A Model for Mobile Code Computing Paradigms in Computer Networks
Journal Title: Journal of Information Systems and Telecommunication - Year 2017, Vol 5, Issue 1
Abstract
This paper presents a reliable model for mobile codes in distributed networks, which represents reliable mobile agent execution. The model ensures non-blocking mobile agent execution and forces the once property without relying on correct fault detection. A mobile agent execution is blocking if a fault of agent prevents the agent from continuing in its execution. The once problem is related to non-blocking in the sense that solutions to the latter may lead to multiple executions of the mobile agent. A solution to reliable mobile agent execution needs to ensure both the non-blocking and once properties. The analytical results show new theoretical perceptions into the statistical behaviors of mobile agents and provide useful tools for executing mobile agents in networks. The results show that agents' behavior is influenced by places' characteristics and the agents' behavior can be managed to network. In this paper, we analyzed the average time consuming of mobile agents between two places. The approach, Fault-Tolerant approach for mobile codes offers a user-transparent fault tolerance which can be selected by the user for every single application given to the environment. Thereby, the user can decide for every application weather it has to be treated fault-tolerant or not. We proposed a reliable execution model of mobile codes and analyzed the life expectancy, including the average time consuming of mobile agents between two places, the average number of places agents will visit, and the agents' life expectancy.
Authors and Affiliations
Hodjat Hamidi, Maryam Parvini
A Novel Resource Allocation Algorithm for Heterogeneous Cooperative Cognitive Radio Networks
In cognitive radio networks (CRN), resources available for use are usually very limited. This is generally because of the tight constraints by which the CRN operate. Of all the constraints, the most critical one is the l...
Opinion Mining in Persian Language Using Supervised Algorithms
Rapid growth of Internet results in large amount of user-generated contents in social media, forums, blogs, and etc. Automatic analysis of this content is needed to extract valuable information from these contents. Opini...
Internet Banking, Cloud Computing: Opportunities, Threats
With the extension of Internet and its applications, internet banking is introduced as an efficient and cost effective way to provide services to customers. Towards the end of previous decade, cloud computing has been of...
A fuzzy approach for ambiguity reducing in text similarity estimation (case study: Persian web contents)
Finding similar web contents have great efficiency in academic community and software systems. There are many methods and metrics in literature to measure the extent of text similarity among various documents and some it...
Active Steganalysis of Transform Domain Steganography Based on Sparse Component Analysis
This paper presents a new active steganalysis method to break the transform domain steganography. Most of steganalysis techniques focus on detecting the presence or absence of a secret message in a cover (passive stegana...