Filtry
wszystkich: 11108
-
Katalog
- Publikacje 7854 wyników po odfiltrowaniu
- Czasopisma 51 wyników po odfiltrowaniu
- Konferencje 27 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 171 wyników po odfiltrowaniu
- Wynalazki 22 wyników po odfiltrowaniu
- Projekty 52 wyników po odfiltrowaniu
- Laboratoria 3 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 7 wyników po odfiltrowaniu
- Kursy Online 173 wyników po odfiltrowaniu
- Wydarzenia 14 wyników po odfiltrowaniu
- Dane Badawcze 2732 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: multi-agent system
-
Rafał Leszczyna dr hab. inż.
OsobyDr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...
-
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
APIS – Agent Platform for Integration of Services
PublikacjaThe paper presents an approach to creating the platform for development and evaluation of complex tasks execution algorithms. Proposed solution is based on an agent paradigm where independent peers can cooperate and negotiate in order to execute specified tasks which are defined only by the final output description. Tasks are realized by the means of services exposed by different peers. In case when there is no single service fulfilling...
-
Detection of immunological agent by optical fiber sensor: preliminary study
PublikacjaThe objective of this study is the application of optical methods for detection of immunological agent concentration. As the agent we used the Cyclaid, produced by Apotex Inc. In this article we investigated different Cyclaid concentrations in water. We used a Fabry-Pérot interferometer working in a reflective mode, the measurements were performed with source with central wavelength λ = 1550 nm. The preliminary investigation have...
-
Reliable Document-Centric Processing in Loosely Coupled Email-Based Systems
PublikacjaEmail is a simple way to exchange digital documents of any kind. The Mobile INteractive Document architecture (MIND) enables self-coordination and self-steering of document agent systems based on commonly available email services. In this paper, a mechanism for providing integrity and reliability of such an email based agent system is proposed to cope with message soft or hard bounces, user interrupts, and other unexpected events....
-
Document Agents with the Intelligent Negotiations Capability
PublikacjaThe paper focus is on augmenting proactive document-agents with built -in intelligence to enable them to recognize execution context provided by devices visited durning the business process, and to reach collaboration agreement despite of their conflicting requirements. We propose a solution based on neural networks to improve simple multi-issue negotiation between the document and the device, practically with no excessive cost...
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublikacjaW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
JamesBot - an intelligent agent playing StarCraft II
PublikacjaThe most popular method for optimizing a certain strategy based on a reward is Reinforcement Learning (RL). Lately, a big challenge for this technique are computer games such as StarCraft II which is a real-time strategy game, created by Blizzard. The main idea of this game is to fight between agents and control objects on the battlefield in order to defeat the enemy. This work concerns creating an autonomous bot using reinforced...
-
Cognitum Ontorion: Knowledge Representation and Reasoning System
PublikacjaAt any point of human activity, knowledge and expertise are a key factors in understanding and solving any given problem. In present days, computer systems have the ability to support their users in an efficient and reliable way in gathering and processing knowledge. In this chapter we show how to use Cognitum Ontorion system in this areas. In first section, we identify emerging issues focused on how to represent and inference...
-
Designing optimal operational-point trajectories using an intelligent sub-strategy agent-based approach
PublikacjaW rozdziale opisuje się metodę projektowania optymalnej i bezpiecznego sterowania nieliniowymi procesami dynamicznymi. Poszukiwane sterowanie jest wynikiem zastosowania elementarnej strategii poszczególnych agentów, realizujšcych zadanie minimalizacji wspólnej miary kosztu sterowania. Zagadnienie projektowania optymalnego sterowania traktowane jest jako proces decyzyjny, w którym decyzje podejmowane sš w kolejnych regionach przestrzeni...
-
Designing optimal operational-point trajectories using an intelligent sub-strategy agent-based approach
PublikacjaW rozdziale opisuje się metodę projektowania optymalnej i bezpiecznego sterowania nieliniowymi procesami dynamicznymi. Poszukiwane sterowanie jest wynikiem zastosowania elementarnej strategii poszczególnych agentów, realizujących zadanie minimalizacji wspólnej miary kosztu sterowania. Zagadnienie projektowania optymalnego sterowania traktowane jest jako proces decyzyjny, w którym decyzje podejmowane są w kolejnych regionach przestrzeni...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublikacjaModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
AUTOMATED NEGOTIATIONS OVER COLLABORATION PROTOCOL AGREEMENTS
PublikacjaThe dissertation focuses on the augmentation of proactive document - agents with built-in intelligence to recognize execution context provided by devices visited during a business process, and to reach collaboration agreement despite conflicting requirements. The proposed solution, based on intelligent bargaining using neural networks to improve simple multi-issue negotiation between the document and thedevice, requires practically...
-
Cognitum Ontorion: Knowledge Representation and Reasoning System
Publikacja“If knowledge can create problems, it is not through ignorance that we can solve them.” (Isaac Asimov). Nevertheless, at any point of human activity, knowledge (besides practice) is a key factor in understanding and solving any given problem. Nowadays, computer systems have the ability to support their users in an efficient and reliable way. In this paper we present and describe the functionality of the Cognitum Ontorion system....
-
Anonymity Architecture for Mobile Agent Systems
PublikacjaThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Wiktoria Wojnicz dr hab. inż.
OsobyDSc in Mechanics (in the field of Biomechanics) - Lodz Univeristy of Technology, 2019 PhD in Mechanics (in the field of Biomechanics) - Lodz Univeristy of Technology, 2009 (with distinction) Publikacje z listy MNiSW (2009 - ) Wojnicz W., Wittbrodt E., Analysis of muscles' behaviour. Part I. The computational model of muscle. Acta of Bioengineering and Biomechanics, Vol. 11, No.4, 2009, p. 15-21 Wojnicz W., Wittbrodt E.,...
-
Thermo-Chemical Decomposition Study of Polyurethane Elastomer Through Glycerolysis Route with Using Crude and Refined Glycerine as a Transesterification Agent
PublikacjaDue to the increasing amount of polyurethane waste, chemical recycling of these materials is a topic of growing interest for many researchers. The primary pur- pose of polyurethane feedstock recycling is to recover the starting polyol. In this study glycerolysis using glycerine from two sources and two purity grades is proposed as a method of chemical recycling. The main effort of this paper focuses on the employment of commercial...
-
Selection of derivatisation agents for chlorophenols determination with multicriteria decision analysis
PublikacjaThe paper shows very systematic method of selection of derivatisation agents for a given group of analytes. In this study 8 derivatisation agents are assessed for their capability to derivatise 8 chlorophenols. Multicriteria decision analysis is used to combine many objectives of derivatisation agents selection into single, easy to be interpreted numerical value. Three basic analyses were performed to obtain rankings with the aims...
-
Cross-Linking, Morphology, and Physico-Mechanical Properties of GTR/SBS Blends: Dicumyl Peroxide vs. Sulfur System
PublikacjaIn this work, ground tire rubber and styrene–butadiene block copolymer (GTR/SBS) blends at the ratio of 50/50 wt%, with the application of four different SBS copolymer grades (linear and radial) and two types of cross-linking agent (a sulfur-based system and dicumyl peroxide), were prepared by melt compounding. The rheological and cross-linking behavior, physico-mechanical parameters (i.e., tensile properties, abrasion resistance,...
-
Tomasz Zubowicz dr inż.
OsobyTomasz Zubowicz has received his M.Sc. Eng. degree in Control Engineering from the Faculty of Electrical and Control Engineering at the Gda{\'n}sk University of Technology (GUT) in $2008$. He received his Ph.D. Eng. (Hons.) in the field of Control Engineering from the same faculty in $2019$. In $2012$ he became a permanent staff member at the Department of Intelligent Control and Decision Support Systems at GUT and a member of...
-
Influence of nanoparticle concentration on thermal properties of thermal oil-MWCNT nanofluid
PublikacjaResults of the measurements of dynamic viscosity, thermal conductivity, electrical conductivity and pH of thermal oil-MWCNT (TO-MWCNT) nanofluid have been presented. Nanoparticles were tested at the concentration of 0.001%, 0.005%, 0.01%, 0.05%, and 0,1% by weight. Thermal oil (TO) was selected as a base liquid, because of possible application in ORC systems as an intermediate heating agent. Multi-walled carbon nanotubes were used...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Piotr Szczuko dr hab. inż.
OsobyDr hab. inż. Piotr Szczuko w 2002 roku ukończył studia na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej zdobywając tytuł magistra inżyniera. Tematem pracy dyplomowej było badanie zjawisk jednoczesnej percepcji obrazu cyfrowego i dźwięku dookólnego. W roku 2008 obronił rozprawę doktorską zatytułowaną "Zastosowanie reguł rozmytych w komputerowej animacji postaci", za którą otrzymał nagrodę Prezesa Rady...
-
DICTOBOT - autonomiczny agent ze zdolnością komunikacji
PublikacjaNiniejszy artykuł zdaje sprawę z opracowanego sposobu budowy autonomicznego agenta komunikującego się z otoczeniem w sposób werbalny. Agent taki, opierający się na formalnym, matematycznym modelu psychologii osobowości człowieka, w zależności od stanu emocjonalnego, w jakim się znajduje, w odpowiedni sposób interpretuje usłyszane kwestie oraz formułuje swoją wypowiedź. Jednocześnie, w zależności od stopnia spełnienia swoich potrzeb,...
-
Agent-based social network as a simulation of a market behaviour
PublikacjaRecent years and the outbreak of world's economic crisis in 2008 proved the crucial importance of reliable analysis of market dynamics. However, werarely apply models of proper detail level (the global prosperity forecast of 2007 can be seen as a grim proof). The behaviour of individuals and companies is far from being ideal and rational. Many claims that the economic paradigm of rational expectations (coming from J. Muth and R....
-
Fluctuation-Enhanced Sensing for Biological Agent Detection and Identification
PublikacjaPrzedstawiono wcześniejsze wyniki badań dotyczące trzech różnych sposobów wykrywania obecności substancji biologicznych za pomocą zjawisk fluktuacyjnych: 1) wirusów wnikających do komórek, 2) zapachów emitowanych przez mikroby, 3) rozkładu widma i wartości chwilowych szumów podczas rozpraszania światła używanego do wykrywania zarodników na podstawie wyznaczenia współczynnika dyfuzji opisująceo ich ruch.We survey and show our earlier...
-
Investigation of polyurethane elastomer–steel joints using glass lacquer as an adhesive agent
PublikacjaThis article describes an innovative method of coupling polyurethane elastomer (based on polyurethane glycolysate) with constructional steel, by implementation of a Glaspur®—glass lacquer containing latent polyurethanes and monosilane adhesion promoters. The commonly applied coupling agent is Cilbond® 45SF glue or its derivatives. Additionally, glycolysate was synthesised from polyurethane waste and 1,3-propylene glycol in 6:1...
-
The impact of the temperament model on the behavior of an autonomous driver
PublikacjaBecause it is generally believed that the personality and temperament of a human driver influence his/her behavior on the road, the article presents a computational model of the temperament of an autonomous agent - a driver. First, a short review of the four ideas of Galen’s temperament in psychology is presented. Temperament traits are grouped into four other sets, one of which is chosen for implementation in the project of integration...
-
Wpływ smarowności na działania układu tribologicznego (impact of lubricity on the tribological system action)
Publikacjathe paper presents analysis and evaluation, based on tests results, of the impact of lubricity of the used lubricating oils (shell argina t 40) on the action of boundary layer of sulzer 6zl40/48 engines aboard the ''włocławek'' sea-going ship. for comparison purposes, the same oils were tested with the ceramizer four-stroke engine (all types of the vidar four-stroke engines) regeneration agent added. so understood boundary layer...
-
Piotr Konieczka prof. dr hab. inż.
Osoby -
Collision-free network exploration
PublikacjaMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Synthesis of 2-amino-2,6-dideoxy-D-glucitol-6-sulfonic acid as a potential antifungal agent.
PublikacjaGlucosamine-6P (GlcN-6P) synthase catalyzes the first committed step in the biosynthetic pathway leading to the formation of UDP-GlcNAc, a sugar nucleotide precursor providing D-glucosamine for the formation of chitin and manoproteins. 2-Amino-2,6-dideoxy-D-glucitol-6-sulfonic acid is an analog of 2-amino-2-deoxy-D-glucitol 6-phosphate (GlcN-ol-6-P), a known inhibitor of GlcN-6-P synthase, in which the phosphate group of the latter...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublikacjaIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Deterministic rendezvous of asynchronous bounded-memory agents in polygonal terrains
PublikacjaWe consider two versions of the rendezvous problem: exact RV, when the points representing agents have to coincide at some time, and e-RV, when these points have to get at distance less than e in the terrain. In any terrain, each agent chooses its trajectory, but the movements of the agent on this trajectory are controlled by an adversary that may, e.g. speed up or slow down the agent.
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Optimizing Control of Wastewater Treatment Plant With Reinforcement Learning: Technical Evaluation of Twin-Delayed Deep Deterministic Policy Gradient Agent
PublikacjaControl of the wastewater treatment processes presents significant challenges due to the fluctuating nature of inflow and wastewater composition, alongside the system’s non-linear dynamics. Traditional control methods struggle to adapt to these variations, leading to an economically suboptimal operation of the process and a violation of norms imposed on the quality of wastewater discharged to the catchment area. This study proposes...
-
Inteligentne systemy agentowe w systemach zdalnego nauczania
PublikacjaW pracy omówiono inteligentne systemy agentowe w systemach zdalnego nauczania. Po krótkim przedstawieniu ewolucji systemów zdalnego nauczania i ich wybranych zastosowań, scharakteryzowano inteligentne agenty edukacyjne. Omówiono wykorzystanie programowania genetycznego oraz algorytmów neuro-ewolucyjnych do implementacji oprogramowania tej klasy. Ponadto, nawiązano do modelu Map-Reduce, który efektywnie wspiera architekturę nowoczesnego...
-
Emotions Embodied in the SVC of an Autonomous Driver System
PublikacjaA concept of embodied intelligence (EI) is considered. None of such implementations can be fully identified with artificial intelligence. Projects that dare to approach AI and EI should be based on both the AI concepts (symbolic and sub-symbolic), in solving real problems of perception and decision-making. Therefore, the EI, in this paper, is understood as a methodology that uses all available resources and algorithms from the...
-
The overexpression of CPR and P450 3A4 in pancreatic cancer cells changes the metabolic profile and increases the cytotoxicity and pro-apoptotic activity of acridine antitumor agent, C-1748
PublikacjaDrug resistance is one of the major cause of pancreatic cancer treatment failure. Thus, it is still imperative to develop new active compounds and novel approach to improve drug efficacy. Here we present 9-amino-1-nitroacridine antitumor agent, C-1748, developed in our laboratory, as a candidate for pancreatic cancer treatment. We examined (i) the cellular response of pancreatic cancer cell lines: Panc-1, MiaPaCa-2, BxPC-3 and...
-
Kazimierz Darowicki prof. dr hab. inż.
OsobyStudia wyższe ukończyłem w czerwcu 1981 roku po zdaniu egzaminu dyplomowego i obronie pracy magisterskiej. Opiekunem pracy magisterskiej był dr hab. inż. Tadeusz Szauer. W roku 1991, 27 listopada uzyskałem stopień naukowy broniąc pracę doktorską zatytułowaną „Symulacyjna i korelacyjna analiza widm immitancyjnych inhibitowanej reakcji elektrodowej”. Promotorem pracy był prof. dr hab. inż. Józef Kubicki (Wydział Chemiczny...
-
Inspired by Nature: The Use of Plant-derived Substrate/Enzyme Combinations to Generate Antimicrobial Activity in situ
PublikacjaThe last decade has witnessed a renewed interest in antimicrobial agents. Plants have received particular attention and frequently rely on the spontaneous enzymatic conversion of an inactive precursor to an active agent. Such two-component substrate/enzyme defence systems can be reconstituted ex vivo. Here, the alliin/alliinase system from garlic seems to be rather effective against Saccharomyces cerevisiae, whilst the glucosinolate/myrosinase...
-
System wykrywania i przeciwdziałania spoofingowi GPS
PublikacjaSpoofing w systemach nawigacji satelitarnej jest atakiem elektronicznym, który polega na nieuprawnionej emisji sygnałów stanowiących imitacje rzeczywistych sygnałów odbieranych z satelitów. Powoduje on wyznaczenie nieprawidłowych informacji o czasie, położeniu i prędkości odbiornika. Z uwagi na trudność jego wykrycia, spoofing stanowi poważniejsze zagrożenie niż proste zagłuszanie sygnałów zakłóceniem o dużej mocy (ang. jamming)....
-
Neural network agents trained by declarative programming tutors
PublikacjaThis paper presents an experimental study on the development of a neural network-based agent, trained using data generated using declarative programming. The focus of the study is the application of various agents to solve the classic logic task – The Wumpus World. The paper evaluates the effectiveness of neural-based agents across different map configurations, offering a comparative analysis to underline the strengths and limitations...
-
A facile structural manipulation strategy to prepare ultra-strong, super-tough, and thermally stable polylactide/nucleating agent composites
PublikacjaPolylactide (PLA) is a biodegradable thermoplastic widely used in diferent felds, but it should be adequately modifed considering high-performance applications. However, the current processes for developing PLA materials achieve high strength at the expense of toughness or ductility of the materials. Therefore, there is need to develop new strategies for generation of PLA materials with high strength, great toughness, good ductility,...
-
Imidazoacridinone antitumor agent C-1311 as a selective mechanism- based inactivator of human cytochrome P450 1A2 and 3A4 isoenzymes.
Publikacja5-Diethylaminoethylamino-8-hydroxyimidazoacridinone (C-1311), a promising antitumor agent that is also active against autoimmune diseases, was determined to be a selective inhibitor of the cytochrome P450 (CYP) 1A2 and 3A4 isoenzymes. Therefore, C-1311 might modulate the effectiveness of other drugs used in multidrug therapy. The present work aimed to identify the mechanism of the observed C-1311-mediated inactivation of CYP1A2...
-
Qualia: About Personal Emotions Representing Temporal Form of Impressions - Implementation Hypothesis and Application Example
PublikacjaThe aim of this article is to present the new extension of the xEmotion system as a computerized emotional system, part of an Intelligent System of Decision making (ISD) that combines the theories of affective psychology and philosophy of mind. At the same time, the authors try to find a practical impulse or evidence for a general reflection on the treatment of emotions as transitional states, which at some point may lead to the...
-
Application of Intelligent Conversational Agents in E-learing Environments
PublikacjaThe paper concerns intelligent tutoring systems and concentrates on apliaction of virtual mentors in distance learning environments. Different educational agent types are described. The prototype of an agent developed at Gdansk University of Technology is also presented, as well as its internal representation and construction. Benefits of virtual mentors applied in distance learning are also pointed out.
-
Ryszard Strzelecki prof. dr hab. inż.
Osoby -
Computer controlled systems - 2022/2023
Kursy Onlinemateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...