• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Du Ronghua, Yao Gang, Wu Quanyuan. Application of an Ant Colony Algorithm in Migration of Mobile Agent[J]. Journal of Computer Research and Development, 2007, 44(2): 282-287.
Citation: Du Ronghua, Yao Gang, Wu Quanyuan. Application of an Ant Colony Algorithm in Migration of Mobile Agent[J]. Journal of Computer Research and Development, 2007, 44(2): 282-287.

Application of an Ant Colony Algorithm in Migration of Mobile Agent

More Information
  • Published Date: February 14, 2007
  • Mobile agent provides a novel paradigm for distributed computing. It has the potential to offer a single, general framework in which a wide range of distributed systems can be implemented efficiently, easily and robustly. The traveling agent problem is a complex combinatorial optimization problem, which solves the problem of planning out an optimal migration path according to the tasks and other restrictions when agents migrate to several hosts. Ant colony algorithm is a new evolutionary algorithm and extremely suit to solve the travelling agent problem, which has the characteristic of parallelism, positive feedback and heuristic search. To avoid the limitation of ant colony algorithm such as stagnation like other evolutionary algorithm, an improved ant colony algorithm is introduced to solve the travelling agent problem by modifying pheromone updating strategy, and a self-adaptive pheromone evaporation rate is proposed, which can accelerate the convergence rate and improve the ability of searching an optimum solution, so mobile agents can accomplish the migration task with high efficiency and short time. The results of contrastive experiments show that the algorithm is superior to other related methods both on the quality of solution and on the convergence rate.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (528) PDF downloads (537) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return