• Title/Summary/Keyword: Agent based

Search Result 3,919, Processing Time 0.049 seconds

Agent Based Information Security Framework for Hybrid Cloud Computing

  • Tariq, Muhammad Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.406-434
    • /
    • 2019
  • In general, an information security approach estimates the risk, where the risk is to occur due to an unusual event, and the associated consequences for cloud organization. Information Security and Risk Management (ISRA) practices vary among cloud organizations and disciplines. There are several approaches to compare existing risk management methods for cloud organizations but their scope is limited considering stereo type criteria, rather than developing an agent based task that considers all aspects of the associated risk. It is the lack of considering all existing renowned risk management frameworks, their proper comparison, and agent techniques that motivates this research. This paper proposes Agent Based Information Security Framework for Hybrid Cloud Computing as an all-inclusive method including cloud related methods to review and compare existing different renowned methods for cloud computing risk issues and by adding new tasks from surveyed methods. The concepts of software agent and intelligent agent have been introduced that fetch/collect accurate information used in framework and to develop a decision system that facilitates the organization to take decision against threat agent on the basis of information provided by the security agents. The scope of this research primarily considers risk assessment methods that focus on assets, potential threats, vulnerabilities and their associated measures to calculate consequences. After in-depth comparison of renowned ISRA methods with ABISF, we have found that ISO/IEC 27005:2011 is the most appropriate approach among existing ISRA methods. The proposed framework was implemented using fuzzy inference system based upon fuzzy set theory, and MATLAB(R) fuzzy logic rules were used to test the framework. The fuzzy results confirm that proposed framework could be used for information security in cloud computing environment.

RBR Based Network Configuration Fault Management Algorithms using Agent Collaboration (에이전트들 간의 협력을 통한 RBR 기반의 네트워크 구성 장애 관리 알고리즘)

  • Jo, Gwang-Jong;An, Seong-Jin;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.497-504
    • /
    • 2002
  • This paper proposes fault diagnosis and correction algorithms using agent collaboration, and a management model for managing network configuration faults. This management model is composed of three processes-fault detection, fault diagnosis and fault correction. Each process, based on RBR, operates on using rules which are consisted in Rule-based Knowledge Database. Proposed algorithm selves the complex fault problem that a system could not work out by itself, using agent collaboration. And the algorithm does efficiently diagnose and correct network configuration faults in abnormal network states.

Marketing to Competitors' Customers using Agent based Modelling and Simulation Driven Strategy

  • Beyari, Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.297-304
    • /
    • 2021
  • In a duopoly situation, one firm can gain competitive advantage by attracting the price-sensitive customers from its competitor leading to higher profits through higher sale revenue for the competing company. A simulation study in which there are two electric car manufacturers with agent based modelling was conducted in order to verify this contention. The first step consisted of defining the baseline. Simulations of 1000 times and agent-based modelling were conducted with the assumption that company 1 reduced its price to the maximum of 20% thereby contributing to the switch-over of a maximum of 40% of the price sensitive customers of company 2. The results of 1000 simulations and agent-based modelling highlighted that price reduction by company 1 resulted in a significant increase in the number of customers, presumably due to switch-over from company 2 and there was a corresponding increase in revenues from both of the sales avenues. Thus, Company 1 achieved competitive advantage by marketing its cars to the customers of Company 2 using price reduction strategy to attract them. This study has ramifications for companies that aim to sway the price sensitive customers from a competitor.

Agent Based Modeling 기법을 활용한 시스템다이내믹스 모델링

  • Jeon, So-Yeon;Lee, Hye-Jun;Gwak, Sang-Man
    • Proceedings of the Korean System Dynamics Society
    • /
    • 2006.04a
    • /
    • pp.19-40
    • /
    • 2006
  • A system dynamics model is developed to investigate the applicability of the agent based modeling concept in the system dynamics model. The assumed problem is to forecast the size and structure of the organization with the developing market environment. The agent based modeling concept is applied to the organization part, and the other parts of the model such as market, facilities, etc. are developed with the traditional system dynamics technique. The simulation results show the agent based modeling part can be combined with the traditional system dynamics modeling with more precisions. However, the complexity increases and the simulation times are longer than those of the traditional method.

  • PDF

Long-Term Demand Forecasting Using Agent-Based Model : Application on Automotive Spare Parts (Agent-Based Model을 활용한 자동차 예비부품 장기수요예측)

  • Lee, Sangwook;Ha, Chunghun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.1
    • /
    • pp.110-117
    • /
    • 2015
  • Spare part management is very important to products that have large number of parts and long lifecycle such as automobile and aircraft. Supply chain must support immediate procurement for repair. However, it is not easy to handle spare parts efficiently due to huge stock keeping units. Qualified forecasting is the basis for the supply chain to achieve the goal. In this paper, we propose an agent based modeling approach that can deal with various factors simultaneously without mathematical modeling. Simulation results show that the proposed method is reasonable to describe demand generation process, and consequently, to forecast demand of spare parts in long-term perspective.

Fundamental Characteristics of Crack Control for Concrete Used in Fluosilicate Salt Based Anti-crack Agent (규불화염계 균열저감제를 이용한 콘크리트의 균열제어특성)

  • Kang Sung Woong;Yang Il Seung;Han Byung Chan;Kim Do Soo;Kil Bae Soo;Yun Hyun Do
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2004.11a
    • /
    • pp.289-292
    • /
    • 2004
  • This study was performed to know effective control of crack occurred by hydration heat, restraint of multiplication of hydration heat, through mechanical test, strength test and crack control test using fluosilicate salt based anti-crack agent made from by-product during phosphoric acid manufacturing process. Mix proportions for experiment were modulated at 0.495 of water to cement ratio and addition amount of fluosilicate salt based anti-crack agent to $1.0\%$. Condensation time was late and compressive strength of hardened concrete cured at several days was executed to evaluate characteristics of crack control for concrete. It is ascertained that characteristics of crack control for concrete could be improved by an adequate addition of fluosilicate salt based anti-crack agent.

  • PDF

DIT (Digital Investment Trust) Agent Based on ECSSL (Elliptic Curve SSL) (ECSSL(Elliptic Curve SSL) 기반 DIT(Digital Investment Trust) 에이전트)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.599-608
    • /
    • 2002
  • This paper proposes DIT (Digital Investment Trust) agent based on ECSSL (Elliptic Curve SSL). This DIT agent is a banking project using IT (Investment Trust) conception based on EC (Electronic Commerce) and can manage micro payment, account opening and account transferring. In addition, ECSSL (Elliptic Curve SSL) protocol is implemented which consists of much better encryption functions than existing SSL (Secure Socket Layer) Protocol. Therefore, This DIT agent based on ECSSL protocol protects a customer's information and asset from third party.

AGENT-BASED SIMULATION OF ORGANIZATIONAL DYNAMICS IN CONSTRUCTION PROJECT TEAMS

  • JeongWook Son;Eddy M. Rojas
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.439-444
    • /
    • 2011
  • As construction projects have been getting larger and more complex, a single individual or organization cannot have complete knowledge or the abilities to handle all matters. Collaborative practices among heterogeneous individuals, which are temporarily congregated to carry out a project, are required in order to accomplish project objectives. These organizational knowledge creation processes of project teams should be understood from the active and dynamic viewpoint of how they create information and knowledge rather than from the passive and static input-process-output sequence. To this end, agent-based modeling and simulation which is built from the ground-up perspective can provide the most appropriate way to systematically investigate them. In this paper, agent-based modeling and simulation as a research method and a medium for representing theory is introduced. To illustrate, an agent-based simulation of the evolution of collaboration in large-scale project teams from a game theory and social network perspective is presented.

  • PDF

A Study on the Design of the Gateway for a Strong and Safe Mobile Agent System (강하고 안전한 이동 에이전트 시스템을 위한 게이트웨이 설계에 관한 연구)

  • Kim Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.183-188
    • /
    • 2004
  • In the course of Internet proliferation. many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most Promising among the new paradigms is use of mobile agents. It also however, suffers from a major drawback, namely the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper proposed the design of strong and safe mobile agent gateway that split and merge the agent code with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

  • PDF