scholarly journals Decentralized Swarm Desynchronization via Inter-agent Variation for Logistical Resupply

Author(s):  
Annie Wu ◽  
Joseph Giordano ◽  
H. David Mathias ◽  
Arjun Pherwani

Decentralized computational swarms have been used to simulate the workings of insect colonies or hives, often utilizing a response threshold model which underlies agent interaction with dynamic environmental stimuli. Here, we propose a logistics resupply problem in which agents must select from multiple incoming scheduled tasks that generate competing resource demands for workers. This work diverges from previous attempts toward analyzing swarm behaviors by examining relative amounts of stress placed on a multi-agent system in conjunction with two mechanisms of response: variable threshold distribution, or duration level. Further, we demonstrate changes to the general swarm performance’s dependence on paired desynchronization type and schedule design, as the result of varied swarm conditions.

2012 ◽  
Vol 466-467 ◽  
pp. 449-453
Author(s):  
Xue Zhang ◽  
Ya Qiu Liu ◽  
Jun Peng Hua

The article aims at the problems such as the traditional contract nets model’s communication traffic is too heavy in the consultation process; task’s partition is fixed; evaluation index is not comprehensive, proposes a contract nets improvement method based on the bidding threshold and evaluation function by combining the response threshold model of the ant colony algorithm. This method introduce fuzzy synthetic computation, finding the potential cooperation relations between node agents, bottom-up decomposing the complex task, effectively reduce the negotiation time and communication flows, improve the efficiency of the system. The thesis combines wood drying application feature, and puts forward the improved model’s experimental simulation in wood drying kiln. The result shows that the improved method can effectively improve the performance of the Contract Net Protocol in large-scale multi-agent system. It provides technical basis for the realization of wood drying cluster control.


2015 ◽  
Vol 77 (13) ◽  
Author(s):  
Olumide Simeon Ogunnusi ◽  
Shukor Abd Razak ◽  
Abdul Hanan Abdullah

Mobile agent interaction is usually vulnerable to attacks from within and outside the agent’s execution environment. Also, the mobility property of mobile agents earns them the opportunity to migrate from one security domain to another. Intranet/LAN with connection to internet do, from time to time, experience agent visitation either for malicious purpose or for legitimate mission. To protect legitimate agent communication against attack by visiting agent, we propose a technique that restricts migration of the visiting agent and isolate it to a neutral host where its mission could be achieved. We refer to this technique as restriction-based access control mechanism (ResBAC). The proposed mechanism employs certificate authentication, re-defining visiting agent itinerary path and visiting agent isolation to accomplish the aforementioned objective. The performance of the proposed mechanism is evaluated using scenarios to determine the strength of the mechanism in term of its ability to protect agent communication against the three major threats: man-in-the-middle attack, replay attack, and passive eavesdropping. 


Sign in / Sign up

Export Citation Format

Share Document