Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Not finding a parking space for you sometimes is indeed a critical issue. The number of vehicles is also increasing daily adding to the parking vows at public places. Cities noticed that their drivers had real problems to find a parking space easily especially during peak hours, the difficulty roots from not knowing where the parking spaces are available at the given time. Even if this is known, many...
The evolution of information systems requires the implementation of a high level of security to minimize the problems associated with these systems. Intrusion Detection Systems (IDS) play a very important role in the security of networks by detecting when an attack is happening, but most current IDS are generally centralized and suffer from significant limitations. This paper describes a new security...
In this paper, a hybrid control architecture based on multi-agent system is presented, with PID (Proportional Integral Derivative) guidance and control system designed for Vertical Take off and Landing Unmanned Aerial Vehicles (VTOL UAV). The issues of multi-agent system is resolved with a distributed hybrid structure, which gradually transforms abstract mission commands into real-time control signals...
IT GRC in the information system environment is an approach which has acquired importance in recent years and requires the development of IT GRC applications. This paper presents a novel architecture for communication workflow management system which facilitates the integration of distributed services and applications within an IT GRC Platform. This last one is a big project developed in LISER laboratory...
PMBOK (project management body of knowledge) is the recognized and the most accepted standard for project management, however many projects still fail by using or misusing PMBOK guidelines, due to poor communications, lack of monitoring and non performance measurement. In this paper we use the advantages of agent technology to make implementation and use of PMBOK processes more efficient and to have...
In order to measure the urban traffic congestion, a multiagent system that consists of several locally operating agents each achieving a specific task is proposed. The traffic light patterns are calculated by considering different constraints so as to minimize an evaluation criterion. The proposed system aims at managing the gradual congestion of the traffic. As one section of the intersection becomes...
This study aims at calculating, the road urban traffic congestion using a suggested adapted CRONOS model. For the model simulation we propose adapted algorithm. We compare our adaptive system results to others given by urban traffic systems based on fixed pattern lights. The system is designed to make equilibrium between the length queue and the states of lights to search optimal strategy guarantying...
Governance, Risks and Conformity (GRC) is an emergent subject in the world of the information technology (IT). However this day, there is a lack of research on a selective approach of framework IT compared with the objectives IT. In this article, we describe a correspondence between the objectives IT of COBIT and the processes of ITIL, PMBOK, ISO 27001, and ISO 27002 to investigate into the coexistence...
The Intrusion Detection System architectures used in commercial and research systems have a number of problems that limit their configurability. An important problem of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. Thus, the IDS does not have the ability to detect new attacks. We propose in this paper a...
The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then...
The use of internet has made people and organizations vulnerable to the outside attacks. Indeed, cyber issues mainly affect information systems with different types of malicious attacks such as spyware, virus, social engineering etc. This work is motivated by the need for a more intuitive and automated systems-level approach to determine the overall security characteristics of an information system...
The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then...
This paper shows how IT-Governance Audit can be computerized by the use of Multi-agent system and Interorganizational Workflow (IOW). An IOW aims at business process orchestration with the particularity that this processes are heterogeneous, autonomous and independent. In fact, Information System (IS) components nowadays should cooperate despite their divergence to ensure a value added services .In...
Cloud computing is a new trend based on virtualization. It motivates many academic institutions and non-academic to move towards this approach. Our goal is to enhance the security of the cloud computing through virtualization and more precisely by the principle of the fork of the virtual machine. This article describes the proposed solution to achieve this goal and discusses the choice of tools that...
It is widely anticipated that there will be a paradigm shift in the coming years from desktop-centric computing to mobile computing. This will have a number of significant ramifications. One issue of critical importance is the design, development and deployment of software solutions for mobile users. These users use such applications in a highly dynamic environment and such systems need to perceive...
The growth of technological capabilities of mobile devices, the evolution of wireless communication technologies, and the maturity of embedded systems contributed to expand the Machine to machine (M2M) concept. M2M refers to data communication between machines without human intervention. So, M2M is the convergence of three families of technologies: mobile agent connected by wired network or by wireless...
In this paper we propose a behavior-based architecture, which can also be seen as a multi-agent architecture, to control a situated and embodied autonomous mobile robot, under a close sensing action relationship. Preexisting knowledge can play a meta-level role, being used in order to provide an adviser capability which is combined with the basic reactive feature of the robot. One of the challenges...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.