1 Case Studies of Mobile Agent for Monitoring the Activities of Users Samson A. Arekete Computer Science Department, Redeemer’s University, Ede, Nigeria E-mail: areketes@run.edu.ng Charles O. Akinyokun Computer Science Department, Federal University of Technology, Akure, Nigeria E-mail: admin@akinyokun.com Abstract - A mobile agent application was developed to monitor the activities of users in a network environment. The application adopted the Java Agent Development Environment (JADE) framework to achieve agent lifecycle management and mobility. The software laboratory of the Redeemer’s University was used as a test case. Data collected where subjected to simple Pareto analysis, that is, how many processes consumed 80% of the physical memory. While loads were fairly distributed on some nodes, a few processes took over the memory resources of some of the node, resulting in an unhealthy state. The mobile agent can help the system administrator to effectively monitor activities of users in their network. Keywords: Users’ activities, monitoring, mobile agents, mobility. 1. INTRODUCTION Activities of a user can impact on the resources of the local node as well as the network. Of particular interest in this research is physical memory usage of the system. User’s activities reflect in terms of processes initiated by the user (denoted as ). In a multi-processing and multi-programming computing environment, a user can initiate a number of processes which can run concurrently. In addition, anytime a computer system is started, a number of processes are also initiated by the operating system. These fall into two categories: the compulsory processes () and the optional processes (). While the compulsory processes must always run because they help to manage the computer system and provide services to users, the optional processes are pre-loaded applications that are loaded at the startup on behalf of the user. In the face of limited node resources, the optional processes can be terminated or killed to improve the performance of the system. Let denote the total processes running on a node defined by: = ሺͳሻ ଷ ୀଵ Let = ୀଵ ሺʹሻ = ୀଵ ሺ͵ሻ = ୀଵ ሺͶሻ where a, b and c are finite. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 5, May 2017 104 https://sites.google.com/site/ijcsis/ ISSN 1947-5500