Добірка наукової літератури з теми "Multi-agent protection system"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Multi-agent protection system".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Multi-agent protection system"
Rui, Qian, and Su Qin Qian. "Relay Protection Based on Multi-Agent System." Advanced Materials Research 760-762 (September 2013): 355–58. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.355.
Повний текст джерелаKuandykov, Abu, Raissa Uskenbayeva, Young Im Cho, Dinara Kozhamzharova, Olimzhon Baimuratov, Yersain Chinibayev, and Nurlan Karimzhan. "Multi-Agent Based Anti-Locust Territory Protection System." Procedia Computer Science 56 (2015): 477–83. http://dx.doi.org/10.1016/j.procs.2015.07.238.
Повний текст джерелаFan, Xiao Zhou. "Power System Based on Multi-Agent Technology." Applied Mechanics and Materials 273 (January 2013): 276–79. http://dx.doi.org/10.4028/www.scientific.net/amm.273.276.
Повний текст джерелаAnanda, Stephanus, Jyh-Cherng Gu, Ming-Ta Yang, Jing-Min Wang, Jun-Da Chen, Yung-Ruei Chang, Yih-Der Lee, Chen-Min Chan, and Chia-Hao Hsu. "Multi-Agent System Fault Protection with Topology Identification in Microgrids." Energies 10, no. 1 (December 27, 2016): 28. http://dx.doi.org/10.3390/en10010028.
Повний текст джерелаAlbarakati, Aiman J., Mohamed Azeroual, Younes Boujoudar, Lahcen EL Iysaouy, Ayman Aljarbouh, Asifa Tassaddiq, and Hassane EL Markhi. "Multi-Agent-Based Fault Location and Cyber-Attack Detection in Distribution System." Energies 16, no. 1 (December 25, 2022): 224. http://dx.doi.org/10.3390/en16010224.
Повний текст джерелаYazov, Yury, and Alexander Avsentiev. "INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT." Voprosy kiberbezopasnosti, no. 5(51) (2022): 2–13. http://dx.doi.org/10.21681/2311-3456-2022-5-2-13.
Повний текст джерелаWang, Pengyuan, and Manimaran Govindarasu. "Multi-Agent Based Attack-Resilient System Integrity Protection for Smart Grid." IEEE Transactions on Smart Grid 11, no. 4 (July 2020): 3447–56. http://dx.doi.org/10.1109/tsg.2020.2970755.
Повний текст джерелаPeidaee, Pejman, Akhtar Kalam, and Juan Shi. "Integration of a Heuristic Multi-Agent Protection System into a Distribution Network Interconnected with Distributed Energy Resources." Energies 13, no. 20 (October 9, 2020): 5250. http://dx.doi.org/10.3390/en13205250.
Повний текст джерелаChang, Jiang, Yan Peng, and Xiao Jun Feng. "Small Wind-Solar Hybrid Power Generation System Based on Multi-Agent." Advanced Materials Research 772 (September 2013): 587–93. http://dx.doi.org/10.4028/www.scientific.net/amr.772.587.
Повний текст джерелаYang, Li, Xie Dong Cao, and Jie Li. "Research on Minimum-Cost-Based Task Decomposition Model of Multiple Expert Systems for Oil-Gas Reservoir Protection Based on Agent." Applied Mechanics and Materials 275-277 (January 2013): 2650–53. http://dx.doi.org/10.4028/www.scientific.net/amm.275-277.2650.
Повний текст джерелаДисертації з теми "Multi-agent protection system"
Davis, Cledo L. "The systems integration of autonomous behavior analysis to create a "Maritime Smart Environment" for the enhancement of maritime domain awareness." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDavis.pdf.
Повний текст джерелаThesis Advisor(s): Goshorn, Rachel ; Goshorn, Deborah. "June 2010." Description based on title screen as viewed on June 24, 2010. Author(s) subject terms: Anomaly Detection, Artificial Intelligence, Automation, Behavior Analysis, Distributed Artificial Intelligence, Intelligence-Surveillance-Reconnaissance, Maritime Domain Awareness, Maritime Force Protection, Multi-agent Systems, Network-centric Operations, Network-centric Systems Engineering, Network-centric Warfare, Smart Sensor Networks, Systems Engineering, Systems Integration, System of Systems. Includes bibliographical references (p. 209-212). Also available in print.
Twu, Philip Y. "Control of multi-agent networks: from network design to decentralized coordination." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43713.
Повний текст джерелаSavaux, Julien. "Privacité dans les problèmes distribués contraints pour agents basés utilité." Thesis, Valenciennes, 2017. http://www.theses.fr/2017VALE0030.
Повний текст джерелаAlthough the field of multi-agent systems has been largely studied, interactions between agents imply privacy loss. Indeed, solving distributed problems, being frequently combinatorial, implies an extensive exchange of information between agents until an agreement is found. The problem is that existing approaches do not generally consider privacy and focus only on the satisfaction of agents’ constraints to evaluate solution. The works presented in this thesis therefore aim at considering systematically the issue of privacy in distributed reasoning. We show that existing works in the field still let agents preserve implicitly some degree of privacy. We propose an approach based on utility theory, a formal setting well defined in Artificial Intelligence, allowing an objective and quantitative approach to the interests and reasonable behaviours of agents. More precisely, the model we have developed includes non only the usual parameters but also information on agents privacy quantified in term of utility. We also show that these problems must be considered as planning problems where agents choose actions maximizing their utility. Common algorithms can be described as plans usable as generic models by intelligent planners. Conducted experiments let us validate the approach and evaluate the quality of obtained solution, while showing that their efficiency can be improved thanks to privacy considerations
Velay, Maxime. "Méthodes d’optimisation distribuée pour l’exploitation sécurisée des réseaux électriques interconnectés." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT063/document.
Повний текст джерелаOur societies are more dependent on electricity than ever, thus any disturbance in the power transmission and delivery has major economic and social impact. The reliability and security of power systems are then crucial to keep, for power system operators, in addition to minimizing the system operating cost. Moreover, transmission systems are interconnected to decrease the cost of operation and improve the system security. One of the main challenges for transmission system operators is therefore to coordinate with interconnected power systems, which raises scalability, interoperability and privacy issues. Hence, this thesis is concerned with how TSOs can operate their networks in a decentralized way but coordinating their operation with other neighboring TSOs to find a cost-effective scheduling that is globally secure.The main focus of this thesis is the security of power systems, this is why the evolution of the main characteristics of the blackouts that are failures in power system security, of the period 2005-2016 is studied. The approach consists in determining what the major characteristics of the incidents of the past 10 years are, to identify what should be taken into account to mitigate the risk of incidents. The evolution have been studied and compared with the characteristics of the blackouts before 2005. The study focuses on the pre-conditions that led to those blackouts and on the cascades, and especially the role of the cascade speed. Some important features are extracted and later integrated in our work.An algorithm that solve the preventive Security Constrained Optimal Power Flow (SCOPF) problem in a fully distributed manner, is thus developed. The preventive SCOPF problem consists in adding constraints that ensure that, after the loss of any major device of the system, the new steady-state reached, as a result of the primary frequency control, does not violate any constraint. The developed algorithm uses a fine-grained decomposition and is implemented under the multi-agent system paradigm based on two categories of agents: devices and buses. The agents are coordinated with the Alternating Direction method of multipliers in conjunction with a consensus problem. This decomposition provides the autonomy and privacy to the different actors of the system and the fine-grained decomposition allows to take the most of the decomposition and provides a good scalability regarding the size of the problem. This algorithm also have the advantage of being robust to any disturbance of the system, including the separation of the system into regions.Then, to account for the uncertainty of production brought by wind farms forecast error, a two-step distributed approach is developed to solve the Chance-Constrained Optimal Power Flow problem, in a fully distributed manner. The wind farms forecast errors are modeled by independent Gaussian distributions and the mismatches with the initials are assumed to be compensated by the primary frequency response of generators. The first step of this algorithm aims at determining the sensitivity factors of the system, needed to formulate the problem. The results of this first step are inputs of the second step that is the CCOPF. An extension of this formulation provides more flexibility to the problem and consists in including the possibility to curtail the wind farms. This algorithm relies on the same fine-grained decomposition where the agents are again coordinated by the ADMM and a consensus problem. In conclusion, this two-step algorithm ensures the privacy and autonomy of the different system actors and it is de facto parallel and adapted to high performance platforms
Peidaee, Pejman. "Integration of Heuristic Multi-Agent Protection System into Distribution Network Interconnected with Distributed Energy Resources." Thesis, 2021. https://vuir.vu.edu.au/42037/.
Повний текст джерелаTing, Chien Kao, and 簡高廷. "A Multi-agent Based Pedestrian Protection Systems." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/t88v2a.
Повний текст джерела國立中正大學
電機工程研究所
100
A pedestrian warning system is often used to detect the movements and intentions of the pedestrian and gives warning to the relevant participants. Current studies in pedestrian-vehicle conflicts have focused on the sensors installed on the vehicle. In this study, in addition to the driver on the vehicle, we use the pedestrian signal to take the initiative to inform the pedestrians crossing a street and the driver who is heading to the pedestrian crossing concerning the degree of risk.We use a multi-agent system so that the intersection agents and vehicle agents can communicate. By communicating, vehicle agents can obtain the pedestrian information of the intersection ahead. Each intersection has an intersection agent monitoring the intersection, and we allow more than one vehicle agent which represents each vehicle. When the vehicle agents enter a new intersection, they will receive data from the intersection agent and combine with vehicle information to estimate the conflict-related parameters. We use a two-stage warning method, the warning stage and the command stage, which are performed according to the distance from vehicle to the conflict area. We have developed an agent-based simulation system for a pedestrian warning system that has a pedestrian signal and an active warning system on vehicles to achieve driver personalization and improve road safety.
Chen, Chun-Tamr, and 陳俊達. "Apply Multi-Agent Systems to Fault Protection in Microgrids." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/29112312955324839318.
Повний текст джерела國立臺灣科技大學
電機工程系
103
Traditionally, the supervisory control and data acquisition of typical power systems is using master/slave architecture with centralized management approach. The data transfer and even processing speed is correspondingly slow. Nowadays, the microgrid in distribution systems may connect several types of distributed resources(DR) with different capacity and characteristics. The master/slave architecture with centralized management approach can not satisfy the requirements in control and operation ability. To solve this problem the Multi-Agent Systems(MAS), including CB Agent and Calculation Agent, is introduced. It may simplify a complicated object to several easy objects. Furthermore, the data related to each object can freely transfer between Agents and function independently. First, the international standards about microgrid and DR have been well referred. Both MATLAB/Simulink and Java Agent Development Framework (JADE) are applied to setup microgrid simulation systems and Multi-Agent Systems which comply with Foundation for Intelligent Physical Agents (FIPA). The peer to peer data transfer between CB Agents has been verified. To discover the cases in normal operation and faulted condition an example system from the microgrid at Institute of Nuclear Energy Research(INER) is introduced. The online impedance measurement technology is also applied to build up the bus impedance matrix of systems for Calculation Agent. Then, each CB Agent can get the pickup or tripping setting from Calculation Agent to perform protection work. The result showed that MAS not only can properly program the protection setting in different scenarios, but also perform the correct control action accordingly for microgrid.
Heydenrych, Mark. "An adaptive multi-agent architecture for critical information infrastructure protection." Thesis, 2014. http://hdl.handle.net/10210/12370.
Повний текст джерелаThe purpose of the research presented in this dissertation is to explore the uses of an adaptive multi-agent system for critical information infrastructure protection (CIIP). As the name suggests, CIIP is the process of protecting the information system which are connected to the infrastructure essential to the continued running of a country or organisation. CIIP is challenging due largely to the diversity of these infrastructures. The dissertation examines a number of artificial intelligence techniques that can be applied to CIIP; these techniques range from multi-agent systems to swarm optimisation. The task of protection is broken into three distinct areas: preventing unauthorised communication from outside the system; identifying anomalous actions on computers within the system; and ensuring that communication within the system is not modified externally. A multi-agent learning model, MALAMANTEAU, is proposed as a way to address the problem of CIIP. Due to various problems facing CIIP, multi-agent systems present good opportunities for solving these many problems in a single model. Agents within the MALAMANTEAU model will use diverse artificial and computational intelligence techniques in order to provide an adaptable approach to protecting critical networks. The research presented in the dissertation shows how computational intelligence can be employed alongside multi-agent systems in order to provide powerful protection for critical networks without exposing further security risks.
Книги з теми "Multi-agent protection system"
Chen, Shu-Heng, Azuma Ohuchi, and Koichi Kurumatani. Multi-Agent Modeling and Simulation of Economic Systems: Papers from the AAAI Workshop. AAAI Press, 2002.
Знайти повний текст джерелаЧастини книг з теми "Multi-agent protection system"
Yu, Meiyan, Hongyong Yang, and Yujiao Sun. "Privacy Protection Consistency of Multi-agent System with External Interference." In Lecture Notes in Electrical Engineering, 839–49. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6324-6_85.
Повний текст джерелаKeane-Myers, Andrea M., Matt Bell, Drew Hannaman, and Mark Albrecht. "DNA Electroporation of Multi-agent Vaccines Conferring Protection Against Select Agent Challenge: TriGrid Delivery System." In Methods in Molecular Biology, 325–36. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9632-8_29.
Повний текст джерелаAguado, G., V. Julian, and A. Garcia-Fornes. "Multi-agent System for Privacy Protection Through User Emotions in Social Networks." In Communications in Computer and Information Science, 235–45. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60285-1_20.
Повний текст джерелаLee, Raymond S. T., Eddie C. L. Chan, and Raymond Y. W. Mak. "iJADE Content Management System (CMS) – An Intelligent Multi-agent Based Content Management System with Chaotic Copyright Protection Scheme." In Lecture Notes in Computer Science, 652–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11893004_84.
Повний текст джерелаRehák, Martin, Michal Pěchouček, Jan Tožička, Magda Prokopová, David Medvigy, and Jiří Novotný. "Agent-Based Network Protection Against Malicious Code." In Multi-Agent Systems and Applications V, 22–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75254-7_3.
Повний текст джерелаYeo, Sang-Soo, Soo-Cheol Kim, and Sung Kwon Kim. "eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection." In Agent and Multi-Agent Systems: Technologies and Applications, 318–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72830-6_33.
Повний текст джерелаSun, Yujiao, Hongyong Yang, and Meiyan Yu. "Coordination Privacy Protection of Multi-agent Systems." In Lecture Notes in Electrical Engineering, 822–29. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6324-6_83.
Повний текст джерелаVrancx, Peter, Ann Nowé, and Kris Steenhaut. "Multi-type ACO for Light Path Protection." In Learning and Adaption in Multi-Agent Systems, 207–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11691839_13.
Повний текст джерелаKhovanskov, Sergey, Konstantin Rumyantsev, and Vera Khovanskova. "Organization and Protection on the Basis of a Multi-agent System of Distributed Computing in a Computer Network to Reduce the Time for Solving Large-Scale Tasks." In Communications in Computer and Information Science, 292–303. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3804-5_22.
Повний текст джерелаYu, Meiyan, Hongyong Yang, Yujiao Sun, and Fei Liu. "Consistency of Continuous Multi-agent Systems with Privacy Protection." In Lecture Notes in Electrical Engineering, 769–77. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8450-3_80.
Повний текст джерелаТези доповідей конференцій з теми "Multi-agent protection system"
Halinka, A., P. Rzepka, and M. Szablicki. "Agent model of multi-agent system for area power system protection." In 2015 Modern Electric Power Systems (MEPS). IEEE, 2015. http://dx.doi.org/10.1109/meps.2015.7477185.
Повний текст джерелаZhao, Qi, and Shuguang Liu. "Relay protection based on Multi-Agent System." In 2011 International Conference on Electrical and Control Engineering (ICECE). IEEE, 2011. http://dx.doi.org/10.1109/iceceng.2011.6057028.
Повний текст джерелаdo Nascimento, Leonardo L., and Jacqueline G. Rolim. "Multi-agent system for adaptive protection in microgrids." In 2013 IEEE PES Conference on Innovative Smart Grid Technologies (ISGT Latin America). IEEE, 2013. http://dx.doi.org/10.1109/isgt-la.2013.6554435.
Повний текст джерелаLukovic, Slobodan, and Nikolaos Christianos. "Hierarchical multi-agent protection system for NoC based MPSoCs." In the International Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1868433.1868441.
Повний текст джерелаLim, I. H., S. J. Lee, M. S. Choi, and P. Crossley. "Multi-Agent System-based Protection Coordination of Distribution Feeders." In 2007 International Conference on Intelligent Systems Applications to Power Systems. IEEE, 2007. http://dx.doi.org/10.1109/isap.2007.4441686.
Повний текст джерелаJinghan He, Jinghan He, T. Yip, Yupeng Huang Yupeng Huang, Ziqi Wang Ziqi Wang, and Lin Liu Lin Liu. "Digital Substation Backup Protection using a Multi-Agent System Approach." In 13th International Conference on Development in Power System Protection 2016 (DPSP). Institution of Engineering and Technology, 2016. http://dx.doi.org/10.1049/cp.2016.0089.
Повний текст джерелаYou-Jin Lee, No-Kyu Sung, Chul-Hwan Kim, and R. K. Aggarwal. "Development of auto-reclosing algorithm using multi agent system." In IET 9th International Conference on Developments in Power Systems Protection (DPSP 2008). IEE, 2008. http://dx.doi.org/10.1049/cp:20080023.
Повний текст джерелаJia, Xingbei, Chunxia Dou, Zhiqian Bo, Fang Zhao, and Dongle Liu. "Application of multi-agent technology in micro-grid system." In 2011 IEEE International Conference on Advanced Power System Automation and Protection (APAP). IEEE, 2011. http://dx.doi.org/10.1109/apap.2011.6180729.
Повний текст джерелаQin, LiJun, Ying Wang, Cuijuan Hao, and Meng Li. "Multi-Agent System wide area protection considering distributed generation impact." In 2011 IEEE International Conference on Advanced Power System Automation and Protection (APAP). IEEE, 2011. http://dx.doi.org/10.1109/apap.2011.6180462.
Повний текст джерелаZhao, Tinghong, Zibin Man, and Zhijun Wang. "The Research of Relay Protection System Based on Multi-Agent." In 2008 Second International Symposium on Intelligent Information Technology Application (IITA). IEEE, 2008. http://dx.doi.org/10.1109/iita.2008.527.
Повний текст джерела