Добірка наукової літератури з теми "Multi-agent protection system"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Multi-agent protection system".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Multi-agent protection system"

1

Rui, Qian, and Su Qin Qian. "Relay Protection Based on Multi-Agent System." Advanced Materials Research 760-762 (September 2013): 355–58. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.355.

Повний текст джерела
Анотація:
For the reliable operation of the power grid, multi-agent system is applied to multi-level relay protection to improve the fast response of the short-circuit protection. The thesis conducts the simulation concerning the conventional backup protection and the protection mode based on multi-agent system and makes performance comparison. The results prove that multi-agent system can shorten the response time effectively.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kuandykov, Abu, Raissa Uskenbayeva, Young Im Cho, Dinara Kozhamzharova, Olimzhon Baimuratov, Yersain Chinibayev, and Nurlan Karimzhan. "Multi-Agent Based Anti-Locust Territory Protection System." Procedia Computer Science 56 (2015): 477–83. http://dx.doi.org/10.1016/j.procs.2015.07.238.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Fan, Xiao Zhou. "Power System Based on Multi-Agent Technology." Applied Mechanics and Materials 273 (January 2013): 276–79. http://dx.doi.org/10.4028/www.scientific.net/amm.273.276.

Повний текст джерела
Анотація:
Multi-agent technology combines the technology of computer, networking and distributed artificial intelligence together which is good at solving complex problems about large-scale distributed and open system. Multi-agent technology provides new ways for power system studies. This paper aims at finding a way to rationally use the multi-agent technology to solve complex problems due to improper protection or slow even wrong actions in the large power system.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ananda, Stephanus, Jyh-Cherng Gu, Ming-Ta Yang, Jing-Min Wang, Jun-Da Chen, Yung-Ruei Chang, Yih-Der Lee, Chen-Min Chan, and Chia-Hao Hsu. "Multi-Agent System Fault Protection with Topology Identification in Microgrids." Energies 10, no. 1 (December 27, 2016): 28. http://dx.doi.org/10.3390/en10010028.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Albarakati, Aiman J., Mohamed Azeroual, Younes Boujoudar, Lahcen EL Iysaouy, Ayman Aljarbouh, Asifa Tassaddiq, and Hassane EL Markhi. "Multi-Agent-Based Fault Location and Cyber-Attack Detection in Distribution System." Energies 16, no. 1 (December 25, 2022): 224. http://dx.doi.org/10.3390/en16010224.

Повний текст джерела
Анотація:
Accurate fault location is challenging due to the distribution network’s various branches, complicated topology, and the increasing penetration of distributed energy resources (DERs). The diagnostics for power system faults are based on fault localization, isolation, and smart power restoration. Adaptive multi-agent systems (MAS) can improve the reliability, speed, selectivity, and robustness of power system protection. This paper proposes a MAS-based adaptive protection mechanism for fault location in smart grid applications. This study developed a novel distributed intelligent-based multi-agent prevention and mitigation technique for power systems against electrical faults and cyber-attacks. Simulation studies are performed on a platform constructed by interconnecting the power distribution system of Kenitra city developed in MATLAB/SIMULINK and the multi-agent system implemented in the JADE platform. The simulation results demonstrate the effectiveness of the proposed technique.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Yazov, Yury, and Alexander Avsentiev. "INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT." Voprosy kiberbezopasnosti, no. 5(51) (2022): 2–13. http://dx.doi.org/10.21681/2311-3456-2022-5-2-13.

Повний текст джерела
Анотація:
Purpose: to show the creation and consideration perspective of the ways to build a multi-agent information security system at an informatization object with the implementation of a decentralized and mixed (centralizeddecentralized) principle of its design and functioning in order to exclude the extraction of various types of information, data about the characteristics of the informatization object and relationships between its structural elements. Method: the method of functional and structural analysis of technical channels of leaking information circulating in the form of speech information at the informatization objects of the internal affairs bodies in the course of their daily activities or during official activities, as well as ways to build an information security system from leakage through technical channels is applied. Result: the factors determined are those that are necessary to be taken into account when substantiating the composition and functions of agents of a multi-agent information security system, depending on the conditions characterizing the dynamics of the intruder’s actions to obtain protected information, the dynamics of the application of measures and means of protection. It is shown that a multi-agent protection system composition can include two classes of agents - simple and intelligent, and the system itself must be a multilayer structure, each layer of which is tied to a certain type of technical information leakage channels, and contain one or more agents (meta-agents), which provide solution of decision support tasks for information protection in each layer and in the security system as a whole and control of other agents. Examples of the composition and structure of a multi-agent system for protecting against leakage through technical channels, as well as examples of the structure of a simple and intelligent agent for such a system are given. The scientific novelty of the article is in the fact that the idea of creating a multi-agent system is considered for the first time in relation to solving the problem of protecting information from leakage through technical channels, the composition, structure and functions of such systems are determined, as well as the directions for the development of methodological support for their creation and operation.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wang, Pengyuan, and Manimaran Govindarasu. "Multi-Agent Based Attack-Resilient System Integrity Protection for Smart Grid." IEEE Transactions on Smart Grid 11, no. 4 (July 2020): 3447–56. http://dx.doi.org/10.1109/tsg.2020.2970755.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Peidaee, Pejman, Akhtar Kalam, and Juan Shi. "Integration of a Heuristic Multi-Agent Protection System into a Distribution Network Interconnected with Distributed Energy Resources." Energies 13, no. 20 (October 9, 2020): 5250. http://dx.doi.org/10.3390/en13205250.

Повний текст джерела
Анотація:
In conventional method protection schemes are devised for certain operation conditions with fixed settings throughout their operation life, however, protection systems in interconnected distribution networks rely on a detailed analysis of fault current contribution and variation in operation conditions under real-world scenarios. In fact, the concept of Adaptive Protection System (APS) and possibility of the adjustment for protection settings within modern Intelligent Electronic Devices (IEDs) have introduced desired functionalities for protection systems to cope with complex operation scenarios envisioned within future power system networks. In this paper, a novel protection system based on Multi-Agent System (MAS) and heuristic decision-making is proposed to update protection settings of the protection IEDs with respect to prevailing operation conditions in an interconnected distribution network. The adopted methodology is reliant on real-time simulation of a distribution network interconnected with Doubly-fed Induction Generator (DFIG) wind farms where different fault scenarios are applied to evaluate the functionality and performance of the proposed Multi-Agent Protection System (MAPS). In addition to that, combination of knowledge sharing between different protection IEDs and logic reasoning are integrated to fulfill protection task under real-world operation scenarios. The significance of the proposed MAPS is the improvement in protection system of the interconnected distribution network.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Chang, Jiang, Yan Peng, and Xiao Jun Feng. "Small Wind-Solar Hybrid Power Generation System Based on Multi-Agent." Advanced Materials Research 772 (September 2013): 587–93. http://dx.doi.org/10.4028/www.scientific.net/amr.772.587.

Повний текст джерела
Анотація:
This paper presents a small wind-solar hybrid power generation system based on multi-agent. The system is composed of wind power agent module, solar power agent module and battery charging and discharging agent module. The power agent generation module is composed of the communication agent, decision-making agent, data processing agent, data collecting agent, power transformation operating agent, protection agent, coordination agent and component control agent. According to the different weather conditions and different power state of equilibrium, the agents of the small wind-solar hybrid power generation system coordinate and use the optimal control strategy to achieve the best operation state of the power system.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yang, Li, Xie Dong Cao, and Jie Li. "Research on Minimum-Cost-Based Task Decomposition Model of Multiple Expert Systems for Oil-Gas Reservoir Protection Based on Agent." Applied Mechanics and Materials 275-277 (January 2013): 2650–53. http://dx.doi.org/10.4028/www.scientific.net/amm.275-277.2650.

Повний текст джерела
Анотація:
To solve collaboration problem in multi-expert system, intelligent agent technology is used in multi-expert system.Firstly,by introducing a minimum-cost-based formal description of task decomposition,a new agent task decompositon model is presented.Secondly, heuristic algorithm for task decomposition is analyzed to solve communication among agents.For illustration, expert systems for oil-gas reservoir protection is utilized to verify the effectiveness of the method.The application of the expert system shows that based-minimum-cost task decompostion model is valid in agent task decomposition and heuristic algorithm for task decomposition can be used as communication among agents.As a result,the proposed cooperation mechanism based on agents can effectively solve the collaboration of experts in the multiple expert systems and improve the accuracy of inference.
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Multi-agent protection system"

1

Davis, Cledo L. "The systems integration of autonomous behavior analysis to create a "Maritime Smart Environment" for the enhancement of maritime domain awareness." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDavis.pdf.

Повний текст джерела
Анотація:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, June 2010.
Thesis Advisor(s): Goshorn, Rachel ; Goshorn, Deborah. "June 2010." Description based on title screen as viewed on June 24, 2010. Author(s) subject terms: Anomaly Detection, Artificial Intelligence, Automation, Behavior Analysis, Distributed Artificial Intelligence, Intelligence-Surveillance-Reconnaissance, Maritime Domain Awareness, Maritime Force Protection, Multi-agent Systems, Network-centric Operations, Network-centric Systems Engineering, Network-centric Warfare, Smart Sensor Networks, Systems Engineering, Systems Integration, System of Systems. Includes bibliographical references (p. 209-212). Also available in print.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Twu, Philip Y. "Control of multi-agent networks: from network design to decentralized coordination." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43713.

Повний текст джерела
Анотація:
This dissertation presents a suite of design tools for multi-agent systems that address three main areas: network design, decentralized controller generation, and the synthesis of decentralized control strategies by combining individual decentralized controllers. First, a new metric for quantifying heterogeneity in multi-agent systems is presented based on combining different notions of entropy, and is shown to overcome the drawbacks associated with existing diversity metrics in various scientific fields. Moreover, a new method of controlling multi-agent networks through the single-leader network paradigm is presented where by directly exploiting the homogeneity of agent capabilities, a network which is not completely controllable can be driven closer to a desired target configuration than by using traditional control techniques. An algorithm is presented for generating decentralized control laws that allow for agents to best satisfy a desired global objective, while taking into account network topological constraints and limitations on how agents can compute their control signals. Then, a scripting tool is developed to aid in specifying sequences of decentralized controllers to be executed consecutively, while helping ensure that the required network topological requirements needed for each controller to execute properly are maintained throughout mode switches. Finally, the underlying concepts behind the developed tools are showcased in three example applications: distributed merging and spacing for heterogeneous aircraft during terminal approaches, collaborative multi-UAV convoy protection in dynamic environments, and an educational tool used to teach a graduate-level networked controls course at the Georgia Institute of Technology.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Savaux, Julien. "Privacité dans les problèmes distribués contraints pour agents basés utilité." Thesis, Valenciennes, 2017. http://www.theses.fr/2017VALE0030.

Повний текст джерела
Анотація:
Bien que le domaine des systèmes multi-agents ait été largement étudié, les interactions entre agents entraînent des pertes de privacité. En effet, la résolution de problèmes distribués, étant fréquemment combinatoires, impose un échange intensif d’informations entre les agents jusqu’à l’obtention d’un accord. Le problème est que les approches existantes ne considèrent généralement pas la confidentialité des données et se concentrent surtout sur la satisfaction des contraintes des agents pour évaluer les solutions. Les travaux présentés dans cette thèse visent donc à prendre en compte de façon principielle la problématique de la privacité dans le raisonnement distribué. Nous montrons que les travaux existants dans le domaine permettent toutefois aux agents de préserver implicitement un certain degré de privacité. Nous proposons une approche basée sur la théorie de l’utilité, un cadre formel bien défini en Intelligence Artificielle, permettant une approche objective et quantitative des intérêts et comportements raisonnables des agents. Plus précisément, le modèle que nous avons développé inclut non seulement les paramètres habituels mais également l’information sur la privacité des agents quantifiée en termes d’utilité. Nous montrons aussi que ces problèmes doivent être envisagés comme des problèmes de planification où les agents choisissent des actions maximisant leur utilité. Des algorithmes actuels peuvent être décrits comme des plans utilisables comme modèle générique par des planificateurs intelligents. Les expérimentations réalisées ont permis de valider l’approche et d’évaluer la qualité des solutions obtenues tout en montrant que leur efficacité peut être accrue à l’aide de traitements de privacité
Although the field of multi-agent systems has been largely studied, interactions between agents imply privacy loss. Indeed, solving distributed problems, being frequently combinatorial, implies an extensive exchange of information between agents until an agreement is found. The problem is that existing approaches do not generally consider privacy and focus only on the satisfaction of agents’ constraints to evaluate solution. The works presented in this thesis therefore aim at considering systematically the issue of privacy in distributed reasoning. We show that existing works in the field still let agents preserve implicitly some degree of privacy. We propose an approach based on utility theory, a formal setting well defined in Artificial Intelligence, allowing an objective and quantitative approach to the interests and reasonable behaviours of agents. More precisely, the model we have developed includes non only the usual parameters but also information on agents privacy quantified in term of utility. We also show that these problems must be considered as planning problems where agents choose actions maximizing their utility. Common algorithms can be described as plans usable as generic models by intelligent planners. Conducted experiments let us validate the approach and evaluate the quality of obtained solution, while showing that their efficiency can be improved thanks to privacy considerations
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Velay, Maxime. "Méthodes d’optimisation distribuée pour l’exploitation sécurisée des réseaux électriques interconnectés." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT063/document.

Повний текст джерела
Анотація:
Notre société étant plus dépendante que jamais au vecteur électrique, la moindre perturbation du transport ou de l’acheminement de l’électricité a un impact social et économique important. La fiabilité et la sécurité des réseaux électriques sont donc cruciales pour les gestionnaires de réseaux, en plus des aspects économiques. De plus, les réseaux de transport sont interconnectés pour réduire les coûts des opérations et pour améliorer la sécurité. Un des plus grand défis des gestionnaires des réseaux de transport est ainsi de se coordonner avec les réseaux voisins, ce qui soulève des problèmes liés à la taille du problème, à l’interopérabilité et à la confidentialité des données.Cette thèse se focalise principalement sur la sécurité des opérations sur les réseaux électriques, c’est pourquoi l’évolution des principales caractéristiques des blackouts, qui sont des échecs de la sécurité des réseaux, sont étudiés sur la période 2005-2016. L’approche de cette étude consiste à déterminer quelles sont les principales caractéristiques des incidents de ces 10 dernières années, afin d’identifier ce qui devrait être intégré pour réduire le risque que ces incidents se reproduisent. L’évolution a été étudiée et comparé avec les caractéristiques des blackouts qui se sont produit avant 2005. L’étude se focalise sur les préconditions qui ont mené à ces blackouts et sur les cascades, et particulièrement sur le rôle de la vitesse des cascades. Les caractéristiques importante sont extraites et intégrées dans la suite de notre travail.Un algorithme résolvant un problème préventif d’Optimal Power Flow avec contraintes de sécurité (SCOPF) de manière distribuée est ainsi développé. Ce problème consiste en l’ajout de contraintes qui assure qu’après la perte de n’importe quel appareil d’importance, le nouveau point d’équilibre, atteint suite au réglage primaire en fréquence, respecte les contraintes du système. L’algorithme développé utilise une décomposition fine du problème et est implémenté sous le paradigme multi-agent, basé sur deux catégories d’agents : les appareils et les bus. Les agents sont coordonnés grâce à l’ « Alternating Direction Method of Multipliers (ADMM)» et grâce à un problème de consensus. Cette décomposition procure l’autonomie et la confidentialité nécessaire aux différents acteurs du système, mais aussi, un bon passage à l’échelle par rapport à la taille du problème. Cet algorithme a aussi pour avantage d’être robuste à n’importe quelle perturbation, incluant la séparation du système en plusieurs régions.Puis, pour prendre en compte l’incertitude sur la production créée par les erreurs de prédiction des fermes éoliennes, une approche distribuée à deux étapes est développée pour résoudre un problème d’Optimal Power Flow avec contraintes probabilistes (CCOPF), d’une manière complétement distribuée. Les erreurs de prédiction des fermes éoliennes sont modélisées par des lois normales indépendantes et les écarts par rapport aux plannings de production sont considérés compensés par le réglage primaire en fréquence. La première étape de l’algorithme a pour but de déterminer des paramètres de sensibilités nécessaires pour formuler le problème. Les résultats de cette étape sont ensuite des paramètres d’entrée de la seconde étape qui, elle, résout le problème de CCOPF. Une extension de cette formulation permet d’ajouter de la flexibilité au problème en permettant la réduction de la production éolienne. Cet algorithme est basé sur la même décomposition fine que précédemment où les agents sont également coordonnés par l’ADMM et grâce à un problème de consensus. En conclusion, cet algorithme en deux étapes garantit la confidentialité et l’autonomie des différents acteurs, et est parallèle et adaptée aux plateformes hautes performances
Our societies are more dependent on electricity than ever, thus any disturbance in the power transmission and delivery has major economic and social impact. The reliability and security of power systems are then crucial to keep, for power system operators, in addition to minimizing the system operating cost. Moreover, transmission systems are interconnected to decrease the cost of operation and improve the system security. One of the main challenges for transmission system operators is therefore to coordinate with interconnected power systems, which raises scalability, interoperability and privacy issues. Hence, this thesis is concerned with how TSOs can operate their networks in a decentralized way but coordinating their operation with other neighboring TSOs to find a cost-effective scheduling that is globally secure.The main focus of this thesis is the security of power systems, this is why the evolution of the main characteristics of the blackouts that are failures in power system security, of the period 2005-2016 is studied. The approach consists in determining what the major characteristics of the incidents of the past 10 years are, to identify what should be taken into account to mitigate the risk of incidents. The evolution have been studied and compared with the characteristics of the blackouts before 2005. The study focuses on the pre-conditions that led to those blackouts and on the cascades, and especially the role of the cascade speed. Some important features are extracted and later integrated in our work.An algorithm that solve the preventive Security Constrained Optimal Power Flow (SCOPF) problem in a fully distributed manner, is thus developed. The preventive SCOPF problem consists in adding constraints that ensure that, after the loss of any major device of the system, the new steady-state reached, as a result of the primary frequency control, does not violate any constraint. The developed algorithm uses a fine-grained decomposition and is implemented under the multi-agent system paradigm based on two categories of agents: devices and buses. The agents are coordinated with the Alternating Direction method of multipliers in conjunction with a consensus problem. This decomposition provides the autonomy and privacy to the different actors of the system and the fine-grained decomposition allows to take the most of the decomposition and provides a good scalability regarding the size of the problem. This algorithm also have the advantage of being robust to any disturbance of the system, including the separation of the system into regions.Then, to account for the uncertainty of production brought by wind farms forecast error, a two-step distributed approach is developed to solve the Chance-Constrained Optimal Power Flow problem, in a fully distributed manner. The wind farms forecast errors are modeled by independent Gaussian distributions and the mismatches with the initials are assumed to be compensated by the primary frequency response of generators. The first step of this algorithm aims at determining the sensitivity factors of the system, needed to formulate the problem. The results of this first step are inputs of the second step that is the CCOPF. An extension of this formulation provides more flexibility to the problem and consists in including the possibility to curtail the wind farms. This algorithm relies on the same fine-grained decomposition where the agents are again coordinated by the ADMM and a consensus problem. In conclusion, this two-step algorithm ensures the privacy and autonomy of the different system actors and it is de facto parallel and adapted to high performance platforms
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Peidaee, Pejman. "Integration of Heuristic Multi-Agent Protection System into Distribution Network Interconnected with Distributed Energy Resources." Thesis, 2021. https://vuir.vu.edu.au/42037/.

Повний текст джерела
Анотація:
Power system operation is undergoing rapid changes due to market deregulations and interconnection of Distributed Energy Resources (DERs) such as wind power and solar panels. The power flow complexities arising from interconnection of DERs into the distribution network have adverse effect on protection systems which can degrade the reliability and power quality in power systems and lead to cascading failures or blackouts. However, with the prospect of integrating Information and Communication Technologies (ICT) infrastructures into power system operation, the ability to utilize advanced protection strategies has become realizable. Given the size and complexities in operation of the future power systems the need for distributed and resilient protection system is inevitable to address the difficulties and inaccuracies introduced in protection settings. Multi-Agent Systems (MAS), as a branch of Distributed Artificial Intelligence (DAI) are capable to deal with complex and large scale systems such as power distribution networks. Moreover, in MAS agents can be deployed in power system to engage with interdependencies between various components while pursuing global goals through supervisory function or behaviours specific to each agent types. In this research, a Multi-Agent Protection System (MAPS) consists of different agent types with certain tasks has been developed to effectively cooperate with other Intelligent Electronic Devices (IEDs) within the protection communication network. A heuristic approach based on exchanging information between different IEDs in the system is utilized to adjust the IED settings according to fault current level in the protected zone. Additionally, to validate the outcomes of the research under real-world scenario, an experiment setup based on Power Hardware in the Loop (PHIL) methodology has been developed to verify the outcomes of the research. The simulation results are discussed to emphasise MAS as a distributed and scalable approach to deal with complexities in future power systems and specifically in relation to protection systems which is crucial for reliability and efficiency of the interconnected distribution networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ting, Chien Kao, and 簡高廷. "A Multi-agent Based Pedestrian Protection Systems." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/t88v2a.

Повний текст джерела
Анотація:
碩士
國立中正大學
電機工程研究所
100
A pedestrian warning system is often used to detect the movements and intentions of the pedestrian and gives warning to the relevant participants. Current studies in pedestrian-vehicle conflicts have focused on the sensors installed on the vehicle. In this study, in addition to the driver on the vehicle, we use the pedestrian signal to take the initiative to inform the pedestrians crossing a street and the driver who is heading to the pedestrian crossing concerning the degree of risk.We use a multi-agent system so that the intersection agents and vehicle agents can communicate. By communicating, vehicle agents can obtain the pedestrian information of the intersection ahead. Each intersection has an intersection agent monitoring the intersection, and we allow more than one vehicle agent which represents each vehicle. When the vehicle agents enter a new intersection, they will receive data from the intersection agent and combine with vehicle information to estimate the conflict-related parameters. We use a two-stage warning method, the warning stage and the command stage, which are performed according to the distance from vehicle to the conflict area. We have developed an agent-based simulation system for a pedestrian warning system that has a pedestrian signal and an active warning system on vehicles to achieve driver personalization and improve road safety.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Chen, Chun-Tamr, and 陳俊達. "Apply Multi-Agent Systems to Fault Protection in Microgrids." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/29112312955324839318.

Повний текст джерела
Анотація:
碩士
國立臺灣科技大學
電機工程系
103
Traditionally, the supervisory control and data acquisition of typical power systems is using master/slave architecture with centralized management approach. The data transfer and even processing speed is correspondingly slow. Nowadays, the microgrid in distribution systems may connect several types of distributed resources(DR) with different capacity and characteristics. The master/slave architecture with centralized management approach can not satisfy the requirements in control and operation ability. To solve this problem the Multi-Agent Systems(MAS), including CB Agent and Calculation Agent, is introduced. It may simplify a complicated object to several easy objects. Furthermore, the data related to each object can freely transfer between Agents and function independently. First, the international standards about microgrid and DR have been well referred. Both MATLAB/Simulink and Java Agent Development Framework (JADE) are applied to setup microgrid simulation systems and Multi-Agent Systems which comply with Foundation for Intelligent Physical Agents (FIPA). The peer to peer data transfer between CB Agents has been verified. To discover the cases in normal operation and faulted condition an example system from the microgrid at Institute of Nuclear Energy Research(INER) is introduced. The online impedance measurement technology is also applied to build up the bus impedance matrix of systems for Calculation Agent. Then, each CB Agent can get the pickup or tripping setting from Calculation Agent to perform protection work. The result showed that MAS not only can properly program the protection setting in different scenarios, but also perform the correct control action accordingly for microgrid.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Heydenrych, Mark. "An adaptive multi-agent architecture for critical information infrastructure protection." Thesis, 2014. http://hdl.handle.net/10210/12370.

Повний текст джерела
Анотація:
M.Sc. (Information Technology)
The purpose of the research presented in this dissertation is to explore the uses of an adaptive multi-agent system for critical information infrastructure protection (CIIP). As the name suggests, CIIP is the process of protecting the information system which are connected to the infrastructure essential to the continued running of a country or organisation. CIIP is challenging due largely to the diversity of these infrastructures. The dissertation examines a number of artificial intelligence techniques that can be applied to CIIP; these techniques range from multi-agent systems to swarm optimisation. The task of protection is broken into three distinct areas: preventing unauthorised communication from outside the system; identifying anomalous actions on computers within the system; and ensuring that communication within the system is not modified externally. A multi-agent learning model, MALAMANTEAU, is proposed as a way to address the problem of CIIP. Due to various problems facing CIIP, multi-agent systems present good opportunities for solving these many problems in a single model. Agents within the MALAMANTEAU model will use diverse artificial and computational intelligence techniques in order to provide an adaptable approach to protecting critical networks. The research presented in the dissertation shows how computational intelligence can be employed alongside multi-agent systems in order to provide powerful protection for critical networks without exposing further security risks.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Multi-agent protection system"

1

Chen, Shu-Heng, Azuma Ohuchi, and Koichi Kurumatani. Multi-Agent Modeling and Simulation of Economic Systems: Papers from the AAAI Workshop. AAAI Press, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Multi-agent protection system"

1

Yu, Meiyan, Hongyong Yang, and Yujiao Sun. "Privacy Protection Consistency of Multi-agent System with External Interference." In Lecture Notes in Electrical Engineering, 839–49. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6324-6_85.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Keane-Myers, Andrea M., Matt Bell, Drew Hannaman, and Mark Albrecht. "DNA Electroporation of Multi-agent Vaccines Conferring Protection Against Select Agent Challenge: TriGrid Delivery System." In Methods in Molecular Biology, 325–36. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9632-8_29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Aguado, G., V. Julian, and A. Garcia-Fornes. "Multi-agent System for Privacy Protection Through User Emotions in Social Networks." In Communications in Computer and Information Science, 235–45. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60285-1_20.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Lee, Raymond S. T., Eddie C. L. Chan, and Raymond Y. W. Mak. "iJADE Content Management System (CMS) – An Intelligent Multi-agent Based Content Management System with Chaotic Copyright Protection Scheme." In Lecture Notes in Computer Science, 652–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11893004_84.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Rehák, Martin, Michal Pěchouček, Jan Tožička, Magda Prokopová, David Medvigy, and Jiří Novotný. "Agent-Based Network Protection Against Malicious Code." In Multi-Agent Systems and Applications V, 22–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75254-7_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Yeo, Sang-Soo, Soo-Cheol Kim, and Sung Kwon Kim. "eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection." In Agent and Multi-Agent Systems: Technologies and Applications, 318–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72830-6_33.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sun, Yujiao, Hongyong Yang, and Meiyan Yu. "Coordination Privacy Protection of Multi-agent Systems." In Lecture Notes in Electrical Engineering, 822–29. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6324-6_83.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Vrancx, Peter, Ann Nowé, and Kris Steenhaut. "Multi-type ACO for Light Path Protection." In Learning and Adaption in Multi-Agent Systems, 207–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11691839_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Khovanskov, Sergey, Konstantin Rumyantsev, and Vera Khovanskova. "Organization and Protection on the Basis of a Multi-agent System of Distributed Computing in a Computer Network to Reduce the Time for Solving Large-Scale Tasks." In Communications in Computer and Information Science, 292–303. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3804-5_22.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yu, Meiyan, Hongyong Yang, Yujiao Sun, and Fei Liu. "Consistency of Continuous Multi-agent Systems with Privacy Protection." In Lecture Notes in Electrical Engineering, 769–77. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8450-3_80.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Multi-agent protection system"

1

Halinka, A., P. Rzepka, and M. Szablicki. "Agent model of multi-agent system for area power system protection." In 2015 Modern Electric Power Systems (MEPS). IEEE, 2015. http://dx.doi.org/10.1109/meps.2015.7477185.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zhao, Qi, and Shuguang Liu. "Relay protection based on Multi-Agent System." In 2011 International Conference on Electrical and Control Engineering (ICECE). IEEE, 2011. http://dx.doi.org/10.1109/iceceng.2011.6057028.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

do Nascimento, Leonardo L., and Jacqueline G. Rolim. "Multi-agent system for adaptive protection in microgrids." In 2013 IEEE PES Conference on Innovative Smart Grid Technologies (ISGT Latin America). IEEE, 2013. http://dx.doi.org/10.1109/isgt-la.2013.6554435.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Lukovic, Slobodan, and Nikolaos Christianos. "Hierarchical multi-agent protection system for NoC based MPSoCs." In the International Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1868433.1868441.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lim, I. H., S. J. Lee, M. S. Choi, and P. Crossley. "Multi-Agent System-based Protection Coordination of Distribution Feeders." In 2007 International Conference on Intelligent Systems Applications to Power Systems. IEEE, 2007. http://dx.doi.org/10.1109/isap.2007.4441686.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Jinghan He, Jinghan He, T. Yip, Yupeng Huang Yupeng Huang, Ziqi Wang Ziqi Wang, and Lin Liu Lin Liu. "Digital Substation Backup Protection using a Multi-Agent System Approach." In 13th International Conference on Development in Power System Protection 2016 (DPSP). Institution of Engineering and Technology, 2016. http://dx.doi.org/10.1049/cp.2016.0089.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

You-Jin Lee, No-Kyu Sung, Chul-Hwan Kim, and R. K. Aggarwal. "Development of auto-reclosing algorithm using multi agent system." In IET 9th International Conference on Developments in Power Systems Protection (DPSP 2008). IEE, 2008. http://dx.doi.org/10.1049/cp:20080023.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Jia, Xingbei, Chunxia Dou, Zhiqian Bo, Fang Zhao, and Dongle Liu. "Application of multi-agent technology in micro-grid system." In 2011 IEEE International Conference on Advanced Power System Automation and Protection (APAP). IEEE, 2011. http://dx.doi.org/10.1109/apap.2011.6180729.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Qin, LiJun, Ying Wang, Cuijuan Hao, and Meng Li. "Multi-Agent System wide area protection considering distributed generation impact." In 2011 IEEE International Conference on Advanced Power System Automation and Protection (APAP). IEEE, 2011. http://dx.doi.org/10.1109/apap.2011.6180462.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Zhao, Tinghong, Zibin Man, and Zhijun Wang. "The Research of Relay Protection System Based on Multi-Agent." In 2008 Second International Symposium on Intelligent Information Technology Application (IITA). IEEE, 2008. http://dx.doi.org/10.1109/iita.2008.527.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії