This paper presents an autonomic system based on ontologies and intelligentagents for use in information security, aiming to protect the computing infrastructure and information technology from malicious agents. Theoretical support for the research development was grounded on concepts from Information Science and Computer Science. The results of using the proposed system in a simulated environment are presented. A strategy for system evaluation was performed to check the system use in simulated scenarios to verify and analyze the potential of the proposed tool and its autonomic functioning in activities of information security. The evaluation consisted in the execution of denial of service attacks (DoS) and SYN Flooding. The AutoCore achieved the desired objectives. The results show that the AutoCore is a suitable tool for the treatment and utilization of information with regard to information security, enabling those responsible for Risk Management and Information Security Management to make strategic decisions alignment of Information and Communication Technologies Security with the business processes of organizations.
several actions that must to be made before the information gets to the data mining agent. These actions are: data cleaning, data integra- tion, transformation and pattern discovery. Market space Executive – It ensures that probable crisis situations are detected early and avoided by taking suitable action. Useful patterns discovered by data mining will be path analysis and clusters and classification rules to avoid crisis situations. This kind of situations from the past are analyzed and classified from different viewpoints. Data mining techniques for this agency are very important because they help agents to identi- fied easier and better fatal situations. This agency includes: strategic planner (allows the user to provide domain knowledge, de- fine long term plans and objectives of the system, define rules and constraints, identify critical items and situations that need to be monitored, define the cause-effect relation- ships, establish rules and course of action for the sentinels), sentinel to track critical /strategic items (consists of a group of dae- mons witch continuously monitor the state of market space), readiness assessor sentinel (ensures that strategic plans can be fulfilled by the resources), demand forecasting manager (breaks down plans into resources and material that need to be provided. It also builds the contract term necessary to main- tain the inventory) and sentinel tracking contract terms (is a daemon the monitors the system to alert against any deviation from the contracts).
registered in a rulebase, which is an index of all rules and their corresponding weights. Please note that there may be several rulebases, one for every agent class in the videogame. An agent class is the generic name for all computer controlled agents in a videogame sharing the same behavior. Each rule may optionally contain a condition clause that limits its applicability based on the current game state. In the case of Dynamic Scripting, it is assumed that rules are created manually, though previous work has focused on the automatic creation of rules . Each individual rule in the set of rules has a single weight value associated with it. In the beginning of the learning process, each rule starts with the same weight value, previously defined. Rules in the rulebase never change; instead their weight values are updated to translate their usability in the game. This is one of the most important components of the algorithm, as the performance of the behavior script can only be as good as the rules that it contains.
IntelligentAgents: Intelligentagents are software entities that carry out some set of operations on behalf of a user with some degree of independence or autonomy, and in doing so, employ some knowledge or representation of the user’s goals or desires. Software agents are useful in automating repetitive tasks, finding and filtering information, intelligently summarizing complex data, and so on, but more importantly, just like their human counterparts, intelligentagents can have capability to learn from the managers and even make recommendations to them regarding a particular course of action. 
The lower layers of this structure (Unicode, URI, XML, NameSpaces) are well-known and widely used means within modern Web-based systems. The Resource Description Framework (RDF) is an infrastructure that enables encoding, interchange and reuse of structured metadata. RDF provides a means for adding semantics to a document. Information is stored in the form of RDF statements understandable by appropriate intelligentagents, search engines and browsers [6, 7]. The RDF statements may be (and usually) expressed in XML (although it is an optional syntax). RDF-Schema (RDFS) allows describing a hierarchy of basic classes and relations between classes and instances. RDF and RDFS provide modelling primitives that can be extended according to user’s needs.
In 1999, a project at the information-Technology Promotion Agency (IPA) in Japan involved an intrusion Detection Agent (IDA) system . IDA is a classic hot-based system that relies on mobile agents mainly to trace intruder among the various hosts involved in an intrusion. In the same year the project MICAEL  pursued a more ambitious aim where the entire system is based on adaptive intelligentagents. Nevertheless, only the architecture description has been presented and no details have followed so far. In 2000, an IDS framework based on mobile intelligentagents has been described in . Unfortunately, detection is dealt with superficially. In 2002,  describes an IDS designed as a mobile application that roams the network to detect
The work of Zhu et al. (2016) addresses the use of self-healing, in the distribution network, through services for troubleshooting, isolation, and restoring, employing resources as multiple interacting intelligentagents and mining technology, and others as parsing of a big quantity of information. This work employs new technologies, such as relays applicable to power networks, developed under new processing techniques, in addition to proposing the use of agents, who recover services from the distribution network, being regulators and buses, from state and sub-state. The implementation of the system with multiple agents uses the Java programming language and JADE (Java Agent Development Framework).
In  is given an interesting overview of the approach to the problem of Fuzzy Control. Our approach differs from the mentioned, the fact that in addition to proposed methods of formalization we taking into account the principles of situational control, artificial intelligence and others. This allows realizing fuzzy control in situation, which unknown in advance. At the same time, we have developed modelling techniques  based on the managed data, information and knowledge  that allows finding relevant solution with the desired accuracy in the circumstances. This accuracy is implemented using intelligentagents of analysis, decision- making, planning and others  by using the values of fuzzy membership function.
Intelligentagents should have the ability of adaptive reasoning. They must have the capability to access information from other sources or agents and perform actions leading to the completion of some task. Also, they must control over their internal state and behavior and work together to perform useful and complex tasks. Thus, they should be able to examine the external environment and the success of previous actions taken under similar conditions and adapt their actions as in .
As shown in the system, the intelligentagents are child and sister detailed described in the paper. Child is walking during the continuous interaction with sister. The child can do some emergency events, such as crossed the street, when the distance between child and sister is longer than apperceive critical value. Meanwhile, the child can make Self-regulated Learning according to knowledge acquisition and knowledge evolution, and make the specific behavior decision by the brave value and danger value. There are many selective behaviors for the child in complex scenario, and the selection of many behaviors should be defined a behavior utility flow to each behaviors which is updated by local apperceive interaction. And the child can select the appropriate action according to the behavior utility flow finally. Active learning uses action functions with different weights to make active behavior correspondingly as the environment changed. 4.2 Random Walking without Interaction
Progressive achievement paradigm  made itself known in the domain of intelli- gent systems because, on one hand is a rea- sonable method, and on the other hand, it is the only approach that allows handling of the unstructured requests of the final users, and knowledge acquisition difficulties exceeding. Intelligent agent paradigm is new, standing at the confluence of artificial intelligence and networking and computer science. Intelligentagents, in fact they are expert systems with artificial intelligence, used for data mining and even for formal knowledge discovery. “An intelligent agent  is a real or abstract entity capable of acting on its own and on its environment, has a partial representation on this environment. In a multi-agent environ- ment it can communicate with other agents and its behaviour is the consequence of its observations, its knowledge and interaction with other agents.”
In this section we present the results obtained for each configuration described in the previous section. As previ- ously mentioned, the results for empirical evaluation were obtained from thirty 60-second iterations. In order to as- sess the statistical significance of the result differences between agents we used one-way Analysis of Variance (ANOVA) (Penny and Henson, 2006). Since the assump- tion of homogeneity of variances was violated, we used the Welch’s t-test (Welch, 1947) and the Games-Howell post- hoc test (Games and Howell, 1976). Unless explicitly stated, assume that the result differences are statistically significant. The results for human evaluation are based on the answers of 15 subjects.
surface transportation networks . Transportation is considered the driving force for any country. Maintaining a safe, smooth, and secure road network is the key for improving the mobility and quality of citizens’ life. During the last years more attention was directed towards traffic safety. During 2008 there was 43,017 fatal crashes on Roadway, USA , this triggered the need for Intelligent Transportation Systems (ITS). ITS is an emerging application that is currently being applied and investigated by many countries .
It is intended, with this work, to develop an energetic resources man- agement intelligent system, based on people behaviours that interact with a given physical space. This system must work alongside with a sensors net- work, from where important information can be collected, in order so that the system can learn. It is through this network that we can collect the in- formation to be learnt (human behaviours and environmental values). This way, we can know, in an approximated way, which user’s actions have more influence in the electric consume and in the natural environment. Through environmental sensors, we can, for instance, to know the hour of the day which a given user have more tendency to spend more electric power by us- ing an air conditioner appliance. This way, it is possible to adapt and evolve the system to better fit the power consume and turn the physical space a sustainable environment.
An initial suggestion was that while priming the stereotype of professors or supermodels leads to behavioral assimilation, priming exemplars such as Albert Einstein (i.e., an intelligent exemplar) or Claudia Schiffer (i.e., a purportedly low-intelligent exemplar) leads to behavioural contrast, revealed as worse performance and improved performance, respectively, in the subsequent general knowledge test . The category/exemplar contrast was subsequently found, however, not to be the key variable. LeBoeuf and Estes (, Experiment 1) tested and found support for the alternative hypothesis that, irrespective of whether it was a category or an exemplar, a prime could produce both behavioural assimilation and contrast depending on how relevant a comparison standard it was perceived to be. Comparison relevance was manipulated by asking participants to list either similarities (high relevance) or differences (low relevance) between themselves and the prime, the idea being that listing self-prime similarities would promote consideration of the prime as a relevant comparison standard and listing self-prime differences would lead to discount- ing the prime as a relevant comparison standard. Different groups of participants were asked to list how similar to (high relevance) or how different from (low relevance) either professors (category prime) or Einstein (exemplar prime) they thought they were. Immediately following the priming manipulation, they were asked to answer multiple-choice general knowledge questions. The results showed that participants in the low-relevance conditions (where they listed differences) performed better than the partic- ipants in the high-relevance conditions (where they listed similarities).
interface into a wireless communication, with the use of devices such as the NPort Z3150 (Moxa, Brea, USA)  or the Waspmote (Libelium, Zaragoza, Spain)  that can be programmed to reach that goal. A major field of current research consists in developing intelligent systems capable of integrating environmental data, to improve efficiency in the use of resources and to enable sustainable functioning of man-made utilities. This can be achieved by making an intelligent use of environmental variables forecasts , for applications such as photovoltaic plants and micro-grids [4–6], where global radiation and air temperature forecasts play an important role, in agricultural applications [7,8] for greenhouse environmental control and irrigation management, in energy management in buildings [9,10], where predictions of solar radiation, air temperature and relative humidity offer the possibility of important energy savings, as well as in sensor networks, with nodes powered by miniature solar harvesters, where forecasts of solar radiation reduces the risk of temporary depletion and increases their utility . These selected works, which are a small subset of a much larger body of research, undoubtedly illustrate the need of a weather station that, besides measurement of atmospheric variables, provides their forecasts autonomously, and makes them available wirelessly to the application at hand.
distorted by the system of measurement. The aim of the deconvolution is to reduce the distortion effect and so to have access to the instantaneous concentration of the polluting agents. A boiler is qualified to the European Standards of Safety if the instantaneous concentration of (C n H m ) is inferior to 10 ppm, 20 sec after his starting.