771 resultados para Agent-Based Models
Resumo:
A new class of models which are based on adsorption, nucleation growth and their coupling is discussed. In particular, the potentiostatic response of a model that involves nucleative phase growth via direct incorporation and adsorptive discharge of metal ions on the free area is analysed for both instantaneous and progressive nucleation. This model is able to predict certain experimental features in the potentiostatic transient, like the initial fall, shoulder or maximum (as well as minimum) which have not been predicted by models analysed hitherto.Limiting behaviour for short and long times as well as a description of the above-mentioned features in terms of model parameters are given.A special case of the above model, viz. a reversible adsorption–nucleation model, wherein the adsorption is very fast, is shown to give rise to transients which can be distinguished from the pure nucleation-growth transients only by its parametric dependence, but not by the form.
Resumo:
We describe a hybrid synthetic protocol, the solvated metal atom dispersion (SMAD) method, for the synthesis and stabilization of monodisperse amorphous cobalt nanoparticles. By employing an optimized ratio of a weakly coordinating solvent and a capping agent monodisperse colloidal cobalt nanoparticles (2 +/- 0.5 nm) have been prepared by the SMAD method. However, the as-prepared samples were found to be oxidatively unstable which was elucidated by their magnetic studies. Oxidative stability in our case was achieved via a pyrolysis process that led to the decomposition of the organic solvent and the capping agent resulting in the formation of carbon encapsulated cobalt nanoparticles which was confirmed by Raman spectroscopy. Controlled annealing at different temperatures led to the phase transformation of metallic cobalt from the hcp to fcc phase. The magnetic behaviour varies with the phase and the particle size; especially, the coercivity of nanoparticles exhibited strong dependence on the phase transformation of cobalt. The high saturation magnetization close to that of the bulk value was achieved in the case of the annealed samples. In addition to detailed structural and morphological characterization, the results of thermal and magnetic studies are also presented.
Resumo:
TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Attacker traceback is a promising solution which allows a victim to identify the exact location of the attacker and hence enables the victim to take proper countermeasure near attack origins, for forensics and to discourage attackers from launching the attacks. However, attacker traceback in MANET is a challenging problem due to dynamic network topology, limited network and host resources such as memory, bandwidth and battery life. We introduce a novel method of TCP attacker Identification in MANET using the Traffic History - MAITH. Based on the comprehensive evaluation based on simulations, we showed that MAITH can successfully track down the attacker under diverse mobile multi-hop network environment with low communication, computation, and memory overhead.
Resumo:
Mobile ad-hoc network is a wireless ad-hoc network with dynamic network topology. The Dynamicity, due to the random node movement, and scarcity of resources lead to a challenge in monitoring the nodes in a MANET. Monitoring the lack of resources (bandwidth, buffer, and energy), misbehavior, and mobility at node level remains, a challenge. In a MANET the proposed protocol uses both static as well as mobile agents, where the mobile agents migrate to different clusters of the zones respectively, collect the node status information periodically, and provide a high level information to the static agent (which resides at the central node) by analyzing the raw information at the nodes. This, in turn, reduces the network traffic and conserves the workload of the central node, where a static agent is available with high level information and in coordination with other modules. The protocol has been tested in different size MANETs with variable number of nodes and applications. The results shown in the simulation indicates the effectiveness of the protocol.
Resumo:
The experimental solubilities of the mixture of nitrophenol (m- and p-) isomers were determined at 308, 318 and 328 K over a pressure range of 10-17.55 MPa. Compared to the binary solubilities, the ternary solubilities of m-nitrophenol increased at 308, 318 and 328 K. The ternary solubilities of p-nitrophenol increased at 308 K, while the ternary solubilities decreased at lower pressures and increased at higher pressure at 318 and 328 K. The solubilities of the solid mixtures in supercritical carbon dioxide (SCCO2) were correlated with solution models by incorporating the non-idealities using activity coefficient based models. The Wilson and NRTL activity coefficient models were applied to determine the nature of the interactions between the molecules. The equation developed by using the NRTL model has three parameters and correlates mixture solubilities of solid solutes in terms of temperature and cosolute composition. The equation derived from the Wilson model contains five parameters and correlates solubilities in terms of temperature, density and cosolute composition. These two new equations developed in this work were used to correlate the solubilities of 25 binary solid mixtures including the current data. The average AARDs of the model equations derived using the NRTL and Wilson models for the solid mixtures were found to be 7% and 4%, respectively. (C) 2012 Elsevier B.V. All rights reserved.
Resumo:
A ubiquitous network plays a critical role to provide rendered services to ubiquitous application running nodes. To provide appropriate resources the nodes are needed to be monitored continuously. Monitoring a node in ubiquitous network is challenging because of dynamicity and heterogeneity of the ubiquitous network. The network monitor has to monitor resource parameters, like data rate, delay and throughput, as well as events such as node failure, network failure and fault in the system to curb the system failure. In this paper, we propose a method to develop a ubiquitous system monitoring protocol using agents. Earlier works on network monitoring using agents consider that the agents are designed for particular network. While in our work the heterogeneity property of the network has been considered. We have shown that the nodes' behaviour can be easily monitored by using agents (both static and mobile agent). The past behavior of the application and network, and past history of the Unode and the predecessor are taken into consideration to help SA to take appropriate decision during the time of emergency situation like unavailability of resources at the local administration, and to predict the migration of the Unode based on the previous node history. The results obtained in the simulation reflects the effectiveness of the technique.
Resumo:
The nodes with dynamicity, and management without administrator are key features of mobile ad hoc networks (1VIANETs). Increasing resource requirements of nodes running different applications, scarcity of resources, and node mobility in MANETs are the important issues to be considered in allocation of resources. Moreover, management of limited resources for optimal allocation is a crucial task. In our proposed work we discuss a design of resource allocation protocol and its performance evaluation. The proposed protocol uses both static and mobile agents. The protocol does the distribution and parallelization of message propagation (mobile agent with information) in an efficient way to achieve scalability and speed up message delivery to the nodes in the sectors of the zones of a MANET. The protocol functionality has been simulated using Java Agent Development Environment (JADE) Framework for agent generation, migration and communication. A mobile agent migrates from central resource rich node with message and navigate autonomously in the zone of network until the boundary node. With the performance evaluation, it has been concluded that the proposed protocol consumes much less time to allocate the required resources to the nodes under requirement, utilize less network resources and increase the network scalability. (C) 2015 Elsevier B.V. All rights reserved.
Resumo:
EuroPES 2009