A simple formalism Artificial intelligence-based to represent knowledge in a multi-agent planning context | Author : Imane Ben | Abstract | Full Text | Abstract :At the start of the simulation, the agent knows nothing about how the dynamics of interaction with the environment unfold, or what causes his sensations. He does not distinguish obstacles from free paths, and he does not know the consequences implied by his actions. Under these conditions, the CALM mechanism was able to converge steadily towards the expected solution, by building a model of the world adequate to represent the regularities of the environment, the regularities of its bodily sensations, as well as to represent the influence regular actions on both. The agent learns about the consequences of his actions in different situations, which are represented by a reduced number of very general diagrams. From them, the mechanism can build an action policy that allows it to avoid affectively negative situations and to seek those that are affectively positive. This solution manages to describe precisely all the regularities that the agent can perceive without building a complete plan of the environment. |
| New Approach Securing the Internet of Things | Author : Sridarala ramu, Daniel Osaku | Abstract | Full Text | Abstract :IOT connected objects are new technologies used to connect objects to the internet and to users. The IOT influences our daily life in several fields such as logistics, health, energy, intelligent vehicles, the smart home or the smart city ... Subsequently, following the specific characteristics of the different areas of use, a multitude IOT applications have been developed and deployed using different IOT frameworks. An IOT framework is a set of rules, protocols and standards that simplify the implementation of IOT applications. The proper functioning and success of these applications depends on the characteristics of the framework, and also on the security mechanisms used. In this article, we will discuss the frameworks used by presenting the proposed architecture of each framework, the compatible hardwares and softwares and the security mechanisms used, then a comparative study of these frameworks will be presented. Finally, we will propose an architecture of a secure IOT framework. |
|
|