作者:
Pendharkar, Parag C.Information Systems
School of Business Administration Penn State Harrisburg Middletown PA 17057 777 West Harrisburg Pike United States
We propose a multi-agent approach for dynamic channel allocation (MA-DCA) in mobile cellular networks. Our approach assumes that each cell in a cellular network works as an agent that negotiates its bandwidth (channel...
详细信息
We prove that for any finite deduction structure there exists a unique concise-widest chain-preserved split. Based on this result, we propose a logical splitting strategy which enables an agent to split its belief str...
详细信息
We prove that for any finite deduction structure there exists a unique concise-widest chain-preserved split. Based on this result, we propose a logical splitting strategy which enables an agent to split its belief structure such that all the original inference chains can be preserved. The significance of such logical splitting at least is four-fold: (1) It can be used by an agent to separate its concerns appropriately, or even create smaller and smarter clones which could save time and efforts in their deliberation computing;(2) It will enable an agent to adjust its concerns dynamically based on its recognition of the current situation, which may further enable the agent to make rapid and rational decisions when situation shifting occurs;(3) In periodic team synchronization (PTS) domains where agents can periodically synchronize their behaviors with no restriction on communication, it can be employed as a critical process for maintaining the shared mental models among a team of agents;and (4) It is helpful in alleviating the complexity of reasoning about relevant information, and in better anticipating both explicit and implicit information needs based on the recognition of the current situation.
A method in which an adaptive neuro-fuzzy inference system (ANFIS) was used to compute the point of the shoot in RoboCup simulation game was proposed. This ANFIS is a 4-input and single output Sugeno system. There are...
详细信息
A method in which an adaptive neuro-fuzzy inference system (ANFIS) was used to compute the point of the shoot in RoboCup simulation game was proposed. This ANFIS is a 4-input and single output Sugeno system. There are 4 inputs of the system: X, Y coordinates of the shooter and X, Y coordinates of the goalie. The output of the system is the Y coordinate of the shoot point. The system is composed of the antecedent network and consequent network. The training data are gathered during the shoot of many RoboCup simulation competitions. After training the data, ANFIS can automatically adjust the shape of the antecedent membership function and the consequent weight. So the mapping relationship between the inputs and the output can be accurately described. The method can increase the successful probability of the shoot. After it was applied to the China Robot Competition 2004, the champion was gained, which proves that the method is efficient.
This paper introduces a novel Medium Access Control (MAC) scheme for ad hoc Wireless Sensor Networks. It is based upon the emergent properties of complex systems, exploiting the concept of swarm intelligence. The bene...
详细信息
ISBN:
(纸本)9781479986613
This paper introduces a novel Medium Access Control (MAC) scheme for ad hoc Wireless Sensor Networks. It is based upon the emergent properties of complex systems, exploiting the concept of swarm intelligence. The benefits brought about by this approach are node simplicity and improved network scalability given very low implementation overheads. Through the co-operative operation of nodes, a network can exhibit emergent self-initialisation and organisation and is adaptive to environmental and structural changes. The protocol was developed using social concepts drawn from the field of particle swarm optimisation, alongside negative feedback concepts from control system engineering. It offers comparable or better performance (in throughput and delay) with lower complexity and less overheads for larger scale networks when compared to the widely used and simple but still very effective IEEE 802.11 CSMA/CA standard.
There is a growing body of knowledge on network intrusion detection, and several open data sets with network traffic and cyber-security threats have been released in the past decades. However, many data sets have aged...
详细信息
There is a growing body of knowledge on network intrusion detection, and several open data sets with network traffic and cyber-security threats have been released in the past decades. However, many data sets have aged, were not collected in a contemporary industrial communication system, or do not easily support research focusing on distributed anomaly detection. This paper presents the Westermo network traffic data set, 1.8 million network packets recorded in over 90 minutes in a network built up of twelve hardware devices. In addition to the raw data in PCAP format, the data set also contains pre-processed data in the form of network flows in CSV files. This data set can support the research community for topics such as intrusion detection, anomaly detection, misconfiguration detection, distributed or federated artificialintelligence, and attack classification. In particular, we aim to use the data set to continue work on resource-constrained distributed artificial intelligence in edge devices. The data set contains six types of events: harmless SSH, bad SSH, misconfigured IP address, duplicated IP address, port scan, and man in the middle attack.& COPY;2023 The Authors. Published by Elsevier Inc. This is an open access article under the CC BY license( http://***/licenses/by/4.0/ )
Today's distributed and pervasive computing addresses large-scale cyber-physical ecosystems, characterised by dense and large networks of devices capable of computation, communication and interaction with the envi...
详细信息
Today's distributed and pervasive computing addresses large-scale cyber-physical ecosystems, characterised by dense and large networks of devices capable of computation, communication and interaction with the environment and people. While most research focuses on treating these systems as “composites” (i.e., heterogeneous functional complexes), recent developments in fields such as self-organising systems and swarm robotics have opened up a complementary perspective: treating systems as “collectives” (i.e., uniform, collaborative, and self-organising groups of entities). This article explores the motivations, state of the art, and implications of this “collective computing paradigm” in software engineering. In particular, it discusses its peculiar challenges, implied by characteristics like distribution, situatedness, large scale, and cooperative nature. These challenges outline significant directions for future research in software engineering, touching on aspects such as macro-programming, collective intelligence, self-adaptive middleware, learning/synthesis of collective behaviour, human involvement, safety and security in collective cyber-physical ecosystems.
This paper considers cooperative and distributed problem-solving in an environment where similar problems are repeatedly posed, and discusses methods for plan reuse. In distributed planning including multiple agents, ...
详细信息
暂无评论