Nitin Kumar Yadav RMIT University, Melbourne Minor thesis for semester 2, 2009, under the supervision of Dr. Sebastian.

Slides:



Advertisements
Similar presentations
Pat Langley Computational Learning Laboratory Center for the Study of Language and Information Stanford University, Stanford, California
Advertisements

Heuristic Search techniques
CoopIS2001 Trento, Italy The Use of Machine-Generated Ontologies in Dynamic Information Seeking Giovanni Modica Avigdor Gal Hasan M. Jamil.
Announcements Course TA: Danny Kumar
4b Lexical analysis Finite Automata
Task Analysis EDU 553 – Principles of Instructional Design Dr. Steve Broskoske.
EECS 20 Lecture 38 (April 27, 2001) Tom Henzinger Review.
CPSC 322, Lecture 4Slide 1 Search: Intro Computer Science cpsc322, Lecture 4 (Textbook Chpt ) January, 12, 2009.
Validating Streaming XML Documents Luc Segoufin & Victor Vianu Presented by Harel Paz.
Progress Report 11/1/01 Matt Bridges. Overview Data collection and analysis tool for web site traffic Lets website administrators know who is on their.
HAS. Patterns The use of patterns is essentially the reuse of well established good ideas. A pattern is a named well understood good solution to a common.
Architectural Design Principles. Outline  Architectural level of design The design of the system in terms of components and connectors and their arrangements.
Outline Chapter 1 Hardware, Software, Programming, Web surfing, … Chapter Goals –Describe the layers of a computer system –Describe the concept.
Regular Expressions and Automata Chapter 2. Regular Expressions Standard notation for characterizing text sequences Used in all kinds of text processing.
Chapter 9 Turing Machine (TMs).
1 Turing Machines. 2 A Turing Machine Tape Read-Write head Control Unit.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Chapter 11: Artificial Intelligence
INRIA Sophia-Antipolis, Oasis team INRIA Rhône-Alpes, Vasy team Feria–IRIT/LAAS, SVF team Toulouse GET - ENST Paris, LTCI team FIACRE Models and Tools.
Nitin Kumar Yadav RMIT University, Melbourne Minor thesis - semester 2, 2009, under the supervision of Dr. Sebastian Sardina,
WAES 3308 Numerical Methods for AI
Model Based Conformance Testing for Extensible Internet Protocols Anastasia Tugaenko Scientific Adviser: Nikolay Pakulin, PhD.
Benjamin Gamble. What is Time?  Can mean many different things to a computer Dynamic Equation Variable System State 2.
Department of Electrical Engineering, Southern Taiwan University Robotic Interaction Learning Lab 1 The optimization of the application of fuzzy ant colony.
Decision Making.
Project Life Cycles.
Overview of Previous Lesson(s) Over View  An NFA accepts a string if the symbols of the string specify a path from the start to an accepting state.
1 Knowledge Representation. 2 Definitions Knowledge Base Knowledge Base A set of representations of facts about the world. A set of representations of.
Evolving Virtual Creatures & Evolving 3D Morphology and Behavior by Competition Papers by Karl Sims Presented by Sarah Waziruddin.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
Chapter 1 Introduction Chapter 1 Introduction 1 st Semester 2015 CSC 1101 Computer Programming-1.
18 April 2005CSci 210 Spring Design Patterns 1 CSci 210.
Haley: A Hierarchical Framework for Logical Composition of Web Services Haibo Zhao, Prashant Doshi LSDIS Lab, Dept. of Computer Science, University of.
TRANSITION DIAGRAM BASED LEXICAL ANALYZER and FINITE AUTOMATA Class date : 12 August, 2013 Prepared by : Karimgailiu R Panmei Roll no. : 11CS10020 GROUP.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Introduction to State Machine
Chapter 9: Structured Data Extraction Supervised and unsupervised wrapper generation.
Computer Organization & Programming Chapter 5 Synchronous Components.
Understanding and using patterns in software development EEL 6883 Software Engineering Vol. 1 Chapter 4 pp Presenter: Sorosh Olamaei.
Reliability-Based Design Methods of Structures
Generators 1 Object Oriented Generators in Java Michael Chu & Nicholas Weaver.
Data Structures and Algorithms Dr. Tehseen Zia Assistant Professor Dept. Computer Science and IT University of Sargodha Lecture 1.
Tetris Agent Optimization Using Harmony Search Algorithm
CSCI 4310 Lecture 2: Search. Search Techniques Search is Fundamental to Many AI Techniques.
Chapter 8: Adaptive Networks
Software Quality and Safety Pascal Mbayiha.  software engineering  large, complex systems  functionality, changing requirements  development difficult.
CPSC 322, Lecture 4Slide 1 Search: Intro Computer Science cpsc322, Lecture 4 (Textbook Chpt ) Sept, 12, 2012.
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
1 Turing Machines and Equivalent Models Section 13.1 Turing Machines.
Principles in the Evolutionary Design of Digital Circuits J. F. Miller, D. Job, and V. K. Vassilev Genetic Programming and Evolvable Machines.
Layers Architecture Pattern Source: Pattern-Oriented Software Architecture, Vol. 1, Buschmann, et al.
Design of a Notification Engine for Grid Monitoring Events and Prototype Implementation Natascia De Bortoli INFNGRID Technical Board Bologna Feb.
Week 8 Computational Level
ELIMINATING UNIT PRODUCTIONS
Turing’s Thesis.
8. Introduction to Turing Machines
Sequential Flexibility
Chapter 11: Artificial Intelligence
Unified Modeling Language
Turing Machines.
Turing’s Thesis Costas Busch - RPI.
Chapter 9 TURING MACHINES.
High-Level Abstraction of Concurrent Finite Automata
Theory of Computation Turing Machines.
8. Introduction to Turing Machines
The Sentient Web: IoT + graphs + AI/ML
XRN4658 – OTR UNCVR Amendment
Chap. 3 BOTTOM-UP PARSING
Old Dominion University Department of Computer Science
Presentation transcript:

Nitin Kumar Yadav RMIT University, Melbourne Minor thesis for semester 2, 2009, under the supervision of Dr. Sebastian Sardina, RMIT university Implementation and analysis of simulation based techniques for behavior composition

Behavior Composition Simulation Techniques Implementation Analysis Contents

Behavior Composition 3 What is a behavior ? Behavior – Logic of a machine – Web service – Stand alone component Abstracted as finite transition systems Available behaviors can be non-deterministic B1B2

Behavior Composition 4 Combining available behaviors to realize a target behavior Available behaviors Target behavior (virtual) T1 Can we realize T1 by composing B1 and B2 ? B1B2

Behavior Composition 5 Combined finite transition system of available behaviors ‘composed’ transition system of available behaviors B1 B2 Asynchronous product of B1 and B2

Behavior Composition 6 Combined finite transition system of available behaviors B1 B2 Asynchronous product of B1 and B2 ‘composed’ transition system of available behaviors

Behavior Composition 7 Combined finite transition system of available behaviors B1 B2 Asynchronous product of B1 and B2 Can this behave like the target system ?

Simulation 8 A transition system T1 simulates another transition system T2 iff T1 can ‘mimic’ all the states of T2 A state in the available system mimics another state in the target system if: – It can do all the actions that the target state can do – The successor state in the available system as a result of such an action simulates the resulting state in the target system Simulation is a relation of states of the composed system and the states of the target behavior which can be ‘mimicked’.

t Simulation 9 Example Available behaviors Target System {, } … Simulation Relation simulation relation is a solution to the behavior Composition problem ! How to calculate it ?

Techniques 10 Two approaches for behavior composition Regression based approach [Sardina,Patrizi & De Giacomo, KR 2008] Progression based approach [Stroeder & Pagnucco, 2009, IJCAI 2009] Proceedings of Principles of Knowledge Representation and Reasoning (KR), pages , Sydney, Australia, September AAAI Press. Accepted for the IJCAI 2009

Techniques 11 Regression based approach [Sardina, Patrizi, De Giacomo] Assume each state in the available system simulates each state in the target system Iteratively remove non-conformant links which don’t’ follow the simulation definition i.e., – Can not perform the actions which can be requested in the matching target state – The successor state of the action does not follow the above rule Stop when no more links can be removed

t Regression based approach 12 Example Available behaviors Target System {, } Assume each state from available behaviors simulates each state In the target system

t Regression based approach 13 Example Available behaviors Target System {, } Each Cycle : step 1 – remove the States which can not perform the Actions of the linked target state

t Regression based approach 14 Example Available behaviors Target System {, } Each Cycle : step 2 – remove the States whose successor states are not in the simulation relation X Continue till no more links can be removed

Techniques 15 Progression based approach [Stroder & Pagnucco] Start from the initial state Iteratively add conformant links between the states of the composed system and the target system Stop when no more links can be added

t Progression based approach 16 Example Available behaviors Target System {, } Start from states those ‘can Mimic the initial state

t Progression based approach 17 Example Available behaviors Target System {, } Iteratively add links

t Progression based approach 18 Example Available behaviors Target System {, } Iteratively add links X

Implementation 19 Implementation of both the techniques on a common platform Implement both approaches on a common platform – Java Prototype implementation available. 1.TLV implementation for deterministic available behaviors is available, but not for non-deterministic behaviors. Symfony is another system, but Lacks some of the components.

Analysis 20 Comparing the speed of the techniques Measure the speed of both the algorithms for the problems Design benchmark problems – Hand crafted Problems for which a known solution exists Problems for which a solution does not exist – Randomly generated problems – Variation in size and number of available behaviors If time left in minor thesis – Study algorithm’s behavior with respect to Varying degrees of non determinism in available behaviors

Questions ? Comparing the speed of the techniques