• 제목/요약/키워드: Contract-Net-Protocol

검색결과 20건 처리시간 0.029초

Development of a Ubiquitous Vision System for Location-awareness of Multiple Targets by a Matching Technique for the Identity of a Target;a New Approach

  • Kim, Chi-Ho;You, Bum-Jae;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.68-73
    • /
    • 2005
  • Various techniques have been proposed for detection and tracking of targets in order to develop a real-world computer vision system, e.g., visual surveillance systems, intelligent transport systems (ITSs), and so forth. Especially, the idea of distributed vision system is required to realize these techniques in a wide-spread area. In this paper, we develop a ubiquitous vision system for location-awareness of multiple targets. Here, each vision sensor that the system is composed of can perform exact segmentation for a target by color and motion information, and visual tracking for multiple targets in real-time. We construct the ubiquitous vision system as the multiagent system by regarding each vision sensor as the agent (the vision agent). Therefore, we solve matching problem for the identity of a target as handover by protocol-based approach. We propose the identified contract net (ICN) protocol for the approach. The ICN protocol not only is independent of the number of vision agents but also doesn't need calibration between vision agents. Therefore, the ICN protocol raises speed, scalability, and modularity of the system. We adapt the ICN protocol in our ubiquitous vision system that we construct in order to make an experiment. Our ubiquitous vision system shows us reliable results and the ICN protocol is successfully operated through several experiments.

  • PDF

계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션 (Application of Contract Net Protocol to the Design and Simulation of Network Security Model)

  • 서경진;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제12권4호
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

멀티에이전트 시스템을 이용한 마이크로그리드 분산 지능형 관리시스템 파일럿 플랜트 개발 (Development of Pilot Plant for Distributed Intelligent Management System of Microgrids)

  • 오상진;유철희;정일엽;임재봉
    • 전기학회논문지
    • /
    • 제62권3호
    • /
    • pp.322-331
    • /
    • 2013
  • This paper describes the development of the pilot plant of distributed intelligent management system for a microgrid. For optimal control and management of microgrids, intelligent agents area applied to the microgrid management system. Each agent includes intelligent algorithms to make decisions on behalf of the corresponding microgrid entity such as distributed generators, local loads, and so on. To this end, each agent has its own resources to evaluate the system conditions by collecting local information and also communicating with other agents. This paper presents key features of the data communication and management of the developed pilot plant such as the construction of mesh network using local wireless communication techniques, the autonomous agent coordination schemes using plug-and-play functions of agents and contract net protocol (CNP) for decision-making. The performance of the pilot plant and developed algorithms are verified via real-time microgrid test bench based on hardware-in-the-loop simulation systems.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Identified Contract Net 프로토콜을 이용한 다중물체의 위치인식을 위한 시각 기반 센서 네트워크 개발 (Development of a Ubiquitous Vision System for Location awareness of Multiple Targets by Protocol based Approach)

  • 김치호;유범재;김학배
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 제36회 하계학술대회 논문집 D
    • /
    • pp.2870-2872
    • /
    • 2005
  • 본 논문에서는 시각기반 센서 네트워크에 의해 다중물체의 위치를 인식 및 추적하여 목표물들의 위치를 결정할 수 있는 분산형 시각 시스템을 제시한다. 각 시각 센서는 칼라와 동작 정보에 의한 대상물체의 정확한 분할 및 다중물체에 대한 실시간 추적 그리고 간단한 원근법에 의한 포즈 추정을 수행한다. 각 시각 센서를 하나의 에이전트 - 시각 에이전트 -로 정의하고, 전체 시각기반 센서 네트워크를 복수 에이전트 시스템(multiagent system)으로 구성한다. 이로써 대상물체의 핸드오버시 그 대상물체의 신분에 대한 매칭 문제를 Identified Contract Net (ICN) 프로토콜을 제안하여 해결한다. ICN 프로토콜은 시각 에이전트의 개수에 독립적이고 그것을 사용할 경우 시각 에이전트들 간의 캘리브레이션도 필요로 하지 않기 때문에 시각기반 센서 네트워크의 속도, 확장성 및 모듈성을 높여준다. 실험을 통해 구성한 시각기반 센서 네트워크에서 ICN 프로토콜이 적용됨을 성공적으로 검증하였다.

  • PDF

연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용 (An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture)

  • 서희석
    • 한국컴퓨터산업학회논문지
    • /
    • 제4권12호
    • /
    • pp.965-974
    • /
    • 2003
  • 오늘날의 네트워크는 다양한 애플리케이션이 수행되고 있는 많은 수의 서버와 라우터들로 구성되어 있다. 본 논문에서는 침입 탐지 에이전트와 방화벽 에이전트가 계약망 프로토콜(Contract Net Protocol)에 의해서 서로 연동할 수 있는 구조를 디자인하고 구축하였다. 계약망 프로토콜은 분산 시스템과 같은 이기종의 컴퓨터 시스템의 효과적인 연동을 위한 방법으로서 여러 에이전트들이 모여 서로 협력하며 하나의 문제를 해결하게 된다. 계약망 프로토콜 내의 커멘드 콘솔은 매니저로서 침입 탐지를 수행하는 계약자들을 수행시키거나 제어하는 역할을 수행한다. 지식 기반의 네트워크 보안 모델링을 위해서 각 모델은 계층적으로 잘 구성된 DEVS (Discrete Event system Specification)에 의해서 구성하려다. 본 논문에서는 계약망 프로토콜에 의해서 운용되는 지식 기반의 침입 탐지 에이전트의 추론 주기를 향상시키기 위한 rete 패턴 매칭 알고리즘을 적용하여 시뮬레이션을 수행하였다. 본 연구는 rete 패턴 매칭 알고리즘을 사용하여 계약망 프로토롤의 성능과 특성을 평가해 본다.

  • PDF

퍼지를 적용한 계약망 프로토콜 기반의 네트워크 보안 모델의 설계 및 시뮬레이션 (Modeling and simulation of CNP-applied network security models with application of fuzzy rule-based system)

  • 이진아;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제14권1호
    • /
    • pp.9-18
    • /
    • 2005
  • Attempts to attack hosts in the network have become diverse, due to crackers developments of new creative attacking methods. Under these circumstances the role of intrusion detection system as a security system component gets considerably importance. Therefore, in this paper, we have suggested multiple intrusion detection system based on the contract net protocol which provides the communication among multiple agents. In this architecture, fuzzy rule based system has been applied for agent selection among agents competing for being activated. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

계약망 프로토콜을 적용한 보안 모델에서 에이전트 선택을 위한 퍼지 컨트롤러의 설계 (Design of Fuzzy-Controller for Agent Selection in CNP-applied Security Models)

  • 이진아;조대호
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2004년도 춘계학술대회 논문집
    • /
    • pp.20-24
    • /
    • 2004
  • 광범위한 네트워크의 연결과 이를 이용하는 조직이나 개인의 증가로 인터넷은 정보를 교환하고 거래를 수행하는 주요한 수단이 된 반면에 해커나 바이러스의 침입 또한 증가하여 공격에 쉽게 노출되어있다. 이러한 보안상의 문제점을 해결하기 위하여 컴퓨터나 네트워크 시스템의 활동을 감시할 수 있는 침입 탐지 시스템(IDS)과 같은 보안 요소를 도입하였으며, 탐지에 대한 성능을 향상시키기 위하여 네트워크를 기반으로 하는 다중 침입 탐지 시스템을 응용하여 네트워크에 분산된 에이전트들 중에서 발생된 침입에 알맞은 에이전트를 선택하도록 하여 침입 탐지를 효과적으로 할 수 있게 하였다. 본 연구에서는 보안 시스템의 연동을 위하여 계약망 프로토콜을 적용하였다. 계약망 프로토콜은 분산된 에이전트들 중에서 입찰과정을 통하여 최상의 에이전트를 선택하는데 이때, 에이전트를 선택하는 과정에 있어서 퍼지 규칙 기반 시스템을 적용한 퍼지 컨트롤러를 설계하여 시뮬레이션 한다.

  • PDF

멀티 마이크로그리드 최적 운영을 위한 멀티 에이전트 시스템 적용 (Applying Multi-Agent System for Optimal Multi-Microgrids Operation)

  • 부이 반하이;후세인 아크타르;김학만
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2016년도 춘계학술발표대회
    • /
    • pp.464-465
    • /
    • 2016
  • This paper analyzes the capabilities of multi-agent system (MAS) technology for the optimal multi-microgrids (MMGs) operation in grid-connected mode. In this system, communication among microgrids (MGs) is realized by developing a modified contract net protocol (MCNP) based on agent communication language (ACL) messages. Moreover, a two-stage mathematical model is proposed based on mixed integer linear programming (MILP) for local optimization in each MG, and global optimization in energy management system.

Network human-robot interface at service level

  • Nguyen, To Dong;Oh, Sang-Rok;You, Bum-Jae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1938-1943
    • /
    • 2005
  • Network human-robot interface is an important research topic. In home application, users access the robotic system directly via voice, gestures or through the network. Users explore a system by using the services provided by this system and to some extend users are enable to participate in a service as partners. A service may be provided by a robot, a group of robots or robots and other network connected systems (distributed sensors, information systems, etc). All these services are done in the network environment, where uncertainty such as the unstable network connection, the availability of the partners in a service, exists. Moreover, these services are controlled by several users, accessing at different time by different methods. Our research aimed at solving this problem to provide a high available level, flexible coordination system. In this paper, a multi-agent framework is proposed. This framework is validated by using our new concept of slave agents, a responsive multi-agent environment, a virtual directory facilitator (VDF), and a task allocation system using contract net protocol. Our system uses a mixed model between distributed and centralized model. It uses a centralized agent management system (AMS) to control the overall system. However, the partners and users may be distributed agents connected to the center through agent communication or centralized at the AMS container using the slave agents to represent the physical agents. The system is able to determine the task allocation for a group of robot working as a team to provide a service. A number of experiments have been conducted successfully in our lab environment using Issac robot, a PDA for user agent and a wireless network system, operated under our multi agent framework control. The experiments show that this framework works well and provides some advantages to existing systems.

  • PDF