A Review of Computation Solutions by Mobile Agents in an Unsafe Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 4
Abstract
Exploration in an unsafe environment is one of the major problems that can be seen as a basic block for many distributed mobile protocols. In such environment we consider that either the nodes (hosts) or the agents can pose some danger to the network. Two cases are considered. In the first case, the dangerous node is a called black hole, a node where incoming agents are trapped, and the problem is for the agents to locate it. In the second case, the dangerous agent is a virus; an agent moving between nodes infecting them, and the problem is for the “good” agents to capture it, and decontaminate the network. In this paper, we present several solutions for a black–hole and network decontamination problems. Then, we analyze their efficiency. Efficiency is evaluated based on the complexity, and the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination techniques.
Authors and Affiliations
Anis Zarrad, Yassine Daadaa
A Memetic Algorithm for the Capacitated Location-Routing Problem
In this paper, a hybrid genetic algorithm is proposed to solve a Capacitated Location-Routing Problem. The objective is to minimize the total cost of the distribution in a network composed of depots and customers, both d...
Tutoring Functions in a Blended Learning System: Case of Specialized French Teaching
There is an emergence of blended learning today which combines diversified teaching methods, alternating distance learning and classroom learning. As a matter of fact, most Moroccan universities are presently aware of th...
SYNTHETIC TEMPLATE: EFFECTIVE TOOL FOR TARGET CLASSIFICATION AND MACHINE VISION
A process for replacing a voluminous image dictionary, which characterizes a certain target of interest in a constrained zone of effectiveness representing controlled states including scale and view angle, with a synthet...
Rainfall Prediction using Data Mining Techniques: A Systematic Literature Review
Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in advance regarding: ongoing construction proje...
Low-Power Hardware Design of Binary Arithmetic Encoder in H.264
Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a well-known bottleneck in H.264/AVC, owing to the highly serialized calculation and high data dependency of the binary arithmetic encoder. This work presents a...