7,246 research outputs found

    A Multi-Agent Architecture for An Intelligent Web-Based Educational System

    Get PDF
    An intelligent educational system must constitute an adaptive system built on multi-agent system architecture. The multi-agent architecture component provides self-organization, self-direction, and other control functionalities that are crucially important for an educational system. On the other hand, the adaptiveness of the system is necessary to provide customization, diversification, and interactional functionalities. Therefore, an educational system architecture that integrates multi-agent functionality [50] with adaptiveness can offer the learner the required independent learning experience. An educational system architecture is a complex structure with an intricate hierarchal organization where the functional components of the system undergo sophisticated and unpredictable internal interactions to perform its function. Hence, the system architecture must constitute adaptive and autonomous agents differentiated according to their functions, called multi-agent systems (MASs). The research paper proposes an adaptive hierarchal multi-agent educational system (AHMAES) [51] as an alternative to the traditional education delivery method. The document explains the various architectural characteristics of an adaptive multi-agent educational system and critically analyzes the system’s factors for software quality attributes

    Configuring and Implementing IPS Solutions for IoT Devices using NST

    Get PDF
    The necessity to ensure that Internet of Things (IoT) networks are secure is one of the biggest issues that has arisen as a result of the growing demand for technology that uses the IoT. Considering how many gadgets are linked to the internet, safeguarding their networks is a growing worry. Due to the IoT's network's complexity and resource constraints, traditional intrusion detection systems encounter a number of problems. The main objectives of this project are to design, develop, and evaluate a hybrid level placement method for an IDS based on multi- agent systems, BC technology (Block-Chain), and DL algorithms (Deep Learning). The breakdown of data administration, data collection, analysis, and reaction into its component parts reveals the overall system design. The National Security Laboratory's knowledge discovery and data mining dataset is used to test the system as part of the validation procedure. These results demonstrate how deep learning algorithms are effective at identifying risks at the network and transport levels. The experiment shows that deep learning techniques function well when used to find intrusions in a network environment for the Internet of Things

    Towards the next generation of smart grids: semantic and holonic multi-agent management of distributed energy resources

    Get PDF
    The energy landscape is experiencing accelerating change; centralized energy systems are being decarbonized, and transitioning towards distributed energy systems, facilitated by advances in power system management and information and communication technologies. This paper elaborates on these generations of energy systems by critically reviewing relevant authoritative literature. This includes a discussion of modern concepts such as ‘smart grid’, ‘microgrid’, ‘virtual power plant’ and ‘multi-energy system’, and the relationships between them, as well as the trends towards distributed intelligence and interoperability. Each of these emerging urban energy concepts holds merit when applied within a centralized grid paradigm, but very little research applies these approaches within the emerging energy landscape typified by a high penetration of distributed energy resources, prosumers (consumers and producers), interoperability, and big data. Given the ongoing boom in these fields, this will lead to new challenges and opportunities as the status-quo of energy systems changes dramatically. We argue that a new generation of holonic energy systems is required to orchestrate the interplay between these dense, diverse and distributed energy components. The paper therefore contributes a description of holonic energy systems and the implicit research required towards sustainability and resilience in the imminent energy landscape. This promotes the systemic features of autonomy, belonging, connectivity, diversity and emergence, and balances global and local system objectives, through adaptive control topologies and demand responsive energy management. Future research avenues are identified to support this transition regarding interoperability, secure distributed control and a system of systems approach

    Dynamic deployment of context-aware access control policies for constrained security devices

    Get PDF
    Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements. Such requirements are identi ed based on organizational purposes and expectations in terms of resource access and availability and also on system vulnerabilities and threats. All these requirements belong to the so-called security policy. Deploying the policy means enforcing, i.e., con guring, those security components and mechanisms so that the system behavior be nally the one speci ed by the policy. The deployment issue becomes more di cult as the growing organizational requirements and expectations generally leave behind the integration of new security functionalities in the information system: the information system will not always embed the necessary security functionalities for the proper deployment of contextual security requirements. To overcome this issue, our solution is based on a central entity approach which takes in charge unmanaged contextual requirements and dynamically redeploys the policy when context changes are detected by this central entity. We also present an improvement over the OrBAC (Organization-Based Access Control) model. Up to now, a controller based on a contextual OrBAC policy is passive, in the sense that it assumes policy evaluation triggered by access requests. Therefore, it does not allow reasoning about policy state evolution when actions occur. The modi cations introduced by our work overcome this limitation and provide a proactive version of the model by integrating concepts from action speci cation languages

    Deep Q-Learning on Internet of Things System for Trust Management in Multi-Agent Environments for Smart City

    Get PDF
    Smart Cities are vital to improving urban efficiency and citizen quality of life due to the fast rise of the Internet of Things (IoT) and its integration into varied applications. Smart Cities are dynamic and complicated, making trust management in multi-agent systems difficult. Trust helps IoT devices and agents in smart ecosystems connect and cooperate. This study suggests using Deep Q-Learning and Bidirectional Long Short-Term Memory (Bi-LSTM) to manage trust in multi-agent Smart City settings. Deep Q-Learning and Bi-LSTM represent long-term relationships and temporal dynamics in the IoT network, enabling intelligent trust-related judgments. The architecture supports real-time trust assessment, decision-making, and response to smart city changes. The suggested solution improves dependability, security, and trustworthiness in the IoT system's networked agents. A complete collection of studies utilizing real-world IoT data from a simulated Smart City evaluates the system's performance. The Deep Q-Learning and Bi-LSTM technique surpasses existing trust management approaches in dynamic, complicated multi-agent environments. The system's capacity to adapt to changing situations and improve decision-making make IoT device interactions more dependable and trustworthy, helping Smart Cities expand sustainably and efficiently

    Simulation of the Long-Term Effects of Decentralized and Adaptive Investments in Cross-Agency Interoperable and Standard IT Systems

    Get PDF
    Governments have come under increasing pressure to promote horizontal flows of information across agencies, but investment in cross-agency interoperable and standard systems have been minimally made since it seems to require government agencies to give up the autonomies in managing own systems and its outcomes may be subject to many external and interaction risks. By producing an agent-based model using 'Blanche' software, this study provides policy-makers with a simulation-based demonstration illustrating how government agencies can autonomously and interactively build, standardize, and operate interoperable IT systems in a decentralized environment. This simulation designs an illustrative body of 20 federal agencies and their missions. A multiplicative production function is adopted to model the interdependent effects of heterogeneous systems on joint mission capabilities, and six social network drivers (similarity, reciprocity, centrality, mission priority, interdependencies, and transitivity) are assumed to jointly determine inter-agency system utilization. This exercise simulates five policy alternatives derived from joint implementation of three policy levers (IT investment portfolio, standardization, and inter-agency operation). The simulation results show that modest investments in standard systems improve interoperability remarkably, but that a wide range of untargeted interoperability with lagging operational capabilities improves mission capability less remarkably. Nonetheless, exploratory modeling against the varying parameters for technology, interdependency, and social capital demonstrates that the wide range of untargeted interoperability responds better to uncertain future states and hence reduces the variances of joint mission capabilities. In sum, decentralized and adaptive investments in interoperable and standard systems can enhance joint mission capabilities substantially and robustly without requiring radical changes toward centralized IT management.Public IT Investment, Interoperability, Standardization, Social Network, Agent-Based Modeling, Exploratory Modeling
    • …
    corecore