Work place: Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia
E-mail: yasirarfat081@gmail.com
Website:
Research Interests: Software Construction, Software Deployment, Software Engineering, Computer systems and computational processes, Hardware Security, Network Security
Biography
Yasir Arfat is currently a M.S. student at King Abdulaziz University, Jeddah, Saudi Arabia. He received his BS (SE) degree in Software Engineering with Distinction from University of Azad, Jammu &Kashmir, Pakistan in 2011. His research interests include network security, software security, software agent systems and exascale systems
By Yasir Arfat Fathy Elbouraey Eassa
DOI: https://doi.org/10.5815/ijitcs.2016.09.06, Pub. Date: 8 Sep. 2016
A multi-agent system (MAS) is formed by a number of agents connected together to achieve the desired goals specified by the design. Usually in a multi agent system, agents work on behalf of a user to accomplish given goals. In MAS co-ordination, co-operation, negotiation and communication are important aspects to achieve fault tolerance in MAS. The multi-agent system is likely to fail in a distributed environment and as an outcome of such, the resources for MAS may not be available due to the failure of an agent, machine crashes, process failure, software failure, communication failure and/or hardware failure. Therefore, many researchers have proposed fault tolerance approaches to overcome the failure in MAS. So we have surveyed these approaches in this paper, whereby our contribution is threefold. Firstly, we have provided taxonomy of faults and techniques in MAS. Secondly, we have provided a qualitative comparison of existing fault tolerance approaches. Thirdly, we have provided an evaluation of existing fault tolerance techniques. Results show that most of the existing schemes are not very efficient, due to various reasons like high computation costs, costly replication and large communication overheads.
[...] Read more.By Yasir Arfat Riaz Ahmed Shaikh
DOI: https://doi.org/10.5815/ijwmt.2016.03.02, Pub. Date: 8 May 2016
Wireless Sensor Networks (WSNs) are typically formed by collaboration of the large amount of partial sensor nodes, which are connected through wireless medium. In wireless sensor network, security is an essential aspect because of its usage in applications like monitoring, tracking, controlling, surveillance etc. Secure communication is extremely crucial in delivering vital information accurately and on the time through resource constraint sensor nodes. In this paper, our contribution is threefold. Firstly, we have summarized the network layer routing attacks on WSNs. Secondly, we have provided taxonomy of secure routing protocols of WSNs. Thirdly, we have provided a qualitative comparison of existing secure routing protocols. Results show that most of the existing secure routing schemes are not very efficient due to various reasons like high-energy consumption, and large communication overhead.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals