Search results for "Multiagent system"

showing 10 items of 108 documents

Engineering multi-agent systems: State of affairs and the road ahead

2019

International audience; The continuous integration of software-intensive systems together with the ever-increasing computing power offer a breeding ground for intelligent agents and multi-agent systems (MAS) more than ever before. Over the past two decades, a wide variety of languages, models, techniques and methodologies have been proposed to engineer agents and MAS. Despite this substantial body of knowledge and expertise, the systematic engineering of large-scale and open MAS still poses many challenges. Researchers and engineers still face fundamental questions regarding theories, architectures, languages, processes, and platforms for designing, implementing, running, maintaining, and e…

EngineeringMultiagent systems D2DesignStandardizationIntelligent agentsHuman FactorsState of affairs02 engineering and technologycomputer.software_genreMulti-Agent SystemsBody of knowledgeIntelligent agentEngineering020204 information systems0202 electrical engineering electronic engineering information engineeringTheory[INFO]Computer Science [cs]ExperimentationComputer. AutomationInformáticaTelecomunicacionesMulti-Agent SystemRequirements engineeringbusiness.industryMulti-agent systemAgent-Oriented Software Engineering020207 software engineeringGeneral MedicineAgentsReliabilityAgent-Oriented ProgrammingStandardizationVariety (cybernetics)Continuous integrationEngineering managementMAS ArchitectureVerification Keywords Software engineeringGoal ReasoningAISecurityLanguages020201 artificial intelligence & image processingbusinessEngineering sciences. Technologycomputer
researchProduct

A multi-agent system for managing adverse weather situations on the road network

2010

The development of traffic management and control strategies to improve traffic flows and road safety is necessary due to the high dynamism of traffic flows. The use of distributed intelligent systems can help the traffic organizations and the road operators to cope with possible incidents on the road network, especially when the incidents are related to adverse meteorological conditions. In that case, the probability of road accidents is increased due to the difficulty of driving under bad weather conditions. So, if the operators detect any meteorological incident, they must decide how to deal with it in order to improve traffic safety. In this paper we introduce a new multiagent system (M…

EngineeringOperations researchmedia_common.quotation_subjectControl (management)Advanced traffic management systemsVehicle Information and Communication Systemcomputer.software_genreTheoretical Computer ScienceTraffic engineeringArtificial IntelligenceSistemes multiagentRoad Weather Information SystemQuality (business)Road incidents traffic managementWeatherExpert systemmedia_commonTemps (Meteorologia)business.industrySeguretat viàriaMulti-agent systemIntelligent decision support systemRule-based systemTraffic safetyExpert systemComputer Science ApplicationsComputational Theory and MathematicsMultiagent systemsMultiagent systembusinesscomputerSoftwareEnginyeria del trànsit
researchProduct

Consensus-based Distributed Intrusion Detection for Multi-Robot Systems

2008

This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non-cooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect non- cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target-robot may be reached by the monitors, through execution of a suitable consensu…

Engineeringbusiness.industryDistributed computingReal-time computingIntrusion detection systemDecentralised systemUpper and lower boundsComputer Science::Multiagent SystemsConsensusSettore ING-INF/04 - AutomaticaConvergence (routing)Transient (computer programming)Intrusion detectionbusinessIntelligent transportation systemProtocol (object-oriented programming)set--valued consensus algorithm
researchProduct

A multiagent system approach for image segmentation using genetic algorithms and extremal optimization heuristics

2006

We propose a new distributed image segmentation algorithm structured as a multiagent system composed of a set of segmentation agents and a coordinator agent. Starting from its own initial image, each segmentation agent performs the iterated conditional modes method, known as ICM, in applications based on Markov random fields, to obtain a sub-optimal segmented image. The coordinator agent diversifies the initial images using the genetic crossover and mutation operators along with the extremal optimization local search. This combination increases the efficiency of our algorithm and ensures its convergence to an optimal segmentation as it is shown through some experimental results.

Extremal optimizationMathematical optimizationSegmentation-based object categorizationbusiness.industryMulti-agent systemCrossoverComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage segmentationComputingMethodologies_ARTIFICIALINTELLIGENCEComputer Science::Multiagent SystemsArtificial IntelligenceComputer Science::Computer Vision and Pattern RecognitionSignal ProcessingSegmentationIterated conditional modesLocal search (optimization)Computer Vision and Pattern RecognitionbusinessAlgorithmSoftwareMathematicsPattern Recognition Letters
researchProduct

Finding optimal finite biological sequences over finite alphabets: the OptiFin toolbox

2017

International audience; In this paper, we present a toolbox for a specific optimization problem that frequently arises in bioinformatics or genomics. In this specific optimisation problem, the state space is a set of words of specified length over a finite alphabet. To each word is associated a score. The overall objective is to find the words which have the lowest possible score. This type of general optimization problem is encountered in e.g 3D conformation optimisation for protein structure prediction, or largest core genes subset discovery based on best supported phylogenetic tree for a set of species. In order to solve this problem, we propose a toolbox that can be easily launched usin…

FOS: Computer and information sciences0301 basic medicineTheoretical computer scienceOptimization problemComputer Science - Artificial IntelligenceComputer science[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Quantitative Biology - Quantitative MethodsSet (abstract data type)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]State spaceMetaheuristicQuantitative Methods (q-bio.QM)Protein structure prediction[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationToolboxCore (game theory)Artificial Intelligence (cs.AI)030104 developmental biology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]FOS: Biological sciences[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Word (computer architecture)
researchProduct

Investigating Low Level Protocols for Wireless Body Sensor Networks

2016

The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropria…

FOS: Computer and information sciencesComputer scienceComputer Science - Information TheoryTime division multiple accessAccess control[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Body area network0202 electrical engineering electronic engineering information engineeringWirelessProtocol (science)business.industryInformation Theory (cs.IT)Quality of service020208 electrical & electronic engineeringComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science - Distributed Parallel and Cluster Computing[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Scalability[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Distributed Parallel and Cluster Computing (cs.DC)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer network
researchProduct

Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance

2017

International audience; Abstract—Wireless Multimedia Sensor Network (WMSN) is a promising technology capturing rich multimedia data like audio and video, which can be useful to monitor an environment under surveillance. However, many scenarios in real time monitoring requires 3D depth information. In this research work, we propose to use the disparity map that is computed from two or multiple images, in order to monitor the depth information in an object or event under surveillance using WMSN. Our system is based on distributed wireless sensors allowing us to notably reduce the computational time needed for 3D depth reconstruction, thus permitting the success of real time solutions. Each pa…

FOS: Computer and information sciencesComputer scienceComputer Vision and Pattern Recognition (cs.CV)Real-time computingComputer Science - Computer Vision and Pattern Recognition[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyImage (mathematics)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringWirelessWireless multimedia sensor networksEvent (computing)business.industryNode (networking)Bandwidth (signal processing)020206 networking & telecommunicationsObject (computer science)[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationStereopsis[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]business2017 Sensors Networks Smart and Emerging Technologies (SENSET)
researchProduct

Online shortest paths with confidence intervals for routing in a time varying random network

2018

International audience; The increase in the world's population and rising standards of living is leading to an ever-increasing number of vehicles on the roads, and with it ever-increasing difficulties in traffic management. This traffic management in transport networks can be clearly optimized by using information and communication technologies referred as Intelligent Transport Systems (ITS). This management problem is usually reformulated as finding the shortest path in a time varying random graph. In this article, an online shortest path computation using stochastic gradient descent is proposed. This routing algorithm for ITS traffic management is based on the online Frank-Wolfe approach.…

FOS: Computer and information sciencesMathematical optimizationComputer sciencePopulation02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[SPI]Engineering Sciences [physics][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0502 economics and business11. SustainabilityComputer Science - Data Structures and Algorithms0202 electrical engineering electronic engineering information engineeringFOS: MathematicsData Structures and Algorithms (cs.DS)educationIntelligent transportation systemMathematics - Optimization and ControlRandom graph050210 logistics & transportationeducation.field_of_studyStochastic process[SPI.PLASMA]Engineering Sciences [physics]/Plasmas05 social sciencesApproximation algorithm[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationStochastic gradient descentOptimization and Control (math.OC)[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Shortest path problem020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Routing (electronic design automation)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]
researchProduct

Random Walk in a N-cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations

2017

Designing a pseudorandom number generator (PRNG) is a difficult and complex task. Many recent works have considered chaotic functions as the basis of built PRNGs: the quality of the output would indeed be an obvious consequence of some chaos properties. However, there is no direct reasoning that goes from chaotic functions to uniform distribution of the output. Moreover, embedding such kind of functions into a PRNG does not necessarily allow to get a chaotic output, which could be required for simulating some chaotic behaviors. In a previous work, some of the authors have proposed the idea of walking into a $\mathsf{N}$-cube where a balanced Hamiltonian cycle has been removed as the basis o…

FOS: Computer and information sciencesUniform distribution (continuous)Computer Science - Cryptography and SecurityComputer scienceHamiltonian CycleChaoticPseudorandom Numbers GeneratorFOS: Physical sciences02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciencesUpper and lower bounds[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computingsymbols.namesake[INFO.INFO-MC]Computer Science [cs]/Mobile Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringApplied mathematics[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]0101 mathematicsEngineering (miscellaneous)Pseudorandom number generatorChaotic IterationsBasis (linear algebra)Applied Mathematics020208 electrical & electronic engineering010102 general mathematicsRandom walkNonlinear Sciences - Chaotic DynamicsHamiltonian path[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationNonlinear Sciences::Chaotic Dynamics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Modeling and SimulationRandom Walk[NLIN.NLIN-CD]Nonlinear Sciences [physics]/Chaotic Dynamics [nlin.CD]symbolsPseudo random number generator[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Chaotic Dynamics (nlin.CD)[INFO.INFO-BI]Computer Science [cs]/Bioinformatics [q-bio.QM][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Cryptography and Security (cs.CR)
researchProduct

A critical review on the implementation of static data sampling techniques to detect network attacks

2021

International audience; Given that the Internet traffic speed and volume are growing at a rapid pace, monitoring the network in a real-time manner has introduced several issues in terms of computing and storage capabilities. Fast processing of traffic data and early warnings on the detected attacks are required while maintaining a single pass over the traffic measurements. To palliate these problems, one can reduce the amount of traffic to be processed by using a sampling technique and detect the attacks based on the sampled traffic. Different parameters have an impact on the efficiency of this process, mainly, the applied sampling policy and sampling ratio. In this paper, we investigate th…

General Computer ScienceComputer science020209 energyReal-time computingintrusion detection system (IDS)data streamsContext (language use)02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Data sampling[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]statistical analysisSampling process0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceStatic dataGeneral EngineeringVolume (computing)Process (computing)Sampling (statistics)Internet traffic[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationTK1-9971[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical engineering. Electronics. Nuclear engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]
researchProduct