نتایج جستجو برای: protection agent

تعداد نتایج: 428050  

Journal: :IJMC 2012
Chia-Hui Wei Min-Shiang Hwang Augustin Yeh-Hao Chin

In the past researches, most of the authentication protocols were designed in an effort to solve the RFID security and privacy problem regarding the encrypted communication between the database and readers, and readers and tags. Based on the proposal of mobile agent device for RFID privacy protection (MARP), some security problems have been exposed. Later on, protecting the privacy with a mobil...

2002
A. Perini

Integrated Protection (IP) in agriculture consists of a set of practices aimed at favoring the set up of a development model characterized by a reduced environmental impact. The application of IP practices in plant disease management by growers and agronomists requires both specialistic skills, historical data and information on chemicals and on low impact techniques for pest management. These ...

2014
Attacks L. Devi V. Santhiya

There are chances like a data distributor had given his sensitive data to a set of trusted agents. These agents can be called as third parties. There are chances that some of the data is leaked and found in an unauthorized place. This situation is called IDS. In existing case, the method called watermarking is using to identify the leakage. Or also uses the technique like injecting fake data th...

Journal: :Computer Communications 2006
Lotfi Benachenhou Samuel Pierre

Many areas such as electronic commerce, network management and information retrieval can benefit from the application of mobile agents technologies. The exploitation of mobile agents offers several advantages such as reduction of network latency, asynchronous execution, fault-tolerant behavior. However, a wider use of mobile agents is currently limited by the lack of a comprehensive security fr...

2001
Oguz Kaan Onbilger Richard Newman Randy Chow

In this extended abstract paper we address the problem of protecting mobile agents from possibly malicious hosts they could visit in an open e-commerce environment, the Internet. The novel approach presented is to split up a task that otherwise could be employed by a single agent into a group of agents, which communicate and cooperate by executing on different hosts. The approach has its roots ...

2013
Chengxi Liu Zakir Hussain Zhe Chen Claus Leth Bak

The increasing penetration of dispersed generation (DG) brings challenges to conventional protection approaches of distribution system, mainly due to bi-directional power flow and variable fault current contribution from different generation technology-based DG units. Moreover, the trend of allowing islanded operation of distribution systems necessitates the adoption of adaptive protection meth...

2008
David E. Lenz David T. Yeung J. Richard Smith Richard E. Sweeney Lucille A. Lumley Douglas M. Cerasoli

The use of a human protein such as plasma-derived butyrylcholinesterase (huBuChE) to neutralize the toxic effects of nerve agents in vivo has previously been shown to provide both survival in guinea pigs and nonhuman primates and protection against decreased cognitive function in guinea pigs following exposure to a cumulative challenge of 5.5 LD50 of soman. Subsequently, a recombinant form of h...

Journal: :CoRR 2013
Jin Shang Nengling Tai Qi Liu

This paper introduces the basic structure of multi-agent based protection system for distribution system with DGs. The entire system consists of intelligent agents and communication system. Intelligent agents can be divided into three layers, the bottom layer, the middle layer and the upper layer. The design of the agent in different layer is analyzed in detail. Communication system is the brid...

Journal: :modares journal of medical sciences: pathobiology 2006
daryoush ghaffari siavash tirgari alieh moosavi ivanaki

the family of staphylinidae (rove beetles) includes 40000 species and has a world-wide distribution . many species of paederus have been known for a long time as the causative agent of linear dermatitis. paederus beetles are attracted to artificial lights in the evening during the hot and humid summer nights. whenever they are crashed or smeared on the skin they release their toxin called pede...

2003
Michelangelo Giansiracusa

Autonomous mobile agents have been purported as a promising new alternative to traditional distributed computing approaches, bringing many advantageous features. Notwithstanding this, mobile agent technology has yet to see wide deployment in open networks like the Internet. The lack of interoperability between agent systems has impaired such progress. Moreover, fears of security breaches by mal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید