Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Multi-agent protection system.

Статті в журналах з теми "Multi-agent protection system"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Multi-agent protection system".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Rui, Qian, and Su Qin Qian. "Relay Protection Based on Multi-Agent System." Advanced Materials Research 760-762 (September 2013): 355–58. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.355.

Повний текст джерела
Анотація:
For the reliable operation of the power grid, multi-agent system is applied to multi-level relay protection to improve the fast response of the short-circuit protection. The thesis conducts the simulation concerning the conventional backup protection and the protection mode based on multi-agent system and makes performance comparison. The results prove that multi-agent system can shorten the response time effectively.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kuandykov, Abu, Raissa Uskenbayeva, Young Im Cho, Dinara Kozhamzharova, Olimzhon Baimuratov, Yersain Chinibayev, and Nurlan Karimzhan. "Multi-Agent Based Anti-Locust Territory Protection System." Procedia Computer Science 56 (2015): 477–83. http://dx.doi.org/10.1016/j.procs.2015.07.238.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Fan, Xiao Zhou. "Power System Based on Multi-Agent Technology." Applied Mechanics and Materials 273 (January 2013): 276–79. http://dx.doi.org/10.4028/www.scientific.net/amm.273.276.

Повний текст джерела
Анотація:
Multi-agent technology combines the technology of computer, networking and distributed artificial intelligence together which is good at solving complex problems about large-scale distributed and open system. Multi-agent technology provides new ways for power system studies. This paper aims at finding a way to rationally use the multi-agent technology to solve complex problems due to improper protection or slow even wrong actions in the large power system.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ananda, Stephanus, Jyh-Cherng Gu, Ming-Ta Yang, Jing-Min Wang, Jun-Da Chen, Yung-Ruei Chang, Yih-Der Lee, Chen-Min Chan, and Chia-Hao Hsu. "Multi-Agent System Fault Protection with Topology Identification in Microgrids." Energies 10, no. 1 (December 27, 2016): 28. http://dx.doi.org/10.3390/en10010028.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Albarakati, Aiman J., Mohamed Azeroual, Younes Boujoudar, Lahcen EL Iysaouy, Ayman Aljarbouh, Asifa Tassaddiq, and Hassane EL Markhi. "Multi-Agent-Based Fault Location and Cyber-Attack Detection in Distribution System." Energies 16, no. 1 (December 25, 2022): 224. http://dx.doi.org/10.3390/en16010224.

Повний текст джерела
Анотація:
Accurate fault location is challenging due to the distribution network’s various branches, complicated topology, and the increasing penetration of distributed energy resources (DERs). The diagnostics for power system faults are based on fault localization, isolation, and smart power restoration. Adaptive multi-agent systems (MAS) can improve the reliability, speed, selectivity, and robustness of power system protection. This paper proposes a MAS-based adaptive protection mechanism for fault location in smart grid applications. This study developed a novel distributed intelligent-based multi-agent prevention and mitigation technique for power systems against electrical faults and cyber-attacks. Simulation studies are performed on a platform constructed by interconnecting the power distribution system of Kenitra city developed in MATLAB/SIMULINK and the multi-agent system implemented in the JADE platform. The simulation results demonstrate the effectiveness of the proposed technique.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Yazov, Yury, and Alexander Avsentiev. "INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT." Voprosy kiberbezopasnosti, no. 5(51) (2022): 2–13. http://dx.doi.org/10.21681/2311-3456-2022-5-2-13.

Повний текст джерела
Анотація:
Purpose: to show the creation and consideration perspective of the ways to build a multi-agent information security system at an informatization object with the implementation of a decentralized and mixed (centralizeddecentralized) principle of its design and functioning in order to exclude the extraction of various types of information, data about the characteristics of the informatization object and relationships between its structural elements. Method: the method of functional and structural analysis of technical channels of leaking information circulating in the form of speech information at the informatization objects of the internal affairs bodies in the course of their daily activities or during official activities, as well as ways to build an information security system from leakage through technical channels is applied. Result: the factors determined are those that are necessary to be taken into account when substantiating the composition and functions of agents of a multi-agent information security system, depending on the conditions characterizing the dynamics of the intruder’s actions to obtain protected information, the dynamics of the application of measures and means of protection. It is shown that a multi-agent protection system composition can include two classes of agents - simple and intelligent, and the system itself must be a multilayer structure, each layer of which is tied to a certain type of technical information leakage channels, and contain one or more agents (meta-agents), which provide solution of decision support tasks for information protection in each layer and in the security system as a whole and control of other agents. Examples of the composition and structure of a multi-agent system for protecting against leakage through technical channels, as well as examples of the structure of a simple and intelligent agent for such a system are given. The scientific novelty of the article is in the fact that the idea of creating a multi-agent system is considered for the first time in relation to solving the problem of protecting information from leakage through technical channels, the composition, structure and functions of such systems are determined, as well as the directions for the development of methodological support for their creation and operation.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wang, Pengyuan, and Manimaran Govindarasu. "Multi-Agent Based Attack-Resilient System Integrity Protection for Smart Grid." IEEE Transactions on Smart Grid 11, no. 4 (July 2020): 3447–56. http://dx.doi.org/10.1109/tsg.2020.2970755.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Peidaee, Pejman, Akhtar Kalam, and Juan Shi. "Integration of a Heuristic Multi-Agent Protection System into a Distribution Network Interconnected with Distributed Energy Resources." Energies 13, no. 20 (October 9, 2020): 5250. http://dx.doi.org/10.3390/en13205250.

Повний текст джерела
Анотація:
In conventional method protection schemes are devised for certain operation conditions with fixed settings throughout their operation life, however, protection systems in interconnected distribution networks rely on a detailed analysis of fault current contribution and variation in operation conditions under real-world scenarios. In fact, the concept of Adaptive Protection System (APS) and possibility of the adjustment for protection settings within modern Intelligent Electronic Devices (IEDs) have introduced desired functionalities for protection systems to cope with complex operation scenarios envisioned within future power system networks. In this paper, a novel protection system based on Multi-Agent System (MAS) and heuristic decision-making is proposed to update protection settings of the protection IEDs with respect to prevailing operation conditions in an interconnected distribution network. The adopted methodology is reliant on real-time simulation of a distribution network interconnected with Doubly-fed Induction Generator (DFIG) wind farms where different fault scenarios are applied to evaluate the functionality and performance of the proposed Multi-Agent Protection System (MAPS). In addition to that, combination of knowledge sharing between different protection IEDs and logic reasoning are integrated to fulfill protection task under real-world operation scenarios. The significance of the proposed MAPS is the improvement in protection system of the interconnected distribution network.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Chang, Jiang, Yan Peng, and Xiao Jun Feng. "Small Wind-Solar Hybrid Power Generation System Based on Multi-Agent." Advanced Materials Research 772 (September 2013): 587–93. http://dx.doi.org/10.4028/www.scientific.net/amr.772.587.

Повний текст джерела
Анотація:
This paper presents a small wind-solar hybrid power generation system based on multi-agent. The system is composed of wind power agent module, solar power agent module and battery charging and discharging agent module. The power agent generation module is composed of the communication agent, decision-making agent, data processing agent, data collecting agent, power transformation operating agent, protection agent, coordination agent and component control agent. According to the different weather conditions and different power state of equilibrium, the agents of the small wind-solar hybrid power generation system coordinate and use the optimal control strategy to achieve the best operation state of the power system.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yang, Li, Xie Dong Cao, and Jie Li. "Research on Minimum-Cost-Based Task Decomposition Model of Multiple Expert Systems for Oil-Gas Reservoir Protection Based on Agent." Applied Mechanics and Materials 275-277 (January 2013): 2650–53. http://dx.doi.org/10.4028/www.scientific.net/amm.275-277.2650.

Повний текст джерела
Анотація:
To solve collaboration problem in multi-expert system, intelligent agent technology is used in multi-expert system.Firstly,by introducing a minimum-cost-based formal description of task decomposition,a new agent task decompositon model is presented.Secondly, heuristic algorithm for task decomposition is analyzed to solve communication among agents.For illustration, expert systems for oil-gas reservoir protection is utilized to verify the effectiveness of the method.The application of the expert system shows that based-minimum-cost task decompostion model is valid in agent task decomposition and heuristic algorithm for task decomposition can be used as communication among agents.As a result,the proposed cooperation mechanism based on agents can effectively solve the collaboration of experts in the multiple expert systems and improve the accuracy of inference.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Rahman, M. S., M. A. Mahmud, H. R. Pota, M. J. Hossain, and T. F. Orchi. "Distributed Multi-Agent-Based Protection Scheme for Transient Stability Enhancement in Power Systems." International Journal of Emerging Electric Power Systems 16, no. 2 (April 1, 2015): 117–29. http://dx.doi.org/10.1515/ijeeps-2014-0143.

Повний текст джерела
Анотація:
Abstract This paper presents a new distributed agent-based scheme to enhance the transient stability of power systems by maintaining phase angle cohesiveness of interconnected generators through proper relay coordination with critical clearing time (CCT) information. In this distributed multi-agent infrastructure, intelligent agents represent various physical device models to provide dynamic information and energy flow among different physical processes of power systems. The agents can communicate with each other in a distributed manner with a final aim to control circuit breakers (CBs) with CCT information as this is the key issue for maintaining and enhancing the transient stability of power systems. The performance of the proposed scheme is evaluated on a standard IEEE 39-bus New England benchmark system under different large disturbances such as three-phase short-circuit faults and changes in loads within the systems. From the simulation results, it is found that the proposed scheme significantly enhances the transient stability of power systems as compared to a conventional scheme of static CB operation.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Ghaffarzadeh, Navid, and Ali Bamshad. "A New Approach to AC Microgrids Protection Using a Bi-Level Multi-Agent System." Research and Technology in the Electrical Industry 1, no. 1 (March 1, 2022): 66–74. http://dx.doi.org/10.52547/ijrtei.1.1.66.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Hussain, Akhtar, Muhammad Aslam, and Syed Muhammad Arif. "N-version programming-based protection scheme for microgrids: A multi-agent system based approach." Sustainable Energy, Grids and Networks 6 (June 2016): 35–45. http://dx.doi.org/10.1016/j.segan.2016.02.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Yacouba, Yazid Hambally, Amadou Diabagaté, Abdou Maiga, and Adama Coulibaly. "Multi-agent System for Management of Data from Electrical Smart Meters." International Journal of Information Technology and Computer Science 13, no. 1 (February 8, 2021): 18–43. http://dx.doi.org/10.5815/ijitcs.2021.01.02.

Повний текст джерела
Анотація:
The smart meter can process sensor data in a residential grid. These sensors transmit different parameters or measurement data (index, power, temperature, fluctuation of voltage and electricity, etc.) to the smart meter. All of these measurement data can come in different ways at the smart meter. The sensors transmit each measurement data to the smart meter. In addition, the collection of this data to a central system is a significant concern to ensure data integrity and protect the privacy of residents. The complexity of these data management also lies in their volume, frequency, and scheduling. This work presents a scheduling and a collection mechanism in private power consumption data between both sensors and smart meters on one hand and between smart meters and the central data collection system on other hand. We have found several approaches to intelligent meter data management in scientific researches. We propose another approach in response to this concern for the scheduling and collection of measurement data to a central system from residential areas of sensors’ network connected to smart meters. This work is also an example of a link between data collection and data scheduling in intelligent information management, transmission, and protection. We also propose a modeling of the measurement objects of smart grid and highlight the changes made to these objects throughout the process of data processing. It should be noted that this smart grid system consists of three main active systems namely sensors, smart meters and central system. In addition to these three systems, there are other systems that communicate with the smart meters and the central system. We have identified three implementation models for the smart metering system. We also present an intelligent architecture based on multi-agent systems for the smart grid. Most current electricity management systems are not adapted to the new challenges imposed by social and economic development in Africa. The objectives of this study are to initiate the design of a smart grid system for the management of electricity data.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Alanezi, Mohammed Ateeq. "A Novel Methodology for Providing Security in Electronic Health Record Using Fuzzy Based Multi Agent System." International Journal of Online and Biomedical Engineering (iJOE) 17, no. 11 (November 15, 2021): 93. http://dx.doi.org/10.3991/ijoe.v17i11.25347.

Повний текст джерела
Анотація:
<p class="0abstract">Privacy and security are crucial when it comes to the implementation of Electronic Healthcare Records (HER). Whenever a patient visits a doctor, their health records are updated since it consists of vital information on the patient's health and well-being. It also comprises of description about the previous and current treatment quality.Multi-Agent Systems can support E-Healthcare applications for improving quality of life. The availability and use of extensive systems for EHR has increased dramatically. The EHR technology currently available consists of health information of various patients which helps those people to monitor their health. These information should be protected from being altered or mishandled. Various studies have been conducted in the past literature to improve the protection and privacy requirements in E-health services. Despite this, it hasn't been entirely improved. This article proposes a Fuzzy based multi-agent system architecture that uses agents and fuzzy logic to monitor the flow and access of the EHR record using fuzzy logic and multi agents. Architecture comprises of multi agent and fuzzy systems are proposed. In this system, we have employed Action/ Computation (Interface) agent, communication interface agent and verification agent and Communication Module Agent. These agents collaboratively worked one another in order to obtain the desired output. These agent based e-health system can increase the accuracy of data transfer by providing additional security in selecting the user who handles the data. It also monitors the communication between different medical units in the health system.</p>
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Et. al., Zakoldaev D. A. ,. "Threat and Intruder Models of Multi-agent Robotic System Using Police Office Model with Quantum Encryption*." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 2649–58. http://dx.doi.org/10.17762/turcomat.v12i2.2279.

Повний текст джерела
Анотація:
The subject of this study is to ensure the confidentiality of information in mobile robotic systems. To ensure the confidentiality of information, it is proposed to use quantum encryption methods. Existing developments in this area allow to ensure the correct generation of quantum keys between two elements. The paper considers the functioning of the multi-agent robotic system based on the Police Office Model, the general scheme of functioning and basic processes of information interaction are given. The authors consider the issue of the protection of the multi-agent robotic system by using quantum keys from various threats, offering a classification of threats. Based on the model of the multi-agent robotic system, an intruder model is proposed that includes the level of access of the intruder to the system and the period of interaction of the intruder on the system, based on the life-cycle model. As a result of the research, a model of generalized functioning of a mobile robotic system with encryption based on quantum keys, a threat model and an intruder model was proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Sampaio, Felipe C., Ruth P. S. Leão, Raimundo F. Sampaio, Lucas S. Melo, and Giovanni C. Barroso. "A multi-agent-based integrated self-healing and adaptive protection system for power distribution systems with distributed generation." Electric Power Systems Research 188 (November 2020): 106525. http://dx.doi.org/10.1016/j.epsr.2020.106525.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Boudia, Mohamed Amine, Reda Mohamed Hamou, and Abdelmalek Amine. "A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees." International Journal of Information Security and Privacy 11, no. 1 (January 2017): 18–34. http://dx.doi.org/10.4018/ijisp.2017010102.

Повний текст джерела
Анотація:
In this paper, the authors will propose a meta-heuristic for intrusion detection system by scenario, inspired from the protection system of social bees to their hive. This approach is based on a specialized multi agent system where the authors will give a limited responsibility to each guard bee agent: to secure only one port, this specialization aims to better exploit the training set and the hardware and software performance. The authors will start this paper by a short introduction where they will show the importance of IT security especially today, then they will give a little insight into the state of the art, before starting the essential part of a scientific paper: “our approach” where the authors will explain the natural model, and then they'll simplify their model in a modelling table to share their vision and philosophy to switch from natural model to artificial model, and then they will detail the artificial model they are going to experience in the next chapter, they will discuss the results and make comparison in the two following chapter to get out with a conclusion and perspective of their future work.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Neretin, Evgeniy Yu, Yu L. Minaev, and V. A. Akulov. "MULTI-AGENT TECHNOLOGY IN THE EARLY DIAGNOSIS OF SKIN MELANOMA." Health Care of the Russian Federation 62, no. 6 (May 24, 2019): 331–35. http://dx.doi.org/10.18821/0044-197x-2018-62-6-331-335.

Повний текст джерела
Анотація:
The problems of the use of existing forms of organization in health care, focused on timely diagnosis of tumors of external localization, are analyzed. The urgency of the problem and the need to improve its effectiveness are determined by a number of factors, including numerous publications in Russia and abroad, as well as many years of experience of the authors. An approach based on interdisciplinary technology (medicine, software engineering) using multi-agent methods is proposed. The concept of technology and the model of the system composition consisting of an artificial neural network, an expert system, a database, a knowledge base, remote access means and information protection were developed. As the criteria for the effectiveness of the system, entropic actions of various groups of users are offered - doctors of profile and non-profile specialties in the space of situations. The end result of the diagnosis is survival. The proposed technology is applied in the educational process, designed for a wide range of users, including students, doctors, administrative staff, and average medical personnel. A methodology has been developed that contains theoretical and practical material intended for an extended version of the analysis of errors and recognition of complex scenes possible in the diagnosis of skin melanoma.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Lee, Seung-Jae, Tae-Wan Kim, and Gi-Young Lee. "Autonomous optimal coordination scheme in protection system of power distribution network by using multi-agent concept." Transactions of Tianjin University 14, no. 2 (April 2008): 106–11. http://dx.doi.org/10.1007/s12209-008-0019-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Hamza, Ameer, Syed Tahir Hussain Rizvi, Muhammad Umair Safder, and Haleema Asif. "A Novel Mathematical Approach to Model Multi-Agent-Based Main Grid and Microgrid Networks for Complete System Analysis." Machines 10, no. 2 (February 1, 2022): 110. http://dx.doi.org/10.3390/machines10020110.

Повний текст джерела
Анотація:
Penetration of renewable energy resources in modern power systems has increased rapidly. The integration of different renewable and nonrenewable resources for the purpose of electricity generation is referred to as Distributed Generation (DG) units. The penetration of DG units gave birth to the concept of power microgrid. Power inverters play a major role in the integration of DGs in the power system. Control and stability analysis of microgrids in power systems is a challenging task for the control community. Dynamic microgrid modeling demands knowledge of fundamental engineering laws to detailed theoretical analysis. To model the dynamic behavior of the power microgrid, a basic understanding of the power converter operation modes and their control schemes is necessary. The main microgrid modeling components are power converters, power lines, transformers, protection systems, load, and faults. In this paper, preliminary concepts of power systems along with graph theoretic approach are used to develop the model of the microgrid and main grid networks. A mathematical model of a power microgrid in islanded mode, as well as the grid-connected mode, is developed and comprises of generation sources, power inverter interface, protection mechanism, load, faults, and transmission lines. The developed mathematical model can be used to address the stability issues as well as resilience in the power networks for complete system analysis. To validate the mathematical model, a renewable energy-based main grid and microgrid model is simulated. The graphical result of simulated model presents the generation and load curves.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Abbaspour, Ehsan, Bahador Fani, Iman Sadeghkhani, and Hassan Haes Alhelou. "Multi-Agent System-Based Hierarchical Protection Scheme for Distribution Networks With High Penetration of Electronically-Coupled DGs." IEEE Access 9 (2021): 102998–3018. http://dx.doi.org/10.1109/access.2021.3098387.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Aarabi, Majid, Muhamad Zameri Mat Saman, and Kuan Yew Wong. "The Use of Multi-Agent Systems in Managing Sustainable Supply Chain." Applied Mechanics and Materials 315 (April 2013): 108–12. http://dx.doi.org/10.4028/www.scientific.net/amm.315.108.

Повний текст джерела
Анотація:
The main purposes and challenges in supply chain management are reducing cost and time. Significantly, factors such as the competition of markets in the globe, limitation of energy, raw and virgin materials, environmental protection crisis and increasing of global population dramatically are causing unprecedented issues for the worldwide supply chains for providing goods and services to customers efficiently and effectively. The sustainability approach for Supply Chain Management (SCM) considers the 6Rs principles in four main stages of the supply chains: Pre-manufacture, Manufacture, Use and Post-use. The use of Multi-Agent System (MAS) prepares the most important requirements of an effective sustainable supply chain. At the same time, this agent-based approach provides reliable and agile systems, which will enable enterprises to accommodate ever changing needs of their customers in the future. In this article, the use of MAS for optimal Sustainable Supply Chain Management (SSCM) is reviewed and the integrated functioning of certain agents resulting in information sharing is also demonstrated. With this idea, an attempt is made to provide a MAS model for the SSCM. In the proposed model, each agent performs a specific function of the organization and shares information with other agents. In order to describe this multi-agent based approach, a simple case study is given to illustrate the sustainable supply chain operations.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Yang, Li, and Hao De Liao. "Research on Cooperation Mechanism of Multiple Expert Systems for Oil-Gas Reservoir Protection Based on Agent." Applied Mechanics and Materials 312 (February 2013): 835–39. http://dx.doi.org/10.4028/www.scientific.net/amm.312.835.

Повний текст джерела
Анотація:
To solve collaboration problem in intelligent agents, a new cooperation mechanism is used in multi-expert system.Firstly,by introducing five-tuple with constraint condition,a new agent task decomposition model is presented.Secondly, blackboard mechanism based on point-to point is analyzed to solve communication among agents. The application of the expert system shows that our proposed task decompostion model is valid and blackboard mechanism based on point-to point can be used as communication among agents.Finally, minimum-cost-based cooperation mechanism based on agents can effectively solve the collaboration of experts in the multiple expert systems and improve the accuracy of inference.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Tong, Xiaoyang, Xiaoru Wang, Rui Wang, Fei Huang, Xueyuan Dong, Kenneth M. Hopkinson, and Gongyi Song. "The Study of a Regional Decentralized Peer-to-Peer Negotiation-Based Wide-Area Backup Protection Multi-Agent System." IEEE Transactions on Smart Grid 4, no. 2 (June 2013): 1197–206. http://dx.doi.org/10.1109/tsg.2012.2223723.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Sinitsyn, Ivan, Anton Mironov, Yuriy Vorontsov, Nikita Borzykh, and Evgenia Mikhailova. "The principles of synchronization in the distributed information systems." Economic Annals-ХХI 183, no. 5-6 (June 4, 2020): 79–88. http://dx.doi.org/10.21003/ea.v183-08.

Повний текст джерела
Анотація:
Information, especially its automated processing, is still an important factor in improving the efficiency of any organization. Distributed information systems (IS, ISs) differ from conventional ISs in architectural and infrastructural principles, as well as in the geographic location with integration into one information cluster. One of the examples of distributed information systems is the infrastructure of the Google search engine - more than 2,000 servers, with server bases in almost every country in the world, which allows achieving a minimum delay in sending and receiving client requests. A distributed information system can have a large number of different databases, both local and remote, with which constant data synchronization is required, while maintaining a backup copy of previous data in case of failures and emergency stops. Distributed information systems are highly reliable and require multi-level protection of the cluster from unauthorized access, adherence to the principles of data synchronization, which differ from a conventional information system. Within the framework of this paper, synchronization processes are investigated using mathematical and computational tools, creating an environment for distributed information systems. It is advisable to use the results of the work to coordinate the operation of components of multi-agent systems for various purposes, transmit messages between agents, build communication protocols, and provide conditions for self-organization of multi-agent systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Wang, Wenke, Xiaoqiong You, Kebei Liu, Yenchun Jim Wu, and Daming You. "Implementation of a Multi-Agent Carbon Emission Reduction Strategy under the Chinese Dual Governance System: An Evolutionary Game Theoretical Approach." International Journal of Environmental Research and Public Health 17, no. 22 (November 16, 2020): 8463. http://dx.doi.org/10.3390/ijerph17228463.

Повний текст джерела
Анотація:
A central-local dual governance system is the basic system of environmental governance in China. Co-governance between the central environmental protection department (CEPD) and local environmental protection departments (LEPDs) is an important means to effectively promote China’s carbon emission reduction strategy. Accordingly, this paper discusses their interactive decision-making and investigates how to optimize the strategic relationships between the CEPD, LEPDs, and carbon emission enterprises (CEEs) under the dual governance system by constructing a trilateral evolutionary game model and analyzing evolutionary stability strategies, achieving a numerical experiment simulation of evolution processes and determining the impacts of various factors using MATLAB, leading to several countermeasures and suggestions. The results indicate that the CEPD should rationally use the incentive mechanism for LEPDs, improve the carbon tax system, and further penalize the nepotistic relationship of LEPDs and CEEs. Furthermore, it is essential to reform the current LEPD performance evaluation system and reduce the cost of LEPD positive regulation through subsidies and financial transfer payments. Additionally, the CEE strategy is affected by carbon reduction tax rates, penalties, subsides, and emission reduction costs and revenues. This study reveals the consequences of interactions between CEPD, LEPDs, and CEEs and presents options for the redesign of incentive and regulatory mechanisms to improve carbon emission reduction performance in China.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Ataei, Mohammad Ali, and Mohsen Gitizadeh. "A distributed adaptive protection scheme based on multi‐agent system for distribution networks in the presence of distributed generations." IET Generation, Transmission & Distribution 16, no. 8 (November 28, 2021): 1521–40. http://dx.doi.org/10.1049/gtd2.12351.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Borovki, Alexander, and Elena Ryapolova. "The Building of Model of the Protection System in Cloud Technologies Based on Multi-Agent Approach Using the Automatic Model." Voprosy kiberbezopasnosti, no. 4(22) (2017): 10–20. http://dx.doi.org/10.21681/2311-3456-2017-4-10-20.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Zheng, Tao, Yutong Zhao, and Yifan Zhu. "Overcurrent protection scheme for collector lines in wind farm based on fault component current correlation analysis and multi‐agent system." IET Renewable Power Generation 14, no. 2 (December 6, 2019): 313–20. http://dx.doi.org/10.1049/iet-rpg.2019.0315.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Chong, Dashuang, and Na Sun. "Explore emission reduction strategy and evolutionary mechanism under central environmental protection inspection system for multi-agent based on evolutionary game theory." Computer Communications 156 (April 2020): 77–90. http://dx.doi.org/10.1016/j.comcom.2020.02.086.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Katyara, Sunny, Lukasz Staszewski, and Zbigniew Leonowicz. "Protection Coordination of Properly Sized and Placed Distributed Generations–Methods, Applications and Future Scope." Energies 11, no. 10 (October 8, 2018): 2672. http://dx.doi.org/10.3390/en11102672.

Повний текст джерела
Анотація:
The radial distribution networks are designed for unidirectional power flows and are passive in nature. However, with the penetration of Distributed Generation (DG), the power flow becomes bidirectional and the network becomes active. The integration of DGs into distribution network creates many issues with: system stability, protection coordination, power quality, islanding, proper placement and sizing etc. Among these issues, the two most significant are optimal sizing and placement of DGs and their protection coordination in utility network. The proper coordination of relays with high penetration of DGs placed at optimal location increases the availability and reliability of the network during abnormal operating conditions. This research addresses most of the available methods for efficient sizing and placement of DGs in distribution system (numerical, analytical and heuristic) as well as the developed protection coordination techniques for utility networks in the presence of DGs (Artificial Intelligence (AI), adaptive and non-adaptive, multi-agent, hybrid). This paper indicates the possible research gaps and highlights the applications possibilities and methods’ limitations in the area of DGs.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Tan, Yaogeng, Zengchuan Dong, Sandra M. Guzman, Xinkui Wang, and Wei Yan. "Identifying the dynamic evolution and feedback process of water resources nexus system considering socioeconomic development, ecological protection, and food security: A practical tool for sustainable water use." Hydrology and Earth System Sciences 25, no. 12 (December 21, 2021): 6495–522. http://dx.doi.org/10.5194/hess-25-6495-2021.

Повний текст джерела
Анотація:
Abstract. The accelerated consumption of water resources caused by the rapid increase in population and urbanization is intensifying the complex interactions across water resources, socioeconomic development, ecological protection, and food security (WSEF), which causes not only the imbalance between water supply and demand but also the vulnerability of both food and ecological systems. Therefore, identifying the dynamic coevolution and feedback process is one of the most crucial ways of achieving the goal of sustainable water use. In this study, we developed an integrated modeling framework to better identify the dynamic interaction and coevolution process of the nexus across WSEF systems in the context of sustainable water uses by coupling system dynamic (SD) model and multi-objective optimization model. The SD model is used to simulate both the dynamic interaction of each agent and the coevolution process of the whole nexus system by positive/negative feedback loops. The multi-objective optimization model is used to quantify the negative feedback loops of the SD model by generating the optimal scheme of different water users. Finally, the model uncertainty considering different weighting factors is analyzed. The framework is applied to the upper reaches of the Guijiang River basin, China. Results show that (i) the rapid economic growth increases the conflict between the water uses for socioeconomic development and ecological protection, intensifying the ecological awareness and resulting in more water shortages of socioeconomic and food agents, which is unable to support such rapid development. (ii) Once the economic growth rate decreases, water resources are able to support economic development with a decreased overload index and stable crop yield, which further contributes to water sustainability. (iii) The river ecological agent is the critical factor that affects the robustness of the model. (iv) The equal consideration of each water usage is the most beneficial to sustainable development. These results highlight the importance of water resources management, considering the tradeoffs across multiple stakeholders, and give a strong reference to policymakers for comprehensive urban planning.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Qi, Yi’ang, Jingjing Yao, and Lindong Liu. "Research on evolutionary game of environmental accounting information disclosure from the perspective of multi-agent." PLOS ONE 16, no. 8 (August 31, 2021): e0256046. http://dx.doi.org/10.1371/journal.pone.0256046.

Повний текст джерела
Анотація:
In the past, China, like other developing countries in the world, pursued the goal of rapid economic development at the expense of ecology and ignored the issue of environmental protection. But in recent decades, as environmental problems have become increasingly prominent, developing countries have begun to explore ways to coordinate economy and ecological environment. As the largest developing country, China has been actively exploring ecological governance plans, putting forward the concept of green development, setting the goal of building a "beautiful China" and placing the construction of ecological civilization in the ontological status of social systems and national goals. In order to accelerate the green development process of enterprises in developing countries, based on the actual situation in China, this paper constructs a tripartite evolutionary game model of environmental accounting information disclosure with enterprises, investors and media as the research objects, and analyzes the internal mechanism of environmental accounting information disclosure. The model finds that the equilibrium of the three parties is affected by multiple factors. Therefore, this study further uses system dynamics to explore the dynamic process of evolutionary games and the strategic choices among multiple agents, and explore the mechanism of three types of agents to promote environmental accounting information disclosure. The simulation results reveal that government incentives have a greater impact on guiding enterprises and the media to evolve in the direction of legal disclosure and participation in exposure strategies. In addition, the continuous reduction of the cumbersome degree of disclosure procedures and the difficulty of improving environmental performance can fundamentally promote companies to actively choose legal disclosure strategies, which will help improve the quality of environmental accounting information disclosure, boost investor confidence, and enhance government supervision.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Smith, G. E., D. L. Cooper, P. Loveridge, F. Chinemana, E. Gerard, and N. Verlander. "A national syndromic surveillance system for England and Wales using calls to a telephone helpline." Eurosurveillance 11, no. 12 (December 1, 2006): 9–10. http://dx.doi.org/10.2807/esm.11.12.00667-en.

Повний текст джерела
Анотація:
Routine primary care data provide the means to monitor a variety of syndromes which could give early warning of health protection issues. In the United Kingdom, a national syndromic surveillance system, operated jointly by the UK Health Protection Agency (HPA) and NHS Direct (a national telephone health helpline), examines symptoms reported to NHS Direct. The aim of the system is to identify an increase in syndromes indicative of common infections and diseases, or the early stages of illness caused by the deliberate release of a biological or chemical agent. Data relating to 11 key symptoms/syndromes are received electronically from all 22 NHS Direct call centres covering England and Wales and analysed by the HPA on a daily basis. Statistically significant excesses in calls are automatically highlighted and assessed by a multi-disciplinary team. Although the surveillance system has characterised many sudden rises in syndromes reported to NHS Direct, no evidence of a biological or chemical attack has been detected. Benefits of this work, however, are early warning and tracking of rises in community morbidity (e.g. influenza-like illness, heatstroke); providing reassurance during times of perceived high risk (e.g. after the 7 July 2005 London bombs and December 2005 Buncefield oil depot fire); and timely surveillance data for influenza pandemic planning and epidemic modeling.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Hathout, Basma Badawi, Samy Ghoniemy, and Osman Ibrahim. "A Modified Cloud-Based Cryptographic Agent for Cloud Data Integrity." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (April 11, 2017): 6. http://dx.doi.org/10.3991/ijim.v11i2.6553.

Повний текст джерела
Анотація:
In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of sensitive data on remote machines that are not owned, or even managed by the customers themselves. In this paper, initially a homomorphic encryption-based Cryptographic Agent is proposed. The proposed Cryptographic Agent is based on Paillier scheme, and is supported by user-configurable software protection and data privacy categorization agents, as well as set of accountable auditing services required to achieve legal compliance and certification. This scheme was tested using different text documents with different sizes. Testing results showed that as the size of the document increases, the size of the generated key increases dramatically causing a major problem in regards to the processing time and the file size especially for large documents. This leaded us to the second part of this research which is: a modified security architecture that adds two major autonomic security detective agents to the multi-agent architecture of cloud data storage. In this paper, we focus on the first agent namely (Automated Master Agent, AMA) that is added to the Multi Agent System Architecture (MASA) layer (cloud client-side) by which any changes happen in the document are mapped in a QR code encoded key print (KP). Experimental results after integrating these agents showed a 100% alternation detection accuracy and a superiority in extracting the KP of large and very large size documents which exceeds the currently available products and leverage the tamper-proof capabilities of cryptographic coprocessors to establish a secure execution domain in the computing cloud that is physically and logically protected from unauthorized access.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Toumia, Imen, and Ahlem Ben Hassine. "A-RESS new dynamic and smart system for renewable energy sharing problem." PeerJ Computer Science 7 (June 28, 2021): e610. http://dx.doi.org/10.7717/peerj-cs.610.

Повний текст джерела
Анотація:
Energy is at the basis of any social or economic development. The fossil energy is the most used energy source in the world due to the cheap building cost of the power plants. In 2017, fossil fuels generated 64.5% of the world electricity. Since, on the one hand, these plants produce large amount of carbon dioxide which drives climate change, and on the other hand, the storage of existing world fossil resources is in continuous decrease, safer and highly available energy sources should be considered. Hence, for human well-being, and for a green environment, these fossil plants should be switched to cleaner ones. Renewable energy resources have begun to be used as alternatives. These resources have many advantages such as sustainability and environmental protection. Nevertheless, they require higher investment costs. In addition, the reliability of many planted systems is poor. In most cases these systems are not sufficient to ensure a continuous demand of energy for all in needy regions because most of their resources are climate dependent. The main contributions of this research are (i) to propose a natural formalisation of the renewable energy distribution problem, based on COP (Constraint Optimisation Problem), that takes into consideration all the constraints related to this problem; (ii) to propose a novel multi-agent dynamic (A-RESS for Agent based Renewable Energy Sharing System) to solve this problem. The proposed system was implemented and the obtained results show its efficiency and performance in terms of produced, consumed and lost energy.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Alkatheiri, Mohammed Saeed, Sajid Saleem, Mohammed Ali Alqarni, Ahmad O. Aseeri, Sajjad Hussain Chauhdary, and Yu Zhuang. "A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions." Electronics 11, no. 18 (September 15, 2022): 2921. http://dx.doi.org/10.3390/electronics11182921.

Повний текст джерела
Анотація:
A network of agents constituted of multiple unmanned aerial vehicles (UAVs) is emerging as a promising technology with myriad applications in the military, public, and civil domains. UAVs’ power, memory, and size constraints, ultra-mobile nature, and non-trusted operational environments make them susceptible to various attacks, including physical capturing and cloning attacks. A robust and resilient security protocol should be lightweight and resource-efficient in addition to providing protection against physical and tampering threats. This paper proposes an authentication protocol for a UAV-based multi-agent system robust against various threats and adversaries, including strong resistance against cloning and physical attacks. The proposed protocol is based on a physical unclonable function (PUF), a well-known hardware security primitive that is utilized for low-cost authentication and cryptographic key generation. The analysis of the proposed approach shows that it provides strong protection against various attacks, including tampering and cloning, and exhibits scalability and energy efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Jo, Seongjun, Wooyeol Yang, Haing Kun Choi, Eonsu Noh, Han-Shin Jo, and Jaedon Park. "Deep Q-Learning-Based Transmission Power Control of a High Altitude Platform Station with Spectrum Sharing." Sensors 22, no. 4 (February 19, 2022): 1630. http://dx.doi.org/10.3390/s22041630.

Повний текст джерела
Анотація:
A High Altitude Platform Station (HAPS) can facilitate high-speed data communication over wide areas using high-power line-of-sight communication; however, it can significantly interfere with existing systems. Given spectrum sharing with existing systems, the HAPS transmission power must be adjusted to satisfy the interference requirement for incumbent protection. However, excessive transmission power reduction can lead to severe degradation of the HAPS coverage. To solve this problem, we propose a multi-agent Deep Q-learning (DQL)-based transmission power control algorithm to minimize the outage probability of the HAPS downlink while satisfying the interference requirement of an interfered system. In addition, a double DQL (DDQL) is developed to prevent the potential risk of action-value overestimation from the DQL. With a proper state, reward, and training process, all agents cooperatively learn a power control policy for achieving a near-optimal solution. The proposed DQL power control algorithm performs equal or close to the optimal exhaustive search algorithm for varying positions of the interfered system. The proposed DQL and DDQL power control yields the same performance, which indicates that the actional value overestimation does not adversely affect the quality of the learned policy.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Volkova, T. I. "‘Open’ Innovation and Institutional Protection of Intellectual Property." Zhurnal Economicheskoj Teorii 18, no. 4 (2021): 596–609. http://dx.doi.org/10.31063/2073-6517/2021.18-4.9.

Повний текст джерела
Анотація:
The study offers a comprehensive view on the process which can be described as dialectics of ‘open’ innovation and institutional protection of intellectual property. Although in the ICT sphere this process is already a well-established fact, in research literature only its theoretical and methodological aspects have received some fragmented attention. This study relies on the empirical evidence concerning competitive strategies and tactics of international high-tech companies. The study shows the growing complexity in the configuration of relations and intellectual property transactions between the stakeholders. Strategies and interactions often acquire a hybrid nature not only in their form (network-based, based on digital platforms, alliances, etc) but also in their content (due to the diversity of the possible combinations of ‘open’ and ‘closed’ innovations). The aim of this study is to show the potential of high tech companies’ strategies and business models underpinned by the dialectics of ‘open’ innovation and intellectual property protection. A special focus is made on the theoretical and methodological foundations of the connection between the ‘open’ and ‘closed’ innovation types. There is a system-forming factor that determines the sophisticated, often contradictory, multi-agent mechanism for the reproduction of high profitability of companies. At the core of this factor is the intellectual capital — the commitment and competence of workers (developers, managers, and experts), who have received specialized interdisciplinary training. Conceptually, this study relies on the institutional approach to economic theory and innovation management theory. It also relies on the systemic, dialectical, and functional methods as well as on the decomposition method, methods of comparative analysis and structurization. The research findings can be used by policy makers to enhance innovation in Russia and to make its regions more competitive on the international arena.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Mukharya, Amit, Paresh U. Patel, and Shivang Chaudhary. "Evaluation of “In-Use” Stability Period of Lacidipine Tablets in Multi-dose Plastic Container-Closure." International Journal of Pharmaceutical Sciences and Nanotechnology 6, no. 2 (August 31, 2013): 2022–32. http://dx.doi.org/10.37285/ijpsn.2013.6.2.3.

Повний текст джерела
Анотація:
Lacidipine (LCDP) is chemically a 1,4-dihydropyridine derivative and pharmacologically a “calcium channel blocker” used as an anti-hypertensive agent. Lacidipine is most sensitive to light and moisture, which is in line with the well-known sensitivity of the dihydropyridine class of compounds. In general, moisture protection can be obtained by packaging into moisture impermeable material, while light protection can be obtained by covering tablets with an opaque film coating. But, when film-coated tablets are packed in High Density Polyethylene (HDPE) multi-dose plastic containers and closures, repeated opening and closing may pose a risk to their contents with regard to microbiological contamination and physicochemical degradation once the closure system has been breached. The continued integrity of the product in multi-dose containers after the first opening is an important quality issue. Thus, the main objective of the present in-use stability study was to establish a period of time during which a multi-dose Lacidipine tablet product can be used whilst retaining quality within an accepted specification once the container is opened. The extent of drug product testing was established by assessing whether or not there was acceptable change, mainly in terms of impurities generated by different factors and microbial loads mainly in terms of bacteria/yeast/mould occurrence over the in-use stability or at the end of the in-use stability study period. Our results from drug assay, dissolution and impurity profile studies assessed as per the regulatory specifications suggest that the lacidipine product should be used within 4 weeks after opening of the container. The container should be closed tightly after each use to limit drug product degradation.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Zhu, Jisong, Zhaoxia Jing, Tianyao Ji, and Nauman Ali Larik. "Energy–Economy Coupled Simulation Approach and Simulator Based on Invididual-Based Model." Energies 13, no. 11 (June 1, 2020): 2771. http://dx.doi.org/10.3390/en13112771.

Повний текст джерела
Анотація:
An integrated energy system, referred to specifically as a heterogeneous energy system that combines cooling, heating, power, etc., is a dynamic system containing continuous as well as discrete behaviors on both technical and economic levels. Currently, the comprehensive utilization of multiple forms of energy and the implementation of the energy market have made the simulation of such a system very complicated, which is reflected in two aspects. First, the simulation model becomes complex and varied. Second, the time-varying characteristics of the models are quite diverse. Therefore, a standard and normative modeling and simulation method is urgently needed. This work aims to obtain a compatible modeling and simulation method for the energy economy coupling system. The individual-based model is widely used to describe organisms in an ecology system that are similar to the energy–economy coupled system. Inspired by this, a general simulation approach based on the individual-based model is proposed in this paper to overcome these existing problems. The standard formal expression model is built, then its structure and elements explained in detail, and multi-scale time simulation supported to model and simulate an integrated energy system that is coupled with markets. In addition, a simulator is designed and implemented based on multi-agent framework and model-view-controller architecture. Finally, a simulation case of a conceived scenario was designed and executed, and the results analysis proved the validity and versatility of the proposed approach. The proposed method has the advantages of model standardization, multi-scale time compatibility, distributed simulation capability, and privacy protection. These advantages support and strengthen each other. Through these studies, a systematic approach was formed that could improve the standardization of modeling and simulation in the energy–economy research area.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Dongak, B. S., A. S. Shatohin, and R. V. Meshcheryakov. "The effectiveness of the Centralized Use of Digital Technologies, Information Resources and Information Protection Tools in Government by the Example of the Republic of Tyva." Proceedings of the Southwest State University 23, no. 6 (February 23, 2020): 99–114. http://dx.doi.org/10.21869/2223-1560-2019-23-6-99-114.

Повний текст джерела
Анотація:
Purpose of research. The purpose of this study is to assess the possibility of applying the methodology for centralized management of systems and information risks using the example of informatization of public departments of Republic of Tyva in order to optimize the cost of purchasing technical, software and hardware-software means of protecting information, as well as the payroll of maintenance technical personnel.Methods. One of the main research methods is the creation of an experimental model of the mechanism of a single information and computing network, combining various government departments located within the same administrative building, which allows working simultaneously with distributed or centralized applications, databases and other services, as well as centralized information risk management security. The next research method is the analysis and study of the principle of operation of information resources, information systems, databases, and the increase in the number of domain users if they are combined into a single data transfer network. The interaction and effectiveness of personnel, a specialized unit based on one government agency, ensuring the regular functioning of the network and the necessary level of information security for all government departments.Results. As a result, an economic effect is achieved by eliminating the acquisition of duplicate software and hardware information protection, increasing the efficiency of using unified information services, and creating a centralized structural unit that uses risk management tools and makes information security management decisions based on the principles of system analysis , structuring method and expert survey methods. The results of the study have been used in solving problems of improving the information security management system of the authorities of Republic of Tyva.Conclusion. We have developed the original information technology architecture of the information security management system and centralized use of information technologies for the government of Republic of Tyva. The distinctive features of the structure of software tools for the centralized approach are the multi-agent implementation of the control elements of the decision support system and the integration of various types of security management models into a single complex.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Mezquita, Yeray, Ana Belén Gil-González, Angel Martín del Rey, Javier Prieto, and Juan Manuel Corchado. "Towards a Blockchain-Based Peer-to-Peer Energy Marketplace." Energies 15, no. 9 (April 21, 2022): 3046. http://dx.doi.org/10.3390/en15093046.

Повний текст джерела
Анотація:
Blockchain technology is used as a distributed ledger to store and secure data and perform transactions between entities in smart grids. This paper proposes a platform based on blockchain technology and the multi-agent system paradigm to allow for the creation of an automated peer-to-peer electricity market in micro-grids. The use of a permissioned blockchain network has multiple benefits as it reduces transaction costs and enables micro-transactions. Moreover, an improvement in security is obtained, eliminating the single point of failure in the control and management of the platform along with creating the possibility to trace back the actions of the participants and a mechanism of identification. Furthermore, it provides the opportunity to create a decentralized and democratic energy market while complying with the current legislation and regulations on user privacy and data protection by incorporating Zero-Knowledge Proof protocols and ring signatures.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Khan, Numan, Ahmed Khairadeen Ali, Si Van-Tien Tran, Doyeop Lee, and Chansik Park. "Visual Language-Aided Construction Fire Safety Planning Approach in Building Information Modeling." Applied Sciences 10, no. 5 (March 2, 2020): 1704. http://dx.doi.org/10.3390/app10051704.

Повний текст джерела
Анотація:
Fires pose an enormous threat to human safety and many spectacular fires in under-construction buildings were reported over the past few years. Many construction sites only rely on fire extinguishers, as under-construction buildings do not contain a permanent fire protection system. Traditional safety planning lacks a justified approach for the firefighting equipment installation planning in the construction job site. Even though many government agencies made safety regulations for firefighting equipment installations, it is still a challenge to translate and execute these rules at the job site. Currently, the construction industry is devoted to discovering all the possible applications of Building Information Modelling (BIM) technology in the entire phases of the project life cycle. BIM technology enables the presentation of facilities in 3-D and offers rule-based modeling through visual programming tools. Therefore, this paper focuses on a visual language approach for rule translation and a multi-agent-based construction fire safety planning simulation in BIM. The proposed approach includes three core modules, namely: (a) Rule Extraction and Logic Development (RELD) Module, (b) Design for Construction Fire Safety (DCFS) Module, and (c) Con-fire Safety Plan Simulation (CSPS) Module. In addition, the DCFS module further includes three submodules, named as (1) Firefighting Equipment Installation (FEI) Module, (2) Bill of Quantities (BoQs) for firefighting Equipment (BFE) Module, and (3) Escape Route Plan (ERP) Module. The RELD module converts the OSHA fire safety rule into mathematical logic, and the DCFS module presents the development of the Con-fire Safety Planning approach by translating the rules from mathematical logic into computer-readable language. The three sub-modules of the DCFS module visualize the outputs of this research work. The CSPS module uses a multi-agent simulation to verify the safety rule compliance of the portable firefighting equipment installation plan the system in a BIM environment. A sample project case study has been implemented to validate the proof of concept. It is anticipated that the proposed approach has the potential to helps the designers through its effectiveness and convenience while it could be helpful in the field for practical use.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Bhuiyan, Md Safiul Alam, Zarina Amin, Kenneth Francis Rodrigues, Suryani Saallah, Sharifudin Md Shaarani, Subir Sarker, and Shafiquzzaman Siddiquee. "Infectious Bronchitis Virus (Gammacoronavirus) in Poultry Farming: Vaccination, Immune Response and Measures for Mitigation." Veterinary Sciences 8, no. 11 (November 12, 2021): 273. http://dx.doi.org/10.3390/vetsci8110273.

Повний текст джерела
Анотація:
Infectious bronchitis virus (IBV) poses significant financial and biosecurity challenges to the commercial poultry farming industry. IBV is the causative agent of multi-systemic infection in the respiratory, reproductive and renal systems, which is similar to the symptoms of various viral and bacterial diseases reported in chickens. The avian immune system manifests the ability to respond to subsequent exposure with an antigen by stimulating mucosal, humoral and cell-mediated immunity. However, the immune response against IBV presents a dilemma due to the similarities between the different serotypes that infect poultry. Currently, the live attenuated and killed vaccines are applied for the control of IBV infection; however, the continual emergence of IB variants with rapidly evolving genetic variants increases the risk of outbreaks in intensive poultry farms. This review aims to focus on IBV challenge–infection, route and delivery of vaccines and vaccine-induced immune responses to IBV. Various commercial vaccines currently have been developed against IBV protection for accurate evaluation depending on the local situation. This review also highlights and updates the limitations in controlling IBV infection in poultry with issues pertaining to antiviral therapy and good biosecurity practices, which may aid in establishing good biorisk management protocols for its control and which will, in turn, result in a reduction in economic losses attributed to IBV infection.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Yan, Huimin, Lihu Pan, Zhichao Xue, Lin Zhen, Xuehong Bai, Yunfeng Hu, and He-Qing Huang. "Agent-Based Modeling of Sustainable Ecological Consumption for Grasslands: A Case Study of Inner Mongolia, China." Sustainability 11, no. 8 (April 15, 2019): 2261. http://dx.doi.org/10.3390/su11082261.

Повний текст джерела
Анотація:
Sustainable ecosystem services consumption is of vital importance to the survival and development of human society. How to balance the conflicts between ecosystem protection and ecosystem services consumption by local residents has been a serious challenge, especially in ecologically vulnerable areas. To explore the reasonable ecosystem services consumption approaches of grassland ecosystems for sustainable land system management, this study takes Hulun Buir of the Inner Mongolia Autonomous Region as a case study region and develops an EcoC-G (ecological consumption of grassland) model based on herders’ livelihood behaviors using the agent-based model technique to simulate the dynamics of ecosystem pressure, livestock production, and living quality of herders under different grassland management scenarios over the next 30 years. The EcoC-G model links the supply and consumption of grassland ecosystem services by calculating the ecosystem net primary productivity (NPP) supply and household NPP consumption. The model includes three sub-models, namely, the individual status transferring sub-model, the households’ grassland-use decision sub-model, and the ecosystem pressure sub-model. In accordance with multi-objective grassland management practices, the following four land management scenarios were simulated: (1) baseline scenario, (2) increasing household’s living standard, (3) ecosystem protection, and (4) balancing living standard improvement with the protection of the ecosystem. The result indicates that by focusing on the NPP supply and consumption of the grassland ecosystem, the EcoC-G is capable of simulating the impacts of herders’ livelihood behaviors on grassland ecosystems. If timely grassland management strategies are implemented, it is possible to relieve the ecosystem pressure and improve the livelihood of local herders. The specific scenario simulation results are: (1) Under the current grassland management mode, the pasture could never be overgrazed, and herders could achieve the basic living standard, but the accumulated wealth decreased due to the decline of livestock. (2) With grazing control, herders can accumulate wealth by increasing the breeding amount and reducing the marketing rate, but the ecosystem consumption pressure can reach a maximum of 2.3 times. (3) With strict restrictions on the livestock number, the pressure on the ecosystem decreases; however, herders might not achieve basic living standards. (4) Modest regulation leads to rational ecological consumption intervals, meaning the ecosystem pressure will become stable and herders can gradually accumulate wealth with the achievement of basic living standards in advance.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Baig, Zubair A. "Multi-agent systems for protecting critical infrastructures: A survey." Journal of Network and Computer Applications 35, no. 3 (May 2012): 1151–61. http://dx.doi.org/10.1016/j.jnca.2012.01.006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

A. Khovanskov, S., K. E. Rumyantsev, and V. S. Khovanskova. "Methods of Protecting the Distributed Computation in Multi-Agent System." International Journal of Engineering & Technology 7, no. 3.13 (July 27, 2018): 38. http://dx.doi.org/10.14419/ijet.v7i3.13.16320.

Повний текст джерела
Анотація:
Currently, there are many different approaches for organization of the distributed calculations in computer network technology grid, metacomputing (BOINC, PVM, and others). The main drawback of most existing approaches is that they are designed to create centralized distributed computing systems. In this article we propose to organize the solution of such problems as multivariate modeling, through the creation of distributed computations in computer networks based on decentralized multi-agent system. When used as a computing environment a computer network on a large scale can cause threats to the security of distributed computing from the intruders. One of these threats is getting the calculation about the result by the attacker. A false result can leads in the modeling process to adopt is not optimal or wrong decisions. We developed a method of protecting distributed computing from the threat of receiving false result.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Makedonskiy, Sergey, and Arina Nikishova. "Study of Approaches to Multi-Agent Modeling of Information Protection Systems." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 10. Innovatcionnaia deiatel’nost’, no. 1 (March 2017): 6–12. http://dx.doi.org/10.15688/jvolsu10.2017.1.1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії