Study on Trustworthy Interaction-Chain of Human-Information System in Distributed Cooperative Manufacturing Environment

Article Preview

Abstract:

In order to solve the problem of untrustworthy interactive process in distributed cooperative manufacturing environment, we proposed a method combining intelligent agent and interactive Process Control. The method inserts a trustworthy interaction management layer between users and information system. The management layer includes 5 agents. Interaction agent and negotiation agent track and collect data of interactive behavior; monitor agent maintain global clock to guaranty temporal consistency; assessment and analysis agent used for determining whether abnormal interactive behaviors; and feedback agent used for giving user prompt and early warning. To use this method, we constructed a trustworthy interaction chain of human-information system based on intelligent agent technology. Due to the each link of the chain is monitoring and managing by the management layer, the trustworthiness of interaction process is guaranteed.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 201-203)

Pages:

824-829

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu Ke, Shan Zhi-guang, He Ji-feng, et al. Bulletin of National Natural Science Foundation of China, 2008, 22(3): 145-151.

Google Scholar

[2] Jiang Dan-dong, Zhang Shen-sheng, Chen Lu. Journal of Computer Engineering and Applications, 2002, (9): 13-16.

Google Scholar

[3] Samsonova M, Pisarev A, Kozlov K, et al. Journal of Proceedings of Data Integration in the Life Sciences, DILS, 2006, LNBI 4075: 204-215.

Google Scholar

[4] Long Hong-neng,Wang Wei-min,Ge Peng,etc. Journal of Computer Engineering and Applications,2007,43(20):235-239.

Google Scholar

[5] Fang Ke, Yang Ming. Journal of Computer Simulation, 2004, 21(8): 194-197.

Google Scholar

[6] Zhang Zhi-yong,Yang Lin,Ma Jianfeng,etc. Journal of Huazhong University of Science and Technology (Nature Science Edition), 2008, 36(1): 59-62.

Google Scholar

[7] HU Yao-guang, WANG Tian-miao, WANG Jia-shun, etc. Journal of Systems Engineering and Electronics, 2002, 24(1): 17-20.

Google Scholar

[8] Zhou Jian-feng, Chen Guo-hua1, Wan Mu-sheng, etc. Journal of South China University of Technology (Natural Science Edition), 2007, 35(9): 107-112.

Google Scholar

[9] Ilarri S, Mena E, Illarramendi A. Information Sciences, 2008, 178(9): 2105-2127.

Google Scholar

[10] Elaine G T. Journal of the American Society for Information Science and Technology, 2002, 53(10): 855–862.

Google Scholar

[11] Larry L C. Trusted interaction: user control and system responsibilities in interaction design for information systems. Proceedings of Advanced Information Systems Engineering (CAiSE 2006), LNCS 4001: 20-30.

Google Scholar

[12] Muneo K, Peter G P. International Journal of Human-Computer Studies, 1995, 43(1): 65-99.

Google Scholar

[13] Paul B D. Interacting With Computers, 1999, 11(6): 699-720.

Google Scholar

[14] Shuping Y, Wencai Y. Influencing factors and action mechanism of Human-IS interactive efficiency within enterprise computerization environment [D]. Proceedings of the 7th Asia-Pacific Conference on Computer Human Interaction, Taipei, Taiwan, China. 2006. 10: 11-14.

Google Scholar

[15] Xue Weimin, Shi Zhiguo, Gu Xuejing, etc. Computer Engineering and Applications, 2002, 38(19): 6-8.

Google Scholar

[16] Hiroshi G O, Kazuhiro N. Human-robot interaction through real-time auditory and visual multiple-talker Tracking [D]. IEEE/RSJ, 2001: 1402-1409.

Google Scholar

[17] Li Yi, Luo Yi, Shi Chun-yi. Journal of Software, 1999, 10(7): 702-708.

Google Scholar

[18] Andrew S P. Building trustworthy software agents [D]. IEEE Internet Computing, 2002: 46-53.

Google Scholar