893 research outputs found

    Distributed Artificial Intelligence Solution for D2D Communication in 5G Networks

    Full text link
    Device to Device (D2D) Communication is one of the technology components of the evolving 5G architecture, as it promises improvements in energy efficiency, spectral efficiency, overall system capacity, and higher data rates. The above noted improvements in network performance spearheaded a vast amount of research in D2D, which have identified significant challenges that need to be addressed before realizing their full potential in emerging 5G Networks. Towards this end, this paper proposes the use of a distributed intelligent approach to control the generation of D2D networks. More precisely, the proposed approach uses Belief-Desire-Intention (BDI) intelligent agents with extended capabilities (BDIx) to manage each D2D node independently and autonomously, without the help of the Base Station. The paper includes detailed algorithmic description for the decision of transmission mode, which maximizes the data rate, minimizes the power consumptions, while taking into consideration the computational load. Simulations show the applicability of BDI agents in jointly solving D2D challenges.Comment: 10 pages,9 figure

    An experimental validation of a statistical based damage detection approach

    Get PDF
    In this thesis, work was completed to validate the accuracy of a developed statistical based damage detection approach. The damage detection approach uses the differences in actual and predicted strains from locations on the bridge caused by heavy five-axle trucks. These differences, called residuals, are then used to construct control charts which compare undamaged and damaged structure data. The validation was achieved by using sacrificial specimens, which modeled damage sensitive locations, were mounted on the bridge and exposed to ambient traffic loads. Different damage levels, simulating cracks or corrosion, were introduced to the sacrificial specimen. Damaged data were compared to undamaged data through the use of control charts and the damage levels were detected. It was also found that damage needed to be close to a sensor in order to be detected by the control chart. A short sensor attachment study was also completed in this thesis. Issues arose in attaching sensors to concrete therefore multiple sensor attachment techniques were investigated. Through testing in a controlled lab setting it was found that the new techniques were insufficient in transferring strain from the concrete to the sensor. Further study needed to be completed in order to find a satisfactory sensor attachment technique

    From raw data to agent perceptions for simulation, verification, and monitoring

    Get PDF
    In this paper we present a practical solution to the problem of connecting “real world” data exchanged between sensors and actuators with the higher level of abstraction used in frameworks for multiagent systems. In particular, we show how to connect an industry-standard publish-subscribe communication protocol for embedded systems called MQTT with two Belief-Desire-Intention agent modelling and programming languages: Jason/AgentSpeak and Brahms. In the paper we describe the details of our Java implementation and we release all the code open source

    From raw data to agent perceptions for simulation, verification, and monitoring

    Get PDF
    In this paper we present a practical solution to the problem of connecting “real world” data exchanged between sensors and actuators with the higher level of abstraction used in frameworks for multiagent systems. In particular, we show how to connect an industry-standard publish-subscribe communication protocol for embedded systems called MQTT with two Belief-Desire-Intention agent modelling and programming languages: Jason/AgentSpeak and Brahms. In the paper we describe the details of our Java implementation and we release all the code open source

    Agent organisations: from independent agents to virtual organisations and societies of agents

    Get PDF
    Real world applications using agent-based solutions can include many agents that needs to communicate and interact with each other in order to meet their objectives. In organisations; Agent open multi-agent systems, problems can include not only the organisation of a large number of agents, but can also be heterogeneous and of unpredictable provenance or behavior. An overview of the alternatives for dealing with these problems is presented, highlighting the way they try to solve or mitigate them. This approach allows the development of complex systems in which there are agents that show very different behaviours and that are able to adapt to unforeseen changes in the environment. This makes it possible to simulate socio-technical or natural environments and observe their possible evolution without the ethical considerations involved in experimenting in real environments.This work has been developed as part of “Virtual-Ledgers-Tecnologías DLT/Blockchain y Cripto-IOT sobre organizaciones virtuales de agentes ligeros y su aplicación en la eficiencia en el transporte de última milla”, ID SA267P18, project financed by Junta Castilla y León, Consejería de Educación, and FEDER funds. It has been partially supported by the European Regional Development Fund (ERDF) through the Interreg Spain-Portugal V-A Program (POCTEP) under grant 0631_DIGITEC_3_E (Smart growth through the specialization of the cross-border business fabric in advanced digital technologies and blockchain.)

    Multi-agent simulations for emergency situations in an airport scenario

    Get PDF
    This paper presents a multi-agent framework using Net- Logo to simulate humanand collective behaviors during emergency evacuations. Emergency situationappears when an unexpected event occurs. In indoor emergency situation, evacuation plans defined by facility manager explain procedure and safety ways tofollow in an emergency situation. A critical and public scenario is an airportwhere there is an everyday transit of thousands of people. In this scenario theimportance is related with incidents statistics regarding overcrowding andcrushing in public buildings. Simulation has the objective of evaluating buildinglayouts considering several possible configurations. Agents could be based onreactive behavior like avoid danger or follow other agent, or in deliberative behaviorbased on BDI model. This tool provides decision support in a real emergencyscenario like an airport, analyzing alternative solutions to the evacuationprocess.Publicad

    Development of virtual cities models during emergencies

    Get PDF
    L'abstract è presente nell'allegato / the abstract is in the attachmen

    Multi-agent Communication Protocols with Emergent Behaviour

    Get PDF
    The emergent behaviour of a multiagent system depends on the component agents and how they interact. A critical part of interaction between agents is communication. This thesis presents a multi-agent system communication model for physical moving agents. The work presented in this thesis provides all the tools to create a physical multi-agent communication system. The model integrates different agent technologies at both the micro and macro level. The micro structure involves the architecture of the individual components in the system whilst the macro structure involves the interaction relationships between these individual components in the system. Regarding the micro structure of the system, the model provides the description of a novel hybrid BDI-Blackboard architectured agent that builds-in a hybrid of reactive and deliberative agent. The macro structure of the system, provided by this model, provides the operational specifications of the communication protocols. The thesis presents a theory of communication that integrates an animal intelligence technique together with a cognitive intelligence one. This results in a local co-ordination of movements, and global task coordination. Accordingly, agents are designed to communicate with other agents in order to coordinate their movements via a set of behavioural rules. These behavioural rules allow a simple directed flocking behaviour to emerge. A flocking algorithm is used because it satisfies a major objective, i.e. it has a real time response to local environmental changes and minimises the cost of path planning. A higher level communication mechanism is implemented for task distribution that is carried out via a blackboard conversation and ii negotiation process with a ground based controller. All the tasks are distributed as team tasks. A novel utilization of speech acts as communication utterances through a blackboard negotiation process is proposed. In order to implement the proposed communication model, a virtual environment is built that satisfies the realism of representing the agents, environment, and the sensors as well as representing the actions. The virtual environment used in the work is built as a semi-immersive full-scale environment and provides the visualisation tools required to test, modify, compare and evaluate different behaviours under different conditions. The visualization tools allow the user to visualize agents negotiations and interacting with them. The 3D visualisation and simulation tools allow the communication protocol to be tested and the emergent behaviour to be seen in an easy and understandable manner. The developed virtual environment can be used as a toolkit to test different communication protocols and different agent’s architecture in real time

    Modeling and Verification of Agent based Adaptive Traffic Signal using Symbolic Model Verifier

    Full text link
    This paper addresses the issue of modeling and verification of a Multi Agent System (MAS) scenario. We have considered an agent based adaptive traffic signal system. The system monitors the smooth flow of traffic at intersection of two road segment. After describing how the adaptive traffic signal system can efficiently be used and showing its advantages over traffic signals with predetermined periods, we have shown how we can transform this scenario into Finite State Machine (FSM). Once the system is transformed into a FSM, we have verified the specifications specified in Computational Tree Logic(CTL) using NuSMV as a model checking tool. Simulation results obtained from NuSMV showed us whether the system satisfied the specifications or not. It has also showed us the state where the system specification does not hold. Using which we traced back our system to find the source, leading to the specification violation. Finally, we again verified the modified system with NuSMV for its specifications.Comment: 13 pages, 6 figures, Submitted to International Journal of Computer Application (IJCA
    • …
    corecore