- Service-Oriented Architecture and Web Services
- Distributed and Parallel Computing Systems
- Mobile Agent-Based Network Management
- Semantic Web and Ontologies
- Scientific Computing and Data Management
- Multi-Agent Systems and Negotiation
- Network Security and Intrusion Detection
- Business Process Modeling and Analysis
- Advanced Database Systems and Queries
- Personal Information Management and User Behavior
- Distributed systems and fault tolerance
- Peer-to-Peer Network Technologies
- Blockchain Technology Applications and Security
- Access Control and Trust
- Computational Physics and Python Applications
- Scheduling and Optimization Algorithms
- Web Data Mining and Analysis
- ICT in Developing Communities
- Biomedical Text Mining and Ontologies
- Digital Transformation in Industry
- Usability and User Interface Design
- Cryptography and Data Security
- Cloud Data Security Solutions
- Optimization and Search Problems
- Machine Fault Diagnosis Techniques
Slovak Academy of Sciences
2011-2024
Institute of Informatics of the Slovak Academy of Sciences
2012-2024
Institute of Informatics and Statistics
2013
Maintenance is a key factor to ensure the production efficiency, since occurrence of unexpected failures leads degradation system performance, causing loss productivity and business opportunities, which are crucial roles achieve competitiveness. The article aims propose reference architecture will improve way maintenance considered in current manufacturing world, by enabling an overall increase rates, while increasing operational equipment effectiveness decreasing impact needs. This...
This paper proposes a concept of low-cost industrial wireless sensor network integrating the power consumption efficient ESP32 chip. The main focus is given on best practices various sensors integration into Real-Time Operating System (RTOS) devices. work an architecture for data collection, security and possibility analysis. Energy effectiveness estimated battery usage in different modes last part this presents conclusions guidelines future work. Road map distributed modeling framework...
In this article we aim at achieving trusted data collection from heterogeneous distributed sources including legacy systems and human end users. We adopt an agent-like approach where are able to send agents host platforms connected systems. Functionality of may vary while solving the trust between platforms, agents. had not used any existing multi-agent system but extended production grade service platform called Jini implemented above services. The core work is about how adopted also...
Supporting emergency responders with mobile software agents promise increasing the efficiency of crisis management. While offer many advantages, they also pose new challenges to security. However, security is a key prerequisite in situations. A main requirement create an agent execution environment that will not attack agents.
We present a system for semantically-aided workflow management SOA-based grid environment. The user can construct workflows of and web services just by stating the intended result, see its dynamic behavior in graphical form, annotate whole workflow, parts, or results. User experience, constructed workflows, computed results be shared between users. uses monitoring information to adapt changes underlying infrastructure extracting ontologically managed about existing application services. One...
The aim of the Social Network machines (SOON) project is to investigate impact using autonomous social agents optimize manufacturing processes in framework Industry 4.0. In this article, we present multi-agent SOON architecture and built solutions aiming at optimizing scheduling tasks. Two different approaches are proposed. first approach based on an 'auction' paradigm where task assignment decided according capability a machine agent bid for task. second heterarchical network learn...
This paper proposes integration of secure agents with a communication infrastructure in order to provide rapid information gathering platform from various sources and actors participating crisis situation. The role is primarily coordinated collection information. (SCI) provides services for voice data exchange between users systems. A special type agent called User Communication Agent described. enacted through dynamically generated XForms-based questionnaires integrated the user interface...
This article proposes a distributed architecture designed for management of crisis situations were multiple actors are involved from various organizations with different competences and communicating over IP-based networks including wireless devices. In such settings requirements exist secure communication trusted collection data sources. The role agents in the proposed is primarily coordinated information. respect to overall agent infrastructure must be secure, robust fail resistant system....
The paper presents the techniques for supervised information extraction and change notification of Web resources. method uses combination wrapping or scraping integrated to a browser as an extension. A prototype was developed provide proof concept validation moreover identify pros cons proposed solution. focuses on core methods being used structured data from resources users in most appropriate manner. approach has potential share marked elements among taking advantages collaborative...
In this paper we present design and development of the semantic grid services for flood forecasting simulations. We will highlight corresponding architecture process service annotation, discovery composition in project K-WfGrid [12]. describe detail challenges flood-forecasting application oriented model, which is based on well known Web Service Resource Framework (WSRF). Semantic descriptions WSRF be presented as architecture, exploits semantics services. Further, demonstrate how experience...
This article proposes a mobile agent platform based on Jini services deployed over IP-based networks. The role of agents in the proposed architecture is primarily coordinated collection information. overall infrastructure designed as secure, robust and fail resistant system. Trust for can be special hardware module which provides trusted computing functionality. In we describe such terms requirements design. Core types are to access different kinds distributed resources. Specialized legacy...