Cooperating mobile agents for dynamic network routing
基于混合蚂蚁算法的二维装箱问题求解

收稿日期:2003-11-14;修订日期:2004-01-09 作者简介:赵中凯(1978-),男,甘肃白银人,助教,硕士,主要研究方向:智能优化、计算机算法设计; 梅国建(1955-),男,河南许昌人,副教授,主要研究方向:管理科学、系统工程; 沈洪(1971-),男,湖南澧县人,讲师,主要研究方向:管理科学、系统工程; 赵战彪(1972-),男,河北博野县人,讲师,硕士,主要研究方向:系统优化.文章编号:1001-9081(2004)06Z -0297-02基于混合蚂蚁算法的二维装箱问题求解赵中凯,梅国建,沈 洪,赵战彪(装甲兵工程学院装备管理室,北京100072)摘 要:二维装箱问题是一个NP -Hard 组合优化问题。
根据蚂蚁优化算法和二维装箱问题的特点,本文提出了改进的BL 算法与蚂蚁算法相结合的混合算法来解决二维装箱问题,实验结果表明,该算法是行之有效的,并具有一定的通用性。
关键词:二维装箱;蚂蚁算法;BL 算法;优化中图分类号:TP301 文献标识码:A1 引言在许多工业领域,人们需要把矩形物体装入诸如集装箱之类的容器中,例如在码头,大小重量不一的集装箱需要装入货船中;在木材或钢铁厂中,根据实际需要从一个大的原材料中切割成不同形状的几块部分,进行分别包装处理;在超市中尤其是仓储超市中,各种商品需要分类放置在不同的货架上。
在所有类似的应用中,如何最有效的利用容器空间,按照需要的次序放置物体,是此类问题研究的目的。
20世纪80年代以来,许多学者尝试应用各种方法解决该类问题,其中遗传算法(G A )、模拟退火算法(S A )等现代优化算法在该问题中得到了广泛的应用。
但是由于实际问题约束条件的复杂性,启发式算法的研究比较引人关注[1]。
1980图1 BL 改进算法流程图年,Jacos 提出Bottom 2Left (BL )算法,由于该算法利用矩形的长度和宽度进行物体放置,要求被放置物体尽可能快地到达容器底部的同时尽可能快地到达容器的左侧,不用确定放置点的坐标,解决了物体装入过程中图形结果的输出问题和物体之间的干涉(重叠)问题,因而得到了广泛的研究。
fbi真实练习题

fbi真实练习题1. An Introduction to the FBIThe Federal Bureau of Investigation (FBI) is the premier law enforcement agency in the United States. It is tasked with protecting and defending the country against terrorist and foreign intelligence threats, upholding federal laws, and providing investigative leadership to federal, state, and local agencies. To maintain the highest level of competence, FBI agents undergo rigorous training and testing. In this article, we will explore some real practice questions that aspiring FBI agents might encounter during their preparation.2. Analyzing Crime ScenesCrime scene analysis is a crucial skill for FBI agents. They must be able to interpret and synthesize various pieces of evidence to uncover the truth behind a crime. Here's a practice question:Question: You arrive at a crime scene and find a puddle of liquid next to a broken glass bottle. What information can you gather from this observation?Answer: A puddle of liquid next to a broken glass bottle suggests that a liquid was spilled or intentionally poured out at this location. This evidence could indicate the presence of a potentially harmful substance, such as a chemical or toxic material. Further investigation is required to determine the nature and significance of the liquid.3. Criminal ProfilingCriminal profiling involves creating a psychological and behavioral profile of an unknown criminal based on the analysis of evidence and crime scene patterns. This technique helps investigators understand the motivations and characteristics of the perpetrator. Here's a practice question:Question: In a serial murder investigation, what factors might be considered when developing a criminal profile?Answer: When developing a criminal profile in a serial murder investigation, various factors are taken into account. These may include the victim's demographics, such as gender, age, and occupation, as well as the modus operandi, signature behaviors, and forensic evidence associated with the crime scenes. Additionally, the geographic locations and timing of the murders can provide insights into the offender's patterns and potential motivations.4. Cybercrime InvestigationWith the rise of technology, the FBI has increasingly focused on combating cybercrime. Special agents are trained to investigate and dismantle complex networks involved in financial fraud, hacking, and identity theft. Here's a practice question:Question: You suspect that an individual is involved in a large-scale cybercrime operation. What steps would you take to gather evidence against them?Answer: When investigating a suspected cybercriminal, a number of steps should be taken. These include obtaining legal authorization for electronic surveillance, identifying and preserving potential evidence,conducting forensic analysis on the suspect's devices, and cooperating with other law enforcement agencies or international partners. Interviews with witnesses and subjects connected to the criminal network may also provide valuable information.5. Hostage NegotiationHostage situations are high-stress scenarios that require skilled negotiation techniques to ensure a peaceful resolution. FBI agents undergo extensive training to negotiate with hostage-takers and save lives. Here's a practice question:Question: During a hostage negotiation, a hostage-taker demands a large sum of money. How would you approach this demand?Answer: When dealing with a hostage-taker demanding a large sum of money, it is important to prioritize the safety of the hostages. The negotiation team would carefully consider various factors, such as the likelihood of compliance, potential risks, and the availability of resources. They would work collaboratively with crisis management professionals and explore alternatives to meet the demands without compromising the safety of the hostages.Conclusion:The FBI's training and selection process are designed to identify individuals with the necessary skills and qualities to serve as federal agents. The practice questions mentioned in this article offer a glimpse into the diverse areas of expertise that FBI agents must possess. By understandingthese scenarios and preparing accordingly, aspiring agents can better equip themselves for a career in the FBI.。
基于蚁群算法的物流车辆路径优化问题的研究

CVRP的数学模型
(1) (2) (3) (4) (5) (6) k:第k辆车 :运输车辆的数量 :车辆k所走的路径的集合
带时间窗的车辆路径问题VRPTW
在很多时候,会要求在一定时间范围内到达顾客点(当然有时配送中心也有时间范围限制),否则将因停车等待或配送延迟而产生损失。比较而言,时间窗VRP除了必须实现经典 VRP 的要求,还要考虑访问时间的限制,这样才能找到合理方案。
二下标车辆流方程
Laporte提出了用以求解对称的一般VRP问题,结合了爬山法的思想,核心依然是线性规划。
禁忌搜索算法
由Glover在1986年提出,是一种全局逐步寻优算法,此算法采用禁忌搜索表纪录已达到过的局部最优点,在下一次搜索中对于禁忌表中的节点有选择或是不再选择,以此来避免陷入局部最优解。Gendrean最先用此法解决VRP问题
1996年,Macro Dorigo等人在《IEEE系统、人、控制论汇刊》上发表了”Ant system:optimization by a colony of cooperating agents”一文,系统地阐述了蚁群算法的基本原理和数学模型,蚁群算法逐渐引起了世界许多国家研究者的关注,其应用领域也得到了迅速拓宽。
每次迭代的最短距离与平均距离对比图
结果对比
原文
算法实现
PART-01
CVRP问题及求解
CVRP 问题的蚁群算法实现
VRP 与 TSP 蚁群算法的区别
子路径构造过程的区别 在TSP 中,每只蚂蚁均要经过所有结点,而在VRP 中,每只蚂蚁并不需要遍历所有结点。
2
allowedk 的区别在TSP中,蚂蚁转移时只需考虑路径的距离和信息浓度即可,但在VRP中,蚂蚁转移时不但要考虑上述因素,还需要考虑车辆容量的限制。 这一差异在算法中的具体体现就是allowedk 的确定问题。
java基于蚁群算法路由选择可视化动态模拟开题报告

开题报告课题: 基于蚁群算法路由可视化动态模拟1.选题依据(1)课题研究意义DWDM全光通信网在我国已进入了高速进展期,正向着ASON(Automatically Switched Optical Network 自动互换光网络)为代表的新一代智能化光网络的方向进展。
而智能化的动态光路由和波长分派(Routing and Wavelength Assignment, RWA)算法那么是构建ASON、实现对全光网的智能化操纵和治理的关键技术之一。
蚁群算法是受真实蚁群觅食行为的启发而产生的一种模拟进化算法,是由有限个蚂蚁的个体行为组成的多agent系统[1、2],已被成功应用于解决TSP(Traveling Salesman Problem 旅行家问题)[1]、JSP(Job-shop Scheduling Problem生产排程问题)、QAP(Quadratic Assignment Problem二次指派问题)等组合优化问题。
近来已有的大量研究说明,蚁群算法具有并行性、鲁棒性、可重构性、散布性等特质。
这些特性使得蚁群算法在解决动态RWA问题中表现出优良的性能。
在网络带宽的有效利用、波长资源的合理分派、和网络路由的重构与恢复,基于蚁群思想都能找到对应的解决方式。
相关研究工作如达到预期目标将处于国际先进水平,也必然会加速我国构建智能光网络的步伐,因此具有良好的经济效益和社会效益.(2)国内外研究现状、水平和进展趋势至今为止,国内外比较成熟的动态RWA算法都把RWA问题强行拆分成路由和波长分派两个子问题别离加以解决,如First-Fit(最先适用)算法、LLR(least-loaded routing最小负载路由)算法、LI(Least Influence最小阻碍)算法[3]等,而且都为集中式算法,需要利用全网信息,没有考虑波长变换,无法完成在算法层面上的网络的自动恢复,路由和波长分派独立解决也致使这些算法难以取得全局最优解。
Conceptual Design of Humanoid Robots

Conceptual Design of Humanoid Robots Prof. Dr.-Ing. Dr.h.c. Albert AlbersInstitute of Machine Design and Automotive EngineeringUniversity of Karlsruhe1. IntroductionThe development of a humanoid robot within the scope of special research area 588 has the objective of creating a machine that closely cooperates with humans. This leads to requirements such as little weight, small moving masses (no potential danger for persons in case of collision), as well as appearance, motion space, and work movements after the human model. One reason for the last point is the requirement for the robot to operate in surroundings designed for humans. Another aspect is the acceptance by technologically unskilled users, which is likely to be higher if the robot has a humanoid shape and calculable movements.A humanoid robot is a highly complex mechatronical system, as the required functionality can only be achieved by the interplay of mechanical components with extensive sensor technology, state-of-the-art actuators and highly developed software. The development of mechatronical products is a major point of emphasis for research at our institute. 2. Development of an complex mechatronical system, e.g. humanoid robot2.1 Definition of the term “Mechatronic”In order to distinguish mechatronical systems from electromechanical systems, we define “Mechatronic” as follows [1]:“Mechatronics is concerned with technological systems, consisting of mechanical, electrical/electronical, and information technological subsystems that are characterised by intensive interaction and cannot be developed separately and in independent discipline-oriented processes.”2.2 Product development process in MechatronicSuccessful development of complex mechatronical systems is only possible in close cooperation of specialists of the concerned fields of mechanics, electronics, and information technology (fig. 1). Discipline-oriented partial solutions cannot provide or only with significant delays the desired result.Fig. 1: Product development process in MechatronicFig. 2: V-model. Reference for developing mechatronical productsThe development of technological systems can be carried through according to the V-model (fig. 2) [2]. After analysing all demands on the total system, the subfunctions and subsystems simultaneously being developed by the cooperating development teams are defined (left branch of the V-model). After verifying the subfunctions and testing the subsystems (e. g. the robot wrist including all actuators and sensors), the subsystems are gradually integrated and then the initial operation phase can begin (right branch of the V-model). The working structures with the necessary working surface pairs and connecting channel and support structures are defined according to the element model “working surface pairs & channel and support structures” developed at the Institute of Machine Design and Automotive Engineering [3].The development of technological systems is originally an iterative process involving the development of physical and mathematical models. These models help to verify hypotheses and to simulate and therefore predict properties. Additionally the model helps to gather information, which is not available from the real system, e. g. the tensile stress of certain construction components. Due to the complex hybrid structure, model development and simulation are of even greater significance when the mechatronical product development process is concerned. As tools and software are very much discipline-oriented and can very often not communicate, the process is even more difficult. This is an important research task in the field of mechatronics. The over-all solution, which is still in the conceptual and design phase of the developing process, can be contributed to build up the prototype. This is the current stage of the humanoid robot at the University of Karlsruhe. The construction of the prototype is also an iterative process into which experiences from preceding development stages are to be included.2.3 DIC-method, team-oriented development with internal competition The DIC-method (development by internal competition) is a way to increase the efficiency of team-oriented development processes. The incentive of internal competition between development teams of the same enterprise is used for finding the optimal solution. The competing teams are presented with the same terms of reference.Several development teams consisting of specialists of all the concerned subjects worked in competition in order to develop concepts for several subsystems of a humanoid robot for a period of approximately six months. By using the approaches of concurrent engineering and the DIC-method, a large number of different methods of resolution were developed (fig. 3). Each of these concepts consists of a multitude of component solutions for the mechanical structure of individual joints, sensor, and actuators. This large number of conceptual suggestions is the basis for the currently continuing development.Fig. 3: Different concepts of a humanoidrobot2.4 The demonstratorThe upper body considered optimal for a robot, developed according to the methods described, is currently being assembled at the Institute for Machine Design and Automotive Engineering. Its proportions correspond to those of an average woman with a height of 165 cm. A special emphasis has been put on the development of the arm mechanics. The robot’s arm of the first development stage will be equipped with 7 degrees of flexibility (fig.4). As a principle, only lightweight materials were used and the electric drive units were placed in the thorax in order to design a lighter arm. Three different principles are used to connect the motors and the joints. The power transmission to the wrist will be hydraulic for the first prototype. For the elbow, rope pulls will be used and the shoulder will be driven directly. This concept allows a minimal weight for the arm of only about 2, 5 kg [4]. Three different measuring principlesare applied for measuring the torsion angles, depending on the available construction space and the required accuracy. The torsion angles in the shoulder are measured absolutely by optical encoders, the ones in the elbow by precision rotary potentiometers, the ones in the wrist using a new type of magnetoresistive angular sensors [5].The neck joint (fig. 4) is equipped with four degrees of flexibility. Three rotation axes are situated in the lower neck segment and another one on the upper side of the neck, which allows the nodding of the head. The electrical motors are moved by the others as little as possible.For the pan-tilt units for moving the stereo camera system, a mechanism is implemented that allows each camera to move independently by two degrees of flexibility. It is driven by highly dynamic, brushless electric motors that are also stationary for dynamic reasons. As a high degree of accuracy is required for the angle measurement of the cameras, the high-resolution optical encoder is used here.Fig. 4: Components of the humanoid robot currently being assembled (arm, neck andpan-tilt unit)3. SummaryFor the development of a complex mechatronical system of a humanoid robot, a combination of the development methods concurrent engineering and DIC has proven to be target-oriented. In total, 33 different solutions that all fulfilled the requirements were developed in a brief period of time. The most promising concepts were then selected. They are currently being realised as the first prototype.4. References[1] Albers, A. Einführung in dieMechatronik , Lecture at theUniversity of Karlsruhe, 2001, mkl-Eigenverlag, Karlsruhe.[2] Gausemeier, Jürgen ; Lückel, Joachim.Entwicklungsumgebung Mechatronik ;Methoden und Werkzeuge zurEntwicklung mechatronischer Systeme;Paderborn ; HNI, 2000 (HNI-Verlagsschriftenreihe ; Bd.80).[3] Albers, A.; Matthiesen, S. .KonstruktionsmethodischesGrundmodell zum Zusammenhang vonGestallt und Funktion technischerSysteme – Das Elementmodell…Wirkflächenpaare &Leitstützstruktur“ zur Analyse undSynthese technischer Systeme .Konstruktion, Zeitschrift fürProduktentwicklung; Band 54; Heft7/8 - 2002; Seite 55 - 60; Springer-VDI-Verlag GmbH & Co. KG;Düsseldorf 2002.[4] Behrendt, Matthias . Entwicklung undKonstruktion der Armmechanik undSensorik eines Humanoiden Roboters .Degree Dissertation , Institut fürAngewandte Informatik, UniversitätKarlsruhe 2002.[5] Company Sensitec . Novelmagnetoresistive Angle-Sensors.Product information.。
蚁群算法文献综述

1. 前言
蚁群算法(AntColonyOptimization,ACO),它由Marco Dorigo于1992年在他的博士论文“Ant system: optimization by a colony of cooperating agents”中提出,其灵感来源于蚂蚁在寻找食物过程中发现路径的行为。其机理是:生物界中的蚂蚁在搜寻食物源时,能在其走过的路径上释放一种蚂蚁特有的分泌物信息素,使得一定范围内的其他蚂蚁能够觉察并影响其行为.当某些路径上走过的蚂蚁越来越多时,留下的这种信息素轨迹也越多,以至信息素强度增大,使后来蚂蚁选择该路径的概率也越高,从而更增加了该路径的信息素强度.蚁群算法是一种仿生类非线性优化算法,具有并行性、正反馈性和全局极小搜索能力强等特点.蚁群算法最早应用于旅行商问题(Travelling Salesman Problem)简称TSP问题,后来陆续渗透到其他领域,在很多领域已经获得了成功的应用,其中最成功的是在组合优化问题中的应用。组合优化问题分为两类:一类是静态组合优化问题,其典型代表有TSP,车间调度问题;另一类是动态组合优化问题,例如网络路由问题。本次毕业论文主要聚焦于静态组合优化问题。
蚂蚁在选择路径时,那些有更多蚂蚁曾经选择过的路径(也就是具有更高信息素密度的路径),被再次选中的可能性最大。
当t=0时,没有信息素,有30只蚂蚁分别在B和D。蚂蚁走哪条道路是完全随机的。因此,在每个点上蚂蚁将有15只经过H,另外15只经过C。
当t=1时有30只蚂蚁从A到B,它们发现指向H道路上的信息素密度是15,是由从B出发的蚂蚁留下的;指向C道路上的信息素密度是30,其中15是由B出发蚂蚁留下,另外15是从D出发经过C已经到达B的蚂蚁留下。因此,选择经过C到D的可能性就更大,从E出发到D的30只蚂蚁也面临着同样的选择,由此产生一个正反馈过程,选择经过C的蚂蚁越来越多,直到所有的蚂蚁都选择这条较近的道路。图1是著名的双桥实验的简化描述。
无刷双馈电机的建模与仿真
无刷双馈电机的建模与仿真靳雷,陆晓强(河南质量工程职业学院,河南平顶山467001)摘要:无刷双馈电机(BDFM )作为一种新型电机,兼有绕线式转子异步电机和同步电机的优良特性,尤其适合于变速恒频发电领域,通过分析无刷双馈电机的结构及工作原理,建立了基于转子速坐标系的d-q 轴无刷双馈电机数学模型,根据所得的数学模型,对无刷双馈电机的各种运行方式进行了仿真分析,采用M ATLAB/Simulink 进行了计算机仿真研究,得出了各种运行方式下的仿真波形,仿真结果验证了数学模型的正确性和可行性,并得到了一些有益的结论.关键词:无刷双馈电机;转子速;数学模型;仿真中图分类号:TM 301.2文献标志码:A 文章编号:1008-7516(2011)04-0083-05Modeling and simulation of brushless doubly fed machineJin Lei,Lu Xiaoqiang(Henan Quality Polytechnic,Pingdingshan 467001,China )Abstract:As a new motor,brushless doubly-fed machine (BDFM )has the excellent performances which include wound rotor induction motor and synchronous motor.It especially suits in the variable speed constant frequency power generation area.This paper briefly introduces the structure and working principle of brushless doubly fed machine.By analyzing the structure and working principle of BDFM,mathematical model based on the rotor speed d-q coordinate has been ing the mathematical model,MATLAB/Simulink has been used to conduct the computer simulation research for the motor running status.The simulation waveforms under various operating mode have been obtained.The simulation results have confirmed the mathematical model's accuracy and some beneficial conclusions have been obtained.Key words:brushless doubly fed machine (BDFM ),rotor speed,mathematical model,simulatio无刷双馈电机(BDFM )作为一种新型电机,它与一般电机相比,在运行时要求容量较小的变频器,降低了系统成本,它既可运行于亚同步速也可以运行在超同步速,同时电机本身没有滑环和电刷,既降低了电机的成本,又提高了系统运行的可靠性,比较适合于变速恒频恒压发电领域,特别适用于风力发电、水力发电等可再能源的开发、利用[1-2].1无刷双馈电机的结构及原理1.1无刷双馈电机的基本结构无刷双馈电机的定子上装有两套不同极数的三相对称绕组,一套接至工频电源称为功率绕组(主绕组);一套接至变频电源称为控制绕组(副绕组)[3].无刷双馈电机结构原理图如图1所示.doi:10.3969/j.issn.1008-7516.2011.04.020第39卷第4期394Vol.No.河南科技学院学报Journal of Henan Institute of Science and Technology 2011年8月2011Aug.收稿日期:2011-05-23作者简介:靳雷(1974-),男,河南扶沟人,硕士,讲师.主要从事自动控制技术教学与应用研究.P p+P c P c 图1无刷双馈电机结构原理1.2“极调制”原理对无刷双馈电机来说,当功率绕组接入工频(频率为)电源、控制绕组接入变频(频率为)电源后,由于两套定子绕组同时有电流流过,因此在气隙中产生两个不同极对数的旋转磁场,这两个磁场通过转子的调制发生交叉耦合,在转子中产生相同极对数和转速的旋转磁场,从而使两个原本不会发生直接磁耦合的定子磁场通过转子的中介发生了磁耦合,使能量在两不同极对数、不同旋转速度的定子磁场以及转子磁场之间发生传递转换.转子的这种“中介”作用被称为“极调制”机理[4].根据“极调制”原理可知,电机稳定运行时,定子功率绕组和控制绕组在转子绕组中感应的电流频率应相等,因此,转子运行频率为:(1)所以,转子机械转速n r 为:(2)式(2)中的“±”号取决于定子两套绕组的相对相序.当功率绕组电源和控制绕组电源相序相反时取“+”号,反之取“-”.当f c 时的转速称为自然同步速.f c 前取负号的速度,称为亚同步速,反之称为超同步速.由式(2)可以看出,无刷双馈电机作电动机运行时,可通过调节控制绕组的供电频率f c 来调节转子转速,作发电机运行时,在不同机械转速下调节控制绕组的供电频率,可保证定子功率绕组输出恒定频率的交流电能,即实现了变速恒频发电[5].2无刷双馈电机的转子速d-q 模型对无刷双馈电机来说,两个子系统通过转子绕组发生耦合,在转子绕组上建立一个合适的坐标系统将给无刷双馈电机的数学模型的建立和分析带来方便,这样转子速d-q 坐标轴将是最好的选择.假定转子以逆时针方向旋转,由于无刷双馈电机两个子系统中旋转磁场的转向一般不同,为了得到一个统一的转子速d-q 坐标系,在磁场逆时针方向旋转的子系统中,选q 轴与转子第一相绕组的轴线重合,d 轴在旋转方向上落后90°;在磁场顺时针方向旋转的子系统中,q 轴仍与转子第一相绕组的轴线重合,d 轴在旋转方向上超前90°.由于这两个坐标系以同一个转子速度旋转,这两个d-q 轴坐标系可合并为同一个转子速d-q 轴坐标系[6].利用坐标变换理论,并考虑到BDFM 转子采用鼠笼式结构,这样,就得到无刷双馈电机在转子速d-q 坐标系下,以定转子绕组的电流作为状态变量的电压矩阵方程为:ÁÂÃÁÂf f f p p ÁÂÃÁÂ60()f f n p p −2011年河南科技学院学报(自然科学版)式(3)中,r p 、L sp 、M pr 和r c 、L sc 、M cr 分别为功率绕组和控制绕组的电阻、自感和绕组与转子之间的互感;r r 、L r 、分别为转子的电阻、自感和机械角速度;u qp 、u dp 、u qc 、u dc 、i qp 、i dp 、i qc 、i dc 、i qr 、i dr 为电压和电流瞬时值,下标“p ”表示功率绕组,“c ”表示控制绕组,“r ”表示转子,“q ”表示q 轴分量,“d ”表示d 轴分量.电磁转矩方程式如下:(4)机械运动方程如下:(5)式(4)、式(5)中T e 、T ep 、T ec 分别为电磁总转矩、功率绕组产生的转矩和控制绕组产生的电磁转矩,J 、K d 分别为转子机械惯量、转动阻尼系数,T L 为负载转矩.式(3)、式(4)和式(5)就构成了无刷双馈电机在转子速d-q 轴坐标系上的数学模型.3无刷双馈电机的运行仿真采用MATLAB/Simulink 对系统进行仿真研究,仿真所用到的无刷双馈电机模型电机参数为:p p =3,L sp =71.38mH,M p =69.31mH,r p =0.435Ω,p c =1,L sc =65.33mH,M c =60.21mH,r c =0.435Ω,L r =142.8mH,r r =1.63Ω,J =0.03kg·m 2,K d =0.利用无刷双馈电机在转子速d-q 轴坐标系上的数学模型,建立了如图2所示的动态仿真系统模型,它是由多个封装模块(子系统)构成[7].图2BDFM 仿真系统结构以BDFM 封装模块为例,包括6个电压方程和1个转矩方程的封装模块,如图3所示.其中,以Uqp 的封装模块为例,它的构成如图4所示.(3)Á?e ep ec p pr qp dr dp qr c cr qc dr dc qr ()()T T T p M i i i i p M i i i i ??????ÁÂÃÄÁd 1()d T T K t J?−??靳雷等:无刷双馈电机的建模与仿真第4期图3BDFM 封装模型图4BDFM 封装模型(局部)3.1单馈异步运行仿真无刷双馈电机运行在异步模式时,功率绕组星形连接,接380V 、50Hz 工频电源,控制绕组出线端abc 直接短路,即u qc =u dc =0,波形图如图5所示(其中图a 为转速波形,图b 为电磁转矩波形).开始时,电机空载启动,经过一定时间的震荡后,电机转速稳定在自然同步速750r/min,在1s 时电机突加10Nm 的负载,则电机转速略有下降,稳定后转速大约为710r/min,这体现了无刷双馈电机作为异步电机的特性,与理论值相符.(a )转速波形(b )电磁转矩波形图5单馈异步运行动态特性3.2同步运行特性仿真2s 时控制控制绕组突加两并一串(U a =U b =10V,U c =-5V )的直流励磁电源,则无刷双馈电机牵入同步运行,稳定后电机转速达到自然同步转速750r/min,与式(2)相符.若改变控制绕组直流电压的大小,过渡过程改变,但稳定转速不变.波形图如图6所示(其中图a 为转速波形,图b 为电磁转矩波形).3s 时负载转矩由10Nm 突增到20Nm,稳定后,无刷双馈电机仍然可以维持同步速运行,也就是说,负载转矩在稳定允许的范围内改变时,对转速没有影响,此时无刷双馈电机显示出同步电机的特性.波形图如图7所示(其中图a 为转速波形,图b 为电磁转矩波形).(a )转速波形(b )电磁转矩波形图6单馈运行状态过渡到同步运行状态的动态特性2011年河南科技学院学报(自然科学版)(a )转速波形(b )电磁转矩波形图7同步运行状态负载突变的动态特性3.3双馈运行特性仿真4s 时控制绕组突加同相序三相电压(100V,10Hz )时,无刷双馈电机由同步运行状态过渡到“超同步”双馈运行状态,稳态转速从750r/min 变为900r/min,无刷双馈电机由空载同步运行状态过渡到“超同步”双馈运行状态,波形图如图8所示(其中图a 为转速波形,图b 为电磁转矩波形).5s 控制绕组频率突然变为反相序三相电压(100V,10Hz )时,稳态转速从900r/min 变为600r/min,无刷双馈电机由超同步双馈运行状态过渡到“亚同步”双馈运行状态,波形图如图9所示(其中图a 为转速波形,图b 为电磁转矩波形).在理论上均与式(2)相符.(a )转速波形(b )电磁转矩波形图8同步运行状态过渡到超同步双馈运行状态时的动态特性(a )转速波形(b )电磁转矩波形图9超同步双馈运行过渡到亚同步双馈运行的动态特性4结语本文借助电机的坐标变换理论,推导出无刷双馈电机的转子速d-q 数学模型,对无刷双馈电机几种运行方式进行了M ATLAB 仿真研究,仿真结果表明了该模型的正确性,同时也说明无刷双馈电机可实现电机的软起动、异步、同步和双馈等多种运行方式,另外,仿真模型的构建为以后对无刷双馈电机更深入的研究奠定了基础.(下转93页)靳雷等:无刷双馈电机的建模与仿真第4期武艳等:发电机参数聚合及其动态仿真第4期5结论将连续域的变量区域进行网格划分,即可将离散优化问题的蚁群算法拓展应用到连续域寻优中,通过全局搜索和局部搜索两步获得最优解,具备全局寻优能力.同调发电机聚合参数的好坏对等值后系统的动态特性有很大的影响,对复杂大系统而言更为突出,因此对等值机参数的寻优应尽可能与同调机群聚合函数逼近.同调发电机参数的聚合可以表示为连续域的优化问题,因此可将蚁群算法应用于其中,通过算例分析以及与梯度法的效果对比,验证了该方法在同调发电机参数聚合中的良好效果.参考文献:[1]倪以信,陈寿孙,张宝霖.动态电力系统的理论和分析[M].北京:清华大学出版社.2002:240-242.[2]许剑冰,薛禹胜,张启平,等.电力系统同调动态等值的述评[J].电力系统自动化.2005,29(14):91-95.[3]胡杰,余贻鑫.电力系统动态等值参数聚合的实用方法[J].电网技术.2006,30(24):26-30.[4]李士勇.蚁群算法及其应用[M].哈尔滨:哈尔滨工业大学出版社,2004:1-59.[5]段海滨.蚁群算法原理及其应用[M].北京:科学出版社,2005:24-38.[6]Dorigo M,M aniezzo V,Colorni A.Ant system:optimization by a colony of cooperating agents[J].IEEE Transaction on System,M an,and Cybernetics-Part B,1996,26(1):29-41.[7]Bilchev G A,Parmee I C.The ant colony metaphor for searching continuous spaces[J].Lecture Notes in Computer Science.1995,993:25-39.[8]Wang L,Wu Q D.Ant system algorithm for optimization in continuous space[J].Proceedings of the2001IEEE InternationalConference on Control Application,2001:385-400.[9]段海滨,马冠军,王道波,等.一种求解连续空间优化问题的改进蚁群算法[J].系统仿真学报,2007,19(5):974-977.[10]陈礼义,孙丹峰.电力系统动态等值中发电机详细模型的参数集合[J].中国电机工程学报,1989,9(5):30-39.[11]Benchluch S M,Chow J H.A trajectory sensitivity method for the identification of nonlinear excitation system models[J].IEEEtrans on Energy Conversion,1993,8(2):159-164.[12]Carvalho V F,EI-kady M A,Fouad A.A direct analysis of transient stability for large power systems[R].California:EPRI,1986.(责任编辑:卢奇)(上接87页)参考文献:[1]卞松江.变速恒频发电关键技术研究[D].杭州:浙江大学,2003.[2]张志刚,王毅,黄守道,等.无刷双馈电机在变速恒频风力发电系统中的应用[J].电气传动,2005,35(4):61-64.[3]邓先明,姜建国.无刷双馈电机的工作原理及电磁设计[J].中国电机工程学报,2003,23(11):126-132.[4]章玮.无刷双馈电机系统及其控制研究[D].杭州:浙江大学,2001.[5]伍小杰,柴建云,王祥珩.变速恒频双馈风力发电系统交流励磁综述[J].电力系统自动化,2004(10):92-96.[6]Li R,Wallace A,Spee R.Two-Axis M odel Development of Cage-Rotor Doubly-Fed M achines[J].IEEE Transactions on EnergyConversion,1991,6(3):453-560.[7]薛定宇,陈阳泉.基于M atlab/Simulink的系统仿真技术与应用[M].北京:清华大学出版社,2002.(责任编辑:卢奇)。
蚁群算法简述
2.蚁群算法的特征
下面是对蚁群算法的进行过程中采用的规则进行的一些说明. 范围
蚂蚁观察到的范围是一个方格世界,蚂蚁有一个参数为速度半径一般 是3,那么它能观察到的范围就是33个方格世界,并且能移动的距离也在这 个范围之内. 环境
蚂蚁所在的环境是一个虚拟的世界,其中有障碍物,有别的蚂蚁,还有 信息素,信息素有两种,一种是找到食物的蚂蚁洒下的食物信息素,一种是找 到窝的蚂蚁洒下的窝的信息素.每个蚂蚁都仅仅能感知它范围内的环境信 息.环境以一定的速率让信息素消失. 觅食规则
2.蚁群算法的特征
基本蚁群算法流程图详细
1. 在初始状态下,一群蚂蚁外出,此时没有信息素,那么各 自会随机的选择一条路径. 2. 在下一个状态,每只蚂蚁到达了不同的点,从初始点到这 些点之间留下了信息素,蚂蚁继续走,已经到达目标的蚂蚁 开始返回,与此同时,下一批蚂蚁出动,它们都会按照各条路 径上信息素的多少选择路线selection,更倾向于选择信息 素多的路径走当然也有随机性. 3. 又到了再下一个状态,刚刚没有蚂蚁经过的路线上的信 息素不同程度的挥发掉了evaporation,而刚刚经过了蚂蚁 的路线信息素增强reinforcement.然后又出动一批蚂蚁,重 复第2个步骤. 每个状态到下一个状态的变化称为一次迭代,在迭代多次 过后,就会有某一条路径上的信息素明显多于其它路径,这 通常就是一条最优路径.
人工蚁群算法
基于以上蚁群寻找食物时的最优路径选择问题,可 以构造人工蚁群,来解决最优化问题,如TSP问题.
人工蚁群中把具有简单功能的工作单元看作蚂蚁. 二者的相似之处在于都是优先选择信息素浓度大的路 径.较短路径的信息素浓度高,所以能够最终被所有蚂 蚁选择,也就是最终的优化结果.
两者的区别在于人工蚁群有一定的记忆能力,能够 记忆已经访问过的节点.同时,人工蚁群再选择下一条 路径的时候是按一定算法规律有意识地寻找最短路径, 而不是盲目的.例如在TSP问题中,可以预先知道当前 城市到下一个目的地的距离.
贸易公司英文简介范文
贸易公司英文简介范文篇一:贸易公司简介英文Brochure of XX Trading Co.,Ltd. .XX Trading Co.,Ltd.Brands AgentChannel ExplorationExploration------- Brands Agent, Channel ExplorationFocuses on providing agent services of marketing, selling and purchasing on hardware, locks, water supply and drainage pipes, switches and sokets, paint and coatings, ceramic sanitary wares, stainless steel, and home appliances productsCompany ProfileXX Trading Co.,Ltd., a company based in Guangxi and targeted in exploring markets of the ten ASEAN(Association of Southeast Asian Nations) countries, is a channel-marketing-oriented type foreign trade company, which focuses on providing the agent services of marketing, selling and purchasing on hardware, locks, water supply and drainage pipes, switches and sokets, paint and coatings, ceramic sanitary wares, stainless steel, and home appliances products. Aiming at the markets of ASEAN countries, our company dedicates in providing professional marketing human resources and practical market channels for domestic famous manufactures, and building a trading information system of high efficiency and practices between China and ASEAN countries. Company registered and was founded on … with the registered capital of …..Company holds a wide range commodity network and an excellent execution team. Cooperative partners of Company range in various industries. Founded within two months, Company was qualified as General Taxpayers Eligible, and authorized with Foreign Trade Qualification and Import and Export Trading Qualification.XX insists the business principles of ?Customers Supreme, Services Prior, Practical and Innovative, Reciprocity and Mutual Benefit? and, standing with these principles, we strengthen the connection and cooperation with various industries, and in the way of closely cooperating with Chinese domestic brands and exploiting ASEAN trading markets, we provide customer and manufactures a platform for direct communicating and trading, which save costs for customers and bring larger profits for manufactures.Closely Cooperating Building Trading ChannelsOriented Marketing Business ScopeThe business scope of Company covers retailing and wholesaling, importing and exporting commodities including construction materials, mineral products, hardware and metals, machinery products and equipments, light industrial products, agricultural and side products, electronic products and equipments, stationery and sporting products and equipments. The import and export trading mainly carried out in the ten ASEAN countries.Main business goes in providing selling services on construction products, mineral products, mechanical and electrical products, and electronic and hardware products.In addition, Company is dedicating in building up an electricity business platform of import-and-export trading for construction products, mineral products, mechanical and electrical products, and electronic and hardware products.Hardware … LocksWater Supply … Drainage PipesSwitches … SocketsPaint … CoatingsCeramic tiles … Sanitary WaresBrands AgentChannel ExplorationAdvantage of Cooperation1. Geography AdvantageGuangxi locates in the border of southern China in geography location, and it stands the center of pan-Beibu Bay economic cooperation zone, Southwest economic circle and ASEAN economic circle in economy location, and it is the core zone of China-ASEAN Free Trade Area, which connect domestic market and the ASEAN market thus has the location advantage of bi-direction connection between China and ASEAN and, Guangxi is the only province which owns the land connection and sea channel between China and ASEAN.Policy AdvantageSince Free Trade Zone was founded, zero Customs duty was applied to more than 7000 commodities in China and ASEAN, and the service-trading market is substantially opened. The cancellation of tariff wall brings large business opportunities to China and ASEAN markets.1. Resources: large amount of Real estate investment projects and construction and decoration projects are owned by affiliate companies of Group so the demands of construction material is huge; Group owns a sum of mining and refining affiliate companies, which enjoys the exceptional advantage of mining resources.2. Social Advantage: government launched policies for supports and the agents which station in ASEAN countries are in good cooperative relationships with local governments.3. Banks strongly support with creditsFuture Development Strategy of CompanyMaster the development trend of modern service industryBuild a quintessential trade development modeOptimize business and trading logistic servicesPromote the interactive development between manufactures and customers Exploit ASEAN markets and even global marketsSurpass the competitions in modern trading circumstancesHuman Resources PoolInsist the human resources principle of employee orientedCompany apply the human resources management of employee oriented and build company culture actively, and as the result of which, “Team Work and Cooperation, Making Profits” has become the business performance principles of all employees so that development of company can be healthily and sustainably moving forward. Comprehensive cultivation package for human resourcesCompany lays emphasis on improving management efficiency and backing up excellent human resources. Since founded, Company pay attention to recruiting, cultivating and positioning excellent human resources, and make efforts on cultivating employees with good working ethic, social activate, team-work spirits and long-term career perspective, which gradually forming a employing mechanism of qualified recruitment, right positioning, and long-term co-working.Creditable Innovation CooperationWin-Win篇二:外贸公司简介范本香港铭丽科技有限公司是一家致力于手机周边配件、节日礼品、摄像器材、节能LED、安防产品等的商务贸易和技术开发于一体的高科技企业。
发邮件向国外作者索要论文原文
Dear Prof. (Dr.) XXX (作者名),I am XXXX, a graduate (doctoral) student in XXXX University in China. My major is XXX (你的专业).I am very interested in your recently publication: XXXXX (文章名), published in xXXXX (杂志名),XXX年。
But I have no access to this paper, so would you please mail me a PDF file of this paper?My e-mail address is :XX@XXXXXX.if you have no PDF file of this paper, would you please mail me a copy via air mail.Sincerely yours,XXXXXXXDear Dr. (注:国外作者无论其是教授还是其他什么职务,如果有博士学位,他更愿意别人称他为博士),I am interested in your paper entiltled "------" (Journal name, V ol, Page ). I would be very grateful if you could send me a copy in PDF or word document on my e-mail box. Thank you!Regards,Name,AbstractHighly dynamic, re-configurable hardware, embedded software and communication networks are becoming very significant in operation of various emergency services. The key challenge in designing such systems is to provide a framework for interoperability of emergency services in disaster situations. The goal of the paper is to provide an insight into modelling techniques for studying emergency services interoperability functions in system design to avoid hidden points of failures. Concepts of artificial Neuro-Immune-Endocrine (NIE) homeostatic models [21][22][24] for autonomous self-configuring and self-healing systems are discussed. The paper features example s of collaborative software agents’ behaviour in hostile environments, cooperating protocols, smart embedded devices and pro-active infrastructures in various areas related to emergency services operations.Neuro-Immune-Endocrine (NIE) Models for Emergency Services InteroperatibilityDear Dr.Zenon Chaczko:I am Wu Xintong, a prograduate student in Southwest Petroleum University in China. My major is Emergency management.I am very interested in your publication:Neuro-Immune- Endocrine (NIE) Models for Emergency Services Interoperatibility, published in Computer Aided Systems Theory–EUROCAST2007. But I have no access to this paper, so would you please mail me a PDF file of this paper?My e-mail address is :254632659@If you have no PDF file of this paper, would you please mail me a copy via air mail.Sincerely yours,Wu Xintong收到全文后的感谢信:注意:收到全文后一定要回复作者收到全文,并表示感谢。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Cooperating Mobile Agents for Dynamic Network Routing Nelson Minar - Kwindla Hultman Kramer - Pattie MaesMIT Media Lab, E15-305 20 Ames St, Cambridge MA 02139, USA(nelson,khkramer,pattie)@/~nelson/research/routes/1IntroductionContemporary computer networks are heterogeneous; even a single network consists of many kinds of processors and communications channels. Networks are also inherently decentralized; capability is scattered across the system. But few system design methodologies embrace or even acknowledge these complexities. New methods and approaches are required if next-generation networks are to be configured, administered and utilized to their full potentials. In our research at the MIT Media Laboratory we are building systems that use mobile software agents to manage complex real-world networks. In this chapter we describe a strategy for using a collection of cooperating mobile agents to solve routing problems for dynamic, peer-to-peer networks.Information networks continue to increase in size, complexity and importance. More and more devices are connected to computer networks, from desktop computers to cellular telephones, Web servers to pagers, television set-top boxes to smoke detectors. As connections proliferate, network topologies necessarily become more and more dynamic. Devices may move from place to place, or maintain intermittent connections, or change their relationships to the network and their peers on the fly. Networks must be flexible enough to allow these devices to communicate with each other in a variety of ways and across a variety of substrates. For example, physical links currently in widespread use include Ethernet, cellular radio, short-range infrared, and analog modem (to name a few).The problem of configuring such dynamic and heterogeneous networks is difficult at several levels. Researchers in this domain face hard problems of packet routing, service coordination, and infrastructure security. In many cases, conventional centralized approaches to network management are inappropriate, unable to serve large, diverse, mutable collections of computers.The routing tables of conventional network systems, for example, are usually generated in a centralized (and often human-mediated) manner. In this paper we present a contrasting model, a dynamic, wireless, peer to peer network with routing tasks performed in a decentralized and distributed fashion by mobile software agents that cooperate to accumulate and distribute connectivity information. Our agents determine system topology by exploring the network, then store this information in the nodes on the network. Other agents use this stored information to derive multi-hop routes across the network. We study these algorithms in simulation as an example of using populations of mobile agents to manage networks.2Nelson Minar, Kwindla Hultman Kramer, Pattie Maes2Managing Networks via Populations of Mobile Agents2.1The Importance of DecentralizationWe believe that complex networks require decentralized management structures. The aggregation of control inherent to centralized systems makes it very difficult for such networks to scale upwards in size. Centralized management tools depend, by definition, on restricting important decisions to one or a few nodes. These special nodes become performance bottlenecks as they are required to serve an increasing numbers of clients. In addition, failure of the controlling nodes (or the inability, for whatever reason, of other nodes to communicate with them) poses serious difficulties to participants in centrally managed networks.For similar reasons, designing centralized architectures that can readily adapt to changes in network usage is at least as difficult as designing them to scale well. Because the “intelligence” in a centralized network resides in a small number of specialized nodes, most devices on the network will be capable of only a limited range of behaviors. Asking devices with limited, hard-wired behavior to adjust themselves in response to changing circumstances – to use a different back-off algorithm, perhaps, or to structure their packets in a new way – will usually be impossible.Finally, there is a fundamental incompatibility between centralized design frameworks and inherently distributed real-world networks. A cellular telephone system serves as a good example. The nodes in a cell-phone network are numerous, mobile, and have constantly-changing service requirements. Both the topology of connectivity and the local relationships between nodes are highly fluid. Yet, current cellular networks ignore this complexity as much as possible: all communications are managed by a static grid of monolithic servers (cell towers). Contemporary cellular systems are highly centralized.All of the interesting dynamics in a cellular system revolve around the behavior of individual telephones, yet almost all of the investment, intelligence, and overhead in these systems is concentrated in the cell tower infrastructure, exterior to the phones themselves. As a result, cellular systems can only offer a very limited range of services, remain expensive to scale (with regards to both coverage area and device density), and make relatively poor use of bandwidth.We suggest a different model of network design, a decentralized approach to managing networks. Instead of a centralized infrastructure for managing connectivity, we propose using populations of cooperating, mobile software agents to maintain routing information across dynamic networks. Our approach is to push the intelligence traditionally centralized in a few controlling nodes out into the network asa whole, and to embed that intelligence into a flexible, adaptive software framework.2.2Mobile AgentsMobile agents are a novel way of building distributed software systems. Traditional distributed systems are built out of stationary programs that pass data back and forthacross a network. Mobile agents, by contrast, are programs that themselves move from node to node: the computation moves, not just the attendant data. Mobile agents in our work are defined by five important properties:1.Agents encapsulate a thread of execution along with a bundle of code and data.Each agent runs independently of all others, is self-contained from a programmatic perspective, and preserves all of its state when it moves from one network node to another. This is “strong mobility” as defined in (Baumann, 1997)2.Any agent can move easily across the network. The underlying infrastructureprovides a language-level primitive that an agent can call to move itself to a neighboring node.3.Agents must be small in size. Because there is some cost associated with hostingand transporting an agent, agents are designed to be as minimal as possible. Simple agents serve as building blocks for complex aggregate behavior.4.An agent is able to cooperate with other agents in order to perform complex ordynamic tasks. Agents may read from and write to a shared block of memory on each node, and can use this facility both to coordinate with other agents executing on that node and to leave information behind for subsequent visitors.5.An agent is able to identify and use resources specific to any node on which it findsitself. In the simulation presented in this chapter, the nodes are differentiated only by who their neighbors are (and agents do make use of this information). In a more heterogeneous network, certain nodes might have access to particular kinds of information – such as absolute location derived from a global positioning system receiver – that agents could leverage.2.3Flexible SystemsUsing small, self-directed, mobile agents as building blocks allows us to design a network architecture that is flexible in several ways. First, because of the fundamentally distributed nature of collections of agents, our architecture can scale upwards in size quite gracefully. Second, because agent populations can change over time, new usage contexts and models can be accommodated. Finally, because all system interaction is mediated by agents, multiple network management strategies can coexist and co-evolve.2.3.1Network SizeMobile agents serve as simple distributed building blocks for constructing system-level functionality. It is possible, at least in theory, to design a system using a small number of simple agents so that the interactions between agents is well-specified and so that the pattern of interactions between agents remains stable even as more blocks of the same kind are added. The development of design heuristics that are applicable to mobile agent systems is one long-term goal of our research.One specific rule of thumb (or hypothesis about system design) that has emerged from our research is the following: explicit localization of interaction makes a networked system easier to understand and can reduce or eliminate performance bottlenecks and common points of failure. For example, individual agents in our model are simple and self-contained, and their interaction is restricted to local4Nelson Minar, Kwindla Hultman Kramer, Pattie Maesmanipulation of shared memory. The simplicity of our building blocks makes it easy to conceptualize systems in which large numbers of agents work together across a network of many nodes.While an analysis of scalability is not the main focus of the experiments presented in this chapter, we have observed that the systems we design using restricted, localized communications models are more comprehensible and stable than those we have designed around more open, “sockets-and-messages” frameworks. It is worth noting that a common way of organizing a large networked system is to partition it into hierarchies smaller sub-networks. By contrast, our approach can be thought of as structuring communications using a large number of limited, overlapping spheres of activity, rather than a few discrete partitions.2.3.2Usage ModelsIt is very difficult to design a conventional network that adjusts well to either changing usage patterns over short time scales or to evolving needs and circumstances over the long haul. In contrast, a mobile agent based system can be reconfigured on the fly, in response to new situations or demands, and with or without human intervention.System-level behavior can be incrementally altered by varying the size and composition of an agent population, adding new agents dynamically to reinforce weaknesses or balance priorities. Human managers can adjust the network, and agents themselves can adapt to changing circumstances. Well-written agents can be self-regulating, dying off or spawning copies of themselves as the situation dictates. Specific sets of agents can be delegated to monitor aspects of the system, altering the mix of other agents in the population, as needed. Finally, drastic revision of capability, such as patching a security hole or rolling out a new feature all across the network, can be accomplished by flushing the system and flooding it with a new population of agents.To elaborate, populations of network agents dedicated to maintaining routing and connectivity information can specialize in several distinct ways:1.Agents can specialize with regard to usage patterns across the network. Forexample, management agents could enact economic incentives to encourage certain traffic patterns (Gibney, 1998). Or specific agents might dedicate themselves to maintaining very low-latency routes, though they would need to use a disproportionate amount of bandwidth to do so.2.Specialized agents could work to manage requirements in specific areas of anetwork. For example, a certain part of a LAN with a great deal of video traffic could deploy agents that construct and maintain high bandwidth connections.3.Agents can adapt the network infrastructure to changing needs over time. Forexample, the cost of using a relatively dormant gateway could be reduced so that it handles more traffic. Or at times of peak traffic, the population could be weighted towards less-complex, low-overhead routing agents that mostly “harvest”connectivity information from the environment, rather than explicitly constructing connections (Poor, 1997).4.Agents can specialize on behalf of specific users. An individual is likely to have apretty good idea of his or her communications needs, and should be able to carryaround a collection of agents optimized to negotiate or create personal connectivity.2.3.3Network ManagementAs several of the above examples suggest, various management models integrate quite elegantly into systems built around mobile agents. For example, applying simple economic metrics to each agent’s movement (or, more subtlely, thinking of information exchanges that enable communications as transactions) provides a decentralized framework within which particular kinds of communication can be encouraged, required, restricted or accounted for accurately.Each agent must be given tools that allow it to make contextually-specific decisions about how to use finite resources. Cost-based routing algorithms, for example (Davie, 1996) are a well-understood way to optimize multi-hop traffic across a network. Other metaphors have also been proposed, such as the pheromone following of social insects (Schoonderwoerd, 1997) (Bonabeau, 1998) (Schoonderwoerd, 1999, chapter 13 of this book). The flexibility of a mobile agents architecture would allow multiple models such as these to coexist; perhaps messaging agents with different needs would route themselves using information from different management agents, and the owners of those messages would be billed accordingly by the owners of the various management ecologies.2.4Cognitive Tools For Systems DesignIt is worth trying to separate the purely technical advantages of a system built out of mobile agents from the cognitive leverage that the mobile agents metaphor can provide to designers and programmers. Certain attributes – most notably the extreme run-time flexibility – of mobile-code architectures stand on their own as advances in systems capabilities. Most of the attributes described above, however, are as much arguments about systems designers as about systems design.As networks become more and more complex, finding abstractions that allow us to think about them in useful ways becomes more and more important. Mobile agents, as discrete pieces of code with clearly-defined functionality and privileges, are an appropriate and powerful tool for use in thinking about, specifying, and writing programs for networks of computers.The mobile agents approach can be thought of as a metaphoric extension of object-oriented programming, useful to engineers designing network systems in the same way that component software tools are useful to developers of complex desktop applications. A mobile agent encapsulates not only data and code, but an “agenda” –some intentionality, an unfolding thread of execution – into a small package. This encapsulation gives systems designers a way of creating building blocks for networks. With these building blocks it is possible to find ways of thinking about systemic behaviors that embraces changes in network size, congestion, usage patterns and user needs.6Nelson Minar, Kwindla Hultman Kramer, Pattie Maes2.5Related WorkMobile agents are an active and exciting research topic, especially as contemporary tools such as Java make mobile agent systems relatively simple to implement. A number of general arguments exist as to why the mobile agent approach is potentially useful (Chess, 1997) (White, 1996). Much research has focused on performance enhancement from resource distribution, but we believe that the most interesting and novel possibilities of mobile agent architectures lie in their adaptive nature and inherent flexibility (Baldi, 1997) (Halls, 1997).Much of the work applying mobile agents to systems infrastructure has taken place under the umbrella of active networking (Tennenhouse, 1997). Our work is closely related to that of the active networks researchers; we share a concern with the dynamic characteristics of network systems and a desire to explore the possibilities of movable bits of code in a network context. Our simple message agents behave much like active packets, using computational resources of each successive node on which they find themselves to choose a route.There are several threads of research on using mobile agents situated in a telecommunications network to manage connectivity and load balancing. Appleby and Steward’s work is an early paper suggesting using mobile agents with AI-like strategies to dynamically load-balance a telecommunication network (Appleby, 1994). Follow-up work using a design inspired by ant behavior (Bonabeau, 1998) extends these ideas in a new direction, using markers in the network environment as a means of indirect inter-agent communication (“stigmergy”).2.6Why Not Mobile Agents?A few potential disadvantages to designing networks with mobile software agents should be noted. We see this short list as a blueprint for future research rather than a set insurmountable obstacles.2.6.1EfficiencyComputational cycles are expensive and network bandwidth is precious. Messages which route themselves will consume more computational resources than statically-routed packets. And management and infrastructure agents will consume a share of bandwidth as well. Given this, it is perhaps difficult to justify these newer approaches as they seem more costly than those we use now.However, contemporary engineering approaches already have difficulty dealing with dynamic networks (Perkins, 1997), and this will only become more apparent as our networks become increasingly complex and heterogeneous. Efficiency, from this perspective, is largely determined by how well an architecture deals with a broad range of ever-changing demands. A mobile agents approach offers a rich set of tools at design time and great flexibility during the in situ lifetime of a system, stacking the deck in favor of architects, implementers and maintainers faced with the difficult task of engineering reliable, dynamic networks.Another way to think about network efficiency is as a set of necessary tradeoffs between finite resources. For example, because compute time has fallen in price morerapidly than connect time it is common to trade cpu cycles for bandwidth by compressing data before sending it across a network and decompressing it upon receipt. Architectures in which packets route themselves across our current multi-hop networks are too expensive to see widespread use at the moment. But if cheaply available silicon continues to outpace fiber, the benefits of self-routing messaging agents will come to outweigh their diminishing relative costs. Similarly, if mobile management and infrastructure agents can do a good enough job maintaining dynamic connectivity in a wireless network, then such a system could prove more efficient than a rigid, centralized system that must waste a certain amount of bandwidth in order to provide a certain level of service. The infrastructure agents could be thought of as harvesting bandwidth, rather than simply consuming it!2.6.2SecuritySecond, moving bits of executing code from computer to computer raises a number of serious questions about security. We are very concerned with building secure systems, and are working to understand the particularities of securing our networks.Mobile agents present three broad classes of security problems: protecting hosts from agents, protecting agents from hosts, and protecting agents from each other. The problem of protecting hosts from agents has attracted the most attention from researchers. We believe that standard cryptographic techniques (such as code signing) combined with sandbox- and permission-based models of security (such as those present in Java 1.2). (Oakes, 1998) are sufficient to design an execution environment that protects a computational host.The other two problems of mobile agent security – protecting agents from their hosts and from each other – have enjoyed less attention. We are actively involved in research to protect agents from each other by extending existing host security models. And there is a growing body of research on protecting agents from hosts by executing encrypted code (Tschudin 1997). Although these constitute open areas of research, progress is being made. Furthermore, in some scenarios it may be possible to avoid these security problems entirely, by carefully delineating trusted terrain within a network.Finally, it is worth noting that the fundamental difficulties we all face regarding information security are inherent in the spread of relatively open networks. As the advantages to having access to such networks generally outweigh the risks, we must all deal with questions of how to protect ourselves from both malicious attackers and poorly-written software, no matter what kinds of systems we design.2.6.3ProvabilityA third concern is that the “ecological” approach of building network behaviors from collections of cooperating agents is difficult to model mathematically, and as a result is difficult to reason about deterministically. We might call this the “unprovability”problem, and given how important contemporary software can be not only to productivity but to life and limb, it is a serious one. We typically do not want to build systems that are unreliable or unpredictable.However, it should be noted that it is extremely difficult to reason about any real-world networked system, no matter what its design, because networks of computers8Nelson Minar, Kwindla Hultman Kramer, Pattie Maesare irreducibly unreliable. Whenever it is possible that any participant in a network is potentially unreachable, is malicious, or is pathological (any of which are always possible), it becomes impossible to reason provably about the behavior of that system (Fischer, 1985) We believe that the mobile agents frameworks we are developing will become aids to reasoning about robustness and fault-tolerance, rather than additional impediments to such analysis.The remainder of this chapter presents results obtained by simulating mobile agent populations within a wireless, peer to peer network. These results support the contention that using mobile agents to manage networks has merit, as well as provide a thorough analysis of one particular solution to an important network management problem, maintaining connectivity of routing maps.3Experimental ModelFor our experiments we have defined a simple model of a dynamic wireless network and implemented a simulator to study that model. Our model is motivated by real-world wireless networks we are designing at the Media Lab, which consist of large numbers of small, low-power nodes scattered throughout our building. These nodes vary a great deal with respect to computational power, capabilities and usage – some are wearable computers, some environmental sensors or actuators, some are “gateways” attached to desktop computers, and some simply provide location-specific information to their peers. But they all share the characteristic that in order to reduce power consumption and maximize the use of a single channel they are limited to relatively short-range communication. This means that any message intended for a recipient outside the immediate vicinity will require multiple hops to reach its destination.The simulation we describe here is perforce quite simplified compared to a real, hardware implementation of such a network. However, we believe our model is realistic enough to provide guidance for designing real systems, and that our experiments have general applicability to dynamically changing, decentralized networks. This chapter extends a previous set of experiments in using mobile agent populations to perform routing, reported in (Minar, 1998). The model presented here is more complex than that presented in our earlier work; we expect to be able to directly apply the lessons from this set of experiments in the construction of real dynamic, multi-hop, RF networks.3.1NodesThe results we present derive from a simulation of a dynamic, peer to peer network. For our experiments, we chose a scenario consistent with related work by our colleagues at the Media Lab (Poor, 1997). The nodes in our system are conceived as low-power, relatively short-range, radio-frequency transceivers distributed throughout a two-dimensional space. In our simulation the total network diameter is roughly 20hops, so nodes must cooperate in a peer to peer fashion to route packets across the network. The average packet in such a system requires multiple hops to travel from source to destination; therefore, resident mobile agents need to move around the network in order to effectively gather data about the whole system.Individual nodes move slowly through simulated space, following random vectors, so that radio links form and break as the nodes move in and out of range of each other. As a result, the network topology is quite dynamic. We do assume, however, that physical links are reliable, bidirectional, and easily detectable. Every node knows who its neighbors are.Each node in our system owns a simple routing table. Each node keeps a list of per-node routing information. For each other node in the world, the table stores what node to first send a packet to. So to route a packet to an arbitrary node, a message only needs to do a lookup in its current node for the destination, and then move to the neighbor that is indicated, repeating as necessary. It is important to note that these routing tables are not updated by the nodes themselves. The nodes are completely passive; they rely on mobile agents to update their tables.We chose a network density to match our best estimates of the capabilities of low-power, single-channel RF devices, such as might be found in future personal accessories or as part of home wireless networks. Network size was chosen as large as was feasible for our data collection, 250 nodes. All of our experiments were performed with the same configuration and movement paths of nodes. A snapshot of the node placements at a typical time is presented in Figure 1.Figure 1: Snapshot of Simulated Network10Nelson Minar, Kwindla Hultman Kramer, Pattie Maes3.2AgentsIn our system the nodes are “dumb”: they run no programs of their own, they simply host agents and provide a place to store a database of routing information. The mobile agents embody the “intelligence” in the system, moving from node to node and updating routing information as they go. Routing agents have one goal: to explore the network, updating every node they visit with what they have learned in their travels.Routing agents discover edges in the network by traversing them. Each routing agent keeps a history of where it has been. When an agent lands on a node it uses the information in its history to update the routing table on its host as to what possible routes might be, by writing the best routes the agent knows about into the node's table. Each agent's memory for history information is quite small: our baseline is 25 entries. Because the agents must carry their histories with them as they move, the size of the history window is an important parameter: the longer the history, the higher the overhead of moving the agent. Our experiments investigate tradeoffs between history size and system performance.The system as a whole relies on the cooperative behavior of a population of agents. The population size is an important parameter: the more routing agents, the higher the overhead. Agents in a population don't communicate directly with one another. The algorithms presented here don't even read information from the node's routing tables –they only write to them – making their own decisions about where to go based on their personal history (or, in the case of the random agent, on “whim”). Though system performance is dependent on the behavior of the all of the agents, the individual routing agents are blind to each other. The subject of inter-agent cooperation was treated in our previous paper describing this system (Minar, 1998), and we will return to this work for future experiments.Our model is implemented as a simple, discrete event, time-step based simulation. Every step of simulated time an agent does three things. First, the agent looks at all the neighbors of the node it is on and makes a decision about to where to go next. Second, the agent moves itself to the new node, learning about the edge it travels. Third, it updates the routing table of the node it now occupies, using its own recent knowledge of the network.We test two algorithms for how an agent chooses to move. One algorithm is a “random” agent that simply moves to a randomly chosen reachable node at each opportunity. This agent provides a base of comparison for more directed algorithms. We also tested an “oldest-node” agent that preferentially visits the adjacent node it last visited longest ago (or never visited, or doesn't remember visiting). This agent uses its history to try to avoid backtracking. Intuitively, it performs its task more efficiently by not repeating its own work.3.3Experimental measurementsOur simulation system consists of 1600 lines of Java code implementing a discrete event scheduler, a graphical view, a data-collection system, and the simulated objects themselves: network nodes and mobile agents. For our experiments, we repeatedly run。