948 resultados para Mobile agents (Computer software)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Un dels principals obstacles per l’adopció dels agents mòbils, fins i tot per tasques per les quals s’ha demostrat la seva idoneïtat, és la dificultat de desenvolupar-los. Aquest projecte aporta solucions per ajudar en aquest procés. Més concretament, per provar agents i observar-ne el seu comportament en un entorn de simulació, abans d’executar-los en un escenari real. Hem afegit un depurador i un constructor d’agents mòbils a la interfície gràfica de disseny d’itineraris de l’entorn SMARD. Fent servir afegit aquests nous components, el programador pot dissenyar, construir i fer proves d’un agent mòbil des d’aquesta aplicació.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En aquest projecte s’ha dissenyat un protocol de migració d’agents mòbils per a l’arquitectura IPMA basat en l’enviament dels agents fragmentats en diversos missatges FIPA ACL. Aquest s’ha implementat dins el servei de migració JIPMS per a la plataforma JADE. Finalment s’ha dut a terme un conjunt exhaustiu de tests per avaluar-ne el rendiment i comparar-lo amb altres protocols de migració existents.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A mesura que la complexitat de les tasques dels agents mòbils va creixent, és més important que aquestes no perdin el treball realitzat. Hem de saber en tot moment que la execució s’està desenvolupant favorablement. Aquest projecte tracta d’explicar el procés d’elaboració d’un component de tolerància a fallades des de la seva idea inicial fins a la seva implementació. Analitzarem la situació i dissenyarem una solució. Procurarem que el nostre component emmascari la fallada d’un agent, detectant-la i posteriorment recuperant l’execució des d’on s’ha interromput. Tot això procurant seguir la metodologia de disseny d’agents mòbils per a plataformes lleugeres.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En les actuacions de rescat en emergències amb un gran nombre de víctimes, una de les primeres tasques a realitzar pels serveis sanitaris és la de triar-les en funció del seu estat i la urgència amb que han de ser tractades. En el grup SeNDA es treballa en un sistema d’agents mòbils que automatitza el mecanisme manual de triatge, fent ús de dispositius electrònics i una xarxa MANET com a canal de comunicació. En aquest projecte es proposa un sistema de gestió de mobilitat pels agents que transporten dades de víctimes fins al centre de coordinació, juntament amb un mecanisme de control d’aquests agents totalment transparent a l’usuari.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Avui en dia, estem assistint a una expansió de la tecnologia d’agents mòbils i noves aplicacions basades en aquesta s’estan obrint pas constantment. Les aplicacions han de demostrar la seva viabilitat sobretot en entorns heterogenis i complexos com les xarxes MANET. En aquest projecte es desenvolupa un sistema per simular el comportament dels agents mòbils, ampliant l’actual simulador de xarxa NS2, i també es comprova la viabilitat de l’implementació de l’ETTMA pel triatge de víctimes en situacions d’emergència.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En aquest projecte es proposa i s’implementa una nova forma de crear xarxes DTN (Delay-Tolerant Networks) mitjançant agents mòbils. Aquestes xarxes tenen la peculiaritat de ser tolerants a endarreriments i interrupcions, podent ser utilitzades en entorns on les xarxes actuals no es poden aplicar. Hem dissenyat mecanismes que permeten prendre decisions d’encaminament a nivell d’aplicació i mecanismes de priorització d’agents mitjançant informació d’alt nivell. Aquests mecanismes milloren les DTN fent-les més flexibles i efectives.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En situacions d’emergència, on hi ha en perill un gran nombre de vides humanes, és especialment important l’ús de triatge per a organitzar els recursos disponibles per tal de poder classificar i atendre el màxim nombre de pacients en un temps limitat. Aquest projecte presenta l’anàlisi, disseny i implementació d’un sistema de triatge electrònic mitjançant un iPhone que guarda en un agent mòbil les dades del pacient, els seus signes vitals, un tag RFID que es col·loca al pacient per a identificar-lo i seva ubicació. Després d’haver realitzat una sèrie de proves sobre l’iMABETT s’ha demostrat que funciona correctament i compleix els objectius proposats.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Treball de Fi de Carrera de .NET amb una pda i un web service.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aging is associated with common conditions, including cancer, diabetes, cardiovascular disease, and Alzheimer"s disease. The type of multi‐targeted pharmacological approach necessary to address a complex multifaceted disease such as aging might take advantage of pleiotropic natural polyphenols affecting a wide variety of biological processes. We have recently postulated that the secoiridoids oleuropein aglycone (OA) and decarboxymethyl oleuropein aglycone (DOA), two complex polyphenols present in health‐promoting extra virgin olive oil (EVOO), might constitute a new family of plant‐produced gerosuppressant agents. This paper describes an analysis of the biological activity spectra (BAS) of OA and DOA using PASS (Prediction of Activity Spectra for Substances) software. PASS can predict thousands of biological activities, as the BAS of a compound is an intrinsic property that is largely dependent on the compound"s structure and reflects pharmacological effects, physiological and biochemical mechanisms of action, and specific toxicities. Using Pharmaexpert, a tool that analyzes the PASS‐predicted BAS of substances based on thousands of"mechanism‐ effect" and"effect‐mechanism" relationships, we illuminate hypothesis‐generating pharmacological effects, mechanisms of action, and targets that might underlie the anti‐aging/anti‐cancer activities of the gerosuppressant EVOO oleuropeins.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The vast majority of our contemporary society owns a mobile phone, which has resulted in a dramatic rise in the amount of networked computers in recent years. Security issues in the computers have followed the same trend and nearly everyone is now affected by such issues. How could the situation be improved? For software engineers, an obvious answer is to build computer software with security in mind. A problem with building software with security is how to define secure software or how to measure security. This thesis divides the problem into three research questions. First, how can we measure the security of software? Second, what types of tools are available for measuring security? And finally, what do these tools reveal about the security of software? Measuring tools of these kind are commonly called metrics. This thesis is focused on the perspective of software engineers in the software design phase. Focus on the design phase means that code level semantics or programming language specifics are not discussed in this work. Organizational policy, management issues or software development process are also out of the scope. The first two research problems were studied using a literature review while the third was studied using a case study research. The target of the case study was a Java based email server called Apache James, which had details from its changelog and security issues available and the source code was accessible. The research revealed that there is a consensus in the terminology on software security. Security verification activities are commonly divided into evaluation and assurance. The focus of this work was in assurance, which means to verify one’s own work. There are 34 metrics available for security measurements, of which five are evaluation metrics and 29 are assurance metrics. We found, however, that the general quality of these metrics was not good. Only three metrics in the design category passed the inspection criteria and could be used in the case study. The metrics claim to give quantitative information on the security of the software, but in practice they were limited to evaluating different versions of the same software. Apart from being relative, the metrics were unable to detect security issues or point out problems in the design. Furthermore, interpreting the metrics’ results was difficult. In conclusion, the general state of the software security metrics leaves a lot to be desired. The metrics studied had both theoretical and practical issues, and are not suitable for daily engineering workflows. The metrics studied provided a basis for further research, since they pointed out areas where the security metrics were necessary to improve whether verification of security from the design was desired.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Diagnosis of Hridroga (cardiac disorders) in Ayurveda requires the combination of many different types of data, including personal details, patient symptoms, patient histories, general examination results, Ashtavidha pareeksha results etc. Computer-assisted decision support systems must be able to combine these data types into a seamless system. Intelligent agents, an approach that has been used chiefly in business applications, is used in medical diagnosis in this case. This paper is about a multi-agent system named “Distributed Ayurvedic Diagnosis and Therapy System for Hridroga using Agents” (DADTSHUA). It describes the architecture of the DADTSHUA model .This system is using mobile agents and ontology for passing data through the network. Due to this, transport delay can be minimized. It is a system which will be very helpful for the beginning physicians to eliminate his ambiguity in diagnosis and therapy. The system is implemented using Java Agent DEvelopment framework (JADE), which is a java-complaint mobile agent platform from TILab.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many examples for emergent behaviors may be observed in self-organizing physical and biological systems which prove to be robust, stable, and adaptable. Such behaviors are often based on very simple mechanisms and rules, but artificially creating them is a challenging task which does not comply with traditional software engineering. In this article, we propose a hybrid approach by combining strategies from Genetic Programming and agent software engineering, and demonstrate that this approach effectively yields an emergent design for given problems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Distributed and collaborative data stream mining in a mobile computing environment is referred to as Pocket Data Mining PDM. Large amounts of available data streams to which smart phones can subscribe to or sense, coupled with the increasing computational power of handheld devices motivates the development of PDM as a decision making system. This emerging area of study has shown to be feasible in an earlier study using technological enablers of mobile software agents and stream mining techniques [1]. A typical PDM process would start by having mobile agents roam the network to discover relevant data streams and resources. Then other (mobile) agents encapsulating stream mining techniques visit the relevant nodes in the network in order to build evolving data mining models. Finally, a third type of mobile agents roam the network consulting the mining agents for a final collaborative decision, when required by one or more users. In this paper, we propose the use of distributed Hoeffding trees and Naive Bayes classifers in the PDM framework over vertically partitioned data streams. Mobile policing, health monitoring and stock market analysis are among the possible applications of PDM. An extensive experimental study is reported showing the effectiveness of the collaborative data mining with the two classifers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"Supported in part by the Advanced Research Projects Agency as administered by the Rome Air Development Center under contract no. US AF 30(602) 4144."