893 research outputs found
Distributed Artificial Intelligence Solution for D2D Communication in 5G Networks
Device to Device (D2D) Communication is one of the technology components of
the evolving 5G architecture, as it promises improvements in energy efficiency,
spectral efficiency, overall system capacity, and higher data rates. The above
noted improvements in network performance spearheaded a vast amount of research
in D2D, which have identified significant challenges that need to be addressed
before realizing their full potential in emerging 5G Networks. Towards this
end, this paper proposes the use of a distributed intelligent approach to
control the generation of D2D networks. More precisely, the proposed approach
uses Belief-Desire-Intention (BDI) intelligent agents with extended
capabilities (BDIx) to manage each D2D node independently and autonomously,
without the help of the Base Station. The paper includes detailed algorithmic
description for the decision of transmission mode, which maximizes the data
rate, minimizes the power consumptions, while taking into consideration the
computational load. Simulations show the applicability of BDI agents in jointly
solving D2D challenges.Comment: 10 pages,9 figure
An experimental validation of a statistical based damage detection approach
In this thesis, work was completed to validate the accuracy of a developed statistical based damage detection approach. The damage detection approach uses the differences in actual and predicted strains from locations on the bridge caused by heavy five-axle trucks. These differences, called residuals, are then used to construct control charts which compare undamaged and damaged structure data. The validation was achieved by using sacrificial specimens, which modeled damage sensitive locations, were mounted on the bridge and exposed to ambient traffic loads. Different damage levels, simulating cracks or corrosion, were introduced to the sacrificial specimen. Damaged data were compared to undamaged data through the use of control charts and the damage levels were detected. It was also found that damage needed to be close to a sensor in order to be detected by the control chart.
A short sensor attachment study was also completed in this thesis. Issues arose in attaching sensors to concrete therefore multiple sensor attachment techniques were investigated. Through testing in a controlled lab setting it was found that the new techniques were insufficient in transferring strain from the concrete to the sensor. Further study needed to be completed in order to find a satisfactory sensor attachment technique
From raw data to agent perceptions for simulation, verification, and monitoring
In this paper we present a practical solution to the problem of connecting “real world” data exchanged between sensors and actuators with the higher level of abstraction used in frameworks for multiagent systems. In particular, we show how to connect an industry-standard publish-subscribe communication protocol for embedded systems called MQTT with two Belief-Desire-Intention agent modelling and programming languages: Jason/AgentSpeak and Brahms. In the paper we describe the details of our Java implementation and we release all the code open source
From raw data to agent perceptions for simulation, verification, and monitoring
In this paper we present a practical solution to the problem of connecting “real world” data exchanged between sensors and actuators with the higher level of abstraction used in frameworks for multiagent systems. In particular, we show how to connect an industry-standard publish-subscribe communication protocol for embedded systems called MQTT with two Belief-Desire-Intention agent modelling and programming languages: Jason/AgentSpeak and Brahms. In the paper we describe the details of our Java implementation and we release all the code open source
Agent organisations: from independent agents to virtual organisations and societies of agents
Real world applications using agent-based solutions can include many agents
that needs to communicate and interact with each other in order to meet their
objectives. In organisations; Agent open multi-agent systems, problems can
include not only the organisation of a large number of agents, but can also be
heterogeneous and of unpredictable provenance or behavior. An overview of
the alternatives for dealing with these problems is presented, highlighting the
way they try to solve or mitigate them. This approach allows the development of
complex systems in which there are agents that show very different behaviours
and that are able to adapt to unforeseen changes in the environment. This
makes it possible to simulate socio-technical or natural environments and
observe their possible evolution without the ethical considerations involved in
experimenting in real environments.This work has been developed as part of “Virtual-Ledgers-TecnologĂas DLT/Blockchain y Cripto-IOT sobre organizaciones virtuales de agentes ligeros y su aplicaciĂłn en la eficiencia en el transporte de Ăşltima milla”, ID SA267P18, project financed by Junta Castilla y LeĂłn, ConsejerĂa de EducaciĂłn, and FEDER funds. It has been partially supported by the European Regional Development Fund (ERDF) through the Interreg Spain-Portugal V-A Program (POCTEP) under grant 0631_DIGITEC_3_E (Smart growth through the specialization of the cross-border business fabric in advanced digital technologies and blockchain.)
Multi-agent simulations for emergency situations in an airport scenario
This paper presents a multi-agent framework using Net- Logo to simulate humanand collective behaviors during emergency evacuations. Emergency situationappears when an unexpected event occurs. In indoor emergency situation, evacuation plans defined by facility manager explain procedure and safety ways tofollow in an emergency situation. A critical and public scenario is an airportwhere there is an everyday transit of thousands of people. In this scenario theimportance is related with incidents statistics regarding overcrowding andcrushing in public buildings. Simulation has the objective of evaluating buildinglayouts considering several possible configurations. Agents could be based onreactive behavior like avoid danger or follow other agent, or in deliberative behaviorbased on BDI model. This tool provides decision support in a real emergencyscenario like an airport, analyzing alternative solutions to the evacuationprocess.Publicad
Development of virtual cities models during emergencies
L'abstract è presente nell'allegato / the abstract is in the attachmen
Multi-agent Communication Protocols with Emergent Behaviour
The emergent behaviour of a multiagent system depends on the component agents and how
they interact. A critical part of interaction between agents is communication. This thesis
presents a multi-agent system communication model for physical moving agents. The work
presented in this thesis provides all the tools to create a physical multi-agent communication
system. The model integrates different agent technologies at both the micro and macro level.
The micro structure involves the architecture of the individual components in the system
whilst the macro structure involves the interaction relationships between these individual
components in the system.
Regarding the micro structure of the system, the model provides the description of a
novel hybrid BDI-Blackboard architectured agent that builds-in a hybrid of reactive and
deliberative agent. The macro structure of the system, provided by this model, provides
the operational specifications of the communication protocols. The thesis presents a theory
of communication that integrates an animal intelligence technique together with a cognitive
intelligence one. This results in a local co-ordination of movements, and global task coordination.
Accordingly, agents are designed to communicate with other agents in order to
coordinate their movements via a set of behavioural rules. These behavioural rules allow
a simple directed flocking behaviour to emerge. A flocking algorithm is used because it
satisfies a major objective, i.e. it has a real time response to local environmental changes
and minimises the cost of path planning. A higher level communication mechanism is
implemented for task distribution that is carried out via a blackboard conversation and
ii
negotiation process with a ground based controller. All the tasks are distributed as team
tasks. A novel utilization of speech acts as communication utterances through a blackboard
negotiation process is proposed.
In order to implement the proposed communication model, a virtual environment is
built that satisfies the realism of representing the agents, environment, and the sensors
as well as representing the actions. The virtual environment used in the work is built
as a semi-immersive full-scale environment and provides the visualisation tools required
to test, modify, compare and evaluate different behaviours under different conditions. The
visualization tools allow the user to visualize agents negotiations and interacting with them.
The 3D visualisation and simulation tools allow the communication protocol to be tested and
the emergent behaviour to be seen in an easy and understandable manner. The developed
virtual environment can be used as a toolkit to test different communication protocols and
different agent’s architecture in real time
Modeling and Verification of Agent based Adaptive Traffic Signal using Symbolic Model Verifier
This paper addresses the issue of modeling and verification of a Multi Agent
System (MAS) scenario. We have considered an agent based adaptive traffic
signal system. The system monitors the smooth flow of traffic at intersection
of two road segment. After describing how the adaptive traffic signal system
can efficiently be used and showing its advantages over traffic signals with
predetermined periods, we have shown how we can transform this scenario into
Finite State Machine (FSM). Once the system is transformed into a FSM, we have
verified the specifications specified in Computational Tree Logic(CTL) using
NuSMV as a model checking tool. Simulation results obtained from NuSMV showed
us whether the system satisfied the specifications or not. It has also showed
us the state where the system specification does not hold. Using which we
traced back our system to find the source, leading to the specification
violation. Finally, we again verified the modified system with NuSMV for its
specifications.Comment: 13 pages, 6 figures, Submitted to International Journal of Computer
Application (IJCA
- …