SlideShare a Scribd company logo
1 of 20
LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering 5200 Perring Parkway  Baltimore, MD 21251 Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information Framework (IIF)
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why This Research? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definitions Insurgency :   an  armed rebellion  by any irregular armed force that rises up  against an established authority, government, or administration . Those carrying out an insurgency are insurgents.  Insurgents   conduct sabotage and harassment . Insurgents usually are in  opposition to a civil authority or government  primarily in the hope of improving their condition.  Terrorism:   systematic use of terror , manifesting itself in violence and intimidation. Those carrying out terrorism are terrorist. Terrorist  conduct  violence for the purpose   of creating fear in order to achieve a political, economic, religious, or ideological   goal . Framework:  A  logical structure  for classifying and organizing complex information.
Problem Definition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How are insurgencies planned for and what is the process? How are insurgencies carried out and what is the process?  Are there any consistencies in the locations and  surroundings where insurgencies are carried out? Why are more Iraqi women becoming insurgents? Sample Insurgency Questions  That might be Addressed by This Research
Insurgency Research System
METHODOLOGY
Agent Oriented Development Environment  User Knowledge Interacts With Guides Verifies
Object-Oriented Development Life Cycle Implemented using Enterprise Architect Reference: Tsang, Curtis, et al.,  “Object-Oriented Technology,” McGraw Hill, 2005. Activity Diagram
Model Driven Architecture (MDA)
BDI Agent System Jadex BDI Architecture Goal-Oriented Reasoning Engine Agent BDI Model
Multi-Agent Systems Reference: Jennings, Nick, “Agent-Based Computing: Promise and Perils,” Presentation, Dept of Electronics and Computer Science, University of Southampton.
3D Electronic Institution Concept Only systems that have a high degree of interactions need to be structured in order to avoid violations Reference: Bogdanovych, Esteva, et al, “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).
Integrated Multi-Agent Development Process Microsoft  Access Cognitive Modeling Application JADEX Software/ JADE Platform Ontology  Database Problem Domain Database Communication Server Electronic Institution Developmental Cycle Design Verify Test Deployment Development Simulate ISLANDER:  graphical tool for specification of rules & protocols in eI AMELI:  software platform to run eI aBuilder:  agent development tool SIMDEI:  simulation tool to animate & analyze eI iGrafix  FlowCharter Enterprise  Architect 2 nd  Life Virtual World Technology Visualization Layer Behavioral Experimentation Insurgency  Questions to be Answered
Runtime Architecture Reference: Bogdanovych, Esteva, et al., “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).  Second Life ©
Tools Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Development of an Insurgency Information Framework  Using Multi-Agent Technololgy
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

What's hot (12)

"Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective""Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective"
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
Managing Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and ApproachesManaging Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and Approaches
 
Linking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual ArchivesLinking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual Archives
 
Eliciting and Visualising Trust Expectations using Persona Trust Characterist...
Eliciting and Visualising Trust Expectations using Persona Trust Characterist...Eliciting and Visualising Trust Expectations using Persona Trust Characterist...
Eliciting and Visualising Trust Expectations using Persona Trust Characterist...
 
Reproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveReproducibility from an infomatics perspective
Reproducibility from an infomatics perspective
 
Deep Neural Networks for Machine Learning
Deep Neural Networks for Machine LearningDeep Neural Networks for Machine Learning
Deep Neural Networks for Machine Learning
 
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
 
Model bias in AI
Model bias in AIModel bias in AI
Model bias in AI
 
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESBROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
 
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALSBROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
 
Rainey resume 2 25-2021
Rainey resume 2 25-2021Rainey resume 2 25-2021
Rainey resume 2 25-2021
 

Similar to Social Computing

Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 
Goal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to ImplementationGoal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to Implementation
Amjad Adib
 
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
IJNSA Journal
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
FACE
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
Alexander Deucalion
 

Similar to Social Computing (20)

A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...
 
Goal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to ImplementationGoal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to Implementation
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
 
Agent-Based Problem Solving Methods In Big Data Environment
Agent-Based Problem Solving Methods In Big Data EnvironmentAgent-Based Problem Solving Methods In Big Data Environment
Agent-Based Problem Solving Methods In Big Data Environment
 
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEMSTUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
social networking site
social networking sitesocial networking site
social networking site
 
From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...
From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...
From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
 
Complete-SRS.doc
Complete-SRS.docComplete-SRS.doc
Complete-SRS.doc
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
H1803044651
H1803044651H1803044651
H1803044651
 

More from tjoozey tjoozey

More from tjoozey tjoozey (9)

Social Computing : Virtual Worlds
Social Computing : Virtual WorldsSocial Computing : Virtual Worlds
Social Computing : Virtual Worlds
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
05 Bronner Richards
05 Bronner Richards05 Bronner Richards
05 Bronner Richards
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

Social Computing

  • 1. LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering 5200 Perring Parkway Baltimore, MD 21251 Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information Framework (IIF)
  • 2.
  • 3.
  • 4. Definitions Insurgency : an armed rebellion by any irregular armed force that rises up against an established authority, government, or administration . Those carrying out an insurgency are insurgents. Insurgents conduct sabotage and harassment . Insurgents usually are in opposition to a civil authority or government primarily in the hope of improving their condition. Terrorism: systematic use of terror , manifesting itself in violence and intimidation. Those carrying out terrorism are terrorist. Terrorist conduct violence for the purpose of creating fear in order to achieve a political, economic, religious, or ideological goal . Framework: A logical structure for classifying and organizing complex information.
  • 5.
  • 6. How are insurgencies planned for and what is the process? How are insurgencies carried out and what is the process? Are there any consistencies in the locations and surroundings where insurgencies are carried out? Why are more Iraqi women becoming insurgents? Sample Insurgency Questions That might be Addressed by This Research
  • 9. Agent Oriented Development Environment User Knowledge Interacts With Guides Verifies
  • 10. Object-Oriented Development Life Cycle Implemented using Enterprise Architect Reference: Tsang, Curtis, et al., “Object-Oriented Technology,” McGraw Hill, 2005. Activity Diagram
  • 12. BDI Agent System Jadex BDI Architecture Goal-Oriented Reasoning Engine Agent BDI Model
  • 13. Multi-Agent Systems Reference: Jennings, Nick, “Agent-Based Computing: Promise and Perils,” Presentation, Dept of Electronics and Computer Science, University of Southampton.
  • 14. 3D Electronic Institution Concept Only systems that have a high degree of interactions need to be structured in order to avoid violations Reference: Bogdanovych, Esteva, et al, “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).
  • 15. Integrated Multi-Agent Development Process Microsoft Access Cognitive Modeling Application JADEX Software/ JADE Platform Ontology Database Problem Domain Database Communication Server Electronic Institution Developmental Cycle Design Verify Test Deployment Development Simulate ISLANDER: graphical tool for specification of rules & protocols in eI AMELI: software platform to run eI aBuilder: agent development tool SIMDEI: simulation tool to animate & analyze eI iGrafix FlowCharter Enterprise Architect 2 nd Life Virtual World Technology Visualization Layer Behavioral Experimentation Insurgency Questions to be Answered
  • 16. Runtime Architecture Reference: Bogdanovych, Esteva, et al., “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07). Second Life ©
  • 17.
  • 18. Development of an Insurgency Information Framework Using Multi-Agent Technololgy
  • 19.
  • 20.