期刊文献+
共找到2,788篇文章
< 1 2 140 >
每页显示 20 50 100
基于多Agent模型的网络协同探测系统
1
作者 刘妍蕾 李勇 +2 位作者 韩俊飞 王鹏 王蓓 《沈阳工业大学学报》 北大核心 2025年第2期265-272,共8页
【目的】在网络技术迅猛发展的背景下,传统网络探测技术因效率和准确性不高,难以适应复杂的网络管理需求。尤其在电力通信网中,网络流量、结构和负载的统计与管理变得复杂,导致网络安全事件发生时,网络管理技术人员难以迅速提出有效的... 【目的】在网络技术迅猛发展的背景下,传统网络探测技术因效率和准确性不高,难以适应复杂的网络管理需求。尤其在电力通信网中,网络流量、结构和负载的统计与管理变得复杂,导致网络安全事件发生时,网络管理技术人员难以迅速提出有效的补救方案,影响互联网服务质量和社会秩序。因此,提出了基于多Agent模型的网络协同探测系统,旨在提高网络探测的效率和准确性。【方法】通过综合使用主动和被动探测的网络拓扑算法,并集成多种Agent和动态决策机制,显著提升了网络探测的效率和准确性。主动式探测技术利用Traceroute算法发现网络中的活动设备和开放端口,而被动式探测技术根据SNMP等协议收集网络流量中的详细信息,两者结合获得更完整的网络资产视图。设计了融合主动式与被动式网络探测技术的模块部署与技术架构,并建立了分布式探测系统组织结构。【结果】仿真实验与分析结果表明,在相同测试环境和流程下,与单一的被动式和主动式网络探测系统相比,网络协同探测系统在耗时较少的情况下,具有更强的通信性能和更短的探测时间。【结论】网络协同探测系统在仿真实验中展现出优越的通信性能和探测效率,能够在短时间内探知到更多的主机,且数据流量更大,覆盖范围更广,进一步验证了该系统的可行性和有效性。实际测试中,在包含多种操作系统的复杂网络环境下,基于多Agent模型的网络协同探测系统探知到的主机数量最多,且能够明确主机操作系统的组成。该系统不仅提高了网络探测的效率和准确性,而且对实时性要求较高的应用场景具有重要意义,有助于提升网络管理的响应速度和处理能力,对网络安全和优化具有重要的理论和实践价值。对于能够满足广泛工程需求的网络协同探测系统而言,其理论机理及探测时间仍然存在一定的优化和提升空间,这也是网络探测研究领域的核心问题。 展开更多
关键词 网络探测 agent模型 拓扑信息 决策算法 简单网络管理协议 地址解析协议 通信机制
在线阅读 下载PDF
知识传播的动态分层复杂Agent网络模型研究
2
作者 赵业清 《河南工程学院学报(自然科学版)》 2025年第2期71-76,80,共7页
为真实反映社会关系网络中各知识主体间的复杂关系,研究网络结构与知识传播之间的相互影响,解析网络系统知识动态演化过程的内在规律,提出了一种动态分层复杂Agent网络模型。首先把复杂网络理论和多Agent仿真技术融合,在知识传播网络模... 为真实反映社会关系网络中各知识主体间的复杂关系,研究网络结构与知识传播之间的相互影响,解析网络系统知识动态演化过程的内在规律,提出了一种动态分层复杂Agent网络模型。首先把复杂网络理论和多Agent仿真技术融合,在知识传播网络模型中引入动态分层网络理论,通过赋予Agent不同等级层次及配置概率矩阵,生成满足要求的社会关系网络,然后根据定义的知识传播规则实现知识网络的动态演化。以动态分层复杂Agent网络理论为基础构建的社会网络模型能真实反映现实知识网络的社会结构特性,故在所建知识网络模型基础上仿真分析了不同网络层知识主体个性特质,以及知识主体参与知识传播意愿和初始传播者比例对知识传播及知识网络演化过程的影响机制。复杂网络和多Agent技术的有机融合,可为多维度描述和揭示知识网络动态演化规律提供技术和手段,也可为进一步提高知识传播效率,改善知识传播途径提供理论支撑。 展开更多
关键词 复杂网络 知识网络 动态分层网络 agent 知识传播
在线阅读 下载PDF
基于Agentic-AI的下一代核心网
3
作者 童文 彭程晖 霍玮 《信息通信技术》 2025年第2期26-31,共6页
文章提出一种基于多智能体构建的新一代核心网架构,称为智能体网络(Agent Core Network,A-CORE)。该架构基于Agentic-AI技术,利用多智能体协同、智能化接口、共享核心组件和生成式网络,能够根据用户意图,一体化定制包括网络功能和第三... 文章提出一种基于多智能体构建的新一代核心网架构,称为智能体网络(Agent Core Network,A-CORE)。该架构基于Agentic-AI技术,利用多智能体协同、智能化接口、共享核心组件和生成式网络,能够根据用户意图,一体化定制包括网络功能和第三方应用功能的工作流,自主部署并执行相应的端到端生成式网络。同时,A-CORE通过环境感知、自反思与优化,确保用户体验和极致的能效表现。基于A-CORE,运营商有望回归到应用服务供给的商业模式,为用户提供前所未有的智能服务体验,实现6G智能互联愿景。 展开更多
关键词 自主性AI 网络大模型 6G 智能体网络 智能化接口 生成式网络
在线阅读 下载PDF
Agent技术下分布式网络混合入侵信息智能检测
4
作者 李小松 《现代电子技术》 北大核心 2025年第20期176-180,共5页
分布式网络具有去中心化特性,没有单一的中心节点控制整个网络,且因数据大部分分散存储在多个节点上的特点,增加了混合入侵信息检测的难度。为此,提出一种Agent技术下分布式网络混合入侵信息智能检测方法。采用多Agent技术将检测任务分... 分布式网络具有去中心化特性,没有单一的中心节点控制整个网络,且因数据大部分分散存储在多个节点上的特点,增加了混合入侵信息检测的难度。为此,提出一种Agent技术下分布式网络混合入侵信息智能检测方法。采用多Agent技术将检测任务分散至各个单元,汇聚分布式网络中的数据信息,并采用主成分分析提取其中的特征向量。再将特征向量作为基于CNN-BiLSTM的入侵检测模型的输入,通过BiLSTM层捕捉其时间维度特征,并采用多头注意力机制整合CNN层、BiLSTM层从而输出入侵检测结果,实现分布式网络混合入侵信息的智能检测。实验结果表明,所提方法可通过对分布式网络信息关键特征的选择,实现入侵信息检测。 展开更多
关键词 入侵信息检测 agent技术 分布式网络 主成分分析 特征向量 多头注意力机制
在线阅读 下载PDF
基于AI Agent的星地融合资源编排关键技术
5
作者 秦瑞艳 王亚鹏 +2 位作者 程志密 徐晖 李慧欣 《天地一体化信息网络》 2025年第3期39-48,共10页
星地融合成为6G网络实现全域无缝覆盖的关键技术。为了应对星地融合面临的异构资源耦合、服务需求多样化等挑战,设计了基于AI Agent的分层协同资源编排架构,并基于该架构提出一种算网协同切片资源编排关键技术。面向网络切片编排中算力... 星地融合成为6G网络实现全域无缝覆盖的关键技术。为了应对星地融合面临的异构资源耦合、服务需求多样化等挑战,设计了基于AI Agent的分层协同资源编排架构,并基于该架构提出一种算网协同切片资源编排关键技术。面向网络切片编排中算力资源分配任务的时空约束问题,构建系统模型并提出DNRM-AIAC算法。仿真结果证明,该算法在不同网络切片数和消息规模场景下的性能均优于传统静态算法和启发式算法。 展开更多
关键词 星地融合 AI agent 资源编排 网络切片 算网协同
在线阅读 下载PDF
基于Agent人工智能的异构网络多重覆盖节点入侵检测系统设计 被引量:7
6
作者 顾正祥 《计算机测量与控制》 2024年第5期17-23,30,共8页
异构网络具有结构复杂、多重覆盖面积大等特征,使得网络入侵检测较为隐蔽,威胁网络运行的安全性;为此,对基于Agent人工智能的异构网络多重覆盖节点入侵检测系统进行了研究;通过检测Agent和通信Agent装设主机Agent,以Cisco Stealthwatch... 异构网络具有结构复杂、多重覆盖面积大等特征,使得网络入侵检测较为隐蔽,威胁网络运行的安全性;为此,对基于Agent人工智能的异构网络多重覆盖节点入侵检测系统进行了研究;通过检测Agent和通信Agent装设主机Agent,以Cisco Stealthwatch流量传感器作为异构网络传感器检测攻击行为,采用STM32L151RDT664位微控制器传输批量数据,由MAX3232芯片实现系统电平转化,实现硬件系统设计;软件部分设计入侵检测标准,采用传感器设备捕获网络实时数据,通过Agent技术解析异构网络协议并提取数据运行特征,综合考虑协议解析结果及与检测标准匹配度,实现异构网络多重覆盖节点入侵检测;经实验测试表明,基于Agent人工智能的异构网络多重覆盖节点入侵检测系统入侵行为的漏检率和入侵类型误检率的平均值仅为6%和5%,能够有效提高检测精度,减小检测误差。 展开更多
关键词 agent人工智能 异构网络 多重覆盖网络 入侵检测系统
在线阅读 下载PDF
Weighted average consensus problem in networks of agents with diverse time-delays 被引量:4
7
作者 Wenhui Liu Feiqi Deng +1 位作者 Jiarong Liang Xuekui Yan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第6期1056-1064,共9页
This paper studies the weighted average consensus problem for networks of agents with fixed directed asymmetric unbalance information exchange topology. We suppose that the classical distributed consensus protocol is ... This paper studies the weighted average consensus problem for networks of agents with fixed directed asymmetric unbalance information exchange topology. We suppose that the classical distributed consensus protocol is destroyed by diverse time-delays which include communication time-delay and self time-delay. Based on the generalized Nyquist stability criterion and the Gerschgorin disk theorem, some sufficient conditions for the consensus of multi-agent systems are obtained. And we give the expression of the weighted average consensus value for our consensus protocol. Finally, numerical examples are presented to illustrate the theoretical results. 展开更多
关键词 networks of agents distributed control weighted average consensus TIME-DELAY digraph theory
在线阅读 下载PDF
Predictive Tracking Control of Network-Based Agents With Communication Delays 被引量:4
8
作者 Tianyong Zhang Guoping Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第6期1150-1156,共7页
This paper investigates the remote tracking control problem of Network-based Agents with communication delays existing in both forward and feedback communication channels.A networked predictive tracking controller is ... This paper investigates the remote tracking control problem of Network-based Agents with communication delays existing in both forward and feedback communication channels.A networked predictive tracking controller is proposed to compensate the negative effects caused by bilateral time-delays in a wireless network.Furthermore,the problem of consecutive data loss in the feedback channel is solved using aforementioned controller,where lateral movement perturbations are introduced.Simulations and experiments are provided for several cases,which verify the realizability and effectiveness of the proposed controller. 展开更多
关键词 Consecutive data loss network-based agents networked predictive control remote tracking time-delay
在线阅读 下载PDF
Node Coverage Algorithms in Wireless Sensor Networks Using Mobile Agents 被引量:9
9
作者 RAINA Manik KUMAR Subhas PATRO Ranjeet 《自动化学报》 EI CSCD 北大核心 2006年第6期915-921,共7页
This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of g... This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of global deployment or topology, etc). We propose the algorithms and show mathematical analysis to support our claims. The paper ends with simulation studies and discussion of results. 展开更多
关键词 Wireless sensor networks mobile agents
在线阅读 下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
10
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
在线阅读 下载PDF
Target Tracking and Obstacle Avoidance for Multi-agent Networks with Input Constraints 被引量:3
11
作者 Jing Yan Xin-Ping Guan +1 位作者 Xiao-Yuan Luo Fu-Xiao Tan 《International Journal of Automation and computing》 EI 2011年第1期46-53,共8页
In this paper, the problems of target tracking and obstacle avoidance for multi-agent networks with input constraints are investigated. When there is a moving obstacle, the control objectives are to make the agents tr... In this paper, the problems of target tracking and obstacle avoidance for multi-agent networks with input constraints are investigated. When there is a moving obstacle, the control objectives are to make the agents track a moving target and to avoid collisions among agents. First, without considering the input constraints, a novel distributed controller can be obtained based on the potential function. Second, at each sampling time, the control algorithm is optimized. Furthermore, to solve the problem that agents cannot effectively avoid the obstacles in dynamic environment where the obstacles are moving, a new velocity repulsive potential is designed. One advantage of the designed control algorithm is that each agent only requires local knowledge of its neighboring agents. Finally, simulation results are provided to verify the effectiveness of the proposed approach. 展开更多
关键词 Target tracking obstacle avoidance multi-agent networks potential function optimal control.
在线阅读 下载PDF
Finite-Time Consensus of a Leader-Following Multi-Agent Network with Non-Identical Nonlinear Dynamics and Time-Varying Topologies 被引量:4
12
作者 YU Le TU Lilan HUANG Yifan 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第5期438-444,共7页
In this paper, the finite-time consensus of a leader-following multi-agent network with non-identical nonlinear dynamics and time-varying topologies is investigated. All the agents, especially the leaders, have non-id... In this paper, the finite-time consensus of a leader-following multi-agent network with non-identical nonlinear dynamics and time-varying topologies is investigated. All the agents, especially the leaders, have non-identical and nonlinear dynamics. According to the algebraic graph theory, Lyapunov stability theory and Kronecker product, a control strategy strategy is established to guarantee the finite-time consensus of multi-agent network with multiple leaders. Furthermore, several numerical simulations illustrate the effectiveness and feasibility of the proposed method. 展开更多
关键词 finite-time consensus leader-following multi-agent network algebraic graph theory Lyapunov stability theory Kronecker product
原文传递
Multi-Agent Network Intrusion Active Defense Model Based on Immune Theory 被引量:2
13
作者 LIU Sunjun LI Tao WANG Diangang HU Xiaoqing XU Chun 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期167-171,共5页
Inspired by the immune theory and multi-agent systems, an immune multi-agent active defense model for network intrusion is established. The concept of immune agent is introduced, and its running mechanism is establish... Inspired by the immune theory and multi-agent systems, an immune multi-agent active defense model for network intrusion is established. The concept of immune agent is introduced, and its running mechanism is established. The method, which uses antibody concentration to quantitatively describe the degree of intrusion danger, is presented. This model implements the multi-layer and distributed active defense mechanism for network intrusion. The experiment results show that this model is a good solution to the network security defense. 展开更多
关键词 artificial immune system intrusion detection system multi-agent system network security
在线阅读 下载PDF
Application of mobile scanning agent in the network security
14
作者 闵君 冯珊 +1 位作者 唐超 梅纲 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期371-376,共6页
To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning a... To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent. 展开更多
关键词 agent network security IMMUNITY agent transfer protocol
在线阅读 下载PDF
Research on Application of Mobile Agent Based on Immune Algorithms in Ad Hoc Network
15
作者 Qinggong Ma Bo Yang 《Journal of Computer and Communications》 2015年第10期31-35,共5页
Ad Hoc network is a kind of multi hop, self-organizing wireless network without center. Each node in network can be used as host as well as router and it can form any network topology through wireless connections. Bec... Ad Hoc network is a kind of multi hop, self-organizing wireless network without center. Each node in network can be used as host as well as router and it can form any network topology through wireless connections. Because of characteristics of itself, many new service items and application fields appear;meanwhile, it is also faced with many new security threats. Using immune agent can perceive the change of network node and make corresponding decision behavior, find the misbehavior nodes in the network as soon as possible and reduce the network attack and improve the immune competence of network. 展开更多
关键词 IMMUNE network Mobile agent Ad HOC network Security
在线阅读 下载PDF
Adaptive Agent Model with Hybrid Routing Selection Strategy for Improving the Road-Network Congestion Problem
16
作者 Bin Jiang Chao Yang Takao Terano 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第6期92-102,共11页
This paper proposes an adaptive agent model with a hybrid routing selection strategy for studying the road-network congestion problem. We focus on improving those severely congested links. Firstly,a multi-agent system... This paper proposes an adaptive agent model with a hybrid routing selection strategy for studying the road-network congestion problem. We focus on improving those severely congested links. Firstly,a multi-agent system is built,where each agent stands for a vehicle,and it makes its routing selection by considering the shortest path and the minimum congested degree of the target link simultaneously. The agent-based model captures the nonlinear feedback between vehicle routing behaviors and road-network congestion status.Secondly,a hybrid routing selection strategy is provided,which guides the vehicle routes adapting to the realtime road-network congestion status. On this basis, we execute simulation experiments and compare the simulation results of network congestion distribution,by Floyd agent with shortest path strategy and our proposed adaptive agent with hybrid strategy. The simulation results show that our proposed model has reduced the congestion degree of those seriously congested links of road-network. Finally,we execute our model on a real road map. The results finds that those seriously congested roads have some common features such as located at the road junction or near the unique road connecting two areas. And,the results also show an effectiveness of our model on reduction of those seriously congested links in this actual road network. Such a bottom-up congestion control approach with a hybrid congestion optimization perspective will have its significance for actual traffic congestion control. 展开更多
关键词 road-network congestion agent model hybrid strategy routing selection
在线阅读 下载PDF
Multi-agent Based Modeling of Manufacturing Network
17
作者 GUO Yuming,SUN Yanming,ZHENG Shixiong (School of Mechanical Engineering,South China University of Technology,Guangzhou 510641,China) 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S1期381-387,共7页
An intelligent manufacturing system is modeled currently from the viewpoint of manufacturing applications,and the network platform’s influence to manufacturing applications is not considered adequately. However any b... An intelligent manufacturing system is modeled currently from the viewpoint of manufacturing applications,and the network platform’s influence to manufacturing applications is not considered adequately. However any bottleneck in service oriented architecture (SOA) for the manufacturing network can affect the agility of the IT environment. In this paper,to achieve a trade-off between manufacturing resources and network resources,the manufacturing network is modeled with multi-agent,in which two kinds of basic elements,the manufacturing application unit and the network carrier of manufacturing information,are presented. And their main characters are described by colored petri net. The manufacturing application model drives the network platform that inversely provides this application model technology supports. The proposed multi-agent system is demonstrated through an example integration scenario involving production plan,resources management and execution subsystems. And the result suggests that analyzing and designing the system architecture of networked manufacturing should give due attention to the operation system as well as manufacturing applications. 展开更多
关键词 MANUFACTURING network model MULTI-agent COLORED PETRI NET SOA
在线阅读 下载PDF
Prediction Model of Antibacterial Activities for Inorganic Antibacterial Agents Based on Artificial Neural Networks 被引量:1
18
作者 刘雪峰 张利 涂铭旌 《Journal of Shanghai University(English Edition)》 CAS 2004年第1期109-112,共4页
Quantitatively evaluation of antibacterial activities of inorganic antibacterial agents is an urgent problem to be solved. Using experimental data by an orthogonal design, a prediction model of the relation between co... Quantitatively evaluation of antibacterial activities of inorganic antibacterial agents is an urgent problem to be solved. Using experimental data by an orthogonal design, a prediction model of the relation between conditions of preparing inorganic antibacterial agents and their antibacterial activities has been developed. This is accomplished by introducing BP artificial neural networks in the study of inorganic antibacterial agents. It provides a theoretical support for the development and research on inorganic antibacterial agents. Key words inorganic antibacterial agent - antibacterial activity - neural networks - nanometer material 展开更多
关键词 inorganic antibacterial agent antibacterial activity neural networks nanometer material
在线阅读 下载PDF
Robust Sequential Covariance Intersection Fusion Kalman Filtering over Multi-agent Sensor Networks with Measurement Delays and Uncertain Noise Variances 被引量:4
19
作者 QI Wen-Juan ZHANG Peng DENG Zi-Li 《自动化学报》 EI CSCD 北大核心 2014年第11期2632-2642,共11页
关键词 KALMAN滤波 传感器网络 测量不确定 噪声方差 网络延迟 多代理 卡尔曼滤波器 协方差
在线阅读 下载PDF
Wireless Network Security: The Mobile Agent Approach
20
作者 Olatunde Abiona Adeniran Oluwaranti +4 位作者 Ayodeji Oluwatope Surura Bello Clement Onime Mistura Sanni Lawrence Kehinde 《International Journal of Communications, Network and System Sciences》 2013年第10期443-450,共8页
The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access ... The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security. 展开更多
关键词 WIRELESS network SECURITY MOBILE agent AUTHENTICATION
在线阅读 下载PDF
上一页 1 2 140 下一页 到第
使用帮助 返回顶部