Presentation is loading. Please wait.

Presentation is loading. Please wait.

LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering.

Similar presentations


Presentation on theme: "LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering."— Presentation transcript:

1 LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering 5200 Perring Parkway Baltimore, MD 21251 Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information Framework (IIF)

2 Agenda Overview Why This Research? Definitions Problem Definition Insurgency Research System Methodology Agent Development Environment Object-Oriented Development Life Cycle Model Driven Architecture Multi-Agent Development Process Tools Requirements Conclusion

3 Why This Research? This Research Addresses Decision Support Systems Rapid and Accurate Decision Making That Improves Over Time (Adaptive Systems) This Research Provides A System Approach For Resolving Problems That Arise in Social System Environments Develop A Framework For Decision Making This Research Does Not Address Prediction!

4 Definitions armed rebellion against an established authority, government, or administration Insurgents conduct sabotage and harassmentopposition to a civil authority or government Insurgency : an armed rebellion by any irregular armed force that rises up against an established authority, government, or administration. Those carrying out an insurgency are insurgents. Insurgents conduct sabotage and harassment. Insurgents usually are in opposition to a civil authority or government primarily in the hope of improving their condition. systematic use of terror Terrorism: systematic use of terror, manifesting itself in violence and intimidation. Those carrying out terrorism conduct violence for the purpose of creating fear in order to achieve a political, economic, religious, or ideologicalgoal are terrorist. Terrorist conduct violence for the purpose of creating fear in order to achieve a political, economic, religious, or ideological goal. logical structure Framework: A logical structure for classifying and organizing complex information.

5 Problem Definition The Army is constantly seeking to better understand the social phenomena of insurgency as it assumes a peacekeeping role in the Iraqi region and as it combats the elevated death tolls associated with insurgency. The problem to be addressed by this research is: 1. How can insurgency data best be researched, defined and presented to military leaders for decision making? 2.How can decisions be observed and evaluated to measure the potential impact on lives in a war zone?

6 How are insurgencies planned for and what is the process? How are insurgencies carried out and what is the process? Are there any consistencies in the locations and surroundings where insurgencies are carried out? Why are more Iraqi women becoming insurgents? Sample Insurgency Questions That might be Addressed by This Research

7 Insurgency Research System

8 METHODOLOGY

9 Agent Oriented Development Environment User Knowledge Interacts With Guides Verifies

10 Activity Diagram Object-Oriented Development Life Cycle Implemented using Enterprise Architect Reference: Tsang, Curtis, et al., “Object- Oriented Technology,” McGraw Hill, 2005.

11 Model Driven Architecture (MDA)

12 BDI Agent System Jadex BDI Architecture Goal-Oriented Reasoning Engine Agent BDI Model

13 Multi-Agent Systems Reference: Jennings, Nick, “Agent-Based Computing: Promise and Perils,” Presentation, Dept of Electronics and Computer Science, University of Southampton.

14 3D Electronic Institution Concept Only systems that have a high degree of interactions need to be structured in order to avoid violations Reference: Bogdanovych, Esteva, et al, “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).

15 Integrated Multi-Agent Development Process Microsoft Access Cognitive Modeling Application JADEX Software/ JADE Platform Ontology Database Problem Domain Database Communication Server Electronic Institution Developmental Cycle Design Verify Test Deployment Development Simulate ISLANDER: graphical tool for specification of rules & protocols in eI AMELI: software platform to run eI aBuilder: agent development tool SIMDEI: simulation tool to animate & analyze eI iGrafix FlowCharter Enterprise Architect 2 nd Life Virtual World Technology Visualization Layer Behavioral Experimentation Insurgency Questions to be Answered

16 Runtime Architecture Second Life © Reference: Bogdanovych, Esteva, et al., “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).

17 Tools Requirements Analysis – Microsoft Visio – iGrafx FlowCharter –Enterprise Architect –UML Development –JADE –Jadex –JESS –Java –EIDE Visualization –Second Life

18 Development of an Insurgency Information Framework Using Multi-Agent Technololgy

19 Conclusion Application of software engineering technology can support advanced sociological analysis in combating the Insurgency Crisis: 1.Developing an IIF enables the Army to extract significant knowledge useful in making more informed decisions 2.Integrating the IIF model with a Software Engineering Technology Workbench provides a structure that can be updated, verified, and easily integrated with other models 3.Modeling behavior through the application of Distributed MAS implemented in a 3D virtual world environment allows decision makers to: 1.Model behavior of objects 2.Choose/ observe actions of human like entities 3.Calculate/ measure paths to outcomes 4.Assess outcomes 5.Initiate treatment and/ support 6.Reform policy 4.The social computing methodology can support decision making in any sociological environment

20 References 1. Taatgen, N., etl, “Modeling Paradigm in ACT-R,” http://www.ai.rug.nl/~niels/publications/taatgenLebiereAnderson.pdf 2. Belagoda, T., etl, “A Critical Study of Cougaar Agent Architecture,” http://www.utdallas.edu/~kandula/docs/COUGAAR_final.pdf, 2005.http://www.utdallas.edu/~kandula/docs/COUGAAR_final.pdf 3. Braubach, L., “Jadex: Implementing a BDI-Infrastructure for JADE Agents,” http://vsis-www.informatik.uni-hamburg.de/getDoc.php/publications/http://vsis-www.informatik.uni- 124/pokahrbraubach2003jadex-exp.pdf 4. Brazier, F., etl, “Beliefs, Intentions and Desire,” http:// ksi.cpsc.ucalgary.ca/KAW/KAW96/brazier/default.html. 5. Mellor, S. J., Balcer, M. J., “Executable UML: A Foundation for Model-Driven Architecture,” Addison-Wesley, New York, N.Y., 2002. 6. Wooldridge, Michael, “An Introduction to Multi-Agent Systems,” John Wiley & Sons, LTD., Hoboken, N.J., 2002. 7. Arcos, Josep, etl, “An Integrated Development Environment for Electronic Institutions,” http://www.iiia.csic.es/~jar/papers/2005/agent-book-camera.pdf http://www.iiia.csic.es/~jar/papers/2005/agent-book-camera.pdf 8. Brown, D. “An Introduction to Object-Oriented Analysis: Objects in Plain English,” John Wiley & Sons, Inc., New York, N.Y., 1997. 9. SPARX Systems, Enterprise Architect, Version 7.0, http://www.sparxsystems.com.au/products/ea.html 10. Grice, P., “Studies of the Ways of Words,” Harvard University Press, Cambridge, Massachusetts, 1989. 11. Bodganovych, A., etl, “A Methodology for Developing MAS as 3D Electronic Institutions,” http://users.ecs.soton.ac.uk/mml/aose2007/accepted/assets/9-bagdanovych-fin.pdf. http://users.ecs.soton.ac.uk/mml/aose2007/accepted/assets/9-bagdanovych-fin.pdf 12. Kapor, M., “ The Power of Second Life,” http://www.3pointd.com/20060820/mitch-kapor-on-the-power-of-second-life/


Download ppt "LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering."

Similar presentations


Ads by Google