Multiagent coordination and cooperation in a distributed dynamic environment with limited resources

1995 ◽  
Vol 9 (3) ◽  
pp. 229-238 ◽  
Author(s):  
Nicholas V. Findler ◽  
Gregory D. Elder
Author(s):  
Mohamed Elhoseny ◽  
Ahmed Farouk ◽  
Josep Batle ◽  
Abdulaziz Shehab ◽  
Aboul Ella Hassanien

WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure image processing schemas designed for image transmission over a network, the limited resources and the dynamic environment make it invisible to be used with Wireless Sensor Networks (WSNs). In addition, the current secure data transmission schemas in WSN are concentrated on the text data and are not applicable for image transmission's applications. Furthermore, secure image transmission is a big challenging issue in WSNs especially for the application that uses image as its main data such as military applications. The reason why is because the limited resources of the sensor nodes which are usually deployed in unattended environments. This chapter introduces a secure image processing and transmission schema in WSN using Elliptic Curve Cryptography (ECC) and Homomorphic Encryption (HE).


2013 ◽  
Vol 336-338 ◽  
pp. 1792-1797
Author(s):  
Zheng Mao Li ◽  
Jun Wang ◽  
Di Zheng

To shield heterogeneous and distribution of system and improve the efficiency of development, middleware technology has been successfully applied to the traditional distributed system. But in the wireless sensor network environment, traditional middleware technology is facing enormous challenges such as dynamic environment, network asymmetry, frequent disconnection, limited resources, and wide diversity of context. Therefore, it is important to design the universal middleware for massively heterogeneous wireless sensors. It can improve the system performance and efficiency and provide effective extension and expansion for traditional middleware. In this paper, we introduce the system structure of the universal wireless middleware platform, which is divided into infrastructure middleware and application service middleware. Meanwhile the key technologies of the middleware platform for wireless computing environment are analyzed.


2011 ◽  
Vol 2011 ◽  
pp. 1-11 ◽  
Author(s):  
Moeiz Miraoui ◽  
Chakib Tadj ◽  
Jaouhar Fattahi ◽  
Chokri Ben Amar

A pervasive computing system (PCS) requires that devices be context aware in order to provide proactively adapted services according to the current context. Because of the highly dynamic environment of a PCS, the service adaptation task must be performed during device operation. Most of the proposed approaches do not deal with the problem in depth, because they are either not really context aware or the problem itself is not thought to be dynamic. Devices in a PCS are generally hand-held, that is, they have limited resources, and so, in the effort to make them more reliable, the service adaptation must take into account this constraint. In this paper, we propose a dynamic service adaptation approach for a device operating in a PCS that is both context aware and limited resources aware. The approach is then modeled using colored Petri Nets and simulated using the CPN Tools, an important step toward its validation.


2020 ◽  
Vol 3 (45) ◽  
pp. 126-132
Author(s):  
K. Y. Zalutska ◽  

In the conditions of neotechnological reproduction, when success is achieved by those enterprises that promptly respond to the growing number of consumers’ specific needs, and the enterprise’s limited resources do not always let it completely satisfy the emerging needs due to the difficulties in taking stock of and accept certain neoproducts, the issue of the rational resource allocation for executing business processes at an enterprise in such a way as to achieve the appropriate effect that will contribute to the successful strategic development of enterprises in a dynamic environment is highly topical. Rational resource allocation is possible on condition that the practicability of using a particular type of resource, taken from an appropriate source, for this or that business process has been properly assessed. The purpose of the article is to develop a methodological approach to shaping resource allocation for business processes at an enterprise, the basis for which is made by identifying their integration adaptability. The article suggests and substantiates the components of the abovementioned methodological approach. The necessity to determine the integration adaptability level of business processes is substantiated; the content, structure and peculiarities of using the “integration adaptability” concept are laid out. The order of resource allocation for business processes at an enterprise in the context of various resource types is specified. Using the integration adaptability level of business processes among themselves has proved to be practical if taken as the basis for appropriate and efficient resource allocation, helping to implement current and strategically promising business processes necessary for beneficial development of an enterprise in the conditions of neotechnological reproduction.


2020 ◽  
Vol 1 (1) ◽  
pp. 70-94
Author(s):  
Niki Pavlopoulou

Nowadays, there is a lot of attention drawn in smart environments, like Smart Cities and Internet of Things. These environments generate data streams that could be represented as graphs, which can be analysed in real-time to satisfy user or application needs. The challenges involved in these environments, ranging from the dynamism, heterogeneity, continuity, and high-volume of these real-world graph streams create new requirements for graph processing algorithms. We propose a dynamic graph stream summarisation system with the use of embeddings that provides expressive graphs while ensuring high usability and limited resource usage. In this paper, we examine the performance comparison between our embeddings-based approach and an existing thesaurus/ontology-based approach (FACES) that we adapted in a dynamic environment with the use of windows and data fusion. Both approaches use conceptual clustering and top-k scoring that can result in expressive, dynamic graph summaries with limited resources. Evaluations show that sending top-k fused diverse summaries, results in 34% to 92% reduction of forwarded messages and redundancy-awareness with an F-score ranging from 0.80 to 0.95 depending on the k compared to sending all the available information without top-k scoring. Also, the summaries' quality follows the agreement of ideal summaries determined by human judges. The summarisation approaches come with the expense of reduced system performance. The thesaurus/ontology-based approach proved 6 times more latency-heavy and 3 times more memory-heavy compared to the most expensive embeddings-based approach while having lower throughput but provided slightly better quality summaries.


Author(s):  
Hongyao Tang ◽  
Jianye Hao ◽  
Li Wang ◽  
Tim Baarslag ◽  
Zan Wang

Multiagent coordination in cooperative multiagent systems (MASs) has been widely studied in both fixed-agent repeated interaction setting and static social learning framework. However, two aspects of dynamics in real-world MASs are currently missing. First, the network topologies can dynamically change during the course of interaction. Second, the interaction utilities between each pair of agents may not be identical and not known as a prior. Both issues mentioned above increase the difficulty of coordination. In this paper, we consider the multiagent social learning in a dynamic environment in which agents can alter their connections and interact with randomly chosen neighbors with unknown utilities beforehand. We propose an optimal rewiring strategy to select most beneficial peers to maximize the accumulated payoffs in long-run interactions. We empirically demonstrate the effects of our approach in large-scale MASs.


2005 ◽  
Vol Volume 3, Special Issue... ◽  
Author(s):  
Habiba Belleili ◽  
Maroua Bouzid ◽  
Mokhtar Sellami

International audience This paper is concerned with the negotiation problem between agents with limited resources and under time constraints in dynamic environment. The society of agents has the same goal which is to respond with best delays at client requests. Each agent has a local technique for improving “progressively” the quality of the request. Agents must begin a negotiation cycle for coalition formation which maximizes the utility of the response to the new request. The goal is to minimize the number of exchanged messages between agents for a coalition formation in order to minimize the negotiation time. Ce papier aborde le problème de la négociation entre des agents munis de ressources limitées et sous contraintes temporelles dans un environnement dynamique. La société d’agents consiste en des agents ayant le même but qui est de répondre dans les meilleurs délais aux requêtes de clients. Les agents sont dotés chacun d’une seule technique locale pour améliorer « progressivement » la qualité de la requête. Les agents doivent entrer en négociation pour former une coalition qui maximise l’utilité de la réponse de la nouvelle requête. Le but est de minimiser le nombre de messages échangés entre les agents pour former une coalition afin de réduire au minimun le temps de négociation.


2020 ◽  
pp. 698-715
Author(s):  
Mohamed Elhoseny ◽  
Ahmed Farouk ◽  
Josep Batle ◽  
Abdulaziz Shehab ◽  
Aboul Ella Hassanien

WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure image processing schemas designed for image transmission over a network, the limited resources and the dynamic environment make it invisible to be used with Wireless Sensor Networks (WSNs). In addition, the current secure data transmission schemas in WSN are concentrated on the text data and are not applicable for image transmission's applications. Furthermore, secure image transmission is a big challenging issue in WSNs especially for the application that uses image as its main data such as military applications. The reason why is because the limited resources of the sensor nodes which are usually deployed in unattended environments. This chapter introduces a secure image processing and transmission schema in WSN using Elliptic Curve Cryptography (ECC) and Homomorphic Encryption (HE).


Author(s):  
Elena Dukhovny ◽  
E. Betsy Kelly

According to the 2010 U.S. Census, over 20% of Americans speak a language other than English in the home, with Spanish, Chinese, and French being the languages most commonly spoken, aside from English. However, few augmentative and alternative communication (AAC) systems offer multilingual support for individuals with limited functional speech. There has been much discussion in the AAC community about best practices in AAC system design and intervention strategies, but limited resources exist to help us provide robust, flexible systems for users who speak languages other than English. We must provide services that take into consideration the unique needs of culturally and linguistically diverse users of AAC and help them reach their full communication potential. This article outlines basic guidelines for best practices in AAC design and selection, and presents practical applications of these best practices to multilingual/multicultural clients.


Author(s):  
Harald Klingemann ◽  
Justyna Klingemann

Abstract. Introduction: While alcohol treatment predominantly focuses on abstinence, drug treatment objectives include a variety of outcomes related to consumption and quality of life. Consequently harm reduction programs tackling psychoactive substances are well documented and accepted by practitioners, whereas harm reduction programs tackling alcohol are under-researched and met with resistance. Method: The paper is mainly based on key-person interviews with eight program providers conducted in Switzerland in 2009 and up-dated in 2015, and the analysis of reports and mission statements to establish an inventory and description of drinking under control programs (DUCPs). A recent twin program in Amsterdam and Essen was included to exemplify conditions impeding their implementation. Firstly, a typology based on the type of alcohol management, the provided support and admission criteria is developed, complemented by a detailed description of their functioning in practice. Secondly, the case studies are analyzed in terms of factors promoting and impeding the implementation of DUCPs and efforts of legitimize them and assess their success. Results: Residential and non-residential DUCPs show high diversity and pursue individualized approaches as the detailed case descriptions exemplify. Different modalities of proactively providing and including alcohol consumption are conceptualized in a wider framework of program objectives, including among others, quality of life and harm reduction. Typically DUCPs represent an effort to achieve public or institutional order. Their implementation and success are contingent upon their location, media response, type of alcohol management and the response of other substance-oriented stake holders in the treatment system. The legitimization of DUCPs is hampered by the lack of evaluation studies. DUCPs rely mostly – also because of limited resources – on rudimentary self-evaluations and attribute little importance to data collection exercises. Conclusions: Challenges for participants are underestimated and standard evaluation methodologies tend to be incompatible with the rationale and operational objectives of DUCPs. Program-sensitive multimethod approaches enabled by sufficient financing for monitoring and accompanying research is needed to improve the practice-oriented implementation of DUCPs. Barriers for these programs include assumptions that ‘alcohol-assisted’ help abandons hope for recovery and community response to DUCPs as locally unwanted institutions (‘not in my backyard’) fuelled by stigmatization.


Sign in / Sign up

Export Citation Format

Share Document