A decentralized management system based on multi-agent model

Author(s):  
V.V. Emelyanov
2011 ◽  
Vol 291-294 ◽  
pp. 3233-3238
Author(s):  
Hong Tao Tang ◽  
Jian Xin Zhou ◽  
Jian Song

By analyzing the characteristics of foundry enterprises and the features of multi-agent theory, this paper applies this theory in the management of foundry enterprise. A multi-agent model and a detailed multi-agent model of inventory management are constructed in this study. The KQML is adpoted to meet the requirements of communication between agents. This study set up KQML messages about data manipulation and then map these KQML messages to SQL clause. Based on this model, an inventory management system of ERP for foundry enterprise is developed. The successful application of this system proves that it is applicable to use the multi-agent theory to enhance the management of foundry enterprises.


2010 ◽  
Vol 4 (4) ◽  
pp. 1-10
Author(s):  
Hajer Ben Mahmoud ◽  
Raouf Ketata ◽  
Taieb Ben Romdhane ◽  
Samir Ben Ahmed

2009 ◽  
Vol 29 (2) ◽  
pp. 412-415
Author(s):  
Qiang LU ◽  
Ming CHEN ◽  
Zhi-guang WANG

Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4873
Author(s):  
Biao Xu ◽  
Minyan Lu ◽  
Hong Zhang ◽  
Cong Pan

A wireless sensor network (WSN) is a group of sensors connected with a wireless communications infrastructure designed to monitor and send collected data to the primary server. The WSN is the cornerstone of the Internet of Things (IoT) and Industry 4.0. Robustness is an essential characteristic of WSN that enables reliable functionalities to end customers. However, existing approaches primarily focus on component reliability and malware propagation, while the robustness and security of cascading failures between the physical domain and the information domain are usually ignored. This paper proposes a cross-domain agent-based model to analyze the connectivity robustness of a system in the malware propagation process. The agent characteristics and transition rules are also described in detail. To verify the practicality of the model, three scenarios based on different network topologies are proposed. Finally, the robustness of the scenarios and the topologies are discussed.


Sign in / Sign up

Export Citation Format

Share Document