scholarly journals Remote Method Invocation and Mobile Agent: A Comparative Analysis

10.28945/3033 ◽  
2006 ◽  
Author(s):  
G. Adesola Aderounmu ◽  
Bosede Oyatokun ◽  
Matthew Adigun

This paper presents a comparative analysis of Remote Method Invocation (RMI) and Mobile Agent (MA) paradigm used to implement the information storage and retrieval system in a distributed computing environment. Simulation program was developed to measure the performance of MA and RMI using object oriented programming language (the following parameters: search time, fault tolerance and invocation cost. We used search time, fault tolerance and invocation cost as performance parameters in this research work. Experimental results showed that Mobile Agent paradigm offers a superior performance compared to RMI paradigm, offers fast computational speed; procure lower invocation cost by making local invocations instead of remote invocations over the network, thereby reducing network bandwidth. Finally MA has a better fault tolerance than the RMI. With a probability of failure pr = 0.1, mobile agent degrades gracefully.


2016 ◽  
Vol 1 (1) ◽  
pp. 50-53 ◽  
Author(s):  
Varun Sharma ◽  
Narpat Singh

In the recent research work, the handwritten signature is a suitable field to detection of valid signature from different environment such online signature and offline signature. In early research work, a lot of unauthorized person put the signature and theft the data in illegal manner from organization or industries. So we have to need identify, the right person on the basis of various parameters that can be detected. In this paper, we have proposed two methods namely LDA and Neural Network for the offline signature from the scan signature image. For efficient research, we have focused the comparative analysis in terms of FRR, SSIM, MSE, and PSNR. These parameters are compared with the early work and the recent work. Our proposed work is more effective and provides the suitable result through our method which leads to existing work. Our method will help to find legal signature of authorized use for security and avoid illegal work.



Author(s):  
Chenggang Wu ◽  
Shaohui Liu ◽  
Bo Wang ◽  
Zhongzhi Shi ◽  
Hua Gu


2011 ◽  
Vol 84-85 ◽  
pp. 410-414
Author(s):  
Wei He ◽  
Jie Xiong

Based on the RFID (Radio Frequency Identification Devices), this paper presents new research work of signal timing intersection in the aspects of the key points of design, the main parameter and timing methods. Finally, the intersection of signal timing of fuzzy control method based on RFID is proposed through comparative analysis of the intersection of several traditional signal timing methods.



2020 ◽  
Author(s):  
Rui Miguel ◽  
José Lucas ◽  
Sónia Melo ◽  
Madalena Pereira ◽  
Clara Fernandes ◽  
...  

This research work aims to study the influence of the fabrics in the wear performance of clothing. For this, an experimental work was developed with two fabric samples having the same weight/m2, one single and another double, and a jacket prototype. Through a comparative analysis of the mechanical properties, very interesting results was obtained in the evaluation and characterization of the two fabrics performance in designing the same jacket, namely the drape and the corresponded aesthetic fabrics behaviours during wear. The structural characteristics and mechanical properties of each fabric were introduced into Marvelous Designer Version 8 software to simulate the virtual draping of fabrics in a skirt. The analysis of the drape profile of each fabric given by the software and the drape of the real fabrics evaluated in laboratory indicates, coherently, that the double fabric falls less than the single, but in a more harmonious way, what evidence the close links between technology and design of fashion products. Keywords: Fabrics design, Fabrics mechanical properties, Clothing drape, Real and simulated drape



2018 ◽  
Vol 7 (2.27) ◽  
pp. 161
Author(s):  
Pratiksha Sharma ◽  
Er. Arshpreet Kaur

Detection of bad smells refers to any indication in the program code of a execution that perhaps designate a issue, maintain the software and software evolution. Code Smell detection is a main challenging for software developers and their informal classification direct to the designing of various smell detection methods and software tools. It appraises 4 code smell detection tool in software like as a in Fusion, JDeodorant, PMD and Jspirit. In this research proposes a method for detection the bad code smells in software is called as code smell. Bad smell detection in software, OOSMs are used to identify the Source Code whereby Plug-in were implemented for code detection in which position of program initial code the bad smell appeared so that software refactoring can then acquire position. Classified the code smell, as a type of codes: long method, PIH, LPL, LC, SS and GOD class etc. Detection of the code smell and as a result applying the correct detection phases when require is significant to enhance the Quality of the code or program. The various tool has been proposed for detection of the code smell each one featured by particular properties. The main objective of this research work described our proposed method on using various tools for code smell detection. We find the major differences between them and dissimilar consequences we attained. The major drawback of current research work is that it focuses on one particular language which makes them restricted to one kind of programs only. These tools fail to detect the smelly code if any kind of change in environment is encountered. The base paper compares the most popular code smell detection tools on basis of various factors like accuracy, False Positive Rate etc. which gives a clear picture of functionality these tools possess. In this paper, a unique technique is designed to identify CSs. For this purpose, various object-oriented programming (OOPs)-based-metrics with their maintainability index are used. Further, code refactoring and optimization technique are applied to obtain low maintainability Index. Finally, the proposed scheme is evaluated to achieve satisfactory results. The results of the BFOA test defined that the lazy class caused framework defects in DLS, DR, and SE. However, the LPL caused no framework defects what so ever. The consequences of the connection rules test searched that the LCCS (Lazy Class Code Smell) caused structured defects in DE and DLS, which corresponded to the consequences of the BFOA test. In this research work, a proposed method is designed to verify the code smell. For this purpose, different OOPs based Software Metrics with their MI (Maintainability Index) are utilized. Further Code refactoring and optimization method id applied to attained the less maintainability index and evaluated to achieved satisfactory results.    



Author(s):  
Aisha Yrgyzbaykyzy Zhubatkhan ◽  
Aigerim Mussina ◽  
Sanzhar Serikovich Aubakirov

In our research work, we study transport card security issues. One of the questions of our study is its relevance in the world and particular in Kazakhstan. Therefore, in this work, we conducted research on the market of transport cards in the world and Kazakhstan. As part of the study, we searched for answers to the following questions: what technologies are used to accept payment by transport cards, in which countries the electronic ticketing system has been introduced, in which cities of Kazakhstan have electronic ticketing systems been implemented, what technologies are used in Kazakhstan. As a result, we showed that the popularity of using NFC payment in the world and in Kazakhstan is growing. We also analyzed the existing electronic ticketing systems in Kazakhstan, made a comparative analysis and got a comparative table.



2008 ◽  
pp. 474-487
Author(s):  
Chyi-Ren Dow ◽  
Yi-Hsung Li ◽  
Jin-Yu Bai

This work designs and implements a virtual digital signal processing laboratory, VDSPL. VDSPL consists of four parts: mobile agent execution environments, mobile agents, DSP development software, and DSP experimental platforms. The network capability of VDSPL is created by using mobile agent and wrapper techniques without modifying the source code of the original programs. VDSPL provides human-human and human-computer interaction for students and teachers, and it can also lighten the loading of teachers, increase the learning result of students, and improve the usage of network bandwidth. A prototype of VDSPL has been implemented by using the IBM Aglet system and Java Native Interface for DSP experimental platforms. Also, experimental results demonstrate that our system has received many positive feedbacks from both students and teachers.



2020 ◽  
Vol 14 (6) ◽  
pp. 1351-1380
Author(s):  
Sakthivel V.P. ◽  
Suman M. ◽  
Sathya P.D.

Purpose Economic load dispatch (ELD) is one of the crucial optimization problems in power system planning and operation. The ELD problem with valve point loading (VPL) and multi-fuel options (MFO) is defined as a non-smooth and non-convex optimization problem with equality and inequality constraints, which obliges an efficient heuristic strategy to be addressed. The purpose of this study is to present a new and powerful heuristic optimization technique (HOT) named as squirrel search algorithm (SSA) to solve non-convex ELD problems of large-scale power plants. Design/methodology/approach The suggested SSA approach is aimed to minimize the total fuel cost consumption of power plant considering their generation values as decision variables while satisfying the problem constraints. It confers a solution to the ELD issue by anchoring with foraging behavior of squirrels based on the dynamic jumping and gliding strategies. Furthermore, a heuristic approach and selection rules are used in SSA to handle the constraints appropriately. Findings Empirical results authenticate the superior performance of SSA technique by validating on four different large-scale systems. Comparing SSA with other HOTs, numerical results depict its proficiencies with high-qualitative solution and by its excellent computational efficiency to solve the ELD problems with non-smooth fuel cost function addressing the VPL and MFO. Moreover, the non-parametric tests prove the robustness and efficacy of the suggested SSA and demonstrate that it can be used as a competent optimizer for solving the real-world large-scale non-convex ELD problems. Practical implications This study has compared various HOTs to determine optimal generation scheduling for large-scale ELD problems. Consequently, its comparative analysis will be beneficial to power engineers for accurate generation planning. Originality/value To the best of the authors’ knowledge, this manuscript is the first research work of using SSA approach for solving ELD problems. Consequently, the solution to this problem configures the key contribution of this paper.



Sign in / Sign up

Export Citation Format

Share Document