• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 145
  • 11
  • 10
  • 6
  • 2
  • 1
  • Tagged with
  • 204
  • 204
  • 204
  • 204
  • 53
  • 39
  • 32
  • 22
  • 20
  • 20
  • 19
  • 18
  • 18
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Development of low-cost satellite control software

Waterman, Bryan D. 06 1900 (has links)
This thesis details the development and validation procedures of the experiment control software to be used on the NPSAT1. The software developed for a standard Linux kernel instead of an expensive proprietary space computer system includes functions for satellite orbit prediction, precise satellite location, and adaptive experiment scheduling using inputs from the electrical power system, sub-satellite position, and sub-satellite local time.
62

How intrusion detection can improve software decoy applications

Monteiro, Valter 03 1900 (has links)
Approved for public release; distribution is unlimited / This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack. But the goal is not the usual one of denying access to the attacker but providing a justification for deceptive actions to fool the attacker. We implemented a simple demonstration of how two different kinds of open-source intrusion-detection systems can efficiently pool data for this purpose. / Lieutenant Commander, Brazilian Navy
63

Regressive bidding agents.

24 April 2008 (has links)
The aim of this dissertation is to develop a suitable bidding strategy for an internet bidding agent that allows the agent to obtain the lowest possible price for a desired product at an internet auction. The bidding strategy is obtained under the constraint of limited information available about the strategies of the opponents. The agent will operate in an internet auction environment. Therefore classic auction theory is researched and explained. Auctions are widely used to bring buyers and sellers of products together and to create a market to buy and sell goods. The buyer wants to pay the lowest possible price and the seller wants to receive the highest possible price. However, the seller has no influence on the final selling price of the product. Instead the price is determined by the buyers. The agent will place bids on the auction site on behalf of the human instructor. The bidding agent will make use of the theory behind auctions to influence the other bidders on the auction to make the lowest possible bids. The model suggested in this dissertation, the regressive bidding agent model (RBA model), will incorporate auction theory to create a suitable agent. The agent will predict the future bids of opponents on the auction, basing its predictions on a regressive function. The agent will base its own bids placed at the auction on the bidding time remaining at the auction together with the bids placed by other bidders on the auction. / Prof. E.M. Ehlers
64

A specialised architecture for embedding trust evaluation capabilities in intelligent mobile agents

24 February 2010 (has links)
M.Sc.(Computer Science) / The dissertation investigates trust and reputation as a specialisation of agent technology. The research presented herein aims to establish and demonstrate how it is possible for one rational agent to trust another entity. Furthermore, the research presented herein aims to determine the extent of the limitations of trust and reputation models, and of the demonstrable solution in particular. To this end, the dissertation investigates theoretical aspects of trust. The dissertation investigates several existing trust models and establishes criteria for a qualitative analysis. Supplementary techniques aimed at enhancing trust evaluation are also investigated. The research also identifies architectural abstractions suitable for developing agents capable of intelligent trust evaluation. The main focus of the research is enhancing agent protection through a trust-based approach. A particular problem is the threats posed to mobile agents from malicious agent hosts. Therefore, a solution is sought that can be used to augment existing mechanisms aimed at mobile agent protection and agent protection in general. Thus, the research also examines mobile agents and mobile agent systems in an effort to produce a general trust-based solution that can be applied in most mobile agent systems. The solution presented in the dissertation proposes the concept of an evaluator agent as an add-on to existing mobile agent systems. The evaluator agent is presented as a rational agent with an embedded intelligent trust evaluation capability. The intelligent trust evaluation capability is provided via a set of reusable components. The solution demonstrates how a rational agent may evaluate the trustworthiness of other entities. The dissertation further analyses the strengths and limitations of the approach. The dissertation provides results that quantitatively demonstrate the extent of the limitations of the trust-based approach. The contribution of the dissertation partly lies in the service orientation of the evaluator agent approach. The service orientation of the solution provides an abstraction and a degree of heterogeneity suitable for handling the challenges of open environments. The solution can be deployed in most mobile agent systems to provide a trust evaluation service without the need to redesign existing mobile agent systems. More broadly, the research is another step towards the development of cognitive social agents.
65

A Comparison of Agent-Oriented Software Engineering Frameworks and Methodologies

Lin, Chia-En 12 1900 (has links)
Agent-oriented software engineering (AOSE) covers issues on developing systems with software agents. There are many techniques, mostly agent-oriented and object-oriented, ready to be chosen as building blocks to create agent-based systems. There have been several AOSE methodologies proposed intending to show engineers guidelines on how these elements are constituted in having agents achieve the overall system goals. Although these solutions are promising, most of them are designed in ad-hoc manner without truly obeying software developing life-cycle fully, as well as lacking of examinations on agent-oriented features. To address these issues, we investigated state-of-the-art techniques and AOSE methodologies. By examining them in different respects, we commented on the strength and weakness of them. Toward a formal study, a comparison framework has been set up regarding four aspects, including concepts and properties, notations and modeling techniques, process, and pragmatics. Under these criteria, we conducted the comparison in both overview and detailed level. The comparison helped us with empirical and analytical study, to inspect the issues on how an ideal agent-based system will be formed.
66

Autonomy oriented computing (AOC) for web intelligence (WI) : a distributed resource optimization perspective

Jin, Xiaolong 01 January 2005 (has links)
No description available.
67

Automated negotiation in multi-agent based e-business

Huq, Golenur B., University of Western Sydney, College of Health and Science, School of Computing and Mathematics January 2007 (has links)
Negotiation is one of the most important activities for organisations in conducting electronic business. Traditional purchasing and selling have been conducted through complex processes involving negotiation that includes coordination and cooperation. To conduct automated negotiation for electronic business, a multi-agent system is needed where agents interact with each other. To perform this activity effectively and efficiently agents need to be able to negotiate, coordinate and cooperate with each other within the system. The research detailed in this thesis investigated the negotiation process in business-to business (B2B) transactions in supply chain management for multi-agent based electronic business (e business). Specifically, it answers the following research question: How can the negotiation process in B2B transactions be formulated and applied in multi-agent based e-business? The research strategy utilized an exploratory case study framework, with methods from decision theory, game theory, fuzzy logic and simulation for analysis. A series of integrated studies were undertaken to develop: an automated negotiation protocol; negotiation strategies; and a coordination and cooperation model. These were analysed in the context of the case study, Trading Agent Competition Supply Chain Management (TAC SCM) game scenario. Currently, the TAC SCM is the only international competition involving an electronic marketplace (e market). The studies involved the negotiation strategy between two agents, where the agents will be able to solve a problem by finding the best feasible strategy to bind an agreement for negotiation. By adopting a maximin and minimax strategy, this research proposes that agents will reach a reasonable positive intention approach towards negotiation, and will increase the agreement binding rate. A negotiation strategy was also examined by Fuzzy Logic using possibility theory and linguistic variables in which it also proposes a negotiation strategy in an uncertain situation for the TAC SCM. This will aid in binding the agreement to achieve the agent’s expected profit. Next, this research reviewed the TAC SCM game and explored the procurement performance of agents.The monotonic concession negotiation protocol, which determines the rules in which the agents can offer and counter-offer in the negotiation process was investigated. The author proposes two types of protocols. The first protocol is a Non-Monotonic Protocol with theoretical analysis. The second protocol is an Extended and Flexible Iterated Negotiation Process. This research also developed an Extended Bilateral Negotiation Model based on OMG (1999). The Negotiation Mechanism involving Offering and Counter-Offering models were also developed. Next, this research reviewed the cooperation and coordination process. This study identified problems in conducting e-business and supply chain management and expected benefits for supply chains with agents working together in coordinated and cooperative processes. The utilization of the multi-agent system in supply chain management with the Enhanced and Effective Cooperative Processing Stages is discussed. To apply these stages, the author proposes an architecture of Effective Cooperative Processing for Agents, and some characteristics in modelling coordination and cooperation for TAC SCM have been outlined. The research detailed how the negotiation process in B2B transactions can be formulated and applied in multi-agent based e-business. Through the proposal of a Flexible and Iterated Negotiation Framework, consisting of an Extended Bilateral Negotiation Model and a Cooperation and Coordination Model, the research community moves further towards the ultimate goal of an efficient, economic and automated negotiation process. In summary, the main contributions of the thesis include: a theoretical analysis of the negotiation process with coordination and cooperation; proposed models for an automated negotiation process; development of strategies and protocols for automated negotiation; and the coordination and cooperation model that can be used not only in supply chain management but also in any type of e-business. / Doctor of Philosophy
68

An investigation of the use of past experience in single and multiple agent learning classifier systems

Foster, Kate Yvonne, kate.foster@dsto.defence.gov.au January 2005 (has links)
The field of agent control is concerned with the design and implementation of components that form an agent's control architecture. The interaction between these components determines how an agent?s sensor data and internal state combine to direct how the agent will act. Rule-based systems couple sensing and action in the form of condition-action rules and one class of such systems, learning classifier systems, has been extensively used in the design of adaptive agents. An adaptive agent explores an often unknown environment and uses its experience in its environment with the aim of improving its performance over time. The data an adaptive agent receives regarding the current state of its environment might be limited and ambiguous. In learning classifier systems, three different approaches to the problem of limited and ambiguous data from the environment have been: (1) to enable the agent to learn from its past experience, (2) to develop sequences of rules (in which rules may be linked implicitly or explicitly) and (3) multiagent LCSs. This thesis investigates the use of an adaptive agent?s past experience as a resource with which to perform a number of functions internal to the agent. These functions involve developing explicit sequences of rules, detecting and escaping from infinite loops, and firing and reinforcing rules. The first part of this thesis documents the design, implementation and evaluation of a control system that incorporates these functions. The control system is realised as a learning classifier system and is evaluated through experiments in a number of environments that provide limited and ambiguous stimuli. These experiments test the impact of explicit sequences of rules on the performance of a learning classifier system more thoroughly than previous research achieved. The use of explicit sequences of rules results in mixed performance in these environments and it is shown that while the use of these sequences in simple environments enables the rule space to be more effectively explored, in complex environments the behaviours developed by these sequences result in the agent stagnating more often in corners of the environment. Rather than endowing the rule-base with more rules, as in previous research with explicit sequences of rules, it is proposed that multiple interacting agents may enhance the exploration of the rule space in more complex environments. This approach is taken in the second part of this thesis, where the control system is used with multiple agents that interact by sharing rules. The aim of this interaction is to enhance the rule discovery process through cooperation between agents and thus improve the performance of the agents in their respective environments. It is shown that the benefit obtained from rule sharing is dependent on the environment and the type and amount of rule sharing used and that rule sharing is generally more beneficial in complex environments compared to simple environments. The properties of the rule-bases developed in these environments are examined in order to account for these results and it is shown that the type and amount of rule sharing most useful in each environment are dependent on these properties.
69

An object oriented intelligent agent simulation environment

Liang, Chien-Tsun 27 June 1996 (has links)
Manufacturing intelligent agent simulation has not been widely applied in industry because of its application complexity. This complexity, which includes choosing priority machines or jobs, determining machine maintenance schedules, and allocating working shifts and breaks, requires intelligent decision making. Manufacturing systems are strongly influenced by intelligent decision makers. Especially for a fixed manufacturing layout, system performance improvement depends on intelligent manufacturing decision making. As a result, a manufacturing simulation can not be truly complete if intelligent decision making processes are not represented. This thesis describes an architecture which includes the representation of intelligent agents in manufacturing simulation model. An intelligent agent simulation environment (IASE) is developed under the concepts of distributed artificial intelligence and object oriented methodology. As an extension to an existing simulation environment, IASE inherits primary manufacturing simulation elements and material handling systems from object oriented manufacturing architecture (Beaumariage, 1990) and AGV simulation system (Beaumariage and Wang, 1995). In IASE, production operators, maintenance technicians and job releasers are created to represent manufacturing intelligent agents. Several basic elements such as the blackboard structure and knowledge base for supporting intelligent agent simulation are also developed. In contrast to traditional simulation environments designed for and in procedural programming languages, future extensions or modifications for IASE are eased since IASE is developed in an object oriented fashion. This paper introduces IASE structure both in the conceptual design and implementation methodology levels. At the end, two case studies are performed. The first case study is to verify IASE's implementation and results by comparing it with a model developed in SLAM II. The second case study, a mixed intelligent agent decision making example, demonstrates the intelligent agent simulation ability of IASE. / Graduation date: 1997
70

Reasoning and acting in time

Ismail, Haythem O. January 1900 (has links)
Thesis (Ph. D.)--State University of New York at Buffalo, 2001. / "August 23, 2001." Includes bibliographical references (p. 371-389). Also available in print.

Page generated in 0.1941 seconds