Presented at 30th International Conference on Software Engineering & Knowledge Engineering (SEKE) at San Francisco (USA).
1st July, 2018
Instagram: @prof.pantoja
U NIVERSAL ICT D EVICE C ONTROLLER FOR THE V ISUALLY C HALLENGEDIJCI JOURNAL
With today's modern lifestyle, ICT devices that wer
e once considered as luxuries have turned into
necessities. One of the main problems associated wi
th these ICT devices is that they all come with sep
arate
remote controllers. All these remote controllers ha
ve got different buttons which are designed in thei
r own
customized way. So there is a lack of commonality o
r interoperability between different devices or bet
ween
different vendors. Now, this becomes a major proble
m when the visually challenged people need to use
these devices. In this paper, we present a novel ap
proach which acts as a universal intelligent remote
controller for all the electronic devices and which
is extremely user-friendly to the visually challen
ged. It
uses two transceivers- one at the ICT device end wh
ich is used to communicate directly with the ICT de
vice
and the other is the user end device i.e. the Smart
phone
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
Internet of Things (IoT) basically discusses about the connection of various physical devices through a network
and let them take an active part by exchanging information through Internet. This paper presents important applications of IoT and the different challenges of IoT. Out of the various challenges, attacks on the devices used in IoT are of serious concern. Device oriented attacks and the defensive mechanisms are studied in this paper. A comparison is done for the specific malicious attacks on the M2M communicating devices.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
The internet of things (io t) : IoT academy AnkitThakkar46
The Internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Achievements and future works of ITU-T Study Group 2 on Operational aspects of service provision and Telecommunications management
Presented at WTSA-16 by Dr Sherif Guinena, Chairman of ITU-T Study Group 2
U NIVERSAL ICT D EVICE C ONTROLLER FOR THE V ISUALLY C HALLENGEDIJCI JOURNAL
With today's modern lifestyle, ICT devices that wer
e once considered as luxuries have turned into
necessities. One of the main problems associated wi
th these ICT devices is that they all come with sep
arate
remote controllers. All these remote controllers ha
ve got different buttons which are designed in thei
r own
customized way. So there is a lack of commonality o
r interoperability between different devices or bet
ween
different vendors. Now, this becomes a major proble
m when the visually challenged people need to use
these devices. In this paper, we present a novel ap
proach which acts as a universal intelligent remote
controller for all the electronic devices and which
is extremely user-friendly to the visually challen
ged. It
uses two transceivers- one at the ICT device end wh
ich is used to communicate directly with the ICT de
vice
and the other is the user end device i.e. the Smart
phone
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
Internet of Things (IoT) basically discusses about the connection of various physical devices through a network
and let them take an active part by exchanging information through Internet. This paper presents important applications of IoT and the different challenges of IoT. Out of the various challenges, attacks on the devices used in IoT are of serious concern. Device oriented attacks and the defensive mechanisms are studied in this paper. A comparison is done for the specific malicious attacks on the M2M communicating devices.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
The internet of things (io t) : IoT academy AnkitThakkar46
The Internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Achievements and future works of ITU-T Study Group 2 on Operational aspects of service provision and Telecommunications management
Presented at WTSA-16 by Dr Sherif Guinena, Chairman of ITU-T Study Group 2
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
Injecting (Micro)Intelligence in the IoT: Logic-based Approaches for (M)MASAndrea Omicini
Pervasiveness of ICT resources along with the promise of ubiquitous intelligence is pushing hard both our demand and our fears of AI: demand mandates for the ability to inject (micro) intelligence ubiquitously, fears compel the behaviour of intelligent systems to be observable, explainable, and accountable.
Whereas the first wave of the new "AI Era" was mostly heralded by non-symbolic approaches, features like explainability are better provided by symbolic techniques.
In this talk we focus on logic-based approaches, and discuss their potential in pervasive scenarios like the IoT and open (M)MAS along with our latest results in the field.
Andrea Omicini, Roberta Calegari
Invited Talk
MMAS 2018, Stockholm, Sweden, 14 July 2018
As technology advances make the deployment of the Industrial Internet of Things (IIoT) more cost-effective, the industry will need to acquire a strategic approach to integrate new sensor data with existing data environments.
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
Smart phones have become part of our daily life. People using smart phones have increased
rapidly. The proposed paper is to provide a security system that combines the functions of smart phone and home
network system. It enables the users to check the image of the visitor who is present at the door. It also saves all
the images in their drive. We send an alert message to the Owner whenever the doorbell is pressed. Furthermore,
the owner can call to the visitor with the help of our app. We are also providing a link in the SMS sent so that it
redirects the user to the app.
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
Smart phones have become part of our daily life. People using smart phones have increased
rapidly. The proposed paper is to provide a security system that combines the functions of smart phone and home
network system. It enables the users to check the image of the visitor who is present at the door. It also saves all
the images in their drive. We send an alert message to the Owner whenever the doorbell is pressed. Furthermore,
the owner can call to the visitor with the help of our app. We are also providing a link in the SMS sent so that it
redirects the user to the app
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
Injecting (Micro)Intelligence in the IoT: Logic-based Approaches for (M)MASAndrea Omicini
Pervasiveness of ICT resources along with the promise of ubiquitous intelligence is pushing hard both our demand and our fears of AI: demand mandates for the ability to inject (micro) intelligence ubiquitously, fears compel the behaviour of intelligent systems to be observable, explainable, and accountable.
Whereas the first wave of the new "AI Era" was mostly heralded by non-symbolic approaches, features like explainability are better provided by symbolic techniques.
In this talk we focus on logic-based approaches, and discuss their potential in pervasive scenarios like the IoT and open (M)MAS along with our latest results in the field.
Andrea Omicini, Roberta Calegari
Invited Talk
MMAS 2018, Stockholm, Sweden, 14 July 2018
As technology advances make the deployment of the Industrial Internet of Things (IIoT) more cost-effective, the industry will need to acquire a strategic approach to integrate new sensor data with existing data environments.
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
Smart phones have become part of our daily life. People using smart phones have increased
rapidly. The proposed paper is to provide a security system that combines the functions of smart phone and home
network system. It enables the users to check the image of the visitor who is present at the door. It also saves all
the images in their drive. We send an alert message to the Owner whenever the doorbell is pressed. Furthermore,
the owner can call to the visitor with the help of our app. We are also providing a link in the SMS sent so that it
redirects the user to the app.
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
Smart phones have become part of our daily life. People using smart phones have increased
rapidly. The proposed paper is to provide a security system that combines the functions of smart phone and home
network system. It enables the users to check the image of the visitor who is present at the door. It also saves all
the images in their drive. We send an alert message to the Owner whenever the doorbell is pressed. Furthermore,
the owner can call to the visitor with the help of our app. We are also providing a link in the SMS sent so that it
redirects the user to the app
Test automation asserting Iot_Ingenious tinkerers_MSEC.pptx6038kannans20MSEC
THE INTERNET OF THINGS is a unique system of connected objects that can collect, process, and transfer data with the help of wireless networks without the assistance of humans. The main challenge with IoT testing is the fact that it covers many industries and use cases, with massive cross-platform deployment of embedded technologies. Many alliances are trying to create a single protocol to allow all global devices to communicate with each other, yet, there are still many standards one can choose from. The devices can rely on Zigbee, Thread, Bluetooth Mesh, or Wi-Fi. as well as LoRa, or others and the more standards, the more challenging it is to do proper testing.
Experts predict there will be 41 billion IoT devices by 2027, with another 127 devices connected every second. That’s a lot of things. With the proliferation of IoT devices, connected device testing has become more important than ever. As is the case with any product connected or not it’s always good to thoroughly test it to ensure any issues won’t adversely impact the performance of the rest of the system. Testing brings predictability to the system and reveals any potentially harmful bugs, ensuring the device meets a high standard of quality and the expectations of end users.
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
Ubiquitous computing allows more efficient exploitation of information systems, economizes
user cost and effort to use the information system. The network technical room monitoring
problem, arising from network management practice, is important to operate the network, to
discover and resolve unpredictable situation. In addition, many of monitoring and sensor
product are shipped with closed proprietary software, and the interoperability between them is
very difficult. In this article, the author present several ubiquitous computing technologies,
propose a model of ubiquitous monitoring system for network technical room. This model
allows monitoring the network technical room remotely, via variable terminal devices and
variable communication infrastructure. The model has been implemented in Hanoi University of
Science and Technology (HUST) Network Information Centre with IP Cameras and RFID
devices.
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is uniquely challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web-Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Overall the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on-demand real-time sensor data. A generic IoT platform can be built and extended to newer applications and platforms.
Introduction to Embedded System Architecture and Design.docx.pdfArshak28
Embedded system architecture and design refers to the process of developing hardware and software components that are specifically designed to perform dedicated functions within a larger system. The architecture of an embedded system includes the selection and integration of microprocessors, microcontrollers, memory, and various peripherals to meet specific requirements. Embedded system design involves the creation of software algorithms and coding methodologies that enable the system to perform its intended tasks efficiently and reliably. This field encompasses various disciplines, including electronics, computer architecture, and software engineering, and plays a vital role in the development of a wide range of devices, from smartphones and appliances to automotive systems and industrial equipment.
For more visit : https://iies.in/
What if Things Start to Think - Artificial Intelligence in IoTMuralidhar Somisetty
Artificial intelligence will be functionally necessary to wield the vast number of connected “things” online, and will be even more important in making sense of an almost endless sea of data streamed in from these devices.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
In this presentation, Agastya introduces the topic of automation and associated trends. Agastya's interest lies in developing automation systems to aid the programming community whereby less of their time goes in testing and more of it goes in designing products and platforms.
The Indo-American Journal of Agricultural and Veterinary Sciences is an online international journal published quarterly. It is a peer-reviewed journal that focuses on disseminating high-quality original research work, reviews, and short communications of the publishable paper.
The current landscape of Internet of Things (IoT) applications is extremely fragmented because we are still experimenting to discover the correct mix for our respective markets. Unfortunately in the IoT world, one solution does not fit all.We need much more clarity in understanding the challenges of IoT application development, both in terms of technical feasibility as well as business opportunities. In our talk we present a toolkit approach towards accelerating IoT applications by leveraging modular components that can effectively accelerate go to market for end solutions.
Internet of things is one of the catch words now a day.
It promises a great future for the internet. Today common types
of communications are person to person, machine to person, or
person to machine. But Internet of things brings a new
technology where a type of communication is machine to
machine. Many technology and protocols have been studied for
this new communication. One of the new and emerging
technologies is VMware Pulse IoT center which provides IoT
device management in a pretty manner. It serves as management
glue between hardware. This paper will take a look on features,
benefits and working of VMware pulse IoT center including
summary of IoT solutions by VMware pulse IoT center.
Similar to An Architecture for the Development of Ambient Intelligence Systems Managed by Embedded Agents (20)
Transporte de Agentes Cognitivos entre SMA Distintos Inspirado nos Princípios...Carlos Eduardo Pantoja
Apresentação feita no XII WESAAC em 02/05/2018.
Na biologia, os seres vivos são capazes de estabelecer relações que podem ser classificadas de acordo com o comportamento dos envolvidos. Estas relações biológicas podem ser benéficas ou não para os envolvidos dependendo de como estes se relacionam. Agentes são entidades autônomas com capacidade de tomada de decisão, raciocínio cognitivo e, inclusive, de socializar com outros agentes em um Sistema Multi-Agente (SMA). Alguns agentes são capazes de se moverem para outros sistemas, podendo, assim, se relacionar com agentes, de forma similar aos seres vivos. Este trabalho tem como objetivo propor protocolos inspirados nas relações biológicas com a finalidade de explorar a movimentação de agentes pertencentes a um SMA embarcado em um dispositivo físico e autônomo para um outro SMA em um dispositivo distinto. Serão abordados três protocolos: predatismo, mutualismo e inquilinismo, onde a transferência é feita com o objetivo de dominar, trocar conhecimentos e sobreviver no sistema de destino, respectivamente. Estes protocolos visam preservar e/ou compartilhar os conhecimentos indispensáveis obtidos durante a existência dos agentes. Neste caso, um SMA pode utilizar um dos protocolos propostos para migrar para um outro sistema embarcado. Por fim, serão apresentados alguns experimentos iniciais, nos quais foram criados dois protótipos (um líder e um hospedeiro) onde o líder é danificado e a relação de predatismo é acionada para preservar os conhecimentos adquiridos.
Questões de Consursos Públicos para a área de Sistemas de Informações Gerenciais. Contém questões sobre: E-Commerce, Desenvolvimento de SIG, Business Intelligence, Banco de Dados e Intranet. Para assistir as vídeo-aulas acesse www.youtube.com/professorpantoja
Prototyping Ubiquitous Multi-Agent Systems: A Generic Domain Approach with JasonCarlos Eduardo Pantoja
Presented at 15th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS) at Polytechnic of Porto - Porto (Portugal).
21st June, 2017
Instagram: @prof.pantoja
Material didático da disciplina de Introdução a Administração do Curso Técnico em Informática industrial do CEFET/RJ Campus Nova Friburgo entre os anos de 2009 e 2013.
Instagram: @prof.pantoja
Aplicando Sistemas Multi-Agentes Ubíquos em um Modelo de Smart Home Usando o ...Carlos Eduardo Pantoja
Trabalho apresentado no 2° Workshop de Pesquisa e Desenvolvimento em Inteligência Artificial, Inteligência Coletiva e Ciência de Dados no dia 14 de Dezembro de 2016 em Niterói/RJ.
Veja mais trabalhos em: fb.com/turingproject
Instagram: @prof.pantoja
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
An Architecture for the Development of Ambient Intelligence Systems Managed by Embedded Agents
1. An Architecture for the
Development of AmI Systems
Managed by Embedded
Agents
30th International Conference on
Software Engineering & Knowledge
Engineering (SEKE)
• 1. Federal Center for Technological Education (CEFET/RJ), Brazil
• 2. Fluminense Federal University (UFF), Brazil
• 3. Université Pierre et Marie Curie (UPMC), Paris, France
Carlos Eduardo Pantoja1,2
Heder Dorneles Soares2
José Viterbo2
Amal El-Fallah Seghrouchni3
July 1st, 2018
3. 3An Architecture for the Development of AmI Systems Managed by Embedded Agents
• Ubiquitous Systems
Ubiquitous Computing or pervasive computing is the capability of embedding
intelligence in everyday objects in a way that the person who interacts with this object
reduces the level of interaction with the device or even does not notice them. [Weiser,
2002]
Ambient Intelligence (AmI)
• Internet of Things (IoT)
• Agents [Wooldridge, 2000]
agents are autonomous and cognitive entities from artificial intelligence.
• Multi-Agent Systems [Wooldridge, 2009]
Agents can collaborate with other agents and they have common or conflicting goals.
Besides they are situated in an environment.
1. INTRODUCTION
4. 4An Architecture for the Development of AmI Systems Managed by Embedded Agents
1. INTRODUCTION: DOMAINS
The domain of
this work!!
5. 5An Architecture for the Development of AmI Systems Managed by Embedded Agents
• Early AmI works deal with the automation of common things in home or office
the classical automated coffee pot that sends information about the age, availability
and, temperature of the coffee.
It uses sensors and actuators, a computer, and a UNIX workstation
a simple reactive solution connected to the Internet
no intelligence applied in the solution.
a list of information and services about a room when the user enters it. If the users
enter the kitchen, the refrigerator shows a list of fridge items or a list of recipes using
Internet browsers. It do not consider (above all because of the technological limitations
of that time):
communication between devices
embedded technologies
complex processing or autonomous reasoning,
• With Internet of Things (IoT), it became possible to enhance and interconnect daily
objects together to perform pervasively actions
1.1. PROBLEM SETTING: AmI (Early Works)
6. 6An Architecture for the Development of AmI Systems Managed by Embedded Agents
• AmI Systems + Traditional Programming Languages
based on logic and programming languages such as Java
approaches were bonded to a specific domain
rebuilding the system from the scratch or even to change the hardware employed
platforms and hardware technologies were also limited
rarely consider inference rules to provide a better understanding of the user behavior
presented a centralized multi-agent solution (even with inference rules)
a central server is responsible for hosting the agents
or presented a distributed multi-agent system
agents were distributed in a closed environment
1.1. PROBLEM SETTING: AmI + Agents (Early Works)
7. 7An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.1. PROBLEM SETTING: AmI + Agents (Early Works)
2003
2009
8. 8An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.1. PROBLEM SETTING: AmI + Agents (Early Works)
2003
2009
9. 9An Architecture for the Development of AmI Systems Managed by Embedded Agents
• AmI Systems + Agent-Oriented Programming Languages (AOPL)
several frameworks for the development of MAS emerges
java-based agent frameworks play an important role in the development of MAS
looks like applications available in smartphones nowadays
using sensors on a large scale
notifying about daily tasks
some works apply the agent approach in simulated solutions
do not consider inference rules
one agent per device
1.2. PROBLEM SETTING: AmI + Agents
10. 10An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.2. PROBLEM SETTING: AmI + Agents
2003
2013
11. 11An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.2. PROBLEM SETTING: AmI + Agents
2003
2013
12. 12An Architecture for the Development of AmI Systems Managed by Embedded Agents
• AmI Systems + MAS + IoT should:
present a distributed and heterogeneous devices are responsible for the reasoning of
an entire environment pervasively
can enter or leave this ambient in a scalable way
still act independently from the technological architecture employed
• Embedded Systems
exploit existent architectures and middleware to facilitate the communication between
hardware and a MAS
use a central processing unit for controlling from distance
one agent per device
conceptual works consider agents working as things in network:
One agent is responsible for a thing in a Agents of Things (AoT) network
The possibility of employing MAS for controlling things (blue sky paper)
1.3. PROBLEM SETTING: AmI + Agents + IoT
13. 13An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.3. PROBLEM SETTING: AmI + Agents + IoT
2013
2017
14. 14An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.3. PROBLEM SETTING: AmI + Agents + IoT
2013
2017
15. 15An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.3. PROBLEM SETTING: AmI + Agents + IoT
2013
2017
16. 16An Architecture for the Development of AmI Systems Managed by Embedded Agents
• Architecture for the Internet of Smart Things (IoST):
a scalable architecture for the deployment of AmI Systems;
comprised by mobile and fixed devices enhanced by MAS
based on IoT technologies
mobile devices can enter or leave anytime.
an independent and embedded MAS representing a smart thing
1.4. ABSTRACT GOAL: AN ARCHITECTURE FOR IoST
17. 17An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.4. ABSTRACT GOAL: AN ARCHITECTURE FOR IoST
Metering Devices
Indoor Air Quality Sensors
Soil Humidity Sensors
IoT
18. 18An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.4. ABSTRACT GOAL: AN ARCHITECTURE FOR IoST
Smart Thing
Smart Thing
Smart Thing
Metering Devices
Indoor Air Quality Sensors
Soil Humidity Sensors
Smart Thing
IoT
ST
ST
ST
ST
Smart Thing
ST
19. 19An Architecture for the Development of AmI Systems Managed by Embedded Agents
• The Smart Thing:
device composed of sensors and actuators
a MAS responsible for controlling the device
able of communicating with other devices apart of the technology employed in them
can enter or leave in the AmI system
self-configurable
able of informing their abilities and utilities to the other devices
1.5. GOALS: SMART THING
20. 20An Architecture for the Development of AmI Systems Managed by Embedded Agents
1.5. GOAL: SMART THING
IoT
22. 22An Architecture for the Development of AmI Systems Managed by Embedded Agents
2. BACKGROUND: JASON + ARGO
ARGO [Pantoja et al., 2016] is a customized
architecture for Jason framework.
• It is a special kind of agent responsible for
controlling hardware devices (ATMEGA, PIC,
Intel, etc.):
• Javino [Lazarin and Pantoja, 2015]
Interface for communication between
microcontrollers and high-level software
with error detection.
• Perceptions Filters [Stabile Jr e Sichman,
2015]
Perceptions Filters reduce the amount of
information perceived by the agent at
runtime.
The Argo
by Lorenzo Costa
23. 23An Architecture for the Development of AmI Systems Managed by Embedded Agents
2. BACKGROUND: JASON + ARGO
The modified
reasoning
cycle of an
ARGO agent!
24. 24An Architecture for the Development of AmI Systems Managed by Embedded Agents
2. BACKGROUND: CONTEXNET
Controller
Gateway
Gateway
Gateway
Processing
node
Core SDDL
(DDS Domain)
.
.
.
.
.
.2G/3G
Network
WiFi
Gateway
Processing
node
.
.
.
GroupDefiner PoA-Manager
Data
Connection
MR-UDP
MR-UDP
MR-UDP
MR-UDP
26. 26An Architecture for the Development of AmI Systems Managed by Embedded Agents
• Available Attributes
Autonomy
The ST should perform independently of any technology outside of its architecture.
The ST should work properly if it has been moved to another AmI system.
The ST should perform its functionalities even if there is no communication available.
Communicability
ST are able of connecting at an IoT based infrastructure.
It should be able of communicating with other devices including ST themselves.
Context-awareness
Data processing can occur in the ST without obligation to send it to a central part.
They can use the result for decision making or send it to any device in the AmI System.
ST are also able of dealing with inference rules for discovering context situations
Self-configurable
ST are capable of setting up itself in an AmI system presenting its functionalities and
how to communicate with it.
3. THE PROPOSED APPROACH: SMART THING (ST)
27. 27An Architecture for the Development of AmI Systems Managed by Embedded Agents
3. THE PROPOSED APPROACH: SMART THING
29. 29An Architecture for the Development of AmI Systems Managed by Embedded Agents
4.1. HYBRID ARCHITECTURE FOR SMART THINGS
• Layered Architecture [Pantoja et al., 2018b]
Hardware:
controls heterogeneous hardware devices
(ATMEGA, PIC, etc.)
connected to sensors and actuators
Serial interface:
uses serial ports for exchanging data
between hardware and software.
High-level programming language
uses a MAS using Jason framework
• Possible Agents in a Smart Thing
Standard [Bordini et al.,2007]
Argo [Pantoja et al., 2016b]
Communicator [Pantoja et al., 2018a]
Augmented [Casals et al., 2017]
30. 30An Architecture for the Development of AmI Systems Managed by Embedded Agents
4.1. HYBRID ARCHITECTURE FOR SMART THINGS
The architecture capable of
controlling different
devices in a Smart Home
scenario.
This architecture is the
same employed in the
Smart Thing.
However, there is no
communication
mechanism available
with other devices!
31. 31An Architecture for the Development of AmI Systems Managed by Embedded Agents
4.1. HYBRID ARCHITECTURE FOR SMART THINGS
SMARTTHING1
SMARTTHING2
It is possible to
provide a
communication
channel using
ContextNet!
The idea is to provide
Smart Things managed by
MAS to control specific
parts of the solution.
And make them capable
of communicating with
each other.
32. 32An Architecture for the Development of AmI Systems Managed by Embedded Agents
A
A C
C
A
MAS A MAS B
ContextNet
[Endler et al.,
2011]
SMART
THING
SMART
THING
4.2. COMMUNICABILITY AND CONNECTIVITY
33. 33An Architecture for the Development of AmI Systems Managed by Embedded Agents
4.2. COMMUNICABILITY AND CONNECTIVITY
The modified
reasoning
cycle of
Communicator
agent!
34. 34An Architecture for the Development of AmI Systems Managed by Embedded Agents
4.2. COMMUNICABILITY AND CONNECTIVITY
Ex.: .sendOut ("788 b2b22−baa6 −4c61−b1bb− 33 01 cff1f5f878 ", achieve, decrease)
preamble field size sender
fffe 04
4 hex 2 hex up to 256 bytes
field size
2 hex
receiver
up to 256 bytes
field size
2 hex
force
up to 256 bytes
field size
2 hex
message
up to 256 bytes
kate 03 bob 07 achieve 08 Hello CN
.sendOut(receiver, illocutionary forces, propositional content)
The format of a message sent using Jason and ContextNet.
Used to identify necessary attributes for both technologies.
35. 35An Architecture for the Development of AmI Systems Managed by Embedded Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Send the
message
using
ContexNet
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
4.2. COMMUNICABILITY AND CONNECTIVITY
The process
of sending
and receiving
a message.
36. 36An Architecture for the Development of AmI Systems Managed by Embedded Agents
4.3 EXAMPLE 1
37. 37An Architecture for the Development of AmI Systems Managed by Embedded Agents
4.3 EXAMPLE 2
38. 38An Architecture for the Development of AmI Systems Managed by Embedded Agents
4.3 EXAMPLE 3 (CEFET’s LAB)
40. 40An Architecture for the Development of AmI Systems Managed by Embedded Agents
• This work presented:
an architecture for the development of AmI systems employing the agent approach and
supported by an IoT middleware named ContexNet
it is possible to assemble devices, which have embedded MAS responsible for controlling
sensors and actuators and for communicating with other devices
every device is an independent solution and it is free to enter and leave in the architecture
• Future Works
To extend the architecture for providing organizational constructions.
A Self-configurable Smart Thing using logic programming language.
5. CONCLUSION
41. 41An Architecture for the Development of AmI Systems Managed by Embedded Agents
[1] M. Weiser, “The computer for the 21st century,” IEEE pervasive computing, vol. 1, no. 1, pp.
19–25, 2002.
[2] D. Surie, O. Laguionie, and T. Pederson, “Wireless sensor networking of everyday objects in
a smart home environment,” in Intelligent Sensors, Sensor Networks and Information
Processing, 2008. ISSNIP 2008. International Conference on. IEEE, 2008, pp. 189–194.
[3] H. D. Soares, R. P. de Oliveira Guerra, and C. V. N. de Albuquerque, “Ftsp+: A mac
timestamp independent flooding time synchronization protocol,” in XXXIV Simpósio Brasileiro
de Redes de Computadores e Sistemas Distribuídos - SBRC. Sociedade Brasileira de
Computação, 2016, pp. 820–832.
[4] M. Endler, G. Baptista, L. Silva, R. Vasconcelos, M. Malcher, V. Pantoja, V. Pinheiro, and J.
Viterbo, “Contextnet: context reasoning and sharing middleware for large-scale pervasive
collaboration and social networking,” in Proceedings of the Workshop on Posters and Demos
Track. ACM, 2011, p. 2.
[5] G. Pardo-Castellote, “Omg data-distribution service: Architectural overview,” in Distributed
Computing Systems Workshops, 2003. Proceedings. 23rd International Conference on. IEEE,
2003, pp. 200–206.
[6] M. Wooldridge, An Introduction to MultiAgent Systems. Wiley, 2009
REFERENCES
42. 42An Architecture for the Development of AmI Systems Managed by Embedded Agents
[7] C. Maciel, P. C. de Souza, J. Viterbo, F. F. Mendes, and A. El Fallah Seghrouchni, A Multi-
agent Architecture to Support Ubiquitous Applications in Smart Environments. Berlin,
Heidelberg: Springer Berlin Heidelberg, 2015, pp. 106–11647.
[8] R. H. Bordini, J. F. H¨ubner, and M. Wooldridge, Programming MultiAgent Systems in
AgentSpeak using Jason. John Wiley & Sons Ltd, 2007.
[9] L. Silva, M. Endler, and M. Roriz, “Mr-udp: Yet another reliable user datagram protocol, now
for mobile nodes,” Monografias em Ciência da Computação, nr, vol. 1200, pp. 06–13, 2013.
[10] C. E. Pantoja, M. F. Stabile, N. M. Lazarin, and J. S. Sichman, “Argo: An extended jason
architecture that facilitates embedded robotic agents programming,” in Engineering Multi-
Agent Systems: 4th International Workshop, EMAS 2016, M. Baldoni, J. P. M¨uller, I. Nunes,
and R. ZalilaWenkstern, Eds. Springer, 2016, pp. 136–155.
[11] N. M. Lazarin and C. E. Pantoja, “A robotic-agent platform for embedding software agents
using raspberry pi and arduino boards,” in 9th Software Agents, Environments and
Applications School, 2015.
[12] C. Savaglio, G. Fortino, and M. Zhou, “Towards interoperable, cognitive and autonomic iot
systems: an agent-based approach,” in Internet of Thing
REFERENCES
43. 43An Architecture for the Development of AmI Systems Managed by Embedded Agents
ACKNOWLEDGMENTS
THANK YOU!
QUESTIONS?
pantoja@cefet-rj.br
viterbo@ic.uff.br
amal.elfallah@lip6.fr