The solution presented locates locality of reference during the deadlock detectionprocess by
migrating detector agents to query multiple blocked agents.To message each blocked agent individually and
gather theirresponses at the shadow agent itself is an alternative to this single migration.Thepseudo code
provides a context for the solution and insightinto the responsibilities and activities performed by each entity.
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
Intrusion detection in the internet is an active
area of research. Intruders can be classified into two
types, namely; external intruders who are unauthorized
users of the computers they attack, and internal
intruders, who have permission to access the system but
with some restrictions. The aim of this paper is to present
a methodology to recognize attacks during the normal
activities in a system. A novel classification via sequential
information bottleneck (sIB) clustering algorithm has
been proposed to build an efficient anomaly based
network intrusion detection model. We have compared
our proposed method with other clustering algorithms
like X-Means, Farthest First, Filtered clusters, DBSCAN,
K-Means, and EM (Expectation-Maximization)
clustering in order to find the suitability of our proposed
algorithm. A subset of KDDCup 1999 intrusion detection
benchmark dataset has been used for the experiment.
Results show that the proposed method is efficient in
terms of detection accuracy, low false positive rate in
comparison to the other existing methods.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
Hierarchical Non-blocking Coordinated Checkpointing Algorithms for Mobile Dis...CSCJournals
Mobile system typically uses wireless communication which is based on electromagnetic waves and utilizes a shared broadcast medium. This has made possible creating a mobile distributed computing environment and has brought us several new challenges in distributed protocol design. So many issues such as range of transmission, limited power supply due to battery capacity and mobility of processes. These new issue makes traditional recovery algorithm unsuitable. In this paper, we propose hierarchical non blocking coordinated checkpointing algorithms suitable for mobile distributed computing. The algorithm is non-blocking, requires minimum message logging, has minimum stable storage requirement and produce a consistent set of checkpoints. This algorithm requires minimum number of processes to take checkpoint.
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
Abstract: Network security and Intrusion Detection Systems (IDS’s) is an important security related research
area. This paper applies K-star algorithm with filtering analysis in order to build a network intrusion detection
system. For our experimental analysis and as a case study, we have used the new NSL-KDD dataset, which is a
modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 66.0% for the
training set and the remainder for the testing set a 2 class classifications has been implemented. WEKA which is
a java based open source software consists of a collection of machine learning algorithms for Data mining tasks
has been used in the testing process. The experimental results show that the proposed approach is very accurate
with low false positive rate and high true positive rate and it takes less learning time in comparison with other
existing approaches used for efficient network intrusion detection.
Keywords: Information Gain, Intrusion Detection System, Instance-based classifier, K-Star, Weka.
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
Intrusion detection in the internet is an active
area of research. Intruders can be classified into two
types, namely; external intruders who are unauthorized
users of the computers they attack, and internal
intruders, who have permission to access the system but
with some restrictions. The aim of this paper is to present
a methodology to recognize attacks during the normal
activities in a system. A novel classification via sequential
information bottleneck (sIB) clustering algorithm has
been proposed to build an efficient anomaly based
network intrusion detection model. We have compared
our proposed method with other clustering algorithms
like X-Means, Farthest First, Filtered clusters, DBSCAN,
K-Means, and EM (Expectation-Maximization)
clustering in order to find the suitability of our proposed
algorithm. A subset of KDDCup 1999 intrusion detection
benchmark dataset has been used for the experiment.
Results show that the proposed method is efficient in
terms of detection accuracy, low false positive rate in
comparison to the other existing methods.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
Hierarchical Non-blocking Coordinated Checkpointing Algorithms for Mobile Dis...CSCJournals
Mobile system typically uses wireless communication which is based on electromagnetic waves and utilizes a shared broadcast medium. This has made possible creating a mobile distributed computing environment and has brought us several new challenges in distributed protocol design. So many issues such as range of transmission, limited power supply due to battery capacity and mobility of processes. These new issue makes traditional recovery algorithm unsuitable. In this paper, we propose hierarchical non blocking coordinated checkpointing algorithms suitable for mobile distributed computing. The algorithm is non-blocking, requires minimum message logging, has minimum stable storage requirement and produce a consistent set of checkpoints. This algorithm requires minimum number of processes to take checkpoint.
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
Abstract: Network security and Intrusion Detection Systems (IDS’s) is an important security related research
area. This paper applies K-star algorithm with filtering analysis in order to build a network intrusion detection
system. For our experimental analysis and as a case study, we have used the new NSL-KDD dataset, which is a
modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 66.0% for the
training set and the remainder for the testing set a 2 class classifications has been implemented. WEKA which is
a java based open source software consists of a collection of machine learning algorithms for Data mining tasks
has been used in the testing process. The experimental results show that the proposed approach is very accurate
with low false positive rate and high true positive rate and it takes less learning time in comparison with other
existing approaches used for efficient network intrusion detection.
Keywords: Information Gain, Intrusion Detection System, Instance-based classifier, K-Star, Weka.
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONijcsit
Mobile agent is a certain agent actively able to move from one computer to another or even travel across
network to perform the task assigned. This research aimed to develop mobile agent model to detect
distributed intrusion (Distributed Intrusion Detection System).
It was expected that the produced model was able to perform its task in nearly real time manner, to be
immune against attack, and also fairly small overhead at the host, either in memory consumption or CPU
usage. In this research, the Aglets concept was also developed to aid intrusion detection. This approach
was also maintained to solve certain issues such as scalability, reliability, and configurability. Hence, the
advantages and limitations of agent-based approaches will be when it is applied in real world.
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...KaashivInfoTech Company
We present Magiclock, a novel potential deadlock detection technique by analyzing execution traces (containing no deadlock occurrence) of large-scale multithreaded programs.
Magiclock iteratively eliminates removable lock dependencies before potential deadlock localization. It divides lock dependencies into thread specific partitions, consolidates equivalent lock dependencies, and searches over the set of lock dependency chains without the need to examine any duplicated permutations of the same lock dependency chains.
We validate Magiclock through a suite of real-world, large-scale multithreaded programs.
The experimental results show that Magiclock is significantly more scalable and efficient .
Than existing dynamic detectors in analyzing and detecting potential deadlocks in execution traces of large-scale multithreaded programs..
http://kaashivinfotech.com/
http://inplanttrainingchennai.com/
http://inplanttraining-in-chennai.com/
http://internshipinchennai.in/
http://inplant-training.org/
http://kernelmind.com/
http://inplanttraining-in-chennai.com/
http://inplanttrainingchennai.com/
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
Truly dependable software systems should be built with structuring techniques able to decompose the software complexity without
hiding important hypotheses and assumptions such as those regarding
their target execution environment and the expected fault- and system
models. A judicious assessment of what can be made transparent and
what should be translucent is necessary. This paper discusses a practical
example of a structuring technique built with these principles in mind:
Reflective and refractive variables. We show that our technique offers
an acceptable degree of separation of the design concerns, with limited
code intrusion; at the same time, by construction, it separates but does
not hide the complexity required for managing fault-tolerance. In particular, our technique offers access to collected system-wide information
and the knowledge extracted from that information. This can be used
to devise architectures that minimize the hazard of a mismatch between
dependable software and the target execution environments.
Garbage Management using Android Smartphoneijsrd.com
Environmental pollution nowadays is a major aspect to be considered. Pollution has to be avoided and there are several ways to control it. In this paper, we propose an innovative software application, via which a user can send an alert text message and location details to the garbage/waste management department in the campus and also post the same details on the dedicated web server. This information essentially helps the respective department to take care of garbage present in the campus.
This plugin lets you track your phone and maintain inventory information of your Windows mobile equipments using PandoraFMS Enterprise. For more information you can visit the following website: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=313
Management of errors in multi-tenant cloud based applications remains a challenging problem. This
problem is compounded due to (i) multiple versions of application serving different clients, (ii) agile nature
in which the applications are released to the clients, and (iii) variations in specific usage patterns of each
client. We propose a framework for isolating and managing errors in such applications. The proposed
framework is evaluated with two different popular cloud based applications and empirical results are
presented.
Error Isolation and Management in Agile Multi-Tenant Cloud Based Applications neirew J
Management of errors in multi-tenant cloud based applications remains a challenging problem. This
problem is compounded due to (i) multiple versions of application serving different clients, (ii) agile nature
in which the applications are released to the clients, and (iii) variations in specific usage patterns of each
client. We propose a framework for isolating and managing errors in such applications. The proposed
framework is evaluated with two different popular cloud based applications and empirical results are
presented.
Virtual Machines Security Internals: Detection and ExploitationMattia Salvi
This paper is an analysis of the current state of virtual machines’ security, showcasing how features have been turned into attack vectors that can pose threats to real enterprise level infrastructures. Despite the few real world scenarios that have actively exploited security holes, they remain one of the most dangerous threats organizations have to look out for.
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques IJERA Editor
The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for
cloud tenants or customers and introduces an additional layer that itself must be completely configured and
secured. Intruders can exploit the large amount of cloud resources for their attacks.
This paper discusses two approaches In the first three features namely ongoing attacks, autonomic prevention
actions, and risk measure are Integrated to our Autonomic Cloud Intrusion Detection Framework (ACIDF) as
most of the current security technologies do not provide the essential security features for cloud systems such as
early warnings about future ongoing attacks, autonomic prevention actions, and risk measure. The early
warnings are signaled through a new finite State Hidden Markov prediction model that captures the interaction
between the attackers and cloud assets. The risk assessment model measures the potential impact of a threat on
assets given its occurrence probability. The estimated risk of each security alert is updated dynamically as the
alert is correlated to prior ones. This enables the adaptive risk metric to evaluate the cloud’s overall security
state. The prediction system raises early warnings about potential attacks to the autonomic component,
controller. Thus, the controller can take proactive corrective actions before the attacks pose a serious security
risk to the system.
In another Attack Sequence Detection (ASD) approach as Tasks from different users may be performed on the
same machine. Therefore, one primary security concern is whether user data is secure in cloud. On the other
hand, hacker may facilitate cloud computing to launch larger range of attack, such as a request of port scan in
cloud with multiple virtual machines executing such malicious action. In addition, hacker may perform a
sequence of attacks in order to compromise his target system in cloud, for example, evading an easy-to-exploit
machine in a cloud and then using the previous compromised to attack the target. Such attack plan may be
stealthy or inside the computing environment, so intrusion detection system or firewall has difficulty to identify
it.
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesIJERA Editor
The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for cloud tenants or customers and introduces an additional layer that itself must be completely configured and secured. Intruders can exploit the large amount of cloud resources for their attacks. This paper discusses two approaches In the first three features namely ongoing attacks, autonomic prevention actions, and risk measure are Integrated to our Autonomic Cloud Intrusion Detection Framework (ACIDF) as most of the current security technologies do not provide the essential security features for cloud systems such as early warnings about future ongoing attacks, autonomic prevention actions, and risk measure. The early warnings are signaled through a new finite State Hidden Markov prediction model that captures the interaction between the attackers and cloud assets. The risk assessment model measures the potential impact of a threat on assets given its occurrence probability. The estimated risk of each security alert is updated dynamically as the alert is correlated to prior ones. This enables the adaptive risk metric to evaluate the cloud’s overall security state. The prediction system raises early warnings about potential attacks to the autonomic component, controller. Thus, the controller can take proactive corrective actions before the attacks pose a serious security risk to the system. In another Attack Sequence Detection (ASD) approach as Tasks from different users may be performed on the same machine. Therefore, one primary security concern is whether user data is secure in cloud. On the other hand, hacker may facilitate cloud computing to launch larger range of attack, such as a request of port scan in cloud with multiple virtual machines executing such malicious action. In addition, hacker may perform a sequence of attacks in order to compromise his target system in cloud, for example, evading an easy-to-exploit machine in a cloud and then using the previous compromised to attack the target. Such attack plan may be stealthy or inside the computing environment, so intrusion detection system or firewall has difficulty to identify it.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Efforts made in many countries to stop the COVID-19 pandemic include vaccinations. However,
public skepticism about vaccines is a pressing issue for health authorities. With the COVID-19 vaccine
available,
SARS-CoV-2, as the causative agent of COVID-19, has spread throughout the world after becoming
a pandemic in March 2020. In the midst of the ongoing COVID-19 pandemic, we are also faced with another
serious health problem
More Related Content
Similar to Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONijcsit
Mobile agent is a certain agent actively able to move from one computer to another or even travel across
network to perform the task assigned. This research aimed to develop mobile agent model to detect
distributed intrusion (Distributed Intrusion Detection System).
It was expected that the produced model was able to perform its task in nearly real time manner, to be
immune against attack, and also fairly small overhead at the host, either in memory consumption or CPU
usage. In this research, the Aglets concept was also developed to aid intrusion detection. This approach
was also maintained to solve certain issues such as scalability, reliability, and configurability. Hence, the
advantages and limitations of agent-based approaches will be when it is applied in real world.
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...KaashivInfoTech Company
We present Magiclock, a novel potential deadlock detection technique by analyzing execution traces (containing no deadlock occurrence) of large-scale multithreaded programs.
Magiclock iteratively eliminates removable lock dependencies before potential deadlock localization. It divides lock dependencies into thread specific partitions, consolidates equivalent lock dependencies, and searches over the set of lock dependency chains without the need to examine any duplicated permutations of the same lock dependency chains.
We validate Magiclock through a suite of real-world, large-scale multithreaded programs.
The experimental results show that Magiclock is significantly more scalable and efficient .
Than existing dynamic detectors in analyzing and detecting potential deadlocks in execution traces of large-scale multithreaded programs..
http://kaashivinfotech.com/
http://inplanttrainingchennai.com/
http://inplanttraining-in-chennai.com/
http://internshipinchennai.in/
http://inplant-training.org/
http://kernelmind.com/
http://inplanttraining-in-chennai.com/
http://inplanttrainingchennai.com/
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
Truly dependable software systems should be built with structuring techniques able to decompose the software complexity without
hiding important hypotheses and assumptions such as those regarding
their target execution environment and the expected fault- and system
models. A judicious assessment of what can be made transparent and
what should be translucent is necessary. This paper discusses a practical
example of a structuring technique built with these principles in mind:
Reflective and refractive variables. We show that our technique offers
an acceptable degree of separation of the design concerns, with limited
code intrusion; at the same time, by construction, it separates but does
not hide the complexity required for managing fault-tolerance. In particular, our technique offers access to collected system-wide information
and the knowledge extracted from that information. This can be used
to devise architectures that minimize the hazard of a mismatch between
dependable software and the target execution environments.
Garbage Management using Android Smartphoneijsrd.com
Environmental pollution nowadays is a major aspect to be considered. Pollution has to be avoided and there are several ways to control it. In this paper, we propose an innovative software application, via which a user can send an alert text message and location details to the garbage/waste management department in the campus and also post the same details on the dedicated web server. This information essentially helps the respective department to take care of garbage present in the campus.
This plugin lets you track your phone and maintain inventory information of your Windows mobile equipments using PandoraFMS Enterprise. For more information you can visit the following website: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=313
Management of errors in multi-tenant cloud based applications remains a challenging problem. This
problem is compounded due to (i) multiple versions of application serving different clients, (ii) agile nature
in which the applications are released to the clients, and (iii) variations in specific usage patterns of each
client. We propose a framework for isolating and managing errors in such applications. The proposed
framework is evaluated with two different popular cloud based applications and empirical results are
presented.
Error Isolation and Management in Agile Multi-Tenant Cloud Based Applications neirew J
Management of errors in multi-tenant cloud based applications remains a challenging problem. This
problem is compounded due to (i) multiple versions of application serving different clients, (ii) agile nature
in which the applications are released to the clients, and (iii) variations in specific usage patterns of each
client. We propose a framework for isolating and managing errors in such applications. The proposed
framework is evaluated with two different popular cloud based applications and empirical results are
presented.
Virtual Machines Security Internals: Detection and ExploitationMattia Salvi
This paper is an analysis of the current state of virtual machines’ security, showcasing how features have been turned into attack vectors that can pose threats to real enterprise level infrastructures. Despite the few real world scenarios that have actively exploited security holes, they remain one of the most dangerous threats organizations have to look out for.
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques IJERA Editor
The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for
cloud tenants or customers and introduces an additional layer that itself must be completely configured and
secured. Intruders can exploit the large amount of cloud resources for their attacks.
This paper discusses two approaches In the first three features namely ongoing attacks, autonomic prevention
actions, and risk measure are Integrated to our Autonomic Cloud Intrusion Detection Framework (ACIDF) as
most of the current security technologies do not provide the essential security features for cloud systems such as
early warnings about future ongoing attacks, autonomic prevention actions, and risk measure. The early
warnings are signaled through a new finite State Hidden Markov prediction model that captures the interaction
between the attackers and cloud assets. The risk assessment model measures the potential impact of a threat on
assets given its occurrence probability. The estimated risk of each security alert is updated dynamically as the
alert is correlated to prior ones. This enables the adaptive risk metric to evaluate the cloud’s overall security
state. The prediction system raises early warnings about potential attacks to the autonomic component,
controller. Thus, the controller can take proactive corrective actions before the attacks pose a serious security
risk to the system.
In another Attack Sequence Detection (ASD) approach as Tasks from different users may be performed on the
same machine. Therefore, one primary security concern is whether user data is secure in cloud. On the other
hand, hacker may facilitate cloud computing to launch larger range of attack, such as a request of port scan in
cloud with multiple virtual machines executing such malicious action. In addition, hacker may perform a
sequence of attacks in order to compromise his target system in cloud, for example, evading an easy-to-exploit
machine in a cloud and then using the previous compromised to attack the target. Such attack plan may be
stealthy or inside the computing environment, so intrusion detection system or firewall has difficulty to identify
it.
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesIJERA Editor
The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for cloud tenants or customers and introduces an additional layer that itself must be completely configured and secured. Intruders can exploit the large amount of cloud resources for their attacks. This paper discusses two approaches In the first three features namely ongoing attacks, autonomic prevention actions, and risk measure are Integrated to our Autonomic Cloud Intrusion Detection Framework (ACIDF) as most of the current security technologies do not provide the essential security features for cloud systems such as early warnings about future ongoing attacks, autonomic prevention actions, and risk measure. The early warnings are signaled through a new finite State Hidden Markov prediction model that captures the interaction between the attackers and cloud assets. The risk assessment model measures the potential impact of a threat on assets given its occurrence probability. The estimated risk of each security alert is updated dynamically as the alert is correlated to prior ones. This enables the adaptive risk metric to evaluate the cloud’s overall security state. The prediction system raises early warnings about potential attacks to the autonomic component, controller. Thus, the controller can take proactive corrective actions before the attacks pose a serious security risk to the system. In another Attack Sequence Detection (ASD) approach as Tasks from different users may be performed on the same machine. Therefore, one primary security concern is whether user data is secure in cloud. On the other hand, hacker may facilitate cloud computing to launch larger range of attack, such as a request of port scan in cloud with multiple virtual machines executing such malicious action. In addition, hacker may perform a sequence of attacks in order to compromise his target system in cloud, for example, evading an easy-to-exploit machine in a cloud and then using the previous compromised to attack the target. Such attack plan may be stealthy or inside the computing environment, so intrusion detection system or firewall has difficulty to identify it.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Similar to Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code (20)
Efforts made in many countries to stop the COVID-19 pandemic include vaccinations. However,
public skepticism about vaccines is a pressing issue for health authorities. With the COVID-19 vaccine
available,
SARS-CoV-2, as the causative agent of COVID-19, has spread throughout the world after becoming
a pandemic in March 2020. In the midst of the ongoing COVID-19 pandemic, we are also faced with another
serious health problem
This paper discusses the construction and implementation of a system for the measurement of
electrical power parameters; amperage and voltage of the hybrid system photovoltaic solar-wind, to evaluate
the system parameters and performance. The basis of the development of the measuring apparatus is the use of
an Arduino Mega 2560 to provide the interface between the electrical circuits of the sensors and the dynamics
of the voltage-amperage as well as collect data in an analog format as well as development of functional
dependence relationships. The collected data is converted into digital format and stored it in an Excel format
through the "PLX-DAQ Spreadsheet" that connects the Arduino and the PC for display and analysis of the
system parameters. The proposed technique for power measurements of AC and DC proved to be reliable and
can predict the power amperage and voltage within relative error of 1.63 % for AC and 4.16% for DC,
respectively.
The optimum speed required for mass-size reduction of shells to produce most sizes that are small
comparable with kernel sizes; coupled with retention of kernel wholeness in cracked palm nut mixture under
repeated impact was investigated. This is to enhance whole kernel separation by dry method, reduce maintenance
and production cost of palm kernel oil (PK0); and lower the risk of oil rancidity associated with split kernel
production and wet method of separation. A static nut cracker and centrifugal nut cracker were used in this study as
Test Rigs while sieves were used to grade cracked shells and whole kernels. The data generated were evaluated. A
model was developed for energy via speed required to retain kernels wholeness following repeated impact in the
crackers. Technical analysis revealed that the maximum allowable speed to retain kernel wholeness is 27.93 m/s;
the minimum allowable average speed to fragment cracked shells is 24.95 m/s. Further analysis showed that the
optimum speed and energy required for cracked nut mixture under repeated impact to have kernel wholeness
retention and production of small sizes of cracked shells relative to kernel sizes are 25.71 m/s and 0.4 J,
respectively.
This review was written to provide a comprehensive summary of the suggested etiologies of Chronic Kidney
Disease of Unknown Etiology (CKDu) in Sri Lanka. In this review, Chronic Kidney Disease (CKD) is explained
in detail and its known etiologies are discussed. CKDu is defined and its epidemiology is discussed, with the
compilation of statistic from over 15 research papers through the years 2000 to present.
This work contributes to the monitoring of water pollution of some selected Dams in Katsina
State, North western Nigeria by assessing the degree of heavy metal pollution in the Dams sediment samples.
The study was conducted in the year 2017 within some selected Dams in the State (Ajiwa, Zobe,
Sabke/Dannakola) that are beehives of fishing and Agricultural activities in Katsina State. Analysis for the
concentration of these heavy metals; Cr, Cd, Fe, Ni, Mn, Pb and Zn was conducted by the use of AAS (by
Atomic Absorption Spectrophotometry) method. Several indices were used to assess the metal contamination
levels in the sediment samples, namely; Geo-accumulation Index (Igeo), Enrichment Factor (EF),
Contamination Factor (CF), Degree of Contamination (Cd), Pollution Load Index (PLI) and Potential
Ecological Risk Index (PERI). The result of this study has shown that generally among the heavy metals
evaluated, the highest concentration was observed for Fe (range: 2.6718-4.2830 ppm), followed by Zn (range:
0.4265-0.7376 ppm), Cr (range: 0.1106-0.1836 ppm), Cd (range: 0.1333-0.1273 ppm) and Mn (range: 0.1136-
0.1271 ppm). While Pb has the lowest concentration (range: 0.0472-0.0598 ppm). For all the site sampled the
heavy metal Ni was below detection level (BDL). From the results of heavy metals I-geo values, according to
Muller’s classification, all the sediment samples from the selected dams were unpolluted (class 0). The result for
the enrichment factor has shown that for all the selected dam sediment samples the heavy metals show
deficiency to minimal enrichment. Also based on the contamination factors for all sediment samples the heavy
metal Cd has a CF values range of 0.5430-0.6665 (~1), indicating that the sediment samples are moderately
contaminated with Cd. In contrast, the rest of the heavy metals exhibit low contamination in general. The value
of PLI ranges from 0.2408 to 0.4935, indicating unpolluted to moderate pollution. The Eri values for all
samples are all < 40, presenting low ecological risk. The results suggest that the sediment samples from the
selected dams in Katsina state has low contamination by the heavy metals evaluated.
Using QR Decomposition to calculate the sum of squares of a model has a limitation that the number of rows,
which is also the number of observations or responses, has to be greater than the total number of parameters used in the
model. The main goal in the experimental design model, as a part of the Linear Model, is to analyze the estimable function
of the parameters used in the model. In order not to deal with generalized invers, partitioned design matrix may be used
instead. This partitioned design matrix method may be used to calculate the sum of squares of the models whenever the total
number of parameters is greater than the number of observations. It can also be used to find the degrees of freedom of each
source of variation components. This method is discussed in a Balanced Nested-Factorial Experimental Design.
Introduction:It has been proven twice that the Hambantota District has the highest life expectancy in male
population. This study focused to find and identify reasons for Hambantota District people to have high life
expectancy at birth.
Methodology: Research was carried out in both qualitative and quantitative phases in five MOH (Medical
Health Officer) divisions in HambantotaDistrict. Study focused on 3 age categories, 55-65 Years, 66-75 Years,
and above 76 Years. Main objectives and key information areas are Life Style and Social Behaviors, Food
Consumption and Diet, Familial Trait and Physical and Mental Health.
Findings: Majority of the male population have educated up to grade 5and most are engaged in the agriculture
while others engaged in fishery and self-employment etc. Almost everyone reachestheir workplaces by foot or by
bicycle. Many of them work less than six hours. They spend their free time with their family members and watch
TV. Most of them do not consume alcohol and smoke. Almost everyone take part in social activities. Majority eat
red rice for all three meals. Almost everyone eats fish every day. They have a high salt intake. Their parents and
ancestors have also have had a high life expectancy. Only a minority suffer from chronic illnesses. They all have
a good physical and mental health condition. They spend happy and relaxed lifestyle.
Conclusion: Healthy diet, low alcohols consumption and smoking, high iodine intake, physical activeness and
their social wellbeing effect for high life expectancy within the male population of selected five MOH divisions
in Hambantota District. They have a free and happy life. Genetics of these people also may contribute for high
life expectancy. Abundance of neem trees in this area also may effect on their high life expectancy.
A clay deposit in Chavakali of western Kenya was evaluated for its potential as refractory raw
material. The collected clay sample was crushed, sieved and the chemical composition determined in
percentage weight (wt %) of (SiO2, Al2O3, Fe2O3, etc) using Atomic Absorption Spectrophotometer (AAS). The
samples were moulded into rectangular shaped bricks of 40mm height, 40mm width and 80mm length, allowed
to dry and later fired up to a temperature of 10000C. Refractory properties like Compressive strength,
Hardness, Linear shrinkage on firing, Apparent porosity and Density were determined using standard
techniques. The result of chemical analysis indicated that the clay was composed of Silica (SiO2), 67.3%;
Alumina (Al2O3), 16.67%; Iron Oxide (Fe2O3), 3.87%; Calcium Oxide (CaO), 0.37%; Potassium Oxide (K2O),
2.30%; Sodium Oxide (Na2O), 1.39%; and other traces. The physical and mechanical tests show that the clay
has Cold Crushing Strength of 10.36MPa, Hardness of 40.080 GPa, Linear shrinkage of 6.17%, Apparent
Porosity of 32.71% and Bulk Density of 2.77g/cm3
. Chavakali clay can make better local refractory
Nihon University challenged world record of the human-powered aircraft flight based on the
regulation of Fédération Aérionautique Internationale in Kasumigaura Lake, Japan, 2014. The wing fell off in
midair immediately after take-off, the pilot landed to the lake for safety. So, the challenge failed. It guessed the
operational errors were correlated with the wing falling in midair, which had not happened in our experience.
The flight recording camera and the salvaged airplane were investigated. The fault tree analysis was conducted
for cause investigation. The wing falling was the result as the chain destruction starting from the coupling parts
being damaged in take-off. The defective take-off was caused by composite factors on only operational errors.
The risk that the ultralight airplane might disintegrate in midair by only operational error became apparent.
Due to the large-scale exploitation of mineral resources and the unreasonable human activities, the
geological disasters in Jiaozuo City have become increasingly prominent and the degree of harm increased. This
leds to a tremendous threat to human life and property safety. Jiaozuo City, the main types of geological
disasters, landslides, ground subsidence, debris flow and ground fissures. It has great significance to the
development of the city and the protection of people's life and property to explore the hidden dangers of
geological disasters and actively take preventive and control measures. The establishment of geological
hazard group measurement system of prevention and control to achieve the timely detection of geological
disasters, rapid early warning and effective avoidance.
Dangerous gas explosion accidents result in considerable amount of casualties and property damage.
Hence, an investigation on the generation of poisonous gases in gas explosions exerts important implications
for accident prevention and control and in the decision-making processes of fire rescue. Therefore, a gas
explosion piping test system is established in this paper. Experimental research on gas explosion is conducted by
selecting methane/air premixed gases with concentrations of 7%, 9%, 11%, 13%, and 15% in the gas explosive
range. This research aims to reveal the regularity of CO generation after gas explosion in pipelines.
Experimental results showed that when the gas concentration is small (< 9%), 1500–3000 ppm CO will be
produced. When the gas concentration is large (> 9%), the CO amount will reach 3000–40000 ppm. The
variation trend in CO concentration and the quantity of explosive gas are also obtained.
To evaluate the influence of the entry speed to flow field above the water surface on an object
high-speed entering into water, the flow field was measured experimentally by using an optical visualization
method. The entry speed was ranging from 0.2 to 1.5 km/s. In case that the entry speed was higher than the
sound speed of gas above the water surface, the vertical velocity of the tip of a water splash was linear to the
vertical location of the tip. The ratio between the initial vertical velocity of a water splash and the entry speed
was independent from the entry speed and was constant.A shock wave was driven above the water surface by the
entry even thoughthe entry speed was lower than the sound speed of gas above the water surface.A scaling law
for the propagation of a shock wave driven by explosion of an explosive was applicable to the propagation of
the shock wave driven by the water entry by using the kinetic energy of the entry object instead of the explosive
energy.
Pingdingshan Coal Mine district is one of the six mining areas of Henan Province, which is a
large coal base in China. After 60 years of exploitation, it has brought great benefits, at the same time,
serious geological disasters have been occurred. It has seriously damaged the normal production of the
masses, life, restricting the development of Pingdingshan coal mine economy. In this paper, the
geological disasters such as ground collapse, ground fissures and ground subsidence in Pingdingshan coal
mine are analyzed, and the degree of geological disasters in the mining area is analyzed in combination
with the severely affected mining area. Finally, reasonable and feasible countermeasures have been put
forward.
Kelud volcano is located in East Java Province, Indonesia. According to Geochemical study of
Kelud Volcano, it could be divided into 3 periods which are Kelud I (older than 100 ky BP), Kelud II (40 – 100
ky BP), and Kelud III (younger than 40 ky BP). A specific petrogenesis of Kelud are dominatad by magma
mixing and fractional crystalization. New petrological data from Kelud volcano was taken through products of
the eruption in 1990 (Vulkanian type), 2007 (Lava plug forming) and 2014 (Plinian type). Petrographic study
on these rocks showed that reverse and oscilatory zoning on plagioclases, Shieve-like and corroded textures on
plagioclases and pyroxenes are common. However, normal zoning textures were also found on plagioclases and
pyroxenes. Whole rock study on these rocks showed all rocks were classified into Basalt to Andesite in
composition with calc-alkaline group. The study indicated that their magma origin derrived from slab with
fractional crystallization during in the magma reservoir, and magma mixing processes are dominant expecially
in magma pockets. Concequently, the magma origin and petrogenesis of Kelud magma after the 1966 eruption
are still the same as those of old magma of Kelud.
Black cotton soils are among a group of soils termed as problematic soils. These soils have
undesirable characteristics in relation to construction works and therefore need some form of improvement
when encountered in construction projects. Techniques for improvement of black cotton soils include
replacement, moisture control or adding a stabilizer. Cement and/or lime has been commonly used in soil
stabilization for ages. However, due to the associated cost, required quality control and the need to utilize waste
materials in construction, new stabilizing materials are emerging. This paper presents a study on application of
quarry dust for improving properties of black cotton soil in Mbeya region, Tanzania. The targeted improvement
was to achieve minimum acceptable characteristics for road subgrade as per Tanzania standards. It was
determined that 40% by weight of quarry dust added to the black cotton soil was able to improve the
characteristics by increasing CBR value from 3.8 to 15.7 and reducing PI from 32% to 15%. It will be worthy
studying the cost implication of the suggested improvement in relation to other techniques before application of
the study findings.
High intensity rain and morphometri in Padang city cause at Arau. Morphometri
geomorphologi that is related to wide of, river network, stream pattern and gradien of river. The form wide
of DAS will be by stream pattern and level.This will influence to the number of rain. Make an index to
closeness of stream depict closeness of river stream at one particular DAS. Speed of river stream influenced
by storey, level steepness of river. Steepness storey, level is comparison of difference height of river
downstream and upstream. Ever greater of steepness of river stream, excelsior speed of river stream that
way on the contrary. High to lower speed of river stream influence occurence of floods, more than anything
else if when influenced by debit big. By using rainfall from year 2005 to year 2015, and use Thiessen method
got a rainfall. Use the DEM IFSAR, analysed sofware ARGIS, and with from earth map, the result got DAS
in at condition of floods gristle and sedimentation. There are band evakuasi for resident which data in
floods area.
The chemical (extractives and lignin) content and histological property (microscopic structure)
of tissues of Ricinodendron heudelotii (Baill, Pierre ex Pax), an angiosperm, were investigated for its potential
as a fibrous raw material for pulp and paper production. Bolts of about 70 cm were cut from the felled trees at
three different merchantable height levels of 10%, 50%, and 90% to obtain: corewood, middlewood and
outerwood samples. The fiber characteristics of the selected trees viz: the fiber length, fibre diameter and lumen
diameter were measured while the cell wall thickness was derived from the measured fibre dimensions. The
average fiber length, cell wall thickness, and lumen width, were 1.40 mm, 4.6 µm, and 32.3 µm, respectively.
The extractive and lignin contents were determined. Klason lignin content was about 30%. Extractive content of
R. heudelotii ranged from 0.41 to 0.5%. Based on these findings R. heudelotii is suitable for pulp and paper
production.
The prolific Niger Delta Basin is a mature petroleum province. Therefore, further prospectivity in
the basin lies within deeper plays which are high pressure and high temperature (HPHT) targets. One of the
main characteristics of the Niger Delta is its unique diachronous tripartite stratigraphy. Its gross onshore and
shallow offshore lithostratigraphy consists of the deep-seated Akata Formation and is virtually exclusively
shale, the petroliferous paralic Agbada Formation in which sand/shale proportion systematically increases
upward, and at the top the Benin Formation composed almost exclusively of sand. This stratigraphic pattern is
not exactly replicated in the deep offshore part of the delta.
A low-carbon steel wire of AISI 1022 is used to easily fabricate into self-drilling tapping screws,
which are widely used for construction works. The majority of carbonitriding activity is performed to improve
the wear resistance without affecting the soft, tough interior of the screws in self-drilling operation. In this
study, Taguchi technique is used to obtain optimum carbonitriding conditions to improve the mechanical
properties of AISI 1022 self-drilling tapping screws. The carbonitriding qualities of self-drilling tapping screws
are affected by various factors, such as quenching temperature, carbonitriding time, atmosphere composition
(carbon potential and ammonia level), tempering temperature and tempering time. The quality characteristics of
carbonitrided tapping screws, such as case hardness and core hardness, are investigated, and so are their
process capabilities. It is experimentally revealed that the factors of carbonitriding time and tempering
temperature are significant for case hardness. The optimum mean case hardness is 649.2HV. For the case
hardness, the optimum process-capability ratio increases by about 200% compared to the original result. The
new carbonitriding parameter settings evidently improve the performance measures over their values at the
original settings. The strength of the carbonitrided AISI 1022 self-drilling tapping screws is effectively improved.
More from International journal of scientific and technical research in engineering (IJSTRE) (20)
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Fundamentals of Electric Drives and its applications.pptx
Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
1. International journal of scientific and technical research in engineering (IJSTRE)
www.ijstre.com Volume 1 Issue 1 ǁ April 2016.
Manuscript id. 626565782 www.ijstre.com Page 1
Motivation to a Deadlock Detection in Mobile Agents with
Pseudo-Code
Rashmi Priya
Abstract : The solution presented locates locality of reference during the deadlock detectionprocess by
migrating detector agents to query multiple blocked agents.To message each blocked agent individually and
gather theirresponses at the shadow agent itself is an alternative to this single migration.Thepseudo code
provides a context for the solution and insightinto the responsibilities and activities performed by each entity.
Keywords:Deadlock, Agents, pseudo code, detector, entity
I. Introduction
As presented in the previous section traditional distributed solutions commonly have fault and location
assumptions that make them unsuitable for mobile agent systems. To solve this problem, mobile agent specific
solutions are required. The properties of the presented deadlock detection algorithm illustrate how it is a fully
adapted mobile agent solution.
The presented technique is fault tolerant and robust. Lost agents or messages during the deadlock detection
process do not represent a critical failure. This fault tolerance is due to three properties of the algorithm: the
autonomous nature of the agents, the periodic nature of the detection process and the copying of deadlock
information. Shadow, deadlock detection and consumer agents execute asynchronously .They do not depend on
continual communication during the deadlock detection process. The algorithm is designed around incremental
construction of the global wait-for graph. Finally therefore if a portion of the graph is lost, the next update will
recover that information. Hence copying of the partial wait-for graph into deadlock detection agents make the
loss orfailure of a particular deadlock detection agent trivial and has no impact on the detectionprocess, outside
of slowing the process. Additional safeguards can be built into the agent hosts. such as agent crash detection, to
improve fault tolerance
II. Algorithm Motivation and Agent Properties
Bylimiting the number of messages that would be required in other solutionsthe Detector migration
reduces network load. It is difficultto compare the network load of this mobile agent solution to that generated in
traditionaldistnbuted deadlock detection solutions due to the significantly different paradigm andproperties of
the environment.This is due to the parallel /distributed nature of thetechnique, which enforces the lack of a
central point of messaging and coordination.This reduces the risk of flash congestion and allows the technique
to handle deadlockinvolving many blocked agents.
The load is spreadacross many host environments, if the network load of the presented solution is considered as
a whole.
Additionally, networkorganization independence is guaranteed through a clear separation of mobile agents from
the mechanics of routing and migration, the agents are not aware of the number of hosts in the mobile agent
system and do not have explicit knowledge of resource locations. It should be noted that even though the
solution is network independent, the topology is static once the algorithm begins. If the topology is allowed to
change, a dynarnic topology update protocol must execute in the background to provide new routes to the hosts.
A common use of mobile agents is to encapsulate complex protocols and interactions [24]. This technique uses
the combination of shadow agents and deadlock detection agents to encapsulate a complex series of probes,
interactions and acknowledgments.
Additionally. these protocols are isolated from the consumer agent; therefore, can be easily modified and
upgraded. The deadlock detection phase could be implemented as remote procedure calls or another fom of
distributed programming, but would require network organization assumptions and the continual exchange of
messages. Detector and shadow agents cary out their deadlock detection tasks in an asynchronous manner. They
coordinate their efforts in defined ways, but are able to keep working without regular contact and do not require
constant supervision while carrying out tasks. This asynchronous and autonomous operation contributes to the
previously discussed fault tolerance.. For examplethe combination of consumer, shadow and detector agents
2. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 2
adapt to their environment tosolve deadlock situations, shadow agents react independently to changingnetwork
conditions and the state of their target consumer agent to initiate the deadlock
detection processing. Similarly the separation of the implernentation from facilities specific to a particular
mobile agentsystem or operating system detector agents can react to network failures or therequests of other
agents while gathering global wait-for graph information.
allows the solution to execute in a heterogeneousenvironment. Moreover the separation of replica and detector
agents from the consuming agents they monitor, allows them to be adapted to many different environments
without (or with minor) modifications to the entities performing the work.
III. Deadlock Detection Pseudocode
This pseudo code provides a context for the solution and insightinto the responsibilities and activities
performed by each entity. This section presents pseudo-code of each element that plays a significant role in
thepresented solution.
First, pseudo-code forthe consumer, shadow and detection agent is presented. Finally, code for the mobileagent
environment is presented.
3.1 Agent A
public class AgentA extends MobileAgent
{
public AgentA( String int heartbeat )
{
state = IDLE;
}
public void run()
{
while( true )
{
messages = getMessagesFromBlackboard( agentId );
processMessages( messages );
switch ( state )
{
case IDLE:
case WAITING:
// do nothing
break;
case MOVING:
if( currentHost is not targetEnvironment )
{
postRouteRequest( targetEnvironment ) ;
{
else
{
// Made it!
state = IDLE;
{
break;
{
sleep ( heartbeatDelay ) ;
{
private Vector processMessages( messages )
{
while ( more Messages )
if message was accepted remove from list;
return unprocessed messages;
{
3. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 3
private boolean processMessaget BlackboardEntry msg )
if ( message equals amove" AND state is IDLE )
{
targetEnvironment = get terget from message;
state = MOVING;
/ / lets ask our current environment to route us
postBlackboardMsg( "route”,
targetEnvironment ) ;
{
else if( message eqyals "lockw AND
state is IDLE OR WAITING )
{
extract lock type and resource from message ;
lockResource( lockType, resource );
if( message equals
{
ext ract resource f rom message;
unlockResource( resource );
{
{// locked. the AgentEnvironment should have created
// a shadow agent and placed us under it's watchful
// eye.
// Special case. if the resource we just locked was
// the same as a resource we were blocked on, it
// means the Environment notified us and we should
// move into the idle state
AND state
private void lockResource( String locktype,
String resourceName )
{
if( lockType equals “exclusive” )
{
get resource manager;
if resourceManager.lockResource( resourceName,
lockType ) succeeds
{
if( resourceName equals blockedResourceName )
state = IDLE;
{
{
else
/ / locked failed .. time to block
state = WAITING;
blockedResourceName = resourceName;
// Notify our gracious host ...
postBlackboardMessage(“agentBlock”, resourceName );
private void unlockResource( String resourceName )
{
get Resource Manager
resourceManager.unlockResource(resourceName);
}}
3.2 Agent B
public class ReplicaAgent extends MobileAgent
(
public ReplicaAgent ( String id, String targetAgent, int heartbeat )
4. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 4
{
state = IDLE;
targetAgentName = targetAgent;
reset locked resource list
reset detection info table
reset detector agent
{
public void run()
while( true )
{
// Check to see if Our detector is dead
checkForDetectorDeath () ;
if ( state is not MOVING )
{
messages = getMessagesFrom BlackBoard();
messages =processMessages(messages);
{
switch ( state
{
case IDLE:
break;
get~messagesFromBlackboard();
processMessages( messages );
case MOVING:
if( currentHost is not targetEnviroment ) )
{
routeRequest( targetEnvironment );
{
else
{
state = IDLE;
}
break;
}
sleep ( heartbeatDelay ;
}
}
private Vector processMessages( messages )
{
while( more Messages )
{
processMessage( currentMessage );
if message processed remove from list;
{
return unprocessed messages;
{
private boolean processMessage( BlackboardEntry msg )
{
Vector attachments = msg.getAttachments();
if( message equals "move" AND state is IDLE )
{
String target = extract target from message;
targetEnvironment = target;
state = MOVfNG;
{
else if( message equals “addLock” )
{
5. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 5
addlock( attachment #l,
attachent #2,
attachment #3,
attachent #4 );
retVal = true;
else if( message equals “removeLock” )
{
removelock ( attachment #I, attachment #2 ) ;
state = IDLE;
retVal = true;
{
else if( message equals ablockedm ) )
{
blockedTarget( attachment #l 1;
retVal = true;
{
else if( messge equals wunblockedw ) )
{
unblockedTarget ( ) ;
retVal = true;
{
else if( message equals “deadlockReport” ) )
{
processReturnOfDetector( attachment#1, attachment #2, attachment #3 ) ;
retVal = true;
{
else if( message equals “deadlockInfoRequest” ) 1
retVal = true;
else
{
// We dontt understand this message, but our superclass
// might have some good ideas ...
retVal = super.processMessage( msg );
{
{
public void exit ()
{
if( detector )
{
Remove ( detector from host environment);
{
super. exit () ;
private void addlock( String environment,String resource,String owner,int priority1 )
(// Check to see if we contain this lock already)
if( resource not already locked )
{
new r e s o u r c e I n f o ( env, res, owner, p r i o r i t y1 ) ;
s t o r e resourceInfo i n locked resource list
}
}
Private void removeLock( S t r i n g env1, S t r i n g resourceName1 )
{
i f ( resourceName1 is i n locked resource list )
{
remove resource from locked resource list
{
{
privatevoid unblockedTarget1 ( )
6. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 6
{
// unblocked target
s t a t e = IDLE;
{
private void blockedTarget( Agent blockedAgent,
S t r i n g (resourceName )
{
State1= TARGETBLOCKED;
owner = query host environment for owner of resource;
blockedResourceName = resourceName;
localAgents = query host environment about l o c a l agents;
i f ( owner inlocalAgents )
Table .put ( targetAgentName, new DetectionInfo( .. ) );
// 1) Create agent
Detector1 = new DetectorAgentO;
// 2) Put the agent
postBlackboardMsg( d e t e c t o r );
// 3) agent start
postBlacKboardMsg( buildDetectorLocks () ) ;
numOfDetectionStarts++;
1astDetectionStartTirne = current time ;
{
{
p r i v a t e void processReturnOfDetector( DetectorAgent agent )
(// Our d e t e c t o r is back, let's see what's new)
switch( state )
{
case TARGET-BLOCKED :
i f ( checkForDeadock( agent.getDetectionTables0 ) )
(
// We have a deadlock, b e t t e r resolve it.
resolveDeadlock( agent ) ;
reset detectionInfoTable;
{
case IDLE:
// Our t a r g e t unblocked i f t h i s is t h e case ...
// let's k i l l t h e d e t e c t o r ...
removeDetector () ;
(
// The state w i l l have changed t o waiting f o r unlock
// i f t h e deadlock check succeeded
s w i t c h ( state )
(
case TARGET-BLOCKED:
// reset and restart t h e d e t e c t o r
postBlackboardMsg( " s t a r t " , buildDetectorLocks() ); numOfDetectionStarts++; )
1astDetectionStartTime = c u r r e n t t i m e ;
break;
case WAITING,FOR~UNLOCK:
// W e are breaking the deadlock don*t s t a r t
// any new p r o c e s s i n g .
break;
{
{
p r i v a t e boolean checkForDeadlock( Vector detectionTableList )
{
/ / - If we f i n d t h e resource t h a t our master is blocked
// on i n t h e r e t u r n e d lock list ... we have a
7. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 7
// deadlock
/ / - If we don't f i n d t h e resource, j u s t add the locks
// to our g l o b a l list.
// L e t ' s go through t h e returned t a b l e .. e n t r y by e n t r y
// and add it t o our d e t e c t i o n t a b l e .
while ( d e t e c t i o n T a b l e L i s t has more e n t r i e s )
{
d e t e c t ionTable = c u r r e n t d e t e c t i o n t a b l e ;
a g e n t L i s t = get agent list from d e t e c t i o n Ta b l e ;
while( a g e n t L i s t has more e n t r i e s )
{
d e t e c t i o n I n f o = d e t e c t i o n i n f o from c u r r e n t t a b l e
r e l a t e d t o c u r r e n t agent;
add d e t e c t i o n I n f o t o g l o b a l table;
i f ( c u r r e n t agent narne e q u a l s targetAgentName )
{
deadlockEound = True;
{
{
{
r e t u r n deadlockFound;
{
p r i v a t e void resolveDeadlock( DetectorAgent agent )
{
// Build a list of t h e resources involved i n t h e cycle ...
if( s t a t e is TARGETBLOCKED )
{
// So we found a deadlock .. t h e question is are
// we t h e one to break it ?
// Find t h e Cycle ...
cycleList = findElementsInCycle( detectionInfoTable ) ;
while( cycleList has more elements )
{
/ / f i n d r e s o u r c e w i t h lowest p r i o r i t y
1ockToBreak = lowest p r i o r i t y resource;
{
i f ( 1ockToBreak equals resource we are blocked on )
{
// L e t ' s send our d e t e c t o r off on h i s mission
// t o unlock t h e resource ..
// But f i r s t we b e t t e r set him up with the
// correct information t o survive t h e
// d e s t i n a t i o n ResourceManager*~ interogation.
// 3) s t a r t t h e d e t e c t o r agent
postBlackboardMsg( "unlock",
LockToBreak ) ;
s t a t e = WAITING-FOR-UNLOCK;
{
{
private Vector findcycle ( Hashtable detectionInfoTable )
{
Vector cycleVector = new V e c t o r ( ) ;
cyclevector add( resource we are blocked on ) ;
info = find entry i n detectionInfoTable whose primary
lock is t h e c u r r e n t resource;
// Loop u n t i l we f i n d t h e e n t r y f o r our agent
while( c u r r e n t e n t r y ' s agent name i s n r t equal t o
our t a r g e t agent )
{
8. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 8
// Walk up the tree t o t h e parent node.
i n f o = f i n d entry i n detectionInfoTable whose primary
lock is the c u r r e n t resource;
cyclevector add( info );
{
return cyclevector;
{
private void checkForDetectorDeath()
{
Date currentTime = current time;
BlackboardEntry msg;
if( num0fDetectionStarts >O AND ( state is TARGETBLOCKED OR state is WAITING-FOR,UNLOCK ) {
{
// We have a dead detector
// 1) Create a detector agent
detector = new DetectorAgent 0;
// 2) Inject the agent
postBlackboardMsg ( "inject”, detector ) ;
if( state is TARGET-BLOCKED )
{
// 3) start the agent
postBlackboardMsg( “start", buildDetectorLocks() );
{
else if( state is WAITING-FOR-UNLOCK )
resolveDeadlock( detector.getIdentifier());
detector.getToken() );
{
1astDetectionStartTime = current time;
}
}
}
}
3.3 Agent C
public class AgentC extends MobileAgent
{
public AgentC( String id, int heartbeat,
ShadowAgent parent )
{
reset detection Table List;
reset resources To Vist;
reset targetEnvironment;
reset targetResource;
state = IDLE;
set parent = parent;
{
public void run ()
{
while ( true )
{
if ( state is not MOVING )
{
messages = getMessagesfromBlackboard () ;
messages = processMessages( messages );
9. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 9
}
switch ( state)
getMessagesfromBlackboard () ;
processMessages( messages );
(
case IDLE:
break;
case MOVING:
if( currentHost is not targetEnvironment ) )
{
else
{
state = CHECKING-LOCKS;
{
break;
if( current Host is not targetEnvironment )
{
if( host.unlockResource( targetResource, agentToNotify )
{
( state = RETURN-FROM-UNLOCK);
{
else
state = IDLE;
{
case RETURNRNFROM, the LOCK:
if( currentHost is not startingEnvironment )
(
Shadow,removeLock( targetEnvironment, targetResource );
state = IDLE;
{
case DONE:
if( currenthost is not startingEnvironment )
(
state = REPORT-RESULTS;
)
case CHECKING-LOCKS:
checklocks ( ) ;
break;
case REPORT-RESULTS:
postMessageToBlackboard( shadowÀgent, deadlockInfo );
break;
}
sleep( heartbeatDelay ) ;
private Vector processMessages( messages )
{
while ( more Messages )
{
processMessage( currentMessage );
if message processed remove from list;
{
return unprocessed messages;
{
private boolean processMessage( BlackboardEntry rnsg )
{
attachments = msg,getAttachments();
if( message equals “startW ”)
{
startDetection ( (Vector) attachment ;
10. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 10
retVal = true;
else if( message equals "unlock" ) {
(
startunlock ( attachment #1,
attachment #2,
attachent #3 ) ;
retVal = true;
message ;
deadlockRequestResponse ( attachment #l ) ;
retVal = true;
{
else
{
super.processMessage( msg 1;
{
return retVal;
{
private void startDetection( resources )
( setVisitlist( resources ));
targetEnvironment( entry.getEnvlame() };
targetResource ( entry. getResName () ) ;
// Reset the table ...
detectionTablelist( new VectorO 1;
start ingEnvironment ( getHost () . getName () ) ;
state ( MOVING ) ;
{
private void checklocks ()
{
while( shadowlist has more elements )
count expected responses;
{
if( expected responses >0)
(
state = WAITING-FOR-RESPONSE;
{
else
{
findNewTarget () ;
}
private void deadlockRequestResponse( newTable )
{
shadowList = query current host for agents blocked on
the resource we are visiting;
expectedResponses--;
detectionTablelist.add( newTable );
if( al1 expectertesponses received )
{
findNewTarget 0 ;
}
}
private void findNewTarget0
{
if( more resource to visit )
get next resource;
// Let's get started ...
targetEnvironment = entry.getEnvName();
targetResource = entry.getResName();
{
else
11. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 11
{
// Tirne to head home ..
targetEnvironment = startingEnvironment;
state = DONE;
}
}
}
Host Environment
public class AgentEnvironment extends Thread
public AgentEnvironment( String name, int id, int 1oggingLevel )
{
resourceManager = new ResourceManagerO;
topologyManager = new TopologyManager();
reset agentTable;
reset messageBoard;
reset blockedAgentTable;
globalIdentifier = id;
state = PROCESSING;
}
// Global Identifier can be used as the priority
public void run ()
(
while( true )
{
checkEorMessages () ;
updateRoutes () ;
sleep( 1000 );
}
)
public synchronized void agentEnter( Agent newAgent )
{
if( state is PROCESSING )
{
agentTable.put( newAgent ) ;
newAgent.enter0;
}
}
private synchronized void agentExit( Agent 1eavlngAgent
{
if ( state is PROCESSING )
(
1eavingAgent. exit ( ) ;
)
}
private void agentBlock( Agent blockedAgent, String resourceName)
(
// Look for a replica agent ...
replica= find replica agent for blockedAgent;
if ( shadow found )
{
...
postBlackboardMsg( "blockedAgent”, resourceName ) ;
private void checkForMessages()
12. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 12
{
get messages from blackboard;
while ( more messages)
{
processMessage( current message );
}
}
private void processMessage( BlackboardEntry msg
attachments = rnsg.getAttachments0;
if( message equals “pause” ) )
state( PAUSED ) ;
else if( message equals wresumen ) )
(
state( PROCESSING ) ;
message equals
(
agentBlock ( msg . getAgent Id () , attachment t1 ,attachment t2);
if( message equals 0)
{
routeRequest(msg.getAgentId(), attachment # l ,attachment #2);
{
else if (( message equals *inject)
this.injectAgent( attachment)
else if( message equals "remove" ) )
{
removeAgent ( attachrnent #l ) ;
}
}
private boolean routeRequest( String movingAgent, EnvironmentToken token,
String targetEnv )
{
if( state() is PROCESSING )
{
movingAgent = get moving agent from agent tables;
(
return true;
)
if( check for shadow information in the token )
shadowAgentId = get shadow name from token;
If ( check for shadow agent in agent tables )
{
shadow = get shadow agent from agent tables;
}
else
{
retVal = f alse;
}
}
if ( retVal is true )
(
AgentEnvironment env = request route from
topologyManager;
if ( env is not nuil )
(
suspendAgent( movingAgent );
agentExit( movingAgent 1;
agentlable () . remove ( movingAgent Id ) ;
13. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 13
env.agentEnter( movingAgent );
if ( shadow is not nul1 )
{
suspendAgent ( shadow ) ;
agentExit( shadow );
agentlable () . remove ( shadow ) ;
env.agentEnter ( shadow ) ;
{
Else
{
retVal = false;
}
}
}
else
(
retVal = false;
)
r e t u r n retVal;
1
public Vector getBlockedAgents( String resourceName )
I
return list of agents blocked on resourceName;
{
public synchronized void postMessage( String agentId,
String message )
{
add message for agentId to the message lists;
{
public synchronized Enurneration getMessages( String agentId )
{
return messages for agentId;
{
private injectAgent( Agent newAgent )
{
newAgent . start () ;
agentTable.put( newAgent );
private void removeAgent( String agentName 1
}
agentTable.remove( agentName ) ;
}
private void updateRoutes()
}}}
IV. Conclusion
The presented algorithm is designedwith the unique properties and challenges of mobile agent systems as a
motivating factor. As a result, the solution has some of the properties and features that are comrnonly found in
mobile agent implementations. This section lists the properties of the proposed algorithm which make it a
mobile agent solution. The solution is network organization independent. The algorithm makes no assumptions
concerning network topology (i.e., ring). the numberof hosts or node locations to support the solution. Resource-
based routing and tracking of the nodes visited by a particular agent elirninate the need for explicit topology
knowledge
References:
14. Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Manuscript id. 626565782 www.ijstre.com Page 14
[1] Walsh, T., Paciorek, N. and Wong, D. "Security and Reliability inConcordia.", Appeared in Mobility: Processes,
Computer and Agents, Addison-Wesley, Reading, 1999.
[2] Mitsubishi Electric Information Technology Center. "Concordia - Java Mobile Agent Technology."
World Wide Web, January 2000, http://www.meitcacom/HSUProjects/Concordia/
[3] University ofStuttgart. "TheHomeof the Mole."WorldWideWeb,September 2000, httJ)://mole.infonnatik.uni-stuttgart.de/
[4] University of Tromse and Cornell University. "TACOMA - Operating System Support For Mobile Agents."
World Wide Web. August 1999. http://www.tacoma.cs.uit.no/
[5] ObjectSpace Inc. "ObjectSpace Voyager Core Package Technical Overview.", Appeared in Mobility: Processes,
Computer and Agents, Addison-Wesley, Reading, 1999.
[6] ObjectSpace Inc. "ObjectSpace Product Information: Voyager." WorldWideWeb. September
2000.htm://www.objectspace.com/products/voyager/
[7] Fachbereich lnfonnatik and Johann-Wolfgang-Goethe-Universitaet Frankfurt. "ffMain". World Wide Web.
February 2000. htn>://www.tm. informatik.uni• frankfurt.de/Projekte/MN
[8] University ofGeneva. "TheMessenger Proejct." WorldWideWeb.December 1997. http://cui.unige.ch/tios/msgr/
[9] General Magic, Inc. "Odyssey". World Wide Web. November 2000. http://www.genmagic.com/
[10] University ofModena. "MARS(Mobile Agent Reactive Space)." WorldWideWeb. October
2000.http://sirio.dsi.unimo.it/MOON/MARS/ index.html
[11] CardelliyL.ltMobileComputational Ambients." WorldWide Web. September 2000. http://www.luca.demon.co.uk/
Ambit/Ambit.html
[12] TU Berlin andUniversity ofBologna. "ThePageSpace Effort." WorldWideWeb. January1997.http://flp.cs.tu-berlin.de/pagespc/
[13] Flanagan, D.JavainaNutshell.O'Reilly &Associates, Inc.,Cambridge, 1996.
[14] Horstmann, C. and Cornell, G. Core Java Volume I - Fundamentals. Sun MicrosystemsPress,California. 1999.
[15] Sun Microsystems Inc. "Java 2Platform vl.2.2 API Specification." WorldWide Web.September
1999.htnz:l/java.sun.comlproducts/jdk/1.2/docs/ api/index.htrnl