نتایج جستجو برای: agent based system

تعداد نتایج: 4641967  

Journal: :Transactions on maritime science 2021

This paper presents a model of agent-based architecture for fighting fires on ships. The introduction agent technology in firefighting decision-making is step towards safe autonomous vessels. human factor can be excluded through the detection and extinguishing onboard aim to reduce number injuries deaths, minimize loss ships cargo. Another advantage its easy interoperability with other automate...

M.H Fazel Zarandi M.H Karimi Gavareshki

This paper presents a multi agent system for the job shop scheduling problems. The proposed system consists of initial scheduling agent, search agents, and schedule management agent. In initial scheduling agent, a modified Shifting Bottleneck is proposed. That is, an effective heuristic approach and can generate a good solution in a low computational effort. In search agents, a hybrid search ap...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مدیریت و حسابداری 1391

the application of e-learning systems - as one of the solutions to the issue of anywhere and anytime learning – is increasingly spreading in the area of education. content management - one of the most important parts of any e-learning system- is in the concern of tutors and teachers through which they can obtain means and paths to achieve the goals of the course and learning objectives. e-learn...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و - پژوهشکده علوم نانو 1392

among the low–dimensional allotropes of carbon, nanotubes and graphene have attracted very much attention from nano–science and nanotechnology specialists. they have been proposed as building blocks in nanometer device engineering. however, these structures are not defect–free. in this thesis, we focused on defective carbon nanotubes and graphene, and studied the effect of couple of very common...

Journal: :journal of advances in computer research 0

in this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition petri nets. the mobile agent system contains two mobile agents called dca and una. it sends out agents to update antivirus on client computers in a network. each agent takes on a specified responsibility. first, dca roams through the network and check the last d...

Journal: :Transactions of the Japanese Society for Artificial Intelligence 2007

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی صنعتی کرمان - پژوهشکده برق و کامپیوتر 1390

a phase-locked loop (pll) based frequency synthesizer is an important circuit that is used in many applications, especially in communication systems such as ethernet receivers, disk drive read/write channels, digital mobile receivers, high-speed memory interfaces, system clock recovery and wireless communication system. other than requiring good signal purity such as low phase noise and low spu...

2008
Régis Newo Klaus-Dieter Althoff

How does someone react when he faces a critical situation in his life? In this paper we present an agent-based model for simulating people’s behaviors in those particular situations. Coping strategies are at the heart of our model and we use some strategies developed in the area of psychology. We show the first step of our implementation architecture. We are currently implementing our model by ...

پایان نامه :دانشگاه بین المللی امام خمینی (ره) - قزوین - دانشکده فنی 1387

به دنبال موفقیت به دست آمده از تحلیل وسایل نقلیه با روش اتوماتای سلولی و عامل-مبنا، این روشها برای بررسی تردد عابرین پیاده در این پژوهش برگزیده شد. قوانین محلی ساده اتوماتای سلولی رفتار هر عابر را توصیف می کند. در تئوری عامل-مبنا، عابرپیاده، وسیله نقلیه، موانع و هر شیئی که در محیط شبیه سازی قرار گرفته باشد به عنوان یک عامل با خصوصیات خاص خود در نظر گرفته می شوند. این عوامل در تعامل و تداخل با ی...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید