Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses and Dissertations

2012

Computer Sciences

Multiagent systems

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Decentralized Riemannian Particle Filtering With Applications To Multi-Agent Localization, Martin J. Eilders Jun 2012

Decentralized Riemannian Particle Filtering With Applications To Multi-Agent Localization, Martin J. Eilders

Theses and Dissertations

The primary focus of this research is to develop consistent nonlinear decentralized particle filtering approaches to the problem of multiple agent localization. A key aspect in our development is the use of Riemannian geometry to exploit the inherently non-Euclidean characteristics that are typical when considering multiple agent localization scenarios. A decentralized formulation is considered due to the practical advantages it provides over centralized fusion architectures. Inspiration is taken from the relatively new field of information geometry and the more established research field of computer vision. Differential geometric tools such as manifolds, geodesics, tangent spaces, exponential, and logarithmic mappings are used …


Mfire-2: A Multi Agent System For Flow-Based Intrusion Detection Using Stochastic Search, Timothy J. Wilson Mar 2012

Mfire-2: A Multi Agent System For Flow-Based Intrusion Detection Using Stochastic Search, Timothy J. Wilson

Theses and Dissertations

Detecting attacks targeted against military and commercial computer networks is a crucial element in the domain of cyberwarfare. The traditional method of signature-based intrusion detection is a primary mechanism to alert administrators to malicious activity. However, signature-based methods are not capable of detecting new or novel attacks. This research continues the development of a novel simulated, multiagent, flow-based intrusion detection system called MFIRE. Agents in the network are trained to recognize common attacks, and they share data with other agents to improve the overall effectiveness of the system. A Support Vector Machine (SVM) is the primary classifier with which agents …