Academic literature on the topic 'Multi-agent protection system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multi-agent protection system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multi-agent protection system"

1

Rui, Qian, and Su Qin Qian. "Relay Protection Based on Multi-Agent System." Advanced Materials Research 760-762 (September 2013): 355–58. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.355.

Full text
Abstract:
For the reliable operation of the power grid, multi-agent system is applied to multi-level relay protection to improve the fast response of the short-circuit protection. The thesis conducts the simulation concerning the conventional backup protection and the protection mode based on multi-agent system and makes performance comparison. The results prove that multi-agent system can shorten the response time effectively.
APA, Harvard, Vancouver, ISO, and other styles
2

Khavina, I. P., Yu V. Hnusov, and O. O. Mozhaiev. "Development of multi-agent information security management system." Law and Safety 87, no. 4 (2022): 171–83. http://dx.doi.org/10.32631/pb.2022.4.14.

Full text
Abstract:
The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and implementation of information security management systems in automated systems of enterprises, which, among other things, requires the formalization of the task of protecting information for its subsequent implementation by software and other means. Now there are security analysis systems, for example, that examine the security elements settings of workstat
APA, Harvard, Vancouver, ISO, and other styles
3

Kuandykov, Abu, Raissa Uskenbayeva, Young Im Cho, et al. "Multi-Agent Based Anti-Locust Territory Protection System." Procedia Computer Science 56 (2015): 477–83. http://dx.doi.org/10.1016/j.procs.2015.07.238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fan, Xiao Zhou. "Power System Based on Multi-Agent Technology." Applied Mechanics and Materials 273 (January 2013): 276–79. http://dx.doi.org/10.4028/www.scientific.net/amm.273.276.

Full text
Abstract:
Multi-agent technology combines the technology of computer, networking and distributed artificial intelligence together which is good at solving complex problems about large-scale distributed and open system. Multi-agent technology provides new ways for power system studies. This paper aims at finding a way to rationally use the multi-agent technology to solve complex problems due to improper protection or slow even wrong actions in the large power system.
APA, Harvard, Vancouver, ISO, and other styles
5

Ananda, Stephanus, Jyh-Cherng Gu, Ming-Ta Yang, et al. "Multi-Agent System Fault Protection with Topology Identification in Microgrids." Energies 10, no. 1 (2016): 28. http://dx.doi.org/10.3390/en10010028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yazov, Yury, and Alexander Avsentiev. "INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT." Voprosy kiberbezopasnosti, no. 5(51) (2022): 2–13. http://dx.doi.org/10.21681/2311-3456-2022-5-2-13.

Full text
Abstract:
Purpose: to show the creation and consideration perspective of the ways to build a multi-agent information security system at an informatization object with the implementation of a decentralized and mixed (centralizeddecentralized) principle of its design and functioning in order to exclude the extraction of various types of information, data about the characteristics of the informatization object and relationships between its structural elements. Method: the method of functional and structural analysis of technical channels of leaking information circulating in the form of speech information
APA, Harvard, Vancouver, ISO, and other styles
7

Horfan Álvarez, Daniel, Andrew Mark Bailey, and Lucas Adrián Gómez Blandón. "Distributed network multi agent security system. Net-Mass." Revista Facultad de Ingeniería Universidad de Antioquia, no. 34 (July 24, 2005): 101–13. http://dx.doi.org/10.17533/udea.redin.343174.

Full text
Abstract:
Network security is one of the weakest and most sensitive areas within an organization, because it requires different strategies to protect vulnerable points as well as the coordination and distribution of efforts in order to encompass all the possible forms and points of computer attacks. In this article a distributed multiagent system is proposed as a tool to protect security in networks with different operating systems and which consequently are susceptible to diverse attacks. The system proposed is composed of heterogeneous autonomous agents with different characteristics in terms of their
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Pengyuan, and Manimaran Govindarasu. "Multi-Agent Based Attack-Resilient System Integrity Protection for Smart Grid." IEEE Transactions on Smart Grid 11, no. 4 (2020): 3447–56. http://dx.doi.org/10.1109/tsg.2020.2970755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Albarakati, Aiman J., Mohamed Azeroual, Younes Boujoudar, et al. "Multi-Agent-Based Fault Location and Cyber-Attack Detection in Distribution System." Energies 16, no. 1 (2022): 224. http://dx.doi.org/10.3390/en16010224.

Full text
Abstract:
Accurate fault location is challenging due to the distribution network’s various branches, complicated topology, and the increasing penetration of distributed energy resources (DERs). The diagnostics for power system faults are based on fault localization, isolation, and smart power restoration. Adaptive multi-agent systems (MAS) can improve the reliability, speed, selectivity, and robustness of power system protection. This paper proposes a MAS-based adaptive protection mechanism for fault location in smart grid applications. This study developed a novel distributed intelligent-based multi-ag
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, Jiang, Yan Peng, and Xiao Jun Feng. "Small Wind-Solar Hybrid Power Generation System Based on Multi-Agent." Advanced Materials Research 772 (September 2013): 587–93. http://dx.doi.org/10.4028/www.scientific.net/amr.772.587.

Full text
Abstract:
This paper presents a small wind-solar hybrid power generation system based on multi-agent. The system is composed of wind power agent module, solar power agent module and battery charging and discharging agent module. The power agent generation module is composed of the communication agent, decision-making agent, data processing agent, data collecting agent, power transformation operating agent, protection agent, coordination agent and component control agent. According to the different weather conditions and different power state of equilibrium, the agents of the small wind-solar hybrid powe
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Multi-agent protection system"

1

Davis, Cledo L. "The systems integration of autonomous behavior analysis to create a "Maritime Smart Environment" for the enhancement of maritime domain awareness." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDavis.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, June 2010.<br>Thesis Advisor(s): Goshorn, Rachel ; Goshorn, Deborah. "June 2010." Description based on title screen as viewed on June 24, 2010. Author(s) subject terms: Anomaly Detection, Artificial Intelligence, Automation, Behavior Analysis, Distributed Artificial Intelligence, Intelligence-Surveillance-Reconnaissance, Maritime Domain Awareness, Maritime Force Protection, Multi-agent Systems, Network-centric Operations, Network-centric Systems Engineering, Network-centric Warfare, Smart Sensor Networks, Systems Engineering, Sys
APA, Harvard, Vancouver, ISO, and other styles
2

Twu, Philip Y. "Control of multi-agent networks: from network design to decentralized coordination." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43713.

Full text
Abstract:
This dissertation presents a suite of design tools for multi-agent systems that address three main areas: network design, decentralized controller generation, and the synthesis of decentralized control strategies by combining individual decentralized controllers. First, a new metric for quantifying heterogeneity in multi-agent systems is presented based on combining different notions of entropy, and is shown to overcome the drawbacks associated with existing diversity metrics in various scientific fields. Moreover, a new method of controlling multi-agent networks through the single-leader ne
APA, Harvard, Vancouver, ISO, and other styles
3

Savaux, Julien. "Privacité dans les problèmes distribués contraints pour agents basés utilité." Thesis, Valenciennes, 2017. http://www.theses.fr/2017VALE0030.

Full text
Abstract:
Bien que le domaine des systèmes multi-agents ait été largement étudié, les interactions entre agents entraînent des pertes de privacité. En effet, la résolution de problèmes distribués, étant fréquemment combinatoires, impose un échange intensif d’informations entre les agents jusqu’à l’obtention d’un accord. Le problème est que les approches existantes ne considèrent généralement pas la confidentialité des données et se concentrent surtout sur la satisfaction des contraintes des agents pour évaluer les solutions. Les travaux présentés dans cette thèse visent donc à prendre en compte de façon
APA, Harvard, Vancouver, ISO, and other styles
4

Velay, Maxime. "Méthodes d’optimisation distribuée pour l’exploitation sécurisée des réseaux électriques interconnectés." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT063/document.

Full text
Abstract:
Notre société étant plus dépendante que jamais au vecteur électrique, la moindre perturbation du transport ou de l’acheminement de l’électricité a un impact social et économique important. La fiabilité et la sécurité des réseaux électriques sont donc cruciales pour les gestionnaires de réseaux, en plus des aspects économiques. De plus, les réseaux de transport sont interconnectés pour réduire les coûts des opérations et pour améliorer la sécurité. Un des plus grand défis des gestionnaires des réseaux de transport est ainsi de se coordonner avec les réseaux voisins, ce qui soulève des problèmes
APA, Harvard, Vancouver, ISO, and other styles
5

Peidaee, Pejman. "Integration of Heuristic Multi-Agent Protection System into Distribution Network Interconnected with Distributed Energy Resources." Thesis, 2021. https://vuir.vu.edu.au/42037/.

Full text
Abstract:
Power system operation is undergoing rapid changes due to market deregulations and interconnection of Distributed Energy Resources (DERs) such as wind power and solar panels. The power flow complexities arising from interconnection of DERs into the distribution network have adverse effect on protection systems which can degrade the reliability and power quality in power systems and lead to cascading failures or blackouts. However, with the prospect of integrating Information and Communication Technologies (ICT) infrastructures into power system operation, the ability to utilize advanced protec
APA, Harvard, Vancouver, ISO, and other styles
6

KARAFILI, Erisa. "Deduction and algorithmic approaches to reason about risk, privacy and security in multi-agent systems." Doctoral thesis, 2014. http://hdl.handle.net/11562/696564.

Full text
Abstract:
Recentemente c'è stato un crescente interesse per la privacy e il suo controllo nei sistemi multi-agente. La necessità di condividere le informazioni e il desiderio di mantenerli privati sono due concetti in competizione , in alcuni casi anche in conflitto, che incidono sui sistemi multi-agente, in particolare nei sistemi collaborativi. Il problema principale che ho affrontato è la protezione della sicurezza nei sistemi multi-agente. In questa tesi propongo diversi approcci, che sono tutti collegati gli uni agli altri. Il primo approccio è quello algoritmico, che viene utilizzato per garantir
APA, Harvard, Vancouver, ISO, and other styles
7

Ting, Chien Kao, and 簡高廷. "A Multi-agent Based Pedestrian Protection Systems." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/t88v2a.

Full text
Abstract:
碩士<br>國立中正大學<br>電機工程研究所<br>100<br>A pedestrian warning system is often used to detect the movements and intentions of the pedestrian and gives warning to the relevant participants. Current studies in pedestrian-vehicle conflicts have focused on the sensors installed on the vehicle. In this study, in addition to the driver on the vehicle, we use the pedestrian signal to take the initiative to inform the pedestrians crossing a street and the driver who is heading to the pedestrian crossing concerning the degree of risk.We use a multi-agent system so that the intersection agents and vehicle agent
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Chun-Tamr, and 陳俊達. "Apply Multi-Agent Systems to Fault Protection in Microgrids." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/29112312955324839318.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電機工程系<br>103<br>Traditionally, the supervisory control and data acquisition of typical power systems is using master/slave architecture with centralized management approach. The data transfer and even processing speed is correspondingly slow. Nowadays, the microgrid in distribution systems may connect several types of distributed resources(DR) with different capacity and characteristics. The master/slave architecture with centralized management approach can not satisfy the requirements in control and operation ability. To solve this problem the Multi-Agent Systems(MAS), inclu
APA, Harvard, Vancouver, ISO, and other styles
9

Heydenrych, Mark. "An adaptive multi-agent architecture for critical information infrastructure protection." Thesis, 2014. http://hdl.handle.net/10210/12370.

Full text
Abstract:
M.Sc. (Information Technology)<br>The purpose of the research presented in this dissertation is to explore the uses of an adaptive multi-agent system for critical information infrastructure protection (CIIP). As the name suggests, CIIP is the process of protecting the information system which are connected to the infrastructure essential to the continued running of a country or organisation. CIIP is challenging due largely to the diversity of these infrastructures. The dissertation examines a number of artificial intelligence techniques that can be applied to CIIP; these techniques range from
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Multi-agent protection system"

1

Chen, Shu-Heng, Azuma Ohuchi, and Koichi Kurumatani. Multi-Agent Modeling and Simulation of Economic Systems: Papers from the AAAI Workshop. AAAI Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Marino, Kevin, and Robert James Wright. Toward the Theory of Administrative Tethering. The Rowman & Littlefield Publishing Group, 2022. https://doi.org/10.5040/9781978737617.

Full text
Abstract:
Toward a Theory of Administrative Tethering is the culmination of a seven-year commitment to investigate and explore the highly complex and chaotic nature of collaboration, specifically in child protective services (CPS). This journey began with an atypical relationship between a doctoral student practicing in CPS and an academic mentor. Examination of the CPS system in North Carolina necessitated more in-depth study to foster change relevant to improve service delivery for front-line staff and to engage executive leadership at the local and state levels. All CPS actors must function in a high
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Multi-agent protection system"

1

Hrebennyk, Alla, Elena Trunova, Volodymyr Kazymyr, and Alexander Tarasov. "Modelling a Multi-agent Protection System of an Enterprise Network." In Communications in Computer and Information Science. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44440-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Meiyan, Hongyong Yang, and Yujiao Sun. "Privacy Protection Consistency of Multi-agent System with External Interference." In Lecture Notes in Electrical Engineering. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6324-6_85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Keane-Myers, Andrea M., Matt Bell, Drew Hannaman, and Mark Albrecht. "DNA Electroporation of Multi-agent Vaccines Conferring Protection Against Select Agent Challenge: TriGrid Delivery System." In Methods in Molecular Biology. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9632-8_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aguado, G., V. Julian, and A. Garcia-Fornes. "Multi-agent System for Privacy Protection Through User Emotions in Social Networks." In Communications in Computer and Information Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60285-1_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Raymond S. T., Eddie C. L. Chan, and Raymond Y. W. Mak. "iJADE Content Management System (CMS) – An Intelligent Multi-agent Based Content Management System with Chaotic Copyright Protection Scheme." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11893004_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rehák, Martin, Michal Pěchouček, Jan Tožička, Magda Prokopová, David Medvigy, and Jiří Novotný. "Agent-Based Network Protection Against Malicious Code." In Multi-Agent Systems and Applications V. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75254-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yeo, Sang-Soo, Soo-Cheol Kim, and Sung Kwon Kim. "eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection." In Agent and Multi-Agent Systems: Technologies and Applications. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72830-6_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vrancx, Peter, Ann Nowé, and Kris Steenhaut. "Multi-type ACO for Light Path Protection." In Learning and Adaption in Multi-Agent Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11691839_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Yujiao, Hongyong Yang, and Meiyan Yu. "Coordination Privacy Protection of Multi-agent Systems." In Lecture Notes in Electrical Engineering. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6324-6_83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khovanskov, Sergey, Konstantin Rumyantsev, and Vera Khovanskova. "Organization and Protection on the Basis of a Multi-agent System of Distributed Computing in a Computer Network to Reduce the Time for Solving Large-Scale Tasks." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3804-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multi-agent protection system"

1

Zhuang, Dou, Zhuofan Wen, and Xin Zheng. "Simulation Study of Short-Circuit Protection for Island Microgrid Based on Multi-Agent System Communication." In 2024 5th International Conference on Clean Energy and Electric Power Engineering (ICCEPE). IEEE, 2024. https://doi.org/10.1109/iccepe62686.2024.10931424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cheng, Long, Haoyang He, Yan Gu, Qingzhi Liu, Zhiming Zhao, and Fang Fang. "MARS: Multi-Agent Deep Reinforcement Learning for Real-Time Workflow Scheduling in Hybrid Clouds with Privacy Protection." In 2024 IEEE 30th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2024. http://dx.doi.org/10.1109/icpads63350.2024.00091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Po Hao, Kuo-Lung Lian, and Jhe-Wei Lin. "Adaptive Power System Protective Relays Based on Multi-Agent System Combined with Conservative Power Theory for Highly penetrated Renewable Energy Resources." In 2024 21st International Conference on Harmonics and Quality of Power (ICHQP). IEEE, 2024. https://doi.org/10.1109/ichqp61174.2024.10768690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Halinka, A., P. Rzepka, and M. Szablicki. "Agent model of multi-agent system for area power system protection." In 2015 Modern Electric Power Systems (MEPS). IEEE, 2015. http://dx.doi.org/10.1109/meps.2015.7477185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Qi, and Shuguang Liu. "Relay protection based on Multi-Agent System." In 2011 International Conference on Electrical and Control Engineering (ICECE). IEEE, 2011. http://dx.doi.org/10.1109/iceceng.2011.6057028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

do Nascimento, Leonardo L., and Jacqueline G. Rolim. "Multi-agent system for adaptive protection in microgrids." In 2013 IEEE PES Conference on Innovative Smart Grid Technologies (ISGT Latin America). IEEE, 2013. http://dx.doi.org/10.1109/isgt-la.2013.6554435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lukovic, Slobodan, and Nikolaos Christianos. "Hierarchical multi-agent protection system for NoC based MPSoCs." In the International Workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1868433.1868441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lim, I. H., S. J. Lee, M. S. Choi, and P. Crossley. "Multi-Agent System-based Protection Coordination of Distribution Feeders." In 2007 International Conference on Intelligent Systems Applications to Power Systems. IEEE, 2007. http://dx.doi.org/10.1109/isap.2007.4441686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jinghan He, Jinghan He, T. Yip, Yupeng Huang Yupeng Huang, Ziqi Wang Ziqi Wang, and Lin Liu Lin Liu. "Digital Substation Backup Protection using a Multi-Agent System Approach." In 13th International Conference on Development in Power System Protection 2016 (DPSP). Institution of Engineering and Technology, 2016. http://dx.doi.org/10.1049/cp.2016.0089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

You-Jin Lee, No-Kyu Sung, Chul-Hwan Kim, and R. K. Aggarwal. "Development of auto-reclosing algorithm using multi agent system." In IET 9th International Conference on Developments in Power Systems Protection (DPSP 2008). IEE, 2008. http://dx.doi.org/10.1049/cp:20080023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!