• Title/Summary/Keyword: network agents

Search Result 483, Processing Time 0.035 seconds

Design and Implementation of an Efficient Migration Policy for Mobile Agents (이동 에이전트를 위한 효율적인 이주 정책 설계 및 구현)

  • Jeon, Byeong-Guk;Choe, Yeong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1770-1776
    • /
    • 1999
  • Mobile agent technology has received great attention in the last years as a new paradigm for distributed processing systems. Mobile agents are autonomous objects that can migrate from node to node of a computer network. But, due to hosts or communication nodes failures, mobile agents may be blocked or crashes even if there are other nodes available that could continue processing. To cope with above, this paper proposes an efficient policy by introducing the path reordering and backward recovery to ensure the migration of mobile agents. The proposed migration policy will be provided the migration reliability of mobile agents as autonomously as possible, and it is implemented in the MOS, a mobile object system model developed by the Java language.

  • PDF

Agent-Based Modeling and Design of Water Reuse Network in Eco-Industrial Park (EIP) (생태산업단지에서 용수재이용 네트워크의 에이전트 기반 모델링 및 설계)

  • Kim, HyunJoo;Yoo, ChangKyoo;Ryu, Jun-Hyung;Lee, In-Beum
    • Korean Chemical Engineering Research
    • /
    • v.46 no.2
    • /
    • pp.369-375
    • /
    • 2008
  • To achieve zero-emission, one of the main goals of an eco-industrial park (EIP), it is needed to develop an effective water exchange network. The network includes various subsystems and decision making processes, which make the modeling process extremely complicated. Agent-based modeling was used to simulate water exchange network in an EIP. Firm agents were created based on the behavior pattern of firms, and an agent-based model (ABM) was made with the agents, showing the growth of the exchange network. An existing steel and iron making industrial park was chosen as a case study, and the ABM model shows eco-efficient behavior with a decreased environmental cost. Water reuse network based on the ABM model results in 35% decrease of the fresh water supply and 50% reduction of the wastewater generation in EIP. A case study shows that agent-based model can be a powerful tool in modeling and designing complex eco-industrial parks, especially when a part of the system needs to be changed.

Analysis of Research Subject Network in the Field of Oncogene (암유전자 연구주제 네트워크 분석)

  • Jang, Hae-Lan;Kang, Gil-Won;Lee, Eun-Jung;Kim, Seung-Ryul;Lee, Young-Sung
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.2
    • /
    • pp.369-399
    • /
    • 2012
  • Purpose: Health technology research & development is an important area to leading future. This study examined the current trends for 'oncogene' based on the research subject network to deduce a research front. Method: Papers were extracted from PubMed database using MeSH term for studies on 'oncogenes' and further categorized as papers published by Korean. Keywords were collected from all of articles. Research subject network was generated by keywords. Research subject network was analyzed by weighted degree centrality based social network analysis and transition of research subjects was analyzed by the time series. Results: On 'oncogenes', 'Genes, ras', 'Apoptosis', 'Signal Transduction' had a high degree centrality and currently 'Antineoplastic Agents', 'Prognosis', and 'Tumor Markers, Biological' were widely conducted. Conclusion: Consistency of research trend pattern was found by analyzing oncogene network with compromised to international vs. domestic trends. Analyzing keyword networks in various subject area, those will allow us to predict the research progress and propose evidence of research & developmental strategy.

  • PDF

Comparison of Metabolic Profiles of Normal and Cancer Cells in Response to Cytotoxic Agents

  • Lee, Sujin;Kang, Sunmi;Park, Sunghyouk
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.21 no.1
    • /
    • pp.31-43
    • /
    • 2017
  • Together with radiotherapy, chemotherapy using cytotoxic agents is one of the most common therapies in cancer. Metabolic changes in cancer cells are drawing much attention recently, but the metabolic alterations by anticancer agents have not been much studied. Here, we investigated the effects of commonly used cytotoxic agents on lung normal cell MRC5 and lung cancer cell A549. We employed cis-plastin, doxorubicin, and 5-Fluorouracil and compared their effects on the viability and metabolism of the normal and cancer cell lines. We first established the concentration of the cytotoxic reagents that give differences in the viabilities of normal and cancer cell lines. In those conditions, the viability of A549 decreased significantly, whereas that of MRC5 remained unchanged. To study the metabolic alterations implicated in the viability differences, we obtained the metabolic profiles using $^1H$-NMR spectrometry. The $^1H$-NMR data showed that the metabolic changes of A549 cells are more remarkable than that of MRC5 cells and the effect of 5-FU on the A549 cells is the most distinct compared to other treatments. Heat map analysis showed that metabolic alterations under treatment of cytotoxic agents are totally different between normal and cancer cells. Multivariate analysis and weighted correlation network analysis (WGCNA) revealed a distinctive metabolite signature and hub metabolites. Two different analysis tools revealed that the changes of cell metabolism in response to cytotoxic agents were highly correlated with the Warburg effect and Reductive lipogenesis, two pathways having important effects on the cell survival. Taken together, our study addressed the correlation between the viability and metabolic profiles of MRC5 and A549 cells upon the treatment of cytotoxic anticancer agents.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

A Novel Method for Avoiding Congestion in a Mobile Ad Hoc Network for Maintaining Service Quality in a Network

  • Alattas, Khalid A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.132-140
    • /
    • 2021
  • Under the mobile ad-hoc network system, the main reason for causing congestion is because of the limited availability of resources. On the other hand, the standardised TCP based congestion controlling mechanism is unable to control and handle the major properties associated with the shared system of wireless channels. It creates an effect on the design associated with suitable protocols along with protocol stacks through the process of determining the mechanisms of congestion on a complete basis. Moreover, when bringing a comparison with standard TCP systems the major environment associated with mobile ad hoc network is regraded to be more problematic on a complete basis. On the other hand, an agent-based mobile technique for congestion is designed and developed for the part of avoiding any mode of congestion under the ad-hoc network systems.

Integration of Blackboard Architecture into Multi-Agent Architecture (블랙보드 구조와 다중 에이전트 구조의 통합)

  • Chang, Hai-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.355-363
    • /
    • 2012
  • The Integration of multi-agent architecture and blackboard architecture may lead to a new architecture to cope with new application areas which need some good and strong points of both the architectures. This paper suggests an integrated architecture of blackboard architecture and multi-agent architecture by using event-based implicit invocation pattern and a blackboard event detection mechanism based on Rete network. From the viewpoints of weak couplings of system components and flexible control of knowledge source agents, it is desirable to use the event-based implicit invocation pattern in the integrated architecture. But the pattern itself does not concern the performance of the architecture, and it is very critical to the performance of the integrated architecture to detect efficiently the blackboard events which can activate knowledge source agents which can contribute to the problem-solving processes of the integrated architecture. The integrated architecture suggested in this paper uses a blackboard event detection mechanism based on Rete network to detect efficiently blackboard events which can activate knowledge source agents.

Training an Artificial Neural Network (ANN) to Control the Tap Changer of Parallel Transformers for a Closed Primary Bus

  • Sedaghati, Alireza
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1042-1047
    • /
    • 2004
  • Voltage control is an essential part of the electric energy transmission and distribution system to maintain proper voltage limit at the consumer's terminal. Besides the generating units that provide the basic voltage control, there are many additional voltage-controlling agents e.g., shunt capacitors, shunt reactors, static VAr compensators, regulating transformers mentioned in [1], [2]. The most popular one, among all those agents for controlling voltage levels at the distribution and transmission system, is the on-load tap changer transformer. It serves two functions-energy transformation in different voltage levels and the voltage control. Artificial Neural Network (ANN) has been realized as a convenient tool that can be used in controlling the on load tap changer in the distribution transformers. Usage of the ANN in this area needs suitable training and testing data for performance analysis before the practical application. This paper briefly describes a procedure of processing the data to train an Artificial Neural Network (ANN) to control the tap changer operating decision of parallel transformers for a closed primary bus. The data set are used to train a two layer ANN using three different neural net learning algorithms, namely, Standard Backpropagation [3], Bayesian Regularization [4] and Scaled Conjugate Gradient [5]. The experimental results are presented including performance analysis.

  • PDF

Signal Transduction Network Leading to COX-2 Induction: A Road Map in Search of Cancer Chemopreventives

  • Surh Young-Joon;Kundu Joydeb Kumar
    • Archives of Pharmacal Research
    • /
    • v.28 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • Cancer is still a major global health concern even after an everlasting strive in conquering this dread disease. Emphasis is now given to chemoprevention to reduce the risk of cancer and also to improve the quality of life among cancer afflicted individuals. Recent progress in molecular biology of cancer has identified key components of the cellular signaling network, whose functional abnormality results in undesired alterations in cellular homeostasis, creating a cellular microenvironment that favors premalignant and malignant transformation. Multiple lines of evidence suggest an elevated expression of cyclooxygenase-2 (COX-2) is causally linked to cancer. In response to oxidative/pro-inflammatory stimuli, turning on unusual signaling arrays mediated through diverse classes of kinases and transcription factors results in aberrant expression of COX-2. Population-based as well as laboratory studies have explored a broad spectrum of chemopreventive agents including selective COX-2 inhibitors and a wide variety of anti-inflammatory phytochemicals, which have been shown to target cellular signaling molecules as underlying mechanisms of chemoprevention. Thus, unraveling signaling pathways regulating aberrant COX-2 expression and targeted blocking of one or more components of those signal cascades may be exploited in searching chemopreventive agents in the future.