期刊文献+

基于ZEUS开发反生化恐怖多Agent应急指控系统的研究

System of anti-biochemical terror emergency command and control based on ZEUS
下载PDF
导出
摘要 分析了Agent和多Agent系统的结构模型后,根据反生化恐怖应急指控大型复杂分布式信息处理系统的特点,结合多Agent系统的结构模型,提出了系统的一种实现框架,并对当前几个典型的Agent开发平台进行了分析和比较,提出了利用ZEUS平台开发反生化恐怖多Agent应急指控系统的实现思路,并对系统实现中的系统运行逻辑、Agent通信机制和Agent协作机制等进行了分析和研究,提出了指挥Agent的具体的内部结构。 This paper analyzes the structure model of Agent and multi-agent system, and proposes a realization frame of the anti-biochemical terror emergency command and control system based on the characteristics of large complex distributed information system and the structure model of multi-agent system. It analyzes and compares some typical agent development platforms, and brings for wards the idea developing the anti-biochemical terror emergency command and control system on ZEUS, for run-time logic, communication mechanism, and coordination mechanism between agents, and proposes a practical inner structure of command agent.
出处 《重庆邮电学院学报(自然科学版)》 2006年第3期371-375,共5页 Journal of Chongqing University of Posts and Telecommunications(Natural Sciences Edition)
基金 上海警备区反恐研究课题基金资助项目
关键词 ZEUS 反生化恐怖 多AGENT 指控系统 ZEUS anti-biochemical terror multi-Agent command and control system
  • 相关文献

参考文献8

二级参考文献45

  • 1包杰.GPS授时系统在七号信令集中监测系统中的应用[J].重庆邮电学院学报(自然科学版),2004,16(4):73-76. 被引量:3
  • 2沈俊.基于多agent系统的网络管理模型研究:博士论文[M].南京:东南大学,2001.. 被引量:2
  • 3[1]TENNENHOOSE D, SMITH J M, SINCOSKIE S W D, et al. A survey of active network research[J]. IEEE Communications Magazine, 1997, 35(1): 80-86. 被引量:1
  • 4[2]GRAY R S. Agent TCL: a flexible and secure mobile-agent system[A]. Proceedings 1996 Tcl/Tk Workshop[C]. Berkeley (CA): USENIX Assoc,1996.9-23. 被引量:1
  • 5[3]SMITH J M, CARVERT K L, MURPHY S L, et al. Activating networks: a progress report[J]. Computer, 1999, 32(4): 32-41. 被引量:1
  • 6[4]ZHANG T, MAGEDANZ T, COVACI S, et al. Ingelligent agents-interoperability and integration issues[A]. Proceedings of 4th International Symposium on Interworking[C]. Offawa(Canada), 1998. 6-10. 被引量:1
  • 7[5]YOUNG A, YUNG M. Sliding encryption: a cryptographic tool for mobile agents[A]. Proceeding of the 4th Internet Workshop[C]. Berlin (Germany): Springer-Verlag, 1997.230-241. 被引量:1
  • 8[6]KARJOTH G, LANGE D B, OSHIMA M. The aglet security model[J]. Computer,1997,30(7): 634-646. 被引量:1
  • 9[7]SATOH I. Network processing of mobile agents, by mobile agents,for mobile agents[A]. Proceedings of the 3th International Workshop, MATA 2001[C]. Berlin(Germany): Springer-Verlag,2001.81-92. 被引量:1
  • 10[8]VIGNA G. Protection mobile agents through tracing[A]. Proceedings of the Third ECOOP Workshop on Mobile Object Systems[C]. Jyvalskyla(Finland), 1997.137-153. 被引量:1

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部