scholarly journals AN ANALYSIS OF TRANSACTIONS IN E-PAYMENT SYSTEM USING MOBILE AGENTS

2021 ◽  
Vol 19 (1) ◽  
pp. 40-55
Author(s):  
O. R. VINCENT

Commercial interactions between merchants and customers pose a significant concern as they are associated with a large volume of data and complex information, especially when there is a need for switching requirements. This paper presents an agent-based analysis of e-payment transactions with the switching operations. The model adopts an inter-bank transaction network and consists of a terminal point of sale (POI) and three essential players in e-payment: customer, bank (merchant), and the Switch. This study analyses the various payment interactions using agent technology. The agent coordinates movement while the negotiation protocol serves as an internal control of the payment agreements, while the interactive hosts are the platforms that determine the status of transactions. Each agent host is equipped with a Certification Authority (CA) to secure communication between the merchant and the customer. Different transactions that agents could make are examined with formal descriptions. The implementation is achieved in Jade and compares with the object serialization mechanism. The simulation results show higher quality adaptation of agent systems and evidence of agentisation of e-transaction with Switch.      

Author(s):  
Qi Wei ◽  
Ahmed Patel

Mobile agents raise security issues such as the protection of platform/host that runs the mobile agent against attacks which can harm or use its resources without permission, and another is the need for protection to guard mobile agents and their supporting systems against the malicious attacks from a variety of intervening sources that might alter information it carries and processes when it visits the hosts in its transactions itineraries. In this article, the authors propose a framework which includes safe, secure, trusted and auditable services, as well as forensic mechanisms to provide audit trails for digital evidence of transactions and protection against illegal activities. The proposed framework and protocols provide a secure communication for mobile agents when they move to different security environments to deal with e-marketplace activities such as search information, negotiation and payments. This article is concluded by highlighting and discussing further research work to build viable systems.


Author(s):  
Paul Humphreys

Paul Humphreys pioneered philosophical investigations into the methodological revolution begun by computer simulations. He has also made important contributions to the contemporary literature on emergence by developing the fusion account of diachronic emergence and its generalization, transformational emergence. He is the discoverer of what has come to be called “Humphreys” Paradox in probability theory and has also made influential contributions to the literature on probabilistic causality and scientific explanation. This collection contains fourteen of his previously published papers on topics ranging from numerical experiments to the status of scientific metaphysics. There is also and a previously unpublished paper on social dynamics. The volume is divided into four parts on, respectively, computational science, emergence, probability, and general philosophy of science. The first part contains the seminal 1990 paper on computer simulations, with three other papers arguing that these new methods cannot be accounted for by traditional methodological approaches. The second part contains the original presentation of fusion emergence and three companion papers arguing for diachronic approaches to the topic, rather than the then dominant synchronic accounts. The third part starts with the paper that introduced the probabilistic paradox followed by a later evaluation of attempts to solve it. A third paper argues, contra Quine, that probability theory is a purely mathematical theory. The final part includes papers on causation, explanation, metaphysics, and an agent-based model that shows how endogenous uncertainty undermines utility maximization. Each of the four parts is followed by a comprehensive postscript with retrospective assessments.


2021 ◽  
pp. 003232172110205
Author(s):  
Giulia Mariani ◽  
Tània Verge

Building on historical and discursive institutionalism, this article examines the agent-based dynamics of gradual institutional change. Specifically, using marriage equality in the United States as a case study, we examine how actors’ ideational work enabled them to make use of the political and discursive opportunities afforded by multiple venues to legitimize the process of institutional change to take off sequentially through layering, displacement, and conversion. We also pay special attention to how the discursive strategies deployed by LGBT advocates, religious-conservative organizations and other private actors created new opportunities to influence policy debates and tip the scales to their preferred policy outcome. The sequential perspective adopted in this study allows problematizing traditional conceptualizations of which actors support or contest the status quo, as enduring oppositional dynamics lead them to perform both roles in subsequent phases of the institutional change process.


Author(s):  
Eva Rafael-Pérez ◽  
Eliel López-Cruz ◽  
Alan Jhaseel Hernández-Bolaños ◽  
Bibiana Díaz-Sarmiento

Currently, the use of mobile applications is of utmost importance, since it allows the availability of information at all times. The mobile application described in this article was made to follow up on the Requests for Access to Information and is part of a web system, with which an internal control of the Requests for Access to Information that are sent to the Dependencies, Entities, Auxiliary Bodies and Trusts of the State Public Administration. The application will attend to the requests and thus, the times of attention to them are met within the terms established by the Law of Transparency and Access to Public Information for the State of Oaxaca (LGTAIPO). The mobile application allows the monitoring of information requests received, shows the status in which they are through a colored traffic light, meetings can be scheduled, allows the registration of the user's profile, and, has an internal chat so that dependencies can communicate with each other and send notifications. The development methodology used for this project was Extreme Programming using the Dart programming language.


Author(s):  
Takeshi Shimmura ◽  
Takeshi Takenaka ◽  
Motoyuki Akamatsu

In full-service restaurants, it is important to share customer information among staff members in real time in order to perform complicated operations. Conventional point of sale (POS) systems in restaurants was developed to improve the verification and transmission of order information passed from the dining hall to the kitchen. However, POS systems have remained insufficient to share customers’ order information among many staff members in different positions. This paper introduces an information sharing system for full-service restaurants using an advanced POS system with which staff members can share order information in real time. Using this system, kitchen staff members can grasp the total number of orders and the elapsed time for preparation of each order. Moreover, service staff members can grasp the status of each customer quickly. Using this system in a large-scale restaurant, preparation processes can be made more efficient and reduce customer complaints.


2006 ◽  
Vol 12 (1) ◽  
pp. 153-182 ◽  
Author(s):  
Kyung-Joong Kim ◽  
Sung-Bae Cho

We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of ALife are shown by application studies. ALife application fields treated include robot control, robot manufacturing, practical robots, computer graphics, natural phenomenon modeling, entertainment, games, music, economics, Internet, information processing, industrial design, simulation software, electronics, security, data mining, and telecommunications. In order to show the status of ALife application research, this review primarily features a survey of about 180 ALife application articles rather than a selected representation of a few articles. Evolutionary computation is the most popular method for designing such applications, but recently swarm intelligence, artificial immune network, and agent-based modeling have also produced results. Applications were initially restricted to the robotics and computer graphics, but presently, many different applications in engineering areas are of interest.


2017 ◽  
Vol 5 (6) ◽  
pp. 817-838 ◽  
Author(s):  
Jan E Snellman ◽  
Gerardo Iñiguez ◽  
Tzipe Govezensky ◽  
R A Barrio ◽  
Kimmo K Kaski

Abstract In human societies, people’s willingness to compete and strive for better social status, as well as being envious of those perceived in some way superior, lead to social structures that are intrinsically hierarchical. Here, we propose an agent-based, network model to mimic the ranking behaviour of individuals and its possible repercussions in human society. The main ingredient of the model is the assumption that the relevant feature of social interactions is each individual’s keenness to maximize his or her status relative to others. The social networks produced by the model are homophilous and assortative, as frequently observed in human communities, and most of the network properties seem quite independent of its size. However, we see that for a small number of agents the resulting network consists of disjoint weakly connected communities, while being highly assortative and homophilic. On the other hand, larger networks turn out to be more cohesive with larger communities but less homophilic. We find that the reason for these changes is that larger network size allows agents to use new strategies for maximizing their social status, allowing for more diverse links between them.


Author(s):  
Neeraj Kumar ◽  
R. B. Patel

Wireless mobile adhoc network (MANET) is a dynamic network. Nodes in a MANET have high degree of mobility from one domain to another in a particular time interval. In such a dynamic network, security is a major concern. In this paper, the authors propose an inter domain agent based secure authorization and communication for mobile clients/nodes (MCs) in MANET. Mobile agents (MAs) are software programs that support the mobility of clients in different domain and provide necessary resources to the clients for safe execution. It also shares the key with MCs in different domains. An algorithm for secure authorization and communication between MCs having mobility in different domains is proposed. The scheme is evaluated on ns-2 w.r.t. metrics such as overall cost in terms of overhead generated, admission and traceability cost, and itinerary chosen by MAs w.r.t. mobility of MCs.


Sign in / Sign up

Export Citation Format

Share Document