Mobile-C Based Agent System for Detecting Improper Computer Usage at Computer Laboratories

نویسنده

  • ZhiXin Tie
چکیده

Mobile agent based computing is one of the powerful technologies for the development of distributed complex systems. There is little research regarding the effectiveness of mobile agent based detecting of improper computer usage at computer laboratories. This paper presents a Mobile-C Based Agent System (MCBAS) for Detecting Improper Computer Usage at Computer Laboratories. Based on the Mobile-C library, the MABAS supports the dynamic sending and executing of control command, dynamic data exchange, and dynamic deployment of mobile code in C/C++, and thus can detect improper computer usage conveniently and efficiently. The experiment was conducted at number of computer laboratories in a university computer center to detect improper usage of the computer workstations, such as playing computer games. The experiment shows that the mobile agent based monitoring system is an effective method for detecting and interacting with students playing computer games at public computer laboratories.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

DC-DC CONVERTER WITH FUZZY CONTROLLER FOR SOLAR CELL APPLICATIONS ON MOBILE ROBOTS

Emerging technologies increase the needs on self efficient mobile robotic applications that bring a new concern of sustainable and continuous power supply for the robotic platforms. This paper covers the various techniques and technologies used to design a solar powered robot, exploring the currently available products, software and limitations to this application. The main aim is to integrate ...

متن کامل

MEASURING SOFTWARE PROCESSES PERFORMANCE BASED ON FUZZY MULTI AGENT MEASUREMENTS

The present article discusses and presents a new and comprehensive approachaimed at measuring the maturity and quality of software processes. This method has beendesigned on the basis of the Software Capability Maturity Model (SW-CMM) and theMulti-level Fuzzy Inference Model and is used as a measurement and analysis tool. Among themost important characteristics of this method one can mention si...

متن کامل

Development of a Model for Predicting Heart Attack Based on Fog Computing

Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JSW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013