Results 1 to 10 of about 160,838 (160)

Active-sensing-based decentralized control of autonomous mobile agents for quick and smooth collision avoidance [PDF]

open access: yesFrontiers in Robotics and AI, 2022
There is an increasing demand for multi-agent systems in which each mobile agent, such as a robot in a warehouse or a flying drone, moves toward its destination while avoiding other agents.
Takeshi Kano   +5 more
doaj   +2 more sources

A Model-Based Approach for Adaptable Middleware Evolution in WSN Platforms

open access: yesJournal of Sensor and Actuator Networks, 2021
Advances in technology call for a parallel evolution in the software. New techniques are needed to support this dynamism, to track and guide its evolution process. This applies especially in the field of embedded systems, and certainly in Wireless Sensor
Walter Tiberti   +4 more
doaj   +1 more source

Detection of Hidden Moving Targets by a Group of Mobile Agents with Deep Q-Learning

open access: yesRobotics, 2023
In this paper, we propose a solution for the problem of searching for multiple targets by a group of mobile agents with sensing errors of the first and the second types.
Barouch Matzliach   +2 more
doaj   +1 more source

Mobile crowdsensing with mobile agents [PDF]

open access: yesAutonomous Agents and Multi-Agent Systems, 2015
We introduce mobile agents for mobile crowdsensing. Crowdsensing campaigns are designed through different roles that are implemented as mobile agents. The role-based tasks of mobile agents include collecting data, analyzing data and sharing data in the campaign.
Leppänen, T. (Teemu)   +4 more
openaire   +2 more sources

DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2014
Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes.
M. Rahmaninia, E. Bigdeli, M. Zaker
doaj   +1 more source

Vulnerability Detection on Android Apps–Inspired by Case Study on Vulnerability Related With Web Functions

open access: yesIEEE Access, 2020
Nowadays, people's lifestyle is more and more dependent on mobile applications (Apps), such as shopping, financial management and surfing the internet. However, developers mainly focus on the implementation of Apps and the improvement of user experience ...
Jiawei Qin   +5 more
doaj   +1 more source

Asynchronous Gathering in a Dangerous Ring

open access: yesAlgorithms, 2023
Consider a set of k identical asynchronous mobile agents located in an anonymous ring of n nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the same node, not a priori decided, within a finite amount of time.
Stefan Dobrev   +3 more
doaj   +1 more source

Implementation of scalable intelligent systems and applications based on mobile agents

open access: yesИзвестия высших учебных заведений. Поволжский регион:Технические науки, 2023
Background. A method for implementing a distributed metacomputer application in a computer network environment is proposed and tested in practice, based on the integrated use of a domain-specific multi-agent system and the concept of agent-oriented ...
Vladimir I. Volchikhin   +3 more
doaj   +1 more source

Cooperation on Interdependent Networks by Means of Migration and Stochastic Imitation

open access: yesEntropy, 2020
Evolutionary game theory in the realm of network science appeals to a lot of research communities, as it constitutes a popular theoretical framework for studying the evolution of cooperation in social dilemmas.
Sayantan Nag Chowdhury   +4 more
doaj   +1 more source

Conceptual Approach to Utilisation of the Unmanned Aerial Vehicles in Diverse Activities [PDF]

open access: yesInterdisciplinary Description of Complex Systems, 2017
This paper considers current situation and development of software for group of mobile agents applicable on group of unmanned aerial vehicles. Generally, unmanned aerial vehicles are used for transfer of information, mass and energy and their group work ...
Jelena Ćosić Lesičar
doaj   +1 more source

Home - About - Disclaimer - Privacy