Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader us...Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader uses the feedback information from followers to the leader to modify its motion. The advantage of this control scheme is that it reduces the tracking errors and improves the robustness of the team cohesion to followers' faults. The results of simulation are provided to illustrate that information feedback can improve the performance of the system.展开更多
In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related coo...In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related cooperation, coordi-nation and control mechanisms is encouraging the development of new information management strategies to direct and man- age the automated systems involved in the manufacturing processes. The Computational Intelligent (CI) approaches seem to provide an effective support to the challenges posed by the next generation industrial systems. In particular, the Intelligent Agents (IAs) and the Multi-Agent Systems (MASs) paradigms seem to provide the best suitable solutions. Autonomy, flexibility and adaptability of the agent-based technology are the key points to manage both automated and information processes of any industrial system. The paper describes the main features of the IAs and MASs and how their technology can be adapted to support the current and next generation advanced industrial systems. Moreover, a study of how a MAS is utilized within a productive process is depicted.展开更多
This paper described an ontology based multi agent knowledge process made (MAKM) which is one of multi agents systems (MAS) and uses semantic network to describe agents to help to locate relative agents distributed in...This paper described an ontology based multi agent knowledge process made (MAKM) which is one of multi agents systems (MAS) and uses semantic network to describe agents to help to locate relative agents distributed in the workgroup. In MAKM, an agent is the entity to implement the distributed task processing and to access the information or knowledge. Knowledge query manipulation language (KQML) is adapted to realize the communication among agents. So using the MAKM mode, different knowledge and information on the medical domain could be organized and utilized efficiently when a collaborative task is implemented on the web.展开更多
In a dynamic environment, it is vital for enterpris e to have flexible information system architecture to integrate ERP, Supply Chain Management (SCM) and E-Commerce (EC). The traditional systems are established o n t...In a dynamic environment, it is vital for enterpris e to have flexible information system architecture to integrate ERP, Supply Chain Management (SCM) and E-Commerce (EC). The traditional systems are established o n the ERP-centered flat architecture. This architecture has some disadvantages in supporting the dynamics of enterprises. Firstly, ERP is already a very expens ive and complex system; the extension based on it can only increase the complexi ty and make the implementation more expensive and risky. Secondly, under the arc hitecture, the flexibility is reduced sharply although the execution efficiency is maintained. In a rapid changing environment, flexibility is also an equally i mportant factor besides execution efficiency. Thirdly, it cannot support the dyn amic collaboration efficiently. The prevailing of the flat architecture is not d ue to its advantage but to the big software providers. From the system viewpoint , a hierarchical architecture is proposed. Difference from the current architect ure, in the hierarchical paradigm, ERP is put in the bottom level rather centere d. SCM is the center system, which adopts a multi-agent structure. EC is regard ed as its foreground interface, while ERP and other information system of the pa rtner or internal units are the background executors. EC is the extension of mar ket agent and purchase agent. It fulfills the function of trade on Internet by s ending orders to be executed to SCM and receiving the progress information of th e orders from SCM. After receiving orders from EC, the agent in charge of schedu le in SCM makes preliminary plan in form of instructions (which may be infeasibl e) based on the information of source. Trough the coordination of multi agent, the plan is adjusted to be feasible. Compared with current ERP-centered flat ar chitecture, the hierarchical structure pays more attention to dynamic collaborat ion rather the optimization within the enterprise. At last, two engineering case s, Beijing Shang Pu Electric Ltd and Qingtao Tianyue International Building Mate rial Free Trade City, are presented to illustrate the idea.展开更多
With the more intense competition in the worldwide market, the agile virtual enterprise (AVE) will become a new organization form of manufacturing enterprise. To support the new relationship, an agile manufacturing in...With the more intense competition in the worldwide market, the agile virtual enterprise (AVE) will become a new organization form of manufacturing enterprise. To support the new relationship, an agile manufacturing information system (AMIS) is described in this paper which serves to assist the virtual enterprise to manage and control information flow among collaborating partners. Based on the requirement analysis of virtual information system, the architecture, functions, features and execution scheme of AMIS are discussed in detail.展开更多
Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent di...Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent distributed IDS model, enhanced with a method of computing its statistical values of performance is presented. This model can accomplish not only distributed information collection, but also distributed intrusion detection and real-time reaction. Owing to prompt reaction and openness, it can detect intrusion behavior of both known and unknown sources. According to preliminary tests, the accuracy ratio of intrusion detection is higher than 92% on the average.展开更多
In this paper, we propose the multi-living agent (MLA) concept based on the of analysis the characteristics of complex information systems, especially those systems that require multi-functional operations under str...In this paper, we propose the multi-living agent (MLA) concept based on the of analysis the characteristics of complex information systems, especially those systems that require multi-functional operations under strict restraint strong countermeasures (SRSC) environment. First, we investigate the representation of the livelihood of the system under the SRSC conditions, and obtain the basic dynamical presentation of the MLA from the profile of the system's function. Next, we propose the concept of the living self-organization based on the self-organization profile of the system, and derive a Two-Set model of the living self-organization mechanism. Further, based on the above results, we present a basic construction model of MLA-based information systems in the field of information security and countermeasures. A three-level negotiation-coordination mechanism is also derived. Finally, we present two practical examples to show how to use the MLA concept to analyze and study real complex information systems. In our opinion, the proposal of the MLA will bridge the gap between the research of the application and the basic application level of science. It provides the principle research methods and the supporting theories for the construction and analysis of complex information systems in the information security and countermeasures field.展开更多
The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud se...The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.展开更多
基金supported by the National Natural Science Foundation of China(60574088).
文摘Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader uses the feedback information from followers to the leader to modify its motion. The advantage of this control scheme is that it reduces the tracking errors and improves the robustness of the team cohesion to followers' faults. The results of simulation are provided to illustrate that information feedback can improve the performance of the system.
文摘In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related cooperation, coordi-nation and control mechanisms is encouraging the development of new information management strategies to direct and man- age the automated systems involved in the manufacturing processes. The Computational Intelligent (CI) approaches seem to provide an effective support to the challenges posed by the next generation industrial systems. In particular, the Intelligent Agents (IAs) and the Multi-Agent Systems (MASs) paradigms seem to provide the best suitable solutions. Autonomy, flexibility and adaptability of the agent-based technology are the key points to manage both automated and information processes of any industrial system. The paper describes the main features of the IAs and MASs and how their technology can be adapted to support the current and next generation advanced industrial systems. Moreover, a study of how a MAS is utilized within a productive process is depicted.
基金National Natural Science Foundation of China (No. 6993 10 10 )
文摘This paper described an ontology based multi agent knowledge process made (MAKM) which is one of multi agents systems (MAS) and uses semantic network to describe agents to help to locate relative agents distributed in the workgroup. In MAKM, an agent is the entity to implement the distributed task processing and to access the information or knowledge. Knowledge query manipulation language (KQML) is adapted to realize the communication among agents. So using the MAKM mode, different knowledge and information on the medical domain could be organized and utilized efficiently when a collaborative task is implemented on the web.
文摘In a dynamic environment, it is vital for enterpris e to have flexible information system architecture to integrate ERP, Supply Chain Management (SCM) and E-Commerce (EC). The traditional systems are established o n the ERP-centered flat architecture. This architecture has some disadvantages in supporting the dynamics of enterprises. Firstly, ERP is already a very expens ive and complex system; the extension based on it can only increase the complexi ty and make the implementation more expensive and risky. Secondly, under the arc hitecture, the flexibility is reduced sharply although the execution efficiency is maintained. In a rapid changing environment, flexibility is also an equally i mportant factor besides execution efficiency. Thirdly, it cannot support the dyn amic collaboration efficiently. The prevailing of the flat architecture is not d ue to its advantage but to the big software providers. From the system viewpoint , a hierarchical architecture is proposed. Difference from the current architect ure, in the hierarchical paradigm, ERP is put in the bottom level rather centere d. SCM is the center system, which adopts a multi-agent structure. EC is regard ed as its foreground interface, while ERP and other information system of the pa rtner or internal units are the background executors. EC is the extension of mar ket agent and purchase agent. It fulfills the function of trade on Internet by s ending orders to be executed to SCM and receiving the progress information of th e orders from SCM. After receiving orders from EC, the agent in charge of schedu le in SCM makes preliminary plan in form of instructions (which may be infeasibl e) based on the information of source. Trough the coordination of multi agent, the plan is adjusted to be feasible. Compared with current ERP-centered flat ar chitecture, the hierarchical structure pays more attention to dynamic collaborat ion rather the optimization within the enterprise. At last, two engineering case s, Beijing Shang Pu Electric Ltd and Qingtao Tianyue International Building Mate rial Free Trade City, are presented to illustrate the idea.
基金This project was supported by the State High-Tech Development Plan of China.
文摘With the more intense competition in the worldwide market, the agile virtual enterprise (AVE) will become a new organization form of manufacturing enterprise. To support the new relationship, an agile manufacturing information system (AMIS) is described in this paper which serves to assist the virtual enterprise to manage and control information flow among collaborating partners. Based on the requirement analysis of virtual information system, the architecture, functions, features and execution scheme of AMIS are discussed in detail.
基金Supported by the Key Program of Natural Science Foundation of China(050335020)
文摘Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent distributed IDS model, enhanced with a method of computing its statistical values of performance is presented. This model can accomplish not only distributed information collection, but also distributed intrusion detection and real-time reaction. Owing to prompt reaction and openness, it can detect intrusion behavior of both known and unknown sources. According to preliminary tests, the accuracy ratio of intrusion detection is higher than 92% on the average.
基金Supported by National Natural Science Foundation of China (61079001, 61273006), National High Technology Research and Development Program of China (863 Program) (2011AAl10301), Specialized Research Fund for the Doctoral Program of Higher Education of China (20111103110017), Hebei Province Science and Technology Research and Development Planning Project (10203548D), Hebei Province Science and Technology Planning Project (13210807) Hebei Province Science and Technology Conditions Building Program (11963546D)
基金Supported by the Ministerial Foundation of China (Grant No. A2220060039)
文摘In this paper, we propose the multi-living agent (MLA) concept based on the of analysis the characteristics of complex information systems, especially those systems that require multi-functional operations under strict restraint strong countermeasures (SRSC) environment. First, we investigate the representation of the livelihood of the system under the SRSC conditions, and obtain the basic dynamical presentation of the MLA from the profile of the system's function. Next, we propose the concept of the living self-organization based on the self-organization profile of the system, and derive a Two-Set model of the living self-organization mechanism. Further, based on the above results, we present a basic construction model of MLA-based information systems in the field of information security and countermeasures. A three-level negotiation-coordination mechanism is also derived. Finally, we present two practical examples to show how to use the MLA concept to analyze and study real complex information systems. In our opinion, the proposal of the MLA will bridge the gap between the research of the application and the basic application level of science. It provides the principle research methods and the supporting theories for the construction and analysis of complex information systems in the information security and countermeasures field.
文摘The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.