Multi-agent systems are subfield of Artificial Intelligence that has experienced rapid growth because of its flexibility and intelligence in order to solve distributed problems. Multi-agent systems (MAS) have got interest from various researchers in different disciplines for solving sophisticated problems by dividing them into smaller tasks. These tasks can be assigned to agents as autonomous entities with their private database, which act on their environment, perceive, process, retain and recall by using multiple inputs. MAS can be defined as a network of individual agents that share knowledge and communicate with each other in order to solve a problem that is beyond the scope of a single agent. It is imperative to understand the characteristics of the individual agent or computing entity to distinguish a simple distributed system and multi-agent system. To solve each task, the agent can take the appropriate actions, decisions, and can cooperate with other agents to fulfill its goals or objectives. MAS has several applications including cloud computing, web advertisement, e-commerce, computer network, learning abilities, etc. This survey represents a comprehensive discussion of all aspects of MAS, and discusses an overview of MAS definitions, architecture, features, communications, organizations, and finally discusses the some of the real practical applications.
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
The futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu
... Show MoreKetoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0
... Show MoreBackground: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. T
... Show MoreThe electric submersible pump, also known as ESP, is a highly effective artificial lift method widely used in the oil industry due to its ability to deliver higher production rates compared to other artificial lift methods. In principle, ESP is a multistage centrifugal pump that converts kinetic energy into dynamic hydraulic pressure necessary to lift fluids at a higher rate with lower bottomhole pressure, especially in oil wells under certain bottomhole condition fluid, and reservoir characteristics. However, several factors and challenges can complicate the completion and optimum development of ESP deployed wells, which need to be addressed to optimize its performance by maximizing efficiency and minimizing costs and uncertainties. To
... Show MoreUltrasound is a mechanical energy which can generate altering zones of compression and rarefaction along its path in the tissues. Ultrasound imaging can provide a real time screening for blood and multiple organs to aiding the diagnostic and treatment. However, ultrasound has the potential to deposit energy in the blood and tissues causing bio effects which is depending on ultrasound characteristics that including frequency and the amount of intensity. These bio effects include either a stable cavitation presented non thermal effects or inertial cavitation of harmful effect on the tissues. The non-thermal cavitation can add features in diagnostic imaging and treatment more than the inertial cavitation. Ultrasound Contrast agents are a micro
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More