A Load Sharing Approach Based on Refactoring of Roles in Multi-Agent Systems Sebnem Bora, A. Murat Tiryaki and Oguz Dikenelli Ege University.

Slides:



Advertisements
Similar presentations
SUPPORT TO DEVELOPMENT OF ANTI-DISCRIMINATORY SCHOOL ENVIRONMENT FOR ROMA NATIONAL MINORITY CHILDREN Minority Rights Center, Belgrade, Serbia.
Advertisements

Design and Evaluation of a Multiagent Team for CLIMA Contest Çetin Meriçli Melih Çelik.
This training module is designed to provide an overview of the Altered Standard of Care protocol for local first responders, ambulance providers, and.
1 Software Testing and Quality Assurance Lecture 13 - Planning for Testing (Chapter 3, A Practical Guide to Testing Object- Oriented Software)
Overview UML Extensions for Agents UML UML Agent UML (AUML) Agent UML (AUML) Agent Interaction Protocols Agent Interaction Protocols Richer Role Specification.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Mobile Agent based Load Balancing for RFID Middlewares Author : Jian Feng Cui and Heung Seok Chae Reporter :郭瓊雯 Professor :童曉儒 老師.
1 Exception Handling in Goal- Oriented Multi-Agent Systems İbrahim Çakırlar, Erdem Eser Ekinci and Oğuz Dikenelli Ege University Computer Engineering Department.
Adding Organizations and Roles as Primitives to the JADE Framework NORMAS’08 Normative Multi Agent Systems, Matteo Baldoni 1, Valerio Genovese 1, Roberto.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
Quality of Service in IN-home digital networks Alina Albu 23 October 2003.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
Managing an established facility: Scenarios for group work Kimmo Koski 26 October 2011.
A Mobile Agent Infrastructure for QoS Negotiation of Adaptive Distributed Applications Roberto Speicys Cardoso & Fabio Kon University of São Paulo – USP.
1 Introduction to Load Balancing: l Definition of Distributed systems. Collection of independent loosely coupled computing resources. l Load Balancing.
Managing Agent Platforms with SNMP Brian Remick Research Proposal Defense June 27, 2015.
Grid Load Balancing Scheduling Algorithm Based on Statistics Thinking The 9th International Conference for Young Computer Scientists Bin Lu, Hongbin Zhang.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Strategies for Implementing Dynamic Load Sharing.
“Multi-Agent Systems for Distributed Data Fusion in Peer-to-Peer Environment” Smirnova Vira ”Cheese Factory”/
Lecture Nine Database Planning, Design, and Administration
Market-Driven Multi-Agent Collaboration in Robot Soccer Domain Presented by Barış Kurt.
Computer Systems & Architecture Lesson Software Product Lines.
CONTENTS:-  What is Event Log Service ?  Types of event logs and their purpose.  How and when the Event Log is useful?  What is Event Viewer?  Briefing.
Object-Oriented Analysis and Design
Function A function is a relation in which, for each distinct value of the first component of the ordered pair, there is exactly one value of the second.
Chapter 9 Database Planning, Design, and Administration Sungchul Hong.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Collectively Cognitive Agents in Cooperative Teams Jacek Brzeziński, Piotr Dunin-Kęplicz Institute of Computer Science, Polish Academy of Sciences Barbara.
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
Load Balancing in Distributed Computing Systems Using Fuzzy Expert Systems Author Dept. Comput. Eng., Alexandria Inst. of Technol. Content Type Conferences.
Mobile Agent Technology for the Management of Distributed Systems - a Case Study Claudia Raibulet& Claudio Demartini Politecnico di Torino, Dipartimento.
Pregel: A System for Large-Scale Graph Processing Presented by Dylan Davis Authors: Grzegorz Malewicz, Matthew H. Austern, Aart J.C. Bik, James C. Dehnert,
Software Agents: An Overview by Hyacinth S. Nwana and Designing Behaviors for Information Agents by Keith Decker, Anandeep Pannu, Katia Sycara and Mike.
Frascati, October 9th, Accounting in DataGrid Initial Architecture Albert Werbrouck Frascati, October 9, 2001.
SUMA: A Scientific Metacomputer Cardinale, Yudith Figueira, Carlos Hernández, Emilio Baquero, Eduardo Berbín, Luis Bouza, Roberto Gamess, Eric García,
Extreme/Agile Programming Prabhaker Mateti. ACK These slides are collected from many authors along with a few of mine. Many thanks to all these authors.
Session 2a, 10th June 2008 ICT-MobileSummit 2008 Copyright E3 project, BUPT Autonomic Joint Session Admission Control using Reinforcement Learning.
IntroductionRelated work 2 Contents Publish/Subscribe middleware Conclusion and Future works.
FFMII Introduction Juha Tiihonen Refer to FFMII Specification for details and explanations 1.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 14 Slide 1 Object-oriented Design.
Autonomic scheduling of tasks from data parallel patterns to CPU/GPU core mixes Published in: High Performance Computing and Simulation (HPCS), 2013 International.
CprE 458/558: Real-Time Systems (G. Manimaran)1 CprE 458/558: Real-Time Systems Distributed Real-Time Systems (contd.)
GSAF: A Grid-based Services Transfer Framework Chunyan Miao, Wang Wei, Zhiqi Shen, Tan Tin Wee.
Research on Asymmetric-aware Hypervisor Scheduler Project overview 6/4.
IIS Progress Report 2015/10/12. Problem Revisit Given a set of virtual machines, each contains some virtual cores with resource requirements. Decides.
Requirements Engineering Requirements Engineering in Agile Methods Lecture-28.
CprE 458/558: Real-Time Systems (G. Manimaran)1 CprE 458/558: Real-Time Systems Distributed Real-Time Systems.
Big traffic data processing framework for intelligent monitoring and recording systems 學生 : 賴弘偉 教授 : 許毅然 作者 : Yingjie Xia a, JinlongChen a,b,n, XindaiLu.
1. 2 »Requires following laws and proper procedures »Requires people with strong human relation and communication skills »Responsibilities include: –maintaining.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
SWE 4743 Responsibility Driven Design with CRC cards Richard Gesick.
Concepts/ definitions/ meanings of program plan, program scheme, program development, concept paper Program plan is a systematic arrangement of elements.
1 Crosstalk iON Release 3. 2 New Live Chat Features iON 3  Session Notes –Add and modify notes to a customer session –Review from Chat History or Live.
SIP Overload Control draft-hilt-sipping-overload-00 Volker Hilt Daryl Malas Indra Widjaja
Distributed Scheduling Motivations: reduce response time of program execution through load balancing Goal: enable transparent execution of programs on.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
1 7 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 7 The Object-Oriented Approach to Requirements.
Introduction to Software Engineering 1. Software Engineering Failures – Complexity – Change 2. What is Software Engineering? – Using engineering approaches.
Overview of the handbook Chapter 5: Levee inspection, assessment and risk attribution.
Chapter 9 Database Planning, Design, and Administration Transparencies © Pearson Education Limited 1995, 2005.
Load Distributing Algorithm: Some load distribution algorithms are Sender Initiated algorithms Receiver Initiated algorithms Symmetrically Initiated algorithms.
Introduction to Load Balancing:
Chapter 11: Collaboration Diagram - PART1
Civil society demands for key changes in GEF 5 Faizal Parish GEC, Central Focal Point GEF NGO Network GEF-NGO Consultation Washington DC 9 November.
Eurostat D2 – Regional Indicators and Geographical Information
Remaking a policy instrument in the educational field
Outline Announcement Distributed scheduling – continued
Architecture Issue in the New Disciple System
Presentation transcript:

A Load Sharing Approach Based on Refactoring of Roles in Multi-Agent Systems Sebnem Bora, A. Murat Tiryaki and Oguz Dikenelli Ege University

Overview Problem Description Realization of Load Sharing Components in a MAS Environment Evaluation of the Approach Conclusion

Problem Description It is almost impossible to guess load of agents. Load of the agents may increase at run time. This may lead to the agent failing with all requests unable to be performed. All features of an agent come from the roles that are assigned to it. Overloading of an agent also comes from its role(s). Assigning these roles to the other agents does not solve overloading. We propose a load sharing approach based on role refactoring. In our approach, the role on a heavily loaded agent is divided into new sub-roles with respect to a policy.

Problem Description (2)

Realization of Load Sharing Components in a MAS Environment A load sharing algorithm has four components:Transfer,selection, location, and information policies. –A transfer policy determines whether an object may participate in a task transfer. –A selection policy selects a task for transfer, when the transfer policy decides that the object is a sender. –A location policy finds suitable senders or receivers to share load. –An information policy decides when information about the other objects in the system should be collected, where it should be collected from and what information should be collected.

Realization of Load Sharing Components in a MAS Environment(2) Our selection policy selects the predefined subrole to be transfered by considering the workload of the role and a refactoring ontology. (We need a complex monitoring mechanism).

Realization of Load Sharing Components in a MAS Environment(3) Our location policy has to identify the suitable agent to transfer the selected subrole. Our information policy is periodic and centralized. Each domain agent periodically sends its workload data. The monitoring mechanism evaluates the excess load of roles by applying our threshold policy. –Therefore, we created the “monitor role”.

Realization of Load Sharing Components in a MAS Environment(4) Monitor agent: The agent plays the “monitor role” –It has two responsibilities: Evaluation of the collected information and applying of role splitting.

Realization of Load Sharing Components in a MAS Environment(5)

Realization of Load Sharing Components in a MAS Environment(6) Evaluation of the collected information:

Realization of Load Sharing Components in a MAS Environment(7) –The excess workload of each role is given by the following equations:

Realization of Load Sharing Components in a MAS Environment(8) Role Splitting –When the monitor agent receives the message that includes the request for role splitting, it initiates the role splitting plan.

Realization of Load Sharing Components in a MAS Environment(9) –The definitions of the new roles are passed to the reorganizing systems' roles.

Evaluation of the Approach We applied it to an agent system application which was implemented by SEAGENT Research Group. The case focuses on one of the core scenarios of the tourism domain.

Evaluation of the Approach(2) The role splitting ontology

Evaluation of the Approach(3) During the system execution, the travel agency role is split into two sub-roles as defined in the design phase, when the number of requests sent to the travel agency increases considerably.

Evaluation of the Approach(4) The performance results of the implementation

Conclusion The load sharing approach based on refactoring of roles improves system's performance under heavy load conditions. In conclusion, first results are encouraging and indicating that efficient load sharing in multi-agent organizations is sustainable using role refactoring.

THANK YOU VERY MUCH.