Agent-based en-route diversion: Dynamic behavioral responses and network performance represented by Macroscopic Fundamental Diagrams

2016 ◽  
Vol 64 ◽  
pp. 148-163 ◽  
Author(s):  
Chenfeng Xiong ◽  
Xiqun Chen ◽  
Xiang He ◽  
Xi Lin ◽  
Lei Zhang
Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2992
Author(s):  
Niharika Singh ◽  
Irraivan Elamvazuthi ◽  
Perumal Nallagownden ◽  
Gobbi Ramasamy ◽  
Ajay Jangra

Microgrids help to achieve power balance and energy allocation optimality for the defined load networks. One of the major challenges associated with microgrids is the design and implementation of a suitable communication-control architecture that can coordinate actions with system operating conditions. In this paper, the focus is to enhance the intelligence of microgrid networks using a multi-agent system while validation is carried out using network performance metrics i.e., delay, throughput, jitter, and queuing. Network performance is analyzed for the small, medium and large scale microgrid using Institute of Electrical and Electronics Engineers (IEEE) test systems. In this paper, multi-agent-based Bellman routing (MABR) is proposed where the Bellman–Ford algorithm serves the system operating conditions to command the actions of multiple agents installed over the overlay microgrid network. The proposed agent-based routing focuses on calculating the shortest path to a given destination to improve network quality and communication reliability. The algorithm is defined for the distributed nature of the microgrid for an ideal communication network and for two cases of fault injected to the network. From this model, up to 35%–43.3% improvement was achieved in the network delay performance based on the Constant Bit Rate (CBR) traffic model for microgrids.


2016 ◽  
Vol 19 (01n02) ◽  
pp. 1650004 ◽  
Author(s):  
MARIO V. TOMASELLO ◽  
CLAUDIO J. TESSONE ◽  
FRANK SCHWEITZER

This paper investigates the process of knowledge exchange in inter-firm Research and Development (R&D) alliances by means of an agent-based model. Extant research has pointed out that firms select alliance partners considering both network-related and network-unrelated features (e.g., social capital versus complementary knowledge stocks). In our agent-based model, firms are located in a metric knowledge space. The interaction rules incorporate an exploration phase and a knowledge transfer phase, during which firms search for a new partner and then evaluate whether they can establish an alliance to exchange their knowledge stocks. The model parameters determining the overall system properties are the rate at which alliances form and dissolve and the agents’ interaction radius. Next, we define a novel indicator of performance, based on the distance traveled by the firms in the knowledge space. Remarkably, we find that — depending on the alliance formation rate and the interaction radius — firms tend to cluster around one or more attractors in the knowledge space, whose position is an emergent property of the system. And, more importantly, we find that there exists an inverted U-shaped dependence of the network performance on both model parameters.


Author(s):  
C. Valliyammai ◽  
S. Thamarai Selvi ◽  
R. Satheesh Kumar ◽  
E. Pradeep ◽  
K. Naveen

Author(s):  
Lokesh B. Bhajantri ◽  
Vasudha V. Ayyannavar

In the recent past, some research works are focused on the design and management of ubiquitous networks (UNs) in terms of performance metrics like routing, computation overhead, latency, and security. Nowadays, data synchronization is one of the most challenging tasks in UNs to ensure the data consistency between the nodes or devices and servers. In this work, the authors present an overview of the UNs, including issues and challenges, cognitive agents, synchronization algorithms, and proposed data synchronization model using cognitive agents. This review article classifies some of the data synchronization algorithms into four categories named: synchronization based on the message digest; timestamp based synchronization; synchronization based on scalability performance; and delta synchronization with their relative performance. This article also compares synchronization algorithms against data synchronization in terms of accuracy, efficiency, scalability, consistency, and control overheads. The authors provide the model of cognitive agent-based data synchronization in UNs, which ensures the network performance in terms of reliability, energy efficient, accuracy, scalable, fault tolerant, and QoS based data synchronization algorithms using cognitive agents.


2019 ◽  
Vol 16 (12) ◽  
pp. 5047-5054
Author(s):  
Sumiti ◽  
Sumit Mittal

The internal participating nodes in mobile network can be affects fully or partially by selfish nature to improve its own communication rate. This nature can degrade the forwarding rate and affects the overall performance of the network. The detection of such selfish nodes is required to improve the communication throughput and network performance. In this paper, an Agent based analysis approach is defined to detect the selfish node in the network. The fuzzy based zonal analysis method is suggested to perform the zonal evaluation on the mobile network. The distributed Agents performed the analysis on the fuzzy based communication parameters. The parameter specific evaluation method is able to separate the good and selfish nodes. Once the selfish nodes are identified, the preventive route formation is done for safe communication. In this paper, the Agent adaptive model is presented for detection and prevention of selfish nodes. The proposed Agent adaptive model is simulated in NS2 environment. The comparative results are generated against token based, agent based and watchdog methods. The analysis results show that the proposed protocol has achieve the 17% improvement in packet communication, 37% reduction in communication loss and 53ms reduction in packet delay.


2021 ◽  
Vol 23 (05) ◽  
pp. 526-544
Author(s):  
Ashwini V. Jatti ◽  
◽  
Dr V. J. K. Kishor Sonti ◽  

This study presents sinkhole attack detection and prevention using agent-based algorithm. In this algorithm, agents are used to provide information to all node from its reliable neighbors by negotiation in three steps, thus nodes may not be able to pay the attention to the traffic made by sinkhole attacker. In this work, network scale of 500×500 m2 square areas have been considered. Series of simulation are carried in each experiment. Every simulation run is being organized to work for 10mins. Network performance is evaluated in terms of throughput, packet delivery ratio, jitter, delay in packets delivery, data packets received, data packets drop using network simulations software. Network simulation results depicts that in proposed algorithm, throughput increases by 15 to 20 percent, packet delivery ratio increases by 30 to 40%, decrease in the jitter by 10 to 15 %, delay in packets delivery is decreased by 15 to 20 %, data packets received are increased by 15 to 20 % and number of the data packets drop are decreased by 5 to 15 %. Based on simulation results throughput, packet delivery ratio and data packets received increased in proposed agent-based algorithm. However, it is observed that, jitter, delay in packets delivery and data packets drop were decreased.


Author(s):  
Maryam Faraji

Unmanned aerial systems (UASs) create an extensive fighting capability of the developed military forces. Particularly, these systems carrying confidential data are exposed to security attacks. By the wireless’s nature within these networks, they become susceptible to different kinds of attacks, hence, it seems essential to design the appropriate safety mechanism in such networks. The sinkhole attack is one of the most dangerous and threatening attacks amongst types of attack in UAS. A malicious UAV exists in such a threat attacking as a black hole for absorbing all traffic in the network. Mainly, in a Flow-based protocol, the attacker considers the requests on the route, then, it replies to the target UAV such as high quality or the best route towards Gard station. The malicious UAV is able to only insert itself on one occasion between the nodes relating to each other (such as sink node and sensor node), and act for passing packets among them. In this study, the malicious attacks are detected and purged using two stages were. In the first stage, some principles and rules are used to detect black hole, gray hole, and sinkhole attacks. In the second stage, using a smart agent-based strategy negotiation procedure for three steps, a defense mechanism is designed to prevent these attacks. The smart agent is used by reliable neighbors via the negotiation procedure for three steps, hence, the traffic formed by the malicious UAV is not considered. The suggested protocol is called SAUAS. Here, the technique is assessed through extensive simulations performed in the NS-3 environment. Based on the simulation outcomes, it is indicated that the UAS network performance metrics are enhanced based on the packet delivery rate, detection rate, false-negative rate and false-positive rate.


2017 ◽  
Vol 30 (2) ◽  
pp. 226-243 ◽  
Author(s):  
Meditya Wasesa ◽  
Andries Stam ◽  
Eric van Heck

Purpose From the theoretical perspectives of both multi-agent systems and smart business networks, empirical studies analyzing agent-based inter-organizational systems (ABIOS) in a real-life business setting are rare. The purpose of this paper is to investigate the impact of ABIOS on the performance of business networks. Design/methodology/approach This study presents a theoretical conceptual model portraying the influence of ABIOS on clients’ coordination structure and information architecture; and the impact of those structural alterations on business network performance in terms of the coordination, agility, and informational performances. To validate the model, a cross-case analysis was conducted in three logistics cases, namely, warehousing, freight forwarding, and intermodal transportation. Findings The application of ABIOS requires adjustments to the information architecture or the coordination structure, or both. Subsequently, those structural adjustments will stimulate improvements in the coordination, agility, and informational performances. Research limitations/implications The assessment of the clients’ performance improvement is done at the company level not at an aggregate network level. Moreover, the study only covers cases from the logistics sector. Practical implications This study explains the structural consequences of ABIOS applications. The adoption of an inter-organizational system is a strategic decision that requires support from multi-stakeholders. While the applications of ABIOS can offer performance improvement opportunities, adjustments must be made to the existing coordination structure or the information architecture, or both. Originality/value This study contributes to the smart business network literature and the ABIOS literature by presenting a validated conceptual model explaining the interplay among ABIOS, the coordination structure, informational structure, and business network performance, namely, the coordination, agility, and informational performances.


2020 ◽  
Author(s):  
Leonardo Lopez ◽  
Maximiliano Fernandez ◽  
Leonardo Giovanini

It's well known the existence of an interplay between the spread of an infectious disease like influenza and behavioral changes of individuals. An outbreak can trigger behavioral responses, at the group and individual levels, which in turn can influence the course of the epidemic. Daily life interactions can be modeled by adaptive temporal networks in an explicit contact space through an agent-based model, where each agent represents the interacting individuals. In this paper we introduce an individual-based model where the behavior of each individual is determined both by the external stimuli and its own appreciation of the environment and can be built as a combination of three interacting blocks: i) individual behavior, ii) social behavior and iii) epidemic state or epidemiological behavior. We fit the model for a real influenza epidemic and perform the model validation, comparing the results with the classical approaches.


2004 ◽  
Vol 23 (2) ◽  
pp. 111-122 ◽  
Author(s):  
Desmond Ng

Inherent to the dynamics of social networks is a paradoxical trade-off between closed networks that promote cooperation and efficiency and diverse networks that are flexible to new resources and ideas. Since actors cannot simultaneously maximize both facets of a network, this has created a sharp debate on the social capital performance of closed and diverse network relationships. Research on this social capital debate has often focused on these described network affects without explaining the origins and dynamics of network performance. This paper advances a cognitive diversity approach that is based upon the subjective and alert behaviors of Austrian entrepreneurs. These are key causal drivers to this paper's theoretical model of social dynamics and performance of closed and diverse networks. Such network behavior is subsequently modeled as a Complex Adaptive system. Using agent-based simulation, an agent-based model of entrepreneurship and social network dynamics is constructed to test the relationships described by the proposed theoretical model. The simulation results support the described hypothesized relationships. These findings also suggest the benefits of closed and diverse networks are logically distinct and, thus, should not be viewed as an either-or phenomenon. Agent-based simulation results show entrepreneurs can construct a balanced network of closed and diverse networks to optimize the benefits of both networks.


Sign in / Sign up

Export Citation Format

Share Document