This document discusses extending the Jason framework to enable programming of physical agents for ambient intelligence systems. It proposes adding a communicator agent and message format to allow agents to communicate via a context network middleware. The approach defines internal actions for agents to send messages to other nodes in an IoT network. The goal is to support deployment of multi-agent systems for ambient intelligence that can leverage physical devices and the Internet of Things.
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadOpenDNS
Practice makes perfect. And unfortunately for security professionals, attackers have realized that persistence is a powerful approach to breaching an organization's defenses.
Focusing on prevention alone is no longer a sufficient strategy for securing your organization against the business risks of a breach. Our current security environment demands an approach less centered on ideal prevention and more focused on reality. During this webcast, we discussed key strategies that limit your risk and exposure to unrelenting threats.
Some highlighted topics include:
- How the shift in attacker motivations has impacted today's threat landscape
- Why preventative techniques alone can no longer ensure a secure environment
- Which strategies need to be considered for a holistic approach to security
- What next steps you can take towards identifying your best strategy against attacks
(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...Victoria Schiffer
We’re super excited to finally publish our Open Source Cyber Scavenger Hunt with the global Cyber Security Community. It has been our dream ever since we started working on this engaging, gamified security awareness activity in preparation for Cyber Awareness Month 2020.
Blog Post & Open Source Resources:
https://medium.com/seek-blog/open-source-cyber-scavenger-hunt-9207fb203e20
How Aetna Mitigated 701 Malware Infections on Mobile DevicesSkycure
View webinar recording - http://hubs.ly/H06134H0
Learn how Aetna protects its corporate data from mobile threats while providing a better user experience and complying with strict industry regulations.
Complete network security protection for sme's within limited resourcesIJNSA Journal
The purpose of this paper is to present a comprehensive budget conscious security plan for smaller
enterprises that lacksecurity guidelines.The authors believethis paper will assist users to write an
individualized security plan. In addition to providing the top ten free or affordable tools get some sort of
semblance of security implemented, the paper also provides best practices on the topics of Authentication,
Authorization, Auditing, Firewall, Intrusion Detection & Monitoring, and Prevention. The methods
employed have been implemented at Company XYZ referenced throughout.
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadOpenDNS
Practice makes perfect. And unfortunately for security professionals, attackers have realized that persistence is a powerful approach to breaching an organization's defenses.
Focusing on prevention alone is no longer a sufficient strategy for securing your organization against the business risks of a breach. Our current security environment demands an approach less centered on ideal prevention and more focused on reality. During this webcast, we discussed key strategies that limit your risk and exposure to unrelenting threats.
Some highlighted topics include:
- How the shift in attacker motivations has impacted today's threat landscape
- Why preventative techniques alone can no longer ensure a secure environment
- Which strategies need to be considered for a holistic approach to security
- What next steps you can take towards identifying your best strategy against attacks
(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...Victoria Schiffer
We’re super excited to finally publish our Open Source Cyber Scavenger Hunt with the global Cyber Security Community. It has been our dream ever since we started working on this engaging, gamified security awareness activity in preparation for Cyber Awareness Month 2020.
Blog Post & Open Source Resources:
https://medium.com/seek-blog/open-source-cyber-scavenger-hunt-9207fb203e20
How Aetna Mitigated 701 Malware Infections on Mobile DevicesSkycure
View webinar recording - http://hubs.ly/H06134H0
Learn how Aetna protects its corporate data from mobile threats while providing a better user experience and complying with strict industry regulations.
Complete network security protection for sme's within limited resourcesIJNSA Journal
The purpose of this paper is to present a comprehensive budget conscious security plan for smaller
enterprises that lacksecurity guidelines.The authors believethis paper will assist users to write an
individualized security plan. In addition to providing the top ten free or affordable tools get some sort of
semblance of security implemented, the paper also provides best practices on the topics of Authentication,
Authorization, Auditing, Firewall, Intrusion Detection & Monitoring, and Prevention. The methods
employed have been implemented at Company XYZ referenced throughout.
Adapted from an ESG report - Outnumbered, Outgunned. Proofpoint
A Solution for Today’s Cybersecurity Challenges. https://www.proofpoint.com/us/esg-lab-review
Enterprise Strategy Group, the IT research, analyst, strategy and validation firm, recently examined the state of cybersecurity and Proofpoint’s advanced threat protection to help organizations boost their defense.
Download the review and learn about:
-The challenge organizations face with cybersecurity expertise
-How a lack of visibility beyond the network can affect an organization’s defense
-Proofpoint’s ability to address multiple attack vectors beyond the network with deep, verified threat intelligence
-The advantage of Proofpoint remediation for active threats
See how to effectively manage your resources for monitoring risk levels and remediation processes. Get your copy of the review now.
Cockpit for Big Systems and Big IoT Systems Leveraging IBM Bluemix and WatsonCapgemini
In our current world, we need to manage very big systems with a huge number of assets. In this context, SOGETI developed by leveraging IBM software and IBM Cloud solutions (Bluemix, Watson) a cockpit to control and command those systems of systems. This session will present one of our first implementations of Cockpit for Big Systems (CBS) and Cockpit for Big IoT Systems (CBIoTS) for precision farming with Drotek—a new solution for better analysis and control of crop production with improved efficiency and reduced environmental impact.
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012Charith Perera
Charith Perera, Arkady Zaslavsky, Peter Christen, Ali Salehi, Dimitrios Georgakopoulos, Connecting Mobile Things to Global Sensor Network Middleware using System-generated Wrappers, Proceedings of the 11th ACM International Workshop on Data Engineering for Wireless and Mobile Access (ACM SIGMOD/PODS-Workshop-MobiDE), Scottsdale, Arizona, USA, May, 2012
Virtual Reality VR is a computer technology that generates realistic images, sounds and other sensations that simulate a users physical presence in a virtual or imaginary environment. The proposed system nurtures personal traits of an individual which plays a major role in every sector. The system helps to improve an individuals social, personal, and language skills as well as cures phobia of standing in front of audience. With advancement in technology, we are developing a system on Unreal Engine for creation of various environments as well as 3ds Max for creating Virtual Objects which are been placed. The learner is supposed to be in an environment where he she is been judged while appearing for various rounds. Further, video is captured and uploaded on the system and trainers does the evaluation. Trainers are supposed to suggest area of improvement by commenting on the parameters defined. Regular usage of software enhances skills of the user. The proposed system is a VR based verbal non verbal interactive system for enhancing communication skills based on predefined and planned of greeting scenario. Results in each stage are compared and analyzed to get the clear idea of where the person is lacking. The outcome of this practice test leads to improvement in individuals personality, difficulties raised in each environment results in upgradation of selfdom. Tejas Sayankar | Insiyah Kanchwala | Nikita Mahajan | Sayali Mahajan ""Communication Skills Improving Assistance"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23748.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23748/communication-skills-improving-assistance/tejas-sayankar
The Rationale for Continuous Delivery by Dave FarleyBosnia Agile
The production of software is a complex, collaborative process that stretches our ability as human beings to cope with its demands.
Many people working in software development spend their careers without seeing what good really looks like.
Our history is littered with inefficient processes creating poor quality output, too late to capitalise on the expected business value. How have we got into this state? How do we get past it? What does good really look like?
Continuous Delivery changes the economics of software development for some of the biggest companies in the world, whatever the nature of their software development, find out how and why.
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...Adrien Joly
Presented by Adrien Joly at Bell Labs France during a "SKP" session, this slideshow includes a motivated introduction to his phd thesis subject about contextual filtering of social interactions, its technical approach relying on "contextual tag clouds", and its current state of research.
Introduction to Puppet Enterprise - Jan 30, 2019Puppet
If you're new to Puppet Enterprise, this is the webinar for you. You'll learn why thousands of companies rely on Puppet to automate the delivery and operation of their software, and see it in action with a live demo.
We'll cover how to use Puppet Enterprise to:
Discover what you have using Puppet Discovery
Orchestrate changes to infrastructure and applications
Continually enforce your desired state and remediate any unexpected changes
Get real-time visibility and reporting to prove compliance
Automatically build, test and promote Puppet code changes using Continuous Delivery for Puppet Enterprise
How do organizations build secure applications, given today's rapidly moving and evolving DevOps practices? Join Black Duck and our customer experts on best practices for application security in DevOps.
You’ll learn:
-New security challenges facing today’s popular DevOps and Continuous Integration (CI) practices, including managing custom code and open source risks with containers and traditional environments
-Best practices for designing and incorporating an automated approach to application security into your existing development environment
-Future development and application security challenges organizations will face and what they can do to prepare
Visão geral sobre a solução iDefense da VeriSign de resposta a incidentes em tempo real, remediação de fraudes on-line, gerenciamento de riscos, conhecimentos dos impactos globais das ameaças, proteção proativa, entre outros benefícios.
Visão geral sobre a solução iDefense da VeriSign de resposta a incidentes em tempo real, remediação de fraudes on-line, gerenciamento de riscos, conhecimentos dos impactos globais das ameaças, proteção proativa, entre outros benefícios.
Adapted from an ESG report - Outnumbered, Outgunned. Proofpoint
A Solution for Today’s Cybersecurity Challenges. https://www.proofpoint.com/us/esg-lab-review
Enterprise Strategy Group, the IT research, analyst, strategy and validation firm, recently examined the state of cybersecurity and Proofpoint’s advanced threat protection to help organizations boost their defense.
Download the review and learn about:
-The challenge organizations face with cybersecurity expertise
-How a lack of visibility beyond the network can affect an organization’s defense
-Proofpoint’s ability to address multiple attack vectors beyond the network with deep, verified threat intelligence
-The advantage of Proofpoint remediation for active threats
See how to effectively manage your resources for monitoring risk levels and remediation processes. Get your copy of the review now.
Cockpit for Big Systems and Big IoT Systems Leveraging IBM Bluemix and WatsonCapgemini
In our current world, we need to manage very big systems with a huge number of assets. In this context, SOGETI developed by leveraging IBM software and IBM Cloud solutions (Bluemix, Watson) a cockpit to control and command those systems of systems. This session will present one of our first implementations of Cockpit for Big Systems (CBS) and Cockpit for Big IoT Systems (CBIoTS) for precision farming with Drotek—a new solution for better analysis and control of crop production with improved efficiency and reduced environmental impact.
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012Charith Perera
Charith Perera, Arkady Zaslavsky, Peter Christen, Ali Salehi, Dimitrios Georgakopoulos, Connecting Mobile Things to Global Sensor Network Middleware using System-generated Wrappers, Proceedings of the 11th ACM International Workshop on Data Engineering for Wireless and Mobile Access (ACM SIGMOD/PODS-Workshop-MobiDE), Scottsdale, Arizona, USA, May, 2012
Virtual Reality VR is a computer technology that generates realistic images, sounds and other sensations that simulate a users physical presence in a virtual or imaginary environment. The proposed system nurtures personal traits of an individual which plays a major role in every sector. The system helps to improve an individuals social, personal, and language skills as well as cures phobia of standing in front of audience. With advancement in technology, we are developing a system on Unreal Engine for creation of various environments as well as 3ds Max for creating Virtual Objects which are been placed. The learner is supposed to be in an environment where he she is been judged while appearing for various rounds. Further, video is captured and uploaded on the system and trainers does the evaluation. Trainers are supposed to suggest area of improvement by commenting on the parameters defined. Regular usage of software enhances skills of the user. The proposed system is a VR based verbal non verbal interactive system for enhancing communication skills based on predefined and planned of greeting scenario. Results in each stage are compared and analyzed to get the clear idea of where the person is lacking. The outcome of this practice test leads to improvement in individuals personality, difficulties raised in each environment results in upgradation of selfdom. Tejas Sayankar | Insiyah Kanchwala | Nikita Mahajan | Sayali Mahajan ""Communication Skills Improving Assistance"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23748.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23748/communication-skills-improving-assistance/tejas-sayankar
The Rationale for Continuous Delivery by Dave FarleyBosnia Agile
The production of software is a complex, collaborative process that stretches our ability as human beings to cope with its demands.
Many people working in software development spend their careers without seeing what good really looks like.
Our history is littered with inefficient processes creating poor quality output, too late to capitalise on the expected business value. How have we got into this state? How do we get past it? What does good really look like?
Continuous Delivery changes the economics of software development for some of the biggest companies in the world, whatever the nature of their software development, find out how and why.
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...Adrien Joly
Presented by Adrien Joly at Bell Labs France during a "SKP" session, this slideshow includes a motivated introduction to his phd thesis subject about contextual filtering of social interactions, its technical approach relying on "contextual tag clouds", and its current state of research.
Introduction to Puppet Enterprise - Jan 30, 2019Puppet
If you're new to Puppet Enterprise, this is the webinar for you. You'll learn why thousands of companies rely on Puppet to automate the delivery and operation of their software, and see it in action with a live demo.
We'll cover how to use Puppet Enterprise to:
Discover what you have using Puppet Discovery
Orchestrate changes to infrastructure and applications
Continually enforce your desired state and remediate any unexpected changes
Get real-time visibility and reporting to prove compliance
Automatically build, test and promote Puppet code changes using Continuous Delivery for Puppet Enterprise
How do organizations build secure applications, given today's rapidly moving and evolving DevOps practices? Join Black Duck and our customer experts on best practices for application security in DevOps.
You’ll learn:
-New security challenges facing today’s popular DevOps and Continuous Integration (CI) practices, including managing custom code and open source risks with containers and traditional environments
-Best practices for designing and incorporating an automated approach to application security into your existing development environment
-Future development and application security challenges organizations will face and what they can do to prepare
Visão geral sobre a solução iDefense da VeriSign de resposta a incidentes em tempo real, remediação de fraudes on-line, gerenciamento de riscos, conhecimentos dos impactos globais das ameaças, proteção proativa, entre outros benefícios.
Visão geral sobre a solução iDefense da VeriSign de resposta a incidentes em tempo real, remediação de fraudes on-line, gerenciamento de riscos, conhecimentos dos impactos globais das ameaças, proteção proativa, entre outros benefícios.
An Architecture for the Development of Ambient Intelligence Systems Managed b...Carlos Eduardo Pantoja
Presented at 30th International Conference on Software Engineering & Knowledge Engineering (SEKE) at San Francisco (USA).
1st July, 2018
Instagram: @prof.pantoja
Transporte de Agentes Cognitivos entre SMA Distintos Inspirado nos Princípios...Carlos Eduardo Pantoja
Apresentação feita no XII WESAAC em 02/05/2018.
Na biologia, os seres vivos são capazes de estabelecer relações que podem ser classificadas de acordo com o comportamento dos envolvidos. Estas relações biológicas podem ser benéficas ou não para os envolvidos dependendo de como estes se relacionam. Agentes são entidades autônomas com capacidade de tomada de decisão, raciocínio cognitivo e, inclusive, de socializar com outros agentes em um Sistema Multi-Agente (SMA). Alguns agentes são capazes de se moverem para outros sistemas, podendo, assim, se relacionar com agentes, de forma similar aos seres vivos. Este trabalho tem como objetivo propor protocolos inspirados nas relações biológicas com a finalidade de explorar a movimentação de agentes pertencentes a um SMA embarcado em um dispositivo físico e autônomo para um outro SMA em um dispositivo distinto. Serão abordados três protocolos: predatismo, mutualismo e inquilinismo, onde a transferência é feita com o objetivo de dominar, trocar conhecimentos e sobreviver no sistema de destino, respectivamente. Estes protocolos visam preservar e/ou compartilhar os conhecimentos indispensáveis obtidos durante a existência dos agentes. Neste caso, um SMA pode utilizar um dos protocolos propostos para migrar para um outro sistema embarcado. Por fim, serão apresentados alguns experimentos iniciais, nos quais foram criados dois protótipos (um líder e um hospedeiro) onde o líder é danificado e a relação de predatismo é acionada para preservar os conhecimentos adquiridos.
Questões de Consursos Públicos para a área de Sistemas de Informações Gerenciais. Contém questões sobre: E-Commerce, Desenvolvimento de SIG, Business Intelligence, Banco de Dados e Intranet. Para assistir as vídeo-aulas acesse www.youtube.com/professorpantoja
Prototyping Ubiquitous Multi-Agent Systems: A Generic Domain Approach with JasonCarlos Eduardo Pantoja
Presented at 15th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS) at Polytechnic of Porto - Porto (Portugal).
21st June, 2017
Instagram: @prof.pantoja
Material didático da disciplina de Introdução a Administração do Curso Técnico em Informática industrial do CEFET/RJ Campus Nova Friburgo entre os anos de 2009 e 2013.
Instagram: @prof.pantoja
Aplicando Sistemas Multi-Agentes Ubíquos em um Modelo de Smart Home Usando o ...Carlos Eduardo Pantoja
Trabalho apresentado no 2° Workshop de Pesquisa e Desenvolvimento em Inteligência Artificial, Inteligência Coletiva e Ciência de Dados no dia 14 de Dezembro de 2016 em Niterói/RJ.
Veja mais trabalhos em: fb.com/turingproject
Instagram: @prof.pantoja
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
1. Support for the Deployment
of Ambient Intelligence
Systems Managed by
Cognitive Agents
Laboratory for Advanced
Collaboration (LAC)
PUC-RJ
• 1. Federal Center for Technological Education (CEFET/RJ), Brazil
• 2. Fluminense Federal University (UFF), Brazil
Heder Dorneles 2
Carlos Eduardo Pantoja 1,2
José Viterbo 2
November 23th, 2017
2. OUTLINE 1. Introduction
2. Problem
3. Objective
4. Extending Jason Framework
5. Related Work
6. Conclusion
References
3. 3Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
1. INTRODUCTION: IoT
IoT
4. 4Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
1. INTRODUCTION: AGENT APPROACH
• Agents [Wooldridge, 2000]
agents are autonomous and cognitive entities
from artificial intelligence.
5. 5Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
1. INTRODUCTION: AGENT APPROACH
• Agents [Wooldridge, 2000]
agents are autonomous and cognitive entities
from artificial intelligence.
6. 6Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
• Agents [Wooldridge, 2000]
agents are autonomous and cognitive entities
from artificial intelligence.
• Multi-Agent Systems [Wooldridge, 2009]
Agents can collaborate with other agents and
they have common or conflicting goals. Besides
they are situated in an environment.
1. INTRODUCTION: AGENT APPROACH
7. 7Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
• Agents [Wooldridge, 2000]
agents are autonomous and cognitive entities
from artificial intelligence.
• Multi-Agent Systems [Wooldridge, 2009]
Agents can collaborate with other agents and
they have common or conflicting goals. Besides
they are situated in an environment.
A
A C
MAS A
1. INTRODUCTION: AGENT APPROACH
8. 8Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
• Agents [Wooldridge, 2000]
agents are autonomous and cognitive entities
from artificial intelligence.
• Multi-Agent Systems [Wooldridge, 2009]
Agents can collaborate with other agents and
they have common or conflicting goals. Besides
they are situated in an environment.
• Physical Agents [Matarić, 2007]:
Hardware
Sensors e Actuators
Software (reasoning)
Middleware
1. INTRODUCTION: AGENT APPROACH
9. 9Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
• Agents [Wooldridge, 2000]
agents are autonomous and cognitive entities
from artificial intelligence.
• Multi-Agent Systems [Wooldridge, 2009]
Agents can collaborate with other agents and
they have common or conflicting goals. Besides
they are situated in an environment.
• Physical Agents [Matarić, 2007]:
Hardware
Sensors e Actuators
Software (reasoning)
Middleware
MAS
1. INTRODUCTION: AGENT APPROACH
10. 10Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
O Jason [Bordini et al., 2007] is a framework
for the development of Multi-Agent Systems.
O Jason is widely used in the field for the
development of Multi-Agent Systems and for
programming BDI software agents.
However, there was no implementation for
directly programming physical agents in
Jason.
1. INTRODUCTION: JASON
Jason by Gustave Moreau
11. 11Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
1. INTRODUCTION: ARGO FOR JASON
ARGO [Pantoja et al., 2016] is a customized
architecture for a special kind of agent
responsible for controlling hardware devices
(ATMEGA, PIC, Intel, etc.):
• Javino [Lazarin and Pantoja, 2015]
Interface for communication between
microcontrollers and high-level software
with error detection.
• Perceptions Filters [Stabile Jr e Sichman,
2015]
Perceptions Filters reduce the amount of
information perceived by the agent at
runtime.
The Argo
by Lorenzo Costa
12. 12Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
1. INTRODUCTION: ARGO FOR JASON
[Pantoja et al., 2016]
13. 13Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
2. PROBLEM: MAS + IoT
A
A
A
A
A
A
A
A
[Pantoja and Viterbo, 2017]
14. 14Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
2. PROBLEM: MAS + IoT
A
A
A
A
A
A
A
A
MAS 1 MAS 2
15. 15Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
3. OBJECTIVE
IoT Middleware
A
A C
MAS
16. 16Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
4. EXTENDING JASON: COMMUNICATION
17. 17Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
A
A C
C
A
MAS A MAS B
Context Net
[Endler et al.,
2011]
4. EXTENDING JASON: COMMUNICATOR AGENT
18. 18Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
4. EXTENDING JASON: REASONING CYCLE
19. 19Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
4. EXTENDING JASON: COMMUNICATOR AGENT
20. 20Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
4. EXTENDING JASON: MESSAGE FORMAT
.send(receiver, illocutionary forces, propositional content)
21. 21Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
preamble field size sender
fffe 04
4 hex 2 hex up to 256 bytes
field size
2 hex
receiver
up to 256 bytes
field size
2 hex
force
up to 256 bytes
field size
2 hex
message
up to 256 bytes
kate 03 bob 07 achieve 08 Hello CN
.send(receiver, illocutionary forces, propositional content)
4. EXTENDING JASON: MESSAGE FORMAT
22. 22Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Send the
message
using
ContexNet
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
4. EXTENDING JASON: MESSAGE PROCESS
23. 23Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
24. 24Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
25. 25Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
26. 26Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
27. 27Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
28. 28Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
29. 29Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
30. 30Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
31. 31Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
32. 32Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
33. 33Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
RECEIVERSENDER
Add the
preamble
Calculate the
size of all
fields
Mount the
message
Verify the
preamble
Is Ok?
Discard
message
Verify the size
of all fields
Is Ok?
Mount a
message
Start
sending a
message
Process it as
a Jason’s
Message
End of the
processyes
yes
no
no
Send the
message
using
ContexNet
4. EXTENDING JASON: MESSAGE PROCESS
34. 34Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
• ARGO Internal Actions:
• .sendOut(receiver, force, message)
• It defines a message to be sent to a mobile node in an IoT network.
4. EXTENDING JASON: INTERNAL ACTION
35. 35Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
• ARGO Internal Actions:
• .sendOut(receiver, force, message)
• It defines a message to be sent to a mobile node in an IoT network.
Ex.: .sendOut ("788 b2b22−baa6 −4c61−b1bb− 33 01 cff1f5f878 ", achieve, decrease )
4. EXTENDING JASON: INTERNAL ACTION
36. 36Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
4. EXTENDING JASON: EXAMPLE 1
37. 37Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
4. EXTENDING JASON: EXAMPLE 2
38. 38Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
4. EXTENDING JASON: EXAMPLE 3 (CEFET’s LAB)
39. 39Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
5. RELATED WORK
Smart Homes
[Kazanavicius et al., 2009]
[Andrade et al. 2016]
[Martins and Meneguzzi 2013]
[Benta et al. ,2009]
Não Usa AOPL Específica
Jade [Bellifemine , 2004]
Jason [Bordini et al., 2007]
[Martins and Meneguzzi 2014]
[Conte et al. 2009]
[Lim et al. 2009]
[Sun et al. 2013]
[Hagras et al. 2004]
[Cook et al. 2003]
[Villarrubia et al. 2014]
40. 40Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
This work extedend Jason framework for programming intelligent
agents using the ContextNet middleware for communication
and context management.
6. CONCLUSION AND FUTURE WORK
41. 41Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
6. CONCLUSION AND FUTURE WORK
For future works...
This work extedend Jason framework for programming intelligent
agents using the ContextNet middleware for communication
and context management.
42. 42Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
6. CONCLUSION AND FUTURE WORK
43. 43Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
Symbiotic Relationships:
• Mutualism
• Commensalism
• Predation
6. CONCLUSION AND FUTURE WORK
44. 44Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
Symbiotic Relationships:
• Mutualism
• Commensalism
• Predation
6. CONCLUSION AND FUTURE WORK
45. 45Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
6. CONCLUSION AND FUTURE WORK
46. 46Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
REFERENCES
•[Barros et al., 2014] R. S. Barros, V. H. Heringer, C. E. Pantoja, N. M. Lazarin, and L. M. de Moraes. An agent-
oriented ground vehicle's automation using jason framework. In ICAART (2), pages 261-266, 2014.
•[Bordini et al. 2007] Bordini, R.H., Hubner, J.F., Wooldridge, M. Programming Multi-Agent Systems in AgentSpeak
Using Jason. John Wiley & Sons Ltd., 2007.
•[Bratman, 1987] Bratman, M. Intentions, Plans, and Practical Reason. Harvard University Press, 1987.
•[Jensen, 2010] A. S. Jensen. Implementing lego agents using jason. Disponínel em: arXiv:1010.0150, 2010.
•[Huber, 1999]Huber MJ. Jam: a bdi-theoretic mobile agent architecture. In Proceedings of the third annual
conference on Autonomous Agents, AGENTS '99, pags. 236-243, New York, 1999
•[Guinelli et al., 2016] Guinelli, J. V. ; Junger, D. S. ; Pantoja, C. E. . An Analysis of Javino Middleware for Robotic
Platforms Using Jason and JADE Frameworks. In: Workshop-Escola de Sistemas de Agentes, Seus Ambientes e
Aplicações, Maceió. Anais do X Workshop-Escola de Sistemas de Agentes, seus Ambientes e Aplicações, 2016.
•[Lazarin and Pantoja, 2015] Lazarin, N.M., Pantoja, C.E. : A robotic-Agent Platform For Embedding Software
Agents Using Raspberry Pi and Arduino Boards. In: 9th Software Agents, Environments and Applications School,
2015
47. 47Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
•[Pantoja et al., 2016a] Pantoja, C. E.; Stabile Jr, M. F. ; Lazarin, N. M. ; Sichman, J. S. ARGO: A Customized
Jason Architecture for Programming Embedded Robotic Agents. In: Workshop on Engineering Multi-Agent
Systems, 2016, Singapore. Proceedings of the Third International Workshop on Engineering Multi-Agent
Systems (EMAS 2016), 2016.
•[Pantoja et al., 2016b] Pantoja, C. E.; Stabile Jr, M. F. ; Lazarin, N. M. ; Sichman, J. S. . ARGO: An Extended
Jason Architecture that Facilitates Embedded Robotic Agents Programming. In: Lecture Notes in Artificial
Intelligence, 2016.
•[Rao 1996] Rao, A.S.: AgentSpeak(L): BDI agents speak out in a logical computable language. In: de
Velde,W.V., Perram, J.W. (eds.) Proceedings of the 7th European workshop on Modelling autonomous
agents in a multi-agent world. Lecture Notes in Artificial Intelligence, vol. 1038, pp. 42-55. Springer-Verlag,
Secaucus. USA, 1996.
•[Stabile Jr. and Sichman, 2015] Stabile Jr., M.F., Sichman, J.S. Evaluating Perception Filters In BDI Jason
Agents. In: 4th Brazilian Conference On Intelligent Systems, 2015.
•[Winikoff, 2005] Winikoff M. Jack intelligent agents: An industrial strength platform. Em Bordini R, Dastani
M, Dix J, Fallah AS, Weiss G, editors. Multi-Agent Programming, volume 15 of Multiagent Systems, Articial
Societies, and Simulated Organizations, pags. 175-193. Springer US, 2005.
REFERENCES
48. 48Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
•[Wooldridge, 2000] Wooldridge, M. Reasoning about rational agents. Intelligent robotics and autonomous
agents. MIT Press, 2000.
•[Wooldridge, 2009] Wooldridge M. An Introduction to MultiAgent Systems. John Wiley & Sons, 2009.
•[Zambonelli et al., 2001] Zambonelli F, Jennings NR, Omicini A, Wooldridge M. Agent-Oriented Software
Engineering for Internet Applications. In: Omicini A, Zambonelli F, Klusch M, Tolksdorf R, editors.
Coordination of Internet Agents. Springer Verlag; 2001. p.326-345, 2001
•[Wei and Hindricks, 2001] Wei, C., Hindriks, K.V. (2013) An agent-based cognitive robot architecture. In:
Programming Multi-Agent Systems, LNCS, vol. 7837, pp. 54–71. Springer, Berlin.
•[Soriano et al., 2001] Soriano, A.; Marín, L.; Valera, Á.; Vallés M. (2013) “Multi-Agent Systems
Integration in Embedded Systems with Limited Resources to Perform Tasks of Coordination and
Cooperation”. In: Proceedings of 10th International Conference on Informatics in Control, Automation and
Robotics , pp. 140 - 147, Reykjavik.
•[Pantoja et al., 2016c] Pantoja, C. E.; Jesus, V. S. ; Viterbo Filho, J. . Aplicando Sistemas Multi-Agentes
Ubíquos em um Modelo de Smart Home Usando o Framework Jason. In: 2º Workshop de Pesquisa e
Desenvolvimento em Inteligência Artificial, Inteligência Coletiva e Ciência de Dados, 2016, Niterói/RJ.
REFERENCES
49. 49Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
•[Andrade et al. 2016] Andrade, J. P. B., Oliveira, M., Gonçalves, E. J. T., and Maia, M. E. F. (2016). Uma
Abordagem com Sistemas Multiagentes para Controle Autônomo de Casas Inteligentes. In XIII Encontro
Nacional de Inteligência Artificial e Computacional (ENIAC).
•[Conte et al. 2009] Conte, G., Morganti, G., Perdon, A. M., and Scaradozzi, D. (2009). Multi-agent system theory
for resource management in home automation systems. Journal of Physical Agents, 3(2):15–19.
•[Cook et al. 2003] Cook, D. J., Youngblood, G. M., Heierman III, E. O., Gopalratnam, K., Rao, S., Litvin, A., and
Khawaja, F. (2003). Mavhome: An agent-based smart home. In PerCom, volume 3, pages 521–524.
•[Hagras et al. 2004] Hagras, H., Callaghan, V., Colley, M., Clarke, G., Pounds-Cornish, A., and Duman, H. (2004).
Creating an ambient-intelligence environment using embedded agents. IEEE Intelligent Systems, 19(6):12–20.
•[Kazanavicius et al. 2009] Kazanavicius, E., Kazanavicius, V., and Ostaseviciute, L. (2009). Agent-based
framework for embedded systems development in smart environments. In Proceedings of International
Conference on Information Technologies (IT 2009), Kaunas.
•[Lim et al. 2009] Lim, C., Anthony, P., and Fan, L. (2009). Applying multi-agent system in a context aware.
Borneo Sci, 24:53–64.
REFERENCES
50. 50Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
•[Benta et al. 2009] Benta, K.-I., Hoszu, A., Vacariu, L., and Cret, O. (2009). Agent based smart house platform
with affective control. In Proceedings of the 2009 Euro American Conference on Telematics and Information
Systems: New Opportunities to increase Digital Citizenship, page 18. ACM.
•[Chaouche et al. 2014] Chaouche, A.-C., Seghrouchni, A. E. F., Ilie, J.-M., and Saıdouni, D. E. (2014). A
higherorder agent model with contextual planning management for ambient systems. In Transactions on
Computational Collective Intelligence XVI, pages 146–169. Springer.
•[Martins and Meneguzzi 2013] Martins, R. and Meneguzzi, F. (2013). A smart home model to demand side
management. In Workshop on Collaborative Online Organizations (COOS13)@AAMAS.
•[Martins and Meneguzzi 2014] Martins, R. and Meneguzzi, F. (2014). A smart home model using jacamo
framework. In 2014 12th IEEE International Conference on Industrial Informatics (INDIN). IEEE.
•[Sun et al. 2013] Sun, Q., Yu, W., Kochurov, N., Hao, Q., and Hu, F. (2013). A multi-agent-based intelligent sensor
and actuator network design for smart house and home automation. Journal of Sensor and Actuator Networks,
2(3):557–588.
•[Villarrubia et al. 2014] Villarrubia, G., De Paz, J. F., Bajo, J., and Corchado, J. M. (2014). Ambient agents:
embedded agents for remote control and monitoring using the pangea platform. Sensors, 14(8):13955–13979.
REFERENCES
51. 51Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
•[Pantoja and Viterbo 2017] Pantoja, C. E., & Viterbo, J. (2017, June). Prototyping Ubiquitous Multi-Agent
Systems: A Generic Domain Approach with Jason. In International Conference on Practical Applications of
Agents and Multi-Agent Systems (pp. 342-345). Springer.
•[Endler et al. 2011] M Endler, G Baptista, LD Silva, R Vasconcelos, M Malcher, V Pantoja, V Pinheiro, and J
Viterbo. 2011. ContextNet: context reasoning and sharing middleware for large-scale pervasive collaboration
and social networking. In Proceedings of the Workshop on Posters and Demos Track.
•[Maciel et al. 2015] Cristiano Maciel, Patricia Cristiane de Souza, José Viterbo, Fabiana Freitas Mendes, and
Amal El Fallah Seghrouchni. 2015. A Multi-agent Architecture to Support Ubiquitous Applications in Smart
Environments. Springer Berlin Heidelberg, Berlin, Heidelberg, 106–116
•[Casals et al. 2017] Arthur Casals, Amal El Fallah Seghrouchni, and Ana Rosa Brandão. 2017. Augmented
Agents: Contextual Perceptions and Planning for BDI Architectures. Fifth International Workshop on Engineering
Multi-Agent Systems (EMAS 2017).
REFERENCES
52. 52Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
SOCIAL MEDIA
FOLLOW ME!
https://goo.gl/cZ6FpQ
https://goo.gl/FXcaEG
https://goo.gl/KfMtwM
https://goo.gl/VoooxE
@prof.pantoja
53. 53Support for the Deployment of Ambient Intelligence Systems Managed by Cognitive Agents
AGRADECIMENTOS
THANK YOU!
pantoja@cefet-rj.br
heder.to@ic.uff.br
viterbo@ic.uff.br