The document discusses multi-agent systems (MAS) and their applications. It provides a literature survey on MAS system architecture, consensus algorithms like Paxos and average consensus, and MAS platforms. It also proposes a distributed under-frequency load shedding scheme using MAS for a case study. MAS provide a solution for distributed control of increasing distributed energy resources and devices by shifting computational burden to local controllers and handling decentralized ownership through local agent interactions.
Introductory tutorial on the foundations of agents and multi-agent systems at the 18th European Agent Systems Summer School (EASSS 2016) – 25 July 2016, Catania, Italy
Introduction to agents and multi-agent systemsAntonio Moreno
Multi-agent systems course at University Rovira i Virgili. Slides mostly based on those of Rosenschein, from the content of the book by Wooldridge.
Lecture 1-Introduction to agents and multi-agent systems.
Software Agents are very useful in coming Software development process. This ppt discuss introduction and use of Agents in Software development process.
Distributed Artificial Intelligence with Multi-Agent Systems for MECTeemu Leppänen
In this paper, the Multi-access Edge Computing (MEC) system architecture, as defined by the ETSI standards, is modeled as a multi-agent system. MEC system management services and application execution components are designed as software agents, facilitating distributed artificial intelligence capabilities in their operation and cooperation. Further, the integration of current agent technologies into the standardized MEC system is discussed. Lastly, a case study is presented on how to integrate an existing Internet of Things agent framework and agent-based edge application seamlessly to the MEC system.
Introductory tutorial on the foundations of agents and multi-agent systems at the 18th European Agent Systems Summer School (EASSS 2016) – 25 July 2016, Catania, Italy
Introduction to agents and multi-agent systemsAntonio Moreno
Multi-agent systems course at University Rovira i Virgili. Slides mostly based on those of Rosenschein, from the content of the book by Wooldridge.
Lecture 1-Introduction to agents and multi-agent systems.
Software Agents are very useful in coming Software development process. This ppt discuss introduction and use of Agents in Software development process.
Distributed Artificial Intelligence with Multi-Agent Systems for MECTeemu Leppänen
In this paper, the Multi-access Edge Computing (MEC) system architecture, as defined by the ETSI standards, is modeled as a multi-agent system. MEC system management services and application execution components are designed as software agents, facilitating distributed artificial intelligence capabilities in their operation and cooperation. Further, the integration of current agent technologies into the standardized MEC system is discussed. Lastly, a case study is presented on how to integrate an existing Internet of Things agent framework and agent-based edge application seamlessly to the MEC system.
Intelligent Buildings: Foundation for Intelligent Physical AgentsIJERA Editor
FIPA is an IEEE Computer Society standards organization that promotes agent-based technology and the interoperability of its standards with other technologies. In the design phase of Intelligent Buildings, it is essential to manage many services and facilities, to do this, multi-agent systems are a good tool to manage them. In this paper, we will gereneral description of the features and elements of multiagent systems described by Foundation for Intelligent Physical Agents (FIPA). Secondly, we will focus on the architectures of these multiagent systems. And finally, we will propose a multi-agent system design to see the application in the design of a detached house where the lighting, air conditioning and security systems will be integrated.
MAS course at URV. Lecture 4, agent types (specially interface agents, information agents, hybrid systems, agentification). Based on diverse resources.
This presentation covers agent technology for artificial intelligence. Topics covered are as follows: expert systems, overcoming expert systems limitations, agent, what is an agent, definition of an agent, agents versus expert systems, how is an agent different from other software, types of agents, deliberate versus reactive, interface versus information, mobile versus stationary, and why a mobile agent.
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
Automation is a powerful word that lies everywhere. It shows that without automation, application will not get developed. In a semiconductor industry, artificial intelligence played a vital role for implementing the chip based design through automation .The main advantage of applying the machine learning & deep learning technique is to improve the implementation rate based upon the capability of the society. The main objective of the proposed system is to apply the deep learning using data driven approach for controlling the system. Thus leads to a improvement in design, delay ,speed of operation & costs. Through this system, huge volume of data’s that are generated by the system will also get control.
software agents course details and methods of programming in jade.
A software agent is a persistent, goal-oriented computer program that reacts to its environment and runs without continuous direct supervision to perform some function for an end user or another program. Some, but not all, software agents have UIs (user interfaces). A software agent is the computer analog of an autonomous robot.
Software agents represent an evolutionary step beyond conventional computer programs. Software agents can activate and run themselves, not requiring input from or interaction with a human user. Software agents can also initiate, oversee, and terminate other programs or agents including applications and online intelligent agents.
Among a great many other applications, software agents:
Conduct targeted Internet searches.
Check and prioritize incoming e-mail.
Test new computer games.
Fill out e-forms.
Conduct online job searches.
Synchronize social networking profiles.
Assemble customized news reports.
Find good deals in e-commerce.
Software Agents & Their Taxonomy | Ecommerce BBA HandoutHem Pokhrel
Software Agents leacture handouts for eCommerce students of Prime College BBA Stream. This presentation will provide you the short overview of the rapidly evolving area of software agents and their classification with their applications and significance.
A lot of sources are available to every side of human environment. These sources are genuinely provided by
nature to us. The utilization of these available sources again and again results in “re-source” for us. The
interaction among multiple resources increases the level of availability for maximum possible duration to
the environment. The involvement of both (natural & artificial) intelligence create interaction environment
which works every time and everywhere. The quality work done bounded with time for impactful effect is
known as “smart work”. The theme and framework are required for creating an environment for smart
work. In this article we propose a theorem for theme declaration which is based on suggested lemma. The
theme declaration is measured in probabilistic terms. To perform work in smart fashion we require the
appropriate proportion of both intelligence (natural and human) and their interaction. We have also cited
three varied examples discussing the relevance of intelligent interaction for smart work.
The technologies of ai used in different corporate worldEr. rahul abhishek
Artificial intelligence (AI) is making its way back into the mainstream of corporate technology, this time at the core of business systems which are providing competitive advantage in all sorts of industries, including electronics, manufacturing, software, medicine, entertainment, engineering and communications, designed to leverage the capabilities of humans rather than replace them, today’s AI technology enables an extraordinary array of applications that forge new connections among people, computers, knowledge, and the physical world. Some AI enabled applications are information distribution and retrieval, database mining, product design, manufacturing, inspection, training, user support, surgical planning, resource scheduling, and complex resource management.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Embedded Systems and Software: Enabling Innovation in the Digital AgeIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological advancements across various industries. Embedded systems, characterized by their integration into hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer electronics, and industrial automation. This article delves into the fundamental concepts of embedded systems, highlights their importance, discusses the challenges faced in their development, and explores the latest trends and innovations in embedded software. We are committed to using our findings from this exploration to help others in the embedded systems and software community. We believe that by sharing our knowledge, we can help to accelerate innovation in this field.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
Intelligent Buildings: Foundation for Intelligent Physical AgentsIJERA Editor
FIPA is an IEEE Computer Society standards organization that promotes agent-based technology and the interoperability of its standards with other technologies. In the design phase of Intelligent Buildings, it is essential to manage many services and facilities, to do this, multi-agent systems are a good tool to manage them. In this paper, we will gereneral description of the features and elements of multiagent systems described by Foundation for Intelligent Physical Agents (FIPA). Secondly, we will focus on the architectures of these multiagent systems. And finally, we will propose a multi-agent system design to see the application in the design of a detached house where the lighting, air conditioning and security systems will be integrated.
MAS course at URV. Lecture 4, agent types (specially interface agents, information agents, hybrid systems, agentification). Based on diverse resources.
This presentation covers agent technology for artificial intelligence. Topics covered are as follows: expert systems, overcoming expert systems limitations, agent, what is an agent, definition of an agent, agents versus expert systems, how is an agent different from other software, types of agents, deliberate versus reactive, interface versus information, mobile versus stationary, and why a mobile agent.
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
Automation is a powerful word that lies everywhere. It shows that without automation, application will not get developed. In a semiconductor industry, artificial intelligence played a vital role for implementing the chip based design through automation .The main advantage of applying the machine learning & deep learning technique is to improve the implementation rate based upon the capability of the society. The main objective of the proposed system is to apply the deep learning using data driven approach for controlling the system. Thus leads to a improvement in design, delay ,speed of operation & costs. Through this system, huge volume of data’s that are generated by the system will also get control.
software agents course details and methods of programming in jade.
A software agent is a persistent, goal-oriented computer program that reacts to its environment and runs without continuous direct supervision to perform some function for an end user or another program. Some, but not all, software agents have UIs (user interfaces). A software agent is the computer analog of an autonomous robot.
Software agents represent an evolutionary step beyond conventional computer programs. Software agents can activate and run themselves, not requiring input from or interaction with a human user. Software agents can also initiate, oversee, and terminate other programs or agents including applications and online intelligent agents.
Among a great many other applications, software agents:
Conduct targeted Internet searches.
Check and prioritize incoming e-mail.
Test new computer games.
Fill out e-forms.
Conduct online job searches.
Synchronize social networking profiles.
Assemble customized news reports.
Find good deals in e-commerce.
Software Agents & Their Taxonomy | Ecommerce BBA HandoutHem Pokhrel
Software Agents leacture handouts for eCommerce students of Prime College BBA Stream. This presentation will provide you the short overview of the rapidly evolving area of software agents and their classification with their applications and significance.
A lot of sources are available to every side of human environment. These sources are genuinely provided by
nature to us. The utilization of these available sources again and again results in “re-source” for us. The
interaction among multiple resources increases the level of availability for maximum possible duration to
the environment. The involvement of both (natural & artificial) intelligence create interaction environment
which works every time and everywhere. The quality work done bounded with time for impactful effect is
known as “smart work”. The theme and framework are required for creating an environment for smart
work. In this article we propose a theorem for theme declaration which is based on suggested lemma. The
theme declaration is measured in probabilistic terms. To perform work in smart fashion we require the
appropriate proportion of both intelligence (natural and human) and their interaction. We have also cited
three varied examples discussing the relevance of intelligent interaction for smart work.
The technologies of ai used in different corporate worldEr. rahul abhishek
Artificial intelligence (AI) is making its way back into the mainstream of corporate technology, this time at the core of business systems which are providing competitive advantage in all sorts of industries, including electronics, manufacturing, software, medicine, entertainment, engineering and communications, designed to leverage the capabilities of humans rather than replace them, today’s AI technology enables an extraordinary array of applications that forge new connections among people, computers, knowledge, and the physical world. Some AI enabled applications are information distribution and retrieval, database mining, product design, manufacturing, inspection, training, user support, surgical planning, resource scheduling, and complex resource management.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Embedded Systems and Software: Enabling Innovation in the Digital AgeIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological advancements across various industries. Embedded systems, characterized by their integration into hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer electronics, and industrial automation. This article delves into the fundamental concepts of embedded systems, highlights their importance, discusses the challenges faced in their development, and explores the latest trends and innovations in embedded software. We are committed to using our findings from this exploration to help others in the embedded systems and software community. We believe that by sharing our knowledge, we can help to accelerate innovation in this field.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
Modeling the Grid for De-Centralized EnergyTon De Vries
Utilities are facing massive changes that affect all aspects of their business, from planning through operations. Once an industry characterized as technology-risk averse, utilities have been shifting to more agile approaches with a higher tolerance for risk. Modeling the grid to accommodate these changes requires new approaches and closer relationships with trusted
technology partners. This paper will examine what methodologies have driven the acceleration of grid decentralization and what technologies still need to be applied for smooth integration and success.
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...ijcsit
Cyber-physical Systems based on advanced networks interact with other networks through wireless
communication to enhance interoperability, dynamic mobility, and data supportability. The vast data is
managed through a cloud platform, vulnerable to cyber-attacks. It will threaten the customers in terms of
privacy and security as third-party users should authenticate the network. If it fails, it will create extensive
damage and threat to the established network and makes the hacker malfunction the network services
efficiently. This paper proposes a DL-based CPS approach to identify and mitigate the malware cyberphysical system attack of Denial of Service (DoS) and Distributed Denial of Service (DDoS) as it ensures
adequate decision support. At the same time, the trusted user nodes are connected to the network. It helps
to improve the privacy and authentication of the network by improving the data accuracy and Quality of
Service (QoS) in the network. Here the analysis is determined on the proposed system to improve the
network reliability and security compared to some of the existing SVM-based and Apriori-based detection
approaches.
Cyber-physical Systems based on advanced networks interact with other networks through wireless
communication to enhance interoperability, dynamic mobility, and data supportability. The vast data is
managed through a cloud platform, vulnerable to cyber-attacks. It will threaten the customers in terms of
privacy and security as third-party users should authenticate the network. If it fails, it will create extensive
damage and threat to the established network and makes the hacker malfunction the network services
efficiently. This paper proposes a DL-based CPS approach to identify and mitigate the malware cyber-
physical system attack of Denial of Service (DoS) and Distributed Denial of Service (DDoS) as it ensures
adequate decision support. At the same time, the trusted user nodes are connected to the network. It helps
to improve the privacy and authentication of the network by improving the data accuracy and Quality of
Service (QoS) in the network. Here the analysis is determined on the proposed system to improve the
network reliability and security compared to some of the existing SVM-based and Apriori-based detection
approaches.
Energy efficient clustering using the AMHC (adoptive multi-hop clustering) t...IJECEIAES
IoT has gained fine attention in several field such as in industry applications, agriculture, monitoring, surveillance, similarly parallel growth has been observed in field of WSN. WSN is one of the primary component of IoT when it comes to sensing the data in various environment. Clustering is one of the basic approach in order to obtain the measurable performance in WSNs, Several algorithms of clustering aims to obtain the efficient data collection, data gathering and the routing. In this paper, a novel AMHC (Adaptive MultiHop Clustering) algorithm is proposed for the homogenous model, the main aim of algorithm is to obtain the higher efficiency and make it energy efficient. Our algorithm mainly contains the three stages: namely assembling, coupling and discarding. First stage involves the assembling of independent sets (maximum), second stage involves the coupling of independent sets and at last stage the superfluous nodes are discarded. Discarding superfluous nodes helps in achieving higher efficiency. Since our algorithm is a coloring algorithm, different color are used at the different stages for coloring the nodes. Afterwards our algorithm (AMHC) is compared with the existing system which is a combination of Second order data CC(Coupled Clustering) and Compressive-Projection PCA(Principal Component Analysis), and results shows that our algorithm excels in terms of several parameters such as energy efficiency, network lifetime, number of rounds performed.
A Study on Intelligent Management of Electrical Systems in Industriesijtsrd
It has been a rapid rise in the automation of public electricity distribution in the last several years. We can utilise the same framework to construct new intelligent applications for industrial power distribution networks. Today, there is a demand for new applications in the industrial sector and in response to various environmental changes. Using the information in this blog, we can have a better understanding of how industrial electric systems are managed and how new applications and methods for managing distribution and monitoring industrial networks can be implemented. The topic of energy management has grown in relevance and complexity in recent years. It entails selecting from among a variety of energy sources those that can provide power to a variety of loads while reducing losses and expense. The systems response, the selection of sources, must be done in real time to minimise power outages due to the heterogeneous, distributed nature of the sources and loads. Micro grid is a grouping of interconnected power sources and loads that can self regulate in order to maximise a variety of factors, including but not limited to cost and efficiency. Shibu Ganesh | Harish Kumar V C "A Study on Intelligent Management of Electrical Systems in Industries" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-4 , June 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50169.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/50169/a-study-on-intelligent-management-of-electrical-systems-in-industries/shibu-ganesh
Complex Measurement Systems in Medicine: from Synchronized Monotask Measuring...ITIIIndustries
Design problems of flexible computer systems for physiological researches are discussed. The widespread case of employing of commercial medical devices as parts of the resulting computer system is analyzed. To overcome most of the arising difficulties, we propose using of the universal synchronizing device and the modular script-based software. The prospects of such computer systems are outlined as an evolution of them into cyber-physical systems with on-demand plugging in of required hardware modules.
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTIJwest
In real environment there is a collection of many noisy and vague data, called Big Data. On the other hand,
to work on the data middleware have been developed and is now very widely used. The challenge of
working on Big Data is its processing and management. Here, integrated management system is required
to provide a solution for integrating data from multiple sensors and maximize the target success. This is in
situation that the system has constant time constrains for processing, and real-time decision-making
processes. A reliable data fusion model must meet this requirement and steadily let the user monitor data
stream. With widespread using of workflow interfaces, this requirement can be addressed. But, the work
with Big Data is also challenging. We provide a multi-agent cloud-based architecture for a higher vision to
solve this problem. This architecture provides the ability to Big Data Fusion using a workflow management
interface. The proposed system is capable of self-repair in the presence of risks and its risk is low.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
3. JOURNAL OF INTERNATIONAL COUNCIL ON ELECTRICAL ENGINEERING 189
research on the system architecture, consensus algorithm,
and multi-agent platform, framework, and simulator. A
MAS-based UFLS scheme is discussed in Section 4 with
a study case. The future of MASs is discussed in the
conclusion.
2. System design – system architecture, agent
type, and consensus algorithm
System design is critical as it covers many aspects in the
development of MASs, e.g. agent models, coordination,
data collection, and interaction among agents. In this sec-
tion, a literature survey of system architecture, agent type,
and consensus algorithm is presented.
2.1. System architecture and agent type
There are abstract and concrete architectures [8].
Components and the basic engine structure are defined
in the abstract architecture, which needs to be as generic
as possible. Starting from an abstract architecture, the con-
crete architecture is developed by assigning a type to each
component and implementing each macro instruction of
the engine.
Intelligent agents are classified into several types with
respect to their functionalities and decision-making
mechanisms. (1) Purely reactive agents make decisions
using only the present information without referring to
historical data. Thus, they utilize direct mapping from sit-
uation to action and respond to the environment directly.
For example, in [21], reactive agent techniques are uti-
lized to build up car-following models based on artificial
neural networks. (2) Logic-based agents make decisions
through logical deduction. In [22], a method is developed
for handling multiple hypotheses and performing log-
ic-based fault diagnosis. Scenarios from the Italian power
system are used for evaluation. (3) Belief-desire-intention
(BDI) agents are built using symbolic representations of
the intentions, beliefs, and desires of agents. In [23], the
stages of autonomy determination for software agents
are discussed. The recognition of potential autonomy is
provided utilizing the BDI paradigm. (4) Layered archi-
tectures incorporate several software layers. Each layer
combines agents that deal with different abstract levels
of the environment. For example, in [14,15], a SPID sys-
tem is designed in the layered architecture for integrating
various types of protection systems and defense schemes
in different levels.
2.2. Consensus algorithm
The cooperation of agents is achieved through information
interaction to reach a consensus. The performance and
systems (MASs) for researchers from various disciplines
are different, as indicated in [7], the major advantages of
using multi-agent technologies include: (1) individuals
take into account the application-specific nature and envi-
ronment; (2) local interactions between individuals can
be modeled and investigated; and (3) difficulties in mod-
eling and computation are organized as sublayers and/or
components. Therefore, MASs provide a good solution to
distributed control as a computational paradigm. In addi-
tion, artificial intelligence (AI) techniques can be utilized.
In [8], an agent is defined as a computer system that is
situated in an environment that is capable of autonomous
actions in this environment to meet its design objectives.
In [9], a MAS is defined as a system that comprises two
or more agents, which cooperate with each other while
achieving local goals.
1.3. Applications of MASs
MASs have been applied to various problems, including
market simulation, monitoring, system diagnosis, and
remedial actions [10–12]. In [13], a substation physical
security monitoring (SPSM) system is proposed within
the framework of strategic power infrastructure defense
(SPID) [14,15]. It monitors from remote the physical
security of power substations. In [16], an approach is
developed to prevent interconnected power systems from
catastrophic failures. It uses a MAS-based defense sys-
tem that allows agents to have adaptive decision criteria.
In [17], an integrative and flexible method is proposed
that uses agent-based modeling for assessment of market
designs. Agents are facilitated by Q-learning. Compared
with the competitive benchmark, they can exploit market
flaws to make higher profits. For remedial actions, a dis-
tributed under-frequency load shedding (UFLS) scheme
is developed in [18] using the MAS. It is improved and
being implemented as a demonstration for the RIAPS
platform [19]. Details of the UFLS scheme are presented
in Section 4.
Progress in AI, hardware, and sensor technologies have
been achieved by the MAS community, resulting in agent
technologies that are applied successfully to real-world
industrial problems. A project [20] was supported by U.S.
DepartmentofEnergy(DOE)totransfertheVOLTTRONTM
software platform to Tranformative Wave. Details of
VOLTTRONTM
developed by Pacific Northwest National
Lab (PNNL) are discussed in Section 3.2. In addition, it
provides Tranformative Wave with technical support to
develop products and services that improve the operating
efficiency of buildings and resilience of power grids. This
projectindicatesthatindustryisadoptingagenttechnologies.
The remaining of this paper is organized as follows. A
literature survey is presented in Sections 2 and 3, including
Downloaded
by
[186.204.211.215]
at
04:32
04
August
2017
4. 190
J. XIE AND C.-C. LIU
functionalities highly rely on the communication layer,
especially the connection topology and associated proto-
cols. The consensus and interactive consistency problems
are two important aspects of the Byzantine agreement
problem [24]. The terms of the above three problems are
used interchangeably in the literature, although they have
different formal definitions. In this study, the consensus
problem is addressed. The well-known and widely used
Paxos and average-consensus algorithms are described in
this subsection. In addition, the fault tolerance is discussed.
2.2.1. Paxos algorithm
The Paxos algorithm was originally proposed by L.
Lamport in 1988 [25]. In 2001, it was published in [26]
with a user-friendly presentation. As one of the simplest
distributed algorithms, the Paxos algorithm is designed to
implement a fault-tolerant distributed system. The ‘synod’
consensus algorithm [25] serves as the heart of the Paxos
algorithm. Each Paxos agent can be a proposer, accep-
tor, or learner. If most nodes are available, this algorithm
guarantees that agents will converge to one value. It has
been used by many software products, e.g. (1) the BigTable
which is adopted by many products of Google; and (2) the
search engine, Bing, of Microsoft.
2.2.2. Average-consensus algorithm
The average-consensus algorithm has been applied to
many fields for the consensus and cooperation of net-
worked MASs. Its convergence and convergent speed are
reported in [27] and [28]. As an adaptive distributed algo-
rithm, it requires only communication among neighbor-
ing agents. Therefore, the communication burden is low.
All available agents will reach an agreement, which is equal
to the average of their initial values. The simple mathe-
matic model is summarized. A graph, N = (V, B), repre-
sents the network of n agents. The set of agents is denoted
byV = {1, 2, … , n}
. A nonnegative n × n adjacency matrix
B = [bij]specifies the interconnection topology of network
N. If an active communication link exists from agent i to
agent j, bij
is a positive value. Otherwise, bij
= 0.
(1)
̇
yi(t) =
∑n
j=1
bij
(
yj(t) − yi(t)
)
(2)
Y(t) = col
(
y1(t), y2(t), … , yn(t)
)
(3)
Δ = diag
(∑n
j=1
b1j, … ,
∑n
j=1
bij, … ,
∑n
j=1
bnj
)
(4)
L = −B + Δ
(5)
̇
Y(t) = (−Δ + B)Y(t) = −LY(t)
where Δ and L are the degree and Laplacian matrices,
respectively.
2.2.3. Fault tolerance
Fault tolerance is focused on both continuous availability
and the elimination of recovery time. As an important
performance metric of fault tolerance, downtime refers to
periods of time in which a system is not operational [29].
In order to minimize the downtime, specialized software
routines are needed to detect failures of hardware (e.g.
sensors, actuators, storage devices, and communication
channels) and switch to backup devices automatically.
This type of self-checking logic should be provided by
the operating system (OS) and governed by the software
platform designed for distribution applications. In addi-
tion, the capability to remove, disconnect, and repair the
problematic devices without disruption to the computer
system is critical. Furthermore, important data sources
should be checked and calibrated periodically, e.g. PMUs.
With respect to the requirements on cyber security,
firewalls and access control should be provided by the OS
to prevent unauthorized users and access. Encryption is
needed to secure the communication among nodes. The
basic mechanisms of encryption should be provided by
the OS. The security level can be enhanced further with
digital certificates if it is supported by the platform. Once
the cyber intrusions are detected and traced promptly and
accurately by the OS and platform, mitigation actions are
applied to block unauthorized access. In most applica-
tions, it is assumed that non-Byzantine fault is considered.
Therefore, no cheating agent(s) is (are) considered in the
multi-agent based applications. Both fault tolerance pol-
icies and mechanisms become simpler.
In general, the OS and platform should support the
recovery of nodes due to software or other defects (e.g.
power failure). The recovery includes two parts: (1) auto-
matically restarting the node; and (2) recovering the node
to a well-known state. It is expected that multiple states
will be recorded and available for recovery. As a result,
applications will be able to achieve fault tolerance and
decide which state should be selected for recovery. In
addition, self-checking should be performed immediately
once a node restarts, including hardware, software, and
interfaces. If functionalities of the restored node cannot
be guaranteed, the node may be required by applications
to remain silent instead of participating in the coordina-
tion. Therefore, self-checking is critical and its reliability
matters.
Fault tolerance becomes more complicated if commu-
nication channels are unreliable. The outage of communi-
cation lines and noisy measurements should be taken into
account. Therefore, it is harder to reach a consensus if the
underlying communication channels are unreliable. For
example, the balanced digraph may become unbalanced
Downloaded
by
[186.204.211.215]
at
04:32
04
August
2017
5. JOURNAL OF INTERNATIONAL COUNCIL ON ELECTRICAL ENGINEERING 191
distribution and development. In addition, the com-
patibility with OSs matters. For example, JADE bene-
fits greatly from its pure design using JavaTM
, which is
cross-platform with respect to the associated Java virtual
machine (JVM). Applications developed using JADE can
run on multiple operation systems without modification.
Therefore, it becomes one of the most widely used plat-
forms for research purpose. Furthermore, the supported
programming languages are likely to influence the choices
of developers. Programmers usually intend to use tools
that support programming languages with which they are
familiar and are easy to use, regardless of characteristics
of the problem and model. For instance, agent-oriented
programming languages are not a preferred option for
new developers due to its lower level of abstraction.
3.2. VOLTTRONTM
Almost all platforms are developed to target a wide spec-
trum of applications in different fields. Nevertheless, there
is a strong desire for specialized platforms that focus on
particular fields. To this end, a flexible and modular soft-
ware platform, VOLTTRONTM
[36], is developed and spe-
cialized for applications of energy systems, e.g. integration
of DERs, decentralized control of microgrids, and distrib-
uted automation systems. The predecessor and prototype
of VOLTTRONTM
[40] was initially presented in 2011 as
a framework that brings intelligence to the actuators and
sensors in a smart grid. A year later, it was developed from
a framework to a platform called VOLTTRONTM
[35]. A
demonstration is shown in [41]. It is further applied to
the integration of electric vehicles and smart grids [42].
Applications can be developed on top of VOLTTRONTM
to improve energy efficiency, support grid services, mon-
itor the performance of building systems, etc.
The VOLTTRONTM
platform is developed in Python
utilizing many open source libraries. In addition, a set
of utilities has been created to speed up development in
Python-based agents. However, applications are not tied
due to the loss of edge(s), i.e. communication channel(s).
Note that problematic communication links usually can-
not be recovered soon.
3. Multi-agent platforms, frameworks, and
simulators
Much effort has been made in designing the system archi-
tecture, agent model, and interaction between agents.
Nevertheless, the real implementation of MASs remains in
an early stage. Since late 90s, a large number of multi-agent
platforms, frameworks, and simulators have been devel-
oped targeting the gap between concept design and imple-
mentation. As a result, it is a critical issue for developers to
select the tool properly. In this section, a comparison study
is performed and tabulated. In particular, VOLTTRONTM
that is targeted for energy system applications is discussed.
3.1. Comparison
In order to perform a meaningful comparison, the evalu-
ation criteria must be selected systematically. In [30], four
platforms are selected and compared using four criteria:
completeness, applicability, complexity, and reusability.
The process of developing MASs is divided into four
stages. Besides analysis, design, and development stages
of traditional software construction, deployment is added
as an important stage due to the complexity of MASs. In
[31], a comparative review of 24 multi-agent platforms,
frameworks, and simulators is reported using 28 univer-
sal criteria. It is focused on all available platforms despite
the fact that the development of some platforms has been
terminated.
Typical multi-agent platforms, frameworks, and sim-
ulators developed by different academic and industrial
groups (e.g. universities, research institutes, and com-
panies) are compared. The up-to-date results are shown
in Table 1. A notable feature of most platforms is the
open source and non-proprietary nature that allows free
Table 1. Comparison of selected multi-agent platforms, frameworks, and simulators.
Software Type Developer Programming language Operation system(s) Open source
JADETM
[32] Framework Telecom Italia JavaTM
All that supports JVM ✓
Agent Factory [33] Framework University College Dublin Agent Factory Agent Program-
ming Language (AFAPL)
All that supports JVM ✓
OpenFMBTM
[34] Framework Duke Energy JavaTM
Linux ✓
RIAPS [19] Platform Vanderbilt University Python (and others in future) Linux ✓
VOLTTRONTM
[35], [36] Platform Pacific Northwest National
Laboratory (PNNL)
All Linux ✓
Janus [37] Platform Laboratoire Systèmes et Trans-
ports (SET) and Grupo de
Investigación en Tecnologías
Informáticas Avanzadas
(GITIA)
SARL, JavaTM
Linux, Unix, Windows, Mac OS,
Android
✓
MASON [38] Simulator George Mason University JavaTM
Windows ✓
GAMA [39] Simulator IRD/UPMC International Re-
search Unit UMMISCO
GAML Windows, Linux, Mac OS ✓
Downloaded
by
[186.204.211.215]
at
04:32
04
August
2017
6. 192
J. XIE AND C.-C. LIU
4.1. Methodology
The system framework is shown in Figure 1. Buses and
transmission lines are depicted in the power system layer
using thick bars and thin lines, respectively. The mul-
ti-agent based UFLS scheme has two types of agents:
generation agent (GA) and substation agent (SA). If an
agent has a generation unit, it belongs to the GA type.
Otherwise, it is a SA. The agent framework is shown in
Figure 2. Each RIAPS node includes a number of agents
for each application. Each agent has components for typ-
ical functionalities. The flowchart showing monitoring,
estimation, and distributing steps is given in Figure 3. In
the monitoring step, frequency variation is monitored
by agents through two triggers. If abnormal conditions
are detected, agents start to communicate with adjacent
neighbors. Based on the shared information, the amount
of load shedding is estimated and distributed.
4.2. Extended distributing step
It is known that load buses that are closer to generators
are more effective in load shedding. Therefore, they have
higher priorities to shed the load. In the distributing step,
each agent decides how much load should be shed by itself.
(6)
ΔPAk
=
∑Nk
i=1
ΔPLSk
i
(7)
ΔPLSk
i
=
⎧
⎪
⎪
⎨
⎪
⎪
⎩
ΔPk
i ,
PLk
i
,
0,
if ΔPk
i > 0 and ΔPk
i < PLk
i
if ΔPk
i > 0 and ΔPk
i ≥ PLk
i
if ΔPk
i ≤ 0
(8)
ΔPk
i = ΔP −
∑
m
PLk
m
(9)
m ∈ Ii =
{
u|u ∈ B and au < ai
}
to a specific programming language, such as Python or
JavaTM
. This lives up to developers’ expectation of flex-
ibility. Agents written in other languages are supported
once they can communicate over the message bus. The
common VOLTTRONTM
base can simplify and accelerate
the development of applications. It includes ‘base’ classes
and ‘helper’ utilities that support rapid development and
deployment of applications in a scalable and cost-effective
way. The goal is to allow researchers to focus on their algo-
rithms rather than interaction with the platform.
As an open source and open architecture platform,
VOLTTRONTM
supports the peer-to-peer network of
distributed agents that bring computation closer to data
sources cooperatively. It supports non-Intel central pro-
cessing units (CPUs). In addition, the requirements on
CPU, memory, and storage footprint are low. Therefore,
applications can be built to manage energy use more effi-
ciently among appliances and devices.
VOLTTRONTM
is widely used for implementation of
applications. Besides, it is employed as the base of other
platforms. The BEMOSSTM
system [43,44] developed by
Virginia Tech serves as a good example. It adds auto-dis-
covery capability for several devices together with a user
interface for controlling those devices. All features are
built on the core of VOLTTRONTM
. Another example is
the Transactional Network Platform (TNP) [45], which
consists of VOLTTRONTM
as agent execution software. It
includes agents that perform critical services and specific
functions (e.g. demand response, fault detection, weather
service, etc.). TNP is proposed to achieve operational,
financial, and energy transactions between connected
individuals.
4. Distributed UFLS scheme using MAS
In [46], it is indicated that the wide-area special pro-
tection system (WASPS) is critical for dynamic stability
and frequency problems. As an important component of
the WASPS, distributed UFLS is a natural problem for
the application of agent technologies. In this section, an
adaptive UFLS algorithm is described. The purpose of
this UFLS scheme is to mitigate power system blackouts
using the MAS. It was originally proposed in [18]. In this
paper, the distributing step has been extended and a case
study is performed. It is being implemented as an appli-
cation of the RIAPS (‘Resilient Information Architecture
Platform for the Smart Grid’) platform. In the future, the
proposed UFLS method will be improved to deal with
wind turbines, solar panels, and batteries, targeting the
increasing penetration and impact of DERs integration
on UFLS schemes [27].
GA
SA
SA
SA
SA
GA SA
GA
Agents layer
Power system
layer
Figure 1. System framework.
Downloaded
by
[186.204.211.215]
at
04:32
04
August
2017
7. JOURNAL OF INTERNATIONAL COUNCIL ON ELECTRICAL ENGINEERING 193
where Nk
denotes the number of load buses of the kth
agent. PLk
i
is the amount of active power load available to
be shed at load bus i. ΔPLSk
i
is the active power load to be
shed by the kth agent at load bus i. ΔP is the total active
power deficiency, i.e., the total amount of load to be shed
by all agents. It is calculated by agents in the estimation
(10)
ai = min
{
LGi
}
(11)
LGi =
⎧
⎪
⎨
⎪
⎩
�
�
�
𝜃i − 𝜃g
�
�
�
Sg
� g ∈ G
⎫
⎪
⎬
⎪
⎭
RIAPS Node
Data
Acquisition
Agent
PMU 2
Substation Sensors
DFR 1
RTU 1
PMU 1
CBM 1
TCP
DNP3
Buffer
GA/SA
Device
Interface
Circuit Breaker 1
Substation Actuators
Other Nodes
Data Inputs/Outputs
Other Nodes
Control Events
TCP
TCP
Circuit Breaker 2
DNP3
DFR - Digital Fault Recorder
CBM - Circuit Breaker Monitor
PMU - Phasor Measurement Unit
RTU - Remote Terminal Unit
Figure 2. Agent framework.
Figure 3. Flowchart of GA/SA.
Downloaded
by
[186.204.211.215]
at
04:32
04
August
2017
8. 194
J. XIE AND C.-C. LIU
generators within the same priority category. In the third
step of the UFLS scheme, through communications, all
agents share the information of loads that can be shed.
step. All load bus indices of agents are comprised in a finite
index set B. The symbols θi
and θg
are voltage angle of the
load bus i and generator g, respectively. Sg
is the nominal
apparent power of the generator g. G is the finite index set
that comprises all generator indices.
It is assumed that the amount of reactive power shed,
ΔQLSk
i
follows the same percentage of the active power
load to be shed.
WhereQLSk
i
is the amount of reactive power load available
to be shed at load bus i of the kth agent.
Each agent determines the timing and sequence of load
buses by the priorities. The timing is determined by
whereti
Ak
denotes the timing to shed load at bus i by the kth
agent. tfm
and top
are the delays of monitoring frequency
and opening circuit breakers, respectively. Tall
indicates
the time required to shed all load in the system. In [48],
it specifies 0.9 s to shed 451 MW load in the IEEE 39-bus
system. Therefore, Tall
is set to be 12.17 s. The total load of
the test system is denoted as Pall
. The priority of load bus i
of agent k is one level lower than the load bus j of agent l.
4.3. Case study
The IEEE 39-bus system is used and the contingency sce-
nario is shown in Figure 4. Transmission lines are tripped
at 0.5, 1.5, and 2.2 s. An advanced load shedding strategy
developed in [18] is adopted for the performance compar-
ison. An amount of 607.73 MW active power imbalance is
estimated at 2.54 s. Load shedding actions are presented
in Table 2. If there is no load shedding scheme, a system
collapse takes place, leading to the loss of all loads in the
North Island.
The results of comparison are shown in Table 3. The
proposed method sheds 35.62 MW and 21.93 MVAR less
load but stops the frequency decay earlier. See Figures 5
and 6. The frequency does not return to 60 Hz because
the secondary control is not included in the simulation.
In the simulation, all loads are assumed to be of the
same category. However, in a real power grid, there
are several categories of loads and a tradeoff is needed.
One simple option for tradeoff is to shed loads closer to
(12)
ΔQLSk
i
= ΔPLSk
i
QLk
i
PLk
i
(13)
ti
Ak
= tfm + top +
Tall
Pall
⋅
∑
m
PLk
m
(14)
ti
Ak
− t
j
Ak
=
Tall
Pall
⋅ ΔPk
LSj
30
2
G10
37
25
G8
38
29
G9
26 28
18 17 27
1 3 16
24
39
G1
4 14 15
21 35
22
G6
5
19
36
23
G7
9
34
20
G5
31
6
G2
11
32
10
G3
7
8
13
33
G4
12
North Island
South Island
Figure 4. IEEE 39-bus system and contingency scenario.
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
70.00%
80.00%
90.00%
100.00%
3 4 7 8 18 25 26 27 28 29 31 39
Load
Shedding
Percentage
Bus No.
Advanced Load Shedding Method
Multi-Agent Based Method
Figure 5. Distributed load shedding.
Table 2. Load shedding actions.
Agent Load bus
Reactive
power
load
(MVAR)
Active
power
load
(MW) Percentage Time (s)
PA5 39 135.54 598.53 54.215% 2.74
PA2 31 4.6 9.2 100% 2.72
Table 3. Comparison results.
Methods
Multi-agent based
distributed Advanced
Reactive power load (MVAR) 140.14 162.07
Active power load (MW) 607.73 643.35
Frequency decay ends (s) 3.97 8
Frequency (Hz) 59.83 59.8
Downloaded
by
[186.204.211.215]
at
04:32
04
August
2017
9. JOURNAL OF INTERNATIONAL COUNCIL ON ELECTRICAL ENGINEERING 195
provides a limited number of interfaces for the interac-
tions. Therefore, after a tool is determined, options for
other tools will be reduced.
Once the design has been evaluated, implementation
is the final stage except for maintenance. In Section 3, a
survey on multi-agent platforms, frameworks, and simu-
lators is reported. Again, a critical issue is how to select
the tool properly for developers. Some rules apply: (1)
Requirements on agent performance and response time
are highly dependent on the supported programming lan-
guage. The C/C++ implementation of an algorithm should
be faster than a JAVA implementation. Thus, VOLTTRON
and RIAPS are more suitable for the UFLS scheme com-
pared with JADETM
, Agent Factory, etc.; (2) From a cost
perspective, an open-source platform is preferred espe-
cially if the budget is constrained. In addition, flexibility
is provided by the open-source code. The platform can be
revised by developers for convenience of agent implemen-
tation. Both VOLTTRON and RIAPS are open-source;
and (3) If agents need to be implemented in hardware
nodes/boards, the supported operation system becomes
an important issue. Most single-board computers, e.g.
Raspberry Pi and BeagleBone Black, support Linux well.
Although some of them also support Windows, there is
an extra cost to purchase the Windows OS and associ-
ated software for development. In addition, the burden
on running the OS should be minimized for agents to
reboot quickly from a fault. Both VOLTTRON and RIAPS
support Linux well.
5. Conclusion and discussion
Research on MASs is mainly focused on system architec-
ture, consensus algorithm, distributed optimization, and
software tools for simulation and implementation. It is
anticipated that agent technologies will continue to evolve
in the future. In addition, more industries are looking for
ways to use MASs, indicating that agent technologies are
making good progress in commercial use.
The software development process of MASs requires
technical support from the selected platform. It matters
whether documentation and interface are user-friendly.
The development efficiency can be significantly enhanced
if good software development kit (SDK) is provided. Once
a MAS is deployed, maintenance becomes a long-term
issue concerning the complex environment and geo-
graphically widely distributed nodes. Specialized and
professional services on maintaining distributed hardware
devices and software components are critical in future.
Acknowledgment
The authors would like to thank Dr. Marino Sforna from
TERNA, Rome, Italy, for his helpful suggestions.
In addition, the information of loads includes the type
and category. Thus, agents will be able to determine the
category of loads which should be involved to reach the
total amount of load shedding. The load at a lower prior-
ity category will be shed first. Among loads in the same
category, the load closer to the generator will be shed first.
4.4. From design to evaluation and implementation
Once the MAS is selected and applied to a problem, the first
step starts from system design. Based on the properties and
characteristics of this problem, a suitable agent architecture
can be determined together with the consensus protocol. In
this step, flexibility is a major concern with respect to future
system extension and its integration with other systems.
In addition, major restrictions on the consensus protocol
arise from communication channels, network topology,
and requirements on performance. For instance, the UFLS
scheme adopts the layered architecture and average-con-
sensus algorithm. The rationale is: (1) The cyber-physical
model of modern power systems is layered; (2) As a reme-
dial action scheme (RAS), the MAS-based UFLS scheme
should be easily integrated with other RASs. This flexibility
can be achieved by utilizing the layered architecture; and (3)
UFLS requires fast decision-making and quick response.
Therefore, the lightweight average-consensus is selected
rather than other distributed optimization algorithms.
Next, from the software engineering point of view, the
MAS should be modeled and evaluated before imple-
mentation. Therefore, in this case, agents of the UFLS
scheme and the power grid are modeled in MATLAB
and DIgSILENT, respectively. Data from the transient
simulation is fed to agents for evaluation and debugging
purpose. Of course, researchers have many options (dif-
ferent programming languages and software tools) in this
step. For example, agents can be modeled in Python and
DIgSILENT can be replaced by comparable tools. If the
physical environment and intelligent agents are modeled
in different tools/platforms, the interface and interactions
between them becomes a critical issue. Typically, each tool
0 10 20 30 40 50 60 70 80
58.5
59
59.5
60
Time (S)
Frequency
(Hz)
Multi-Agent Based Method
Advanced Load Shedding Method
Figure 6. System responses.
Downloaded
by
[186.204.211.215]
at
04:32
04
August
2017
10. 196
J. XIE AND C.-C. LIU
[5]
Wang Y, Nazaripouya H, Chu C-C, et al. Vehicle-to-grid
automatic load sharing with driver preference in micro-
grids. Proceedings of Innovative Smart Grid Technologies
(ISGT Europe ‘14); 2014 Oct; Istanbul, Turkey.
[6]
Wang Y, Shi W, Wang B, Chu C-C, Gadh R. Optimal
operation of stationary and mobile batteries in distribution
grids. Appl Energy. Mar. 2017;190:1289–2017.
[7]
Yu N-P, Liu C-C. Multiagent systems. In Advanced
solutions in power systems: HVDC, FACTS, and artificial
intelligence. Hoboken, NJ: John Wiley Sons; 2016. p.
903–930.
[8]
Wooldridge M. An introduction to multiagent systems.
New Jersey: Wiley; 2008.
[9]
Weiss G. Multiagent systems: a modern approach to
distributed artificial intelligence. Cambridge: MIT Press;
1999.
[10] McArthur SDJ, Davidson EM, Catterson VM, et al. Multi-
agent systems for power engineering applications – part
I: concepts, approaches, and technical challenges. IEEE
Trans Power Syst. 2007 Nov;22(4):1743–1752.
[11]
McArthur SDJ, Davidson EM, Catterson VM, et al.
Multi-agent systems for power engineering applications
– part II: technologies, standards, and tools for building
multi-agent systems. IEEE Trans Power Syst. 2007
Nov;22(4):1753–1759.
[12]
Catterson VM, Davidson EM, McArthur SDJ. Practical
applications of multi-agent systems in electric power
systems. Eur Trans Electr Power. 2012;22(2):235–252.
[13]
Xie J, Liu C-C, Sforna M, et al. On-line physical security
monitoring of power substations. Int Trans Electr Energy
Syst. 2016 Jun;26(6):1148–1170.
[14]
Liu C-C, Jung J, Heydt GT, et al. The strategic power
infrastructure defense (SPID) system. A conceptual
design. IEEE Control Syst Mag. 2000 Aug;20(4):40–52.
[15]
Li H, Rosenwald GW, Jung J, et al. Strategic power
infrastructure defense. Proc IEEE. 2005 May;93(5):918–933.
[16]
Jung J, Liu C-C, Tanimoto SL, et al. Adaptation in load
shedding under vulnerable operating conditions. IEEE
Trans Power Syst. 2002 Nov;17(4):1199–1205.
[17]
Yu N-P, Liu C-C, Price J. Evaluation of market rules using
a multi-agent system method. IEEE Trans Power Syst.
2010 Feb;25(1):470–479.
[18]
Xie J, Liu C-C, Sforna M. Distributed underfrequency
load shedding using a multi-agent system. Proceedings
of IEEE PowerTech (POWERTECH ‘15); 2015 Jul;
Eindhoven, Netherlands.
[19]
Emfinger W, Dubey A, Volgyesi P, et al. Demo abstract:
RIAP – a resilient information architecture platform
for edge computing. Proceedings of 2016 IEEEACM
Symposium on Edge Computing (SEC); 2016 Oct;
Washington, DC, USA. p. 119–120.
[20] “VOLTTRONTM
– Tranformative Wave,” DOE [Online].
Available from: https://energy.gov/eere/buildings/
volttron [Accessed 2016 Nov 21).
[21]
Panwai S, Dia H. Neural agent car-following models.
IEEE Trans Intell Transp Syst. 2007 Mar;8(1):60–70.
[22]
Jung J, Liu C-C, Hong M, et al. Multiple hypotheses and
their credibility in on-line fault diagnosis. IEEE Trans
Power Deliv. 2001 Apr;16(2):225–230.
[23]
Hexmoor H. Stages of autonomy determination. IEEE
Trans Syst Man Cybern C Appl Rev. 2001 Nov;31(4):509–
517.
The views and opinions of the authors expressed herein do not
necessarily state or reflect those of the United States Govern-
ment or any agency thereof.
Disclosure statement
No potential conflict of interest was reported by the authors.
Funding
This work is supported by the Advanced Research Projects
Agency - Energy (ARPA-E), U.S. Department of Energy,
at Washington State University under [grant number DE-
AR0000666] through the RIAPS project, ‘Resilient Informa-
tion Architecture Platform for the Smart Grid’. This research
was supported by EU Framework Programme FP7 at Univer-
sity College Dublin (UCD) through the AFTER project, ‘A
Framework for electrical power sysTems vulnerability identi-
fication, dEfense and Restoration’.
Notes on contributors
Jing Xie received his B.E. from Tongji University, Shanghai,
China, in 2010. He was a M.S. student at Tongji University from
2010 to 2011. Dr. Xie received his Ph.D. degree at University
College Dublin, Ireland, in 2015. He is currently an Assistant
Research Professor with the School of Electrical Engineering
and Computer Science, Washington State University, Pullman,
WA, USA. His research interests include physical security of
substations, distributed control of power systems, and testbed
technologies.
Chen-Ching Liu (F’94) is Boeing Distinguished Professor
at Washington State University, Pullman, WA. He is
also Visiting Professor at the School of Mechanical and
Materials Engineering, University College Dublin, Ireland.
At WSU, Professor Liu serves as Director of Energy Systems
Innovation Center (ESIC). Professor Liu received an IEEE
Third Millennium Medal in 2000 and the Power and Energy
Society Outstanding Power Engineering Educator Award in
2004. In 2013, Dr. Liu received a Doctor Honoris Causa from
Polytechnic University of Bucharest, Romania. Professor Liu
is a Fellow of the IEEE and Member of the Washington State
Academy of Sciences.
References
[1]
Nuthalapati S, Phadke AG. Managing the grid: using
synchrophasor technology. IEEE Power Ener Mag. 2015
Sep;13(5):10–12.
[2]
“Solar industry data – solar industry growing at a record
pace”. Solar Energy Industries Association (SEIA®).
[Accessed 2016 Nov 21].
[3]
Jian L, Zheng Y, Xiao X, et al. Optimal scheduling for
vehicle-to-grid operation with stochastic connection
of plug-in electric vehicles to smart grid. Appl Ener.
2015;146:150–161.
[4] Chan CC, Jian L, Tu D. Smart charging of electric vehicles
– integration of energy and information. IET Electr Syst
Transp. 2014;4(4):89–96.
Downloaded
by
[186.204.211.215]
at
04:32
04
August
2017
11. JOURNAL OF INTERNATIONAL COUNCIL ON ELECTRICAL ENGINEERING 197
[38]
Luke S, Cioffi-Revilla C, Panait L, et al. Mason: a
multiagent simulation environment. Simulation.
2005;81(7):517–527.
[39]
Grignard A, Taillandier P, Gaudou B, et al. GAMA 1.6:
advancing the art of complex agent-based modeling and
simulation. Proceedings of 16th International Conference
on Principles and Practice of Multi-Agent Systems
(PRIMA, 2013); 2013 Dec; Dunedin, New Zealand.
p. 117–131.
[40]
Akyol B, Haack J, Tews C, et al. An intelligent sensor
framework for the power grid. 5th International
Conference on Energy Sustainability; 2011 Aug;
Washington, DC, USA. p. 1485–1494.
[41]
Haack J, Akyol B, Carpenter B, et al. Volttron: an agent
platform for the smart grid. Proceedings of the 2013
international conference on Autonomous agents and
multi-agent systems (AAMS); 2013; Richland, SC.
p. 1367–1368.
[42]
Haack J, Akyol B, Tenney N, et al. VOLTTRON: an agent
platform for integrating electric vehicles and smart grid.
International Conference on Connected Vehicles and Expo
(ICCVE); 2013 Dec; Las Vegas, Nevada, USA. p. 81–86.
[43] Khamphanchai W, Saha A, Rathinavel K, et al. Conceptual
architecture of building energy management open source
software (BEMOSS). Proceedings of Innovative Smart
Grid Technologies (ISGT Europe ‘14); 2014 Oct; Istanbul,
Turkey. p. 1–6.
[44]
Khamphanchai W, Pipattanasomporn M, Kuzlu M, et al.
An agent-based open source platform for building energy
management. Proceedings of Innovative Smart Grid
Technologies-Asia (ISGT ASIA ‘15); 2015 Nov; Bangkok,
Thailand. p. 1–6.
[45]
Katipamula S, Lutes RG, Ngo H, et al. Transactional
network platform: applications. Pacific Northwest National
Laboratory (PNNL); 2013 Oct. (Tech. Rep. PNNL-22941).
[46]
Nakajima A, Morita M, Hayashi T, et al. Development of
an advanced wide-area special protection system. J Int
Counc Electr Eng. 2013;3(4):334–339.
[47]
Xue F, Li Y, Song X-F, et al. Impact of large-scale wind
power integration on the UFLS scheme. J Int Counc
Electr Eng. 2014;4(3):251–257.
[48]
Terzija VV. Adaptive underfrequency load shedding
based on the magnitude of the disturbance estimation.
IEEE Trans Power Syst. 2006;21(3):1260–1266.
[24]
Pease M, Shostak R, Lamport L. Reaching agreement in
the presence of faults. J ACM. 1980 Apr;27(2):228–234.
[25]
Lamport L. The part-time parliament. ACM Trans
Comput Syst. 1998 May;16(2):133–169.
[26] Lamport L and others. Paxos made simple. ACM SIGACT
News. 2001 Dec;32(4):18–25.
[27]
Olfati-Saber R, Murray RM. Consensus problems in
networks of agents with switching topology and time-
delays. IEEE Trans Autom Control. 2004;49(9):1520–
1533.
[28]
Xiao L, Boyd S. Fast linear iterations for distributed
averaging. Syst and Control Lett. 2004;53:65–78.
[29]
Laudon K, Laudon JP. Management information systems:
managing the digital firm. Vol. 7. New Jersey: Pearson
Education, Inc., Upper Saddle River; 2015.
[30]
Ricordel P-M, Demazeau Y. From analysis to
deployment: a multi-agent platform survey. First
International Workshop on Engineering Societies in
the Agents World (ESAW); 2000 Aug; Berlin, Germany.
p. 93–105.
[31]
Kravari K, Bassiliades N. A survey of agent platforms. J
Artif Soc Soc Simulat. 2015;18(1):11.
[32]
Bellifemine FL, Caire G, Greenwood D. Developing
multi-agent systems with JADE. Vol. 7. Hoboken, NJ:
John Wiley Sons; 2007.
[33]
Russell S, Jordan H, O’Hare GMP, et al. Agent factory: a
framework for prototyping logic-based AOP languages.
Proceedings of 9th German Conference on Multiagent
System Technologies (MATES ‘11); 2011 Oct; Berlin,
Germany. p. 125–136.
[34]
Mallett E. NAESB developing framework for current
and future grid interoperability. Nat Gas Electr. 2015
Nov;32(5):6–10.
[35]
Akyol B, Haack J, Carpenter B et al. Volttron: an agent
execution platform for the electric power system.
Proceedings of the Third International Workshop on
Agent Technologies for Energy Systems; 2012 Jun;
Valencia, Spain. p. 117–131.
[36]
VOLTTRON 3.0: User Guide. Pacific Northwest National
Laboratory (PNNL). 2015 Nov.
[37]
Galland S, Gaud N, Rodriguez S, et al. Janus: another yet
general-purpose multiagent platform. Proceedings of 7th
Agent-Oriented Software Engineering Technical Forum
(TFGASOSE-10); 2010 Dec; Paris, France.
Downloaded
by
[186.204.211.215]
at
04:32
04
August
2017