A Multi-Agent-Based Management Approach for Self-Health Awareness in Autonomous Systems

Author(s):  
Gustavo Gonzalez ◽  
Cecilio Angulo ◽  
Cristobal Raya
Inventions ◽  
2019 ◽  
Vol 4 (3) ◽  
pp. 37 ◽  
Author(s):  
Sajad Ghorbani ◽  
Rainer Unland ◽  
Hassan Shokouhandeh ◽  
Ryszard Kowalczyk

In microgrids a major share of the energy production comes from renewable energy sources such as photovoltaic panels or wind turbines. The intermittent nature of these types of producers along with the fluctuation in energy demand can destabilize the grid if not dealt with properly. This paper presents a multi-agent-based energy management approach for a non-isolated microgrid with solar and wind units and in the presence of demand response, considering uncertainty in generation and load. More specifically, a modified version of the lightning search algorithm, along with the weighted objective function of the current microgrid cost, based on different scenarios for the energy management of the microgrid, is proposed. The probability density functions of the solar and wind power outputs, as well as the demand of the households, have been used to determine the amount of uncertainty and to plan various scenarios. We also used a particle swarm optimization algorithm for the microgrid energy management and compared the optimization results obtained from the two algorithms. The simulation results show that uncertainty in the microgrid normally has a significant effect on the outcomes, and failure to consider it would lead to inaccurate management methods. Moreover, the results confirm the excellent performance of the proposed approach.


2017 ◽  
Vol 10 (4) ◽  
pp. 430-450 ◽  
Author(s):  
Salama A. Mostafa ◽  
Mohd Sharifuddin Ahmad ◽  
Aida Mustapha ◽  
Mazin Abed Mohammed

Purpose The purpose of this paper is to propose a layered adjustable autonomy (LAA) as a dynamically adjustable autonomy model for a multi-agent system. It is mainly used to efficiently manage humans’ and agents’ shared control of autonomous systems and maintain humans’ global control over the agents. Design/methodology/approach The authors apply the LAA model in an agent-based autonomous unmanned aerial vehicle (UAV) system. The UAV system implementation consists of two parts: software and hardware. The software part represents the controller and the cognitive, and the hardware represents the computing machinery and the actuator of the UAV system. The UAV system performs three experimental scenarios of dance, surveillance and search missions. The selected scenarios demonstrate different behaviors in order to create a suitable test plan and ensure significant results. Findings The results of the UAV system tests prove that segregating the autonomy of a system as multi-dimensional and adjustable layers enables humans and/or agents to perform actions at convenient autonomy levels. Hence, reducing the adjustable autonomy drawbacks of constraining the autonomy of the agents, increasing humans’ workload and exposing the system to disturbances. Originality/value The application of the LAA model in a UAV manifests the significance of implementing dynamic adjustable autonomy. Assessing the autonomy within three phases of agents run cycle (task-selection, actions-selection and actions-execution) is an original idea that aims to direct agents’ autonomy toward performance competency. The agents’ abilities are well exploited when an incompetent agent switches with a more competent one.


2013 ◽  
Vol 133 (9) ◽  
pp. 1652-1657 ◽  
Author(s):  
Takeshi Nagata ◽  
Kosuke Kato ◽  
Masahiro Utatani ◽  
Yuji Ueda ◽  
Kazuya Okamoto ◽  
...  

2020 ◽  
Vol 8 (1) ◽  
pp. 33-41
Author(s):  
Dr. S. Sarika ◽  

Phishing is a malicious and deliberate act of sending counterfeit messages or mimicking a webpage. The goal is either to steal sensitive credentials like login information and credit card details or to install malware on a victim’s machine. Browser-based cyber threats have become one of the biggest concerns in networked architectures. The most prolific form of browser attack is tabnabbing which happens in inactive browser tabs. In a tabnabbing attack, a fake page disguises itself as a genuine page to steal data. This paper presents a multi agent based tabnabbing detection technique. The method detects heuristic changes in a webpage when a tabnabbing attack happens and give a warning to the user. Experimental results show that the method performs better when compared with state of the art tabnabbing detection techniques.


Sign in / Sign up

Export Citation Format

Share Document