نتایج جستجو برای: self organized multi agent systems
تعداد نتایج: 2256230 فیلتر نتایج به سال:
Threat diagnostic, using AND/OR tree and risk analysis, is a mechanism to protect mobile agents against malicious host attacks. The method is based on analyzing the probable causes of mobile agent failure to perform its intended function. It uses the symptoms of different types of malicious host attacks and arranges them in a logical order depending on the expected outcomes. We provide a method...
Personalized recommendation systems can help people to find interesting things and they are widely used in the world. Hybrid peer-to-peer recommendation systems intend to resolve problems of C/S recommendation systems by distributing items and calculating missions to all users. This paper presents our recent research work on the new self-organized personalized recommendation system based on pur...
This paper presents a new multi-agent system architecture for the RoboCup simulation league. It includes a behavior-based two-layer dynamic agent architecture, a behavior-based decision algorithm, and a role-based dynamic multi-agent cooperation model. A self-confidence function is proposed for the first time and is used to balance decisions and multi-agent cooperation. This architecture has be...
An open issue in self-organisation is how to control the emergence of behaviour. This issue is also of interest for engineering holonic multi-agent systems as any level of a holarchy is dependant of the emergent behaviours of its sub-levels. In order to tackle this specific feature of holonic multi-agent systems, the capacity concept which abstracts a know-how from its concrete realisation is i...
Agent Oriented Software Engineering (AOSE) is a software paradigm that has grasped the attention of researchers the last few years. As a result, many different methods have been introduced to enable developers develop multi-agent systems. However, so far, security requirements have been mainly neglected, and the common approach towards the inclusion of security within a system is to identify se...
The stringent requirements of mobile edge computing (MEC) applications and functions fathom the high capacity dense deployment MEC hosts to upcoming wireless networks. However, operating such can significantly increase energy consumption. Thus, a base station (BS) unit act as self-powered BS. In this article, an effective dispatch mechanism for networks with capabilities is studied. First, two-...
The field of robotics is currently undergoing a change toward creation of robots that can naturally interact with humans. For achieving this, interactive robots must be endowed with natural interfaces that can sense and respond in real-time. Vision can provide handy information for this purpose by detecting and tracking human limbs to analyze gestures, actions and even emotions. However, real-t...
mobile-ad-hoc-networks (manets) are self-configuring networks of mobile nodes, which communicate through wireless links. the infrastructure of a mobile ad hoc network (manet) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. the main issues in manets include the mobility of the network nodes, the scarcity of computati...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید