• Title/Summary/Keyword: agent model

Search Result 1,682, Processing Time 0.026 seconds

Modeling and Simulation for Anti-submarine HVU Escort Mission (대 잠수함 HVU 호위 임무 분석 모델링 및 시뮬레이션)

  • Park, Kang-Moon;Lee, Eun-Bog;Shin, Suk-Hoon;Han, Seungjin;Chi, Sung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.4
    • /
    • pp.75-83
    • /
    • 2014
  • Most warship combat systems inquire human operator to control several sensor and another equipments as well as decision-modeling. For this reason, many researches with multi-agent based M&S (Modeling and Simulation) have been increasingly conducted. However there cannot find any researches of M&S based analysis for anti-submarine warfare that requires a high level of mission complexity between multiple platforms. In this research, we have been developed various combat platform models such as warship, submarine and helicopter, etc. In order to apply the multi-agent-based M&S technology to the anti-submarine warfare i.e. a HVU (High Value Unit) escort mission scenario. Then we have successfully analyzed the measures of effectiveness according to the different tactics and different situations. In future, the defence engineer maybe employ our methodology and tools to analyze actual tactical problem by simply inserting actual data into our agent model.

A Multi-agent System for Web-based Course Scheduling (웹 기반 코스 스케쥴링을 위한 멀티 에이전트 시스템)

  • 양선옥;이종희
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1046-1053
    • /
    • 2003
  • Recently various new model of teaching-learning as web based education system has been proposed. The demand for the customized courseware which is required from the learners is increased, the needs of the efficient and automated education agents in the web-based instruction are recognized. But many education systems that had been studied recently did not service fluently the courses which learners had been wanting and could not provide the way for the learners to study the teaming weakness which is observed in the continuous feedback of the course. In this paper we propose a multi-agent system for course scheduling of learner-oriented using weakness analysis algorithm. First proposed system analyze learner's result of evaluation and calculates teaming accomplishment. From this accomplishment the multi-agent schedules the suitable course for the learner The learner achieves an active and complete learning from the repeated and suitable course.

  • PDF

A Study on the Causes of Information Privacy Concerns and Protective Responses in e-Commerce: Focusing on the Principal-Agent Theory (전자상거래에서 정보 프라이버시 염려를 유발하는 원인과 보호반응에 관한 연구: 주인-대리인 이론을 중심으로)

  • Kim, Jongki;Kim, Jinsung
    • The Journal of Information Systems
    • /
    • v.23 no.4
    • /
    • pp.119-145
    • /
    • 2014
  • Under the premise that information privacy concerns can atrophy e-commerce by causing particular behaviors of Internet users, this study focused on exploring the causes of information privacy concerns, the related information privacy protective responses of Internet users, and measures for alleviating the information privacy concerns. This study is based on the 'principal-agent theory,' and established the following as factors that cause information privacy concerns of Internet users: perceived information non-transparency; perceived action uncertainty. Also, the information privacy concerns caused by the factors were established as the cause of information privacy protective responses of Internet users. Also, the concept of 'signaling' and 'incentive,' which were presented to solve the adverse selection and moral hazard issue in the host-agent theory, was introduced to establish the following as factors that alleviate information privacy concerns: trust; informativeness. Those factors were included in the research model to conduct an empirical analysis. The analysis has revealed that both the perceived information non-transparency (p<0.01) and perceived action uncertainty (p<0.01) as to websites had a significant impact on information privacy concerns. Also, information privacy concerns of Internet users (p<0.01) had a significant impact on their information privacy protective responses who strive to protect their personal information. In addition, when trust and informativeness, which were established as factors that can alleviate information privacy concerns, were empirically analyzed, trust and informativeness had the effect of alleviating information privacy concerns. Based on the findings, the following was confirmed: Boosting the trust of Internet users in websites and offering useful information related to personal data can play a key role in alleviating the information privacy concerns of Internet users.

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Improvement of Service Location Discovery and Download Protocol in Wide Area Network (광역망에서의 서비스 위치 탐색 및 다운로드 프로토콜의 개선)

  • Huh, Duck-Haing;Kim, Han-Kyoung
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.55-62
    • /
    • 2011
  • To make service location protocol of IETF which is to be used in the wide area network to discover the location of desired service when computing resources are connected to the network, and to support simless connectivity between wired and wireless network in service viewpoint, to support the diversity trend of service agents in WIF, it needs to improve SLP, so as to add Liaison Agent and Forwarding Agent with FAAdvert message that is to communicate in between those entities. LA entity confirms the location of service located in wide area network, and FA transfers service information. The usage of existing messages such as SrvRqst, SrvRply, AttrRqst, AttrRply, DAAdvert, SrvReg, SrvAck, SrvDeReg is same as ever in wide area service network. The behaviors of improved protocol is modeled into petri-net and prove that it is free of deadlock and live-lock by execution of the model.

A Course Scheduling Multi-Agent System For Ubiquitous Web Learning Environment (유비쿼터스 웹 학습 환경을 위한 코스 스케줄링 멀티 에이전트 시스템)

  • Han, Seung-Hyun;Ryu, Dong-Yeop;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.365-373
    • /
    • 2005
  • Ubiquitous learning environment needs various new model of e-learning as web based education system has been proposed. The demand for the customized courseware which is required from the learners is increased. the needs of the efficient and automated education agents in the web-based instruction are recognized. But many education systems that had been studied recently did not service fluently the courses which learners had been wanting and could not provide the way for the learners to study the learning weakness which is observed in the continuous feedback of the course. In this paper we propose a multi-agent system for course scheduling of learner-oriented using weakness analysis algorithm via personalized ubiquitous environment factors. First proposed system analyze learner's result of evaluation and calculates learning accomplishment. From this accomplishment the multi-agent schedules the suitable course for the learner. The learner achieves an active and complete learning from the repeated and suitable course.

  • PDF

Performance Modeling of Resource Reservation Cost in Wireless/Mobile Networks (무선 이동 망 환경에서 자원 예약 비용 성능 모델링)

  • Won, Jeong-Jae;Lee, Hyong-Woo;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4C
    • /
    • pp.433-441
    • /
    • 2003
  • We propose a new resource reservation scheme called MC-HMRSVP(Mobile clustering based-Hierarchical mobile ReSource reserVation Protcol) that is an extension of HMRSVP[3,4]. MC-HMRSVP always establishes a virtual cluster called Mobile Cluster, which includes its immediately adjacent MA(Mobile Agent) for passive reservation as well as the current MA for active reservation to which MH(Mobile Host) belongs. Our scheme also establishes the MC regardless of intra/inter region movement by GMA(Gateway Mobile Agent) function when a MH moves. To provide a general formulation on analyzing the performance in terms of reservation cost, we also model the resource reservation cost by using a simple recursive equation. Then, we show that our scheme decreases the reservation cost in comparison with the existing HMRSVP extentions.

Persulfate Oxidation of 2,4-D: Effect of Hydroxylamine and Chelating Agent (과황산을 이용한 2,4-D의 산화: 하이드록실아민, 킬레이트제의 영향)

  • Choi, Jiyeon;Yoon, Na Kyeong;Shin, Won Sik
    • Journal of Soil and Groundwater Environment
    • /
    • v.26 no.1
    • /
    • pp.54-64
    • /
    • 2021
  • The chemical warfare agents (CWAs) have been developed for offensive or defensive purposes and used as chemical weapons in war and terrorism. The CWAs are exposed to the natural environment, transported through the water system and then eventually contaminate soil and groundwater. Therefore, effective decontamination technology to remediate CWAs are needed. The CWAs are extremely dangerous and prodution is strictly prohibited, therefore, it is difficult to use CWAs even in experimental purpose. In this study, 2,4-dichlorophenoxyacetic acid (2,4-D) was chosen as a model representative CWA because it is a simulant of anti-plant CWAs and one of the major component of agent orange. The optimum degradation conditions such as oxidant:activator ratio were determined. The effects of hydroxylamine and chelating agents such as citric acid (CA), oxalic acid (OA), malic acid (MA), and EDTA addition to increase Fe2+ activation were also investigated. Scavenger experiments using tert-butyl alcohol (TBA) and ethanol confirmed that although both sulfate (SO4•-) and hydroxyl radical (•OH) existed in Fe2+-persulfate system, sulfate radical was the predominant radical. To promote the Fe2+ activator effect, the effect of hydroxylamine as a reducing agent was investigated. In chelating agents assisted Fe2+-persulfate oxidation, the addition of 2 mM of CA and MA enhanced 2,4-D degradation. In contrast, EDTA and OA inhibited the 2,4-D removal due to steric hindrance effect.

A Real-time Monitoring Agent Design for Digital Twin-based Smart Pipe Integrated Management System (디지털 트윈 기반 스마트 파이프 통합 관리 시스템을 위한 실시간 모니터링 에이전트 설계)

  • Hong, Phil-Doo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.292-294
    • /
    • 2021
  • The digital twin-based smart pipe integrated management system is an integrated solution for efficient operation and monitoring that we propose. We buried a waterway pipe underground with self-diagnostic and condition monitoring sensor functions. This pipe sends sensing data and accumulates it. Our system analyzes data to make smart decisions. The main functions of this system are remote control and monitoring. Therefore, "how to configure monitoring in real time" is a big issue. For this purpose, we designed a special real-time-based agent function. In this paper, to solve this problem, a layered architecture was proposed based on transmission points where sensor data are exchanged. An agent was placed in each layer to look at the lower layer and periodically monitor whether there were any changes in the sensor in real time. Finally, the agent system was designed and the conceptual model level was implemented to verify excellence.

  • PDF

An Extended Negotiation Agent Using Multi-Issues under Time-Constraint Environment (시간제약 환경에서 다중 속성을 이용한 확장된 협상 에이전트)

  • 김현식;양성봉
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1208-1219
    • /
    • 2003
  • The Internet has become a part of our life and has changed our living environments dramatically. However, Electronic Commerce (EC) stays currently at a level that a buyer deals only with an one-sided condition (price) proposed by a seller or compares the proposed condition to find a better one. As the agent technology makes progress, EC requires negotiation that is not one-sided but is a way to maximize profits of both seller and buyer. Moreover, negotiation in EC should consider multiple issues rather than a single issue to replace the traditional commerce. In this paper we propose a negotiation model, which guarantees balanced profits between two agents through negotiation using multi-issues, and makes a deal successfully under time-constraint environment. The proposed negotiation model suggests strategies(alternative and simultaneous strategy) that change the value of issues with each agent has time for negotiation. In this paper, we also suggest a strategy that proposes an offer to each other. We compare the proposed negotiation model with another negotiation model. The experimental results show that dynamic conceder tactic and linear tactic showed balanced profits and a high percentage of deals for negotiation between two agents, and the sum of utilities of two agents is high, when the alternative strategy is used.