政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/51317
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113656/144643 (79%)
Visitors : 51735730      Online Users : 598
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/51317


    Title: 在機會網路上實現行動代理人之搜尋機制
    Mobile agent tracking technology over opportunistic network
    Authors: 林怡萱
    Lin, Yi Shiuan
    Contributors: 連耀南
    Lien, Yao Nan
    林怡萱
    Lin, Yi Shiuan
    Keywords: 機會網路
    行動代理人
    opportunistic network
    mobile agent
    Date: 2009
    Issue Date: 2011-10-05 14:43:48 (UTC+8)
    Abstract: 在機會網路上,傳遞資料遠比一般網路困難。運用行動代理人於機會網路上,
    可大幅提升機會網路的功能,其中的行動代理人平台,需要一個代理人的搜尋
    機制,方能實現對代理人的控制。本篇論文以「山文誌登山資訊系統」為背景,探討行動代理人在機會網路上的應用。在此登山客追蹤與環境監控系統中,每個登山客都攜帶一個配備有 GPS 功能的小型設備,此設備會在登山客的移動過程中,自動收集位置資訊,並使用短程無線電來和鄰近的登山客交換彼此的資訊。由於行動代理人是附屬於登山客所攜帶的設備上,而且當靠近其他登山客時,才可藉此轉移到另一個設備,故其行動力受制於登山客的移動行為。因登山客行走速率差異不大、所在位置分佈不均,使得行動代理人的轉移極為緩慢且需仰賴不確定的碰面機會,導致行動代理人之搜尋效率極低,無法支援緊急任務。為此,我們提出控制網路的方法,及一個簡單的搜尋演算法,讓搜尋代理人藉此高速網路來快速移動,以提高目標代理人的搜尋效率。在不同的考量及目標下,我們提出幾個控制網路的建置模型,並在證明其為 NP-complete問題後,提出有效的啟發式演算法來解決此控制點選擇問題。
    Transmitting data on an opportunistic network is much more difficult than that on a general network. The communication capability of an opportunistic network can be greatly enhanced via mobile agent functionality. A mobile agent platform demands a search mechanism to locate and control its agents. In this thesis, we investigate the adoption of mobile agent to opportunistic networks using "CenWits" system as reference model. In CenWits system, each hiker carries a GPS enabled sensor node to collect and exchange movement statistics with its fellow hikers using a short range wireless links. Since mobile agents will be attached to the sensor nodes that hikers carry with, mobile agents can hop from one host to another only when two hosts (hikers) meet together such that their mobility is restrained by the moving behavior of hikers. The little difference in walking speed and the uneven distribution of hikers make the hopping of mobile agents extremely slow and opportunistic. As a consequence, the search of mobile agents is slow and inefficient crippling agility of urgent agent functionality. Therefore, we propose to construct a control network using high speed network for search agents to travel in high speed. Under different objectives and constraints, we propose several control point placement models. After proving them to be NP-Complete, we propose few efficient heuristic algorithms to solve the placement problem. We also propose a simple search algorithm for search agents to search target agents quickly by using a control network.
    Reference: [1] S. Alouf, F. Huet, and P. Nain, "Forwarders vs. centralized server: an evaluation of two approaches for locating mobile agents," Performance Evaluation, vol. 49, no. 1-4, pp. 299-319, Sep. 2002.
    [2] J. Baumann, "A comparison of mechanisms for locating mobile agents," Technical Report TR 1999/11, Univ. of Stuttgart, Faculty of Computer Science, 1999.
    [3] J. Baumann, F. Hohl, K. Rothermel, and M. Straser, "Mole–Concepts of a mobile agent system," World Wide Web, vol. 1, no. 3, pp. 123-137, Sep. 1998.
    [4] M. Bavandla. "Improving the performance of location management protocols in a multiregion environment." Master`s Thesis, I. I. T. Roorkee, 2004.
    [5] E. Brewer, et al. "Technology and Infrastructure for Emerging Regions (TIER)." Internet: http://tier.cs.berkeley.edu/drupal/about, Retrieved on Apr. 20, 2011.
    [6] S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss, "Delay-tolerant networking: an approach to interplanetary internet," IEEE Communications Magazine, vol. 41, no. 6, pp. 128-136, Jun. 2003.
    [7] W.-S. E. Chen, C.-W. R. Leng, and Y.-N. Lien, "A novel mobile agent search algorithm," in Proc. of the International Conference on Computer, Communications and Networks, 1997, pp. 128-131.
    [8] W.-S. E. Chen, S. T. Su, Y.-N. Lien, H. T. Shu, and H. Liu, "Mobility and management support for mobile agents," in Proc. of the 2nd International Conference on Autonomous Agents, 1998, pp. 451-452.
    [9] T. H. Cormem, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to algorithms: The MIT press, 2001.
    [10] A. Di Stefano and C. Santoro, "Locating mobile agents in a wide distributed environment," IEEE Transactions on Parallel and Distributed Systems, vol. 13, no. 8, pp. 844-864, Aug. 2002.
    [11] S. Farrell, et al. "InterPlanetary Internet." Internet: http://www.ipnsig.org/, Retrieved on Apr. 20, 2011.
    [12] P. Flocchini and M. Xie, "A fully distributed mechanism for locating mobile agents," in Proc. of the International Multi-Conference on Computing in the Global Information Technology, 2007, pp. 41-41.
    [13] G. Glass. "Objectspace voyager core package technical overview," in Mobility: process, computers and agents, ACM Press/Addison-Wesley Publishing Co., 1999,
    pp. 611-627.
    [14] R. S. Gray, G. Cybenko, D. Kotz, R. A. Peterson, and D. Rus, "D`Agents: Applications and performance of a mobile agent system," Software: Practice and Experience, vol. 32, no. 6, pp. 543-573, May. 2002.
    [15] C. L. Hu and W. S. E. Chen, "A mobile agent-based active network architecture," in Proc. of the 7th International Conference on Parallel and Distributed Systems, 2000, pp. 445-452.
    [16] C.-M. Huang, K.-c. Lan, and C.-Z. Tsai, "A survey of opportunistic networks," in Proc. of the 22nd International Conference on Advanced Information Networking and Applications, 2008, pp. 1672-1677.
    [17] J. H. Huang, S. Amjad, and S. Mishra. "Cenwits Search and Rescue System." Internet: https://csel.cs.colorado.edu/~huangjh/Cenwits/index.htm, Retrieved on Apr. 20, 2011.
    [18] J. H. Huang, S. Amjad, and S. Mishra, "Cenwits: a sensor-based loosely coupled search and rescue system using witnesses," in Proc. of the 3rd International Conference on Embedded Networked Sensor Systems, 2005, pp. 180-191.
    [19] Y. T. Huang, Y. C. Chen, J. H. Huang, L. J. Chen, and P. Huang, "YushanNet: A delay-tolerant wireless sensor network for hiker tracking in Yushan national park," in Proc. of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, 2009, pp. 379-380.
    [20] P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, "Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet," in Proc. of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems, 2002, pp. 96-107.
    [21] R. M. Karp, "Reducibility among combinatorial problems, Complexity of Computer Computations," in Proc. Sympos. IBM Thomas J. Watson Res. Center, 1972, pp. 85-103.
    [22] G. Kastidou, E. Pitoura, and G. Samaras, "A scalable hash-based mobile agent location mechanism," in Proc. of the 23rd International Conference on Distributed Computing Systems, 2003, pp. 472-472.
    [23] D. B. Lange and M. Oshima, "Mobile agents with Java: The Aglet API," World Wide Web, vol. 1, no. 3, pp. 111-121, 1998.
    [24] D. B. Lange and M. Oshima, "Seven good reasons for mobile agents," Communications of the ACM, vol. 42, no. 3, pp. 88-89, Mar. 1999.
    [25] S. Lazar, I. P. Weerakoon, and D. P. Sidhu, "A scalable location tracking and message delivery scheme for mobile agents," in Proc. of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 1998, pp. 243-248.
    [26] J. Li, H. Kameda, and K. Li, "Optimal dynamic mobility management for PCS networks," IEEE/ACM Transactions on Networking (TON), vol. 8, no. 3, pp. 319-327, Jun. 2000.
    [27] T.-Y. Li and K.-Y. Lam, "An optimal location update and searching algorithm for tracking mobile agent," in Proc. of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems: part 2, 2002, pp. 639-646.
    [28] Y. N. Lien and C. W. R. Leng, "On the search of mobile agents," in Proc. of the 7th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 1996, pp. 703-707.
    [29] Y. N. Lien, F. Liu, C. W. Leng, and W. S. Chen, "Intelligent Search of Mobile Agents," in Proc. of the 1997 International Conference on Computer Systems Technology for Industrial Applications, 1997, pp. 110-116.
    [30] X. Ligong, Z. Zude, and L. Quan, "A novel communication mechanism of mobile agent system," in Proc. of the 2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing, 2008, pp. 695-699.
    [31] Z. Lu and J. Fan, "Delay/Disruption tolerant network and its application in military communications," in Proc. of the 2010 International Conference on Computer Design and Applications (ICCDA), 2010, pp. 231-234.
    [32] M. Martonosi, S. Lyon, L.-S. Peh, V. Poor, and D. Rubenstein. "The ZebraNet Wildlife Tracker." Internet: http://www.princeton.edu/~mrm/zebranet.html, Retrieved on Apr. 20, 2011.
    [33] D. Milojicic, et al., "MASIF: The OMG mobile agent system interoperability facility," in Proc. of the 2nd International Workshop on Mobile Agents, 1998, pp. 50-67.
    [34] D. S. Milojicic, F. Douglis, and R. Wheeler. Mobility: processes, computers, and agents. New York, NY: ACM Press/Addison-Wesley Publishing Co., 1999.
    [35] D. S. Milojicic, W. LaForge, and D. Chauhan, "Mobile objects and agents (MOA)," in Proc. of the 4th USENIX Conference on Object-Oriented Technologies and Systems, 1998, pp. 1-14.
    [36] R. Patel and K. Garg, "PMADE-A Platform for Mobile Agent Distribution &
    Execution," in Proc. of 5th World MultiConference on Systemics, Cybernetics and Informatics (SCI) and 7th International Conference on Information System Analysis and Synthesis (ISAS), 2001, pp. 287-293.
    [37] L. Pelusi, A. Passarella, and M. Conti, "Opportunistic networking: data forwarding in disconnected mobile ad hoc networks," IEEE Communications Magazine, vol. 44, no. 11, pp. 134-141, Nov. 2006.
    [38] Y. Sasaki and Y. Shibata, "Distributed disaster information system in DTN based mobile communication environment," in Proc. of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010, pp. 274-277.
    [39] R. Sushil, R. Bhargava, and K. Garg, "Location update schemes for mobile agents," INFOCOMP Journal of Computer Science, vol. 7, no. 2, pp. 37-43, 2008.
    [40] R. Sushil, K. Garg, and R. Bhargava, "Comparison of location management techniques for mobile agents," in Proc. of the 16th IEEE International Conference on Networks, 2008, pp. 1-5.
    [41] X. Tao, X. Feng, X. Li, G. Zhang, and J. Lu, "Communication mechanism in Mogent system," Journal of Software, vol. 11, no. 8, pp. 1060-1065, Aug. 2000.
    [42] H. Wang, G. Zeng, and S. Lin, "An efficient control mechanism of mobile agents," in Proc. of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC), 2001, pp. 371-379.
    [43] Y. Wang, F. Zhang, and L. Chen, "An approach to incremental SVM learning algorithm," in Proc. of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management, 2008, pp. 352-354.
    [44] D. Wong, N. Paciorek, T. Walsh, J. DiCelie, M. Young, and B. Peet, "Concordia: An infrastructure for collaborating mobile agents," in Proc. of the 1st International Workshop on Mobile Agents, 1997, pp. 86-97.
    [45] L. T. Yang. Mobile Intelligence. Hoboken, NJ: John Wiley & Sons, Inc., 2010.
    [46] T.-Y. Yeh and T. I. Wang, "A mechanism for tracking mobile agents in a cluster topology," in Proc. of the 11th International Conference on Parallel and Distributed Systems, 2005, pp. 320-327.
    [47] 朱浩華, 黃寶儀, 陳伶志, 藍崑展, 林文和, and 黃致豪. "YuShanNet." Internet: http://nslab.ee.ntu.edu.tw/~YuShanNet/, Retrieved on Apr. 20, 2011.
    [48] 陳伶志, 黃寶儀, and 黃致豪. "山文誌登山資訊系統." Internet: http://nrl.iis.sinica.edu.tw/YushanNet/tw_project.php, Retrieved on Apr. 20, 2011.
    [49] 陳禹銘, 祝鈞毅, 李雅萍, and 周子勤, "多工協調技術之應用與展望," 機械工
    業, no. 285, pp. 93-104, Dec. 2006.
    [50] 楊柏華譯, "<<資訊新知>>:行動代理人技術(上)," 中央研究院計算中心通訊, vol. 18, no. 23, pp. 184-188, Nov. 2002.
    Description: 碩士
    國立政治大學
    資訊科學學系
    95753008
    98
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0095753008
    Data Type: thesis
    Appears in Collections:[Department of Computer Science ] Theses

    Files in This Item:

    File SizeFormat
    300801.pdf3581KbAdobe PDF21226View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback