Social Computing


Published on

Published in: Career, Technology, Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Social Computing

  1. 1. LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering 5200 Perring Parkway Baltimore, MD 21251 Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information Framework (IIF)
  2. 2. Agenda <ul><li>Overview </li></ul><ul><ul><li>Why This Research? </li></ul></ul><ul><ul><li>Definitions </li></ul></ul><ul><ul><li>Problem Definition </li></ul></ul><ul><ul><li>Insurgency Research System </li></ul></ul><ul><li>Methodology </li></ul><ul><ul><li>Agent Development Environment </li></ul></ul><ul><ul><li>Object-Oriented Development Life Cycle </li></ul></ul><ul><ul><li>Model Driven Architecture </li></ul></ul><ul><ul><li>Multi-Agent Development Process </li></ul></ul><ul><ul><li>Tools Requirements </li></ul></ul><ul><li>Conclusion </li></ul>
  3. 3. Why This Research? <ul><li>This Research Addresses Decision Support </li></ul><ul><li>Systems </li></ul><ul><li>Rapid and Accurate Decision Making That </li></ul><ul><li>Improves Over Time (Adaptive Systems) </li></ul><ul><li>This Research Provides A System Approach </li></ul><ul><li>For Resolving Problems That Arise in Social </li></ul><ul><li>System Environments </li></ul><ul><li>Develop A Framework For Decision Making </li></ul><ul><li>This Research Does Not Address Prediction! </li></ul>
  4. 4. Definitions Insurgency : an armed rebellion by any irregular armed force that rises up against an established authority, government, or administration . Those carrying out an insurgency are insurgents. Insurgents conduct sabotage and harassment . Insurgents usually are in opposition to a civil authority or government primarily in the hope of improving their condition. Terrorism: systematic use of terror , manifesting itself in violence and intimidation. Those carrying out terrorism are terrorist. Terrorist conduct violence for the purpose of creating fear in order to achieve a political, economic, religious, or ideological goal . Framework: A logical structure for classifying and organizing complex information.
  5. 5. Problem Definition <ul><li>The Army is constantly seeking to better </li></ul><ul><li>understand the social phenomena of insurgency </li></ul><ul><li>as it assumes a peacekeeping role in the Iraqi </li></ul><ul><li>region and as it combats the elevated death tolls </li></ul><ul><li>associated with insurgency. </li></ul><ul><li>The problem to be addressed by this research is: </li></ul><ul><li>1. How can insurgency data best be researched, defined and presented to military leaders for decision making? </li></ul><ul><li>How can decisions be observed and evaluated to measure the potential impact on lives in a war zone? </li></ul>
  6. 6. How are insurgencies planned for and what is the process? How are insurgencies carried out and what is the process? Are there any consistencies in the locations and surroundings where insurgencies are carried out? Why are more Iraqi women becoming insurgents? Sample Insurgency Questions That might be Addressed by This Research
  7. 7. Insurgency Research System
  9. 9. Agent Oriented Development Environment User Knowledge Interacts With Guides Verifies
  10. 10. Object-Oriented Development Life Cycle Implemented using Enterprise Architect Reference: Tsang, Curtis, et al., “Object-Oriented Technology,” McGraw Hill, 2005. Activity Diagram
  11. 11. Model Driven Architecture (MDA)
  12. 12. BDI Agent System Jadex BDI Architecture Goal-Oriented Reasoning Engine Agent BDI Model
  13. 13. Multi-Agent Systems Reference: Jennings, Nick, “Agent-Based Computing: Promise and Perils,” Presentation, Dept of Electronics and Computer Science, University of Southampton.
  14. 14. 3D Electronic Institution Concept Only systems that have a high degree of interactions need to be structured in order to avoid violations Reference: Bogdanovych, Esteva, et al, “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).
  15. 15. Integrated Multi-Agent Development Process Microsoft Access Cognitive Modeling Application JADEX Software/ JADE Platform Ontology Database Problem Domain Database Communication Server Electronic Institution Developmental Cycle Design Verify Test Deployment Development Simulate ISLANDER: graphical tool for specification of rules & protocols in eI AMELI: software platform to run eI aBuilder: agent development tool SIMDEI: simulation tool to animate & analyze eI iGrafix FlowCharter Enterprise Architect 2 nd Life Virtual World Technology Visualization Layer Behavioral Experimentation Insurgency Questions to be Answered
  16. 16. Runtime Architecture Reference: Bogdanovych, Esteva, et al., “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07). Second Life ©
  17. 17. Tools Requirements <ul><li>Analysis </li></ul><ul><ul><li>Microsoft Visio </li></ul></ul><ul><ul><li>iGrafx FlowCharter </li></ul></ul><ul><ul><li>Enterprise Architect </li></ul></ul><ul><ul><li>UML </li></ul></ul><ul><li>Development </li></ul><ul><ul><li>JADE </li></ul></ul><ul><ul><li>Jadex </li></ul></ul><ul><ul><li>JESS </li></ul></ul><ul><ul><li>Java </li></ul></ul><ul><ul><li>EIDE </li></ul></ul><ul><li>Visualization </li></ul><ul><ul><li>Second Life </li></ul></ul>
  18. 18. Development of an Insurgency Information Framework Using Multi-Agent Technololgy
  19. 19. Conclusion <ul><li>Application of software engineering technology can support advanced </li></ul><ul><li>sociological analysis in combating the Insurgency Crisis: </li></ul><ul><li>Developing an IIF enables the Army to extract significant knowledge useful in making more informed decisions </li></ul><ul><li>Integrating the IIF model with a Software Engineering Technology Workbench provides a structure that can be updated, verified, and easily integrated with other models </li></ul><ul><li>Modeling behavior through the application of Distributed MAS implemented in a 3D virtual world environment a llows decision makers to: </li></ul><ul><ul><ul><li>Model behavior of objects </li></ul></ul></ul><ul><ul><ul><li>Choose/ observe actions of human like entities </li></ul></ul></ul><ul><ul><ul><li>Calculate/ measure paths to outcomes </li></ul></ul></ul><ul><ul><ul><li>Assess outcomes </li></ul></ul></ul><ul><ul><ul><li>Initiate treatment and/ support </li></ul></ul></ul><ul><ul><ul><li>Reform policy </li></ul></ul></ul><ul><li>The social computing methodology can support decision making in any sociological environment </li></ul>
  20. 20. <ul><li>References </li></ul><ul><li>1. Taatgen, N., etl, “Modeling Paradigm in ACT-R,” </li></ul><ul><li> </li></ul><ul><li>2. Belagoda, T., etl, “A Critical Study of Cougaar Agent Architecture,” </li></ul><ul><li>, 2005. </li></ul><ul><li>3. Braubach, L., “Jadex: Implementing a BDI-Infrastructure for JADE Agents,” </li></ul><ul><li> </li></ul><ul><li>124/pokahrbraubach2003jadex-exp.pdf </li></ul><ul><li>4. Brazier, F., etl, “Beliefs, Intentions and Desire,” </li></ul><ul><li>http:// </li></ul><ul><li>5. Mellor, S. J., Balcer, M. J., “Executable UML: A Foundation for Model-Driven Architecture,” Addison-Wesley, New York, N.Y., 2002. </li></ul><ul><li>6. Wooldridge, Michael, “An Introduction to Multi-Agent Systems,” John Wiley & Sons, LTD., Hoboken, N.J., 2002. </li></ul><ul><li>7. Arcos, Josep, etl, “An Integrated Development Environment for Electronic Institutions,” </li></ul><ul><li>8. Brown, D. “An Introduction to Object-Oriented Analysis: Objects in Plain English,” John Wiley & Sons, Inc., New York, N.Y., 1997. </li></ul><ul><li>9. SPARX Systems, Enterprise Architect, Version 7.0, </li></ul><ul><li> </li></ul><ul><li>10. Grice, P., “Studies of the Ways of Words,” Harvard University Press, Cambridge, Massachusetts, 1989. </li></ul><ul><li>11. Bodganovych, A., etl, “A Methodology for Developing MAS as 3D Electronic Institutions,” . </li></ul><ul><li>12. Kapor, M., “ The Power of Second Life,” </li></ul><ul><li> </li></ul>