Results 1 to 10 of about 5,770,238 (330)

A Hybrid Method for Mobile Agent Moving Trajectory Scheduling using ACO and PSO in WSNs [PDF]

open access: yesSensors, 2019
Wireless Sensor Networks (WSNs) are usually troubled with constrained energy and complicated network topology which can be mitigated by introducing a mobile agent node.
Yu Gao   +4 more
doaj   +3 more sources

A Dynamic Multi-Mobile Agent Itinerary Planning Approach in Wireless Sensor Networks via Intuitionistic Fuzzy Set [PDF]

open access: yesSensors, 2022
In recent research developments, the application of mobile agents (MAs) has attracted extensive research in wireless sensor networks (WSNs) due to the unique benefits it offers, such as energy conservation, network bandwidth saving, and flexibility of ...
Tariq Alsboui   +7 more
doaj   +2 more sources

A Spawn Mobile Agent Itinerary Planning Approach for Energy-Efficient Data Gathering in Wireless Sensor Networks [PDF]

open access: yesSensors, 2017
Mobile agent (MA), a part of the mobile computing paradigm, was recently proposed for data gathering in Wireless Sensor Networks (WSNs). The MA-based approach employs two algorithms: Single-agent Itinerary Planning (SIP) and Multi-mobile agent Itinerary ...
Huthiafa Q. Qadori   +3 more
doaj   +2 more sources

Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: A review paper

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Recently, wireless sensor networks have employed the concept of mobile agent to reduce energy consumption and obtain effective data gathering. Typically, in data gathering based on mobile agent, it is an important and essential step to find out the ...
Huthiafa Q Qadori   +3 more
doaj   +2 more sources

Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm [PDF]

open access: yesSensors, 2022
A mobile agent is a software application that moves naturally among hosts in a uniform and non-uniform environment; it starts with one host and then moves onto the next in order to divide data between clients.
Pradeep Kumar   +6 more
doaj   +2 more sources

An Outline of Multi-Sensor Fusion Methods for Mobile Agents Indoor Navigation

open access: yesSensors, 2021
Indoor autonomous navigation refers to the perception and exploration abilities of mobile agents in unknown indoor environments with the help of various sensors. It is the basic and one of the most important functions of mobile agents.
Yuanhao Qu   +5 more
doaj   +1 more source

A Mobile Agent-Based Method to Counter Sinkhole Attacks in Wireless Sensor Networks

open access: yesJordanian Journal of Computers and Information Technology, 2021
Wireless sensor network (WSN) is an applied technology widely used in various areas. According to the WSN limitations, they usually face many types of attacks. The sinkhole is the most popular and dangerous attack in the routing of WSN.
Hadi Khosravi, Mohammad GhasemiGol
doaj   +1 more source

Multi-Agent Deep Reinforcement Learning-Based Trajectory Planning for Multi-UAV Assisted Mobile Edge Computing [PDF]

open access: yesIEEE Transactions on Cognitive Communications and Networking, 2020
An unmanned aerial vehicle (UAV)-aided mobile edge computing (MEC) framework is proposed, where several UAVs having different trajectories fly over the target area and support the user equipments (UEs) on the ground.
Liang Wang   +5 more
semanticscholar   +1 more source

Mobile crowdsensing with mobile agents [PDF]

open access: yesAutonomous Agents and Multi-Agent Systems, 2015
We introduce mobile agents for mobile crowdsensing. Crowdsensing campaigns are designed through different roles that are implemented as mobile agents. The role-based tasks of mobile agents include collecting data, analyzing data and sharing data in the campaign.
Leppänen, T. (Teemu)   +4 more
openaire   +2 more sources

Study and Developing a Network Security Prototype Based on Agent Technology [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2013
A preliminary prototype has been designed and implemented in this work to support network security that used to detect a misuse in the network environment, the events have been taken from KDD, so three types of attacks have been taken on TCP, UDP, and ...
Najla Ibraheem, Haleema Sulaiman
doaj   +1 more source

Home - About - Disclaimer - Privacy