensor Agents in Dynamic Environments

    Science.gov (United States)

    Doumit, Sarjoun; Minai, Ali

    This paper studies the distributed resource exploitation problem (DREP) where many resources are distributed across an unknown environment, and several agents move around in it with the goal to exploit/visit the resources. A resource may be anything that can be harvested/sensed/acted upon by an agent when the agent visits that resource's physical location. A sensory agent (SA) is a mobile and autonomous sensory entity that has the capability of sensing a resource's attribute and therefore determining the exploitatory gain factor or profitability when this resource is visited. This type of problem can be seen as a combination of two well-known problems: the Dynamic Traveling Salesman Problem (DTSP) [8] and the Vehicle Routing Problem (VRP) [1]. But the DREP differs significantly from these two. In the DTSP we have a single agent that needs to visit many fixed cities that have costs associated to their pairwise links, so it is an optimization of paths on a static graph with time-varying costs. In VRP on the other hand, we have a number of vehicles with uniform capacity, a common depot, and several stationary customers scattered around an environment, so the goal is to find the set of routes with overall minimum route cost to service all the customers. In our problem, we have multiple SAs deployed in an unknown environment with multiple dynamic resources each with a dynamically varying value. The goal of the SAs is to adapt their paths collaboratively to the dynamics of the resources in order to maximize the general profitability of the system.

  11. 基于Mobile Agent聚类挖掘算法研究%Study on Data Mining Clustering Algorithm Based on Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    魏爽

    2014-01-01

    Mobile Agent技术是随着网络应用的日益深入而发展起来的一项新兴技术。Mobile Agent技术的智能性和移动性,不仅降低了网络负载,而且提高了通信效率;此外,其支持异步自主交互、支持断连操作,具有安全性、并行性,具有学习、容错、智能化路由能力等优点,使得Mobile Agent技术在复杂的分布式问题求解方面表现出非凡的优势,因此,将Mobile Agent技术应用于数据挖掘系统中,具有很好的研究及应用前景。%Mobile Agent technology is a entity which can autonomously move from one host to another in a heterogeneous net⁃work and communicate with other Agent and resources. The intelligence and mobility of Mobile Agent technology not only re⁃duce the network load, but improve communication efficiency. Supporting asynchronous autonomous interaction, breakpoint op⁃eration and concurrent calculation and being secure and capable of learning, fault-tolerance and intelligent routing, Mobile Agent, applied to distributed Web data mining system, technology has a great research and application prospect.

  12. Mobile Agent的迁移与定位机制%On Principles of Migration and Location of Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    朱传宇; 周键; 袁兆山; 孔磊

    2001-01-01

    本文首先介绍了Agent的基本概念、模型,以及Mobile Agent的概念、技术特点与应用领域,主要论述了Mobile Agent的迁移方式,Mobile Agent的定位机制以及其存在的问题.

  13. Investigation of oil recovery improvement by coupling an interfacial tension agent and a mobility control agent in light oil reservoirs. Annual report, October 1992--September 1993

    Energy Technology Data Exchange (ETDEWEB)

    Pitts, M.J.

    1994-06-01

    Investigation of Oil Recovery Improvement by Coupling and Interfacial Tension Agent and a Mobility Control Agent in Light Oil Reservoirs will study two major areas concerning co-injecting an interfacial tension reduction agent(s) and a mobility control agent. The first area defines the interactions of alkaline agent, surfactants, and polymers on a fluid-fluid and fluid-rock basis. The second area concerns the economic improvement of the combined technology. This report examines the interactions of different alkaline agents, surfactants, and polymer combinations on a fluid-fluid basis. Alkali and surfactant combine to reduce the interfacial tension between a low acid number, 42 API gravity crude oil and the aqueous solution to values lower than either agent alone. Surfactant structure can vary from linear chain sulfonates to alkyl aryl sulfonates to produce low interfacial tension values when combined with alkali. However as a class, the alkyl aryl sulfonates were the most effective surfactants. Surfactant olefinic character appears to be critical in developing low interfacial tensions. For the 42 API gravity crude oil, surfactants with molecular weights ranging from 370 to 450 amu are more effective in lowering interfacial tension. Ultra low interfacial tensions were achieved with all of the alkaline agents evaluated when combined with appropriate surfactants. Different interfacial tension reduction characteristics with the various alkali types indicates alkali interacts synergistically with the surfactants to develop interfacial tension reduction. The solution pH is not a determining factor in lowering interfacial tension. Surfactant is the dominant agent for interfacial tension reduction.

  14. Two-Level Semantics and Abstract Interpretation

    DEFF Research Database (Denmark)

    Nielson, Flemming

    1989-01-01

    Two-level semantics is a variant of Scott/Strachey denotational semantics in which the concept of binding time is treated explicitly. This is done by formally distinguishing between those computations that take place at run-time and those that take place at compile-time. Abstract interpretation...... unique flavour is the insistence on formal proofs of correctness and the methods used to establish these. This paper develops a theory of abstract interpretation for two-level denotational definitions. There are three ingredients in this. First a framework for proving the correctness of analyses...

  15. A Method of Security Authentication for Mobile Agent%移动Agent的一种安全认证机制

    Institute of Scientific and Technical Information of China (English)

    丁建国; 白英彩; 柳惠琳; 陈涵生

    2001-01-01

    Mobile agent and its security are analyzed in this paper. Before the mobile agents are brought to actual application, enough security is meeded. A security authentication method is provided and a detail description is given in the paper. And further research about security for mobile agent is pointed out.%就移动Agent安全性进行了分析,移动Agent要真正走向实际应用的前提是能提供足够的安全性.提出并详细描述了移动Agent和代理服务器之间的一种安全认证机制,并指出进一步研究的方向和内容.

  16. 基于JavaCard的移动代理系统安全性研究%Research on Security of JavaCard based Mobile Agent System

    Institute of Scientific and Technical Information of China (English)

    陈志贤; 王绍棣; 王汝传; 孙知信

    2003-01-01

    With wide and increasing range applications of mobile agent technology, the security problem has gottenmore and more focus. This paper discusses the security problems that the mobile agent system faces with at presentand the existing protesting schemes for it. Then a solving method based on JavaCard is proposed to protect mobile a-gents. And a feasible solving method is also provided to solve the security problems of JavaCard itself.

  17. A secure model for mobile agent based on encrypted circuit construction

    Institute of Scientific and Technical Information of China (English)

    ZHENG Yan; WANG Ruchuan; MU Hong; WANG Haiyan

    2007-01-01

    As a new technology,mobile agent (MA) shows a wide application in the field of network technology.However,security has been one of the crucial problems in its application.A new protection model based on a trusted element is presented in this paper.The trusted element,which differs from the traditional trusted hardware such as a smart card or a co-processor,offers a third party service based on an encrypted circuit construction.The procedure of constructing an encrypted circuit is introduced and the method of using the trusted service to protect the MA is also described.An application example is given to show how to use the new model at the end of the paper.

  18. Research on cultural algorithm for solving routing problem of mobile agent

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The key idea behind cultural algorithm is to explicitly acquire problem-solving knowledge from the evolving population and in return apply that knowledge to guide the search. In this article, cultural algorithm-simulated annealing is proposed to solve the routing problem of mobile agent. The optimal individual is accepted to improve the belief space's evolution of cultural algorithms by simulated annealing. The step size in search is used as situational knowledge to guide the search of optimal solution in the population space. Because of this feature, the search time is reduced. Experimental results show that the algorithm proposed in this article can ensure the quality of optimal solutions, and also has better convergence speed. The operation efficiency of the system is considerably improved.

  19. INTELLIGENT PRODUCT BASED ON MOBILE AGENT TO ACCELERATE THE NEW PRODUCT DEVELOPMENT PROCESS

    Directory of Open Access Journals (Sweden)

    Abdelhak Boulaalam

    2013-01-01

    Full Text Available To improve the ever-increasing demands products that are customized, all business activities performed along the product life cycle must be coordinated and efficiently managed along the extended enterprise. For this, enterprise had wanted to retain control over the whole product lifecycle especially when the product is in use/repair/recycling (End of Life phase. Although there have been many previous research works about product lifecycle management in the Beginning of Life (BOL and Middle of Life (MOL phases, few addressed the End of Life (EOL phase, in particular. In this study, based on Auto-ID combined with mobile multi-agent system technologies, we will try to improve innovation: (a by minimize the lunch phase, (b and the involvement of the customer in product lifecycle (voice of customer."

  20. Research of Anti-spam System Basing on Immunity System and Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    HUI Bei; WU Yue; JI Lin; CHEN Jia

    2007-01-01

    The human immune system has the function of self-discern.It can identify the non-self antigen and clear it through the immune response automatically.So,human body has the power of resisting disease.The anti-spam system basing on immune system is proposed by using immune system's theory,and it is introduced in the mail service of enterprise VPN.Regard VPN as the human body,the mobile agent is simulated the antibody because of its movable and intelligent,and the spam is simulated the antigen.It can clear the spam by using immune mechanism.This method is a new thinking of anti-spam mail.The advantage is overcoming the weakness on independence of traditional anti-spam system.

  1. FOREST GUARD: A complete safety for Wildlife using Mobile Agents and Sensor Clouds in WSN

    Directory of Open Access Journals (Sweden)

    Sumit Kumar Tetarave

    2012-11-01

    Full Text Available With growing human population and search for new habitus and unsustainable use of natural resources, over exploitation of forests and wildlife is taking place world over. This is resulting in drastic decline in the number of essential flora and fauna. We propose a complete safe guard model named Forest Guard, for saving wildlife from human as well as their own collisions. This model will not guard them directly; rather it will help in collecting vital information about their real-time condition and will alert the institutional mechanisms to take corrective initiatives. The paper mentions this indirect support in the form of wireless sensor networks (WSN. In WSN, our proposed model uses mobile agents (MAs for handling huge area communication and injecting them for different guarding issues of different species of wildlife. A novel concept of Virtual Sensor Cloud (VSC is being discussed to trace different group of endangered wild animals such as Tigers, Lions, Elephants, etc.

  2. Active defense scheme against DDoS based on mobile agent and network control in network confrontation

    Science.gov (United States)

    Luo, Rong; Li, Junshan; Ye, Xia; Wang, Rui

    2013-03-01

    In order to effective defend DDoS attacks in network confrontation, an active defense scheme against DDoS is built based on Mobile Agent and network control. A distributed collaborative active defense model is constructed by using mobile agent technology and encapsulating a variety of DDoS defense techniques. Meanwhile the network control theory is applied to establish a network confrontation's control model for DDoS to control the active defense process. It provides a new idea to solve the DDoS problem.

  3. An information potential approach for tracking and surveilling multiple moving targets using mobile sensor agents

    Science.gov (United States)

    Lu, W.; Zhang, G.; Ferrari, S.; Fierro, R.; Palunko, I.

    2011-05-01

    The problem of surveilling moving targets using mobile sensor agents (MSAs) is applicable to a variety of fields, including environmental monitoring, security, and manufacturing. Several authors have shown that the performance of a mobile sensor can be greatly improved by planning its motion and control strategies based on its sensing objectives. This paper presents an information potential approach for computing the MSAs' motion plans and control inputs based on the feedback from a modified particle filter used for tracking moving targets. The modified particle filter, as presented in this paper implements a new sampling method (based on supporting intervals of density functions), which accounts for the latest sensor measurements and adapts, accordingly, a mixture representation of the probability density functions (PDFs) for the target motion. It is assumed that the target motion can be modeled as a semi-Markov jump process, and that the PDFs of the Markov parameters can be updated based on real-time sensor measurements by a centralized processing unit or MSAs supervisor. Subsequently, the MSAs supervisor computes an information potential function that is communicated to the sensors, and used to determine their individual feedback control inputs, such that sensors with bounded field-of-view (FOV) can follow and surveil the target over time.

  4. HH-MIP: An Enhancement of Mobile IP by Home Agent Handover

    Directory of Open Access Journals (Sweden)

    Jeng-Yueng Chen

    2010-01-01

    Full Text Available We propose an enhancement of Mobile IP (MIP called MIP with Home Agent Handover (HH-MIP to enjoy most of the advantages of Route Optimization MIP (ROMIP but with only a small increase of signaling overhead. In HH-MIP, the concept of Temporary HA (THA is proposed and the mobile host (MH registers the new CoA with its THA rather than its original HA. Since the THA of an MH is selected to be close to the current location of MH, HH-MIP reduces the handoff latency and shortens the signaling path of registration as well. Moreover, HH-MIP adopts an aggressive approach in selecting THA for an MH, that is, whenever an MH is moving away from its HA or previous THA, the MH triggers the handover of THA. Theoretical analysis demonstrates that the proposed scheme enjoys small handoff latency as well as routing efficiency, and the signaling cost of the proposed scheme is significantly less than that in ROMIP.

  5. Clone-Based Mobile Agent Itinerary Planning Using Separate Trees For Data Fusion In WSNS

    Directory of Open Access Journals (Sweden)

    Soheil Javadi

    2012-09-01

    Full Text Available Recent studies demonstrate that Mobile Agent (MA approach could be more effective than conventional client-server model in Wireless Sensor Network (WSN. Particularly, itinerary planning for MAs is a significant aspect of these approaches. Tree-based methods have been widely used for this purpose where many agents are dispatched simultaneously. Most of tree-based methods try to construct an optimal/suboptimal tree in terms of an objective function. In contrast, in this paper we introduce a new approach that tries to separate the MA dispatching and data fusion operations by considering two itinerary trees which results in more flexibility to regulate the itinerary plan. Based on this idea, we propose an algorithm called Two Trees Clone-based Itinerary (TTCI which constructs two trees, one serves to distribute MA in the network and another to fuse back the sensed data. By experimental results, we demonstrate the performance improvement of TTCI algorithm in terms of overall energy consumption in comparison with the previous schemes. Meanwhile, the TTCI keeps the delay low.

  6. Expectations of two-level telegraph noise

    CERN Document Server

    Fern, J

    2006-01-01

    We find expectation values of functions of time integrated two-level telegraph noise. Expectation values of this noise are evaluated under simple control pulses. Both the Gaussian limit and $1/f$ noise are considered. We apply the results to a specific superconducting quantum computing example, which illustrates the use of this technique for calculating error probabilities.

  7. 基于移动Agent的移动云计算系统构建方法%Construction method of mobile cloud computing system based on mobile Agent

    Institute of Scientific and Technical Information of China (English)

    王素贞; 杜治娟

    2013-01-01

    This paper proposed a mobile cloud computing architecture based on mobile Agent paradigm concerning the problems faced by the mobile cloud computing, such as application migration on network, network latency and non-persistent connection issues caused by execution on the remote device, cross-cloud service problems, and security risks and privacy issues. In this architecture, break-point saving ideas and events replay mechanism were introduced in application migration issues, optimized contract net protocol was used in the synergy between the mobile Agents, and mobile Agent exchange keys for authentication. What's more, this paper described the workflow of this architecture using colored nested Petri nets, and designed a system of mobile e-book sales based on the architecture.%针对移动云计算面临的一系列问题,如应用程序在网络上迁移问题、远程设备上执行时的网络延迟和非持续连接问题、跨云服务问题以及安全风险和隐私问题,提出了一种基于移动Agent范型的移动云计算架构,其中,在应用程序迁移中引入断点保存思想和事件重播机制,在移动Agent协同过程中使用优化过的合同网协议,利用移动Agent交换密钥进行身份认证.用有色嵌套Petri网描述了此架构的执行流程,并在此基础上设计了移动电子图书销售系统.

  8. 在移动计算环境中基于移动代理的缓存失效方案%A Cache Invalidation Scheme Based on Mobile Agent in Mobile Computing Environments

    Institute of Scientific and Technical Information of China (English)

    吴劲; 卢显良; 任立勇

    2003-01-01

    Caching can reduce the bandwidth requirement in a mobile computing environment as well as minimize the energy consumption of mobile hosts. To affirm the validity of mobile host' cache content, servers periodically broadcast cache invalidation reports that contain information of data that has been updated. However, as mobile hosts may operate in sleeping mode (disconnected mode), it is possible that some reports may be missed and the clients are forced to discard the entire cache content. In this paper, we present a cache invalidation scheme base on mobile agent in mobile computing environments, which can manage consistency between mobile hosts and servers, to avoid losing cache invalidation reports.

  9. Two-Level Semantics and Abstract Interpretation

    DEFF Research Database (Denmark)

    Nielson, Flemming

    1989-01-01

    Two-level semantics is a variant of Scott/Strachey denotational semantics in which the concept of binding time is treated explicitly. This is done by formally distinguishing between those computations that take place at run-time and those that take place at compile-time. Abstract interpretation...... is concerned with the (preferably automatic) analysis of programs. The main purpose of these analyses is to find information that may assist in the efficient implementation of the programs. Abstract interpretation is thus related to data flow analysis, partial evaluation and other program analysis methods. Its...... unique flavour is the insistence on formal proofs of correctness and the methods used to establish these. This paper develops a theory of abstract interpretation for two-level denotational definitions. There are three ingredients in this. First a framework for proving the correctness of analyses...

  10. Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Surraya Khanum

    2012-01-01

    Full Text Available Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN in particular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. WSN needs strong security mechanism as it is usually deployed in a critical, hostile and sensitive environment where human labour is usually not involved. However, due to inbuilt resource and computing restriction, security in WSN needs a special consideration. Traditional security techniques such as encryption, VPN, authentication and firewalls cannot be directly applied to WSN as it provides defence only against external threats. The existing literature shows that there seems an inverse relationship between strong security mechanism and efficient network resource utilization. In this research article, we have proposed a Mobile Agent Based Hierarchical Intrusion Detection System (MABHIDS for WSN. The Proposed scheme performs two levels of intrusion detection by utilizing minimum possible network resources. Our proposed idea enhance network lifetime by reducing the work load on Cluster Head (CH and it also provide enhanced level of security in WSN.

  11. CONSENSUS FORMATION OF TWO-LEVEL OPINION DYNAMICS

    Institute of Scientific and Technical Information of China (English)

    Yilun SHANG

    2014-01-01

    Opinion dynamics have received significant attention in recent years. This pa-per proposes a bounded confidence opinion model for a group of agents with two different confidence levels. Each agent in the population is endowed with a confidence interval around her opinion with radius αd or (1-α)d, where α ∈ (0, 1/2] represents the differentiation of confidence levels. We analytically derived the critical confidence bound dc =1/(4α) for the two-level opinion dynamics on Z. A single opinion cluster is formed with probability 1 above this critical value regardless of the ratio p of agents with high/low confidence. Extensive numerical simulations are performed to illustrate our theoretical results. Noticed is a clear impact of p on the collective behavior: more agents with high confidence lead to harder agreement. It is also experimentally revealed that the sharpness of the threshold dc increases with αbut does not depend on p.

  12. A Spawn Mobile Agent Itinerary Planning Approach for Energy-Efficient Data Gathering in Wireless Sensor Networks.

    Science.gov (United States)

    Qadori, Huthiafa Q; Zulkarnain, Zuriati A; Hanapi, Zurina Mohd; Subramaniam, Shamala

    2017-06-03

    Mobile agent (MA), a part of the mobile computing paradigm, was recently proposed for data gathering in Wireless Sensor Networks (WSNs). The MA-based approach employs two algorithms: Single-agent Itinerary Planning (SIP) and Multi-mobile agent Itinerary Planning (MIP) for energy-efficient data gathering. The MIP was proposed to outperform the weakness of SIP by introducing distributed multi MAs to perform the data gathering task. Despite the advantages of MIP, finding the optimal number of distributed MAs and their itineraries are still regarded as critical issues. The existing MIP algorithms assume that the itinerary of the MA has to start and return back to the sink node. Moreover, each distributed MA has to carry the processing code (data aggregation code) to collect the sensory data and return back to the sink with the accumulated data. However, these assumptions have resulted in an increase in the number of MA's migration hops, which subsequently leads to an increase in energy and time consumption. In this paper, a spawn multi-mobile agent itinerary planning (SMIP) approach is proposed to mitigate the substantial increase in cost of energy and time used in the data gathering processes. The proposed approach is based on the agent spawning such that the main MA is able to spawn other MAs with different tasks assigned from the main MA. Extensive simulation experiments have been conducted to test the performance of the proposed approach against some selected MIP algorithms. The results show that the proposed SMIP outperforms the counterpart algorithms in terms of energy consumption and task delay (time), and improves the integrated energy-delay performance.

  13. An Agent-Based Model for the Development of Intelligent Mobile Services

    NARCIS (Netherlands)

    Koch, F.L.

    2009-01-01

    The next generation of mobile services must invisible, convenient, and useful. It requires new techniques to design and develop mobile computing applications, based on user-centred, environment-aware, adaptive behaviour. I propose an alternative technology for the development of intelligent mobile s

  14. Information Retrieval Agent System Based on Mobile Agent Technology%基于Mobile Agent技术的搜索引擎IRAS

    Institute of Scientific and Technical Information of China (English)

    王命延; 孙春华; 孙恒

    2004-01-01

    介绍了基于Mobile Agent的软件技术,利用该技术设计了一个搜索引擎IRAS,描述了其设计思想、组成和工作流程.此外,通过与传统Robot搜索方式进行对比,分析了IRAS搜索引擎系统的性能优势.

  15. AN APPLICATION OF MOBILE AGENTS TO NETWORK MANAGEMENT%移动代理在网络管理中的应用

    Institute of Scientific and Technical Information of China (English)

    胥光辉; 李子全; 谢希仁; 徐永森

    2000-01-01

    Conventional network management, such as SNMP and CMIP, adopts a centralized, client-sercer modal. In this model agent has little intelligence, while manager does almost all the work. This may lead a lot of vital problems. Mobile agent is an autonomic program, which can hang up its execution, collect its runtime state messages, transfer itself and its state to another network node, and then resume its execution there. Apply mobile agent concept to network management is a novel idea, which can greatly improve the robustness and distribution of a network management system. In this paper, an actual network management architecture based on mobile agent is proposed. Nowadays there are few network devices which can support mobile agent directly, though some ones have already began to appear. In order to enable mobile agents manage a network, a workstation (maybe a PC) can be added into the network. This special machine can accept mobile agents from a remote manage station, then these mobile agents can do their work like SNMP or CMIP managers. This method is very useful when a manage station is connected with the managed network using a low, expensive, or unreliable link. Even the connection between the manage station and the managed network is lost, mobile agents can still manage the network. The structure of the added workstation can be divided into three layers. The lowest layer is operating system layer, which supply low communication services to higher layers. The middle layer includes mobile agent server and/or SNMP/CMIP server. The mobile agent server can supply three kinds of services to mobile agents: ① monitor and administer the state of mobile agents; ② migration support; ③ high communication between mobile agents. The highest layer is mobile agent layer. This layer includes some service agents. The immigrated agents can achieve their works through communicating with these service agents. Accordiag to the propossed model, a prototype system has been

  16. An Agent-based Model Simulation of Multiple Collaborating Mobile Ad Hoc Networks (MANET)

    Science.gov (United States)

    2011-06-01

    RESULTS: Agent Learning Profiles Discounted Positive Reinforcement Learning Learning and Forgetting Forgetting is triggered by task conditions that...disable rational and deliberate mental models –forcing the agent to ignore (or forget) routine processes. Positive reinforcement is earned by an...deliberate behavior of agents as rational entities (model-based functions). 6.Experiment with positive reinforcement learning (with incremental gain over

  17. A Self-Adaptive Multi-Agent System Approach for Collaborative Mobile Learning

    Science.gov (United States)

    de la Iglesia, Didac Gil; Calderon, Juan Felipe; Weyns, Danny; Milrad, Marcelo; Nussbaum, Miguel

    2015-01-01

    Mobile technologies have emerged as facilitators in the learning process, extending traditional classroom activities. However, engineering mobile learning applications for outdoor usage poses severe challenges. The requirements of these applications are challenging, as many different aspects need to be catered, such as resource access and sharing,…

  18. Two-Level Fingerprinting Codes: Non-Trivial Constructions

    CERN Document Server

    Rochanakul, Penying

    2011-01-01

    We extend the concept of two-level fingerprinting codes, introduced by Anthapadmanabhan and Barg (2009) in context of traceability (TA) codes, to other types of fingerprinting codes, namely identifiable parent property (IPP) codes, secure-frameproof (SFP) codes, and frameproof (FP) codes. We define and propose the first explicit non-trivial construction for two-level IPP, SFP and FP codes.

  19. Mobilities

    DEFF Research Database (Denmark)

    simple movements of people, goods, and information from A to B. The ‘mobilities turn’ has made it its hallmark to explore the ‘more than’ effects of a world increasingly on the move. This new title in the Routledge Series ‘Critical Concepts in Built Environment’ creates a state-of-the-art reference work......The world is on the move. This is a widespread understanding by many inhabitants of contemporary society across the Globe. But what does it actually mean? During over one decade the ‘mobilities turn’ within the social sciences have provided a new set of insights into the repercussions of mobilities...... to social networks, personal identities, and our relationship to the built environment. The omnipresence of mobilities within everyday life, high politics, technology, and tourism (to mention but a few) all point to a key insight harnessed by the ‘mobilities turn’. Namely that mobilities is much more than...

  20. Two-level cervical disc replacement: perspectives and patient selection

    Directory of Open Access Journals (Sweden)

    Narain AS

    2017-02-01

    Full Text Available Ankur S Narain, Fady Y Hijji, Daniel D Bohl, Kelly H Yom, Krishna T Kudaravalli, Kern Singh Department of Orthopedic Surgery, Rush University Medical Center, Chicago, IL, USA Introduction: Cervical disc replacement (CDR is an emerging treatment option for cervical degenerative disease. Postulated benefits of cervical disc replacement compared to anterior cervical discectomy and fusion include preserved motion at the operative segments and decreased motion at adjacent levels. Multiple studies have been performed investigating the outcomes of CDR in single-level pathology. The investigation of the use of CDR in two-level pathology is an emerging topic within the literature.Purpose: To critically evaluate the literature regarding two-level CDR in order to determine its utility compared to two-level cervical arthrodesis. Patient selection factors including indications and contraindications will also be explored.Methods: The PubMed database was searched for all articles published on the subject of two-level CDR up until October 2016. Studies were classified by publication year, study design, sample size, follow-up interval, and conflict of interest. Outcomes were recorded from each study, and included data on patient-reported outcomes, radiographic measurements, range of motion, peri- and postoperative complications, heterotopic ossification, adjacent segment disease, reoperation rate, and total intervention cost. Results: Fourteen studies were included in this review. All studies demonstrated at least noninferiority of two-level CDR compared to both two-level arthrodesis and single-level CDR. Patient selection in two-level CDR is driven by the inclusion and exclusion criteria presented in prospective, randomized controlled trials. The most common indication is subaxial degenerative disc disease over two contiguous levels presenting with radiculopathy or myelopathy. Furthermore, costs analyses trended toward at least noninferiority of two-level

  1. Reducing interferences in wireless communication systems by mobile agents with recurrent neural networks-based adaptive channel equalization

    Science.gov (United States)

    Beritelli, Francesco; Capizzi, Giacomo; Lo Sciuto, Grazia; Napoli, Christian; Tramontana, Emiliano; Woźniak, Marcin

    2015-09-01

    Solving channel equalization problem in communication systems is based on adaptive filtering algorithms. Today, Mobile Agents (MAs) with Recurrent Neural Networks (RNNs) can be also adopted for effective interference reduction in modern wireless communication systems (WCSs). In this paper MAs with RNNs are proposed as novel computing algorithms for reducing interferences in WCSs performing an adaptive channel equalization. The method to provide it is so called MAs-RNNs. We perform the implementation of this new paradigm for interferences reduction. Simulations results and evaluations demonstrates the effectiveness of this approach and as better transmission performance in wireless communication network can be achieved by using the MAs-RNNs based adaptive filtering algorithm.

  2. The Two-level Management System of University and School

    Institute of Scientific and Technical Information of China (English)

    Yang Xu

    2013-01-01

    With the development of our country's higher e-ducation, the school also presents the great-leap-forward devel-opment trend. The previous denotative development has changed into the way of connotative development. The two-level management system of university and school is the most common management mode in many colleges. This paper intro-duces the advantage of this mode in the objective view, analyzes the problems existing in the practice operation, put forward countermeasures to improve the two-level management and proposes a method to build the two-level management system.

  3. A Framework for Research in Gamified Mobile Guide Applications using Embodied Conversational Agents (ECAs

    Directory of Open Access Journals (Sweden)

    Ioannis Doumanis

    2015-09-01

    Full Text Available Mobile Guides are mobile applications that provide players with local and location-based services (LBS, such as navigation assistance, where and when they need them most. Advances in mobile technologies in recent years have enabled the gamification of these applications, opening up new opportunities to transfer education and culture through game play. However, adding traditional game elements such as PBLs (points, badges, and leaderboards alone cannot ensure that the intended learning outcomes will be met, as the player’s cognitive resources are shared between the application and the surrounding environment. This distribution of resources prevents players from easily immersing themselves into the educational scenario. Adding artificial conversational characters (ECAs that simulate the social norms found in real-life human-to-human guide scenarios has the potential to address this problem and improve the player’s experience and learning of cultural narratives [1]. Although significant progress has been made towards creating game-like mobile guides with ECAs ([2], [3], there is still a lack of a unified framework that enables researchers and practitioners to investigate the potential effects of such applications to players and how to approach the concepts of player experience, cognitive accessibility and usability in this context. This paper presents a theoretically-well supported research framework consisted of four key components: differences in players, different features of the gamified task, aspects of how the ECA looks, sound or behaves and different mobile environments. Furthermore, it provides based on this framework a working definition of what player experience, cognitive accessibility and usability are in the context of game-like mobile guide applications. Finally, a synthesis of the results of six empirical studies conducted within this research framework is discussed and a series of design guidelines for the effective gamification

  4. Development of improved mobility control agents for surfactant/polymer flooding. Second annual report, October 1, 1979-September 30, 1980

    Energy Technology Data Exchange (ETDEWEB)

    Martin, F.D.; Donaruma, L.G.; Hatch, M.J.

    1981-04-01

    The objective of this laboratory work is to develop improved mobility control agents that are more effective than the commercial polymers currently used in this process. During the second year of the project, the baseline testing of commercial products was completed. These baseline tests with polymers include studies on mobility control, retention, and shear degradation in Berea cores, the effect of common ions on rheological properties, thermal stability, microbial degradation, and surfactant-polymer interactions. These data are used for comparison of the commercial agents at standardized sets of conditions, and are also used to evaluate new, modified, or improved polymers. Work was also initiated on the synthesis, characterization, and preliminary screening of new and modified polymers. Testing of these analogs provides systematic correlations of polymer performance with polymer structure. This preliminary testing consists of measurements of shear degradation and viscosity loss in NaCl brines by the use of a simplified screening procedure. To date, a number of potential structure-utility relationships have been observed. Solution viscosities of all nonionic polymers tested are essentially insensitive to changes in NaCl concentration. Increasing the charge-to-mass ratio (degree of hydrolysis) of either polyacrylamides or N-alkyl analogs enhances the ability of these polymers to build viscosity in low salinity NaCl brines. However, such polymers are increasingly subject to viscosity loss as the salinity is increased. Above a certain critical molecular weight, polymers become more susceptible to shear degradation. Many of the polymers that possess stiffer backbones exhibit improved brine and shear stability. The results of these studies will be used to develop an improved mobility control polymer in the next phase of this project.

  5. A COMPARISON BETWEEN EXPERT SYSTEMS AND AUTONOMIC COMPUTING PLUS MOBILE AGENT APPROACHES FOR FAULT MANAGEMENT.

    Directory of Open Access Journals (Sweden)

    SERGIO ARMANDO GUTIÉRREZ

    2011-01-01

    Full Text Available En este trabajo se presenta una revisión de trabajos relacionados a la aplicación de sistemas expertos a la gestión de fallas. Se introduce también un enfoque novedoso, basado en el paradigma de la computación autónoma y la tecnología de agentes móviles, y sus principales características son comparadas con respecto a las equivalentes de los sistemas expertos. Los benefi cios del esquema basado en agentes móviles son presentados.

  6. A Connectionism Approach to the Emulation of Multi-Agent Mobile Robots

    OpenAIRE

    Massey, S; Zalzala, A.M.S.

    1994-01-01

    The work presented in this report deals with the modelling and subsequent neural network emulation of autonomous mobile robots, moving in pre-defined environments in response to given control signals. This work was undertaken with the intention of training neural network based controllers for the vehicles, in order to control them whilst they performed required navigational tasks, whilst avoiding collisions with each other and with environmental obstacles. The required modelling was carried o...

  7. Self-Organized Link State Aware Routing for Multiple Mobile Agents in Wireless Network

    Science.gov (United States)

    Oda, Akihiro; Nishi, Hiroaki

    Recently, the importance of data sharing structures in autonomous distributed networks has been increasing. A wireless sensor network is used for managing distributed data. This type of distributed network requires effective information exchanging methods for data sharing. To reduce the traffic of broadcasted messages, reduction of the amount of redundant information is indispensable. In order to reduce packet loss in mobile ad-hoc networks, QoS-sensitive routing algorithm have been frequently discussed. The topology of a wireless network is likely to change frequently according to the movement of mobile nodes, radio disturbance, or fading due to the continuous changes in the environment. Therefore, a packet routing algorithm should guarantee QoS by using some quality indicators of the wireless network. In this paper, a novel information exchanging algorithm developed using a hash function and a Boolean operation is proposed. This algorithm achieves efficient information exchanges by reducing the overhead of broadcasting messages, and it can guarantee QoS in a wireless network environment. It can be applied to a routing algorithm in a mobile ad-hoc network. In the proposed routing algorithm, a routing table is constructed by using the received signal strength indicator (RSSI), and the neighborhood information is periodically broadcasted depending on this table. The proposed hash-based routing entry management by using an extended MAC address can eliminate the overhead of message flooding. An analysis of the collision of hash values contributes to the determination of the length of the hash values, which is minimally required. Based on the verification of a mathematical theory, an optimum hash function for determining the length of hash values can be given. Simulations are carried out to evaluate the effectiveness of the proposed algorithm and to validate the theory in a general wireless network routing algorithm.

  8. Mobilization

    Science.gov (United States)

    1987-01-01

    istic and romantic emotionalism that typifies this genre. Longino, James C., et al. “A Study of World War Procurement and Industrial Mobilization...States. Harrisburg, PA: Military Service Publishing Co., 1941. CARL 355.22 J72b. Written in rough prose , this World War II era document explains the

  9. Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network

    Directory of Open Access Journals (Sweden)

    Friedlander David

    2003-01-01

    Full Text Available Autonomous networks of sensor platforms can be designed to interact in dynamic and noisy environments to determine the occurrence of specified transient events that define the dynamic process of interest. For example, a sensor network may be used for battlefield surveillance with the purpose of detecting, identifying, and tracking enemy activity. When the number of nodes is large, human oversight and control of low-level operations is not feasible. Coordination and self-organization of multiple autonomous nodes is necessary to maintain connectivity and sensor coverage and to combine information for better understanding the dynamics of the environment. Resource conservation requires adaptive clustering in the vicinity of the event. This paper presents methods for dynamic distributed signal processing using an ad hoc mobile network of microsensors to detect, identify, and track targets in noisy environments. They seamlessly integrate data from fixed and mobile platforms and dynamically organize platforms into clusters to process local data along the trajectory of the targets. Local analysis of sensor data is used to determine a set of target attribute values and classify the target. Sensor data from a field test in the Marine base at Twentynine Palms, Calif, was analyzed using the techniques described in this paper. The results were compared to "ground truth" data obtained from GPS receivers on the vehicles.

  10. Dynamic 3-D chemical agent cloud mapping using a sensor constellation deployed on mobile platforms

    Science.gov (United States)

    Cosofret, Bogdan R.; Konno, Daisei; Rossi, David; Marinelli, William J.; Seem, Pete

    2014-05-01

    The need for standoff detection technology to provide early Chem-Bio (CB) threat warning is well documented. Much of the information obtained by a single passive sensor is limited to bearing and angular extent of the threat cloud. In order to obtain absolute geo-location, range to threat, 3-D extent and detailed composition of the chemical threat, fusion of information from multiple passive sensors is needed. A capability that provides on-the-move chemical cloud characterization is key to the development of real-time Battlespace Awareness. We have developed, implemented and tested algorithms and hardware to perform the fusion of information obtained from two mobile LWIR passive hyperspectral sensors. The implementation of the capability is driven by current Nuclear, Biological and Chemical Reconnaissance Vehicle operational tactics and represents a mission focused alternative of the already demonstrated 5-sensor static Range Test Validation System (RTVS).1 The new capability consists of hardware for sensor pointing and attitude information which is made available for streaming and aggregation as part of the data fusion process for threat characterization. Cloud information is generated using 2-sensor data ingested into a suite of triangulation and tomographic reconstruction algorithms. The approaches are amenable to using a limited number of viewing projections and unfavorable sensor geometries resulting from mobile operation. In this paper we describe the system architecture and present an analysis of results obtained during the initial testing of the system at Dugway Proving Ground during BioWeek 2013.

  11. CO2 philic surfactant as possible mobility control agent in EOR applications

    Science.gov (United States)

    Sagir, Muhammad; Tan, Isa M.; Mushtaq, Muhammad

    2014-10-01

    The effect of an in house developed CO2 philic surfactant in foam assisted WAG (FAWAG) on CO2 mobility is reported. We reacted methallyl chloride with nonylphenol ethoxylated alcohol and then sulfonated the produced product. The effect of surfactant on IFT between CO2 and brine was investigated in order to measure the affinity of surfactant with CO2. The detailed effects of pressure and temperature on IFT between CO2 / brine / surfactant at the specified pressure and temperature conditions is studied and reported. In-house developed surfactant effectively lowered down the IFT between CO2/brine from 32 mN/m to less than 6.10 mN / m. In addition, the newly developed surfactant was evaluated for its foam stability. The synthesized novel surfactant was further investigated for its effect on CO2 mobility in porous media and the findings are presented here. The in house developed surfactant has a great potential for CO2- EOR applications.

  12. Ion mobility spectrometric analysis of vaporous chemical warfare agents by the instrument with corona discharge ionization ammonia dopant ambient temperature operation.

    Science.gov (United States)

    Satoh, Takafumi; Kishi, Shintaro; Nagashima, Hisayuki; Tachikawa, Masumi; Kanamori-Kataoka, Mieko; Nakagawa, Takao; Kitagawa, Nobuyoshi; Tokita, Kenichi; Yamamoto, Soichiro; Seto, Yasuo

    2015-03-20

    The ion mobility behavior of nineteen chemical warfare agents (7 nerve gases, 5 blister agents, 2 lachrymators, 2 blood agents, 3 choking agents) and related compounds including simulants (8 agents) and organic solvents (39) was comparably investigated by the ion mobility spectrometry instrument utilizing weak electric field linear drift tube with corona discharge ionization, ammonia doping, purified inner air drift flow circulation operated at ambient temperature and pressure. Three alkyl methylphosphonofluoridates, tabun, and four organophosphorus simulants gave the intense characteristic positive monomer-derived ion peaks and small dimer-derived ion peaks, and the later ion peaks were increased with the vapor concentrations. VX, RVX and tabun gave both characteristic positive monomer-derived ions and degradation product ions. Nitrogen mustards gave the intense characteristic positive ion peaks, and in addition distinctive negative ion peak appeared from HN3. Mustard gas, lewisite 1, o-chlorobenzylidenemalononitrile and 2-mercaptoethanol gave the characteristic negative ion peaks. Methylphosphonyl difluoride, 2-chloroacetophenone and 1,4-thioxane gave the characteristic ion peaks both in the positive and negative ion mode. 2-Chloroethylethylsulfide and allylisothiocyanate gave weak ion peaks. The marker ion peaks derived from two blood agents and three choking agents were very close to the reactant ion peak in negative ion mode and the respective reduced ion mobility was fluctuated. The reduced ion mobility of the CWA monomer-derived peaks were positively correlated with molecular masses among structurally similar agents such as G-type nerve gases and organophosphorus simulants; V-type nerve gases and nitrogen mustards. The slope values of the calibration plots of the peak heights of the characteristic marker ions versus the vapor concentrations are related to the detection sensitivity, and within chemical warfare agents examined the slope values for sarin, soman

  13. 基于主从样式的移动代理安全模型的研究与实现%Research and Implement of Master-Slave Pattern Based Security Model for Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    穆鸿; 王汝传; 张登银

    2003-01-01

    In the ages of current network technology, as a new technology, the emergence of mobile agent shows us a wider and wider application prospect in the fields of network technology, such as Network Management,Intelligence Information Retrieval and Electronic Commence and so on. The security is the essence of mobile agent technology. In this paper we analyze the security issues and survey some representative approaches to solve the problem in mobile agent systems. We focus on the issues about the agent''s security and propose a master-slave designpattern based security model for mobile agent called SMAP(Secure Mobile Agent Platform). In the end we give anapplication example to show how to use these.

  14. The Pattern as a Reusable Component to Adaptive Framework for Load Balancing Mobile Agent in Internet Banking

    Directory of Open Access Journals (Sweden)

    A. Meiappane

    2012-03-01

    Full Text Available In recent years, the Software Architecture (SA of an Internet banking has become one of the most challengeable and risky fields of modern technology. The advent of the Internet has revolutionized the way banking is being done. In Internet banking, we analyzed some attributes such as usage, security, availability, load balancing and so on. Among those attributes Load Balancing is a serious problem in the Internet and it is necessary to build new systems incorporating load balancing as integral part of their design. The use of patterns, which is of a reusable component, is a good tool to help designers build load balancing systems. In this paper we are going to propose cluster load balancing technique by using mobile agent.

  15. Ionic liquid as a mobile phase additive in high-performance liquid chromatography for the simultaneous determination of eleven fluorescent whitening agents in paper materials.

    Science.gov (United States)

    Wang, Qing; Chen, Xianbo; Qiu, Bin; Zhou, Liang; Zhang, Hui; Xie, Juan; Luo, Yan; Wang, Bin

    2016-04-01

    In the present study, 11 4,4'-diaminostilbene-2,2'-disulfonic acid based fluorescent whitening agents with different numbers of sulfonic acid groups were separated by using an ionic liquid as a mobile phase additive in high-performance liquid chromatography with fluorescence detection. The effects of ionic liquid concentration, pH of mobile phase B, and composition of mobile phase A on the separation of fluorescent whitening agents were systematically investigated. The ionic liquid tetrabutylammonium tetrafluoroborate is superior to tetrabutylammomnium bromide for the separation of the fluorescent whitening agents. The optimal separation conditions were an ionic liquid concentration at 8 mM and the pH of mobile phase B at 8.5 with methanol as mobile phase A. The established method exhibited low limits of detection (0.04-0.07 ng/mL) and wide linearity ranges (0.30-20 ng/mL) with high linear correlation coefficients from 0.9994 to 0.9998. The optimized procedure was applied to analyze target analytes in paper samples with satisfactory results. Eleven target analytes were quantified, and the recoveries of spiked paper samples were in the range of 85-105% with the relative standard deviations from 2.1 to 5.1%. The obtained results indicated that the method was efficient for detection of 11 fluorescent whitening agents.

  16. Bioavailable phosphorus (P) reduction is less than mobile P immobilization in lake sediment for eutrophication control by inactivating agents.

    Science.gov (United States)

    Wang, Changhui; He, Rui; Wu, Yu; Lürling, Miquel; Cai, Haiyuan; Jiang, He-Long; Liu, Xin

    2017-02-01

    Phosphorus (P) immobilization by inactivating agents in the sediment of eutrophic lakes to reduce immediately available P in lake water is often crucial for mitigating nuisance eutrophication symptoms, such as cyanobacterial blooms. Macrophytes and phytoplankton, however, can directly utilize P from the sediment for growth. Accordingly, a comprehensive analysis of the P bioavailability in lake sediment amended with two promising P-inactivation agents, namely Phoslock(®) and drinking water treatment residue (DWTR), was investigated in both short- and long-term studies (20 and 180 d). Phosphorus-availability was assessed using six chemical extraction methods and Hydrilla verticillata and Microcystis aeruginosa growth tests. The results showed that Phoslock(®) and DWTR significantly reduced mobile P (NH4Cl and Na2S2O4/NaHCO3 extractable P) in lake sediment, while P bioavailability that was assessed by different methods showed considerable deviations. Interestingly, appropriate bioavailable P chemical extraction methods were determined based on linear correlation analysis, and further comparison indicated that reduction of bioavailable P by DWTR (P) and Phoslock(®) (P) were clearly less than the mobile P immobilization (>75%) at recommended dosages, which was probably caused by the capability of macrophyte and cyanobacteria to utilize various fractions of P (except the residual P) in amended sediment under proper illumination. Therefore, DWTR and Phoslock(®) can effectively reduce P release from lake sediment, but the potential bioavailable P may pose uncertainties for eutrophication control in lakes that typically have regular sediment re-suspension. Overall, an evaluation of the bioavailable P pool in the lake ecosystem should be essential for successful lake geo-engineering.

  17. Application of mobile agent in IOT%物联网中移动代理的应用研究

    Institute of Scientific and Technical Information of China (English)

    魏葆春

    2013-01-01

    通过对物联网网络管理技术的研究,分析了物联网网络管理中存在的问题。针对物联网无线化、移动化的发展趋势,给出了基于分布式网络代理管理模型,该模型通过引入移动代理技术,能够使之更好地适应物联网的管理需求。%The problems existing in IOT network management are analyzed on the basis of research on the network management technology of IOT. A management model based on the distributed network proxy was established in allusion to the development trend of IOT wireless running and mobilization. The model can adapt to the management demands of IOT much better through introduction of the mobile agent technology.

  18. Cooperative Multi-Agent Mobile Sensor Platforms for Jet Engine Inspection: Concept and Implementation

    Science.gov (United States)

    Litt, Jonathan S.; Wong, Edmond; Krasowski, Michael J.; Greer, Lawrence C.

    2003-01-01

    Cooperative behavior algorithms utilizing swarm intelligence are being developed for mobile sensor platforms to inspect jet engines on-wing. Experiments are planned in which several relatively simple autonomous platforms will work together in a coordinated fashion to carry out complex maintenance-type tasks within the constrained working environment modeled on the interior of a turbofan engine. The algorithms will emphasize distribution of the tasks among multiple units; they will be scalable and flexible so that units may be added in the future; and will be designed to operate on an individual unit level to produce the desired global effect. This proof of concept demonstration will validate the algorithms and provide justification for further miniaturization and specialization of the hardware toward the true application of on-wing in situ turbine engine maintenance.

  19. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2013-11-01

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersion of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.

  20. Application of Mobile Agent in Network Flow Control%移动Agent在网络流量控制中的应用

    Institute of Scientific and Technical Information of China (English)

    张卫华; 徐海水

    2013-01-01

      提出采用移动代理(mobile agent)的网管框架,将代理支撑环境驻留在设备上,替代功能固定的代理,网管中心根据实际网络状态选择适当功能的代理程序发送到设备,在代理运行环境中生成程序实例(instance),完成预期功能,移动代理不仅收集而且能够自主处理数据,从而加快响应速度,减轻网管中心负载,优化网络流量控制。阐述移动代理的结构,控制问题,以及用于网络流量管理的系统框架和原型的实现。%Uses the mobile agent to build up a network management framework, and puts the support en-vironment of the agent on the equipment to replace the function fixed agent. Network manage-ment center selects an appropriate agent program which is based on the actual network status to send to the device, and the program will be generated as an instance to complete the expected functions. Mobile agent not only collect but also process data by itself, so it can speed up the response, and ease the load of network management center, all of this can optimize network flow control. Describes the structure of the mobile agent, and how to control it, as well as the frame-work and the prototype implementation of network flow management system.

  1. Internet移动代理技术中的安全性研究%Study on security of Internet mobile agents technology

    Institute of Scientific and Technical Information of China (English)

    王常杰; 张方国; 王育民

    2001-01-01

    主要针对Internet的移动代理技术中的安全问题进行研究,介绍了移动代理技术的概念及目前主要的应用范畴,对该技术中的安全问题作了系统的分析.另外,对现有的移动代理系统的安全性能作了全面的比较,提出了后续的研究方向.%A research of security of Internet mobile agents technology ispresent in the paper. The conception of mobile agents and its main applications are introduced first and then we analyze the secruity questions in the mobile agents systems comprehensively. In addition, a general comparison of the security performance of the exiting mobile agents systems is given. As a result, we suggest the future study about the technology.

  2. Inexpensive CO2 Thickening Agents for Improved Mobility Control of CO2 Floods

    Energy Technology Data Exchange (ETDEWEB)

    Robert Enick; Eric Beckman; Andrew Hamilton

    2005-08-31

    The objective of this research was the design, synthesis and evaluation of inexpensive, non-fluorous carbon dioxide thickening agents. We followed the same strategy employed in the design of fluorinated CO{sub 2} polymeric thickeners. First, a highly CO{sub 2}-philic, hydrocarbon-based monomer was to be identified. Polymers or oligomers of this monomer were then synthesized. The second step was to design a CO{sub 2}-thickener based on these CO{sub 2}-philic polymers. Two types of thickeners were considered. The first was a copolymer in which the CO{sub 2}-philic monomer was combined with a small proportion of CO{sub 2}-phobic associating groups that could cause viscosity-enhancing intermolecular interactions to occur. The second was a small hydrogen-bonding compound with urea groups in the core to promote intermolecular interactions that would cause the molecules to 'stack' in solution while the arms were composed of the CO{sub 2}-philic oligomers. Although we were not able to develop a viable thickener that exhibited high enough CO{sub 2} solubility at EOR MMP conditions to induce a viscosity increase, we made significant progress in our understanding of CO{sub 2}-soluble compounds that can be used in subsequent studies to design CO{sub 2}-soluble thickeners or CO{sub 2}-soluble surfactant-based foaming agents. These findings are detailed in this final report. In summary, we assessed many polymers and verified that the most CO{sub 2}-soluble oxygenated hydrocarbon polymer is poly(vinyl acetate), PVAc. This is primarily due to the presence of both ether and carbonyl oxygens associated with acetate-rich compounds. In addition to polymers, we also made small acetate-rich molecules that were also capable of associating in solution via the inclusion of hydrogen-bonding groups in hopes of forming viscosity-enhancing macromolecules. Despite the presence of multiple acetate groups in these compounds, which can impart incredible CO{sub 2}-solubility to many

  3. 一种基于绑定邮箱的可靠移动Agent通信算法%Reliable Mobile Agent Communication Algorithm Based on Binding Mailbox

    Institute of Scientific and Technical Information of China (English)

    闫七斐; 惠晓威; 卢永

    2011-01-01

    In recent years, mobile Agent communications algorithm has been the focus of the study.This paper analyzes several mobile Agent communication algorithms and puts forward a reliable, secure, flexible and optimal utilization of message binding mailbox Agent communication algorithms based on previous studies.%移动Agent通信算法一直是近些年研究的重点.通过分析几种移动Agent通信机制,并且在总结前人研究的基础上,提出了一种可靠、安全、灵活和消息利用率最优的邮箱绑定Agent通信算法.

  4. Uniformity pattern and related criteria for two-level factorials

    Institute of Scientific and Technical Information of China (English)

    FANG; Kaitai; QIN; Hong

    2005-01-01

    In this paper,the study of projection properties of two-level factorials in view of geometry is reported.The concept of uniformity pattern is defined.Based on this new concept,criteria of uniformity resolution and minimum projection uniformity are proposed for comparing two-level factorials.Relationship between minimum projection uniformity and other criteria such as minimum aberration,generalized minimum aberration and orthogonality is made explict.This close relationship raises the hope of improving the connection between uniform design theory and factorial design theory.Our results provide a justification of orthogonality,minimum aberration,and generalized minimum aberration from a natural geometrical interpretation.

  5. 采用增量时间戳安全技术的Mobile Agent系统%Mobile Agent System by Incremental Timestamp Security Technique

    Institute of Scientific and Technical Information of China (English)

    万燕; 孙永强; 朱向华; 唐进

    2002-01-01

    安全技术决定了Mobile Agent的实用性,其主要解决的问题是防范恶意Mobile Agent的重复攻击和越权攻击.在介绍了Mobile Agent的概念、特点及安全的重要性的基础上,提出了增量时间戳的概念及优点,并给出了具体例证.采用增量时间戳的Mobile Agent系统能够较好地避免执行系统受到恶意Mobile Agent的损害.增量时间戳技术已经在基于Lucent公司的Inferno系统上开发的Mobile Agent系统中得到了验证和实现.

  6. Mobile agent技术在互联网信息检索应用的探讨%Application of Mobile Agent in the Information Retrieval of Internet

    Institute of Scientific and Technical Information of China (English)

    李虹

    2008-01-01

    本文在介绍了mobile agent技术概况的基础上,提出了基于mobile agent的并行互联网信息检索方式,并建立了一种基于mobile agent的并行信息检索的框架及流程.并对其未来发展提出了展望.

  7. Design and Simulation of Material-Integrated Distributed Sensor Processing with a Code-Based Agent Platform and Mobile Multi-Agent Systems

    Directory of Open Access Journals (Sweden)

    Stefan Bosse

    2015-02-01

    Full Text Available Multi-agent systems (MAS can be used for decentralized and self-organizing data processing in a distributed system, like a resource-constrained sensor network, enabling distributed information extraction, for example, based on pattern recognition and self-organization, by decomposing complex tasks in simpler cooperative agents. Reliable MAS-based data processing approaches can aid the material-integration of structural-monitoring applications, with agent processing platforms scaled to the microchip level. The agent behavior, based on a dynamic activity-transition graph (ATG model, is implemented with program code storing the control and the data state of an agent, which is novel. The program code can be modified by the agent itself using code morphing techniques and is capable of migrating in the network between nodes. The program code is a self-contained unit (a container and embeds the agent data, the initialization instructions and the ATG behavior implementation. The microchip agent processing platform used for the execution of the agent code is a standalone multi-core stack machine with a zero-operand instruction format, leading to a small-sized agent program code, low system complexity and high system performance. The agent processing is token-queue-based, similar to Petri-nets. The agent platform can be implemented in software, too, offering compatibility at the operational and code level, supporting agent processing in strong heterogeneous networks. In this work, the agent platform embedded in a large-scale distributed sensor network is simulated at the architectural level by using agent-based simulation techniques.

  8. Design and simulation of material-integrated distributed sensor processing with a code-based agent platform and mobile multi-agent systems.

    Science.gov (United States)

    Bosse, Stefan

    2015-02-16

    Multi-agent systems (MAS) can be used for decentralized and self-organizing data processing in a distributed system, like a resource-constrained sensor network, enabling distributed information extraction, for example, based on pattern recognition and self-organization, by decomposing complex tasks in simpler cooperative agents. Reliable MAS-based data processing approaches can aid the material-integration of structural-monitoring applications, with agent processing platforms scaled to the microchip level. The agent behavior, based on a dynamic activity-transition graph (ATG) model, is implemented with program code storing the control and the data state of an agent, which is novel. The program code can be modified by the agent itself using code morphing techniques and is capable of migrating in the network between nodes. The program code is a self-contained unit (a container) and embeds the agent data, the initialization instructions and the ATG behavior implementation. The microchip agent processing platform used for the execution of the agent code is a standalone multi-core stack machine with a zero-operand instruction format, leading to a small-sized agent program code, low system complexity and high system performance. The agent processing is token-queue-based, similar to Petri-nets. The agent platform can be implemented in software, too, offering compatibility at the operational and code level, supporting agent processing in strong heterogeneous networks. In this work, the agent platform embedded in a large-scale distributed sensor network is simulated at the architectural level by using agent-based simulation techniques.

  9. Express analysis of explosives, chemical warfare agents and drugs with multicapillary column gas chromatography and ion mobility increment spectrometry.

    Science.gov (United States)

    Buryakov, Igor A

    2004-02-05

    Description of a gas chromatograph designed for express analysis of explosives (2,4-dinitrotoluene, 2,4,6-trinitrotoluene, pentaerythritol tetranitrate), chemical warfare agents (mustard gas, lewisite, sarin) and drugs (heroin, cocaine hydrochloride, crack) is given. The devices comprises a multicapillary chromatographic column and an ion mobility increment spectrometer (MCC-IMIS). The main analytical characteristics of an IMIS (estimated detection limit (DL), linear dynamic range (LDR), speed of response) and a chromatographic column (separation power, degree of separation, a number of possible peaks at a chromatogram section, divided by analysis time) are determined. The maximum value of DL equal to 5 pg/ml was registered for cis-alpha-LW, and the lowest one of 0.001 pg/ml was for cocaine. The maximum value of LDR equal to 1000 was registered for sarin and the lowest one of 150 was for the ions of lewisite. Speed of response of one compound detection with the IMIS was 0.7 s.

  10. A Comprehensive Guide to Factorial Two-Level Experimentation

    CERN Document Server

    Mee, Robert

    2009-01-01

    Statistical design of experiments is useful in virtually every quantitative field. This book focuses on two-level factorial designs that provide efficient plans for exploring the effects of many factors at once. It is suitable for engineers, physical scientists, and those who conduct experiments.

  11. Modulated two-level system: exact work statistics.

    Science.gov (United States)

    Verley, Gatien; Van den Broeck, Christian; Esposito, Massimiliano

    2013-09-01

    We consider an open two-level system driven by a piecewise constant periodic field and described by a rate equation with Fermi, Bose, and Arrhenius rates, respectively. We derive an analytical expression for the generating function and large deviation function of the work performed by the field and show that a work fluctuation theorem holds.

  12. Two-level convolution formula for nuclear structure function

    Science.gov (United States)

    Ma, Boqiang

    1990-05-01

    A two-level convolution formula for the nuclear structure function is derived in considering the nucleus as a composite system of baryon-mesons which are also composite systems of quark-gluons again. The results show that the European Muon Colaboration effect can not be explained by the nuclear effects as nucleon Fermi motion and nuclear binding contributions.

  13. THE TWO-LEVEL MODEL AT FINITE-TEMPERATURE

    Energy Technology Data Exchange (ETDEWEB)

    Goodman, A.L.

    1980-07-01

    The finite-temperature HFB cranking equations are solved for the two-level model. The pair gap, moment of inertia and internal energy are determined as functions of spin and temperature. Thermal excitations and rotations collaborate to destroy the pair correlations. Raising the temperature eliminates the backbending effect and improves the HFB approximation.

  14. Two-Level Automatic Adaptation of a Distributed User Profile for Personalized News Content Delivery

    Directory of Open Access Journals (Sweden)

    Maria Papadogiorgaki

    2008-01-01

    Full Text Available This paper presents a distributed client-server architecture for the personalized delivery of textual news content to mobile users. The user profile consists of two separate models, that is, the long-term interests are stored in a skeleton profile on the server and the short-term interests in a detailed profile in the handset. The user profile enables a high-level filtering of available news content on the server, followed by matching of detailed user preferences in the handset. The highest rated items are recommended to the user, by employing an efficient ranking process. The paper focuses on a two-level learning process, which is employed on the client side in order to automatically update both user profile models. It involves the use of machine learning algorithms applied to the implicit and explicit user feedback. The system's learning performance has been systematically evaluated based on data collected from regular system users.

  15. Handheld and mobile hyperspectral imaging sensors for wide-area standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Gardner, Charles W.; Nelson, Matthew P.

    2016-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the investigation and analysis of targets in complex background with a high degree of autonomy. HSI is beneficial for the detection of threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Two HSI techniques that have proven to be valuable are Raman and shortwave infrared (SWIR) HSI. Unfortunately, current generation HSI systems have numerous size, weight, and power (SWaP) limitations that make their potential integration onto a handheld or field portable platform difficult. The systems that are field-portable do so by sacrificing system performance, typically by providing an inefficient area search rate, requiring close proximity to the target for screening, and/or eliminating the potential to conduct real-time measurements. To address these shortcomings, ChemImage Sensor Systems (CISS) is developing a variety of wide-field hyperspectral imaging systems. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focused on sensor design and detection results.

  16. 基于Java语言的Mobile Agent实施方案%An Implementation Scheme of Mobile Agent Based on Java

    Institute of Scientific and Technical Information of China (English)

    杨晟; 魏海平; 吴兴

    2002-01-01

    与传统的分布式计算相比较,Mobile Agent模型无疑具有更广泛的发展前景.它采用面向对象的思想使Agent具有了类的一切特性.其中,事件驱动是Mobile Agent完成用户给定任务的根本保障.通常情况下,为了完成某项任务Agent要在网络(可能是异构网络)中频繁移动,而在移动过程中Agent又必须考虑自身及Agnet平台的安全问题,这些都对Mobile Agent的实现提出了更高的要求.Java语言由于其对移动代码的支持和高度的安全性使它成为开发Moblie Agnet的首选工具.以Java语言为基础,提出了Mobile Agent模型的一种可行性实施方案,并制定了相应的Mobile Agent模块,从而为Mobile Agent的实现开辟了新的途径.

  17. Round table discussion on - Development of competency-based two-level curricula in Meteorology (TEMPUS JEP 26005-2005 COMBAT-METEO)

    Science.gov (United States)

    Bashmakova, I.; Belotserkovsky, A.; Ivanov, V.; Karlin, L.; Petrosyan, A.; Room, R.; Serditova, N.; Tyuryakov, S.; Zilitinkevich, S.

    2009-09-01

    The project in question (http://www.combat-meteo.net/) aims to provide the basis for the reform of the system of higher education in the area of hydrometeorology in the Russian Federation to comply with the Bologna Declaration. In this regard, the project puts the following specific objectives: 1. To develop internationally recognized competency-based two-level (Bachelor / Master) curricula in meteorology by December 2007. 2. To transform existing and to develop new syllabi supported by teaching materials according to the developed two-level curricula by December 2008. 3. To implement the developed competency-based two-level curricula in meteorology at Russian State Hydro-meteorological University and universities-members of Academic Association of Russian Universities in hydrometeorology by September 2009. These objectives are met by the consortium headed by the University of Helsinki (Finland) including the University of Tartu (Estonia), the Academic Association of Russian Universities in Hydrometeorology (Russia), the Faculty of Geography of the Moscow State University (Russia) and the State Environmental University (Ukraine), with the Russian State Hydrometeorological University (Russia) as target institution. The project provides opportunities for retraining of academic and administrative staff from target universities in the consortium EU universities, as well as for bidirectional student mobility. The project results in teaching meteorology in Russia according to competency-based two-level curricula that will start by 01 September, 2009.

  18. Application of Surfactant Micellar Solutions as Extractants and Mobile Phases for TLC-Determination of Purine Bases and Doping Agents in Biological Liquids

    Directory of Open Access Journals (Sweden)

    Daria Victorovna Yedamenko

    2015-04-01

    Full Text Available Separation of caffeine and its metabolites (theophylline and theobromine and doping agents (spironolactone, propranolol, and ephedrine and determination of caffeine in serum sample and propranolol and ephedrine in urine were studied on normal-phase thin layers (“Sorbfil-UV-254”. Aqueous organic solvents and aqueous micellar surfactant solutions were compared as the mobile phases for separation. The acceptable separation of purine bases and doping agents was achieved by micellar Thin Layer Chromatography and normal-phase Thin Layer Chromatography. Anionic surfactant solution with added 1-propanol was the best eluent as for caffeine, theophylline, and theobromine separation, as for doping agents. The best characteristics of caffeine extraction from serum, and propranolol and ephedrine from urine were achieved when micellar eluent based on non-ionic Tween-80 surfactant was used. DOI: http://dx.doi.org/10.17807/orbital.v7i1.632

  19. Possible Minkowskian Language in Two-level Systems

    CERN Document Server

    Kim, Y S

    2008-01-01

    One hundred years ago, in 1908, Hermann Minkowski completed his proof that Maxwell's equations are covariant under Lorentz transformations. During this process, he introduced a four-dimensional space called the Minkowskian space. In 1949, P. A. M. Dirac showed the Minkowskian space can be handled with the light-cone coordinate system with squeeze transformations. While the squeeze is one of the fundamental mathematical operations in optical sciences, it could serve useful purposes in two-level systems. Some possibilities are considered in this report. It is shown possible to cross the light-cone boundary in optical and two-level systems while it is not possible in Einstein's theory of relativity.

  20. Model discrimination for dephasing two-level systems

    Energy Technology Data Exchange (ETDEWEB)

    Gong, Er-ling [Department of Automatic Control, College of Mechatronic Engineering and Automation, National University of Defense Technology, Changsha, Hunan 410073 (China); College of Science (Physics), Swansea University, Singleton Park, Swansea, SA2 8PP (United Kingdom); Zhou, Weiwei [Department of Automatic Control, College of Mechatronic Engineering and Automation, National University of Defense Technology, Changsha, Hunan 410073 (China); Schirmer, Sophie, E-mail: sgs29@swan.ac.uk [College of Science (Physics), Swansea University, Singleton Park, Swansea, SA2 8PP (United Kingdom)

    2015-02-06

    The problem of model discriminability and parameter identifiability for dephasing two-level systems subject to Hamiltonian control is studied. Analytic solutions of the Bloch equations are used to derive explicit expressions for observables as functions of time for different models. This information is used to give criteria for model discrimination and parameter estimation based on simple experimental paradigms. - Highlights: • Analytic expressions for observables of driven, dephasing two-level systems. • Distinguishability of dephasing models via Rabi-oscillation experiments. • General identifiability of model parameters and cases of failure. • Application to empirically determine of effect of driving on dephasing basis. • Importance for optimal design of coherent controls for qubits subject to dephasing.

  1. Clustering DTDs: An Interactive Two-Level Approach

    Institute of Scientific and Technical Information of China (English)

    周傲英; 钱卫宁; 钱海蕾; 张龙; 梁宇奇; 金文

    2002-01-01

    XML (eXtensible Markup Language) is a standard which is widely appliedin data representation and data exchange. However, as an important concept of XML, DTD(Document Type Definition) is not taken full advantage in current applications. In this paper, anew method for clustering DTDs is presented, and it can be used in XML document clustering.The two-level method clusters the elements in DTDs and clusters DTDs separately. Elementclustering forms the first level and provides element clusters, which are the generalization ofrelevant elements. DTD clustering utilizes the generalized information and forms the secondlevel in the whole clustering process. The two-level method has the following advantages: 1) Ittakes into consideration both the content and the structure within DTDs; 2) The generalizedinformation about elements is more useful than the separated words in the vector model; 3) Thetwo-level method facilitates the searching of outliers. The experiments show that this methodis able to categorize the relevant DTDs effectively.

  2. Berry phase in a generalized nonlinear two-level system

    Institute of Scientific and Technical Information of China (English)

    Liu Ji-Bing; Li Jia-Hua; Song Pei-Jun; Li Wei-Bin

    2008-01-01

    In this paper,we investigate the behaviour of the geometric phase of a more generalized nonlinear system composed of an effective two-level system interacting with a single-mode quantized cavity field.Both the field nonlinearity and the atom-field coupling nonlinearity are considered.We find that the geometric phase depends on whether the index k is an odd number or an even number in the resonant case.In addition,we also find that the geometric phase may be easily observed when the field nonlinearity is not considered.The fractional statistical phenomenon appears in this system if the strong nonlinear atom-field coupling is considered.We have also investigated the geometric phase of an effective two-level system interacting with a two-mode quantized cavity field.

  3. Two-level method with coarse space size independent convergence

    Energy Technology Data Exchange (ETDEWEB)

    Vanek, P.; Brezina, M. [Univ. of Colorado, Denver, CO (United States); Tezaur, R.; Krizkova, J. [UWB, Plzen (Czech Republic)

    1996-12-31

    The basic disadvantage of the standard two-level method is the strong dependence of its convergence rate on the size of the coarse-level problem. In order to obtain the optimal convergence result, one is limited to using a coarse space which is only a few times smaller than the size of the fine-level one. Consequently, the asymptotic cost of the resulting method is the same as in the case of using a coarse-level solver for the original problem. Today`s two-level domain decomposition methods typically offer an improvement by yielding a rate of convergence which depends on the ratio of fine and coarse level only polylogarithmically. However, these methods require the use of local subdomain solvers for which straightforward application of iterative methods is problematic, while the usual application of direct solvers is expensive. We suggest a method diminishing significantly these difficulties.

  4. Research on dynamic routing problems of mobile agent in Web search engine%Web搜索引擎中Mobile Agent动态路由问题研究

    Institute of Scientific and Technical Information of China (English)

    胡庆华

    2003-01-01

    随着Internet的发展,Web上大量、分布、动态的信息导致了"信息过载",传统搜索引擎面临严峻的挑战.目前对Mobile Agent系统的理论与应用研究已成为一个热点前沿课题.本文对Web搜索引擎中Mobile Agent动态路由问题进行了研究.

  5. Franson Interference Generated by a Two-Level System

    Science.gov (United States)

    Peiris, M.; Konthasinghe, K.; Muller, A.

    2017-01-01

    We report a Franson interferometry experiment based on correlated photon pairs generated via frequency-filtered scattered light from a near-resonantly driven two-level semiconductor quantum dot. In contrast to spontaneous parametric down-conversion and four-wave mixing, this approach can produce single pairs of correlated photons. We have measured a Franson visibility as high as 66%, which goes beyond the classical limit of 50% and approaches the limit of violation of Bell's inequalities (70.7%).

  6. Quantum modeling of two-level photovoltaic systems

    Science.gov (United States)

    Aram, Tahereh Nemati; Asgari, Asghar; Ernzerhof, Matthias; Quémerais, Pascal; Mayou, Didier

    2017-06-01

    We present a quantum formalism that provides a quantitative picture of the fundamental processes of charge separation that follow an absorption event. We apply the formalism to two-level photovoltaic cells and our purpose is to pedagogically explain the main aspects of the model. The formalism is developed in the energy domain and provides detailed knowledge about existence or absence of localized states and their effects on electronic structure and photovoltaic yield.

  7. Two-level systems driven by large-amplitude fields

    Science.gov (United States)

    Nori, F.; Ashhab, S.; Johansson, J. R.; Zagoskin, A. M.

    2009-03-01

    We analyze the dynamics of a two-level system subject to driving by large-amplitude external fields, focusing on the resonance properties in the case of driving around the region of avoided level crossing. In particular, we consider three main questions that characterize resonance dynamics: (1) the resonance condition, (2) the frequency of the resulting oscillations on resonance, and (3) the width of the resonance. We identify the regions of validity of different approximations. In a large region of the parameter space, we use a geometric picture in order to obtain both a simple understanding of the dynamics and quantitative results. The geometric approach is obtained by dividing the evolution into discrete time steps, with each time step described by either a phase shift on the basis states or a coherent mixing process corresponding to a Landau-Zener crossing. We compare the results of the geometric picture with those of a rotating wave approximation. We also comment briefly on the prospects of employing strong driving as a useful tool to manipulate two-level systems. S. Ashhab, J.R. Johansson, A.M. Zagoskin, F. Nori, Two-level systems driven by large-amplitude fields, Phys. Rev. A 75, 063414 (2007). S. Ashhab et al, unpublished.

  8. Two-level leader-follower organization in pigeon flocks

    Science.gov (United States)

    Chen, Zhiyong; Zhang, Hai-Tao; Chen, Xi; Chen, Duxin; Zhou, Tao

    2015-10-01

    The most attractive trait of collective animal behavior is the emergence of highly ordered structures (Cavagna A., Giardina I. and Ginelli F., Phys. Rev. Lett., 110 (2013) 168107). It has been conjectured that the interaction mechanism in pigeon flock dynamics follows a hierarchical leader-follower influential network (Nagy M., Ákos Z., Biro D. and Vicsek T., Nature, 464 (2010) 890). In this paper, a new observation is reported that shows that pigeon flocks actually adopt a much simpler two-level interactive network composed of one leader and some followers. By statistically analyzing the same experimental dataset, we show that for a certain period of time a sole leader determines the motion of the flock while the remaining birds are all followers directly copying the leader's direction with specific time delays. This simple two-level despotic organization is expected to save both motional energy and communication cost, while retaining agility and robustness of the whole group. From an evolutionary perspective, our results suggest that a two-level organization of group flight may be more efficient than a multilevel topology for small pigeon flocks.

  9. The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home

    NARCIS (Netherlands)

    Nasution, S.; Suryana, N.; Shahib, S.; Abu, N.A.; Hartel, P.H.; Gómez Chova, L.; Martí Belenguer, D.; Candel Torres, I.

    2009-01-01

    Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack. The possibility for multi-hop agents to be malicious is higher compared to the one-hop or two-hop boome

  10. A Two-Level Spreading-despreading CDMA System and Its Performance Evaluation

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    A new two-level spreading-despreading scheme is presented in this paper. By adopting the two-level scheme, the Generalized Orthogonal (GO) zone of GO codes can be utilized. In this paper, the forward link of a multi-cell CDMA system employing the two-level scheme is presented and analyzed. The BER performance obtained by Gaussian Approximation is compared with that of the conventional single-level spreading-despreading system. The results reveal that the two*$-level CDMA system introduced in this paper exhibits larger performance gain when time delay can be restricted within a given zone.

  11. Mobile Probes in Mobile Learning

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Blomhøj, Ulla; Duvaa, Uffe

    as an agent for acquiring empirical data (as the situation in hitherto mobile probe settings) but was also the technological medium for which data should say something about (mobile learning). Consequently, not only the content of the data but also the ways in which data was delivered and handled, provided......In this paper experiences from using mobile probes in educational design of a mobile learning application is presented. The probing process stems from the cultural probe method, and was influenced by qualitative interview and inquiry approaches. In the project, the mobile phone was not only acting...... a valuable dimension for investigating mobile use. The data was collected at the same time as design activities took place and the collective data was analysed based on user experience goals and cognitive processes from interaction design and mobile learning. The mobile probe increased the knowledge base...

  12. A Two-Level Method for Nonsymmetric Eigenvalue Problems

    Institute of Scientific and Technical Information of China (English)

    Karel Kolman

    2005-01-01

    A two-level discretization method for eigenvalue problems is studied. Compared to the standard Galerkin finite element discretization technique performed on a fine grid this method discretizes the eigenvalue problem on a coarse grid and obtains an improved eigenvector (eigenvalue) approximation by solving only a linear problem on the fine grid (or two linear problems for the case of eigenvalue approximation of nonsymmetric problems). The improved solution has the asymptotic accuracy of the Galerkin discretization solution. The link between the method and the iterated Galerkin method is established. Error estimates for the general nonsymmetric case are derived.

  13. Ultra-short strong excitation of two-level systems

    Science.gov (United States)

    Jha, Pankaj K.; Eleuch, Hichem; Grazioso, Fabio

    2014-11-01

    We present a model describing the use of ultra-short strong pulses to control the population of the excited level of a two-level quantum system. In particular, we study an off-resonance excitation with a few cycles pulse which presents a smooth phase jump i.e. a change of the pulse's phase which is not step-like, but happens over a finite time interval. A numerical solution is given for the time-dependent probability amplitude of the excited level. The control of the excited level's population is obtained acting on the shape of the phase transient, and other parameters of the excitation pulse.

  14. Ultra-short strong excitation of two-level systems

    OpenAIRE

    2013-01-01

    We present a model describing the use of ultra-short strong pulses to control the population of the excited level of a two-level quantum system. In particular, we study an off-resonance excitation with a few cycles pulse which presents a smooth phase jump i.e. a change of the pulse's phase which is not step-like, but happens over a finite time interval. A numerical solution is given for the time-dependent probability amplitude of the excited level. The control of the excited level's populatio...

  15. Levitated nanoparticle as a classical two-level atom [Invited

    Science.gov (United States)

    Frimmer, Martin; Gieseler, Jan; Ihn, Thomas; Novotny, Lukas

    2017-06-01

    The center-of-mass motion of a single optically levitated nanoparticle resembles three uncoupled harmonic oscillators. We show how a suitable modulation of the optical trapping potential can give rise to a coupling between two of these oscillators, such that their dynamics are governed by a classical equation of motion that resembles the Schr\\"odinger equation for a two-level system. Based on experimental data, we illustrate the dynamics of this parametrically coupled system both in the frequency and in the time domain. We discuss the limitations and differences of the mechanical analogue in comparison to a true quantum mechanical system.

  16. Negative spontaneous emission by a moving two-level atom

    Science.gov (United States)

    Lannebère, Sylvain; Silveirinha, Mário G.

    2017-01-01

    In this paper we investigate how the dynamics of a two-level atom is affected by its interaction with the quantized near field of a plasmonic slab in relative motion. We demonstrate that for small separation distances and a relative velocity greater than a certain threshold, this interaction can lead to a population inversion, such that the probability of the excited state exceeds the probability of the ground state, corresponding to a negative spontaneous emission rate. It is shown that the developed theory is intimately related to a classical problem. The problem of quantum friction is analyzed and the differences with respect to the corresponding classical effect are highlighted.

  17. Noise from Two-Level Systems in Superconducting Resonators

    Science.gov (United States)

    Neill, C.; Barends, R.; Chen, Y.; Chiaro, B.; Jeffrey, E.; Kelly, J.; Mariantoni, M.; Megrant, A.; Mutus, J.; Ohya, S.; Sank, D.; Vainsencher, A.; Wenner, J.; White, T.; Cleland, A. N.; Martinis, J. M.

    2013-03-01

    Two-level systems (TLSs) present in amorphous dielectrics and surface interfaces are a significant source of decoherence in superconducting qubits. Linear microwave resonators offer a valuable instrument for characterizing the strongly power-dependent response of these TLSs. Using quarter-wavelength coplanar waveguide resonators, we monitored the microwave response of the resonator at a single near-resonant frequency versus time at varying microwave drive powers. We observe a time dependent variation of the resonator's internal dissipation and resonance frequency. The amplitude of these variations saturates with power in a manner similar to loss from TLSs. These results provide a means for quantifying the number and distribution of TLSs.

  18. Variational Study on a Dissipative Two-Level System

    Institute of Scientific and Technical Information of China (English)

    ZHU Wei-Wing; REN Qing-Bao; CHEN Qing-Hu

    2008-01-01

    A new variational approach is proposed to study the ground-state of a two-level system coupled to a dispersionless phonon bath. By the extended coherent state, where the more phonon correlations are easily incorporated, we can obtain very accurate ground state energy and the tunnelling reduction factor in all regime of tunnelling matrix element δo and coupling parameter s. The relative difference between the present ones and those by exact numerical diagonalization is less then 0.001%. In addition, some simple analytical results are given in the limits of δo/s → 0 and ∞.

  19. Os Atores da Mobilizacao por Creches e Pre-Escolas Comunitarias (Mobilizing Agents for Nurseries and Infant Schools).

    Science.gov (United States)

    Filgueiras, Cristina Almeida Cunha

    1995-01-01

    Discusses the role of community nurseries and preschools, within the context of Brazilian popular movements and social policy of the last 15 years. States that the experiences of these organizations reveal great complexity in terms of social, political, and pedagogic mobilization. Concludes that for all involved there are several levels of…

  20. 一种新的基于Mobile Agent的3G VHE架构设计%A Novel Architecture of 3G VHE Based on Mobile Agents

    Institute of Scientific and Technical Information of China (English)

    满成圆; 宋俊德

    2005-01-01

    从移动终端受限性出发,基于Mobile Agent以实现个人移动性,对移动代理平台进行提取,将其作为移动终端操作系统的一部分.提出了使用与WAP协议有良好接口,且扩展性很强的外部功能接口(EFI)实现的移动代理平台以及提供业务和接口的移动代理.并给出了一个使用EFI实现的流媒体下载的实例.

  1. Hot foam for weed control-Do alkyl polyglucoside surfactants used as foaming agents affect the mobility of organic contaminants in soil?

    Science.gov (United States)

    Cederlund, H; Börjesson, E

    2016-08-15

    Use of alkyl polyglucosides (APGs) as a foaming agent during hot water weed control may influence the environmental fate of organic contaminants in soil. We studied the effects of the APG-based foaming agent NCC Spuma (C8-C10) on leaching of diuron, glyphosate, and polycyclic aromatic hydrocarbons (PAHs) in sand columns. We also examined how APG concentration affected the apparent water solubility and adsorption of the herbicides and of the PAHs acenaphthene, acenaphthylene and fluorene. Application of APGs at the recommended concentration of 0.3% did not significantly affect leaching of any of the compounds studied. However, at a concentration of 1.5%, leaching of both diuron and glyphosate was significantly increased. The increased leaching corresponded to an increase in apparent water solubility of diuron and a decrease in glyphosate adsorption to the sand. However, APG addition did not significantly affect the mobility of PAHs even though their apparent water solubility was increased. These results suggest that application of APG-based foam during hot water weed control does not significantly affect the mobility of organic contaminants in soil if used according to recommendations. Moreover, they suggest that APGs could be useful for soil bioremediation purposes if higher concentrations are used.

  2. Two-level hierarchical feature learning for image classification

    Institute of Scientific and Technical Information of China (English)

    Guang-hui SONG; Xiao-gang JIN; Gen-lang CHEN; Yan NIE

    2016-01-01

    In some image classifi cation tasks, similarities among different categories are different and the samples are usually misclassifi ed as highly similar categories. To distinguish highly similar categories, more specifi c features are required so that the classifi er can improve the classifi cation performance. In this paper, we propose a novel two-level hierarchical feature learning framework based on the deep convolutional neural network (CNN), which is simple and effective. First, the deep feature extractors of different levels are trained using the transfer learning method that fi ne-tunes the pre-trained deep CNN model toward the new target dataset. Second, the general feature extracted from all the categories and the specifi c feature extracted from highly similar categories are fused into a feature vector. Then the fi nal feature representation is fed into a linear classifi er. Finally, experiments using the Caltech-256, Oxford Flower-102, and Tasmania Coral Point Count (CPC) datasets demonstrate that the expression ability of the deep features resulting from two-level hierarchical feature learning is powerful. Our proposed method effectively increases the classifi cation accuracy in comparison with fl at multiple classifi cation methods.

  3. Squeezing in the interaction of radiation with two-level atoms

    OpenAIRE

    Bandyopadhyay, Abir; Rai, Jagdish

    1995-01-01

    We propose a simple experimental procedure to produce squeezing and other non-classical properties like photon antibunching of radiation, and amplification without population inversion. The method also decreases the uncertainties of the angular-momentum quadratures representing the two-level atomic system in the interaction of the two-level atoms with quantized radiation.

  4. Maximum Likelihood Analysis of a Two-Level Nonlinear Structural Equation Model with Fixed Covariates

    Science.gov (United States)

    Lee, Sik-Yum; Song, Xin-Yuan

    2005-01-01

    In this article, a maximum likelihood (ML) approach for analyzing a rather general two-level structural equation model is developed for hierarchically structured data that are very common in educational and/or behavioral research. The proposed two-level model can accommodate nonlinear causal relations among latent variables as well as effects…

  5. Analysis of Bullwhip Effect for Two-level Supply Chain with Multi-distributed Centers

    Institute of Scientific and Technical Information of China (English)

    LirongCui

    2004-01-01

    The bullwhip effect is studied for two-level supply chain with multi-distributed centers. First the model for two-level supply chain with multi-distributed centers is established under some assumptions, then the mathematical description is given for it. Finally a simple example is showed to illustrate the results obtained in the paper.

  6. Bargaining Agents in Wireless Contexts: An Alternating-Offers Protocol for Multi-issue Bilateral Negotiation in Mobile Marketplaces

    Science.gov (United States)

    Ragone, Azzurra; Ruta, Michele; di Sciascio, Eugenio; Donini, Francesco M.

    We present an approach to multi-issue bilateral negotiation for mobile commerce scenarios. The negotiation mechanism has been integrated in a semantic-based application layer enhancing both RFID and Bluetooth wireless standards. OWL DL has been used to model advertisements and relationships among issues within a shared common ontology. Finally, non standard inference services integrated with utility theory help in finding suitable agreements. We illustrate and motivate the provided theoretical framework in a wireless commerce case study.

  7. Supporting the Air Mobility Needs of Geographic Combatant Commanders: An Evaluation Using the Principal-Agent Construct

    Science.gov (United States)

    2014-06-01

    respondents the flexibility to explore topics of their choosing. Hypothesis According to John Creswell , author of numerous articles and 22 books on...form of a principal-agent 6 See Appendix A, Interview Questions 7 Creswell , 139. relationship...Chicago Press, 2008. Creswell , John W. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 3rd ed. Thousand Oaks, CA: SAGE

  8. Rapid characterization of microscopic two-level systems using Landau-Zener transitions in a superconducting qubit

    Energy Technology Data Exchange (ETDEWEB)

    Tan, Xinsheng [National Laboratory of Solid State Microstructures, School of Physics, Nanjing University, Nanjing 210093 (China); Department of Physics and Astronomy, University of Kansas, Lawrence, Kansas 66045 (United States); Yu, Haifeng, E-mail: hfyu@nju.edu.cn; Yu, Yang, E-mail: yuyang@nju.edu.cn [National Laboratory of Solid State Microstructures, School of Physics, Nanjing University, Nanjing 210093 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Han, Siyuan [Department of Physics and Astronomy, University of Kansas, Lawrence, Kansas 66045 (United States)

    2015-09-07

    We demonstrate a fast method to detect microscopic two-level systems in a superconducting phase qubit. By monitoring the population leak after sweeping the qubit bias flux, we are able to measure the two-level systems that are coupled with the qubit. Compared with the traditional method that detects two-level systems by energy spectroscopy, our method is faster and more sensitive. This method supplies a useful tool to investigate two-level systems in solid-state qubits.

  9. Mobilities Mobilities

    Directory of Open Access Journals (Sweden)

    César Pompeyo

    2011-12-01

    Full Text Available Urry, John (2007 Mobilities.Oxford: Polity Press.Urry, John (2007 Mobilities.Oxford: Polity Press.John Urry (1946-, profesor en la Universidad de Lancaster, es un sociólogo de sobra conocido y altamente reputado en el panorama internacional de las ciencias sociales. Su dilatada carrera, aparentemente dispersa y diversificada, ha seguido senderos bastante bien definidos dejando tras de sí un catálogo extenso de obras sociológicas de primer nivel. Sus primeros trabajos se centraban en el campo de la teoría social y la filosofía de las ciencias sociales o de la sociología del poder [...

  10. Mobile data offloading: an agent-based modelling study on the effectiveness of Wi-Fi offloading

    OpenAIRE

    Breukers, Yorick; de Reuver, Mark; Oey, Michel; Bouwman, Harry

    2015-01-01

    To reduce the load on cellular networks, offloading to Wi-Fi has long been discussed as a technological solution. Despite advances in scheduling algorithms and incentive schemes, most mobile operators do not actively promote Wi-Fi offloading and most Wi-Fi usage is limited to stationary in-home contexts of use. This study assesses the proportion of users on the street that can be offloaded to Wi-Fi access points, taking into account different city topologies, speed of movement and technical c...

  11. The Security Analyse of the Mobile Agent%移动代理的安全性分析

    Institute of Scientific and Technical Information of China (English)

    翟慧; 李超林

    2007-01-01

    本文介绍了移动Agent(代理)的概念和工作原理,并介绍了它的特点和应用领域,然后详述了移动代理环境,即aglets工作台.最后分析了移动代理存在的安全问题,并提出了一些解决方案.

  12. Optimizing ETL by a Two-level Data Staging Method

    DEFF Research Database (Denmark)

    Iftikhar, Nadeem

    2016-01-01

    In data warehousing, the data from source systems are populated into a central data warehouse (DW) through extraction, transformation and loading (ETL). The standard ETL approach usually uses sequential jobs to process the data with dependencies, such as dimension and fact data. It is a non......-/late-arriving data, and fast-/slowly-changing data. The introduced additional staging area decouples loading process from data extraction and transformation, which improves ETL flexibility and minimizes intervention to the data warehouse. This paper evaluates the proposed method empirically, which shows......-trivial task to process the so-called early-/late-arriving data, which arrive out of order. This paper proposes a two-level data staging area method to optimize ETL. The proposed method is an all-in-one solution that supports processing different types of data from operational systems, including early...

  13. Rabi noise spectroscopy of individual two-level tunneling defects

    Science.gov (United States)

    Matityahu, Shlomi; Lisenfeld, Jürgen; Bilmes, Alexander; Shnirman, Alexander; Weiss, Georg; Ustinov, Alexey V.; Schechter, Moshe

    2017-06-01

    Understanding the nature of two-level tunneling defects is important for minimizing their disruptive effects in various nanodevices. By exploiting the resonant coupling of these defects to a superconducting qubit, one can probe and coherently manipulate them individually. In this work, we utilize a phase qubit to induce Rabi oscillations of single tunneling defects and measure their dephasing rates as a function of the defect's asymmetry energy, which is tuned by an applied strain. The dephasing rates scale quadratically with the external strain and are inversely proportional to the Rabi frequency. These results are analyzed and explained within a model of interacting defects, in which pure dephasing of coherent high-frequency (gigahertz) defects is caused by interaction with incoherent low-frequency thermally excited defects. Our analysis sets an upper bound for the relaxation rates of thermally excited defects interacting strongly with strain fields.

  14. 基于移动Agent技术的Internet模糊信息服务模型%An Internet Fuzzy Information Service Model Base on Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    周斌; 杨文春; 丁永生

    2001-01-01

    This paper proposes an Internet fuzzy information service modelbased on Mobile Agent technology. It describes the overall frame and architecture of the model, the fuzzy indexing algorithm used for intelligent search through Internet, and implementation of a software platform for the model with Java language, which proves effective in experiments.%提出一种基于移动Agent技术的Internet模糊信息服务模型,讨论了其总体工作框架和结构。将模糊检索算法用于Internet信息的智能搜索,给出了信息检索系统的设计方法。用Java语言实现该模型的软件平台,通过实验验证了其可行性。

  15. Spatial Correlation-Based Mobile Agent Routing Algorithm in Wireless Sensor Networks%无线传感器网络中基于空间相关性的移动代理路由算法

    Institute of Scientific and Technical Information of China (English)

    胡海峰; 杨震

    2011-01-01

    资源受限的传感器节点密集分布在无线传感器网络监控区域,sink节点通过收集节点间观测信息对监控区域内发生的事件进行感知.本文提出SCMAR(Spatial Correlation-based Mobile Agent Routing)路由算法,在移动代理架构内,利用节点观测数据的空间相关性以能量有效的方式对感知事件进行估计.仿真结果表明SCMAR在各种应用环境下能量有效性均优于MARDF(Mobile Agent Routes for Data Fusion)路由算法.%Wireless Sensor Networks (WSN) are mainly characterized by dense deployment of resource-constrained sensor nodes which collectively transmit information about sensed events to the sink. In this paper, a Spatial Correlation-based Mobile A gent Routing (SCMAR) algorithm is proposed to exploit the spatial correlation between the sensed data to estimate the event with energy efficient way using the mobile agent paradigm. Hie simulation results show that SCMAR achieves better performance than existing Mobile Agent Routes far Data Fusion (MARDF) routing algorithm from perspectives of energy consumption in a variety of correlated data gathering applications.

  16. Research on Building Data Warehouse by the Means of Mobile Agent Technology%采用移动代理技术建立数据仓库的研究

    Institute of Scientific and Technical Information of China (English)

    钟国祥; 张为群

    2003-01-01

    The thesis sets forth for the policy maker a way of achieving the aim of building model data warehouse based on relation model distributed database by using Mobile Agent technology. According to the design principal of data warehouse and the standard technology,author puts forward forming metadatas by tree pattern or forests strctur-e,giving the definition of metadata. Model and the general principal of combining metadatas to form data warehouse and showing a picture tool of data warehouse designing system. It creates a Mobile Agent orieinal form that can realize the constrction of data warehouse based on relation model distributed database.

  17. Efficiency analysis on a two-level three-phase quasi-soft-switching inverter

    DEFF Research Database (Denmark)

    Geng, Pan; Wu, Weimin; Huang, Min;

    2013-01-01

    for non-conventional inverters with special shoot-through state is introduced and illustrated through the analysis on a special two-level three-phase quasi-soft-switching inverter. Efficiency comparison between the classical two-stage two-level three-phase inverter and the two-level three-phase quasi......-soft-switching inverter is carried out. A 10 kW/380 V prototype is constructed to verify the analysis. The experimental results show that the efficiency of the new inverter is higher than that of the traditional two-stage two- level three-phase inverter....

  18. INEXPENSIVE CO{sub 2} THICKENING AGENTS FOR IMPROVED MOBILITY CONTROL OF CO{sub 2} FLOODS

    Energy Technology Data Exchange (ETDEWEB)

    Robert M. Enick; Eric J. Beckman; Andrew Hamilton

    2004-10-01

    The objective of this research was the design, synthesis and evaluation of inexpensive, nonfluorous carbon dioxide thickening agents. We followed the same strategy employed in the design of fluorinated CO{sub 2} polymeric thickeners. First, a highly CO{sub 2}-philic, hydrocarbon-based monomer was to be identified. Polymers or oligomers of this monomer were then synthesized. The second step was to be completed only when a CO{sub 2}-soluble polymer that was soluble in CO{sub 2} at pressures comparable to the MMP was identified. In the second step, viscosity-enhancing associating groups were to be incorporated into the polymer to make it a viable thickener that exhibited high CO{sub 2} solubility at EOR MMP conditions. This final report documents the CO{sub 2} solubility of a series of commercial and novel polymers composed of carbon, hydrogen, oxygen and, in some cases, nitrogen.

  19. 移动代理人编程技术与移动用戶管理系统探讨(英文)%Maintaining Persistent Look-and-Feel for Roaming User with Mobile Agent in Distributed Environment

    Institute of Scientific and Technical Information of China (English)

    施国琛; 邓有光; 黄德胜; 马建华; 黄润和

    2002-01-01

    Mobile agents refer to self-contained and identifiable computer programs that can migrate along the network and can act on behalf of the user or other agents. Mobile agents often work on heterogeneous network and operating system environment. Therefore, an integrated logical interface to access physical structure via mobile agent application has become more and more urgent. In this paper, we proposed a tracking and persistent agent-based mobility management system in case of distance learning. The main purpose of our system is addressed to achieve the universal access objective. In order to let the whole mobility management system full play, firstly, we proposed a mobile agent communication network model and the mobile agent evolution states. The mobile agent communication network model facilitates the agent computation, and the mobile agent evolution states assist agent supervisor to monitor client agents. Secondly, we encapsulate the utility tools to be a role-setting object. The role-setting object is an application-driven component, which can provide customization benefits for user to match user's demands. These integrated technologies are sufficient in distance learning (virtual university) environment.%有自我控制与辨别身份能力的移动代理人编程技术,不但能够在网路上移动,也能够与其他代理人编程沟通及执行任务.由于移动代理人常常运作于异质的网路或作业系统(operating system)环境下,因此,一个具有整体逻辑性操作界面来存取实体结构的管理系统就显得越发重要.提出了一个能够追踪和维持移动代理人的管理系统,并且应用于远距教学(distance learning).此系统的主要目的在于提供移动代理人通用的存取环境.为了能使此系统完全运作,论述了移动代理人通信网路模组、移动代理人演化阶段来支援管理代理人与用户端代理人.另外,也将移动代理人所使用的工具编程整合成为角色扮演(role

  20. 无线传感网络中使用动态代理的节点收敛算法%Node Coverage Algorithms in Wireless Sensor Networks Using Mobile Agents

    Institute of Scientific and Technical Information of China (English)

    RAINA Manik; KUMAR Subhas; PATRO Ranjeet

    2006-01-01

    This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of global deployment or topology, etc). We propose the algorithms and show mathematical analysis to support our claims. The paper ends with simulation studies and discussion of results.

  1. Information Entropy. and Squeezing of Quantum Fluctuations in a Two-Level Atom

    Institute of Scientific and Technical Information of China (English)

    FANG Mao-Fa; ZHOU Peng; S. Swain

    2000-01-01

    We study the atomic squeezing in the language of the quantum information theory. A rigorous entropy uncertainty relation which suits for characterizing the squeezing of a two-level atoms is obtained, and a general definition of information entropy squeezing in the two-level atoms is given. The information entropy squeezing of two-level atoms interacting with a single-mode quantum field is examined. Our results show that the information entropy is a superior measure of the quantum uncertainty of atomic observable, also is a remarkable good precision measure of atomic squeezing. When the population difference of two-level atom is zero, the definition of atomic squeezing based on the Heisenberg uncertainty relation is trivial, while the definition of information entropy squeezing of the atom based on the entropy uncertainty relation is valid and can provide full information on the atomic squeezing in any cases.

  2. Dispersion management for two-level optically labeled signals in IP-over-WDM networks 4

    DEFF Research Database (Denmark)

    Chi, Nan; Carlsson, Birger; Holm-Nielsen, Pablo Villanueva;

    2002-01-01

    The transmission characteristics of a two-level optically labeled signal with ASK/DPSK modulation are investigated under varying dispersion management. A limitation of extinction ratio and the resilience of fiber span, compensation ratio, and power level are obtained...

  3. A System Architecture of Data Mining in Network based on Mobile Agent and RDF%基于移动Agent及RDF的网络数据挖掘系统体系结构

    Institute of Scientific and Technical Information of China (English)

    吴跃; 王军; 周明天; 王湖南

    2002-01-01

    In this paper,a system architecture of data mining in network-based on the technology of Mobile Agent and RDF is presented.This system architecture provides a standrad and uniform structured data-platform for the concrete data-mining application.Mobile Agent implements the concrete data mining application.The relative technologies of this system architecture are introduced first,then two species of logic architecture of the network based application system are explained.And an accomplished protyping of network-based data mining system architecture is proposed.The comdination of the up-to-date XML/RDF and Mobile Agnet technolgies provides a new method for data mining in network.

  4. Can Hare's two-level utilitarianism overcome the problems facing act-utilitarianism?

    OpenAIRE

    Roberts, Emma

    2012-01-01

    In order to provide a positive defence of utilitarianism, R.M Hare presented his own theory of 'two-level' utilitarianism, claiming that it overcame the main objections directed towards traditional act utilitarianism. This essay firstly outlines the main problems associated with utilitarianism and examines whether Hare's theory is indeed able to successfully overcome them. It then goes on to examine the coherence of two-level utilitarianism itself, and thus determine whether it can provide a ...

  5. Distributed Mobility Management Scheme for Mobile IPv6

    Science.gov (United States)

    Wakikawa, Ryuji; Valadon, Guillaume; Shigechika, Noriyuki; Murai, Jun

    Mobile IPv6 and Network Mobility (NEMO) have been standardized as IP extensions. While these technologies are planned to be adopted by several communities, such as the vehicle, aviation, and cellular industries, Mobile IPv6 has serious deployment issues such as scalability, protocol resilience, and redundancy. In these technologies, a special router called a home agent is introduced to support the movement of mobile nodes. This home agent introduces overlapping, inefficient routes, and becomes a single point of failure and a performance bottleneck. In this paper, a new concept for scalable and dependable mobility management scheme is proposed. Multiple home agents serve the same set of mobile nodes. The Home Agent Reliability protocol and Home Agent migration are introduced to achieve this concept. We also propose an overlay network named a Global Mobile eXchange (GMX) that efficiently handles data traffic from and to mobile nodes, and operates home agents as would an Internet eXchange Point (IXP).

  6. Two-Level Incremental Checkpoint Recovery Scheme for Reducing System Total Overheads

    Science.gov (United States)

    Li, Huixian; Pang, Liaojun; Wang, Zhangquan

    2014-01-01

    Long-running applications are often subject to failures. Once failures occur, it will lead to unacceptable system overheads. The checkpoint technology is used to reduce the losses in the event of a failure. For the two-level checkpoint recovery scheme used in the long-running tasks, it is unavoidable for the system to periodically transfer huge memory context to a remote stable storage. Therefore, the overheads of setting checkpoints and the re-computing time become a critical issue which directly impacts the system total overheads. Motivated by these concerns, this paper presents a new model by introducing i-checkpoints into the existing two-level checkpoint recovery scheme to deal with the more probable failures with the smaller cost and the faster speed. The proposed scheme is independent of the specific failure distribution type and can be applied to different failure distribution types. We respectively make analyses between the two-level incremental and two-level checkpoint recovery schemes with the Weibull distribution and exponential distribution, both of which fit with the actual failure distribution best. The comparison results show that the total overheads of setting checkpoints, the total re-computing time and the system total overheads in the two-level incremental checkpoint recovery scheme are all significantly smaller than those in the two-level checkpoint recovery scheme. At last, limitations of our study are discussed, and at the same time, open questions and possible future work are given. PMID:25111048

  7. Two-level tunneling systems in amorphous alumina

    Science.gov (United States)

    Lebedeva, Irina V.; Paz, Alejandro P.; Tokatly, Ilya V.; Rubio, Angel

    2014-03-01

    The decades of research on thermal properties of amorphous solids at temperatures below 1 K suggest that their anomalous behaviour can be related to quantum mechanical tunneling of atoms between two nearly equivalent states that can be described as a two-level system (TLS). This theory is also supported by recent studies on microwave spectroscopy of superconducting qubits. However, the microscopic nature of the TLS remains unknown. To identify structural motifs for TLSs in amorphous alumina we have performed extensive classical molecular dynamics simulations. Several bistable motifs with only one or two atoms jumping by considerable distance ~ 0.5 Å were found at T=25 K. Accounting for the surrounding environment relaxation was shown to be important up to distances ~ 7 Å. The energy asymmetry and barrier for the detected motifs lied in the ranges 0.5 - 2 meV and 4 - 15 meV, respectively, while their density was about 1 motif per 10 000 atoms. Tuning of motif asymmetry by strain was demonstrated with the coupling coefficient below 1 eV. The tunnel splitting for the symmetrized motifs was estimated on the order of 0.1 meV. The discovered motifs are in good agreement with the available experimental data. The financial support from the Marie Curie Fellowship PIIF-GA-2012-326435 (RespSpatDisp) is gratefully acknowledged.

  8. Structured Learning of Two-Level Dynamic Rankings

    CERN Document Server

    Raman, Karthik; Shivaswamy, Pannaga

    2011-01-01

    For ambiguous queries, conventional retrieval systems are bound by two conflicting goals. On the one hand, they should diversify and strive to present results for as many query intents as possible. On the other hand, they should provide depth for each intent by displaying more than a single result. Since both diversity and depth cannot be achieved simultaneously in the conventional static retrieval model, we propose a new dynamic ranking approach. Dynamic ranking models allow users to adapt the ranking through interaction, thus overcoming the constraints of presenting a one-size-fits-all static ranking. In particular, we propose a new two-level dynamic ranking model for presenting search results to the user. In this model, a user's interactions with the first-level ranking are used to infer this user's intent, so that second-level rankings can be inserted to provide more results relevant for this intent. Unlike for previous dynamic ranking models, we provide an algorithm to efficiently compute dynamic ranking...

  9. Detection of aqueous phase chemical warfare agent degradation products by negative mode ion mobility time-of-flight mass spectrometry [IM(tof)MS].

    Science.gov (United States)

    Steiner, Wes E; Harden, Charles S; Hong, Feng; Klopsch, Steve J; Hill, Herbert H; McHugh, Vincent M

    2006-02-01

    The use of negative ion monitoring mode with an atmospheric pressure ion mobility orthogonal reflector time-of-flight mass spectrometer [IM(tof)MS] to detect chemical warfare agent (CWA) degradation products from aqueous phase samples has been determined. Aqueous phase sampling used a traditional electrospray ionization (ESI) source for sample introduction and ionization. Certified reference materials (CRM) of CWA degradation products for the detection of Schedule 1, 2, or 3 toxic chemicals or their precursors as defined by the chemical warfare convention (CWC) treaty verification were used in this study. A mixture of six G-series nerve related CWA degradation products (EMPA, IMPA, EHEP, IHEP, CHMPA, and PMPA) and their related collision induced dissociation (CID) fragment ions (MPA and EPA) were found in each case to be clearly resolved and detected using the IM(tof)MS instrument in negative ion monitoring mode. Corresponding ions, masses, drift times, K(o) values, and signal intensities for each of the CWA degradation products are reported.

  10. MADIDS:A Novel Distributed IDS Based on Mobile Agent%MADIDS:一种基于移动代理的新型分布式入侵检测系统

    Institute of Scientific and Technical Information of China (English)

    罗光春; 卢显良; 李炯; 张骏

    2003-01-01

    When traditional Intrusion Detection System(IDS) is used to detect and analyze the great flow data transfer in high-speed network,it usually causes the computation bottleneck. This paper presents a new Mobile Agent Distributed IDS(MADIDS) system based on the mobile agents. This system is specifically designed to process the great flow data transfer in high-speed network. In MADIDS,the agents that are set at each node process the data transfer by distributed computation architecture. Meanwhile by using the reconfiguration quality of the mobile agents ,the load balance of distributed computation can be dynamically implemented to gain the high-performance computing ability. This ability makes the detecting and analyzing of high-speed network possible. MADIDS can effectively solve the detection and analysis performance bottleneck caused by the great flow data transfer in high-speed network. It enhances the performance of IDS in high-speed network. In this paper,we construct the infrastructure and theoretical model of MADIDS,and the deficiencies of MADIDS and future research work are also indicated.

  11. 一个基于CORBA和移动智能体的分布式网管集成框架%A Distributed Network Management Architecture Based on CORBA and Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    吴刚; 王怀民; 吴泉源

    2001-01-01

    文中分析了当前主流网管系统在体系结构上的缺陷,阐述了分布对象技术(CORBA)与移动智能体技术各自在网管领域的应用方法与优势.结合这些优势,给出了一个基于CORBA和移动智能体的分布式网管集成框架,并进一步通过实验模拟证实了其可行性.%The increasing scale and complexity of the network are makingnetwork management more and more important. The wide-used network management systems based on SNMP or CMIP adopt a Client/Server paradigm and are characterized by centralization. Due to the simplicity of the manager/agent model, these traditional systems are widely used. But there are also many drawbacks coming with the simplicity and centralization. Analyzing the limitations of the traditional network management systems, the paper describes the benefits of using CORBA and Mobile Agent technology in this field. Common Object Request Broker Architecture (CORBA) comes from OMG for distributed object process and integration. With the distributed object platform ORB, interface definition language IDL, and the abundant common services of CORBA, an open network management system can be constructed easily. The architecture based on CORBA presented in this paper mainly addresses the integratebility, extensibility, reusability, and scalability of distributed network management. It benefits from the large amount of SNMP/CMIP devices and the mature management platform. At the same time, it provides not only an extensible application framework to process all kinds of changes quickly through CORBA's distributed object model, but also the independence of programming language though IDL. And it also does well in information sharing and interoperation between high-level services. A mobile agent is an active computing entity characterized by the autonomous, interactive and mobile properties. Due to the autonomous migration on the heterogeneous network, the mobile agent can agilely decentralize the management

  12. MANET网络中一种基于移动Agent的入侵检测系统%An Intrusion Detection System Based on Mobile Agent for MANET Networks

    Institute of Scientific and Technical Information of China (English)

    张毅; 张秀梅

    2011-01-01

    提出了一种在MANET网络中基于移动Agent的人侵检测系统.介绍了系统的基础算法、体系结构以及工作原理.根据系统的基础算法得到数据报文的最佳传输路径,通过各节点的观察并结合其他节点的观察,判断可疑行为超出了预警范围时,发出告警信号,并采用绕路的措施;之后综合考虑来自各个节点的告警信号,得出最终可靠的结论,并从网络中彻底删除该节点.利用NS-2网络仿真工具模拟了黑洞、虫洞等人侵行为,以及系统对这些行为的对抗,仿真结果表明,本系统具有很高的效率和鲁棒性.%This paper presents an intrusion detection system based on mobile Agent for mobile ad hoc Networks. We introduce the basic algorithm, the system structure and the working theory of the intrusion detection system. The best route can be gotten by the routing algorithm. Learning from the local observed behavior and the neighbor reported behavior, if the rating of malicious behavior exceeds a threshold, the local node send the alert message and use the spare routing. Collecting the alert message from the other nodes, the node concludes the decision and deletes the malicious node from the network. We have done the experiment in simulated environment of NS2 system. We simulate malicious behavior as the black hole and the worm hole. The simulated results show that, the intrusion detection system is very efficient and robust.

  13. Performance of a Two-Level Call Admission Control Scheme for DS-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Abraham O. Fapojuwo

    2007-11-01

    Full Text Available We propose a two-level call admission control (CAC scheme for direct sequence code division multiple access (DS-CDMA wireless networks supporting multimedia traffic and evaluate its performance. The first-level admission control assigns higher priority to real-time calls (also referred to as class 0 calls in gaining access to the system resources. The second level admits nonreal-time calls (or class 1 calls based on the resources remaining after meeting the resource needs for real-time calls. However, to ensure some minimum level of performance for nonreal-time calls, the scheme reserves some resources for such calls. The proposed two-level CAC scheme utilizes the delay-tolerant characteristic of non-real-time calls by incorporating a queue to temporarily store those that cannot be assigned resources at the time of initial access. We analyze and evaluate the call blocking, outage probability, throughput, and average queuing delay performance of the proposed two-level CAC scheme using Markov chain theory. The analytic results are validated by simulation results. The numerical results show that the proposed two-level CAC scheme provides better performance than the single-level CAC scheme. Based on these results, it is concluded that the proposed two-level CAC scheme serves as a good solution for supporting multimedia applications in DS-CDMA wireless communication systems.

  14. Performance of a Two-Level Call Admission Control Scheme for DS-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Fapojuwo Abraham O

    2007-01-01

    Full Text Available We propose a two-level call admission control (CAC scheme for direct sequence code division multiple access (DS-CDMA wireless networks supporting multimedia traffic and evaluate its performance. The first-level admission control assigns higher priority to real-time calls (also referred to as class 0 calls in gaining access to the system resources. The second level admits nonreal-time calls (or class 1 calls based on the resources remaining after meeting the resource needs for real-time calls. However, to ensure some minimum level of performance for nonreal-time calls, the scheme reserves some resources for such calls. The proposed two-level CAC scheme utilizes the delay-tolerant characteristic of non-real-time calls by incorporating a queue to temporarily store those that cannot be assigned resources at the time of initial access. We analyze and evaluate the call blocking, outage probability, throughput, and average queuing delay performance of the proposed two-level CAC scheme using Markov chain theory. The analytic results are validated by simulation results. The numerical results show that the proposed two-level CAC scheme provides better performance than the single-level CAC scheme. Based on these results, it is concluded that the proposed two-level CAC scheme serves as a good solution for supporting multimedia applications in DS-CDMA wireless communication systems.

  15. Secure Tactical Mobile Intelligent Agents

    Science.gov (United States)

    2004-09-30

    Exchange System for Ad Hoc Networks", Eleventh International Workshop on Security Protocols, Cambridge, UK, Apr. 2-4, 2003, Lecture Notes in Computer Science 1.2.8...in Ad hoc Networks ", 3rd International Conference on AD-HOC Networks & Wireless, July 20-22, 2004, Lecture Notes in Computer Science 3158, Springer

  16. J2ME accessing distributed database based on mobile agent%基于移动agent的J2ME分布式数据库访问

    Institute of Scientific and Technical Information of China (English)

    茹蓓; 肖云鹏

    2011-01-01

    J2ME mobile device, as its limited computational and mnemonic ability, does not support database system actually. At present, most systems use J2ME-J2EE-database solution, but the linear solution does not adapt to characteristic of wireless environment such as highly delay and disconnection frequently. By using and extending agent theory, proposed a new method of four layers C/S J2ME accessing distributed database scheme, and developed a prototype system by open source project named Aglets. The result of evaluation shows that the scheme is practical, speedy and robust.%由于移动手持设备有限的计算和存储能力,J2ME没有提供真正意义上的数据库系统,目前大多数系统采用J2ME-J2EE-数据库系统的解决方案,然而这种线性部署并不适合无线计算环境下频繁断接、高延时等特性.通过借鉴移动agent思想并对其功能进行扩充,提出基于移动agent的J2ME分布式数据库四层C/S访问机制,并在开源Aglets平台基础上开发了一个分布式通信录系统原型,实验评估显示该方案有效地提高了J2ME设备对分布式数据库的访问效率和健壮性.

  17. Pyrosequencing reveals the effect of mobilizing agents and lignocellulosic substrate amendment on microbial community composition in a real industrial PAH-polluted soil

    Energy Technology Data Exchange (ETDEWEB)

    Lladó, S., E-mail: llado@biomed.cas.cz [Department of Microbiology, University of Barcelona, Diagonal 645, E-08028 Barcelona (Spain); Institute of Microbiology, Academy of Sciences of the Czech Republic, Vídenská 1083, 142 20 Prague 4 (Czech Republic); Covino, S., E-mail: covino@biomed.cas.cz [Institute of Microbiology, Academy of Sciences of the Czech Republic, Vídenská 1083, 142 20 Prague 4 (Czech Republic); Solanas, A.M., E-mail: asolanas@ub.edu [Department of Microbiology, University of Barcelona, Diagonal 645, E-08028 Barcelona (Spain); Petruccioli, M., E-mail: petrucci@unitus.it [Department for Innovation in Biological, Agro-Food and Forest Systems [DIBAF], University of Tuscia, Via S. Camillo de Lellis snc, 01100 Viterbo (Italy); D’annibale, A., E-mail: dannib@unitus.it [Department for Innovation in Biological, Agro-Food and Forest Systems [DIBAF], University of Tuscia, Via S. Camillo de Lellis snc, 01100 Viterbo (Italy); Viñas, M., E-mail: marc.vinas@irta.cat [GIRO Joint Research Unit IRTA-UPC, Institute of Research and Technology Food and Agriculture [IRTA], Torre Marimon, E-08140 Caldes de Montbui (Spain)

    2015-02-11

    Highlights: • Soil microbial community assessment through classical (MPN) and molecular tools (DGGE and pyrosequencing) is provided. • A failure of exogenous white rot fungi to colonize the polluted soil is shown by DGGE and pyrosequencing. • Surfactant Brij 30 hampers 4-ring PAHs degradation due to toxicity over Actinobacteria and Bacteroidetes populations. • A high prevalence of Fusarium and Scedosporium populations is revealed during soil bioremediation. • Cupriavidus, Mycobacterium and Chithinophagaceae are potential HMW–PAH degraders in the soil. - Abstract: Bacterial and fungal biodiversity throughout different biostimulation and bioaugmentation treatments applied to an industrial creosote-polluted soil were analyzed by means of polyphasic approach in order to gain insight into the microbial community structure and dynamics. Pyrosequencing data obtained from initial creosote polluted soil (after a biopiling step) revealed that Alpha and Gammaproteobacteria were the most abundant bacterial groups, whereas Fusarium and Scedosporium were the main fungal genera in the contaminated soil. At the end of 60-days laboratory scale bioremediation assays, pyrosequencing and DGGE data showed that (i) major bacterial community shifts were caused by the type of mobilizing agent added to the soil and, to a lesser extent, by the addition of lignocellulosic substrate; and (ii) the presence of the non-ionic surfactant (Brij 30) hampered the proliferation of Actinobacteria (Mycobacteriaceae) and Bacteroidetes (Chitinophagaceae) and, in the absence of lignocellulosic substrate, also impeded polycyclic aromatic hydrocarbons (PAHs) degradation. The results show the importance of implementing bioremediation experiments combined with microbiome assessment to gain insight on the effect of crucial parameters (e.g. use of additives) over the potential functions of complex microbial communities harbored in polluted soils, essential for bioremediation success.

  18. Ion mobility spectrometry

    CERN Document Server

    Eiceman, GA

    2005-01-01

    Key Developments for Faster, More Precise Detection Capabilities Driven by the demand for the rapid and advanced detection of explosives, chemical and biological warfare agents, and narcotics, ion mobility spectrometry (IMS) undergone significant refinements in technology, computational capabilities, and understanding of the principles of gas phase ion chemistry and mobility. Beginning with a thorough discussion of the fundamental theories and physics of ion mobility, Ion Mobility Spectrometry, Second Edition describes the recent advances in instrumentation and newly

  19. Two-Level Stabilized Finite Volume Methods for Stationary Navier-Stokes Equations

    Directory of Open Access Journals (Sweden)

    Anas Rachid

    2012-01-01

    Full Text Available We propose two algorithms of two-level methods for resolving the nonlinearity in the stabilized finite volume approximation of the Navier-Stokes equations describing the equilibrium flow of a viscous, incompressible fluid. A macroelement condition is introduced for constructing the local stabilized finite volume element formulation. Moreover the two-level methods consist of solving a small nonlinear system on the coarse mesh and then solving a linear system on the fine mesh. The error analysis shows that the two-level stabilized finite volume element method provides an approximate solution with the convergence rate of the same order as the usual stabilized finite volume element solution solving the Navier-Stokes equations on a fine mesh for a related choice of mesh widths.

  20. Quantum Otto engine of a two-level atom with single-mode fields.

    Science.gov (United States)

    Wang, Jianhui; Wu, Zhaoqi; He, Jizhou

    2012-04-01

    We establish a quantum Otto engine (QOE) of a two-level atom, which is confined in a one-dimensional (1D) harmonic trap and is coupled to single-mode radiation fields. Besides two adiabatic processes, the QOE cycle consists of two isochoric processes, along one of which the two-level atom as the working substance interacts with a single-mode radiation field. Based on the semigroup approach, we derive the time for completing any adiabatic process and then present a performance analysis of the heat engine model. Furthermore, we generalize the results to the performance optimization for a QOE of a single two-level atom trapped in a 1D power-law potential. Our result shows that the efficiency at maximum power output is dependent on the trap exponent θ but is independent of the energy spectrum index σ.

  1. Open-Loop Control in Quantum Optics: Two-Level Atom in Modulated Optical Field

    CERN Document Server

    Saifullah, Sergei

    2008-01-01

    The methods of mathematical control theory are widely used in the modern physics, but still they are less popular in quantum science. We will discuss the aspects of control theory, which are the most useful in applications to the real problems of quantum optics. We apply this technique to control the behavior of the two-level quantum particles (atoms) in the modulated external optical field in the frame of the so called "semi classical model", where quantum two-level atomic system (all other levels are neglected) interacts with classical electromagnetic field. In this paper we propose a simple model of feedforward (open-loop) control for the quantum particle system, which is a basement for further investigation of two-level quantum particle in the external one-dimensional optical field.

  2. Two-Level Solutions to Exponentially Complex Problems in Glass Science

    DEFF Research Database (Denmark)

    Mauro, John C.; Smedskjær, Morten Mattrup

    Glass poses an especially challenging problem for physicists. The key to making progress in theoretical glass science is to extract the key physics governing properties of practical interest. In this spirit, we discuss several two-level solutions to exponentially complex problems in glass science....... Topological constraint theory, originally developed by J.C. Phillips, is based on a two-level description of rigid and floppy modes in a glass network and can be used to derive quantitatively accurate and analytically solvable models for a variety of macroscopic properties. The temperature dependence...... of the floppy mode density is used to derive the new MYEGA model of supercooled liquid viscosity, which offers improved descriptions for the temperature and composition dependence of relaxation time. The relaxation behavior of the glassy state can be further elucidated using a two-level energy landscape...

  3. Quantum Otto engine of a two-level atom with single-mode fields

    Science.gov (United States)

    Wang, Jianhui; Wu, Zhaoqi; He, Jizhou

    2012-04-01

    We establish a quantum Otto engine (QOE) of a two-level atom, which is confined in a one-dimensional (1D) harmonic trap and is coupled to single-mode radiation fields. Besides two adiabatic processes, the QOE cycle consists of two isochoric processes, along one of which the two-level atom as the working substance interacts with a single-mode radiation field. Based on the semigroup approach, we derive the time for completing any adiabatic process and then present a performance analysis of the heat engine model. Furthermore, we generalize the results to the performance optimization for a QOE of a single two-level atom trapped in a 1D power-law potential. Our result shows that the efficiency at maximum power output is dependent on the trap exponent θ but is independent of the energy spectrum index σ.

  4. Research on IPV6 Intrusion Detection Systems Based on Mobile Agent%IPV6下基于移动Agent的入侵检测系统研究

    Institute of Scientific and Technical Information of China (English)

    周琳

    2011-01-01

    在分析传统入侵检测系统的基础上,将移动Agent技术融入入侵检测系统.结合IPV6协议自身的特点,提出了IPV6下基于移动Agent的入侵检测系统模型,并对系统中关键模块进行了详细描述.该系统可以通过移动Agent在主机之间自主迁移分析数据,并及时发现入侵行为.实验证明,该系统具有良好的安全防御性能.%Based on the analysis of the traditional intrusion detection system, mobile Agent technology is integrated into intrusion detection system. IPV6 intrusion detection system based on mobile Agent is proposed combined with the IPV6 protocol's characteristic, and the key modules are described in detail. The system can make migration analysis automaticly between host and host through mobile agent and detect intrusion behavior. Experiments show that the system has good security performance.

  5. Routing strategy with mobile agent based on hierarchical DSR for vehicular communication network%车载通信网中基于DSR分层机制的移动代理路由策略研究

    Institute of Scientific and Technical Information of China (English)

    马志欣; 赵鼎新; 谢显中; 王昭然

    2011-01-01

    分析了现有动态源路由(dynamic source routing,DSR)协议机制以及在车载通信网路由发现中存在的问题,提出一种基于DSR分层机制的移动代理路由策略(cluster mobile agent-dynamic source routing,CM-DSR),并对设计的算法进行仿真实验.结果表明,所提出的CM-DSR协议与DSR路由协议相比较,较大幅度地降低了端到端的传输延迟,减少了路由请求次数,包的提交率也有一定程度的提高.%In this paper, we analyzed the existing mechanisms of DSR routing protocol and the routing discovery problem especially existed in Vehicle Communication Network. Moreover, we proposed a mobile agent routing strategy( Cluster Mobile agent-Dynamic Source Routing, CM-DSR)based on DSR stratification mechanism, we also conducted a simulation experiment on our algorithm. Extensive simulation results showed that the proposed CM-DSR protocol compared to DSR routing protocol can reduce significantly the end to end transmission delay and routing request times, while improve the packet delivery rate to some extent.

  6. A modified two-level three-phase quasi-soft-switching inverter

    DEFF Research Database (Denmark)

    Liu, Yusheng; Wu, Weimin; Blaabjerg, Frede;

    2014-01-01

    to reduce the extra conduction power loss and the voltage stress across the DC-link capacitor, a modified two-level three-phase quasi-soft-switching inverter is proposed by using a SiC MOSFET instead of an IGBT. The principle of the modified two-level three-phase quasi-soft-switching inverter is analyzed...... in detail. And the performance is verified through simulations and experiments on a 5 kW/380 V three-phase prototype....

  7. Design and Implementation of Two-Level Metadata Server in Small-Scale Cluster File System

    Institute of Scientific and Technical Information of China (English)

    LIU Yuling; YU Hongfen; SONG Weiwei

    2006-01-01

    The reliability and high performance of metadata service is crucial to the store architecture. A novel design of a two-level metadata server file system (TTMFS) is presented, which behaves high reliability and performance. The merits both centralized management and distributed management are considered simultaneously in our design. In this file system, the advanced-metadata server is responsible for manage directory metadata and the whole namespace. The double-metadata server is responsible for maintaining file metadata. And this paper uses the Markov return model to analyze the reliability of the two-level metadata server. The experiment data indicates that the design can provide high throughput.

  8. A two-level cache for distributed information retrieval in search engines.

    Science.gov (United States)

    Zhang, Weizhe; He, Hui; Ye, Jianwei

    2013-01-01

    To improve the performance of distributed information retrieval in search engines, we propose a two-level cache structure based on the queries of the users' logs. We extract the highest rank queries of users from the static cache, in which the queries are the most popular. We adopt the dynamic cache as an auxiliary to optimize the distribution of the cache data. We propose a distribution strategy of the cache data. The experiments prove that the hit rate, the efficiency, and the time consumption of the two-level cache have advantages compared with other structures of cache.

  9. A Two-Level Cache for Distributed Information Retrieval in Search Engines

    Directory of Open Access Journals (Sweden)

    Weizhe Zhang

    2013-01-01

    Full Text Available To improve the performance of distributed information retrieval in search engines, we propose a two-level cache structure based on the queries of the users’ logs. We extract the highest rank queries of users from the static cache, in which the queries are the most popular. We adopt the dynamic cache as an auxiliary to optimize the distribution of the cache data. We propose a distribution strategy of the cache data. The experiments prove that the hit rate, the efficiency, and the time consumption of the two-level cache have advantages compared with other structures of cache.

  10. Quantum entanglement in the system of two two-level atoms interacting with a single-mode vacuum field

    Institute of Scientific and Technical Information of China (English)

    Zeng Ke; Fang Mao-Fa

    2005-01-01

    The entanglement properties of the system of two two-level atoms interacting with a single-mode vacuum field are explored. The quantum entanglement between two two-level atoms and a single-mode vacuum field is investigated by using the quantum reduced entropy; the quantum entanglement between two two-level atoms, and that between a single two-level atom and a single-mode vacuum field are studied in terms of the quantum relative entropy. The influences of the atomic dipole-dipole interaction on the quantum entanglement of the system are also discussed. Our results show that three entangled states of two atoms-field, atom-atom, and atom-field can be prepared via two two-level atoms interacting with a single-mode vacuum field.

  11. Mobile-agent-based Distributed Intrusion Detection System%基于移动Agent的分布式入侵检测系统研究

    Institute of Scientific and Technical Information of China (English)

    李树文; 孙敏

    2012-01-01

    This paper builds a model of Distributed Intrusion Detection System Based on mobile Agent and discusses the realiza- tion of the model, and simulation tests are carried out about its properties. The model takes the working method of "Collective disposition within a domain and mutual cooperation among domains". The protected network is divided into a number of do- mains, and each of them is a complete analysis center of distributed intrusion detection system. These domains have relatively equal positions, mutually cooperate, and complete distributed intrusion detection together. In this way, single point failures can be overcome, management becomes easy, and it is easily analyzed and discriminated whether the attack is locally aggressive or distributed.%随着网络信息量及速度的急剧上升,入侵检测技术必然也随之改变,分布式入侵检测就是一个好的选择。本文构建出一个基于移动Agent分布式入侵检测模型;探讨了该模型的实现并对其性能进行了仿真实验验证。该模型采用“域内集中处理,域间互助协作”的工作方式,将整个受保护的网络划分成若干个域,每个域内是一个完整的中心分析型分布式入侵检测系统,域间地位平等,互相协作,共同完成分布式入侵检测。这样以来,既能克服单点故障问题,又便于管理,容易分析判别是本地攻击还是分布式攻击。

  12. Two-level Schwartz methods for nonconforming finite elements and discontinuous coefficients

    Science.gov (United States)

    Sarkis, Marcus

    1993-01-01

    Two-level domain decomposition methods are developed for a simple nonconforming approximation of second order elliptic problems. A bound is established for the condition number of these iterative methods, which grows only logarithmically with the number of degrees of freedom in each subregion. This bound holds for two and three dimensions and is independent of jumps in the value of the coefficients.

  13. Two-Level Solutions to Exponentially Complex Problems in Glass Science

    DEFF Research Database (Denmark)

    Mauro, John C.; Smedskjær, Morten Mattrup

    Glass poses an especially challenging problem for physicists. The key to making progress in theoretical glass science is to extract the key physics governing properties of practical interest. In this spirit, we discuss several two-level solutions to exponentially complex problems in glass science...

  14. Interactive Fuzzy Programming for Stochastic Two-level Linear Programming Problems through Probability Maximization

    OpenAIRE

    M Sakawa; Kato, K.

    2009-01-01

    This paper considers stochastic two-level linear programming problems. Using the concept of chance constraints and probability maximization, original problems are transformed into deterministic ones. An interactive fuzzy programming method is presented for deriving a satisfactory solution efficiently with considerations of overall satisfactory balance.

  15. Eigenmode expansion of the polarization for a spherical sample of two-level atoms

    Energy Technology Data Exchange (ETDEWEB)

    Friedberg, Richard [Physics Department, Columbia University, New York, NY 10027 (United States); Manassah, Jamal T., E-mail: jmanassah@gmail.co [HMS Consultants, Inc., PO Box 592, New York, NY 10028 (United States)

    2009-12-07

    We derive pseudo-orthogonality relations for both the magnetic and electric eigenmodes of a system of two-level atoms in a sphere configuration. We verify numerically that an arbitrary vector field can be reconstructed to a great accuracy from these eigenmode expansions. We apply this eigenmode analysis to explore superradiance from a sphere with initially uniform polarization.

  16. How to Calculate the Exact Angle for Two-level Osteotomy in Ankylosing Spondylitis?

    Science.gov (United States)

    Zheng, Guoquan; Song, Kai; Yao, Ziming; Zhang, Yonggang; Tang, Xiangyu; Wang, Zheng; Zhang, Xuesong; Mao, Keya; Cui, Geng; Wang, Yan

    2016-09-01

    A prospective case series study. To describe and assess a two-level osteotomy method for the management of severe thoracolumbar kyphosis (TLK) in patients with ankylosing spondylitis (AS). To achieve better postoperative outcomes in these patients, a sophisticated preoperative surgical plan is required. Most deformities are managed using a one-level osteotomy and a two-level osteotomy is seldomly reported. Till date, no study has described a two-level osteotomy for these cases. From January 2011 to December 2012, 10 consecutive patients with ankylosing spondylitis who underwent two-level spinal osteotomy were studied. Pre- and postoperative full-length free-standing radiographs, including the whole spine and pelvis, were available for all patients. Pre- and postoperative radiological parameters, including T5-S1 Cobb angles, TLK, lumbar lordosis, pelvic incidence, pelvic tilt, sacral slope, and sagittal vertical axis were measured. Health related quality of life , including Oswestry Disability Index and Scoliosis Research Society-22 surveys were administered before surgery and at 1-year follow up. The preoperative and postoperative T5-S1 Cobb angles was 51.3° and -7.1°, respectively (P osteotomy provides an accurate and reproducible method for ankylosing spondylitis correction. By which, we can obtain satisfactory radiological parameters and clinical outcomes. 4.

  17. On the dependence of the two-level source function on its radiation field.

    Science.gov (United States)

    Steinitz, R.; Shine, R. A.

    1973-01-01

    The consequences of the universally made assumption that the stimulated emission profile is identical to the absorption profile are quantitatively investigated for a two-level atom with Doppler redistribution. The nonlinear terms arising in the source function are evaluated iteratively. We find that the magnitude of the effects is probably completely negligible for visible and UV solar lines.

  18. Collective polaritonic modes in an array of two-level quantum emitters coupled to optical nanofiber

    CERN Document Server

    Kornovan, D F; Petrov, M I

    2016-01-01

    In this paper we develop a microscopic analysis of the light scattering on a periodic two-level atomic array coupled to an optical nanofiber. We extend the scattering matrix approach for two-level system interaction with nanofiber fundamental waveguiding mode HE_{11}, that allows us modeling the scattering spectra. We support these results considering the dispersion of the polaritonic states formed by the superposition of the fundamental mode of light HE_{11} and the atomic chain states. To illustrate our approach we start with considering a simple model of light scattering over atomic array in the free space. We discuss the Bragg diffraction at the atomic array and show that the scattering spectrum is defined by the non-symmetric coupling of two-level system with nanofiber and vacuum modes. The proposed method allows considering two-level systems interaction with full account for dipole-dipole interaction both via near fields and long-range interaction owing to nanofiber mode coupling.

  19. The Two-Level System of Higher Education: Western Traditions and Russian Reality

    Science.gov (United States)

    Druzhilov, S. A.

    2011-01-01

    The law on the two-level system of higher education has now gone into effect in Russia: the bachelor's degree will correspond to the first level of higher education, while the master's degree will correspond to the second level. These levels entail separate state educational standards and separate final certification. In the process of adopting…

  20. Reactive Power Impact on Lifetime Prediction of Two-level Wind Power Converter

    DEFF Research Database (Denmark)

    Zhou, Dao; Blaabjerg, Frede; Lau, M.

    2013-01-01

    The influence of reactive power injection on the dominating two-level wind power converter is investigated and compared in terms of power loss and thermal behavior. Then the lifetime of both the partial-scale and full-scale power converter is estimated based on the widely used Coffin-Manson model...

  1. Exact Solution of the Two-Level System and the Einstein Solid in the Microcanonical Formalism

    Science.gov (United States)

    Bertoldi, Dalia S.; Bringa, Eduardo M.; Miranda, E. N.

    2011-01-01

    The two-level system and the Einstein model of a crystalline solid are taught in every course of statistical mechanics and they are solved in the microcanonical formalism because the number of accessible microstates can be easily evaluated. However, their solutions are usually presented using the Stirling approximation to deal with factorials. In…

  2. A two-level stochastic collocation method for semilinear elliptic equations with random coefficients

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Luoping; Zheng, Bin; Lin, Guang; Voulgarakis, Nikolaos

    2017-05-01

    In this work, we propose a novel two-level discretization for solving semilinear elliptic equations with random coefficients. Motivated by the two-grid method for deterministic partial differential equations (PDEs) introduced by Xu, our two-level stochastic collocation method utilizes a two-grid finite element discretization in the physical space and a two-level collocation method in the random domain. In particular, we solve semilinear equations on a coarse mesh $\\mathcal{T}_H$ with a low level stochastic collocation (corresponding to the polynomial space $\\mathcal{P}_{P}$) and solve linearized equations on a fine mesh $\\mathcal{T}_h$ using high level stochastic collocation (corresponding to the polynomial space $\\mathcal{P}_p$). We prove that the approximated solution obtained from this method achieves the same order of accuracy as that from solving the original semilinear problem directly by stochastic collocation method with $\\mathcal{T}_h$ and $\\mathcal{P}_p$. The two-level method is computationally more efficient, especially for nonlinear problems with high random dimensions. Numerical experiments are also provided to verify the theoretical results.

  3. Broadband EM radiation amplification by means of a monochromatically driven two-level system

    Science.gov (United States)

    Soldatov, Andrey V.

    2017-02-01

    It is shown that a two-level quantum system possessing dipole moment operator with permanent non-equal diagonal matrix elements and driven by external semiclassical monochromatic high-frequency electromagnetic (EM) (laser) field can amplify EM radiation waves of much lower frequency.

  4. Time-Minimal Control of Dissipative Two-level Quantum Systems: the Generic Case

    CERN Document Server

    Bonnard, B; Sugny, D

    2008-01-01

    The objective of this article is to complete preliminary results concerning the time-minimal control of dissipative two-level quantum systems whose dynamics is governed by Lindblad equations. The extremal system is described by a 3D-Hamiltonian depending upon three parameters. We combine geometric techniques with numerical simulations to deduce the optimal solutions.

  5. Constrained Maximum Likelihood Estimation for Two-Level Mean and Covariance Structure Models

    Science.gov (United States)

    Bentler, Peter M.; Liang, Jiajuan; Tang, Man-Lai; Yuan, Ke-Hai

    2011-01-01

    Maximum likelihood is commonly used for the estimation of model parameters in the analysis of two-level structural equation models. Constraints on model parameters could be encountered in some situations such as equal factor loadings for different factors. Linear constraints are the most common ones and they are relatively easy to handle in…

  6. Time-minimal control of dissipative two-level quantum systems: The Integrable case

    CERN Document Server

    Bonnard, B

    2008-01-01

    The objective of this article is to apply recent developments in geometric optimal control to analyze the time minimum control problem of dissipative two-level quantum systems whose dynamics is governed by the Lindblad equation. We focus our analysis on the case where the extremal Hamiltonian is integrable.

  7. 基于S2C移动商务的Multi-Agent物流系统研究%Study on the Multi-Agent Logisitcs System for S2C Mobile Businesses

    Institute of Scientific and Technical Information of China (English)

    张健

    2011-01-01

    Having analyzed the characteristics of mobile business processes and the S2C practice, the paper draws on the multi-agent mechanism to establish a real-time smart logistics system and presents a four-tiered architecture consisting of application, business logic, agent, and physical entity. Then it designs the system communication function in connection with a case analysis on a S2C baby products online shop. At the end, a multi-agent based physical logistics system solution for mobile business environment is proposed.%在分析移动商务环境业务流程特点基础上,结合S2C模式"即时性"、"移动性"的特点,进行了Multi-Agent机制建立实时智能物流系统研究.给出了应用层、业务逻辑层、Agent层、物理实体层的四层系统体系结构,同时进行了系统通信设计,并结合S2C婴童用品网购实例进行分析.提出了在移动商务环境下,一种基于Multi-Agent技术的物理系统方案.

  8. Staging Mobilities / Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2015-01-01

    In recent years, urban research has taken a ‘mobilities turn’. There has been a developing realisation that mobilities do not ‘just happen.’ Mobilities are carefully and meticulously designed, planned and staged (from above). However, they are equally importantly acted out, performed and lived...... as people are ‘staging themselves’ (from below). Staging mobilities is a dynamic process between ‘being staged’ (for example, being stopped at traffic lights) and the ‘mobile staging’ of interacting individuals (negotiating a passage on the pavement). Staging mobilities is about the fact that mobility...... asks: what are the physical, social, technical, and cultural conditions to the staging of contemporary urban mobilities? The theoretical framing in the Staging mobilities book is applied to four in-depth cases in the accompanying volume Designing mobilities.This book explore how places, sites...

  9. Lipid Raft Size and Lipid Mobility in Non-raft Domains Increase during Aging and Are Exacerbated in APP/PS1 Mice Model of Alzheimer's Disease. Predictions from an Agent-Based Mathematical Model.

    Science.gov (United States)

    Santos, Guido; Díaz, Mario; Torres, Néstor V

    2016-01-01

    A connection between lipid rafts and Alzheimer's disease has been studied during the last decades. Mathematical modeling approaches have recently been used to correlate the effects of lipid composition changes in the physicochemical properties of raft-like membranes. Here we propose an agent based model to assess the effect of lipid changes in lipid rafts on the evolution and progression of Alzheimer's disease using lipid profile data obtained in an established model of familial Alzheimer's disease. We have observed that lipid raft size and lipid mobility in non-raft domains are two main factors that increase during age and are accelerated in the transgenic Alzheimer's disease mouse model. The consequences of these changes are discussed in the context of neurotoxic amyloid β production. Our agent based model predicts that increasing sterols (mainly cholesterol) and long-chain polyunsaturated fatty acids (LCPUFA) (mainly DHA, docosahexaenoic acid) proportions in the membrane composition might delay the onset and progression of the disease.

  10. Mobile marketing for mobile games

    OpenAIRE

    Vu, Giang

    2016-01-01

    Highly developed mobile technology and devices enable the rise of mobile game industry and mobile marketing. Hence mobile marketing for mobile game is an essential key for a mobile game success. Even though there are many articles on marketing for mobile games, there is a need of highly understanding mobile marketing strategies, how to launch a mobile campaign for a mobile game. Besides that, it is essential to understand the relationship between mobile advertising and users behaviours. There...

  11. Dynamical decoherence in a cavity with a large number of two-level atoms

    CERN Document Server

    Frasca, M

    2004-01-01

    We consider a large number of two-level atoms interacting with the mode of a cavity in the rotating-wave approximation (Tavis-Cummings model). We apply the Holstein-Primakoff transformation to study the model in the limit of the number of two-level atoms, all in their ground state, becoming very large. The unitary evolution that we obtain in this approximation is applied to a macroscopic superposition state showing that, when the coherent states forming the superposition are enough distant, then the state collapses on a single coherent state describing a classical radiation mode. This appear as a true dynamical effect that could be observed in experiments with cavities.

  12. Two-Level Bregman Method for MRI Reconstruction with Graph Regularized Sparse Coding

    Institute of Scientific and Technical Information of China (English)

    刘且根; 卢红阳; 张明辉

    2016-01-01

    In this paper, a two-level Bregman method is presented with graph regularized sparse coding for highly undersampled magnetic resonance image reconstruction. The graph regularized sparse coding is incorporated with the two-level Bregman iterative procedure which enforces the sampled data constraints in the outer level and up-dates dictionary and sparse representation in the inner level. Graph regularized sparse coding and simple dictionary updating applied in the inner minimization make the proposed algorithm converge with a relatively small number of iterations. Experimental results demonstrate that the proposed algorithm can consistently reconstruct both simulated MR images and real MR data efficiently, and outperforms the current state-of-the-art approaches in terms of visual comparisons and quantitative measures.

  13. Photon-statistics excitation spectroscopy of a single two-level system

    Science.gov (United States)

    Strauß, Max; Placke, Marlon; Kreinberg, Sören; Schneider, Christian; Kamp, Martin; Höfling, Sven; Wolters, Janik; Reitzenstein, Stephan

    2016-06-01

    We investigate the influence of the photon statistics on the excitation dynamics of a single two-level system. A single semiconductor quantum dot represents the two-level system and is resonantly excited either with coherent laser light, or excited with chaotic light, with photon statistics corresponding to that of thermal radiation. Experimentally, we observe a reduced absorption cross section under chaotic excitation in the steady state. In the transient regime, the Rabi oscillations observable under coherent excitation disappear under chaotic excitation. Likewise, in the emission spectrum, the well-known Mollow triplet, which we observe under coherent drive, disappears under chaotic excitation. Our observations are fully consistent with theoretical predictions based on the semiclassical Bloch equation approach.

  14. A novel two-level dielectric barrier discharge reactor for methyl orange degradation.

    Science.gov (United States)

    Tao, Xumei; Wang, Guowei; Huang, Liang; Ye, Qingguo; Xu, Dongyan

    2016-12-15

    A novel pilot two-level dielectric barrier discharge (DBD) reactor has been proposed and applied for degradation of continuous model wastewater. The two-level DBD reactor was skillfully realized with high space utilization efficiency and large contact area between plasma and wastewater. Various conditions such as applied voltage, initial concentration and initial pH value on methyl orange (MO) model wastewater degradation were investigated. The results showed that the appropriate applied voltage was 13.4 kV; low initial concentration and low initial pH value were conducive for MO degradation. The percentage removal of 4 L MO with concentration of 80 mg/L reached 94.1% after plasma treatment for 80min. Based on ultraviolet spectrum (UV), Infrared spectrum (IR), liquid chromatography-mass spectrometry (LC-MS) analysis of degradation intermediates and products, insights in the degradation pathway of MO were proposed.

  15. 基于移动Agent的供应链订单跟踪系统研究%Research on Order Track System of Supply chain Based on Mobile Agent

    Institute of Scientific and Technical Information of China (English)

    郭钧; 郭顺生; 王天日

    2012-01-01

    Firstly, the relationship between the order fulfillment process (OFP) and other key business processes of supply chain management (SCM) was introduced and analyzed. Then the functional attributes of the order tracking were given. Subsequently, the technology foundations of mobile agent were investigated. Furthermore, an integrated framework model based on the mobile agent was constructed to realize the functional attributes of the order tracking. Finally, a prototype system was constructed to illustrate the superiority of the framework.%分析了订单履行流程与供应链管理其他关键业务流程的关系,给出了订单跟踪系统功能需求,并结合移动Agent技术,构建了基于移动Agent的供应链订单全生命周期跟踪系统框架结构.设计了原型系统,并在一个家电企业进行了验证.

  16. 抗攻击的基于移动代理的分布式入侵检测模型%Mobile Agent Based Distributed Intrusion Detection System Model Protecting from Attack

    Institute of Scientific and Technical Information of China (English)

    尚明磊; 许峰; 卢静; 黄皓

    2005-01-01

    为了增强IDS(Intrusion Detection System)在广域网中的健壮性,本文在对几种典型的入侵检测模型进行分析的基础上,提出了抗攻击的基于移动代理的分布式入侵检测模型(Mobile Agent Based Distributed Intrusion Detection System Model,MABDIDSM).MABDIDSM利用移动代理(mobile agent)在各局域网的控制台之间做环行移动,将各控制台上的入侵事件收集到管理中心进行综合分析处理.如果管理中心受到攻击,移动代理能够在剩余的控制台中选出新的管理中心,因此MABDIDSM在广域网范围内具有较强的抗攻击能力.

  17. Embodied Cultures of Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2010-01-01

    contemporary theorists understanding bodily movement, material sites of mobility, and social interactions must be consulted along the road (e.g. Latour’s work on objects and ANT, Thrift’s work on the body and ‘non-representational theory, and Massumi’s notions of affects and emotions related to bodily mobility......The paper explores the relationship between the body and mobility by looking into a number of modes of transportation and their ways of constructing particular engagements with mobility. The ‘mobile embodiments’ are significant to a material and symbolic set of relations between human agents...... and material artifacts. The paper target the complex relationship between the moving, sensing body and the material and built environment of infrastructures and mobility modes in order to explore what norms, and meanings, and everyday life mobility cultures are being produced and re-produced in this process...

  18. Theoretical treatment of the interaction between two-level atoms and periodic waveguides

    CERN Document Server

    Zang, Xiaorun

    2015-01-01

    Light transport in periodic waveguides coupled to a two-level atom is investigated. By using optical Bloch equations and a photonic modal formalism, we derive semi-analytical expressions for the scattering matrix of one atom trapped in a periodic waveguide. The derivation is general, as the expressions hold for any periodic photonic or plasmonic waveguides. It provides a basic building block to study collective effects arising from photon-mediated multi-atom interactions in periodic waveguides.

  19. Weak-Coupling Theory for Low-Frequency Periodically Driven Two-Level Systems

    Institute of Scientific and Technical Information of China (English)

    CHEN Ai-Xi; HUANG Ke-Lin; WANG Zhi-Ping

    2008-01-01

    We generalize the Wu-Yang strong-coupling theory to solve analytically periodically driven two-level systems in the weak-coupling and low-frequency regimes for single- and multi-period periodic driving of continuous-wave-type and pulse-type including ultrashort pulses of a few cycles. We also derive a general formula of the AC Stark shift suitable for such diverse situations.

  20. Transmission Dynamics of a Driven Two-Level System Dissipated by Leads

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ping; FAN Wen-Bin; ZHAO Xian-Geng

    2001-01-01

    We study the transmission dynamics of a driven two-level system dissipated by the two leads. Using the nonequilibrium Green function, we derive an analytical transmission formula for an electron incident from the left lead,through the double quantum dots, to the right lead. The Landauer-type conductance and current are also given.A discussion of the internal tunnelling dynamics reveals crucial effects of the localization and delocalization on the transport of the system.

  1. Spontaneously induced atom-radiation entanglement in an ensemble of two-level atoms

    OpenAIRE

    Tesfa, Sintayehu

    2007-01-01

    Analysis of the spontaneously induced correlation on atom-radiation entanglement in an ensemble of two-level atoms initially prepared in the upper level and placed in a cavity containing a squeezed radiation employing the method of evaluating the coherent-state propagator is presented. It is found that the cavity radiation exhibits squeezing which is directly attributed to the squeezed radiation in the cavity. The intensity of the cavity radiation increases with the squeeze parameter and inte...

  2. Two-Level Domain Decomposition Methods for Highly Heterogeneous Darcy Equations. Connections with Multiscale Methods

    Directory of Open Access Journals (Sweden)

    Dolean Victorita

    2014-07-01

    Full Text Available Multiphase, compositional porous media flow models lead to the solution of highly heterogeneous systems of Partial Differential Equations (PDE. We focus on overlapping Schwarz type methods on parallel computers and on multiscale methods. We present a coarse space [Nataf F., Xiang H., Dolean V., Spillane N. (2011 SIAM J. Sci. Comput. 33, 4, 1623-1642] that is robust even when there are such heterogeneities. The two-level domain decomposition approach is compared to multiscale methods.

  3. A two-level generative model for cloth representation and shape from shading.

    Science.gov (United States)

    Han, Feng; Zhu, Song-Chun

    2007-07-01

    In this paper, we present a two-level generative model for representing the images and surface depth maps of drapery and clothes. The upper level consists of a number of folds which will generate the high contrast (ridge) areas with a dictionary of shading primitives (for 2D images) and fold primitives (for 3D depth maps). These primitives are represented in parametric forms and are learned in a supervised learning phase using 3D surfaces of clothes acquired through photometric stereo. The lower level consists of the remaining flat areas which fill between the folds with a smoothness prior (Markov random field). We show that the classical ill-posed problem-shape from shading (SFS) can be much improved by this two-level model for its reduced dimensionality and incorporation of middle-level visual knowledge, i.e., the dictionary of primitives. Given an input image, we first infer the folds and compute a sketch graph using a sketch pursuit algorithm as in the primal sketch [10], [11]. The 3D folds are estimated by parameter fitting using the fold dictionary and they form the "skeleton" of the drapery/cloth surfaces. Then, the lower level is computed by conventional SFS method using the fold areas as boundary conditions. The two levels interact at the final stage by optimizing a joint Bayesian posterior probability on the depth map. We show a number of experiments which demonstrate more robust results in comparison with state-of-the-art work. In a broader scope, our representation can be viewed as a two-level inhomogeneous MRF model which is applicable to general shape-from-X problems. Our study is an attempt to revisit Marr's idea [23] of computing the 2(1/2)D sketch from primal sketch. In a companion paper [2], we study shape from stereo based on a similar two-level generative sketch representation.

  4. Automatic Detection of Cervical Cancer Cells by a Two-Level Cascade Classification System

    Directory of Open Access Journals (Sweden)

    Jie Su

    2016-01-01

    Full Text Available We proposed a method for automatic detection of cervical cancer cells in images captured from thin liquid based cytology slides. We selected 20,000 cells in images derived from 120 different thin liquid based cytology slides, which include 5000 epithelial cells (normal 2500, abnormal 2500, lymphoid cells, neutrophils, and junk cells. We first proposed 28 features, including 20 morphologic features and 8 texture features, based on the characteristics of each cell type. We then used a two-level cascade integration system of two classifiers to classify the cervical cells into normal and abnormal epithelial cells. The results showed that the recognition rates for abnormal cervical epithelial cells were 92.7% and 93.2%, respectively, when C4.5 classifier or LR (LR: logical regression classifier was used individually; while the recognition rate was significantly higher (95.642% when our two-level cascade integrated classifier system was used. The false negative rate and false positive rate (both 1.44% of the proposed automatic two-level cascade classification system are also much lower than those of traditional Pap smear review.

  5. Two-level, two-objective evolutionary algorithms for solving unit commitment problems

    Energy Technology Data Exchange (ETDEWEB)

    Georgopoulou, Chariklia A.; Giannakoglou, Kyriakos C. [National Technical University of Athens, School of Mechanical Engineering, Laboratory of Thermal Turbomachines, Parallel CFD and Optimization Unit, P.O. Box 64069, Athens 157 10 (Greece)

    2009-07-15

    A two-level, two-objective optimization scheme based on evolutionary algorithms (EAs) is proposed for solving power generating Unit Commitment (UC) problems by considering stochastic power demand variations. Apart from the total operating cost to cover a known power demand distribution over the scheduling horizon, which is the first objective, the risk of not fulfilling possible demand variations forms the second objective to be minimized. For this kind of problems with a high number of decision variables, conventional EAs become inefficient optimization tools, since they require a high number of evaluations before reaching the optimal solution(s). To considerably reduce the computational burden, a two-level algorithm is proposed. At the low level, a coarsened UC problem is defined and solved using EAs to locate promising solutions at low cost: a strategy for coarsening the UC problem is proposed. Promising solutions migrate upwards to be injected into the high level EA population for further refinement. In addition, at the high level, the scheduling horizon is partitioned in a small number of subperiods of time which are optimized iteratively using EAs, based on objective function(s) penalized to ensure smooth transition from/to the adjacent subperiods. Handling shorter chromosomes due to partitioning increases method's efficiency despite the need for iterating. The proposed two-level method and conventional EAs are compared on representative test problems. (author)

  6. Coupling of effective one-dimensional two-level atoms to squeezed light

    CERN Document Server

    Clark, S; Clark, Stephen; Parkins, Scott

    2002-01-01

    A cavity QED system is analyzed which duplicates the dynamics of a two-level atom in free space interacting exclusively with broadband squeezed light. We consider atoms in a three or four-level Lambda-configuration coupled to a high-finesse optical cavity which is driven by a squeezed light field. Raman transitions are induced between a pair of stable atomic ground states via the squeezed cavity mode and coherent driving fields. An analysis of the reduced master equation for the atomic ground states shows that a three-level atomic system has insufficient parameter flexibility to act as an effective two-level atom interacting exclusively with a squeezed reservoir. However, the inclusion of a fourth atomic level, coupled dispersively to one of the two ground states by an auxiliary laser field, introduces an extra degree of freedom and enables the desired interaction to be realised. As a means of detecting the reduced quadrature decay rate of the effective two-level system, we examine the transmission spectrum o...

  7. Two-level total disc replacement with Mobi-C(r over 3-years

    Directory of Open Access Journals (Sweden)

    Reginald Davis

    2014-01-01

    Full Text Available Objective: To evaluate the safety and effectiveness of two-level total disc replacement (TDR using a Mobi-C(r Cervical Artificial Disc at the 36 month follow-up. Methods: a Prospective, randomized, controlled, multicenter clinical trial of an artificial cervical disc (Mobi-C(r Cervical Artificial Disc was conducted under the Investigational Device Exemptions (IDE and the U.S. Food & Drug Administration (FDA regulations. A total of 339 patients with degenerative disc disease were enrolled to receive either two-level treatment with TDR, or a two-level anterior cervical discectomy and fusion (ACDF as control. The 234 TDR patients and 105 ACDF patients were followed up at regular time points for three years after surgery. Results: At 36 months, both groups demonstrated an improvement in clinical outcome measures and a comparable safety profile. NDI scores, SF-12 PCS scores, patient satisfaction, and overall success indicated greater statistically significant improvement from baseline for the TDR group, in comparison to the ACDF group. The TDR patients experienced lower subsequent surgery rates and a lower rate of adjacent segment degeneration. On average, the TDR patients maintained segmental range of motion through 36 months with no device failure. Conclusion: Results at three-years support TDR as a safe, effective and statistically superior alternative to ACDF for the treatment of degenerative disc disease at two contiguous cervical levels.

  8. 基于社会网络与声誉信任机制的移动多Agent系统信任模型%A MOBILE MULTI-AGENT SYSTEM TRUST MODEL BASED ON SOCIAL NETWORK AND REPUTATION TRUST MECHANISM

    Institute of Scientific and Technical Information of China (English)

    彭泽洲

    2012-01-01

    基于信任机制的移动多Agent系统中,代理Agent一般通过直接信誉值和推荐信誉值来判断对于另一个Agent的信任程度.由于系统相对巨大,直接信誉值通常难以获得,判断的正确性很大程度上依赖于推荐信誉值的准确性和可靠性.通过对整个多Agent系统进行社会网络的挖掘,用以得到与代理Agent存在潜在社会关系的一组Agent.对这组Agent提供的推荐信息充分信任,并优先使用这些Agent提供的信息进行推荐信誉值的计算.最后通过双方直接交易的多寡判断综合信任值中直接信誉值与推荐信誉值的权重.通过实验验证了该模型的有效性.%In trust mechanism-based mobile multi-Agent system, proxy Agent usually judges the trust degree of another Agent by the values of direct reputation and recommended reputation. Because of the relative large of the system, direct reputation is often difficult to obtain, so the correctness of the judgment depends on to a great extent the accuracy and reliability of the recommended reputation. In the paper, by mining the whole social network for entire multi-Agent system, a group of Agent which have potential community relationship with the proxy Agent is gotten. The recommendation information provided by this group is thoroughly trusted, and the information offered by these Agents is employed in prior to calculate the recommended reputation value. At last, the weight of the values of direct reputation and recommended reputation in composite trust value are calculated through the amount of direct transaction between both sides. The validity of the model has been verified by the experiment.

  9. Private Computing and Mobile Code Systems

    NARCIS (Netherlands)

    Cartrysse, K.

    2005-01-01

    This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a mobile software agent that performs a task on behalf of its user. The agent travels over the network and is executed at different locations of which beforehand it is not known whether or not these ca

  10. Analytical Enantio-Separation of Linagliptin in Linagliptin and Metformin HCl Dosage Forms by Applying Two-Level Factorial Design

    Directory of Open Access Journals (Sweden)

    Sushant B. Jadhav

    2016-10-01

    Full Text Available A novel, stability indicating, reverse phase high-performance liquid chromatography (RP-HPLC method was developed to determine the S-isomer of linagliptin (LGP in linagliptin and metformin hydrochloride (MET HCl tablets (LGP–MET HCl by implementing design of experiment (DoE, i.e., two-level, full factorial design (23 + 3 centre points = 11 experiments to understand the critical method parameters (CMP and its relation with the critical method attribute (CMA, and to ensure robustness of the method. The separation of the S-isomer, LGP and MET HCl in the presence of their impurities was achieved on Chiralpak® IA-3 (Amylose tris (3, 5-dimethylphenylcarbamate, immobilized on 3 µm silica gel stationary phase (250 × 4.6 mm, 3 µm using isocratic elution and detector wavelength at 225 nm with a flow rate of 0.5 mL·min−1, an injection volume of 10 µL with a sample cooler (5 °C and column oven temperature of 25 °C. Ethanol:Methanol:Monoethanolamine (EtOH:MeOH:MEA in the ratio of 60:40:0.2 v/v/v was used as a mobile phase. The developed method was validated in accordance with international council for harmonisation (ICH guidelines and was applied for the estimation of the S-isomer of LGP in LGP–MET HCl tablets. The same method also can be extended for the estimation of the S-isomer in LGP dosage forms.

  11. A Comparison of Performance between Macro-mobility Protocol and Micro-mobility Protocol

    Institute of Scientific and Technical Information of China (English)

    TANG Hong; NIE Neng; WU Zhong-fu; ZHAO Jun; LIAO Xiao-feng

    2003-01-01

    Mobile IP is the proposed standard for IP mobility support. When a Mobile Node (MN) is far away from home, registration at its home agent can cause a long handoff delay that leads to significant packet drop and throughput reduction. In order to improve standard mobile IP, the mobility of MN has been divided into micro-mobility and macro-mobility. Some micro-mobility management protocols have been developed. We compare the performance between standard mobile IP (RFC2002,RFC3220,RFC3344) and micro-mobility management protocols and give some equations along with the analysis of calculating results.

  12. Assessing the impacts of deploying a shared self-driving urban mobility system: An agent-based model applied to the city of Lisbon, Portugal

    Directory of Open Access Journals (Sweden)

    Luis M. Martinez

    2017-06-01

    Full Text Available This paper examines the changes that might result from the large-scale uptake of a shared and self-driving fleet of vehicles in a mid-sized European city. The work explores two different self-driving vehicle concepts – a ridesharing system (Shared Taxi, which emulates a taxi-like system where customers accept small detours from their original direct path and share part of their ride with others and a dynamic bus-like service with minibuses (Taxi-Bus, where customers pre-book their service at least 30 min in advance (permanent bookings for regular trips should represent most requests and walk short distances to a designated stop. Under the premise that the “upgraded” system should as much as possible deliver the same trips as today in terms of origin, destination and timing, and that it should also replace all car and bus trips, it looks at impacts on car fleet size, volume of travel and parking requirements. Mobility output and CO2 emissions are also detailed in two different time scales (24 h. average and peak-hour only. The obtained results suggest that a full implementation scenario where the existing metro service is kept and private car, bus and taxi mobility would be replaced by shared modes would significantly reduce travelled vehicle.kilometres and CO2 emissions.

  13. 基于JADE移动Agent的分布式网络取证系统%Distributed network forensics based on JADE mobile Agent

    Institute of Scientific and Technical Information of China (English)

    杜钦生; 赵剑; 李博

    2012-01-01

    为了解决数据量大仅在中央系统一个点做取证分析容易导致网络拥挤和失败的问题,提出了一种包含有独立Agent实体的分布式网络取证系统.这些独立的Agent实体出发遍历各个分散的系统,提供了收集证据和将网络中路由可视化的高效机制,可以帮助时网络活动进行分析和取证调查.通过使用Java的Agent开发平台来实现具体的设计方案.实验表明,Agent的使用可以将处理负担和存储需求分散给多个网络系统,减轻在单一系统上的网络拥挤,数据的备份也能减轻单个中心节点失败的问题.%For the sheer volume of data and network congestion at the central system performing the forensics analysis, the distributed architecture consisting of independent agent entities is presented. An efficient mechanism for evidence collection and visualization of network traffic is provided to investigate the network forensics. The specific design is implemented on the Java Agent Development Platform (JADE). The results show this application of software agents distributes both the processing load and storage requirements to multiple networked systems and relieves network congestion on a single system. The single center point failure problem is alleviated with replication.

  14. Computational Environment of Software Agents

    Directory of Open Access Journals (Sweden)

    Martin Tomášek

    2008-05-01

    Full Text Available Presented process calculus for software agent communication and mobility canbe used to express distributed computational environment and mobile code applications ingeneral. Agents are abstraction of the functional part of the system architecture and theyare modeled as process terms. Agent actions model interactions within the distributedenvironment: local/remote communication and mobility. Places are abstraction of thesingle computational environment where the agents are evaluated and where interactionstake place. Distributed environment is modeled as a parallel composition of places whereeach place is evolving asynchronously. Operational semantics defines rules to describebehavior within the distributed environment and provides a guideline for implementations.Via a series of examples we show that mobile code applications can be naturally modeled.

  15. Evaluation of surfactants as steam diverters/mobility control agents in light oil steamfloods: Effect of oil composition, rates and experimental conditions

    Energy Technology Data Exchange (ETDEWEB)

    Mahmood, S.M.; Olsen, D.K.; Ramzel, E.B.

    1991-12-01

    A series of experiments was performed to evaluate the effectiveness of commercially available surfactants for steam-foam EOR applications in light oil reservoirs. The experiments were performed in a 3-ft long, 1-1/2 in.-diameter cylindrical sandpack of about 1 darcy permeability. The sandpack and injected fluids were preheated to 430{degree}F at 155 psi. The main objective of these tests was to investigate the effectiveness of several surfactants in providing mobility control under a variety of conditions expected in light-oil steamfloods. Thus, maximum pressure-rise and foam-bank buildup/decay were noted as operating conditions were changed in a test or in various tests. Tests were performed with various oil types, sacrificial salts, injection rates, injection strategies, vapor-to-liquid fractions (VLF), and steam/N{sub 2} ratios (SNR).

  16. Thermal analysis of multi-MW two-level wind power converter

    OpenAIRE

    Zhou, Dao; Blaabjerg, Frede; Mogens, Lau; Tonnes, Michael

    2012-01-01

    In this paper, the multi-MW wind turbine of partial-scale and full-scale two-level power converter with DFIG and direct-drive PMSG are designed and compared in terms of their thermal performance. Simulations of different configurations regarding loss distribution and junction temperature in the power device in the whole range of wind speed are presented and analyzed. It is concluded that in both partial-scale and full-scale power converter the most thermal stressed power device in the generat...

  17. Ultra-short, off-resonant, strong excitation of two-level systems

    CERN Document Server

    Jha, Pankaj K; Grazioso, Fabio

    2013-01-01

    We present a model describing the use of ultra-short strong pulses to populate the excited level of a two-level quantum system. In particular, we study an off-resonance excitation with a few cycles pulse which presents a smooth phase jump i.e. a change of the pulse's phase which is not step-like, but happens over a finite time interval. A numerical solution is given for the time-dependent probability amplitude of the excited level. The enhancement of the excited level's population is optimized with respect to the shape of the phase transient, and to other parameters of the excitation pulse.

  18. Enhancing student learning of two-level quantum systems with interactive simulations

    CERN Document Server

    Kohnle, Antje; Campbell, Anna; Korolkova, Natalia; Paetkau, Mark J

    2015-01-01

    The QuVis Quantum Mechanics Visualization project aims to address challenges of quantum mechanics instruction through the development of interactive simulations for the learning and teaching of quantum mechanics. In this article, we describe evaluation of simulations focusing on two-level systems developed as part of the Institute of Physics Quantum Physics resources. Simulations are research-based and have been iteratively refined using student feedback in individual observation sessions and in-class trials. We give evidence that these simulations are helping students learn quantum mechanics concepts at both the introductory and advanced undergraduate level, and that students perceive simulations to be beneficial to their learning.

  19. Coherent destruction of tunneling in two-level system driven across avoided crossing via photon statistics.

    Science.gov (United States)

    Miao, Qiang; Zheng, Yujun

    2016-06-29

    In this paper, the nature of the multi-order resonance and coherent destruction of tunneling (CDT) for two-level system driven cross avoided crossing is investigated by employing the emitted photons 〈N〉 and the Mandel's Q parameter based on the photon counting statistics. An asymmetric feature of CDT is shown in the spectrum of Mandel's Q parameter. Also, the CDT can be employed to suppress the spontaneous decay and prolong waiting time noticeably. The photon emission pattern is of monotonicity in strong relaxation, and homogeneity in pure dephasing regime, respectively.

  20. Intrinsic decoherence in the interaction of two fields with a two-level atom

    Energy Technology Data Exchange (ETDEWEB)

    Juarez-Amaro, R. [Universidad Tecnologica de la Mixteca, Mexico (Mexico); INAOE, Puebla (Mexico); Escudero-Jimenez, J.L. [INAOE, Puebla (Mexico); Moya-Cessa, H.

    2009-06-15

    We study the interaction of a two-level atom and two fields, one of them classical. We obtain an effective Hamiltonian for this system by using a method recently introduced that produces a small rotation to the Hamiltonian that allows to neglect some terms in the rotated Hamiltonian. Then we solve a variation of the Schroedinger equation that models decoherence as the system evolves through intrinsic mechanisms beyond conventional quantum mechanics rather than dissipative interaction with an environment. (Abstract Copyright [2009], Wiley Periodicals, Inc.)

  1. Coherent destruction of tunneling in two-level system driven across avoided crossing via photon statistics

    Science.gov (United States)

    Miao, Qiang; Zheng, Yujun

    2016-06-01

    In this paper, the nature of the multi-order resonance and coherent destruction of tunneling (CDT) for two-level system driven cross avoided crossing is investigated by employing the emitted photons and the Mandel’s Q parameter based on the photon counting statistics. An asymmetric feature of CDT is shown in the spectrum of Mandel’s Q parameter. Also, the CDT can be employed to suppress the spontaneous decay and prolong waiting time noticeably. The photon emission pattern is of monotonicity in strong relaxation, and homogeneity in pure dephasing regime, respectively.

  2. Interaction of Lamb modes with two-level systems in amorphous nanoscopic membranes.

    Energy Technology Data Exchange (ETDEWEB)

    Kuhn, T.; Anghel, D. V.; Galperin, Y. M.; Manninen, M.; Materials Science Division; Univ. Jyvaskyla; National Inst. for Physics and Nuclear Engineering; Bogolivbov Lab. Theoretical Physics; Univ. Oslo; Russian Academy of Sciences

    2007-01-01

    Using a generalized model of interaction between a two-level system (TLS) and an arbitrary deformation of the material, we calculate the interaction of Lamb modes with TLSs in amorphous nanoscopic membranes. We compare the mean free paths of the Lamb modes of different symmetries and calculate the heat conductivity {kappa}. In the limit of an infinitely wide membrane, the heat conductivity is divergent. Nevertheless, the finite size of the membrane imposes a lower cutoff for the phonon frequencies, which leads to the temperature dependence {kappa}{alpha}T(a+b ln T). This temperature dependence is a hallmark of the TLS-limited heat conductance at low temperature.

  3. Two-level correlation function of critical random-matrix ensembles

    OpenAIRE

    E. Cuevas

    2004-01-01

    The two-level correlation function $R_{d,\\beta}(s)$ of $d$-dimensional disordered models ($d=1$, 2, and 3) with long-range random-hopping amplitudes is investigated numerically at criticality. We focus on models with orthogonal ($\\beta=1$) or unitary ($\\beta=2$) symmetry in the strong ($b^d \\ll 1$) coupling regime, where the parameter $b^{-d}$ plays the role of the coupling constant of the model. It is found that $R_{d,\\beta}(s)$ is of the form $R_{d,\\beta}(s)=1+\\delta(s)-F_{\\beta}(s^{\\beta}/...

  4. Solving the scattering of N photons on a two-level atom without computation

    Science.gov (United States)

    Roulet, Alexandre; Scarani, Valerio

    2016-09-01

    We propose a novel approach for solving the scattering of light onto a two-level atom coupled to a one-dimensional waveguide. First we express the physical quantity of interest in terms of Feynman diagrams and treat the atom as a non-saturable linear beamsplitter. By using the atomic response to our advantage, a relevant substitution is then made that captures the nonlinearity of the atom, and the final result is obtained in terms of simple integrals over the initial incoming wavepackets. The procedure is not limited to post-scattering quantities and allows for instance to derive the atomic excitation during the scattering event.

  5. Ultrasonic distance sensor improvement using a two-level neural network

    OpenAIRE

    Parvis, Marco; Carullo, Alessio; Ferraris, Franco

    1996-01-01

    This paper discusses the performance improvement that a neural network can provide to a contactless distance sensor based on the measurement of the time of flight (TOF) of an ultrasonic (US) pulse. The sensor, which embeds a correction system for the temperature effect, achieves a distance uncertainty (rms) of less than 0.5 mm over 0.5 m by using a two-level neural network to process the US echo and determine the TOF in the presence of environmental acoustic noise. The network embeds a "guard...

  6. Experimental investigation of slow light propagation in degenerate two-level system

    Institute of Scientific and Technical Information of China (English)

    Wang Li-Rong; Zhao Yan-Ting; Ma Jie; Zhao Jian-Ming; Xiao Lian-Tuan; Jia Suo-Tang

    2006-01-01

    Slowing a light pulse in a degenerate two-level system is observed with a double-frequency sweeping technique. The effects of coupling beam intensity, cell temperature and frequency detunings of the coupling and probe beams in resonance, on the slowing of light propagation in such a system are investigated. It is found that group velocities depend strongly on polarization combinations. A group velocity υg=6760m/s of light pulses in caesium vapour is obtained under the optimal parameters.

  7. Canyon of current suppression in an interacting two-level quantum dot

    DEFF Research Database (Denmark)

    Karlström, O; Pedersen, Jonas Nyvold; Samuelsson, P

    2011-01-01

    Motivated by the recent discovery of a canyon of conductance suppression in a two-level equal-spin quantum dot system [Phys. Rev. Lett. 104, 186804 (2010)], the transport through this system is studied in detail. At low bias and low temperature a strong current suppression is found around...... quantum rate equations. The simulations allow for the prediction of how the suppression is affected by the couplings, the charging energy, the position of the energy levels, the applied bias, and the temperature. We find that, away from electron-hole symmetry, the parity of the couplings is essential...

  8. Phase Dependence of Few-Cycle Pulsed Laser Propagation in a Two-Level Atom Medium

    Institute of Scientific and Technical Information of China (English)

    肖健; 王中阳; 徐至展

    2002-01-01

    The phase-dependent feature of few-cycle pulsed laser propagation in a resonant two-level atom medium is demonstrated by solving the full Maxwell-Bloch equations. Even in the perturbative region, the propagating carrier field and the corresponding spectra of the few-cycle pulsed laser are sensitive to the initial phase due to self-phase modulation. For the larger pulse area, the fact that the carrier-wave reshaping comes from the carrier wave Rabi flopping is also responsible for this sensitivity, and the phase-dependent feature is more evident.

  9. SPECTRUM OF A FEW-CYCLE LASER PULSE PROPAGATING IN A TWO-LEVEL ATOM MEDIUM

    Institute of Scientific and Technical Information of China (English)

    肖健; 王中阳; 徐至展

    2001-01-01

    The spectrum evolution of a few-cycle optical pulse in a resonant two-level atom medium is studied theoretically by using the full Maxwell-Bloch equations. On the propagating pulse, significantly much faster oscillation components separated with the main pulse appear due to strong self-phase modulation and pulse reshaping. In this case, ideal selfinduced transparency cannot occur for a 2r pulse. The spectrum of the 4r pulse shows an evident oscillatory feature because of the continuum interference of the separate pulses. For larger pulse areas, continuum generation from near ultraviolet to infrared occurs.

  10. Fundamentals of PV Efficiency Interpreted by a Two-Level Model

    CERN Document Server

    Alam, Muhammad A

    2012-01-01

    Elementary physics of photovoltaic energy conversion in a two-level atomic PV is considered. We explain the conditions for which the Carnot efficiency is reached and how it can be exceeded! The loss mechanisms - thermalization, angle entropy, and below-bandgap transmission - explain the gap between Carnot efficiency and the Shockley-Queisser limit. Wide varieties of techniques developed to reduce these losses (e.g., solar concentrators, solar-thermal, tandem cells, etc.) are reinterpreted by using a two level model. Remarkably, the simple model appears to capture the essence of PV operation and reproduce the key results and important insights that are known to the experts through complex derivations.

  11. Reactive Power Impact on Lifetime Prediction of Two-level Wind Power Converter

    DEFF Research Database (Denmark)

    Zhou, Dao; Blaabjerg, Frede; Lau, M.;

    2013-01-01

    The influence of reactive power injection on the dominating two-level wind power converter is investigated and compared in terms of power loss and thermal behavior. Then the lifetime of both the partial-scale and full-scale power converter is estimated based on the widely used Coffin-Manson model....... It is concluded that the injection of the reactive power could have serious impact on the power loss and thermal profile, especially at lower wind speed. Furthermore, the introduction of the reactive power could also shorten the lifetime of the wind power converter significantly....

  12. Dynamics of Two-Level Trapped Ion in a Standing Wave Laser in Noncommutative Space

    Institute of Scientific and Technical Information of China (English)

    YANG Xiao-Xue; WU Ying

    2007-01-01

    We study the dynamics of a two-level trapped ion in a standing wave electromagnetic field in two-dimensional (2D) noncommutative spaces in the Lamb-Dicke regime under the rotating wave approximation. We obtain the explicit analytical expressions for the energy spectra, energy eigenstates, unitary time evolution operator, atomic inversion, and phonon number operators. The Rabi oscillations, the collapse, and revivals in the average atomic inversion and the average phonon number are explicitly shown to contain the information of the parameter of the space noncommutativity,which sheds light on proposing new schemes based on the dynamics of trappedion to test the noncommutativity.

  13. Radiation Rate of a Two-Level Atom in a Spacetime with a Reflecting Boundary

    Institute of Scientific and Technical Information of China (English)

    LU Shi-Zhuan; YU Hong-Wei

    2005-01-01

    @@ We study a two-level atom in interaction with a real massless scalar quantum field in a spacetime with a reflecting boundary. We calculate the rate of change of the atomic energy for the atom. The presence of the boundary modifies the quantum fluctuations of the scalar field, which in turn modifies the rate of change of the atomic energy.It is found that the modifications induced by the presence of a boundary make the spontaneous radiation rate of an excited atom to oscillate near the boundary and this oscillatory behaviour may offer a possible opportunity for experimental tests for geometrical (boundary) effects in flat spacetime.

  14. Propagation of Few-Cycle Pulse Laser in Two-Level Atom Medium

    Institute of Scientific and Technical Information of China (English)

    肖健; 王中阳; 徐至展

    2001-01-01

    By comparing the numerical solutions of Maxwell-Bloch equations beyond and within the slowly-varying envelope approximation and the rotating-wave approximation for the propagation of a few-cycle pulse laser in a resonant two-level atom medium, we found that both the Rabi flopping and the refractive index, and subsequently the carrier and the propagation velocity of the few-cycle pulse, are closely connected with the time-derivative behaviour of the electric field. This is because the Rabi flopping is such that the soliton pulse splits during propagation and that a shorter pulse propagates faster than a broader one.

  15. Fractal Two-Level Finite Element Method For Free Vibration of Cracked Beams

    Directory of Open Access Journals (Sweden)

    A.Y.T. Leung

    1998-01-01

    Full Text Available The fractal two-level finite element method is extended to the free vibration behavior of cracked beams for various end boundary conditions. A cracked beam is separated into its singular and regular regions. Within the singular region, infinite number of finite elements are virturally generated by fractal geometry to model the singular behavior of the crack tip. The corresponding numerous degrees of freedom are reduced to a small set of generalized displacements by fractal transformation technique. The solution time and computer storage can be remarkably reduced without sacrifying accuracy. The resonant frequencies and mode shapes computed compared well with the results from a commercial program.

  16. Phase Dependence of Fluorescence Spectrum of a Two-Level Atom in a Trichromatic Field

    Institute of Scientific and Technical Information of China (English)

    LI Jing-Yan; HU Xiang-Ming; LI Xiao-Xia; SHI Wen-Xing; XU Qing; GUO Hong-Ju

    2005-01-01

    @@ We examine the phase-dependent effects in resonance fluorescence of a two-level atom driven by a trichromatic modulated field. It is shown that the fluorescence spectrum depends crucially on the sum of relative phases of the sideband components compared to the central component, not simply on the respective phases. The appearance or disappearance of the central peak and the selective elimination of the sideband peaks are achieved simply by varying the sum phase. Once the sum phase is fixed, the spectrum keeps its features unchanged regardless of the respective relative phases.

  17. The dynamic properties of the two-level entangled atom in an optical field

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    The interaction of an optical field and one of the entangled atoms is analyzed in detail in this paper. Furthermore, the dynamic properties of the two-level entangled atom are manifested. The properties of the action are dependent on the initial state of the atom. After detecting the atom out of the field, we can obtain the state of the other atom moving in the field. It is shown that the state of the atom out of the field influences the dynamic properties of the atom in the field.

  18. Quantum averaging and resonances: two-level atom in a one-mode classical laser field

    Directory of Open Access Journals (Sweden)

    M. Amniat-Talab

    2007-06-01

    Full Text Available   We use a nonperturbative method based on quantum averaging and an adapted from of resonant transformations to treat the resonances of the Hamiltonian of a two-level atom interacting with a one-mode classical field in Floquet formalism. We illustrate this method by extraction of effective Hamiltonians of the system in two regimes of weak and strong coupling. The results obtained in the strong-coupling regime, are valid in the whole range of the coupling constant for the one-photon zero-field resonance.

  19. Quantum dynamics of a microwave driven superconducting phase qubit coupled to a two-level system

    Science.gov (United States)

    Sun, Guozhu; Wen, Xueda; Mao, Bo; Zhou, Zhongyuan; Yu, Yang; Wu, Peiheng; Han, Siyuan

    2010-10-01

    We present an analytical and comprehensive description of the quantum dynamics of a microwave resonantly driven superconducting phase qubit coupled to a microscopic two-level system (TLS), covering a wide range of the external microwave field strength. Our model predicts several interesting phenomena in such an ac driven four-level bipartite system including anomalous Rabi oscillations, high-contrast beatings of Rabi oscillations, and extraordinary two-photon transitions. Our experimental results in a coupled qubit-TLS system agree quantitatively very well with the predictions of the theoretical model.

  20. The logic of two-level games with endogenous lobbying : the case of international environmental agreements

    OpenAIRE

    Haffoudhi, Houda

    2005-01-01

    URL des Cahiers :http://mse.univ-paris1.fr/MSEFramCahier2005.htm; Cahiers de la Maison des Sciences Economiques 2005.54 - ISSN : 1624-0340; International environmental agreements (IEAs) are increasingly important in a globalized economy. The aim of our paper is study the effect of political pressure groups-lobbies on the size and stability of IEAs. To this purpose we use the framework of two-level games to explain how national political situation influences the decisions of governments at the...

  1. Quantum optical properties of a single Inx Ga1-x As-GaAs quantum dot two-level system

    Science.gov (United States)

    Stufler, S.; Ester, P.; Zrenner, A.; Bichler, M.

    2005-09-01

    We report on a two-level system, defined by the ground-state exciton of a single InGaAs/GaAs quantum dot. Saturation spectroscopy combined with ultrahigh spectral resolution gives us a complete description of the system in the steady-state limit. Rabi oscillations and quantum interference experiments, on the other hand, provide a detailed insight into the coherent high excitation regime. All fundamental properties of the two-level system show an excellent quantitative agreement in both domains, even though obtained under entirely different experimental conditions. We thus are able to demonstrate control over an almost ideal two-level system, suitable for possible applications in quantum information processing.

  2. Research of Distributed IDS based on Mobile Agent and Genetic Algorithm%移动Agent和遗传算法在分布式IDS中的应用研究

    Institute of Scientific and Technical Information of China (English)

    高为民; 方小勇

    2014-01-01

    Wireless communication in the wireless space radiation, propagation channel special open wil lead to security of network management and communication is under the great threat. In recent years, the application of genetic algorithm and the mobile agent in IDS more and more research. Based on the traditional knowledge of IDS due to the need to experts in the field of artificial rules and pat erns, and with the change of time and space wil lead to the expert rules limitations highlight, correctness and ef ectiveness of the detection is not high, so the need to optimize the performance of IDS. Firstly introduce the mobile Internet network architecture and security problems, and then put forward a general IDS model and classification, a design based on mobile Agent and genetic algorithm in intrusion detection system, the system has flexibility, scalability and strong adaptability and low error rate, meet the needs of mobile IPv6 environment to use. Experimental results show that the proposed design model in the performance of the algorithm and the detection ef iciency advantages, suitable for mobile network.%无线通信在无线空间传播信道特殊的辐射、开放性会导致网络运营和通信的安全性受到极大的威胁。近年来,将遗传算法和移动代理应用于IDS中的研究越来越多。传统的基于知识的IDS由于需要领域专家人工进行规则和模式的建立,并随着时间和空间的变化会导致专家规则库局限性突显,检测的有效性和正确性不高,因而需要对IDS的性能进行优化。文中首先介绍了移动互联网网络结构和安全问题,然后提出通用的IDS模型结构及分类,设计出一种基于移动Agent和遗传算法的入侵检测系统。该系统具有灵活性强、可扩展性好及适应性强和误检率低等特点,满足移动IPv6环境的使用。实验结果表明提出的设计模型在算法性能和检测效率上具有优势,适合于移动互联网。

  3. SCREENING OF MEDIUM COMPOUNDS USING A TWO-LEVEL FACTORIAL DESIGN FOR SACCHAROMYCES BOULARDII

    Directory of Open Access Journals (Sweden)

    GUOWEI SHU

    2016-04-01

    Full Text Available Even if the probiotic effect of Saccharomyces boulardii is has been reported, this yeast is rarely used in medium composition. Based on single factor experiment, two-level factorial design was employed to evaluate the effect of carbon sources (sucrose, glucose, nitrogen sources (soy peptone, beef extract, yeast extract, calf serum, malt extract and salts (K2HPO4, KH2PO4, MgSO4, Na2HPO4, NaH2PO4, CaCl2, sodium citrate, sodium glutamate on the growth of S. boulardii. At the same time, the optical density (OD in the medium was measured at 560 nm after 36 h of incubation. The result of two-level factorial design experiment showed that calf serum (p = 0.0214 and sodium citrate (p = 0.0045 are the significant growth factors of S. boulardii, sucrose (p = 0.0861 and malt extract (p = 0.0763 are important factors. In addition, sucrose and sodium citrate showed positive effect on the growth of S. boulardii. However, calf serum and malt extract showed negative effect on the growth. And we determined that the optimum medium composition for S. boulardii was as follow: 37.5 g·L-1 sucrose, 6 g·L-1 calf serum, 6 g·L-1 malt extract, 5 g·L-1 sodium citrate.

  4. The Master Equation for Two-Level Accelerated Systems at Finite Temperature

    Science.gov (United States)

    Tomazelli, J. L.; Cunha, R. O.

    2016-10-01

    In this work, we study the behaviour of two weakly coupled quantum systems, described by a separable density operator; one of them is a single oscillator, representing a microscopic system, while the other is a set of oscillators which perform the role of a reservoir in thermal equilibrium. From the Liouville-Von Neumann equation for the reduced density operator, we devise the master equation that governs the evolution of the microscopic system, incorporating the effects of temperature via Thermofield Dynamics formalism by suitably redefining the vacuum of the macroscopic system. As applications, we initially investigate the behaviour of a Fermi oscillator in the presence of a heat bath consisting of a set of Fermi oscillators and that of an atomic two-level system interacting with a scalar radiation field, considered as a reservoir, by constructing the corresponding master equation which governs the time evolution of both sub-systems at finite temperature. Finally, we calculate the energy variation rates for the atom and the field, as well as the atomic population levels, both in the inertial case and at constant proper acceleration, considering the two-level system as a prototype of an Unruh detector, for admissible couplings of the radiation field.

  5. Improved Genetic Algorithm with Two-Level Approximation for Truss Optimization by Using Discrete Shape Variables

    Directory of Open Access Journals (Sweden)

    Shen-yan Chen

    2015-01-01

    Full Text Available This paper presents an Improved Genetic Algorithm with Two-Level Approximation (IGATA to minimize truss weight by simultaneously optimizing size, shape, and topology variables. On the basis of a previously presented truss sizing/topology optimization method based on two-level approximation and genetic algorithm (GA, a new method for adding shape variables is presented, in which the nodal positions are corresponding to a set of coordinate lists. A uniform optimization model including size/shape/topology variables is established. First, a first-level approximate problem is constructed to transform the original implicit problem to an explicit problem. To solve this explicit problem which involves size/shape/topology variables, GA is used to optimize individuals which include discrete topology variables and shape variables. When calculating the fitness value of each member in the current generation, a second-level approximation method is used to optimize the continuous size variables. With the introduction of shape variables, the original optimization algorithm was improved in individual coding strategy as well as GA execution techniques. Meanwhile, the update strategy of the first-level approximation problem was also improved. The results of numerical examples show that the proposed method is effective in dealing with the three kinds of design variables simultaneously, and the required computational cost for structural analysis is quite small.

  6. Thermal analysis of multi-MW two-level wind power converter

    DEFF Research Database (Denmark)

    Zhou, Dao; Blaabjerg, Frede; Mogens, Lau;

    2012-01-01

    In this paper, the multi-MW wind turbine of partial-scale and full-scale two-level power converter with DFIG and direct-drive PMSG are designed and compared in terms of their thermal performance. Simulations of different configurations regarding loss distribution and junction temperature in the p......In this paper, the multi-MW wind turbine of partial-scale and full-scale two-level power converter with DFIG and direct-drive PMSG are designed and compared in terms of their thermal performance. Simulations of different configurations regarding loss distribution and junction temperature...... in the power device in the whole range of wind speed are presented and analyzed. It is concluded that in both partial-scale and full-scale power converter the most thermal stressed power device in the generator-side converter will have higher mean junction temperature and larger junction temperature...... fluctuation compared to grid-side converter at the rated wind speed. Moreover, the thermal performance of the generator-side converter in the partial-scale power converter becomes crucial around the synchronous operating point and should be considered carefully....

  7. Experimental Research into the Two-Level Cylindrical Cyclone with a Different Number of Channels

    Directory of Open Access Journals (Sweden)

    Egidijus Baliukas

    2014-10-01

    Full Text Available The multichannel two-level cyclone has been designed for separating solid particles from airflow and built at the Laboratory of Environmental Protection Technologies of Vilnius Gediminas Technical University. The conducted research is aimed at determining air flow distribution at two levels and channels of the multichannel cyclone. The multifunctional meter Testo-400 and the dynamic Pitot tube have been used form easuring air flow rates in the channels. The obtained results show that the equal volume of air gets into two levels installed inside the cyclone, and rates are distributed equally in the channels of these levels. The maximum air flow rate is recorded in the first channel and occurs when half-rings are set in such positions so that 75% of air flow returns to the previous channel. The biggest aerodynamic resistance is 1660 Pa and has been recorded in the cyclone having eight channels under air flow distribution ratio 75/25. The highest air purification efficiency has been observed in the two-level six-channel cyclone under air flow distribution ratio 75/25. The effectiveness of separating granite particles is 92.1% and that of wood particles – 91.1 when the particles are up to 20 μm in diameter.

  8. Two-level Robust Measurement Fusion Kalman Filter for Clustering Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Peng; QI Wen-Juan; DENG Zi-Li

    2014-01-01

    This paper investigates the distributed fusion Kalman filtering over clustering sensor networks. The sensor network is partitioned as clusters by the nearest neighbor rule and each cluster consists of sensing nodes and cluster-head. Using the minimax robust estimation principle, based on the worst-case conservative system with the conservative upper bounds of noise variances, two-level robust measurement fusion Kalman filter is presented for the clustering sensor network systems with uncertain noise variances. It can significantly reduce the communication load and save energy when the number of sensors is very large. A Lyapunov equation approach for the robustness analysis is presented, by which the robustness of the local and fused Kalman filters is proved. The concept of the robust accuracy is presented, and the robust accuracy relations among the local and fused robust Kalman filters are proved. It is proved that the robust accuracy of the two-level weighted measurement fuser is equal to that of the global centralized robust fuser and is higher than those of each local robust filter and each local weighted measurement fuser. A simulation example shows the correctness and effectiveness of the proposed results.

  9. Assessment of two-level heat pump installations’ power efficiency for heat supply systems

    Directory of Open Access Journals (Sweden)

    Аlla Е. Denysova

    2015-06-01

    Full Text Available The problem of energy saving becomes one of the most important in power engineering. It is caused by exhaustion of world reserves in hydrocarbon fuel, such as gas, oil and coal representing sources of traditional heat supply. Conventional sources has essential shortcomings: low power, ecological and economic efficiencies, that can be eliminated by using alternative methods of power supply, like the considered one: low-temperature natural heat of ground waters of on the basis of heat pump installations application. The heat supply system considered provides an effective use of two-level heat pump installation operating as heat source the Odessa city ground waters during the lowest ambient temperature period. Proposed is a calculation method of heat pump installations on the basis of geothermal heat supply. Calculated are the values of electric energy consumption N by the compressors’ drive, and the heat supply system transformation coefficient µ for a source of geothermal heat from ground waters of Odessa city allowing to estimate efficiency of two-level heat pump installations.

  10. Radiologic and clinical outcomes comparison between single- and two-level pedicle subtraction osteotomies in correcting ankylosing spondylitis kyphosis.

    Science.gov (United States)

    Xu, Hui; Zhang, Yonggang; Zhao, Yongfei; Zhang, Xuesong; Xiao, Songhua; Wang, Yan

    2015-02-01

    Single pedicle subtraction osteotomy (PSO) has been used to correct ankylosing spondylitis (AS) kyphosis successfully, but this approach seems insufficient to correct severe kyphosis. Two-level PSO has been attempted to correct advanced kyphosis in recent years. However, studies have not yet compared outcomes between single and double PSOs, and the indications to perform two-level PSO are unclear. This study aimed to compare the radiologic and clinical outcomes between single- and two-level PSOs in correcting AS kyphosis. This work is a retrospective cohort study. Sixty patients were included. Thirty-seven underwent single-level PSO, and 23 underwent one stage two-level PSO. The radiologic analysis included thoracic kyphosis, thoracolumbar junction, lumbar lordosis, pelvic index, chin-brow vertical angle (CBVA), sagittal vertical axis (SVA), and pelvic tilt (PT). Clinical assessment was performed with a Scoliosis Research Society-22 (SRS-22) outcomes instrument. The operative time, blood loss, and complications were also documented. All of the aforementioned measurements were recorded before surgery, after surgery, and at the last follow-up. The outcomes were compared between the two groups. The operating time was 232±52 minutes for single- and 282±43 minutes for two-level PSOs. The blood loss was 1,240±542 mL (Level 1) and 2,202±737 mL (Level 2). The total spine correction was 43.2°±15.1° (Level 1) and 60.6°±19.1° (Level 2) (p.05). All patients could walk with horizontal vision and lie on their backs postoperatively. The SRS-22 improved from 1.7±0.4 to 4.2±0.8 in the two-level group and 1.8±0.8 to 4.3±0.7 in the single-level group. The fusion of the osteotomy was achieved in each patient. The complications were similar in both groups. Pedicle subtraction osteotomy is an effective method to correct kyphosis with AS. Most patients can be successfully treated by single PSO. In severe patients, two-level PSO may be preferable because its correction

  11. A TWO-LEVEL FINITE ELEMENT GALERKIN METHOD FOR THE NONSTATIONARY NAVIER-STOKES EQUATIONS I: SPATIAL DISCRETIZATION

    Institute of Scientific and Technical Information of China (English)

    Yin-nianHe

    2004-01-01

    In this article we consider a two-level finite element Galerkin method using mixed finite elements for the two-dimensional nonstationary incompressible Navier-Stokes equations. The method yields a H1-optimal velocity approximation and a L2-optimal pressure approximation. The two-level finite element Galerkin method involves solving one small,nonlinear Navier-Stokes problem on the coarse mesh with mesh size H, one linear Stokes problem on the fine mesh with mesh size h <

  12. Non-Hermitian wave packet approximation for coupled two-level systems in weak and intense fields

    CERN Document Server

    Puthumpally-joseph, Raiju; Charron, Eric

    2016-01-01

    We introduce an accurate non-Hermitian Schr\\"odinger-type approximation of Bloch optical equations for two-level systems. This approximation provides a complete description of the excitation, relaxation and decoherence dynamics in both weak and strong laser fields. In this approach, it is sufficient to propagate the wave function of the quantum system instead of the density matrix, providing that relaxation and dephasing are taken into account via automatically-adjusted time-dependent gain and decay rates. The developed formalism is applied to the problem of scattering and absorption of electromagnetic radiation by a thin layer comprised of interacting two-level emitters.

  13. MODELLING AND SIMULATION OF TWO-LEVEL SPACE VECTOR PWM INVERTER USING PHOTOVOLTAIC CELLS AS DC SOURCE

    Directory of Open Access Journals (Sweden)

    Ayse KOCALMIS BILHAN

    2013-01-01

    Full Text Available A space vector PWM method for a two level inverter is proposed in this paper. A two level inverter using space vector modulation strategy has been modeled and simulated with a passive R-L load. Photovoltaic cells are used as DC source for input of two-level inverter. Simulation results are presented for various operation conditions to verify the system model. In this paper, MATLAB/Simulink package program has been used for modeling and simulation of PV cells and two-level space vector pulse width modulation (SVPWM inverter.

  14. 一个基于移动Agent防止双重消费的离线电子支付模型及协议%A Model and Protocols of Off-line Electronic Payment Preventing Double-spending Based on Mobile Agents

    Institute of Scientific and Technical Information of China (English)

    温涛; 王济勇; 刘积仁

    2002-01-01

    Because it is quite unsatisfactory that in anonymous off-line payment schemes the multiple spending of coins can only be detected but not prevented,a model and protocols of off-line electronic payment system preventing double-spending and based on Mobile Agents are presented in this paper,which improve the off-line payment scheme based on hardware observer[1].Because the hardware device called Observer in[2] is replaced by the software object of Mobile Agents which is called Mobile Observer,thus customers don''''''''t need to worry about the bottle-neck and vulnerability owing to all the interactions to a single device.This paper discusses the life recycle of the Mobile Observer and the security problems of the Mobile Agents system.In addition,this model presents a recovery mechanism for the failure of the customer end system.Hence,the sceurity,robustness,practicality of the model are higher than any one of the previous systems.

  15. The Study and Implementation of Large-Scale Network Management Methods (SMANM) Based on the Mobile Agent%基于移动智体的大规模网络管理方法(SMANM)的研究与实现

    Institute of Scientific and Technical Information of China (English)

    庄力可; 张长水

    2003-01-01

    Facing the limitation of activity and efficiency for centralized network management ,we propose the networkmanagement method (SMANM) based on mobile agent and build up the intelligent network management platformbased on SMANM (SMANMP). Example analysis and simulation experiment show that this method can greatly re-duce the bandwidth consumption of large-scale information network ,increase the network management efficiency andactivity service ability.

  16. Mobile Router Developed and Tested

    Science.gov (United States)

    Ivancic, William D.

    2002-01-01

    subnetworks. This is essential in many wireless networks. A mobile router, unlike a mobile IP node, allows entire networks to roam. Hence, a device connected to the mobile router does not need to be a mobile node because the mobile router provides the roaming capabilities. There are three basic elements in the mobile IP: the home agent, the foreign agent, and the mobile node. The home agent is a router on a mobile node's home network that tunnels datagrams for delivery to the mobile node when it is away from home. The foreign agent is a router on a remote network that provides routing services to a registered mobile node. The mobile node is a host or router that changes its point of attachment from one network or subnetwork to another. In mobile routing, virtual communications are maintained by the home agent, which forwards all packets for the mobile networks to the foreign agent. The foreign agent passes the packets to the mobile router, which then forwards the packets to the devices on its networks. As the mobile router moves, it will register with its home agent on its whereabouts via the foreign agent to assure continuous connectivity.

  17. Mobile Learning Using Mobile Phones

    Science.gov (United States)

    Vicente, Paula

    2013-01-01

    The participation in mobile learning programs is conditioned by having/using mobile communication technology. Those who do not have or use such technology cannot participate in mobile learning programs. This study evaluates who are the most likely participants of mobile learning programs by examining the demographic profile and mobile phone usage…

  18. Seamless handoff in Mobile IP

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert; El Malki, Karim; Soliman, Hesham

    2008-01-01

    In a system and method for handing off a mobile node in a seamless manner in a wireless access network, procedures are implemented for allowing the mobile node to synchronize the handoff with a base node (e.g., a home agent) and a correspondent node. In this way, a seamless handoff may be achieved,

  19. Mobile Agent-Based Secure Task Partitioning and Allocation Algorithm for Cloud & Client Computing%一种基于移动Agent的云端计算任务安全分割与分配算法

    Institute of Scientific and Technical Information of China (English)

    徐小龙; 程春玲; 熊婧夷; 王汝传

    2011-01-01

    In order to protect the privacy of the task in the cloud & client computing environment and prevent the malicious nodes or the competitors from prying into the internal logic and objectives of the task, a mobile Agent-based secure task partitioning and allocation algorithm for cloud & client computing is proposed. The new algorithm takes into account the cloud computing cluster server nodes and user terminals nodes together, divides task into a number of appropriate sub-tasks, and utilizes mobile Agent to carry the code and data of sub-tasks to the suitable nodes in accordance with the corresponding task allocation for implementation. The result of developed prototype system shows that, under the protection of the algorithm, the malicious terminal node looking into the code and data of the sub-task assigned to it or even co-attacking the system still can not understand the overall workflow and final objective of the task.%为了保障云端计算环境中任务的计算私密性,防止恶意节点或竞争对手窥探任务的内部逻辑及实现目标,提出一种新颖的基于移动Agent的云端计算安全任务分割与分配算法.算法同时考虑集群服务器节点和用户终端节点的计算能力与各自特点,将任务合理地切分为若干子任务,采用移动Agent来携带子任务的代码和数据部署到适当的任务执行节点上执行.结合实验原型系统对该算法进行性能分析,结果表明其可有效地保障执行子任务的终端节点,即使窥探到分配给它的代码和数据,甚至协同攻击系统,也无法了解该任务的整体执行逻辑和总体目标等.

  20. Quantum driving protocols for a two-level system: From generalized Landau-Zener sweeps to transitionless control

    DEFF Research Database (Denmark)

    Malossi, Nicola; Bason, Mark George; Viteau, Matthieu

    2013-01-01

    We present experimental results on the preparation of a desired quantum state in a two-level system with the maximum possible fidelity using driving protocols ranging from generalizations of the linear Landau-Zener protocol to transitionless driving protocols that ensure perfect following of the ...

  1. Comparison of PI and PR current controllers applied on two-level VSC-HVDC transmission system

    DEFF Research Database (Denmark)

    Manoloiu, A.; Pereria, H.A.; Teodorescu, Remus;

    2015-01-01

    This paper analyzes differences between αβ and dq reference frames regarding the control of two-level VSC-HVDC current loop and dc-link voltage outer loop. In the first part, voltage feedforward effect is considered with PI and PR controllers. In the second part, the feedforward effect is removed...

  2. The dynamical Cooperative Lamb Shift in a system of two-level atoms in a slab-geometry

    Energy Technology Data Exchange (ETDEWEB)

    Friedberg, Richard [Department of Physics, Columbia University, New York, NY 10027 (United States); Manassah, Jamal T., E-mail: jmanassah@gmail.co [HMS Consultants, Inc., PO Box 592, New York, NY 10028 (United States)

    2009-09-14

    Using the eigenmode analysis, we compute the Cooperative Lamb Shift (CLS) as a function of time from the vector photon model for a system of two-level atoms in a slab-geometry for forward and backward emission in two initial states of weak excitation and complete inversion.

  3. THE EXACT SOLUTION OF A TWO-LEVEL ATOM MOVING IN A QUANTIZED TRAVELLING LIGHT FIELD AND A GRAVITATIONAL FIELD

    Institute of Scientific and Technical Information of China (English)

    邹旭波; 许晶波; 高孝纯; 符建

    2001-01-01

    We adopt a dynamical algebraic approach to study the system of a two-level atom moving in a quantized travelling light field and a gravitational field with a multiphoton interaction. The exact solution of the system is obtained and used to discuss the influence of the gravitational field on the collapses and revivals of atomic population, sub-Poissonian statistics.

  4. LCL filter design for three-phase two-level power factor correction using line impedance stabilization network

    DEFF Research Database (Denmark)

    Kouchaki, Alireza; Nymand, Morten

    2016-01-01

    This paper presents LCL filter design method for three-phase two-level power factor correction (PFC) using line impedance stabilization network (LISN). A straightforward LCL filter design along with variation in grid impedance is not simply achievable and inevitably lead to an iterative solution...

  5. Absolute phase control of spectra effects in a two-level medium driven by two-color ultrashort laser pulses

    Energy Technology Data Exchange (ETDEWEB)

    Xia Keyu [State Key Laboratory of High Field Laser Physics, Shanghai Institute of Optics and Fine Mechanics, Chinese Academy of Sciences, Shanghai 201800 (China); Graduate University of Chinese Academy of Sciences (China); Niu Yueping [State Key Laboratory of High Field Laser Physics, Shanghai Institute of Optics and Fine Mechanics, Chinese Academy of Sciences, Shanghai 201800 (China); Graduate University of Chinese Academy of Sciences (China); Li Chunfang [Department of Physics, Shanghai University, Shanghai 200436 (China); Gong Shangqing [CCAST (World Laboratory), PO Box 8730, Beijing 100080 (China) and State Key Laboratory of High Field Laser Physics, Shanghai Institute of Optics and Fine Mechanics, Chinese Academy of Sciences, Shanghai 201800 (China)]. E-mail: sqgong@siom.ac.cn

    2007-01-22

    Using a {omega}-3{omega} combination scenario, we investigate the absolute phase control of the spectra effects for ultrashort laser pulses propagating in a two-level medium. It is found that the higher spectral components can be controlled by the absolute phases. In particular, different absolute phase combinations can lead to the buildup or split of the even harmonics.

  6. Quantum driving protocols for a two-level system: From generalized Landau-Zener sweeps to transitionless control

    DEFF Research Database (Denmark)

    Malossi, Nicola; Bason, Mark George; Viteau, Matthieu

    2013-01-01

    We present experimental results on the preparation of a desired quantum state in a two-level system with the maximum possible fidelity using driving protocols ranging from generalizations of the linear Landau-Zener protocol to transitionless driving protocols that ensure perfect following...

  7. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  8. EVALUATION OF TWO-LEVEL GLOBAL LOAD BALANCING FRAMEWORK IN CLOUD ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Po-Huei Liang

    2015-05-01

    Full Text Available With technological advancements and constant changes of Internet, cloud computing has been today's trend. With the lower cost and convenience of cloud computing services, users have increasingly put their Web resources and information in the cloud environment. The availability and reliability of the client systems will become increasingly important. Today cloud applications slightest interruption, the impact will be significant for users. It is an important issue that how to ensure reliability and stability of the cloud sites. Load balancing would be one good solution. This paper presents a framework for global server load balancing of the Web sites in a cloud with two-level load balancing model. The proposed framework is intended for adapting an open-source load-balancing system and the framework allows the network service provider to deploy a load balancer in different data centers dynamically while the customers need more load balancers for increasing the availability.

  9. The fulfillment of two-level control in experimental optical delay line of Michelson Stellar Interferometer

    Science.gov (United States)

    Chao, Li; Wu, Zhen; Wang, Jianing; Liu, Yi; Chen, Yi

    2010-07-01

    This article is focused on the two-level control system of ODL, which are divided into bottom layer control of linear motor and upper layer control of Piezoelectric Transducer(PZT).This ODL are designed to compensate geometrical optical path difference, which results from the earth rotation, and other disturbances, with high-accuracy and real time. Based on the PLC of PMAC controller, the linear motor tracks the trajectory of the simulated optical path difference to compensate roughly. PZT then compensates the rest error measured by ZLM almost real time. A detailed fulfillment of this method is shown in the article, and the first result data is produced. The result implies that this method is efficient. This article offers the reference for the ODL development with the practical high accuracy of compensation.

  10. A Two-Level Undercut-Profile Substrate for Chemical-Solution-Based Filamentary Coated Conductors

    DEFF Research Database (Denmark)

    Wulff, Anders Christian; Lundeman, Jesper H.; Hansen, Jørn B.

    2016-01-01

    . In the present study, the 2LUPS concept is applied to a commercial cube-textured Ni-5at.% W tape, and the surface of the 2LUPS coated with two Gd2Zr2O7 buffer layers using chemical solution deposition is examined. Except for narrow regions near the edge of upper plateaus, the plateaus are found to be covered......A recently developed two-level undercut-profile substrate (2LUPS), containing two levels of plateaus connected by a curved wall with an undercut profile, enables self-forming filaments in a coated conductor during physical line-of-sight deposition of buffer and superconducting layers...... by strongly textured Gd2Zr2O7 buffer layers after dip coating and sintering....

  11. A two-level approach towards semantic colon segmentation: removing extra-colonic findings.

    Science.gov (United States)

    Lu, Le; Wolf, Matthias; Liang, Jianming; Dundar, Murat; Bi, Jinbo; Salganicoff, Marcos

    2009-01-01

    Computer aided detection (CAD) of colonic polyps in computed tomographic colonography has tremendously impacted colorectal cancer diagnosis using 3D medical imaging. It is a prerequisite for all CAD systems to extract the air-distended colon segments from 3D abdomen computed tomography scans. In this paper, we present a two-level statistical approach of first separating colon segments from small intestine, stomach and other extra-colonic parts by classification on a new geometric feature set; then evaluating the overall performance confidence using distance and geometry statistics over patients. The proposed method is fully automatic and validated using both the classification results in the first level and its numerical impacts on false positive reduction of extra-colonic findings in a CAD system. It shows superior performance than the state-of-art knowledge or anatomy based colon segmentation algorithms.

  12. Spectroscopic properties of a two-level atom interacting with a complex spherical nanoshell

    CERN Document Server

    Moroz, A

    2004-01-01

    Frequency shifts, radiative decay rates, the Ohmic loss contribution to the nonradiative decay rates, fluorescence yields, and photobleaching of a two-level atom radiating anywhere inside or outside a complex spherical nanoshell, i.e. a stratified sphere consisting of alternating silica and gold concentric spherical shells, are studied. The changes in the spectroscopic properties of an atom interacting with complex nanoshells are significantly enhanced, often more than two orders of magnitude, compared to the same atom interacting with a homogeneous dielectric sphere. The changes strongly depend on the nanoshell parameters and the atom position. When an atom approaches a metal shell,the radiative decay rates are strongly enhanced and they increase faster than the Ohmic loss contribution to the nonradiative decay rates. However, the majority of the emitted radiation does not escape to spatial infinity but instead is absorbed. The enhancement of the radiative decay rates in a close proximity of metal boundaries...

  13. Solvent effects on the optical properties of two-level systems with permanent dipole moments

    Science.gov (United States)

    Mastrodomenico, A.; Izquierdo, M. A.; Paz, J. L.; Colmenares, P.

    2013-11-01

    The inclusion of the permanent dipole moments and the solvent on the optical conventional Bloch equations (OCBE) allowed us to obtain analytical expressions for the optical properties of a two-level molecular system. We employed the methodology developed by Colmenares et al.1, in which they model the collisional effect of the solvent through a stochastical function, ξ(t) = ω0 + σ(t), so the OCBE become a set of coupled integro-differential stochastical equations that we solved, up to third order in the incident field, employing the perturbation theory. Once obtained the analytical expressions for the density matrix elements, macroscopic polarization and effective susceptibility of the system, we studied the optical properties derived in the frequency space, inside and outside the rotating wave approximation.

  14. Equivalence of the measures of non-Markovianty for open two-level systems

    CERN Document Server

    Zeng, Hao-Sheng; Zheng, Yan-Ping; Wang, Guo-You

    2011-01-01

    In order to depict the deviation of quantum time evolution in open systems from Markovian processes, different measures have been presented. We demonstrate that the measure proposed by Breuer, Laine and Piilo [Phys. Rev. Lett. 103, 210401 (2009)] and the two measures proposed by Rivas, Huelga and Plenio [Phys. Rev. Lett. 105, 050403 (2010)] have exactly the same non-Markovian time-evolution intervals and thus are really equivalent each other when they apply to open two-level systems coupled to environments via Jaynes-Cummings or dephasing models. This equivalence implies that the three measures in different ways capture the intrinsical characters of non-Markovianty of quantum evolutional processes. We also show that the maximization in the definition of the first measure can be actually removed for the considered models without influencing the sensibility of the measure to detect non-Markovianty.

  15. Equivalence of the measures of non-Markovianity for open two-level systems

    Energy Technology Data Exchange (ETDEWEB)

    Zeng Haosheng; Tang Ning; Zheng Yanping; Wang Guoyou [Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education, and Department of Physics, Hunan Normal University, Changsha 410081 (China)

    2011-09-15

    Different measures have been presented to depict the deviation of quantum time evolution in open systems from Markovian processes. We demonstrate that the measure proposed by Breuer, Laine, and Piilo [Phys. Rev. Lett. 103, 210401 (2009)] and the two measures proposed by Rivas, Huelga, and Plenio [Phys. Rev. Lett. 105, 050403 (2010)] have exactly the same non-Markovian time-evolution intervals and thus are really equivalent to each other when they are applied to open two-level systems coupled to environments via the Jaynes-Cummings or dephasing models. This equivalence implies that the three measures, in different ways, capture the intrinsic character of the non-Markovianity of quantum evolutional processes. We also show that the maximization in the definition of the first measure can be actually removed for the considered models without influencing the sensibility of the measure to detect non-Markovianity.

  16. Photon absorption and emission statistics of a two-level atom in a cavity

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chang J. [Sun Moon University, Asan (Korea, Republic of)

    2012-03-15

    The absorption and the emission of photons by an atom involves quantum jumps between states. We investigate the quantum jump statistics for the system of a two-level atom and a single-mode cavity field. We use the Jaynes-Cummings model for this problem, perform Monte Carlo numerical simulations, and give a detailed exact analysis on these simulations. These studies reveal that the waiting-time distribution (WTD) for photon absorptions (emissions) has a unique novel statistic, and that the photon absorption (emission) rate is not uniform, but counter-intuitively depends on the position in the Rabi cycle. The effects of the nonclassical nature of the field on the WTD is discussed.

  17. Strong nonlinearity-induced correlations for counterpropagating photons scattering on a two-level emitter

    DEFF Research Database (Denmark)

    Nysteen, Anders; McCutcheon, Dara; Mørk, Jesper

    2015-01-01

    We analytically treat the scattering of two counterpropagating photons on a two-level emitter embedded in an optical waveguide. We find that the nonlinearity of the emitter can give rise to significant pulse-dependent directional correlations in the scattered photonic state, which could...... be quantified via a reduction in coincidence clicks in a Hong–Ou–Mandel measurement setup, analogous to a linear beam splitter. Changes to the spectra and phase of the scattered photons, however, would lead to reduced interference with other photons when implemented in a larger optical circuit. We introduce...... suitable fidelity measures which account for these changes and find that high values can still be achieved even when accounting for all properties of the scattered photonic state....

  18. Giant Cooperative Lamb Shift in a density-modulated slab of two-level atoms

    Energy Technology Data Exchange (ETDEWEB)

    Manassah, Jamal T., E-mail: jmanassah@gmail.co [Department of Electrical Engineering, City College of New York, NY 10031 (United States)

    2010-04-19

    A 'slab' of two-level atoms prepared in a superradiant Dicke state exhibits interesting enhancement of the Cooperative Decay Rate (CDR) when its density is modulated at the Bragg condition. In this Letter, complete analytical formulas are given, not only for CDR but also for the Cooperative Lamb Shift (CLS), both at and near the Bragg condition, as a function of the depth of modulation, the thickness of the slab, and the detuning from the Bragg condition. A major new result is that for detuning O(1/m) (where m=thickness/wavelength) the CLS takes on 'giant' values, proportional to m. The reason for this giant CLS is explored.

  19. Controlling spontaneous emission of a two-level atom by hyperbolic metamaterials

    CERN Document Server

    Liu, Zheng; Jiang, Xunya

    2012-01-01

    Within the frame of quantum optics we analyze the properties of spontaneous emission of two-level atom in media with indefinite permittivity tensor where the geometry of the dispersion relation is characterized by an ellipsoid or a hyperboloid(hyperbolic medium). The decay rate is explicitly given with the orientation of the dipole transition matrix element taken into account. It indicates that for the ellipsoid case the intensity of the photons coupled into different modes can be tuned by changing the direction of the matrix element and for the hyperboloid case it is found that spontaneous emission in hyperbolic medium can be dramatically enhanced compared to the dielectric background. Moreover, spontaneous emission exhibit the strong directivity and get the maximum in the asymptote direction.

  20. TWO-LEVEL HIERARCHICAL COORDINATION QUEUING METHOD FOR TELECOMMUNICATION NETWORK NODES

    Directory of Open Access Journals (Sweden)

    M. V. Semenyaka

    2014-07-01

    Full Text Available The paper presents hierarchical coordination queuing method. Within the proposed method a queuing problem has been reduced to optimization problem solving that was presented as two-level hierarchical structure. The required distribution of flows and bandwidth allocation was calculated at the first level independently for each macro-queue; at the second level solutions obtained on lower level for each queue were coordinated in order to prevent probable network link overload. The method of goal coordination has been determined for multilevel structure managing, which makes it possible to define the order for consideration of queue cooperation restrictions and calculation tasks distribution between levels of hierarchy. Decisions coordination was performed by the method of Lagrange multipliers. The study of method convergence has been carried out by analytical modeling.

  1. Two-level system noise reduction for Microwave Kinetic Inductance Detectors

    CERN Document Server

    Noroozian, Omid; Zmuidzinas, Jonas; LeDuc, Henry G; Mazin, Benjamin A

    2009-01-01

    Noise performance is one of the most crucial aspects of any detector. Superconducting Microwave Kinetic Inductance Detectors (MKIDs) have an "excess" frequency noise that shows up as a small time dependent jitter of the resonance frequency characterized by the frequency noise power spectrum measured in units of Hz^2/Hz. Recent studies have shown that this noise almost certainly originates from a surface layer of two-level system (TLS) defects on the metallization or substrate. Fluctuation of these TLSs introduces noise in the resonator due to coupling of the TLS electric dipole moments to the resonator's electric field. Motivated by a semi-empirical quantitative theory of this noise mechanism, we have designed and tested new resonator geometries in which the high-field "capacitive" portion of the CPW resonator is replaced by an interdigitated capacitor (IDC) structure with 10 - 20 micron electrode spacing, as compared to the 2 micron spacing used for our more conventional CPW resonators. Measurements show tha...

  2. Parallel two-level domain decomposition based Jacobi-Davidson algorithms for pyramidal quantum dot simulation

    Science.gov (United States)

    Zhao, Tao; Hwang, Feng-Nan; Cai, Xiao-Chuan

    2016-07-01

    We consider a quintic polynomial eigenvalue problem arising from the finite volume discretization of a quantum dot simulation problem. The problem is solved by the Jacobi-Davidson (JD) algorithm. Our focus is on how to achieve the quadratic convergence of JD in a way that is not only efficient but also scalable when the number of processor cores is large. For this purpose, we develop a projected two-level Schwarz preconditioned JD algorithm that exploits multilevel domain decomposition techniques. The pyramidal quantum dot calculation is carefully studied to illustrate the efficiency of the proposed method. Numerical experiments confirm that the proposed method has a good scalability for problems with hundreds of millions of unknowns on a parallel computer with more than 10,000 processor cores.

  3. Quantum mechanical treatment of traveling light in an absorptive medium of two-level systems

    Science.gov (United States)

    Inoue, K.

    2016-12-01

    Quantum mechanical treatment of a light wave that propagates through an absorptive medium is presented. Unlike a phenomenological beam-splitter model conventionally employed to describe a traveling light in a lossy medium, the time evolution of the field operator is derived using the Heisenberg equation with the Hamiltonian for a physical system, where the light wave interacts with an ensemble of two-level systems in a medium. Using the obtained time-evolved field operators, the mean values and variances of the light amplitude and the photon number are evaluated. The results are in agreement with those obtained in the beam-splitter model, giving a logical theoretical basis for the phenomenological beam-splitter model.

  4. Optimal state transfer of a single dissipative two-level system

    Science.gov (United States)

    Jirari, Hamza; Wu, Ning

    2016-04-01

    Optimal state transfer of a single two-level system (TLS) coupled to an Ohmic boson bath via off-diagonal TLS-bath coupling is studied by using optimal control theory. In the weak system-bath coupling regime where the time-dependent Bloch-Redfield formalism is applicable, we obtain the Bloch equation to probe the evolution of the dissipative TLS in the presence of a time-dependent external control field. By using the automatic differentiation technique to compute the gradient for the cost functional, we calculate the optimal transfer integral profile that can achieve an ideal transfer within a dimer system in the Fenna-Matthews-Olson (FMO) model. The robustness of the control profile against temperature variation is also analyzed.

  5. Interaction between two SU(1 , 1) quantum systems and a two-level atom

    Science.gov (United States)

    Abdalla, M. Sebawe; Khalil, E. M.; Obada, A. S.-F.

    2016-07-01

    We consider a two-level atom interacting with two coupled quantum systems that can be represented in terms of su(1 , 1) Lie algebra. The wave function that is obtained using the evolution operator for the atom is initially in a superposition state and the coupled su(1 , 1) systems in a pair coherent Barut-Girardello coherent state. We then discuss atomic inversion, where more periods of revivals are observed and compared with a single su(1 , 1) quantum system. For entanglement and squeezing phenomena, the atomic angles coherence and phase as well as the detuning are effective parameters. The second-order correlation function displays Bunching and anti-Bunching behavior.

  6. On Two-Level State-Dependent Routing Polling Systems with Mixed Service

    Directory of Open Access Journals (Sweden)

    Guan Zheng

    2015-01-01

    Full Text Available Based on priority differentiation and efficiency of the system, we consider an N+1 queues’ single-server two-level polling system which consists of one key queue and N normal queues. The novel contribution of the present paper is that we consider that the server just polls active queues with customers waiting in the queue. Furthermore, key queue is served with exhaustive service and normal queues are served with 1-limited service in a parallel scheduling. For this model, we derive an expression for the probability generating function of the joint queue length distribution at polling epochs. Based on these results, we derive the explicit closed-form expressions for the mean waiting time. Numerical examples demonstrate that theoretical and simulation results are identical and the new system is efficient both at key queue and normal queues.

  7. Semiclassical electrodynamics of alien atoms in interacting media II. Two-level systems

    Science.gov (United States)

    Elçi, Ahmet

    1985-03-01

    The previously developed self-consistent mean field theory of atoms entering an interacting medium is specialized to two-level alien atoms. It is shown that the medium may invert or split the original two levels, and that there is an intimate connection between the dressed atom spectrum and the statistical nature of the ensemble of alien atoms in the self-consistent mean field approximation. The optical susceptibility of alien atoms while inside the medium is calculated, and the lineshape and position of the optical resonance are shown to depend on the intensity of the optical field applied. There may be more than one phase possible for the atomic ensemble as a result of optical excitation.

  8. Information Entropy Squeezing of a Two-Level Atom Interacting with Two-Mode Coherent Fields

    Institute of Scientific and Technical Information of China (English)

    LIU Xiao-Juan; FANG Mao-Fa

    2004-01-01

    From a quantum information point of view we investigate the entropy squeezing properties for a two-level atom interacting with the two-mode coherent fields via the two-photon transition. We discuss the influences of the initial state of the system on the atomic information entropy squeezing. Our results show that the squeezed component number,squeezed direction, and time of the information entropy squeezing can be controlled by choosing atomic distribution angle,the relative phase between the atom and the two-mode field, and the difference of the average photon number of the two field modes, respectively. Quantum information entropy is a remarkable precision measure for the atomic squeezing.

  9. Temperature dependent quantum correlations in three dipolar coupled two-level atoms

    CERN Document Server

    Ahmed, Shaik

    2016-01-01

    We investigate the thermal entanglement characteristics of three dipole-coupled two-level atoms arranged in two different configurations - in a line with nearest neighbour coupling and in a closed loop with each atom interacting with both its neighbours. It is observed that in loop configuration, any one of the three atoms is indeed entangled with the other two atoms in the system, which are not mutually entangled, and further that this feature is specific to only the loop configuration, which is markedly absent in the line configuration. A detailed study of the quantum correlations demonstrated how these can be tuned by varying the temperature and the dipole dipole coupling strength, in both the configurations.

  10. Quantum transport in a two-level quantum dot driven by coherent and stochastic fields

    Science.gov (United States)

    Ke, Sha-Sha; Miao, Ling-E.; Guo, Zhen; Guo, Yong; Zhang, Huai-Wu; Lü, Hai-Feng

    2016-12-01

    We study theoretically the current and shot noise properties flowing through a two-level quantum dot driven by a strong coherent field and a weak stochastic field. The interaction x(t) between the quantum dot and the stochastic field is assumed to be a Gaussian-Markovian random process with zero mean value and correlation function = Dκe - κ | t - t ‧ | , where D and κ are the strength and bandwidth of the stochastic field, respectively. It is found that the stochastic field could enhance the resonant effect between the quantum dot and the coherent field, and generate new resonant points. At the resonant points, the state population difference between two levels is suppressed and the current is considerably enhanced. The zero-frequency shot noise of the current varies dramatically between sub- and super-Poissonian characteristics by tuning the stochastic field appropriately.

  11. Intrinsic decoherence of entanglement of a single quantized field interacting with a two-level atom

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    How the mean photon number, the probability of excited state and intrinsic decoherence coefficient influence the time evolution of entanglement is unknown, when a single-mode quantized optic field and a two-level atom coupling system is governed by Milburn equation. The Jaynes-Cummings model is considered. A lower bound of concurrence is proposed to calculate the entanglement. Simulation results indicate that the entanglement of system increases following the increasing of intrinsic decoherence coefficient or the decreasing of the mean photon number. Besides that, the entanglement of system decreases, while the probability of exited state increases from 0 to 0.1, and increases, while the probability of exited state increases from 0.1 to 1.

  12. Nonvolatile optical memory via recoil-induced resonance in a pure two-level system

    Science.gov (United States)

    de Almeida, A. J. F.; Maynard, M.-A.; Banerjee, C.; Felinto, D.; Goldfarb, F.; Tabosa, J. W. R.

    2016-12-01

    We report on the storage of light via the phenomenon of recoil-induced resonance in a pure two-level system of cold cesium atoms. We use a strong coupling beam and a weak probe beam to couple different external momentum states of the cesium atom via two-photon Raman interaction which leads to the storage of the optical information of the probe beam. We have also measured the probe transmission spectrum, as well as the light storage spectrum which reveals very narrow subnatural resonance features showing absorption and gain. We have demonstrated that this memory presents the unique property of being insensitive to the reading process, which does not destroy the stored information leading to a memory lifetime limited only by the atomic thermal motion.

  13. Quantum logic gates with two-level trapped ions beyond Lamb-Dicke limit

    Institute of Scientific and Technical Information of China (English)

    Zheng Xiao-Juan; Luo Yi-Min; Cai Jian-Wu

    2009-01-01

    In the system with two two-level ions confined in a linear trap,this paper presents a simple scheme to realize the quantum phase gate(QPG)and the swap gate beyond the Lamb-Dicke(LD)limit.These two-qubit quantum logic gates only involve the internal states of two trapped ions.The scheme does not use the vibrational mode as the data bus and only requires a single resonant interaction of the ions with the lasers.Neither the LD approximation nor the auxiliary atomic level is needed in the proposed scheme.Thus the scheme is simple and the interaction time is very short,which is important in view of decoherence.The experimental feasibility for achieving this scheme is also discussed.

  14. A DISCRETE TIME TWO-LEVEL MIXED SERVICE PARALLEL POLLING MODEL

    Institute of Scientific and Technical Information of China (English)

    Guan Zheng; Zhao Dongfeng; Zhao Yifan

    2012-01-01

    We present a discrete time single-server two-level mixed service polling systems with two queue types,one center queue and N normal queues.Two-level means the center queue will be successive served after each normal queue.In the first level,server visits between the center queue and the normal queue.In the second level,normal queues are polled by a cyclic order.Mixed service means the service discipline are exhaustive for center queue,and parallel i-limited for normal queues.We propose an imbedded Markov chain framework to drive the closed-form expressions for the mean cycle time,mean queue length,and mean waiting time.Numerical examples demonstrate that theoretical and simulation results are identical the new system efficiently differentiates priorities.

  15. Three-body entanglement induced by spontaneous emission in a three two-level atoms system

    Institute of Scientific and Technical Information of China (English)

    Liao Xiang-Ping; Fang Mao-Fa; Zheng Xiao-Juan; Cai Jian-Wu

    2006-01-01

    We study three-body entanglement induced by spontaneous emission in a three two-level atoms system by using the entanglement tensor approach. The results show that the amount of entanglement is strongly dependent on the initial state of the system and the species of atoms. The three-body entanglement is the result of the coherent superposition of the two-body entanglements. The larger the two-body entanglement is, the stronger the three-body entanglement is. On the other hand, if there exists a great difference in three two-body entanglement measures, the three-body entanglement is very weak. We also find that the maximum of the two-body entanglement obtained with nonidentical atoms is greater than that obtained with identical atoms via adjusting the difference in atomic frequency.

  16. The Level-split of the Two-level Entangled Atom in an Optical Field

    Institute of Scientific and Technical Information of China (English)

    CAO Zhuoliang; HUANG Ting; GUO Guangcan; YI Youming

    2002-01-01

    The behavior of a two-level entangled atom in an optical field with circular polarization is studied in this paper. The interaction of an optical field and one of the entangled atoms is analyzed in detail. A general solution of the SchrAo¨Gdinger equation about the motion of the entangled atom is obtained. The properties of the action are dependent on the initial state of the atom. By detecting the entangled atom out of the field, we can obtain the state of the other atom moving in the field. It is shown that the state of the atom out of the field will influence the energies of the split-levels of the atom in the field.

  17. Two-level evaluation on sensor interoperability of features in fingerprint image segmentation.

    Science.gov (United States)

    Yang, Gongping; Li, Ying; Yin, Yilong; Li, Ya-Shuo

    2012-01-01

    Features used in fingerprint segmentation significantly affect the segmentation performance. Various features exhibit different discriminating abilities on fingerprint images derived from different sensors. One feature which has better discriminating ability on images derived from a certain sensor may not adapt to segment images derived from other sensors. This degrades the segmentation performance. This paper empirically analyzes the sensor interoperability problem of segmentation feature, which refers to the feature's ability to adapt to the raw fingerprints captured by different sensors. To address this issue, this paper presents a two-level feature evaluation method, including the first level feature evaluation based on segmentation error rate and the second level feature evaluation based on decision tree. The proposed method is performed on a number of fingerprint databases which are obtained from various sensors. Experimental results show that the proposed method can effectively evaluate the sensor interoperability of features, and the features with good evaluation results acquire better segmentation accuracies of images originating from different sensors.

  18. A two-level formal specification of a defense communications system

    Energy Technology Data Exchange (ETDEWEB)

    Chisholm, G.H. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.; Kemmerer, R.A. [Univ. of California, Santa Barbara, CA (United States). Reliable Software Group

    1994-04-01

    Computer systems are being used in critical situations with sensitive data, which makes it very important to ensure that these systems perform as desired. The defense communications system contains particularly sensitive data. A two-level ASLAN formal specification of a defense communications system is presented. The ASLAN model is designed to enhance the understanding of critical requirements and demands of the defense communications system. For the top-level (high-level) specifications, the structural details of the actual network are actual network are abstracted to allow more time for examining the interactions between the sites and the network. At this level, DataGrams move through the network, although the actual routing decisions are not specified. More details are added in the second-level specification. At this level, structure is added to the network.

  19. Two-Level Verification of Data Integrity for Data Storage in Cloud Computing

    Science.gov (United States)

    Xu, Guangwei; Chen, Chunlin; Wang, Hongya; Zang, Zhuping; Pang, Mugen; Jiang, Ping

    Data storage in cloud computing can save capital expenditure and relive burden of storage management for users. As the lose or corruption of files stored may happen, many researchers focus on the verification of data integrity. However, massive users often bring large numbers of verifying tasks for the auditor. Moreover, users also need to pay extra fee for these verifying tasks beyond storage fee. Therefore, we propose a two-level verification of data integrity to alleviate these problems. The key idea is to routinely verify the data integrity by users and arbitrate the challenge between the user and cloud provider by the auditor according to the MACs and ϕ values. The extensive performance simulations show that the proposed scheme obviously decreases auditor's verifying tasks and the ratio of wrong arbitration.

  20. Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

    Directory of Open Access Journals (Sweden)

    Xu-Ren Luo

    2011-05-01

    Full Text Available In recent years, reversible data hiding has attracted much more attention than before. Reversibilitysignifies that the original media can be recovered without any loss from the marked media afterextracting the embedded message. This paper presents a new method that adopts two-level wavelettransform and exploits the feature of large wavelet coefficient variance to achieve the goal of highcapacity with imperceptibility. Our method differs from those of previous ones in which the waveletcoefficients histogram not gray-level histogram is manipulated. Besides, clever shifting rules areintroduced into histogram to avoid the decimal problem in pixel values after recovery to achievereversibility. With small alteration of the wavelet coefficients in the embedding process, and therefore lowvisual distortion is obtained in the marked image. In addition, an important feature of our design is thatthe use of threshold is much different from previous studies. The results indicate that our design issuperior to many other state-of-the-art reversible data hiding schemes.

  1. A two-level on-line learning algorithm of Artificial Neural Network with forward connections

    Directory of Open Access Journals (Sweden)

    Stanislaw Placzek

    2014-12-01

    Full Text Available An Artificial Neural Network with cross-connection is one of the most popular network structures. The structure contains: an input layer, at least one hidden layer and an output layer. Analysing and describing an ANN structure, one usually finds that the first parameter is the number of ANN’s layers. A hierarchical structure is a default and accepted way of describing the network. Using this assumption, the network structure can be described from a different point of view. A set of concepts and models can be used to describe the complexity of ANN’s structure in addition to using a two-level learning algorithm. Implementing the hierarchical structure to the learning algorithm, an ANN structure is divided into sub-networks. Every sub-network is responsible for finding the optimal value of its weight coefficients using a local target function to minimise the learning error. The second coordination level of the learning algorithm is responsible for coordinating the local solutions and finding the minimum of the global target function. In the article a special emphasis is placed on the coordinator’s role in the learning algorithm and its target function. In each iteration the coordinator has to send coordination parameters into the first level of subnetworks. Using the input X and the teaching Z vectors, the local procedures are working and finding their weight coefficients. At the same step the feedback information is calculated and sent to the coordinator. The process is being repeated until the minimum of local target functions is achieved. As an example, a two-level learning algorithm is used to implement an ANN in the underwriting process for classifying the category of health in a life insurance company.

  2. Segmental and global lordosis changes with two-level axial lumbar interbody fusion and posterior instrumentation

    Science.gov (United States)

    Melgar, Miguel A; Tobler, William D; Ernst, Robert J; Raley, Thomas J; Anand, Neel; Miller, Larry E; Nasca, Richard J

    2014-01-01

    Background Loss of lumbar lordosis has been reported after lumbar interbody fusion surgery and may portend poor clinical and radiographic outcome. The objective of this research was to measure changes in segmental and global lumbar lordosis in patients treated with presacral axial L4-S1 interbody fusion and posterior instrumentation and to determine if these changes influenced patient outcomes. Methods We performed a retrospective, multi-center review of prospectively collected data in 58 consecutive patients with disabling lumbar pain and radiculopathy unresponsive to nonsurgical treatment who underwent L4-S1 interbody fusion with the AxiaLIF two-level system (Baxano Surgical, Raleigh NC). Main outcomes included back pain severity, Oswestry Disability Index (ODI), Odom's outcome criteria, and fusion status using flexion and extension radiographs and computed tomography scans. Segmental (L4-S1) and global (L1-S1) lumbar lordosis measurements were made using standing lateral radiographs. All patients were followed for at least 24 months (mean: 29 months, range 24-56 months). Results There was no bowel injury, vascular injury, deep infection, neurologic complication or implant failure. Mean back pain severity improved from 7.8±1.7 at baseline to 3.3±2.6 at 2 years (p lordosis, defined as a change in Cobb angle ≤ 5°, was identified in 84% of patients at L4-S1 and 81% of patients at L1-S1. Patients with loss or gain in segmental or global lordosis experienced similar 2-year outcomes versus those with less than a 5° change. Conclusions/Clinical Relevance Two-level axial interbody fusion supplemented with posterior fixation does not alter segmental or global lordosis in most patients. Patients with postoperative change in lordosis greater than 5° have similarly favorable long-term clinical outcomes and fusion rates compared to patients with less than 5° lordosis change. PMID:25694920

  3. The Development and Application of a Mobile Agent System--Jama Based on Java%一种基于Java的可移动Agent系统--Jama的开发和应用

    Institute of Scientific and Technical Information of China (English)

    赵瑞彬; 周浩; 秦世引; 徐宁寿; 肖云

    2000-01-01

    根据作者研究开发一种基于Java的可移动智能体(Mobile Agent,MA)系统-Jama的实际经验和体会,在对开发可移动Agent系统所涉及的几个关键问题进行了深入的讨论之后,给出了Jama系统的组织结构和功能实现模式,并对Jama系统的功能特点做了重点说明.最后结合在网络环境下使智能自动化的实际工程背景,给出了以Jama系统为基础的将MA技术与简单网络管理协议(Simple Network Management Protocol,SNMP)相结合,以实现网络资源优化管理的应用模型.

  4. Scalable Fault-Tolerant Location Management Scheme for Mobile IP

    Directory of Open Access Journals (Sweden)

    JinHo Ahn

    2001-11-01

    Full Text Available As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home of foreign agents can be allocated to a network in order to improve performance and availability. Previous fault tolerant schemes (denoted by PRT schemes to mask failures of the mobility agents use passive replication techniques. However, they result in high failure-free latency during registration process if the number of mobility agents in the same network increases, and force each mobility agent to manage bindings of all the mobile nodes registering with its network. In this paper, we present a new fault-tolerant scheme (denoted by CML scheme using checkpointing and message logging techniques. The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared with the PRT schemes. Additionally, the CML scheme allows each failed mobility agent to recover bindings of the mobile nodes registering with the mobility agent when it is repaired even if all the other mobility agents in the same network concurrently fail.

  5. Agentes de información Information Agents

    Directory of Open Access Journals (Sweden)

    Alfonso López Yepes

    2005-12-01

    Full Text Available Este artículo realiza un repaso sobre las tipologías de agentes de información y describe aspectos como movilidad, racionalidad y adaptatividad, y el ajuste final de estos conceptos a entornos distribuidos como Internet, donde este tipo de agentes tienen un amplio grado de aplicación. Asimismo, se propone una arquitectura de agentes para un sistema multiagente de recuperación de información donde se aplica un paradigma documental basado en el concepto de ciclo documental.This article summarizes the main information agent types reflecting on issues such as mobility, rationality, adaptability and the final adjustment of this concepts to distributed environments such as the Internet, where this kind of agents has wide range application. Likewise, an information agent architecture is proposed to create a multi-agent information retrieval system in which a documentary paradigm based on the documentary cycle is developed.

  6. Mobile Computing Trends in Saudi Arabia: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Mutlaq B. Alotaibi

    2014-12-01

    Full Text Available The main purpose of this research was to gain an understanding of the adoption behavior of mobile computing in Saudi Arabia. In particular, it aimed to acquire new insight into mobile computing trends, specifically in Saudi Arabia, in order to develop hypotheses and formulate precise criteria for mobile computing evaluation. In order to achieve these aims, the researcher created a focus group by recruiting eight participants with solid background knowledge of usability engineering and mobile computing. The focus group proposed a four-phase process: determination, qualification, categorization and evaluation of the mobile computing applications developed by Saudi organizations. During the determination phase, two hundred and twenty seven (n=227 mobile applications were determined as having been developed by organizations in Saudi Arabia. During the qualification phase, one hundred and forty two (n=142 mobile applications were qualified. Within the categorization phase, the experts categorized only the qualified applications into a two-level categorization hierarchy. Finally, in the evaluation phase, the qualified applications were evaluated in terms of purpose, platform, visual appearance, content, organization and usability. The results herein revealed that 43% of the mobile applications in Saudi Arabia were M-Government applications, while 57% were M-Business applications. In addition, the study proposed a sample of thirty six (n=36 applications as having statistical significance from all of the mobile applications in Saudi Arabia.

  7. AGENT based structural static and dynamic collaborative optimization

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A static and dynamic collaborative optimization mode for complex machine system and itsontology project relationship are put forward, on which an agent-based structural static and dynamiccollaborative optimization system is constructed as two agent colonies: optimization agent colony andfinite element analysis colony. And a two-level solving strategy as well as the necessity and possibilityfor handing with finite element analysis model in multi-level mode is discussed. Furthermore, the coop-eration of all FEA agents for optimal design of complicated structural is studied in detail. Structural stat-ic and dynamic collaborative optimization of hydraulic excavator working equimpent is taken as an ex-ample to show that the system is reliable.

  8. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix

    that of ‘mobilities design’. The book revolves around the following research question: How are design decisions and interventions staging mobilities? It builds upon the Staging Mobilities model (Jensen 2013) in an explorative inquiry into the problems and potentials of the design of mobilities. The exchange value...... between mobilities and design research is twofold. To mobilities research this means getting closer to the ‘material’, and to engage in the creative, explorative and experimental approaches of the design world which offer new potentials for innovative research. Design research, on the other hand, might...... enter into a fruitful relationship with mobilities research, offering a relational and mobile design thinking and a valuable base for a reflective design practice around the ubiquitous structures, spaces and systems of mobilities....

  9. Mobile Agents for Battlespace Information Exchange

    Science.gov (United States)

    2013-05-01

    Architecture ( CORBA ) standards. MASIF defines two interfaces MAFAgentSystem for MA management tasks and MAFFinder for MA discovery [MAL98]. AN...used for communication depends on the chosen framework. It is preferred however that communication is based on an open standard like CORBA or...provides a means to specifically identify an MA. When the MA identifier is coupled with a directory service (e.g. CORBA Name Service) then a specific

  10. 一种基于移动Agent的云端计算任务安全分割与分配算法%Security segmentation and allocation algorithm based on mobile Agent for cloud computing task

    Institute of Scientific and Technical Information of China (English)

    倪斌; 李红兰

    2015-01-01

    To guarantee the confidentiality and privacy of computing tasks operated in cloud computing environment,and avoid the malicious nodes or the competitors peering the internal structure,system logic and task objects,a new security seg-mentation and allocation algorithm of cloud computing task based on mobile Agent needs to be constructed. This algorithm com-bines with the computing ability and characteristics of cluster server nodes,and the relevant aspects of the user terminal nodes are taken into account. The entire task is segmented into some sub-task effectively,then the mobile Agent is taken as the carrier of data structure and code structure of the sub-task. The data and codes are allocated to reasonable task execution nodes corre-sponding to them. The performance is analyzed and explored by combining with experimental prototype system and this algo-rithm. It proved that the algorithm has better validity to guarantee the terminal nodes security of executing sub-task. When the malicious nodes peered the data and codes allocated to the task execution nodes,even the malicious nodes are combined together to attack on the system,it can not threaten the overall execution thought of the task and the security of the entire object.%为了让在云端计算环境中运行的计算任务机密和隐私得到保障,避免恶意节点或竞争对手窥视任务的内部结构、系统逻辑和任务目标,必须构建一种全新的基于移动Agent的云端计算任务安全分割与分配算法.这种算法不仅要结合集群服务器节点的计算能力和特征,还要将用户终端节点的相关方面也考虑进去,把整个大的任务合理地分割成若干子任务,并将移动Agent作为这些子任务的数据结构和代码构成的载体;然后把这些数据和代码分配到与之对应的合理的任务执行节点上进行工作.通过将实验原型系统和该算法结合起来进行性能分析与探索,证明该算法对执

  11. Mobility Divides

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    Contemporary mobilities are cultural and social manifestations, and the mobile practices in the everyday life of billions of humans are re-configuring senses of place, self, other and relationships to the built environment. The way ‘mobile situations’ are staged in designed and built environments...... are increasingly becoming ‘second nature’ but also expressions of power, exclusion, and difference. In this talk I will be applying a perspective of ‘mobile situationism’ illustrating how mobile everyday life practices are staged ‘from above’ in planning and policy frameworks, design codes and architectural...... designs, but also how the situated and embodied mobile everyday life practices are staged ‘from below’ in concrete acts of choice concerning modes of mobilities, ways of moving and interacting. The ‘staging mobilites’ framework opens up to an understanding of the meaning of ‘mobilities design...

  12. Mobile payment

    CERN Document Server

    Lerner, Thomas

    2013-01-01

    Paying with mobile devices such as mobile phones or smart phones will expand worldwide in the coming years. This development provides opportunities for various industries (banking, telecommunications, credit card business, manufacturers, suppliers, retail) and for consumers.

  13. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2015-01-01

    are already mobile – but lexicography is not yet fully ready for the mobile challenge, mobile users and mobile user situations. The article is based on empirical data from two surveys comprising 10 medical doctors, who were asked to look up five medical substances with the medical dictionary app Medicin...... and that lexicographic innovation is needed. A new type of users, new user situations and new access methods call for new lexicographic solutions, and this article proposes a six-pointed hexagram model, which can be used during dictionary app design to lexicographically calibrate the six dimensions in mobile......Mobile phones are ubiquitous and have completely transformed the way we live, work, learn and conduct our everyday activities. Mobile phones have also changed the way users access lexicographic data. In fact, it can be argued that mobile phones and lexicography are not yet compatible. Modern users...

  14. Mobility Divides

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    Contemporary mobilities are cultural and social manifestations, and the mobile practices in the everyday life of billions of humans are re-configuring senses of place, self, other and relationships to the built environment. The way ‘mobile situations’ are staged in designed and built environments...... are increasingly becoming ‘second nature’ but also expressions of power, exclusion, and difference. In this talk I will be applying a perspective of ‘mobile situationism’ illustrating how mobile everyday life practices are staged ‘from above’ in planning and policy frameworks, design codes and architectural...... designs, but also how the situated and embodied mobile everyday life practices are staged ‘from below’ in concrete acts of choice concerning modes of mobilities, ways of moving and interacting. The ‘staging mobilites’ framework opens up to an understanding of the meaning of ‘mobilities design...

  15. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2015-01-01

    Mobile phones are ubiquitous and have completely transformed the way we live, work, learn and conduct our everyday activities. Mobile phones have also changed the way users access lexicographic data. In fact, it can be argued that mobile phones and lexicography are not yet compatible. Modern users...... are already mobile – but lexicography is not yet fully ready for the mobile challenge, mobile users and mobile user situations. The article is based on empirical data from two surveys comprising 10 medical doctors, who were asked to look up five medical substances with the medical dictionary app Medicin...... and that lexicographic innovation is needed. A new type of users, new user situations and new access methods call for new lexicographic solutions, and this article proposes a six-pointed hexagram model, which can be used during dictionary app design to lexicographically calibrate the six dimensions in mobile...

  16. Model of the photoexcitation processes of a two-level molecule coherently coupled to an optical antenna.

    Science.gov (United States)

    Nakatani, Masatoshi; Nobuhiro, Atsushi; Yokoshi, Nobuhiko; Ishihara, Hajime

    2013-06-07

    We theoretically investigate photoexcitation processes of a two-level molecular system coherently coupled with an antenna system having a significant dissipation. The auxiliary antenna enables the whole system to exhibit anomalous optical effects by controlling the coupling with the molecule. For example, in the weak excitation regime, the quantum interference yields a distinctive energy transparency through the antenna, which drastically reduces the energy dissipation. On the other hand, in the strong excitation regime, a population inversion of the two-level molecule appears due to the nonlinear effect. Both phenomena can be explained by regarding the antenna and molecule as one quantum-mechanically coupled system. Such an approach drives further research to exploit the full potential of the coupled systems.

  17. RESIDUAL A POSTERIORI ERROR ESTIMATE OF A NEW TWO-LEVEL METHOD FOR STEADY NAVIER-STOKES EQUATIONS

    Institute of Scientific and Technical Information of China (English)

    Chunfeng REN; Yichen MA

    2006-01-01

    Residual-based a posteriori error estimate for conforming finite element solutions of incompressible Navier-Stokes equations, which is computed with a new two-level method that is different from Volker John, is derived. A posteriori error estimate contains additional terms in comparison to the estimate for the solution obtained by the standard finite element method. The importance of the additional terms in the error estimates is investigated by studying their asymptotic behavior. For optimal scaled meshes, these bounds are not of higher order than the convergence of discrete solution. The two-level method aims to solve the nonlinear problem on a coarse grid with less computational work,then to solve the linear problem on a fine grid, which is superior to the usual finite element method solving a similar nonlinear problem on the fine grid.

  18. Optimized two-level placement of test points for multi-objective air monitoring of the Three Gorges Reservoir area

    Institute of Scientific and Technical Information of China (English)

    XIAO Dong-hai; TAN Chun-lu; WANG Jun-qiang; ZHONG Yuan-chang

    2007-01-01

    To fit the complicated geographic conditions of the Three Gorges Reservoir area, a two-level multi-objective monitoring system was developed to monitor the atmosphere of the area. Statistical analysis of environmental monitoring data and the macro control principle were employed to configure the upper layer. The lower layer was designed by the application of the thumb rule to a local terrain and specific point sources of pollution therein. The optimized two-level system comprises an upper layer of 16 monitoring stations distributed at places of diverse geographical, ecological, economical and social characteristics, and a lower layer of 16 sub-machines at each monitoring station of the upper layer. This optimal outcome fits the complicated conditions of the Three Gorges Reservoir area, substantially cuts down the installation cost and the operation cost, and provides accurate monitoring data of atmosphere over the entire area with a high resolution.

  19. Propagation of subcycle pulses in a two-level medium: Area-theorem breakdown and pulse shape

    CERN Document Server

    Novitsky, Denis

    2013-01-01

    We solve the problem of ultrashort pulse propagation in a two-level medium beyond the rotating-wave (RWA) and slowly-varying-envelope approximations. The method of solution is based on the Maxwell--Bloch equations represented in the form that allows one to switch between RWA and general (non-RWA) cases in the framework of a single numerical algorithm. Using this method, the effect of a subcycle pulse (containing less than a single period of field oscillations) on the two-level medium was analyzed. It is shown that for such short pulses, the clear breakdown of the area theorem occurs for the pulses of large enough area. Moreover, deviations from the area theorem appear to be strongly dependent on the pulse shape that cannot be observed for longer few-cycle pulses.

  20. PSCAD modeling of a two-level space vector pulse width modulation algorithm for power electronics education

    Directory of Open Access Journals (Sweden)

    Ahmet Mete Vural

    2016-09-01

    Full Text Available This paper presents the design details of a two-level space vector pulse width modulation algorithm in PSCAD that is able to generate pulses for three-phase two-level DC/AC converters with two different switching patterns. The presented FORTRAN code is generic and can be easily modified to meet many other kinds of space vector modulation strategies. The code is also editable for hardware programming. The new component is tested and verified by comparing its output as six gating signals with those of a similar component in MATLAB library. Moreover the component is used to generate digital signals for closed-loop control of STATCOM for reactive power compensation in PSCAD. This add-on can be an effective tool to give students better understanding of the space vector modulation algorithm for different control tasks in power electronics area, and can motivate them for learning.

  1. Mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Wolfe, W.J.; Marquina, N.

    1986-01-01

    This book presents papers given at a conference on mobile robots. Topics the conference included are the following: mobility systems for robotic vehicles; detection and control of mobile robot motion by real-time computer vision, obstacle avoidance algorithms for an autonomous land vehicle; hierarchical processor and matched filters for range image processing; asynchronous distributed control system for a mobile robot, and, planning in a hierarchical nested autonomous control system.

  2. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2014-01-01

    Users are already mobile, but the question is to which extent knowledge-based dictionary apps are designed for the mobile user situation. The objective of this article is to analyse the characteristics of the mobile user situation and to look further into the stationary user situation and the mob...

  3. Mobilities Design

    DEFF Research Database (Denmark)

    Lanng, Ditte Bendix; Wind, Simon; Jensen, Ole B.

    2017-01-01

    utilitarian transport from A to B; they constitute a rich societal phenomenon with, for example, social, cultural, sensorial, emotional, and material dimensions. The article proposes two fruitful links between the mobilities turn and the designerly examination of mobilities spaces. First, the mobilities turn...

  4. Subversive Mobilities

    DEFF Research Database (Denmark)

    Thelle, Mikkel

    2013-01-01

    The article approaches mobility through a cultural history of urban conflict. Using a case of “The Copenhagen Trouble,“ a series of riots in the Danish capital around 1900, a space of subversive mobilities is delineated. These turn-of-the-century riots points to a new pattern of mobile gathering...

  5. Bistability of optical response of an ultra thin layer consisting of two-level atoms: account of the local field

    Science.gov (United States)

    Shuval-Sergeeva, E. V.; Zaitsev, A. I.

    2008-03-01

    When describing the phenomenon of bistability of optical response of an ultra thin layer consisting of two-level atoms it is important to take into account the local field correction. The account of the correction results in the improvement of existence conditions of bistability. One more bistable region is formed starting with certain value of local field parameter. Both effects are induced by the dynamical frequency shift.

  6. On a Connection between Ideal Two-level Autocorrelation and Almost Balancedness of $p$-ary Sequences

    CERN Document Server

    Borissov, Yuri L

    2011-01-01

    In this correspondence, for every periodic $p-$ary sequence satisfying ideal two-level autocorrelation property the existence of an element of the field ${\\bf GF}(p)$ which appears one time less than all the rest that are equally distributed in a period of that sequence, is proved by algebraic method. In addition, it is shown that such a special element might not be only the zero element but as well arbitrary element of that field.

  7. Electromagnetically Induced Absorption and Transparency Spectra of Degenerate TwoLevel Systems with a Strong Coupling Field in Cs Vapour

    Institute of Scientific and Technical Information of China (English)

    赵延霆; 赵建明; 肖连团; 尹王保; 贾锁堂

    2004-01-01

    The electromagnetically induced absorption and electromagnetically induced transparency spectra of degenerate two-level systems with a strong coupling laser were observed. The frequency detuning and intensity effect of the coupling laser were demonstrated simultaneously. A dispersion-like spectrum can be obtained when the coupling laser is situated at blue-side detuning. The absorption inversion was realized when the coupling laser intensity is small. The coherent resonance has a linewidth much narrower than the natural linewidth of the optical transitions.

  8. Two-Level Dipolar System in a Heat Bath: High-Pump Power Effects in the Nonlinear Optical Responses

    Science.gov (United States)

    Paz, J. L.; León-Torres, J. R.; Lascano, Luis; Alvarado, Ysaias J.; Costa-Vera, Cesar

    2017-06-01

    Using the four-wave mixing spectroscopy, we analyze the nonlinear optical properties in a strongly driven two-level system, using a perturbative treatment where, the pump field is considered at all orders, second order in the probe, and first order for the signal field, when the stochastic effects of the solvent are considered. Significant variations in the nonlinear optical properties due mainly to changes in the probe intensity, chemical concentrations, and transversal relaxation times are observed.

  9. Predicting poor peripheral blood stem cell collection in patients with multiple myeloma receiving pre-transplant induction therapy with novel agents and mobilized with cyclophosphamide plus granulocyte-colony stimulating factor: results from a Gruppo Italiano Malattie EMatologiche dell'Adulto Multiple Myeloma Working Party study.

    Science.gov (United States)

    Musto, Pellegrino; Simeon, Vittorio; Grossi, Alberto; Gay, Francesca; Bringhen, Sara; Larocca, Alessandra; Guariglia, Roberto; Pietrantuono, Giuseppe; Villani, Oreste; D'Arena, Giovanni; Cuomo, Carmela; Musto, Clelia; Morabito, Fortunato; Petrucci, Maria Teresa; Offidani, Massimo; Zamagni, Elena; Tacchetti, Paola; Conticello, Concetta; Milone, Giuseppe; Palumbo, Antonio; Cavo, Michele; Boccadoro, Mario

    2015-04-17

    A still not well defined proportion of patients with multiple myeloma (MM) and eligible for autologous stem cell transplantation (AuSCT) fails to mobilize CD34+ peripheral blood stem cells (PBSC) at all or to collect an adequate number for a safe procedure or sufficient for multiple transplants. These so-called "poor-mobilizers" are difficult to be predicted, due to marked difference across previous heterogeneous studies. We aimed to develop a method based on simple clinical parameters for predicting unsuccessful (<2×10(6)/kg) or sub-optimal (<5×10(6)/kg) collections of CD34+ PBSC in newly diagnosed MM patients eligible for AuSCT, treated with novel agents and receiving an homogeneous mobilizing therapy with cyclophosphamide and granulocyte-colony stimulating factor (G-CSF). To this purpose, 1,348 patients enrolled in five consecutive Italian clinical trials were retrospectively analysed. Age, baseline low peripheral blood cell counts, use of lenalidomide, and haematological toxicity developed during induction were taken into account as possible factors associated with poor mobilization. Overall, 280 patients (20.8%) showed either sub-optimal (167 patients, 12.4%) or unsuccessful (113 patients, 8.4%) collections. All analysed parameters negatively influenced the procedure, but only age and haematological toxicity during induction maintained their significance at multivariate analysis. Based on ordinal logistic regression model, we constructed a risk heat-map where the four parameters were pooled and weighted according to their relevance as single or combined variables. This model was predictive for different probabilities of failure, suboptimal or optimal outcomes. We found that about one fifth of newly diagnosed MM fails to collect an adequate number of PBSC. Our model, based on a large group of patients treated frontline with novel agents and receiving the most popular mobilizing approach currently employed in Europe, is applicable in individual subjects and

  10. Entropy squeezing for a two-level atom in two-mode Raman coupled model with intrinsic decoherence

    Institute of Scientific and Technical Information of China (English)

    Zhang Jian; Shao Bin; Zou Jian

    2009-01-01

    In this paper,we investigate the entropy squeezing for a two-level atom interacting with two quantized fields through Raman coupling.We obtain the dynamical evolution of the total system under the influence of intrinsic decoherence when the two quantized fields are prepared in a two-mode squeezing vacuum state initially.The effects of the field squeezing factor,the two-level atomic transition frequency,the second field frequency and the intrinsic decoherence on the entropy squeezing are discussed.Without intrinsic decoherence,the increase of field squeezing factor can break the entropy squeezing.The two-level atomic transition frequency changes only the period of oscillation but not the strength of entropy squeezing.The influence of the second field frequency is complicated.With the intrinsic decoherence taken into consideration,the results show that the stronger the intrinsic decoherence is,the more quickly the entropy squeezing will disappear.The increase of the atomic transition frequency can hasten the disappearance of entropy squeezing.

  11. Mobile Semiotics

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2013-01-01

    This chapter aims to understand the mobile condition of contemporary life with a particular view to the signifying dimension of the environment and its ‘readability’. The chapter explores the potentials of semiotics and its relationship to the new mobilities literature. What takes place...... is a ‘mobile sense making’ where signs and materially situated meanings connect to the moving human body and thus create particular challenges and complexities of making sense of the world. The chapter includes notions of mobility systems and socio-technical networks in order to show how a ‘semiotic layer’ may...... work to afford or restrict mobile practices....

  12. A Two-Level Task Scheduler on Multiple DSP System for OpenCL

    Directory of Open Access Journals (Sweden)

    Li Tian

    2014-04-01

    Full Text Available This paper addresses the problem that multiple DSP system does not support OpenCL programming. With the compiler, runtime, and the kernel scheduler proposed, an OpenCL application becomes portable not only between multiple CPU and GPU, but also between embedded multiple DSP systems. Firstly, the LLVM compiler was imported for source-to-source translation in which the translated source was supported by CCS. Secondly, two-level schedulers were proposed to support efficient OpenCL kernel execution. The DSP/BIOS is used to schedule system level tasks such as interrupts and drivers; however, the synchronization mechanism resulted in heavy overhead during task switching. So we designed an efficient second level scheduler especially for OpenCL kernel work-item scheduling. The context switch process utilizes the 8 functional units and cross path links which was superior to DSP/BIOS in the aspect of task switching. Finally, dynamic loading and software managed CACHE were redesigned for OpenCL running on multiple DSP system. We evaluated the performance using some common OpenCL kernels from NVIDIA, AMD, NAS, and Parboil benchmarks. Experimental results show that the DSP OpenCL can efficiently exploit the computing resource of multiple cores.

  13. Resonance fluorescence of strongly driven two-level system coupled to multiple dissipative reservoirs

    Science.gov (United States)

    Yan, Yiying; Lü, Zhiguo; Zheng, Hang

    2016-08-01

    We present a theoretical formalism for resonance fluorescence radiating from a two-level system (TLS) driven by any periodic driving and coupled to multiple reservoirs. The formalism is derived analytically based on the combination of Floquet theory and Born-Markov master equation. The formalism allows us to calculate the spectrum when the Floquet states and quasienergies are analytically or numerically solved for simple or complicated driving fields. We can systematically explore the spectral features by implementing the present formalism. To exemplify this theory, we apply the unified formalism to comprehensively study a generic model that a harmonically driven TLS is simultaneously coupled to a radiative reservoir and a dephasing reservoir. We demonstrate that the significant features of the fluorescence spectra, the driving-induced asymmetry and the dephasing-induced asymmetry, can be attributed to the violation of detailed balance condition, and explained in terms of the driving-related transition quantities between Floquet-states and their steady populations. In addition, we find the distinguished features of the fluorescence spectra under the biharmonic and multiharmonic driving fields in contrast with that of the harmonic driving case. In the case of the biharmonic driving, we find that the spectra are significantly different from the result of the RWA under the multiple resonance conditions. By the three concrete applications, we illustrate that the present formalism provides a routine tool for comprehensively exploring the fluorescence spectrum of periodically strongly driven TLSs.

  14. Resonance fluorescence of strongly driven two-level system coupled to multiple dissipative reservoirs

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Yiying, E-mail: yiyingyan@sjtu.edu.cn; Lü, Zhiguo, E-mail: zglv@sjtu.edu.cn; Zheng, Hang, E-mail: hzheng@sjtu.edu.cn

    2016-08-15

    We present a theoretical formalism for resonance fluorescence radiating from a two-level system (TLS) driven by any periodic driving and coupled to multiple reservoirs. The formalism is derived analytically based on the combination of Floquet theory and Born–Markov master equation. The formalism allows us to calculate the spectrum when the Floquet states and quasienergies are analytically or numerically solved for simple or complicated driving fields. We can systematically explore the spectral features by implementing the present formalism. To exemplify this theory, we apply the unified formalism to comprehensively study a generic model that a harmonically driven TLS is simultaneously coupled to a radiative reservoir and a dephasing reservoir. We demonstrate that the significant features of the fluorescence spectra, the driving-induced asymmetry and the dephasing-induced asymmetry, can be attributed to the violation of detailed balance condition, and explained in terms of the driving-related transition quantities between Floquet-states and their steady populations. In addition, we find the distinguished features of the fluorescence spectra under the biharmonic and multiharmonic driving fields in contrast with that of the harmonic driving case. In the case of the biharmonic driving, we find that the spectra are significantly different from the result of the RWA under the multiple resonance conditions. By the three concrete applications, we illustrate that the present formalism provides a routine tool for comprehensively exploring the fluorescence spectrum of periodically strongly driven TLSs.

  15. Equivalence of the measures of non-Markovianity for open two-level systems

    Science.gov (United States)

    Zeng, Hao-Sheng; Tang, Ning; Zheng, Yan-Ping; Wang, Guo-You

    2011-09-01

    Different measures have been presented to depict the deviation of quantum time evolution in open systems from Markovian processes. We demonstrate that the measure proposed by Breuer, Laine, and Piilo [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.103.210401 103, 210401 (2009)] and the two measures proposed by Rivas, Huelga, and Plenio [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.105.050403 105, 050403 (2010)] have exactly the same non-Markovian time-evolution intervals and thus are really equivalent to each other when they are applied to open two-level systems coupled to environments via the Jaynes-Cummings or dephasing models. This equivalence implies that the three measures, in different ways, capture the intrinsic character of the non-Markovianity of quantum evolutional processes. We also show that the maximization in the definition of the first measure can be actually removed for the considered models without influencing the sensibility of the measure to detect non-Markovianity.

  16. Grid trust based on pre-measure and two-level reputation

    Institute of Scientific and Technical Information of China (English)

    ZHANG Lin; WANG Ru-chuan; WANG Hai-yan

    2007-01-01

    Security has been the focus of grid systems recently. As a kind of tool, grid security infrastructure (GSI) provides the authentication and authorization services and so on. These mechanisms mostly belong to the objective factors, which have not met the needs of security. As the subjective factor, trust model plays an important role in security field. A new two-level reputation trust architecture for grid is given to reduce the costs of system management largely, in which trust relationships amongst virtual organizations (VOs) are built on domain trust managers (DTMs) rather than resource nodes (RNs). Taking inter-domain trust propagation for example, trust model is improved by integrating global reputation and the subjective trust concept of each recommender into synthesizing final trust value. Moreover, before the grid starts to interact with the trustworthy entities, the pre-measure scheme is presented to filter distrustful entities further, which is based on accuracy and honesty. Experimental results indicate that the model can prevent from the malicious attacks better.

  17. Proposing a two-level stochastic model for epileptic seizure genesis.

    Science.gov (United States)

    Shayegh, F; Sadri, S; Amirfattahi, R; Ansari-Asl, K

    2014-02-01

    By assuming the brain as a multi-stable system, different scenarios have been introduced for transition from normal to epileptic state. But, the path through which this transition occurs is under debate. In this paper a stochastic model for seizure genesis is presented that is consistent with all scenarios: a two-level spontaneous seizure generation model is proposed in which, in its first level the behavior of physiological parameters is modeled with a stochastic process. The focus is on some physiological parameters that are essential in simulating different activities of ElectroEncephaloGram (EEG), i.e., excitatory and inhibitory synaptic gains of neuronal populations. There are many depth-EEG models in which excitatory and inhibitory synaptic gains are the adjustable parameters. Using one of these models at the second level, our proposed seizure generator is complete. The suggested stochastic model of first level is a hidden Markov process whose transition matrices are obtained through analyzing the real parameter sequences of a seizure onset area. These real parameter sequences are estimated from real depth-EEG signals via applying a parameter identification algorithm. In this paper both short-term and long-term validations of the proposed model are done. The long-term synthetic depth-EEG signals simulated by this model can be taken as a suitable tool for comparing different seizure prediction algorithms.

  18. STLIS: A Scalable Two-Level Index Scheme for Big Data in IoT

    Directory of Open Access Journals (Sweden)

    Yonglin Leng

    2016-01-01

    Full Text Available The rapid development of the Internet of Things causes the dramatic growth of data, which poses an important challenge on the storage and quick retrieval of big data. As an effective representation model, RDF receives the most attention. More and more storage and index schemes have been developed for RDF model. For the large-scale RDF data, most of them suffer from a large number of self-joins, high storage cost, and many intermediate results. In this paper, we propose a scalable two-level index scheme (STLIS for RDF data. In the first level, we devise a compressed path template tree (CPTT index based on S-tree to retrieve the candidate sets of full path. In the second level, we create a hierarchical edge index (HEI and a node-predicate (NP index to accelerate the match. Extensive experiments are executed on two representative RDF benchmarks and one real RDF dataset in IoT by comparison with three representative index schemes, that is, RDF-3X, Bitmat, and TripleBit. Results demonstrate that our proposed scheme can respond to the complex query in real time and save much storage space compared with RDF-3X and Bitmat.

  19. The excitation of a two-level atom by a propagating light pulse

    CERN Document Server

    Wang, Yimin; Scarani, Valerio

    2010-01-01

    State mapping between atoms and photons, and photon-photon interactions play an important role in scalable quantum information processing. We consider the interaction of a two-level atom with a quantized \\textit{propagating} pulse in free space and study the probability $P_e(t)$ of finding the atom in the excited state at any time $t$. This probability is expected to depend on (i) the quantum state of the pulse field and (ii) the overlap between the pulse and the dipole pattern of the atomic spontaneous emission. In the full three-dimensional vector model for the field, we show that the second effect is captured by a single parameter $\\Lambda\\in[0,8\\pi/3]$, obtained by weighing the numerical aperture with the dipole pattern. Then $P_e(t)$ can be obtained by solving time-dependent Heisenberg-Langevin equations. We provide detailed solutions for both single-photon states and coherent states and for various shapes of the pulse.

  20. Absorption spectrum of a two-level system subjected to a periodic pulse sequence

    Science.gov (United States)

    Fotso, H. F.; Dobrovitski, V. V.

    2017-06-01

    We investigate how the quantum control of a two-level system (TLS) coupled to photons can modify and tune the TLS's photon absorption spectrum. Tuning and controlling the emission and the absorption are of great interest, e.g., for the development of efficient interfaces between stationary and flying qubits in modern architectures for quantum computation and quantum communication. We consider periodic pulse control, where the TLS is subjected to a periodic sequence of the near-resonant Rabi driving pulses, each pulse implementing a 180∘ rotation. For small interpulse delays, the absorption spectrum features a pronounced peak of stimulated emission at the pulse frequency, similar satellite peaks with smaller spectral weights, and the net absorption peaks on the sides. As long as the detuning between the carrier frequency of the driving and the TLS transition frequency remains moderate, this spectral shape shows little change. Therefore, the pulse control allows shifting the absorption peak to a desired position and locks the overall absorption spectrum to the carrier frequency of the driving pulses. A detailed description of the spectrum and its evolution as a function time, the interpulse spacing, and the detuning is presented.