• Title/Summary/Keyword: Intelligent client agent

Search Result 19, Processing Time 0.026 seconds

Implementation of A Multiple-agent System for Conference Calling (회의 소집을 위한 다중 에이전트 시스템의 구현)

  • 유재홍;노승진;성미영
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.2
    • /
    • pp.205-227
    • /
    • 2002
  • Our study is focused on a multiple-agent system to provide efficient collaborative work by automating the conference calling process with the help of intelligent agents. Automating the meeting scheduling requires a careful consideration of the individual official schedule as well as the privacy and personal preferences. Therefore, the automation of conference calling needs the distributed processing task where a separate calendar management process is associated for increasing the reliability and inherent parallelism. This paper describes in detail the design and implementation issues of a multiple-agent system for conference calling that allows the convener and participants to minimize their efforts in creating a meeting. Our system is based on the client-sewer model. In the sewer side, a scheduling agent, a negotiating agent, a personal information managing agent, a group information managing agent, a session managing agent, and a coordinating agent are operating. In the client side, an interface agent, a media agent, and a collaborating agent are operating. Agents use a standardized knowledge manipulation language to communicate amongst themselves. Communicating through a standardized knowledge manipulation language allows the system to overcome heterogeneity which is one of the most important problems in communication among agents for distributed collaborative computing. The agents of our system propose the dates on which as many participants as possible are available to attend the conference using the forward chaining algorithm and the back propagation network algorithm.

  • PDF

A Multimedia Contents Recommendation System using Preference Transition Probability (선호도 전이 확률을 이용한 멀티미디어 컨텐츠 추천 시스템)

  • Park, Sung-Joon;Kang, Sang-Gil;Kim, Young-Kuk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.2
    • /
    • pp.164-171
    • /
    • 2006
  • Recently Digital multimedia broadcasting (DMB) has been available as a commercial service. The users sometimes have difficulty in finding their preferred multimedia contents and need to spend a lot of searching time finding them. They are even very likely to miss their preferred contents while searching for them. In order to solve the problem, we need a method for recommendation users preferred only minimum information. We propose an algorithm and a system for recommending users' preferred contents using preference transition probability from user's usage history. The system includes four agents: a client manager agent, a monitoring agent, a learning agent, and a recommendation agent. The client manager agent interacts and coordinates with the other modules, the monitoring agent gathers usage data for analyzing the user's preference of the contents, the learning agent cleans the gathered usage data and modeling with state transition matrix over time, and the recommendation agent recommends the user's preferred contents by analyzing the cleaned usage data. In the recommendation agent, we developed the recommendation algorithm using a user's preference transition probability for the contents. The prototype of the proposed system is designed and implemented on the WIPI(Wireless Internet Platform for Interoperability). The experimental results show that the recommendation algorithm using a user's preference transition probability can provide better performances than a conventional method.

Design and Implementation of Educational Information Sharing Systems using Bookmark (즐겨찾기를 이용한 교육용 정보공유시스템의 설계 및 구현)

  • Han, Sun-Gwan
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.6
    • /
    • pp.77-84
    • /
    • 2004
  • This study proposed the agent system for educational information sharing using bookmark. In order to search and share the educational information effectively, we designed DAML+OIL-typed bookmark information. Proposed system in this study had the P2P type based on Client-Server type. We implemented the bookmark agent that has the intelligent characteristics, that is, automatic categorization of peers and documents, autonomous communication between agents using DAML, and delicate information searching using the ontology dictionary in Semantic Web environment. Hereafter, this study will contribute to activate sharing and searching educational information as well as proposed system will offer the important technologies for SCORM-based e-learning environment.

  • PDF

Intelligent Multi-Agent Distributed Platform based on Dynamic Object Group Management using Fk-means (Fk means를 이용한 동적객체그룹관리기반 지능형 멀티 에이전트 분산플랫폼)

  • Lee, Jae-wan;Na, Hye-Young;Mateo, Romeo Mark A.
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.101-110
    • /
    • 2009
  • Multi-agent systems are mostly used to integrate the intelligent and distributed approaches to various systems for effective sharing of resources and dynamic system reconfigurations. Object replication is usually used to implement fault tolerance and solve the problem of unexpected failures to the system. This paper presents the intelligent multi-agent distributed platform based on the dynamic object group management and proposes an object search technique based on the proposed filtered k-means (Fk-means). We propose Fk-means for the search mechanism to find alternative objects in the event of object failures and transparently reconnect client to the object. The filtering range of Fk-means value is set only to include relevant objects within the group to perform the search method efficiently. The simulation result shows that the proposed mechanism provides fast and accurate search for the distributed object groups.

  • PDF

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Autonomous Separation Methodology of Faulted Section based on Multi-Agent Concepts in Distribution System (멀티 에이전트 개념에 기반한 배전계통의 분산 자율적 고장구간 분리 기법)

  • Ko, Yun-Seok;Hong, Dae-Seung;Song, Wan-Seok;Park, Hak-Ryeol
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.6
    • /
    • pp.227-235
    • /
    • 2006
  • In this paper, autonomous separation methodology of faulted section based on network is proposed newly, which can minimize the outage effect as compared with the existing center-based faulted section separation method by determining and separating autonomously the faulted section by the free operation information exchange among IEDs on the feeder of distribution system. The all IEDs is designed in network in which client/server function is possible in order to separate autonomously the faulted section using PtP(Peer to Peer) communication. Also, Inference based solution of IED for the autonomous faulted section separation is designed by rules obtained from the analyzing results of distribution system topology. Here, the switch IEDs transmit on network the fault information utilizing on multi-casting communication method, at the fame time, determine selfly whether they operates or not by inferencing autonomously the faulted section using the inference-based solution after receiving the transmitted information. Finally, in order to verify the effectiveness and application possibility of the proposed methodology, the diversity fault cases are simulated for the typical distribution system.

Architecture and Behaviors of an Intelligent Agent for Online 3D Action Games (온라인 3D 액션 게임을 위한 지능형 에이전트의 구조와 행위)

  • 이경록;김하빈;박근수;김인철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10d
    • /
    • pp.319-321
    • /
    • 2002
  • 본 논문에서는 대표적인 3차원 일인칭 액션 게임(first-person action game)인 Unreal Tournament 게임과 이것에 기초한 Gamebots시스템을 소개하고, 이러한 환경에서 효과적으로 동작하는 지능형 NPC인 KGBot의 설계와 구현에 대해 설명한다. KGBot는 Gamebots시스템에서 하나의 보트 클라이언트(bot client)로 동작하면서 지형이 복잡한 3차원 가상환경 안에서 적들에 대항해 아군과 연합하여 특정 목표 지점(domination point)들을 찾아 점령하는 자율 NPC이다. KGBot는 BDI기반의 범용 에이전트 구조인 UM-PRS를 제어엔진으로 채용하고 있으며, 복잡한 행위들을 효과적으로 구현하기 위해 계충화된 지식베이스를 가지고 있다. 본 논문에서는 특히 제한적인 센서정보와 이동점(waypoint)에 기초하여 자신이 놓여진 월드의 전체지도를 작성하고 임의의 목적지까지 효율적인 이동경로를 계획할 수 있는 KGBot의 행위의 구현과 실험에 대해 설명한다.

  • PDF

Secure Information Sharing Model in P2P: IAA based Approach (P2P에서의 안전한 정보 공유 모델 : IAA 기반 접근방식)

  • 진홍태;김동성;박종서
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.443-446
    • /
    • 2003
  • 본 논문에서는 P2P(Peer-to-Peer) 환경에서 효율적이고 안전하게 정보를 공유할 수 있는 시스템 구조를 제안한다. 기존의 Server-Client 환경에 비해 P2P 환경이 네트워크를 확장시키고 병목 현상을 줄일 수 있는 방안으로 떠오르게 됨에 따라 그에 따른 보안문제도 필수적으로 고려해야 할 사항이 되었다. 따라서 P2P 환경에서도 안전하게 정보를 공유할 수 있고, 각 Peer들의 정보를 보호해 줄 수 있는 보안 기술이 필요하다. 본 논문에서 제안하는 시스템은 IAA(Intelligent Automation Agent)를 이용한 접근방식을 제공함으로서, 다른 시스템에 응용 가능하고 보안 환경의 변화에 민첩하게 유기적으로 대처할 수 있는 통합된 관리 방법을 제시한다.

  • PDF