787 resultados para multi-agent system
Resumo:
Railway timetabling is an important process in train service provision as it matches the transportation demand with the infrastructure capacity while customer satisfaction is also considered. It is a multi-objective optimisation problem, in which a feasible solution, rather than the optimal one, is usually taken in practice because of the time constraint. The quality of services may suffer as a result. In a railway open market, timetabling usually involves rounds of negotiations among a number of self-interested and independent stakeholders and hence additional objectives and constraints are imposed on the timetabling problem. While the requirements of all stakeholders are taken into consideration simultaneously, the computation demand is inevitably immense. Intelligent solution-searching techniques provide a possible solution. This paper attempts to employ a particle swarm optimisation (PSO) approach to devise a railway timetable in an open market. The suitability and performance of PSO are studied on a multi-agent-based railway open-market negotiation simulation platform.
Resumo:
Stigmergy is a biological term used when discussing a sub-set of insect swarm-behaviour describing the apparent organisation seen during their activities. Stigmergy describes a communication mechanism based on environment-mediated signals which trigger responses among the insects. This phenomenon is demonstrated in the behavior of ants and their food gathering process when following pheromone trails, where the pheromones are a form of environment-mediated communication. What is interesting with this phenomenon is that highly organized societies are achieved without an apparent management structure. Stigmergy is also observed in human environments, both natural and engineered. It is implicit in the Web where sites provide a virtual environment supporting coordinative contributions. Researchers in varying disciplines appreciate the power of this phenomenon and have studied how to exploit it. As stigmergy becomes more widely researched we see its definition mutate as papers citing original work become referenced themselves. Each paper interprets these works in ways very specific to the research being conducted. Our own research aims to better understand what improves the collaborative function of a Web site when exploiting the phenomenon. However when researching stigmergy to develop our understanding we discover a lack of a standardized and abstract model for the phenomenon. Papers frequently cited the same generic descriptions before becoming intimately focused on formal specifications of an algorithm, or esoteric discussions regarding sub-facets of the topic. None provide a holistic and macro-level view to model and standardize the nomenclature. This paper provides a content analysis of influential literature documenting the numerous theoretical and experimental papers that have focused on stigmergy. We establish that stigmergy is a phenomenon that transcends the insect world and is more than just a metaphor when applied to the human world. We present from our own research our general theory and abstract model of semantics of stigma in stigmergy. We hope our model will clarify the nuances of the phenomenon into a useful road-map, and standardise vocabulary that we witness becoming confused and divergent. Furthermore, this paper documents the analysis on which we base our next paper: Special Theory of Stigmergy: A Design Pattern for Web 2.0 Collaboration.
Resumo:
This research has analysed both reciprocity and feedback mechanisms in multi-antenna wireless systems. It has presented the basis of an effective CSI feedback mechanism that efficiently provides the transmitter with the minimum information to allow the accurate knowledge of a rapidly changing channel. The simulations have been conducted using MATLAB to measure the improvement when the channel is estimated at the receiver in a 2 X 2 multi-antenna system and compared to the case of perfect channel knowledge at the receiver.
Resumo:
The continuous changing impacts appeared in all solution understanding approaches in the projects management field (especially in the construction field of work) by adopting dynamic solution paths. The paper will define what argue to be a better relational model for project management constraints (time, cost, and scope). This new model will increase the success factors of any complex program / project. This is a qualitative research adopting a new avenue of investigation by following different approach of attributing project activities with social phenomena, and supporting phenomenon with field of observations rather than mathematical method by emerging solution from human, and ants' colonies successful practices. The results will show the correct approach of relation between the triple constraints considering the relation as multi agents system having specified communication channels based on agents locations. Information will be transferred between agents, and action would be taken based on constraint agents locations in the project structure allowing immediate changes abilities in order to overcome issues of over budget, behind schedule, and additional scope impact. This is complex adaptive system having self organizes technique, and cybernetic control. Resulted model can be used for improving existing project management methodologies.
Resumo:
This paper examines the issue of face, speaker and bi-modal authentication in mobile environments when there is significant condition mismatch. We introduce this mismatch by enrolling client models on high quality biometric samples obtained on a laptop computer and authenticating them on lower quality biometric samples acquired with a mobile phone. To perform these experiments we develop three novel authentication protocols for the large publicly available MOBIO database. We evaluate state-of-the-art face, speaker and bi-modal authentication techniques and show that inter-session variability modelling using Gaussian mixture models provides a consistently robust system for face, speaker and bi-modal authentication. It is also shown that multi-algorithm fusion provides a consistent performance improvement for face, speaker and bi-modal authentication. Using this bi-modal multi-algorithm system we derive a state-of-the-art authentication system that obtains a half total error rate of 6.3% and 1.9% for Female and Male trials, respectively.
Resumo:
Monte-Carlo Tree Search (MCTS) is a heuristic to search in large trees. We apply it to argumentative puzzles where MCTS pursues the best argumentation with respect to a set of arguments to be argued. To make our ideas as widely applicable as possible, we integrate MCTS to an abstract setting for argumentation where the content of arguments is left unspecified. Experimental results show the pertinence of this integration for learning argumentations by comparing it with a basic reinforcement learning.
Resumo:
This Master's thesis examines two opposite nationalistic discourses on the revolution of Zanzibar. Chama cha Mapinduzi (CCM), the party in power since the 1964 revolution defends its revolutionary and "African" heritage in the current multi-party system. New nationalists, including among others the main opposition party Civic United Front (CUF), question both the 1964 revolution and the post-revolution period and blame CCM for empty promises, corruption and ethnic discrimination. This study analyzes the role of a significant historical event in the creation of nationalistic ideology and national identity. The 1964 revolution forms the nucleus of various debates related to the history of Zanzibar: slavery, colonialism, racial discrimination and political violence. Representations of these Social constructivist principles form the basis of this study, and central concepts in the theoretical framework are nationalism, national identity, ethnicity and race. I use critical discourse analysis as my research method, lean on the work by Teun A. van Dijk and Norman Fairclough as the most significant researchers in this field. I examine particularly the ways in which linguistic methods, such as stereotypes and metaphors are used to form in- and out-groups ("us" vs. "others"). My material, both in Swahili and English, was collected mainly in Tanzania in the fall of 2007 and from online sources in the spring of 2009. It includes publications by the Zanzibari government between the years of 1964-2000 (12), official speeches for the Revolution Day or the Union Day (12), articles from Tanzanian newspapers from the 1990s until the year of 2009 (15), memoirs and political pamphlets (10), blog posts and opinion pieces from four different websites (8), and interviews or personal communication in Zanzibar, Dar es Salaam and Uppsala (8). Nationalistic rhetoric often creates enemy images by using binary good-bad oppositions. Both discourses in this study build identities on the basis of "otherness" and exclusion, with the intent of emphasizing the particularity of the own group and excluding "evilness" outside the own reference group. These opposite views on the 1964 revolution as the main axis of the history of Zanzibar build different portraits of the nation and Zanzibari-ness (Uzanzibari). CCM still relies on the pre-revolutionary enemy images of Arabs as selfish rulers and cruel slave traders. For CCM, Zanzibar is primarily an "African" nation and a part of Tanzania which is threatened by "Arabs", the outsiders. In contrast, the new nationalists stress the long history of Zanzibar as multi-racial, cosmopolitan and formerly independent country which has its own, separate culture and identity from mainland Tanzanians. Heshima, honour/respect, one of the basic values of Swahili culture, occupies a central role in both discourses: the main party emphasizes that the revolution returned "heshima" to the Zanzibari Africans after centuries of humiliation, whereas the new nationalists claim that ever since the revolution all "non-Africans" have been humiliated and lost their "heshima". According to the new nationalists, true Zanzibari values which include tolerance and harmony between different "races" were lost when the "foreign" revolutionaries arrived from the mainland. Consequently, they see the 1964 revolution as Tanganyikan colonialism which began with the help of Western countries, and maintain that this "colonialism" still continues in the violent multi-party elections.
Resumo:
This paper presents a novel approach for designing of generator excitation controllers using Interconnection and Damping Assignment Passivity Based Control (IDA-PBC) technique for a Single Machine Infinite Bus (SMIB) system that can also be directly used in a multi-machine environment. The generator system equations are modified by referencing the rotor angle with respect to the secondary of the transformer bus instead of the infinite bus. For the modified system equations, IDA-PBC is applied to stabilize the system around an operating condition. The IDA-PBC design results in a Lyapunov function for the modified system. The new control law is practically feasible and can be applied directly to multi-machine system without referring to external system parameters. The effectiveness of the proposed controller is tested on a SMIB and a 10 generator 39 bus test system for a range of operating conditions. The Proposed excitation controller has shown good performance for both small and large disturbances when compared to the performance of a conventional static exciter with power system stabilizer.
Resumo:
A 4-degree-of-freedom single-input system and a 3-degree-of-freedom multi-input system are solved by the Coates', modified Coates' and Chan-Mai flowgraph methods. It is concluded that the Chan-Mai flowgraph method is superior to other flowgraph methods in such cases.
Resumo:
The integration of stochastic wind power has accentuated a challenge for power system stability assessment. Since the power system is a time-variant system under wind generation fluctuations, pure time-domain simulations are difficult to provide real-time stability assessment. As a result, the worst-case scenario is simulated to give a very conservative assessment of system transient stability. In this study, a probabilistic contingency analysis through a stability measure method is proposed to provide a less conservative contingency analysis which covers 5-min wind fluctuations and a successive fault. This probabilistic approach would estimate the transfer limit of a critical line for a given fault with stochastic wind generation and active control devices in a multi-machine system. This approach achieves a lower computation cost and improved accuracy using a new stability measure and polynomial interpolation, and is feasible for online contingency analysis.
Resumo:
The apparent contradiction between the exact nature of the interaction parameter formalism as presented by Lupis and Elliott and the inconsistencies discussed recently by Pelton and Bale arise from the truncation of the Maclaurin series in the latter treatment. The truncation removes the exactness of the expression for the logarithm of the activity coefficient of a solute in a multi-component system. The integrals are therefore path dependent. Formulae for integration along paths of constant Xi,or X i/Xj are presented. The expression for In γsolvent given by Pelton and Bale is valid only in the limit that the mole fraction of solvent tends to one. The truncation also destroys the general relations between interaction parameters derived by Lupis and Elliott. For each specific choice of parameters special relationships are obtained between interaction parameters.
Resumo:
Stochastic behavior of an aero-engine failure/repair process has been analyzed from a Bayesian perspective. Number of failures/repairs in the component-sockets of this multi-component system are assumed to follow independent renewal processes with Weibull inter-arrival times. Based on the field failure/repair data of a large number of such engines and independent Gamma priors on the scale parameters and log-concave priors on the shape parameters, an exact method of sampling from the resulting posterior distributions of the parameters has been proposed. These generated parameter values are next utilised in obtaining the posteriors of the expected number of system repairs, system failure rate, and the conditional intensity function, which are computed using a recursive formula.
Resumo:
In this paper, we consider the problem of selecting, for any given positive integer k, the top-k nodes in a social network, based on a certain measure appropriate for the social network. This problem is relevant in many settings such as analysis of co-authorship networks, diffusion of information, viral marketing, etc. However, in most situations, this problem turns out to be NP-hard. The existing approaches for solving this problem are based on approximation algorithms and assume that the objective function is sub-modular. In this paper, we propose a novel and intuitive algorithm based on the Shapley value, for efficiently computing an approximate solution to this problem. Our proposed algorithm does not use the sub-modularity of the underlying objective function and hence it is a general approach. We demonstrate the efficacy of the algorithm using a co-authorship data set from e-print arXiv (www.arxiv.org), having 8361 authors.
Resumo:
In this paper, we investigate the use of reinforcement learning (RL) techniques to the problem of determining dynamic prices in an electronic retail market. As representative models, we consider a single seller market and a two seller market, and formulate the dynamic pricing problem in a setting that easily generalizes to markets with more than two sellers. We first formulate the single seller dynamic pricing problem in the RL framework and solve the problem using the Q-learning algorithm through simulation. Next we model the two seller dynamic pricing problem as a Markovian game and formulate the problem in the RL framework. We solve this problem using actor-critic algorithms through simulation. We believe our approach to solving these problems is a promising way of setting dynamic prices in multi-agent environments. We illustrate the methodology with two illustrative examples of typical retail markets.