66 resultados para multi-agent incremental negotiation scheme


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Monte-Carlo Tree Search (MCTS) is a heuristic to search in large trees. We apply it to argumentative puzzles where MCTS pursues the best argumentation with respect to a set of arguments to be argued. To make our ideas as widely applicable as possible, we integrate MCTS to an abstract setting for argumentation where the content of arguments is left unspecified. Experimental results show the pertinence of this integration for learning argumentations by comparing it with a basic reinforcement learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background Despite its global recognition as a ruminant pathogen, cases of Chlamydia pecorum infection in Australian livestock are poorly documented. In this report, a C. pecorum specific Multi Locus Sequence Analysis scheme was used to characterise the C. pecorum strains implicated in two cases of sporadic bovine encephalomyelitis confirmed by necropsy, histopathology and immunohistochemistry. This report provides the first molecular evidence for the presence of mixed infections of C. pecorum strains in Australian cattle. Case presentation Affected animals were two markedly depressed, dehydrated and blind calves, 12 and 16 weeks old. The calves were euthanized and necropsied. In one calf, a severe fibrinous polyserositis was noted with excess joint fluid in all joints whereas in the other, no significant lesions were seen. No gross abnormalities were noted in the brain of either calf. Histopathological lesions seen in both calves included: multifocal, severe, subacute meningoencephalitis with vasculitis, fibrinocellular thrombosis and malacia; diffuse, mild, acute interstitial pneumonia; and diffuse, subacute epicarditis, severe in the calf with gross serositis. Immunohistochemical labelling of chlamydial antigen in brain, spleen and lung from the two affected calves and brain from two archived cases, localised the antigen to the cytoplasm of endothelium, mesothelium and macrophages. C. pecorum specific qPCR, showed dissemination of the pathogen to multiple organs. Phylogenetic comparisons with other C. pecorum bovine strains from Australia, Europe and the USA revealed the presence of two genetically distinct sequence types (ST). The predominant ST detected in the brain, heart, lung and liver of both calves was identical to the C. pecorum ST previously described in cases of SBE. A second ST detected in an ileal tissue sample from one of the calves, clustered with previously typed faecal bovine isolates. Conclusion This report provides the first data to suggest that identical C. pecorum STs may be associated with SBE in geographically separated countries and that these may be distinct from those found in the gastrointestinal tract. This report provides a platform for further investigations into SBE and for understanding the genetic relationships that exist between C. pecorum strains detected in association with other infectious diseases in livestock.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Interest in the area of collaborative Unmanned Aerial Vehicles (UAVs) in a Multi-Agent System is growing to compliment the strengths and weaknesses of the human-machine relationship. To achieve effective management of multiple heterogeneous UAVs, the status model of the agents must be communicated to each other. This paper presents the effects on operator Cognitive Workload (CW), Situation Awareness (SA), trust and performance by increasing the autonomy capability transparency through text-based communication of the UAVs to the human agents. The results revealed a reduction in CW, increase in SA, increase in the Competence, Predictability and Reliability dimensions of trust, and the operator performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This demonstration highlights the applications of our research work i.e. second generation (Scalable Fault Tolerant Agent Grooming Environment - SAGE) Multi Agent System, Integration of Software Agents and Grid Computing and Autonomous Agent Architecture in the Agent Platform. It is a conference planner application that uses collaborative effort of services deployed geographically wide in different technologies i.e. Software Agents, Grid computing and Web services to perform useful tasks as required. Copyright 2005 ACM.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Tzeng et al. proposed a new threshold multi-proxy multi-signature scheme with threshold verification. In their scheme, a subset of original signers authenticates a designated proxy group to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. Subsequently, there are two improved schemes to eliminate the security leak of Tzeng et al.’s scheme. In this paper, we have pointed out the security leakage of the three schemes and further proposed a novel threshold multi-proxy multi-signature scheme with threshold verification.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

With the recent regulatory reforms in a number of countries, railways resources are no longer managed by a single party but are distributed among different stakeholders. To facilitate the operation of train services, a train service provider (SP) has to negotiate with the infrastructure provider (IP) for a train schedule and the associated track access charge. This paper models the SP and IP as software agents and the negotiation as a prioritized fuzzy constraint satisfaction (PFCS) problem. Computer simulations have been conducted to demonstrate the effects on the train schedule when the SP has different optimization criteria. The results show that by assigning different priorities on the fuzzy constraints, agents can represent SPs with different operational objectives.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In open railway markets, coordinating train schedules at an interchange station requires negotiation between two independent train operating companies to resolve their operational conflicts. This paper models the stakeholders as software agents and proposes an agent negotiation model to study their interaction. Three negotiation strategies have been devised to represent the possible objectives of the stakeholders, and they determine the behavior in proposing offers to the proponent. Empirical simulation results confirm that the use of the proposed negotiation strategies lead to outcomes that are consistent with the objectives of the stakeholders.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Multi-Microgrids (MMGs) have been proposed to connect distributed generators (DG), microgrids (MG), and medium-voltage (MV) loads with the distribution system. A flexible protection scheme that enables an islanded MMG to continue operation during fault conditions is yet to be developed. In this paper, a protection scheme for an islanded MMG that utilises MG controllers and communication links is proposed. The MMG model used includes two MGs connected to the distribution system. Each MG consists of diesel, wind, and photovoltaic (PV) microsources. The effectiveness of the proposed protection scheme is evaluated by simulation.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. Methods We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI’s least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Results Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Conclusions Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We present a method for topological SLAM that specifically targets loop closing for edge-ordered graphs. Instead of using a heuristic approach to accept or reject loop closing, we propose a probabilistically grounded multi-hypothesis technique that relies on the incremental construction of a map/state hypothesis tree. Loop closing is introduced automatically within the tree expansion, and likely hypotheses are chosen based on their posterior probability after a sequence of sensor measurements. Careful pruning of the hypothesis tree keeps the growing number of hypotheses under control and a recursive formulation reduces storage and computational costs. Experiments are used to validate the approach.