• Title/Summary/Keyword: Agent negotiation

Search Result 126, Processing Time 0.026 seconds

Mult-agent Negotiation Model for Internet Recruiting System (인터넷 채용 시스템을 위한 멀티 에이전트 협상 모델의 설계)

  • 이용준;허재형;이종희;김태석;오해석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10b
    • /
    • pp.30-32
    • /
    • 2000
  • 전자상거래 기술의 발전에 따라 사용자를 대신하여 협상을 수행하는 소프트웨어 에이전트의 활용에 대한 연구가 진행되고 있다. 협상 에이전트는 협상의 양측인 구매자와 판매자를 대신하는 멀티 에이전트로 쌍방향의 협상이 이루어지며, 가격을 통한 단일 속성으로 시간에 따른 협상이 연구되어 왔다. 본 논문은 단일 속성과 다중 속성에 대한 두 가지 방식의 효율적인 협상을 제공하기 위한 협상 에이전트를 제안한다. 다중 속성에 대한 협상은 지원자가 원하는 협상 요소를 결정하며, 각 속성간의 중요도에 따른 가중치를 부여한 협상 알고리즘과 자율 협상을 위해 전략을 제안한다. 인터넷을 이용한 채용이 보편화되어 지원자와 고용자의 단일 속성과 다중 속성에 대한 협상이 요구되는 시점에서, 인터넷 채용 시스템에서 지원자, 고용주를 대신하는 협상 에이전트를 적용시켰다.

  • PDF

VPN Traversal Scheme in Hierarchical MIPv4 environment (계층적 이동 IPv4 환경에서 VPN 운영 방안)

  • Sung, Su-Lyun;Kang, Jung-Ho;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.519-526
    • /
    • 2004
  • This paper presents an efficient interoperation scheme of a VPN(Virtual Private Network) and Mobile IP using a hierarchical structure of a FA(Foreign Agent). In the proposed scheme, the GFA(Gateway Foreign Agent) plays a role of VPN gateway on behalf of the MN(Mobile Node). When the MN moves in the same GFA domain, because the GFA has already an IPsec security association with a VPN gateway in the home network of the MN, the MN does not need an IPsec re-negotiaion. In this way, our mechanism reduces a message overhead and a delay resulted from an IPsec negotiation. And a MN can send a data to a correspondent node without a packet leakage. We show a performance of our scheme by using a discrete analytical model. Analytical results demonstrated that the total processing cost calculated by a registration update cost and a packet delivery cost is significantly reduced through our proposed scheme.

Artificial Agent-based Bargaining Game considering the Cost incurred in the Bargaining Stage (교섭 단계에서 발생하는 비용을 고려한 인공 에이전트 기반 교섭 게임)

  • Lee, Sangwook
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.292-300
    • /
    • 2020
  • According to the development of artificial intelligence technology, attempts have been made to interpret phenomena in various fields of the real world such as economic, social, and scientific fields through computer simulations using virtual artificial agents. In the existing artificial agent-based bargaining game analysis, there was a problem that did not reflect the cost incurred when the stage progresses in the real-world bargaining game and the depreciation of the bargaining target over time. This study intends to observe the effect on the bargaining game by adding the cost incurred in the bargaining stage and depreciation of the bargaining target over time (bargaining cost) to the previous artificial agent-based bargaining game model. As a result of the experiment, it was observed that as the cost incurred in the bargaining stage increased, the two artificial agents participating in the game had a share close to half the ratio and tried to conclude the negotiation in the early stage.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

A New Direction and Its Challenges for Linkage of Agricultural Research and Extension As a Traditional Knowledge Development in Rural Korea: Agricultural Knowledge Systems (농업지식체계 구축에 의한 전통지식개발 방법으로서의 농업연구지도 연계의 방향)

  • Park, Duk-Byeong;Kang, Kyeong-Ha;Lee, Min-Soo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.10 no.1
    • /
    • pp.15-29
    • /
    • 2003
  • The study uses agricultural knowledge system theory to explore how traditional knowledge applies to the linkage system of agricultural research and extension in rural Korea. By agricultural knowledge system we emphasize the dynamic networks of actors, processes of negotiation, and the diverse ways in which knowledge is constructed and performed. The knowledge systems reflect the idea that the boundaries between knowledge groups are not closed and that there could be considerable overlap between knowledge system. The results of this study are the following : First, we should know that some extension agents clearly value farmer knowledge and try to facilitate farmer-to-farmer communication. Extension plays a significant role in the knowledge-creation process and shaping communities because knowledge processes are embedded in social processes that involve aspects of power, authority, and legitimization. Third, the constructions of agricultural knowledge systems thus include social interactions, communication, and the diverse processes individuals employ create, use, and evaluate multiple types and sources of information through the linkage between agricultural colleges and Rural Development Administration (RDA), establishing the research institution of research and extension linkage, exchange research agent with extension agent, and bottom-up approach. Second, we should know that the focus of traditional knowledge development is rural community development as a community process. Nowadays the sessions of the Intergovernmental Committee of World Intellectual Property Organization (WIPO) cover two lines of inquiry, which are the use of existing standards of intellectual property for the protection of traditional knowledge and that of new legal standards, eventually in the from of sui generis mechanisms of protection.

  • PDF

Distributed Coordination of Project Schedule Changes by Using Software Agents (소프트웨어 에이전트를 이용한 건설공사 공정관리의 분산화)

  • Kim Kee-soo
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.85-90
    • /
    • 2002
  • In the construction industry, projects are becoming increasingly large and complex, involving multiple subcontractors. Traditional centralized coordination techniques used by the general contractors become less effective as subcontractors perform most work and provide their own resources. When subcontractors cannot provide enough resources, they hinder their own performance as well as that of other subcontractors and ultimately the entire project. Thus, construction projects need a new distributed coordination approach wherein all of the concerned subcontractors can reschedule a project dynamically. To enable the new distributed coordination of project schedule changes, I developed a novel agent-based compensatory negotiation methodology, which allows software agents to simulate negotiations on behalf of their human subcontractors. This research formalizes the necessary steps that would help construction project participants to increase the efficiency of their resource use, which in turn will enhance successful completions of whole projects.

  • PDF

Development of Heterarchical SFCS Execution Module using E-Net (E-Net을 이용한 Heterarchical SFCS 실행 모듈 개발)

  • Hong, Soon-Do;Cho, Hyun-Bo;Jung, Moo-Young
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.25 no.1
    • /
    • pp.87-99
    • /
    • 1999
  • A shop floor control system(SFCS) performs the production activities required to fill orders. In order to effectively control these activities, the autonomous agent-based heterarchical shop floor control architecture is adopted where a supervisor does not exist. In this paper, we define functional perspective of the heterarchical shop floor control using planning, scheduling, and execution modules. In particular, we focus on an execution module that can coordinate the planning and scheduling modules and a general execution module that easily can be modified to execute the other equipment. The execution module can be defined informally as a module that downloads and performs a set of scheduled tasks. The execution module is also responsible for identifying and resolving various errors whether they come from hardware or software. The purpose of this research is to identify all the execution activities and solving techniques under the assumptions of the heterarchical control architecture. And we model the execution module in object-oriented modelling technique for generalization. The execution module modeled in object-oriented concept can be adopted to the other execution module easily. This paper also proposes a classification scheme for execution activities of the heterarchical control architecture. Petri-nets are used as a unified framework for modeling and controlling execution activities. For solving the nonexistence of a supervisor, a negotiation-based solution technique is utilized.

  • PDF

Algorithm for the Dynamic Restructuring Process in the Fractal Manufacturing System (프랙탈 생산시스템의 동적 재구성 프로세스 알고리듬)

  • Mun, Jung-Tae;Cha, Young-Pil;Shin, Moon-Soo;Jung, Moo-Young
    • IE interfaces
    • /
    • v.17 no.spc
    • /
    • pp.46-51
    • /
    • 2004
  • In order to quickly respond to the rapidly changing manufacturing environment, it is imperative for the system to have such capabilities as flexibility, adaptability, reusability, etc. One of the promising approaches for new manufacturing paradigm satisfying those capabilities is the fractal manufacturing system (FrMS). The FrMS can be optimized by reorganizing the structure of fractals through the dynamic restructuring process (DRP) to deal with the changes of environment. Through the DRP, the logical connections between fractals and roles of fractals are autonomously changed. To determine an appropriate fractal structure, certain rules are needed to build and evaluate alternative structures for fractals involved in the DRP. In this paper, an algorithm for the DRP-, which is invoked when some equipment are unavailable, is introduced and explained with examples.

A Secure Protocol for the Electronic Auction (전자경매를 위한 보안 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.29-36
    • /
    • 2007
  • Recently, Jaiswal et al. proposed a protocol to improve the multi-agent negotiation test-bed which was proposed by Collins et al. Using publish/subscribe system, time-release cryptography and anonymous communication, their protocol gives an improvement on the old one. However, it is shown that the protocol also has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, anonymity disclosure, collusion between customers and a certain supplier. So proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that the way that market generates random number to the supplier is better than the supplier do by himself in guaranteeing anonymity. Market publishes interpolating polynomial for sharing the determination process data. It avoids collusion between customer and a certain supplie

  • PDF

Goal-formation Process in Fractal Manufacturing Systems

  • Ryu Kwangyeol;Jung Mooyoung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.800-807
    • /
    • 2003
  • Decomposition of tasks in the ordinary manufacturing systems is usually based on the predefined goal of the system. To achieve the high-level-goals (e.g., factory goal or company goal), several sub-goals should be achieved in advance. However, goals can change along with the current status of the system and the external environmental situations. Thus, a manufacturing system should support the goal-formations which can be bearable these changes for efficient and effective operations. Therefore, it IS necessary to develop a systematic methodology for the goal-formations in a manufacturing system. Especially, the formation and/or change of goals in real-time should be possible for distributed and dynamic systems including the fractal manufacturing system (FrMS). In this paper, a threefold methodology is proposed for the goal-formation process (GFP) in the FrMS; 1) a goal­generating process (GGP) to make and propagate fuzzy goals, 2) a goal-harmonizing process (GHP) to eliminate or reduce conflicts and interferences of goals by using a mobile agent- based negotiation scheme, and 3) a goal-balancing process (GBP) to make a compromise between goals by using quantifiable indicators of the manufacturing system.

  • PDF