Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achie...Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achieved good results. For example, it is possible to launch a code with a guarantee that it cannot attack the hosting sites. The main problem remaining, however, is protecting the mobile code against malicious service providers, the host problem. This paper proposed a Mobile Agent management scheme in a hierarchical level that provides to user a reliable and flexible global access to internet/network information services. We further described a protection mechanism to Mobile Agents against malicious hosts. As an effort to address host problems we first identify the kinds of attack that may be performed by malicious hosts, and propose a mechanism to prevent these attacks. At each agent host we introduce a trusted third party entity on each server called Secure Service Station (SSS) to carry out security actions.展开更多
To improve the scalability of RMON-based network management, the concept of Mobile RMON Agent (MRA) was presented by combining the mobile agent technology with RMON. Then an MRA-based Network Management System (MRANMS...To improve the scalability of RMON-based network management, the concept of Mobile RMON Agent (MRA) was presented by combining the mobile agent technology with RMON. Then an MRA-based Network Management System (MRANMS) was designed and implemented. RMON functions were achieved by programming the mobile agent to make it capture and analyze packets locally. The experimental result on the Grasshopper platform indicates that MRA as a mobile agent can migrate to another subnet and calculate a RMON MIB value and TrafficMatrix in a subnet with 29 hosts. Furthermore, the behavior of MRA can be customized to achieve new RMON functions, such as the statistics of hostTable in RMON MIB. It can be concluded that MRANMS is based on the mode of distribution, and besides the compatibility with standard RMON, the system possesses scalability of management function.展开更多
The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA struc...The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA structure features are elaborated in detail. A prototype design of NMCA is given by using the jKQML programming. The establishment of NMCA platform will be helpful to reduce the correspondence load of network management and improves the efficiency and the expansion ability of network management systems.展开更多
To align customer demand with suppliers for reducing work in process and supply costs and increasing re sp onsiveness to customer requirements, a real time collaborative supply chain mana gement system is essential...To align customer demand with suppliers for reducing work in process and supply costs and increasing re sp onsiveness to customer requirements, a real time collaborative supply chain mana gement system is essential. A solution to the realization of supply chain manage ment capable of timely responding to customer requirements is proposed. Workflow automation is used to manage process interaction across enterprises; Agents can be automatically invoked by supply chain workflow process and are used to pro mote the flexibility and reconfigurability by providing the mechanism in support of distributed compution in an enterprises to meet the requirements of performa nce and business dynamics. An approach that supports agent based workflow proce ss in a supply chain is proposed. And the coordination mechanism between agents is also discussed.展开更多
This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supp...This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supported cooperative work (CSCW) and combining new technologies such as WWW, Java. AGIMA transfers from information distribution centered mode in traditional network management to computing distribution centered mode, providing intelligence capacity for network management by a whole intelligent agent group. The implementation of AGIMA takes much consideration of openess, scalability, proactive adaptability and friendliness of human computer interface. Authors present properties of intelligent agent in details, and conclude that network intelligence should be cooperation between human and computer.展开更多
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per...This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.展开更多
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag...A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP).展开更多
In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related coo...In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related cooperation, coordi-nation and control mechanisms is encouraging the development of new information management strategies to direct and man- age the automated systems involved in the manufacturing processes. The Computational Intelligent (CI) approaches seem to provide an effective support to the challenges posed by the next generation industrial systems. In particular, the Intelligent Agents (IAs) and the Multi-Agent Systems (MASs) paradigms seem to provide the best suitable solutions. Autonomy, flexibility and adaptability of the agent-based technology are the key points to manage both automated and information processes of any industrial system. The paper describes the main features of the IAs and MASs and how their technology can be adapted to support the current and next generation advanced industrial systems. Moreover, a study of how a MAS is utilized within a productive process is depicted.展开更多
In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management...In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.展开更多
Algorithms of detecting dialogue deviations from a dialogue topic in an agent and ontology-based dialogue management system(AODMS) are proposed. In AODMS, agents and ontologies are introduced to represent domain kno...Algorithms of detecting dialogue deviations from a dialogue topic in an agent and ontology-based dialogue management system(AODMS) are proposed. In AODMS, agents and ontologies are introduced to represent domain knowledge. And general algorithms that model dialogue phenomena in different domains can be realized in that complex relationships between knowledge in different domains can be described by ontologies. An evaluation of the dialogue management system with deviation-judging algorithms on 736 utterances shows that the AODMS is able to talk about the given topic consistently and answer 86.6 % of the utterances, while only 72.1% of the utterances can be responded correctly without deviation-judging module.展开更多
his paper examines planning management problems in a Multiagentbased Distributed Open Computing Environment Model (MDOCEM). First the meaning of planning management in MDOCEM is introduced, and then a formal method to...his paper examines planning management problems in a Multiagentbased Distributed Open Computing Environment Model (MDOCEM). First the meaning of planning management in MDOCEM is introduced, and then a formal method to describe the associated task partition problems is presented, and a heuristic algorithm which gives an approximate optimum solution is given. Finally the task coordination and integration of execution results are discussed.展开更多
PDM (product data management) is one kind of techniques based on software and database, which integrates information and process related to products. But it is not enough to perform the complication of PDM in enterpri...PDM (product data management) is one kind of techniques based on software and database, which integrates information and process related to products. But it is not enough to perform the complication of PDM in enterprises. Then the mechanism to harmonize all kinds of information and process is needed. The paper introduces a novel approach to implement the intelligent monitor of PDM based on MAS (multi agent system). It carries out the management of information and process by MC (monitor center). The paper first puts forward the architecture of the whole system, then defines the structure of MC and its interoperation mode.展开更多
This paper proposes a novel dual layered multi agent system (MAS) based control system for the use in microgrid operations. In developing a smarter grid capable of withstanding disturbances and/or outages and providin...This paper proposes a novel dual layered multi agent system (MAS) based control system for the use in microgrid operations. In developing a smarter grid capable of withstanding disturbances and/or outages and providing quality service to the consumers, reliable microgrid control architecture is vital. The innovative microgrid control system proposed, makes the microgrid capable of isolating the local grid from effects of any upstream disturbances in the main utility grid by operating disconnected from the main utility via islanding, and it allows the most critical local loads to be supplied by any, available, local power source during such islanded operation. The proposed MAS control architecture is developed using the JADE platform and it is used to control a test network simulated in MATLAB. The results of these simulations show the capability of developing MAS based reliable control mechanism for islanding and load management of microgrids based on the proposed concept.展开更多
The dramatic improvement of information and communication technology (ICT) has made an evolution in learning management systems (LMS). The rapid growth in LMSs has caused users to demand more advanced, automated, and ...The dramatic improvement of information and communication technology (ICT) has made an evolution in learning management systems (LMS). The rapid growth in LMSs has caused users to demand more advanced, automated, and intelligent services. This paper discusses how Artificial Intelligence and Machine Learning techniques are adopted to fulfill users’ needs in a social learning management system named “CourseNetworking”. The paper explains how machine learning contributed to developing an intelligent agent called “Rumi” as a personal assistant in CourseNetworking platform to add personalization, gamification, and more dynamics to the system. This paper aims to introduce machine learning to traditional learning platforms and guide the developers working in LMS field to benefit from advanced technologies in learning platforms by offering customized services.展开更多
Recently multi-agent system(MAS)is regarded as a powerful paradigm to develop and simulate complex system. Because supply chain(SC)is a complex network,it is hard to improve supply chain management(SCM)efficiency and ...Recently multi-agent system(MAS)is regarded as a powerful paradigm to develop and simulate complex system. Because supply chain(SC)is a complex network,it is hard to improve supply chain management(SCM)efficiency and automate SC operating process.Researchers have applied MAS in SCM viewing enterprises in SC as different functional agents collaborating to achieve common goal.In this paper a MAS-based supply chain management framework(MSF)is developed on which agents can collaborate to conduct business activities of enterprises and customers.Six kinds of functional agents are designed,namely, management agent,order receiving agent,order decomposing agent,resource agent,manufacturing-controlling agent and trans- portation agent.Through the agents’ collaboration the MSF can support SC dynamic forming and operating process.For partner selection the method to transmit customers’ order into demand matrix,and transmit enterprise’s resource capacity into resource matrix is described in detail.The MSF users decide which algorithm to be applied in matching the two matrixes,and algorithms are stored in model base.Finally the generic agent architecture is put formard.展开更多
文摘Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achieved good results. For example, it is possible to launch a code with a guarantee that it cannot attack the hosting sites. The main problem remaining, however, is protecting the mobile code against malicious service providers, the host problem. This paper proposed a Mobile Agent management scheme in a hierarchical level that provides to user a reliable and flexible global access to internet/network information services. We further described a protection mechanism to Mobile Agents against malicious hosts. As an effort to address host problems we first identify the kinds of attack that may be performed by malicious hosts, and propose a mechanism to prevent these attacks. At each agent host we introduce a trusted third party entity on each server called Secure Service Station (SSS) to carry out security actions.
基金Projects 60475007 and 02029 supported by National Natural Science Foundation of China and Key Research of Science and Technology of Ministry ofEducation of China
文摘To improve the scalability of RMON-based network management, the concept of Mobile RMON Agent (MRA) was presented by combining the mobile agent technology with RMON. Then an MRA-based Network Management System (MRANMS) was designed and implemented. RMON functions were achieved by programming the mobile agent to make it capture and analyze packets locally. The experimental result on the Grasshopper platform indicates that MRA as a mobile agent can migrate to another subnet and calculate a RMON MIB value and TrafficMatrix in a subnet with 29 hosts. Furthermore, the behavior of MRA can be customized to achieve new RMON functions, such as the statistics of hostTable in RMON MIB. It can be concluded that MRANMS is based on the mode of distribution, and besides the compatibility with standard RMON, the system possesses scalability of management function.
文摘The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA structure features are elaborated in detail. A prototype design of NMCA is given by using the jKQML programming. The establishment of NMCA platform will be helpful to reduce the correspondence load of network management and improves the efficiency and the expansion ability of network management systems.
文摘To align customer demand with suppliers for reducing work in process and supply costs and increasing re sp onsiveness to customer requirements, a real time collaborative supply chain mana gement system is essential. A solution to the realization of supply chain manage ment capable of timely responding to customer requirements is proposed. Workflow automation is used to manage process interaction across enterprises; Agents can be automatically invoked by supply chain workflow process and are used to pro mote the flexibility and reconfigurability by providing the mechanism in support of distributed compution in an enterprises to meet the requirements of performa nce and business dynamics. An approach that supports agent based workflow proce ss in a supply chain is proposed. And the coordination mechanism between agents is also discussed.
文摘This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supported cooperative work (CSCW) and combining new technologies such as WWW, Java. AGIMA transfers from information distribution centered mode in traditional network management to computing distribution centered mode, providing intelligence capacity for network management by a whole intelligent agent group. The implementation of AGIMA takes much consideration of openess, scalability, proactive adaptability and friendliness of human computer interface. Authors present properties of intelligent agent in details, and conclude that network intelligence should be cooperation between human and computer.
基金supported by National Natural Science Foundation of China(61433004,61603085)the China Postdoctoral Science Foundation(2015M570253)the Fundamental Research Funds for the Central Universities(N150403004)
基金supported by the National Natural Science Foundation of China (61772196 61472136)+3 种基金the Hunan Provincial Focus Social Science Fund (2016ZDB006)Hunan Provincial Social Science Achievement Review Committee results appraisal identification project (Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee (XSP 19ZD1005)the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology (2017TP1026)
文摘This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.
基金supported by the Fundamental Research Funds for the Central Universities under grant No.2009JBM007supported by the National Natural Science Foundation of China under Grants No. 60802016, 60833002 and 60972010
文摘A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP).
文摘In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related cooperation, coordi-nation and control mechanisms is encouraging the development of new information management strategies to direct and man- age the automated systems involved in the manufacturing processes. The Computational Intelligent (CI) approaches seem to provide an effective support to the challenges posed by the next generation industrial systems. In particular, the Intelligent Agents (IAs) and the Multi-Agent Systems (MASs) paradigms seem to provide the best suitable solutions. Autonomy, flexibility and adaptability of the agent-based technology are the key points to manage both automated and information processes of any industrial system. The paper describes the main features of the IAs and MASs and how their technology can be adapted to support the current and next generation advanced industrial systems. Moreover, a study of how a MAS is utilized within a productive process is depicted.
基金This work was supported by the National Natural Science Foundation of China(61772196,61472136)the Hunan Provincial Focus Social Science Fund(2016ZDB006)+2 种基金Hunan Provincial Social Science Achievement Review Committee results appraisal identification project(Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee(XSP 19ZD1005)The authors gratefully acknowledge the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology(2017TP1026).
文摘In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.
文摘Algorithms of detecting dialogue deviations from a dialogue topic in an agent and ontology-based dialogue management system(AODMS) are proposed. In AODMS, agents and ontologies are introduced to represent domain knowledge. And general algorithms that model dialogue phenomena in different domains can be realized in that complex relationships between knowledge in different domains can be described by ontologies. An evaluation of the dialogue management system with deviation-judging algorithms on 736 utterances shows that the AODMS is able to talk about the given topic consistently and answer 86.6 % of the utterances, while only 72.1% of the utterances can be responded correctly without deviation-judging module.
文摘his paper examines planning management problems in a Multiagentbased Distributed Open Computing Environment Model (MDOCEM). First the meaning of planning management in MDOCEM is introduced, and then a formal method to describe the associated task partition problems is presented, and a heuristic algorithm which gives an approximate optimum solution is given. Finally the task coordination and integration of execution results are discussed.
文摘PDM (product data management) is one kind of techniques based on software and database, which integrates information and process related to products. But it is not enough to perform the complication of PDM in enterprises. Then the mechanism to harmonize all kinds of information and process is needed. The paper introduces a novel approach to implement the intelligent monitor of PDM based on MAS (multi agent system). It carries out the management of information and process by MC (monitor center). The paper first puts forward the architecture of the whole system, then defines the structure of MC and its interoperation mode.
文摘This paper proposes a novel dual layered multi agent system (MAS) based control system for the use in microgrid operations. In developing a smarter grid capable of withstanding disturbances and/or outages and providing quality service to the consumers, reliable microgrid control architecture is vital. The innovative microgrid control system proposed, makes the microgrid capable of isolating the local grid from effects of any upstream disturbances in the main utility grid by operating disconnected from the main utility via islanding, and it allows the most critical local loads to be supplied by any, available, local power source during such islanded operation. The proposed MAS control architecture is developed using the JADE platform and it is used to control a test network simulated in MATLAB. The results of these simulations show the capability of developing MAS based reliable control mechanism for islanding and load management of microgrids based on the proposed concept.
文摘The dramatic improvement of information and communication technology (ICT) has made an evolution in learning management systems (LMS). The rapid growth in LMSs has caused users to demand more advanced, automated, and intelligent services. This paper discusses how Artificial Intelligence and Machine Learning techniques are adopted to fulfill users’ needs in a social learning management system named “CourseNetworking”. The paper explains how machine learning contributed to developing an intelligent agent called “Rumi” as a personal assistant in CourseNetworking platform to add personalization, gamification, and more dynamics to the system. This paper aims to introduce machine learning to traditional learning platforms and guide the developers working in LMS field to benefit from advanced technologies in learning platforms by offering customized services.
文摘Recently multi-agent system(MAS)is regarded as a powerful paradigm to develop and simulate complex system. Because supply chain(SC)is a complex network,it is hard to improve supply chain management(SCM)efficiency and automate SC operating process.Researchers have applied MAS in SCM viewing enterprises in SC as different functional agents collaborating to achieve common goal.In this paper a MAS-based supply chain management framework(MSF)is developed on which agents can collaborate to conduct business activities of enterprises and customers.Six kinds of functional agents are designed,namely, management agent,order receiving agent,order decomposing agent,resource agent,manufacturing-controlling agent and trans- portation agent.Through the agents’ collaboration the MSF can support SC dynamic forming and operating process.For partner selection the method to transmit customers’ order into demand matrix,and transmit enterprise’s resource capacity into resource matrix is described in detail.The MSF users decide which algorithm to be applied in matching the two matrixes,and algorithms are stored in model base.Finally the generic agent architecture is put formard.