Wyniki wyszukiwania dla: MULTI-AGENT SYSTEMS - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: MULTI-AGENT SYSTEMS

Wyniki wyszukiwania dla: MULTI-AGENT SYSTEMS

  • International Workshop on Coordination, Organizations, Institutions, Norms and Ethics for Governance of Multi-Agent Systems (Workshop on Coordination, Organizations, Institutions and Norms in agent Systems [COIN])

    Konferencje

  • Multi-objective optimization of tool wear, surface roughness, and material removal rate in finishing honing processes using adaptive neural fuzzy inference systems

    Publikacja
    • I. Buj - Corral
    • P. Sender
    • C. J. Luis-Pérez

    - TRIBOLOGY INTERNATIONAL - Rok 2023

    Honing processes are usually employed to manufacture combustion engine cylinders and hydraulic cylinders. A crosshatch pattern is obtained that favors the oil flow. In this paper, Adaptive Neural Fuzzy Inference System (ANFIS) models were obtained for tool wear, average roughness Ra, cylindricity and material removal rate in finish honing processes. In addition, multi-objective optimization with the desirability function method...

    Pełny tekst do pobrania w portalu

  • Practical Application of Intelligent Agents and Multi-Agent Technology Conference

    Konferencje

  • European Workshop on Modelling Autonomous Agents in a Multi-Agent World

    Konferencje

  • Int. Workshop on Multi-Media Data Base Management Systems

    Konferencje

  • Project Team Management Supported by an Agent-Based Model

    Publikacja

    This work is a continuation of a series of works about research into the use of multi-agent systems to support IT project management. Previous studies have shown the possibility of using a multi-agent in order to optimize management decisions concerning the selection of methods for project implementation. It was noted that the project manager's decisions are influenced by three fundamental parameters: the entropy of the project,...

  • Ireneusz Czarnowski Prof.

    Osoby

    IRENEUSZ CZARNOWSKI is a graduate of the Faculty of Electrical Engineering at Gdynia Maritime University. He gained a doctoral degree in the field of computer science at Poznan University of Technology and a postdoctoral degree in the field of computer science at Wroclaw University of Science and Technology. Since 1998 is associated with Gdynia Maritime University, currently is a professor of computer science in the Department...

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Validation of an Agent and Ontology-based Information Technology Assessment System

    The aim of this paper is to present a new method of the validation of an Agent and Ontology-based Information Technology Assessment System. In the introduction part of the paper, the characteristics of the proposed multi-agent system are presented. Next, some important details regarding the ontology functionality of this system are described and an approach to its verification process is proposed. The approach employs semantic...

  • GROUP COMPOSER - System for Modeling Agents’ Team Building for Tasks

    Multi-agent systems consist of many autonomous units, called agents, that can interact when trying to achieve their goals. The selection of interaction partners is called team formation. Three basic approaches can be considered to match multi-agent system resources to the problem at hand. To research the properties of different approaches, a software for modeling team formation in multi-agent systems has been created and is presented...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Consolidating logs in varying formats into a structured repository = konsolidacja logów w zmiennych formatach do strukturalnego repozytorium

    During multi-agent systems development, testing and re- search, possibly voluminous logs are created at distributed agent loca-tions. These logs describe individual agents behavior and state changes. To get the complete picture of the multi-agent system working, it is necessary to consolidate these logs and to store them in a format appropriate for diverse analyzes. Specic issues arise during consolidation if the log formats are...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Bogdan Wiszniewski prof. dr hab. inż.

    Bogdan Wiszniewski ukończył studia na Politechnice Gdańskiej w 1977 r. uzyskując tytuł zawodowy magistra inżyniera elektroniki, specjalności automatyka i informatyka. W 1984 r. uzyskał stopień naukowy doktora nauk technicznych, w 1998 r. doktora habilitowanego, a w 2006 r. tytuł profesora. Wykładał na uniwersytetach w Kanadzie, Stanach Zjednoczonych i Wielkiej Brytanii. Był głównym wykonawcą lub koordynatorem kilkunastu krajowych...

  • Scalable Maintenance of Address Mapping and Autodetecion in Environments Where Agents are Uncapable of Self-Registration

    Publikacja

    - Rok 2013

    When working with multi-agent systems it is often desirable to manage the agent set. The existing methods of central monitoring stems from two different fields of application. The first has its roots in in computer network monitoring, the other in mutli-agent simulation environments. Both approaches are not general enough to cater for loosely controlled environments, where the total agent population is not known and often fluctuating,...

  • Centralized and Distributed Structures of Intelligent Systems for Aided Design of Ship Automation

    A design process and accepted solutions made during this process, often base on non-formalized knowledge, obtained from designer (expert) intuition and practice. There are no formalized rules assuring the correctness of design solutions. The analysis of design process of ship automation, including ship power system, shows that this process can be supported by application of the artificial intelligence elements. The article presents...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Jerzy Balicki dr hab. inż.

    Osoby

  • Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems

    Publikacja

    This article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...

  • Jarosław Guziński prof. dr hab. inż.

    STOPNIE NAUKOWE 2021 Tytuł profesora nauk inżynieryjno-technicznych. 2012  Stopień doktora habilitowanego nauk technicznych – Wydział Elektrotechniki i Automatyki PG. Rozprawa habilitacyjna „Układy napędowe z silnikami indukcyjnymi i filtrami wyjściowymi falowników. Zagadnienia wybrane”. Kolokwium i nadanie stopnia doktora habilitowanego 29 maja 2012 r. Monografia uzyskała nagrodę naukową Wydziału IV Nauk Technicznych Polskiej...

  • Team Strategies - sem. 2022/23

    Kursy Online
    • T. Białaszewski

    The main aim of the course is to familiarize students with the basic problems in team strategies, such as: the use of the particle swarm optimization algorithms, the ant colony optimization, stochastic distributed searches, algorithms for team strategy, multi-agent systems, modeling intelligent cooperation, simulations of social behavior. The form of passing the course is passing the exam and completing a project task

  • Team Strategies - sem. 2023/24

    Kursy Online
    • T. Białaszewski

    The main aim of the course is to familiarize students with the basic problems in team strategies, such as: the use of the particle swarm optimization algorithms, the ant colony optimization, stochastic distributed searches, algorithms for team strategy, multi-agent systems, modeling intelligent cooperation, simulations of social behavior. The form of passing the course is passing the exam and completing a project task

  • Selected Features of Dynamic Voting

    Publikacja

    - Rok 2013

    In multi-agent systems composed of autonomous agents with local knowledge, it is often desirable to aggregate their knowledge in order to make an educated decision. One of the methods of agreeing to a common decision is voting. A new history-based dynamic weight protocol allows for identification of the agents which contribute to the correct system decision. The main advantage of this approach, compared to static weighted system...

  • Influence of nanoparticle concentration on thermal properties of thermal oil-MWCNT nanofluid

    Publikacja

    - Applied Mechanics and Materials - Rok 2016

    Results of the measurements of dynamic viscosity, thermal conductivity, electrical conductivity and pH of thermal oil-MWCNT (TO-MWCNT) nanofluid have been presented. Nanoparticles were tested at the concentration of 0.001%, 0.005%, 0.01%, 0.05%, and 0,1% by weight. Thermal oil (TO) was selected as a base liquid, because of possible application in ORC systems as an intermediate heating agent. Multi-walled carbon nanotubes were used...

  • Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS

    W wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...

    Pełny tekst do pobrania w portalu

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publikacja

    - Rok 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Pełny tekst do pobrania w portalu

  • Application of algorithms for reasoning from imperfect knowledge in it evaluation environment

    Publikacja

    - Rok 2009

    The paper describes concept of building multi-agent system dedicated for information technology evaluation or selection for IT enterprises management (IT_MAS). Authors present the model of Knowledge Processing Environment, which is one of main components of the solution. Either facts or rules will be based on IT specialists' experience. However, knowledge which is being acquisited from IT domain is mostly imperfect - uncertain...

  • Cooperative control in production and logistics

    Publikacja
    • L. Monostori
    • P. Valckenaers
    • A. Dolgui
    • H. Panetto
    • M. Brdyś
    • B. Csáji

    - ANNUAL REVIEWS IN CONTROL - Rok 2015

    Classical applications of control engineering and information and communication technology (ICT) in production and logistics are often done in a rigid, centralized and hierarchical way. These inflexible approaches are typically not able to cope with the complexities of the manufacturing environment, such as the instabilities, uncertainties and abrupt changes caused by internal and external disturbances, or a large number and variety...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Concept of the agent system for the information technology evaluation

    Publikacja

    In this paper the concept of the agent system for the information technology evaluation has been presented. This article includes the concept description and shows abilities of using software tools which can be applicable to implementation and verification of proposed solution. The article is the part of common researches over creation solutions for information technology evaluation which range over using expert's evaluation and...

  • Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego

    Artykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...

    Pełny tekst do pobrania w portalu

  • Systemy Agentowe - 2022

    Kursy Online
    • M. Matuszek

    {mlang pl}Systemy Agentowe{mlang}{mlang en}Agent Systems{mlang}

  • Systemy Agentowe - 2023

    Kursy Online
    • M. Matuszek

    {mlang pl}Systemy Agentowe{mlang}{mlang en}Agent Systems{mlang}

  • Rafał Leszczyna dr hab. inż.

    Dr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...

  • Tadeusz Stolarski prof. dr hab. inż.

    Osoby

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publikacja

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Computer controlled systems - 2022/2023

    Kursy Online
    • P. Raczyński

    materiały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...

  • Reliable Document-Centric Processing in Loosely Coupled Email-Based Systems

    Publikacja

    - Rok 2015

    Email is a simple way to exchange digital documents of any kind. The Mobile INteractive Document architecture (MIND) enables self-coordination and self-steering of document agent systems based on commonly available email services. In this paper, a mechanism for providing integrity and reliability of such an email based agent system is proposed to cope with message soft or hard bounces, user interrupts, and other unexpected events....

  • Model of management of knowledge bases in the information technology evaluation environment

    Publikacja

    - Rok 2008

    The paper presents the model of management of knowledge bases in multi-agent system for evaluation of information technologies (IT_MAS). Such system is being developed in Gdansk Uni-versity of Technology by Information Technology Management Team. Multi-agent system is supposed to support manager level specialists during decision processes when there is identified need to buy or change any information technology. The main goal of...

  • Jerzy Konorski dr hab. inż.

    Jerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...

  • APIS – Agent Platform for Integration of Services

    The paper presents an approach to creating the platform for development and evaluation of complex tasks execution algorithms. Proposed solution is based on an agent paradigm where independent peers can cooperate and negotiate in order to execute specified tasks which are defined only by the final output description. Tasks are realized by the means of services exposed by different peers. In case when there is no single service fulfilling...

    Pełny tekst do pobrania w portalu

  • Verification of agent system for it project management support

    Publikacja

    This article is a continuation of article series telling about research about possibility of using agent system to information technology evaluation. Following article presents full conception of exploiting agent system and shows how it can support some managers works, especially in taking correct management method and information tool for project management. In this article the agent system that based on knowledge and can process...

  • Application of Intelligent Conversational Agents in E-learing Environments

    Publikacja

    - Rok 2010

    The paper concerns intelligent tutoring systems and concentrates on apliaction of virtual mentors in distance learning environments. Different educational agent types are described. The prototype of an agent developed at Gdansk University of Technology is also presented, as well as its internal representation and construction. Benefits of virtual mentors applied in distance learning are also pointed out.

  • Detection of immunological agent by optical fiber sensor: preliminary study

    Publikacja

    - Proceedings of SPIE - Rok 2017

    The objective of this study is the application of optical methods for detection of immunological agent concentration. As the agent we used the Cyclaid, produced by Apotex Inc. In this article we investigated different Cyclaid concentrations in water. We used a Fabry-Pérot interferometer working in a reflective mode, the measurements were performed with source with central wavelength λ = 1550 nm. The preliminary investigation have...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Waldemar Korłub dr inż.

    Osoby

    Waldemar Korłub uzyskał tytuł inżyniera w 2011 roku, tytuł magistra w 2012 roku oraz stopień doktora w dyscyplinie informatyki w 2017 roku na Wydziale Elektroniki Telekomunikacji i Informatyki Politechniki Gdańskiej. Jego zainteresowania naukowe obejmują: systemy rozproszone ze szczególnym uwzględnieniem systemów typu grid i chmur obliczeniowych, systemy autonomiczne zdolne do samodzielnej optymalizacji, zarządzania zasobami, ochrony...

  • Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems

    Publikacja

    - Rok 2015

    Critical Infrastructure Systems (CIS) are spatially distributed and of a network structure. The dynamics are nonlinear, uncertain and with several time scales. There is a variety of different objectives to be reliably met under a wide range of operational conditions. The operational conditions are influenced by the disturbance inputs, operating ranges of the CIS, faults in the sensors and actuators and abnormalities occurring in...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Approach to security assessment of critical infrastructures' information systems

    Publikacja

    - IET Information Security - Rok 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Piotr Konieczka prof. dr hab. inż.

  • Knowledge management in the processes of project requirements analysis

    Authors, based on one of popular software project management methods as RUP fo-cused on one of most important discipline in project management as requirements management. Authors decomposed the role of the business analyst and present methodological and realizational processes of knowledge managament in traditional and applied sources of knowledge tied with this role. An experiment was conducted in four project teams of all sizes,...

  • Document Agents with the Intelligent Negotiations Capability

    Publikacja

    The paper focus is on augmenting proactive document-agents with built -in intelligence to enable them to recognize execution context provided by devices visited durning the business process, and to reach collaboration agreement despite of their conflicting requirements. We propose a solution based on neural networks to improve simple multi-issue negotiation between the document and the device, practically with no excessive cost...

  • Tomasz Zubowicz dr inż.

    Tomasz Zubowicz has received his M.Sc. Eng. degree in Control Engineering from the Faculty of Electrical and Control Engineering at the Gda{\'n}sk University of Technology (GUT) in $2008$. He received his Ph.D. Eng. (Hons.) in the field of Control Engineering from the same faculty in $2019$. In $2012$ he became a permanent staff member at the Department of Intelligent Control and Decision Support Systems at GUT and a member of...

  • Hybrid approach to ontology specification and development

    Publikacja

    In this chapter a first draft of a hybrid ontology development approach is presented. The context of this method encompasses the multi-agent system equipped with knowledge bases and inferring engine. The process of ontology engineering appears as a complex issue, as it addresses different point-views of both, a client and a modeler with a requirements/system analyst. Regarding this, an approach based on the knowledge preprocessing...

  • Simulating Malware with MAlSim

    Publikacja

    - Rok 2008

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...