The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The approach to the integration of applications based on mathematical logic and artificial intelligence for World Data Center (WDC) interdisciplinary scientific investigations has been developed in the article. Key elements of the approach are a multilevel system architecture, a formal logical system, implementation based on the interaction of intelligent agents. The formal logical system has been...
In this paper, a method for attribute selection is used in a dispersed decision-making system with dynamically generated disjoint clusters. The system that is used has been proposed in the earlier studies of the author. The aim of the paper is to apply in this system, the method of attribute selection that is based on the rough set theory. Another objective is to compare the results obtained with...
Ad-hoc networks, as well as many wireless networks and wired networks applied here to do and the proper function of routing data packets forwarding, maintenance and update routing information, the security need. Mobile ad hoc networks due to the special properties of operations and placement of often unstructured meshes, or self-organizing ad-hoc networks are known. In these networks in order to extend...
The paper presents a knowledge based approach applied to air pollution effects analysis in the case of PM2.5 air pollutant which has potential significant negative effects on human health. The use of knowledge derived from various sources (e.g. literature, databases, questionnaires, human experts' experience, and decision tables) via manual, semiautomatic and automatic methods is proposed for a multi-parameters...
Security and the confidentiality during the data transfer are the important metric in the network design. A group of sequential actions to assure the data confidentiality refers the intrusion. Intrusion in network gathers the information related to unauthorized access, and the exploitation of several vulnerabilities raised by attacks. This paper presents the detailed survey of strategies involved...
As Internet of Things advances, various smart objects and services permeate in our living environment. Due to their dynamic join/leave behaviors, service discovery protocols (SDPs) have been proposed. As new SDPs are introduced and legacy SDPs evolve, the incompatible islands of smart objects inevitably arise. To solve this issue, many research works are presented, but they cannot accommodate a new...
Although argumentation has been a prominent topic of research in artificial intelligence and in particular agent communication, there has been little work on practical (but provably sound) argumentation approaches integrated with agent programming languages. In this paper, we develop a formally-grounded mechanism for practical argumentation-based dialogues in an agent platform based on a multi-agent...
Knowledge base is a key component of a dialogue agent which determines its usability, performance as well as intelligence. Usually one type of knowledge source is tailored towards specific application or task. One challenge for developing multiple-domain dialogue agents is how to represent the domain knowledge in their respective ways for the best efficiency and easy construction of queries from natural...
Every sensor in sensor network creates a large amounts of data, and each has its own characteristics and attributes according to its specific purpose. All of these data, while usually stored as a database, will be further processed by a collector node to obtain specific information, both in the temporal and spatial perspective. Although each sensor is autonomous, all of the data generated by each...
This paper concerns 4-valued logic as a basis for decision support system. We extend classic logic containing 2 values T, F with additional values C (contradiction) and U (uncertainty). This values are introduced for processing contradictory and incomplete information. We consider a generalized interpretation of arguments which determines predicate values for subsets. As a demonstration we consider...
E-commerce transactions rely on end-to-end protocols to provide security guarantees when messages are sent through intermediaries. If autonomous entities with different security requirements are to collaborate, protocols providing end-to-end security must be synthesized at runtime. However, such an approach is predicated on finding security primitives and ways of expressing interdependencies between...
Software-defined networks (SDN), an emergent paradigm for network management, define abstractions to represent network entities and logically centralize them in a network controller. We argue that SDN's abstraction is the most promising way to successfully create agent-based architectures to control and manage large-scale parts of the Internet. This article makes a strong case for these architectures...
In automated multi-attribute negotiation, negotiation agent can get a better deal by using heuristic methods to make effective tradeoff or concession between different attributes. In this paper, we proposed a multi-attribute negotiation model based on internal factors argumentation which allows exchanging private information as argumentation, and then can reach ideal results without complex computation...
In recent years, the uses of ambient intelligence technologies have been strengthened such that the results promise to revolutionize daily human life by making people's surroundings flexible and adaptive. A sub branch of this technology is the design of smart home systems. Because these systems are dedicated to be used to improve the quality of life comfort and security while taking into accounts...
The OpenFlow architecture is a proposal from the Clean Slate initiative to define a new Internet architecture where the network devices are simple, and the control and management plane is performed by a centralized controller. The simplicity and centralization architecture makes it reliable and inexpensive. However enterprise network administrators are not familiar with this new concept of network...
We study the feasibility of multi-channel beaconing for efficient data dissemination in vehicular networks. Beaconing, i.e., sending small one-hop broadcasts in a periodic fashion, is now a state of the art method for information dissemination in vehicular networks. The main research challenge is to minimize the communication delay while efficiently using the wireless medium without ever overloading...
This paper proposes a platform which allows to evaluate the performance of an Embodied Conversational Agent and the influence of several distinct multimedia elements. Using the “Imitation Game” as described by Alan Turing as a starting point and motivation, the platform allows the configuration of several features which influence the Virtual environment. Through a series of user tests and surveys...
Heterogeneous network infrastructures have always been part of the public Internet as well as production systems in enterprise and industrial environments. The coexistence of multiple communication technologies and systems from multiple vendors still represents management cost and reliability challenges mainly due to the lack of interoperability at the network management plane. In this paper, we outline...
This paper addresses the challenges faced by everyday Web users, who interact with inherently heterogeneous and distributed information. Managing such data is currently beyond the skills of casual users. We describe ongoing work that has as its goal the development of foundations for declarative distributed data management. In this approach, we see the Web as a knowledge base consisting of distributed...
This research focuses on justifications in an audit context. An argumentation framework based on the formal model of justification logic is applied for audit dialogues in the fish industry. Different forms of justifications used in audit like net persuasive evidence, breadth of issues, and framing evidence are formalised in the proposed framework.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.