適性化多代理人網際網路環境資訊偵搜 Collaborative Multiagent Adaptation for Business Environmental Scanning through the Internet 劉瑞瓏 Rey-Long Liu 中華大學資訊管理系 中華民國 92 年 11.

Slides:



Advertisements
Similar presentations
ATFM Priorities Evaluation Study Alison Hudgell QinetiQ
Advertisements

Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
Distributed Scheduling in Supply Chain Management Emrah Zarifoğlu
DR. MOHD. RUMZI TAUSIF ASST. PROF. (MKT) SBS Unit 1 Nature and Scope of Marketing Research.
Effective Coordination of Multiple Intelligent Agents for Command and Control The Robotics Institute Carnegie Mellon University PI: Katia Sycara
Small-world Overlay P2P Network
Chapter 12: Web Usage Mining - An introduction
WebMiningResearch ASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
Quality of Service in IN-home digital networks Alina Albu 23 October 2003.
Improving Robustness in Distributed Systems Jeremy Russell Software Engineering Honours Project.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
Adaptive Sampling in Distributed Streaming Environment Ankur Jain 2/4/03.
21 21 Web Content Management Architectures Vagan Terziyan MIT Department, University of Jyvaskyla, AI Department, Kharkov National University of Radioelectronics.
Web Mining Research: A Survey
WebMiningResearch ASurvey Web Mining Research: A Survey By Raymond Kosala & Hendrik Blockeel, Katholieke Universitat Leuven, July 2000 Presented 4/18/2002.
Towards a Better Understanding of Web Resources and Server Responses for Improved Caching Craig E. Wills and Mikhail Mikhailov Computer Science Department.
1 Hybrid Agent-Based Modeling: Architectures,Analyses and Applications (Stage One) Li, Hailin.
Self Adaptive Software
Distributed Rational Decision Making Sections By Tibor Moldovan.
Web Mining Research: A Survey
WebMiningResearchASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007 Revised.
Efficient Data Mining for Path Traversal Patterns CS401 Paper Presentation Chaoqiang chen Guang Xu.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Developing Intelligent Agents and Multiagent Systems for Educational Applications Leen-Kiat Soh Department of Computer Science and Engineering University.
Peer-to-peer archival data trading Brian Cooper and Hector Garcia-Molina Stanford University.
University of Kansas Data Discovery on the Information Highway Susan Gauch University of Kansas.
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
Introduction to Databases Transparencies 1. ©Pearson Education 2009 Objectives Common uses of database systems. Meaning of the term database. Meaning.
FALL 2012 DSCI5240 Graduate Presentation By Xxxxxxx.
Game Theory and Privacy Preservation in Recommendation Systems Iordanis Koutsopoulos U of Thessaly Thalis project CROWN Kick-off Meeting Volos, May 11,
Computer Measurement Group, India Reliable and Scalable Data Streaming in Multi-Hop Architecture Sudhir Sangra, BMC Software Lalit.
Incremental Mining of Information Interest for Personalized Web Scanning Rey-Long Liu ( 劉瑞瓏 ) Dept. of Medical Informatics Tzu Chi University.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Research paper: Web Mining Research: A survey SIGKDD Explorations, June Volume 2, Issue 1 Author: R. Kosala and H. Blockeel.
Adaptive News Access Daniel Billsus Presented by Chirayu Wongchokprasitti.
Introduction to Marketing Research
© 2007 Tom Beckman Features:  Are autonomous software entities that act as a user’s assistant to perform discrete tasks, simplifying or completely automating.
Lecture 9: Knowledge Discovery Systems Md. Mahbubul Alam, PhD Associate Professor Dept. of AEIS Sher-e-Bangla Agricultural University.
ASG - Towards the Adaptive Semantic Services Enterprise Harald Meyer WWW Service Composition with Semantic Web Services
Mutual Exclusion in Wireless Sensor and Actor Networks IEEE SECON 2006 Ramanuja Vedantham, Zhenyun Zhuang and Raghupathy Sivakumar Presented.
ANTs PI Meeting, Nov. 29, 2000W. Zhang, Washington University1 Flexible Methods for Multi-agent distributed resource Allocation by Exploiting Phase Transitions.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Copyright 2000 Prentice Hall5-1 Chapter 5 Marketing Information and Research: Analyzing the Business Environment.
Chapter 12: Web Usage Mining - An introduction Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher, M.
Using the Right Method to Collect Information IW233 Amanda Murphy.
CHAPTER 12 Descriptive, Program Evaluation, and Advanced Methods.
1 Murat Ali Bayır Middle East Technical University Department of Computer Engineering Ankara, Turkey A New Reactive Method for Processing Web Usage Data.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Semantic Wordfication of Document Collections Presenter: Yingyu Wu.
1 Service Charge and Energy- Aware Vertical Handoff in Integrated IEEE e/ Networks Youngkyu Choi and Sunghyun Choi School of Electrical Engineering.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
Maximization of System Lifetime for Data-Centric Wireless Sensor Networks 指導教授:林永松 博士 具資料集縮能力無線感測網路 系統生命週期之最大化 研究生:郭文政 國立臺灣大學資訊管理學研究所碩士論文審查 民國 95 年 7 月.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Xiao Liu 1, Yun Yang 1, Jinjun Chen 1, Qing Wang 2, and Mingshu Li 2 1 Centre for Complex Software Systems and Services Swinburne University of Technology.
 Tree in Sensor Network Patrick Y.H. Cheung, and Nicholas F. Maxemchuk, Fellow, IEEE 3 rd New York Metro Area Networking Workshop (NYMAN 2003)
What is Web Information retrieval from web Search Engine Web Crawler Web crawler policies Conclusion How does a web crawler work Synchronization Algorithms.
Self-Organized Web Usage Regularities. Problems of foraging information on WWW Slow accession Difficulty in finding useful information is related to balkanization.
Learning for Physically Diverse Robot Teams Robot Teams - Chapter 7 CS8803 Autonomous Multi-Robot Systems 10/3/02.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Presented by Yu-Shun Wang Advisor: Frank, Yeong-Sung Lin Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for networks of Honeypots.
An Adaptive User Profile for Filtering News Based on a User Interest Hierarchy Sarabdeep Singh, Michael Shepherd, Jack Duffy and Carolyn Watters Web Information.
Marketing Research & the Internet Research processes Types of data.
Introduction to Marketing Research
Capriccio – A Thread Model
DDoS Attack Detection under SDN Context
Spectrum Sharing in Cognitive Radio Networks
Presentation transcript:

適性化多代理人網際網路環境資訊偵搜 Collaborative Multiagent Adaptation for Business Environmental Scanning through the Internet 劉瑞瓏 Rey-Long Liu 中華大學資訊管理系 中華民國 92 年 11 月 18 日

2 Outline Introduction –Business Environmental Scanning through the Internet (ES) –User-Centered, Continuous, and Resource-Bounded ES (UCRES): Goal & challenges –Intelligent Multiagent Technology Multiagent Adaptation for UCRES –Overview of AESA –The Scanning Agents –The Controlling Agent Experiment Conclusion

3 Introduction Business Environmental Scanning through the Internet (ES) –A routine activity for collecting information of interest (IOI) from the WWW Information about various entities such as the government, competitors, customers, and partners –Supporting the businesses to respond to the newest status of the environment in a timely manner

4 UCRES: User-centered, Continuous, and Resource-bounded ES –Goal & clallenges Finding IOI continuously –Timeliness (TES): minimizing the average time delay of finding IOI –Completeness (CES): maximizing the percentage of IOI found Controlling the resource consumed –Effectiveness (EES): maximizing the possibility of finding IOI in each inquiry of data Considering the preferences of the user (i.e. adding importance weights to TES, CES, and EES) –Weighted TES –Weighted CES –Weighted EES

5 Related multiagent technology for UCRES –Information gathering agents Aiming to satisfy users' "one-shot" needs, e.g. –Intelligently locating the information with the additional consideration of time/cost/quality tradeoffs, and –Filter out irrelevant information But when and how frequently to scan for IOI? –Information monitoring agents Aiming to monitor a predefined set of targets periodically or adaptively But where to find the IOI to monitor?

6 –Adaptive agents for decision support Aiming to provide tailored information for supporting decision making Adapting to what to monitor by observing the user’s preference and/or problem solving strategies But when and how frequently to scan for IOI? –Multiagent coordination & bidding Aiming to resolve conflicts and build consensus among the agents But how to define a coordination and/or bidding protocol for UCRES?

7 –Learning for multiagent coordination, bidding, and organization Aiming to learn –How the actions affect each other, –What information is required for coordination, –When to trigger agent coordination, –Usage of what the agents are bidding for, –Restructuring of the organization for coordination and collaboration But how to simultaneously adapt to –User’s preference –IOI’s distribution in the Internet –Update behavior of the IOI –Limited amount of resource

8 Multiagent Adaptation for UCRES AESA: Adaptive ES Agents –A scalable society of autonomous agents A set of scanning agents A controlling agent –Basic rules of the agent society Collaborating for satisfying the user’s information needs Sharing the limited amount of resource –Adaptation to … User’s preference IOI’s distribution in the Internet Update behavior of the IOI Limited amount of resource

9 Overview of AESA System Administrator Notification Evaluate Scanning Agent 3 Controlling Agent Terminate Adjust Resource AESA Spawn Scanning Agent 1 Scanning Agent 2 Scanning Agent n Information Preferences Resource Limit User 1 User 2 User m Monitoring Discovery Intranet The WWW Information Space

10 Behavior of each Scanning Agent (1) Goal = Set of information preferences to be satisfied by the agent; (2) Target = Target web site from which the agent is delegated to find IOI; (3) ResourceU = Upper bound of resource consumption by the agent; Repeat (4) If the agent is ready to retrieve information (according to ResourceU), (4.1) Retrieve information from Target; (4.2) If new information is found, (4.2.1) Issue a Type-E request to get (DegreeOfSatisfaction, SatisfiedGoal); (4.2.2) Aliveness = Aliveness *  + DegreeOfSatisfaction; (4.2.3) Trigger suitable procedures, including event logging and user notification; (4.2.4) If Aliveness  , for each target d found in the new information, ( ) Issue a Type-S request to spawn a new agent (4.3) If the agent succeeds two times, issue a Type-R-More request for more resource; (4.4) If the agent fails two times, issue a Type-R-Less request for releasing resource; (5) If an information preference is no longer valid, remove the need from Goal; Until Aliveness   or Goal is empty; (6) Terminate the agent by issuing a Type-T request.

11 Behavior of the Controlling Agent (1)  = Upper bound of the resource that may be consumed by the system; Repeat (2) If a user enters a new preference e, generate an agent (if necessary and possible); (3) If a user removes an information preference e, inform all agents to remove e; (4) If there is a Type-R-Less request from agent k, (4.1) Release (from k)  1 percents of resource; (5) If there a Type-R-More request from agent k, (5.1) Allocate (to k)  2 percents of additional resource (by agent aliveness); (6) If there is a Type-E request from agent k, (6.1) Reply k with DegreeOfSatisfaction =  (DOS e *Importance e ), for each goal e; (7) If there is a Type-S request to spawn a new agent, (7.1) Reply the requesting agent with  (if possible); (8) If there is a Type-T request from agent k, terminate k and release all resource of k; (9) If there is no response from k for a long time, terminate k and release all resource of k; Until the system is terminated.

12 Experiment Three dimensions of the update behavior of a web site w whose central category is c: (1) When to update: following exponential update The probability of updating w in time interval x follows the probability density function f(x)= e - x, where is the average update frequency of w. (2) Which part to update: (2a) Main content is updated with a probability of 0.5. (2b) Embedded hyperlinks are updated with a probability of 0.5. (3) Way to update: preserving information relatedness (3a) New main content is still of category c. (3b) Let s be the semantic difference between a new hyperlink and c: (3b1) 60% new hyperlinks link to those having s  1. (3b2) 30% new hyperlinks link to those having 2  s  3. (3b3) 10% new hyperlinks link to those having s  4. Simulating the dynamic information space

13 Simulating users’ dynamic preferences The importance of an information preference may be dynamic due to various factors in business administration (e.g. evolutions of internal strategic goals, sales seasons) and external environmental events Among the 100 possible categories of interest, 10 categories were randomly selected as users' information preferences to be satisfied. Each preference k was initially associated with a random importance level I k (0 < I k  1), which could be dynamically changed. The timing of changing I k followed the exponential probability density function f(x) =  e -  x as well, where  was the average frequency of changing I k. For each preference k,  randomly ranged from 1/3000 to 1/2000 (time/seconds).

14 The systems evaluated –AESA Basic setting –For the controlling agent: »  1 =  2 =20, »  = 1 inquiry per second, »  = 1 inquiry per 200 seconds Variants –AESA-1 »For the scanning agents,  =0.5,  =0.5, and  =0.3 –AESA-2 »For the scanning agents,  =0.6,  =0.6, and  =0.3 –Recall that,  is related to agent cloning,  is related to agent aliveness evaluation, and  is related to agent termination.  AESA-1 has a more dynamic agent society than AESA-2 (the agents are easier to be generated and terminated)

15 –BestFirstD Aiming to represent the way of employing best-first discovery to UCRES It was allowed to continuously traverse through the information space (rather than performing "one-shot" traversal) It preferred the most promising hyperlinks when traversing the information space To avoid duplicated traversals, if there were multiple attempts trying to traverse to a web site w for a user interest, only one traversal was conducted Variants –BestFirstD-1 and BestFirstD-2, which selected those hyperlinks whose semantic differences with the user interest were less than or equal to 1 and 2, respectively. –Obviously BestFirstD-2 could traverse a larger space than BestFirstD-1.

16 –BestDPeriodicalM Aiming to represent the way of integrating information discovery with information monitoring It integrated best-first discovery (i.e. BestFirstD) with periodical monitoring, which was the most popular monitoring technique in environmental scanning –Once a web site is discovered, BestDPeriodicalM determined a fixed monitoring frequency randomly ranging from 1/10 to 1/1000 query/seconds (this was a “mercy” to BestDPeriodicalM) Variants –BestDPeriodicalM-1 and BestDPeriodicalM-2, which selected those hyperlinks whose semantic differences with the user interest were less than or equal to 1 and 2, respectively –Obviously BestDPeriodicalM-2 could traverse a larger space than BestDPeriodicalM-1.

17 Results (average of 30 runs)

18 Results (average of 30 runs)

19 Improvements TES: 191% WTES: 252% EES: 1220% WEES: 1586% CES: 1157% WCES: 1413%

20 Conclusion Finding more IOI in a timelier manner using less resource Collaborative Multiagent Adaptation –Multiagent: Scalable ES –Collaborative: Sharable resource and findings –Adaptation: Adjustable ES for dynamic Information spaces (distribution & update behaviors of IOI), User preferences, and Resource upper bounds