Search results for: multi-agent systems - Bridge of Knowledge

Search

Search results for: multi-agent systems

Search results for: multi-agent systems

  • International Workshop on Coordination, Organizations, Institutions, Norms and Ethics for Governance of Multi-Agent Systems (Workshop on Coordination, Organizations, Institutions and Norms in agent Systems [COIN])

    Conferences

  • Multi-objective optimization of tool wear, surface roughness, and material removal rate in finishing honing processes using adaptive neural fuzzy inference systems

    Publication
    • I. Buj - Corral
    • P. Sender
    • C. J. Luis-Pérez

    - TRIBOLOGY INTERNATIONAL - Year 2023

    Honing processes are usually employed to manufacture combustion engine cylinders and hydraulic cylinders. A crosshatch pattern is obtained that favors the oil flow. In this paper, Adaptive Neural Fuzzy Inference System (ANFIS) models were obtained for tool wear, average roughness Ra, cylindricity and material removal rate in finish honing processes. In addition, multi-objective optimization with the desirability function method...

    Full text available to download

  • Practical Application of Intelligent Agents and Multi-Agent Technology Conference

    Conferences

  • European Workshop on Modelling Autonomous Agents in a Multi-Agent World

    Conferences

  • Int. Workshop on Multi-Media Data Base Management Systems

    Conferences

  • Project Team Management Supported by an Agent-Based Model

    Publication

    This work is a continuation of a series of works about research into the use of multi-agent systems to support IT project management. Previous studies have shown the possibility of using a multi-agent in order to optimize management decisions concerning the selection of methods for project implementation. It was noted that the project manager's decisions are influenced by three fundamental parameters: the entropy of the project,...

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Ireneusz Czarnowski Prof.

    People

    IRENEUSZ CZARNOWSKI is a graduate of the Faculty of Electrical Engineering at Gdynia Maritime University. He gained a doctoral degree in the field of computer science at Poznan University of Technology and a postdoctoral degree in the field of computer science at Wroclaw University of Science and Technology. Since 1998 is associated with Gdynia Maritime University, currently is a professor of computer science in the Department...

  • Validation of an Agent and Ontology-based Information Technology Assessment System

    The aim of this paper is to present a new method of the validation of an Agent and Ontology-based Information Technology Assessment System. In the introduction part of the paper, the characteristics of the proposed multi-agent system are presented. Next, some important details regarding the ontology functionality of this system are described and an approach to its verification process is proposed. The approach employs semantic...

  • GROUP COMPOSER - System for Modeling Agents’ Team Building for Tasks

    Publication

    Multi-agent systems consist of many autonomous units, called agents, that can interact when trying to achieve their goals. The selection of interaction partners is called team formation. Three basic approaches can be considered to match multi-agent system resources to the problem at hand. To research the properties of different approaches, a software for modeling team formation in multi-agent systems has been created and is presented...

    Full text to download in external service

  • Security Information Sharing for the Polish Power System

    Publication

    - Year 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Consolidating logs in varying formats into a structured repository = konsolidacja logów w zmiennych formatach do strukturalnego repozytorium

    Publication

    During multi-agent systems development, testing and re- search, possibly voluminous logs are created at distributed agent loca-tions. These logs describe individual agents behavior and state changes. To get the complete picture of the multi-agent system working, it is necessary to consolidate these logs and to store them in a format appropriate for diverse analyzes. Specic issues arise during consolidation if the log formats are...

    Full text to download in external service

  • Bogdan Wiszniewski prof. dr hab. inż.

    Bogdan Wiszniewski graduated from Gdansk University of Technology in 1977 and was awarded an MSc in computer science and engineering with honours. In 1984 and 1998, respectively, has got his PhD and DSc. In 2006 was awarded a Professor title by the President of Poland. Lectured at the universities in Canada, US and UK.  Principal investigator or coordinator in many national and international R&D projects with the significant...

  • Scalable Maintenance of Address Mapping and Autodetecion in Environments Where Agents are Uncapable of Self-Registration

    Publication

    - Year 2013

    When working with multi-agent systems it is often desirable to manage the agent set. The existing methods of central monitoring stems from two different fields of application. The first has its roots in in computer network monitoring, the other in mutli-agent simulation environments. Both approaches are not general enough to cater for loosely controlled environments, where the total agent population is not known and often fluctuating,...

  • Centralized and Distributed Structures of Intelligent Systems for Aided Design of Ship Automation

    A design process and accepted solutions made during this process, often base on non-formalized knowledge, obtained from designer (expert) intuition and practice. There are no formalized rules assuring the correctness of design solutions. The analysis of design process of ship automation, including ship power system, shows that this process can be supported by application of the artificial intelligence elements. The article presents...

    Full text to download in external service

  • Jerzy Balicki dr hab. inż.

    People

  • Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems

    Publication

    This article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...

  • Jarosław Guziński prof. dr hab. inż.

    Jaroslaw Guzinski received M.Sc., Ph.D. and D.Sc. degrees from the Electrical Engineering Department at Technical University of Gdansk, Poland in 1994, 2000 and 2011 respectively. Since 2016 he is Associate Professor at Gdansk University of Technology. Currently he is the head of the Department of Electric Drives and Energy Conversion. From 2006 to 2009 he was involved in European Commission Project PREMAID Marie Curie, ‘Predictive...

  • Team Strategies - sem. 2022/23

    e-Learning Courses
    • T. Białaszewski

    The main aim of the course is to familiarize students with the basic problems in team strategies, such as: the use of the particle swarm optimization algorithms, the ant colony optimization, stochastic distributed searches, algorithms for team strategy, multi-agent systems, modeling intelligent cooperation, simulations of social behavior. The form of passing the course is passing the exam and completing a project task

  • Team Strategies - sem. 2023/24

    e-Learning Courses
    • T. Białaszewski

    The main aim of the course is to familiarize students with the basic problems in team strategies, such as: the use of the particle swarm optimization algorithms, the ant colony optimization, stochastic distributed searches, algorithms for team strategy, multi-agent systems, modeling intelligent cooperation, simulations of social behavior. The form of passing the course is passing the exam and completing a project task

  • Selected Features of Dynamic Voting

    Publication

    - Year 2013

    In multi-agent systems composed of autonomous agents with local knowledge, it is often desirable to aggregate their knowledge in order to make an educated decision. One of the methods of agreeing to a common decision is voting. A new history-based dynamic weight protocol allows for identification of the agents which contribute to the correct system decision. The main advantage of this approach, compared to static weighted system...

  • Influence of nanoparticle concentration on thermal properties of thermal oil-MWCNT nanofluid

    Publication

    - Applied Mechanics and Materials - Year 2016

    Results of the measurements of dynamic viscosity, thermal conductivity, electrical conductivity and pH of thermal oil-MWCNT (TO-MWCNT) nanofluid have been presented. Nanoparticles were tested at the concentration of 0.001%, 0.005%, 0.01%, 0.05%, and 0,1% by weight. Thermal oil (TO) was selected as a base liquid, because of possible application in ORC systems as an intermediate heating agent. Multi-walled carbon nanotubes were used...

  • Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS

    W wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...

    Full text available to download

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publication

    - Year 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Full text available to download

  • Application of algorithms for reasoning from imperfect knowledge in it evaluation environment

    Publication

    - Year 2009

    The paper describes concept of building multi-agent system dedicated for information technology evaluation or selection for IT enterprises management (IT_MAS). Authors present the model of Knowledge Processing Environment, which is one of main components of the solution. Either facts or rules will be based on IT specialists' experience. However, knowledge which is being acquisited from IT domain is mostly imperfect - uncertain...

  • Cooperative control in production and logistics

    Publication
    • L. Monostori
    • P. Valckenaers
    • A. Dolgui
    • H. Panetto
    • M. Brdyś
    • B. Csáji

    - ANNUAL REVIEWS IN CONTROL - Year 2015

    Classical applications of control engineering and information and communication technology (ICT) in production and logistics are often done in a rigid, centralized and hierarchical way. These inflexible approaches are typically not able to cope with the complexities of the manufacturing environment, such as the instabilities, uncertainties and abrupt changes caused by internal and external disturbances, or a large number and variety...

    Full text to download in external service

  • Concept of the agent system for the information technology evaluation

    Publication

    In this paper the concept of the agent system for the information technology evaluation has been presented. This article includes the concept description and shows abilities of using software tools which can be applicable to implementation and verification of proposed solution. The article is the part of common researches over creation solutions for information technology evaluation which range over using expert's evaluation and...

  • Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego

    Artykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...

    Full text available to download

  • Systemy Agentowe - 2022

    e-Learning Courses
    • M. Matuszek

    {mlang pl}Systemy Agentowe{mlang}{mlang en}Agent Systems{mlang}

  • Systemy Agentowe - 2023

    e-Learning Courses
    • M. Matuszek

    {mlang pl}Systemy Agentowe{mlang}{mlang en}Agent Systems{mlang}

  • Rafał Leszczyna dr hab. inż.

    Dr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...

  • Tadeusz Stolarski prof. dr hab. inż.

    People

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publication

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Full text to download in external service

  • Computer controlled systems - 2022/2023

    e-Learning Courses
    • P. Raczyński

    materiały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...

  • Reliable Document-Centric Processing in Loosely Coupled Email-Based Systems

    Publication

    - Year 2015

    Email is a simple way to exchange digital documents of any kind. The Mobile INteractive Document architecture (MIND) enables self-coordination and self-steering of document agent systems based on commonly available email services. In this paper, a mechanism for providing integrity and reliability of such an email based agent system is proposed to cope with message soft or hard bounces, user interrupts, and other unexpected events....

  • Model of management of knowledge bases in the information technology evaluation environment

    Publication

    - Year 2008

    The paper presents the model of management of knowledge bases in multi-agent system for evaluation of information technologies (IT_MAS). Such system is being developed in Gdansk Uni-versity of Technology by Information Technology Management Team. Multi-agent system is supposed to support manager level specialists during decision processes when there is identified need to buy or change any information technology. The main goal of...

  • Jerzy Konorski dr hab. inż.

    Jerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...

  • APIS – Agent Platform for Integration of Services

    The paper presents an approach to creating the platform for development and evaluation of complex tasks execution algorithms. Proposed solution is based on an agent paradigm where independent peers can cooperate and negotiate in order to execute specified tasks which are defined only by the final output description. Tasks are realized by the means of services exposed by different peers. In case when there is no single service fulfilling...

    Full text available to download

  • Verification of agent system for it project management support

    Publication

    This article is a continuation of article series telling about research about possibility of using agent system to information technology evaluation. Following article presents full conception of exploiting agent system and shows how it can support some managers works, especially in taking correct management method and information tool for project management. In this article the agent system that based on knowledge and can process...

  • Application of Intelligent Conversational Agents in E-learing Environments

    Publication

    - Year 2010

    The paper concerns intelligent tutoring systems and concentrates on apliaction of virtual mentors in distance learning environments. Different educational agent types are described. The prototype of an agent developed at Gdansk University of Technology is also presented, as well as its internal representation and construction. Benefits of virtual mentors applied in distance learning are also pointed out.

  • Detection of immunological agent by optical fiber sensor: preliminary study

    Publication

    - Proceedings of SPIE - Year 2017

    The objective of this study is the application of optical methods for detection of immunological agent concentration. As the agent we used the Cyclaid, produced by Apotex Inc. In this article we investigated different Cyclaid concentrations in water. We used a Fabry-Pérot interferometer working in a reflective mode, the measurements were performed with source with central wavelength λ = 1550 nm. The preliminary investigation have...

    Full text to download in external service

  • Waldemar Korłub dr inż.

    People

    Waldemar Korłub obtained an Eng. degree in 2011, MSc.Eng. degree in 2012 and PhD in Computer Science in 2017 granted by the Faculty of Electronics, Telecommunications and Informatics at Gdansk University of Technology. His research interests include: distributed systems mainly grid and cloud computing platforms, autonomous systems capable of self-optimization, self-management, self-healing and self-protection, artificial intelligence...

  • Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems

    Publication

    - Year 2015

    Critical Infrastructure Systems (CIS) are spatially distributed and of a network structure. The dynamics are nonlinear, uncertain and with several time scales. There is a variety of different objectives to be reliably met under a wide range of operational conditions. The operational conditions are influenced by the disturbance inputs, operating ranges of the CIS, faults in the sensors and actuators and abnormalities occurring in...

    Full text to download in external service

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text to download in external service

  • Piotr Konieczka prof. dr hab. inż.

  • Knowledge management in the processes of project requirements analysis

    Authors, based on one of popular software project management methods as RUP fo-cused on one of most important discipline in project management as requirements management. Authors decomposed the role of the business analyst and present methodological and realizational processes of knowledge managament in traditional and applied sources of knowledge tied with this role. An experiment was conducted in four project teams of all sizes,...

  • Document Agents with the Intelligent Negotiations Capability

    Publication

    The paper focus is on augmenting proactive document-agents with built -in intelligence to enable them to recognize execution context provided by devices visited durning the business process, and to reach collaboration agreement despite of their conflicting requirements. We propose a solution based on neural networks to improve simple multi-issue negotiation between the document and the device, practically with no excessive cost...

  • Tomasz Zubowicz dr inż.

    Tomasz Zubowicz has received his M.Sc. Eng. degree in Control Engineering from the Faculty of Electrical and Control Engineering at the Gda{\'n}sk University of Technology (GUT) in $2008$. He received his Ph.D. Eng. (Hons.) in the field of Control Engineering from the same faculty in $2019$. In $2012$ he became a permanent staff member at the Department of Intelligent Control and Decision Support Systems at GUT and a member of...

  • Roman Śmierzchalski prof. dr hab. inż.

    Roman Śmierzchalski born in 1956 in Gdynia. He received the M.Sc. degree in 1979, the Ph.D. degree in 1989, both from the Gdańsk University of Technology, and the D.Sc. (‘habilitation’) degree in 1999 from the Warsaw University of Technology. From 1980 to 2009 he was an academic teacher and researcher with the Gdynia Maritime University, and since 2009 he has been with the Gdansk University of Technology, where he is currently...

  • Hybrid approach to ontology specification and development

    Publication

    In this chapter a first draft of a hybrid ontology development approach is presented. The context of this method encompasses the multi-agent system equipped with knowledge bases and inferring engine. The process of ontology engineering appears as a complex issue, as it addresses different point-views of both, a client and a modeler with a requirements/system analyst. Regarding this, an approach based on the knowledge preprocessing...