A novel self-organizing multi agent-based approach for multimedia documents adaptation

Author(s):  
Asma Saighi ◽  
Zakaria Laboudi
Author(s):  
James Humann ◽  
Yan Jin

In this paper, a genetic algorithm (GA) is used to discover interaction rules for a cellular self-organizing (CSO) system. The CSO system is a group of autonomous, independent agents that perform tasks through self-organization without any central controller. The agents have a local neighborhood of sensing and react only to other agents within this neighborhood. Their interaction rules are a simple set of direction vectors based on a flocking model. The five local interaction rules are assigned relative weights, and the agents self-organize to display some emergent behavior at the system level. The engineering challenge is to identify which sets of local rules will cause certain desired global behaviors. The global required behaviors of the system, such as flocking or exploration, are translated into a fitness function that can be evaluated at the end of a multi-agent based simulation run. The GA works by tuning the relative weights of the local interaction rules so that the desired global behavior emerges, judged by the fitness function. The GA approach is shown to be successful in tuning the weights of these interaction rules on simulated CSO systems, and, in some cases, the GA actually evolved qualitatively different local interaction “strategies” that displayed equivalent emergent capabilities.


2013 ◽  
Vol 133 (9) ◽  
pp. 1652-1657 ◽  
Author(s):  
Takeshi Nagata ◽  
Kosuke Kato ◽  
Masahiro Utatani ◽  
Yuji Ueda ◽  
Kazuya Okamoto ◽  
...  

2020 ◽  
Vol 8 (1) ◽  
pp. 33-41
Author(s):  
Dr. S. Sarika ◽  

Phishing is a malicious and deliberate act of sending counterfeit messages or mimicking a webpage. The goal is either to steal sensitive credentials like login information and credit card details or to install malware on a victim’s machine. Browser-based cyber threats have become one of the biggest concerns in networked architectures. The most prolific form of browser attack is tabnabbing which happens in inactive browser tabs. In a tabnabbing attack, a fake page disguises itself as a genuine page to steal data. This paper presents a multi agent based tabnabbing detection technique. The method detects heuristic changes in a webpage when a tabnabbing attack happens and give a warning to the user. Experimental results show that the method performs better when compared with state of the art tabnabbing detection techniques.


Sign in / Sign up

Export Citation Format

Share Document