Advertisement

Self Planning in Critical Multi-Agent Systems

  • Flora Amato
  • Nicola Mazzocca
  • Francesco MoscatoEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 1)

Abstract

Novel architectures like Cloud and Internet of Things (IoT) make available several resources like computing nodes, environmental sensors etc. that enable the introduction of more and more intelligent systems able to face complex situations. In particular management of critical and dangerous situations may take advantage of those systems whose complexity is growing up faster and faster. In this scenario, it is difficult to orchestrate different autonomous systems in order to face with new, previously unmanaged emergencies. In this work we present a modeling methodology and a planning techniques based on a multi-agent model. Agents describe capabilities of each available IoT element in an area where a critical situation has occurred; the planning methodology exploit both classical and a new counter-example based approaches to build a coordination plan of resources in order to achieve given goals like traffic management or people flight during a terrorist attack.

Keywords

Obstructive Sleep Apnea Goal Condition Resource Agent Current Goal Plan Search 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Min Chen. Towards smart city: M2m communications with software agent intelligence. Multimedia Tools and Applications, 67(1):167–178, 2013.Google Scholar
  2. 2.
    Anas M Mzahm, Mohd Sharifuddin Ahmad, and Alicia YC Tang. Agents of things (aot): An intelligent operational concept of the internet of things (iot). In 2013 13th International Conference on Intellient Systems Design and Applications, pages 159–164. IEEE, 2013.Google Scholar
  3. 3.
    Giovanna Sannino, Ivanoe De Falco, and Giuseppe De Pietro. Monitoring obstructive sleep apnea by means of a real-time mobile system based on the automatic extraction of sets of rules through differential evolution. Journal of Biomedical Informatics, 49:84 – 100, 2014.Google Scholar
  4. 4.
    Francesco Moscato, Flora Amato, Alba Amato, and Rocco Aversa. Model–driven engineering of cloud components in metamorp (h) osy. International Journal of Grid and Utility Computing, 5(2):107–122, 2014.Google Scholar
  5. 5.
    Jussi Rintanen, Keijo Heljanko, and Ilkka Niemelä. Planning as satisfiability: parallel plans and algorithms for plan search. Artificial Intelligence, 170(12):1031–1080, 2006.Google Scholar
  6. 6.
    Tim French, Nik Bessis, Fatos Xhafa, and Carsten Maple. Towards a corporate governance trust agent scoring model for collaborative virtual organisations. International Journal of Grid and Utility Computing, 2(2):98–108, 2011.Google Scholar
  7. 7.
    Evjola Spaho, Gjergji Mino, Leonard Barolli, and Fatos Xhafa. Goodput and pdr analysis of aodv, olsr and dymo protocols for vehicular networks using cavenet. International Journal of Grid and Utility Computing, 2(2):130–138, 2011.Google Scholar
  8. 8.
    Soichi Sawamura, Admir Barolli, Ailixier Aikebaier, Makoto Takizawa, and Tomoya Enokido. Design and evaluation of algorithms for obtaining objective trustworthiness on acquaintances in p2p overlay networks. International Journal of Grid and Utility Computing, 2(3):196–203, 2011.Google Scholar
  9. 9.
    Valentin Cristea, F. Pop, C. Stratan, A. Costan, C. Leordeanu, and E. Tirsa. A dependability layer for large-scale distributed systems. International Journal of Grid and Utility Computing, 2(2):109–118, 2011.Google Scholar
  10. 10.
    Daniel Burfoot, Joelle Pineau, and Gregory Dudek. Rrt-plan: A randomized algorithm for strips planning. In ICAPS, pages 362–365, 2006.Google Scholar
  11. 11.
    Michael Wooldridge. Agent-based software engineering. In IEE Proceedings on Software Engineering, pages 26–37, 1997.Google Scholar
  12. 12.
    Leonard Barolli and Fatos Xhafa. Jxta-overlay: A p2p platform for distributed, collaborative, and ubiquitous computing. Industrial Electronics, IEEE Transactions on, 58(6):2163–2172, 2011.Google Scholar
  13. 13.
    Fatos Xhafa, Raul Fernandez, Thanasis Daradoumis, Leonard Barolli, and Santi Caballé. Improvement of jxta protocols for supporting reliable distributed applications in p2p systems. In Network-Based Information Systems, pages 345–354. Springer, 2007.Google Scholar
  14. 14.
    Leonard Barolli, Fatos Xhafa, Arjan Durresi, and Giuseppe De Marco. M3ps: a jxtabased multi-platform p2p system and its web application tools. International Journal of Web Information Systems, 2(3/4):187–196, 2007.Google Scholar
  15. 15.
    A. Cilardo. New techniques and tools for application-dependent testing of FPGA-based components. IEEE Transactions on Industrial Informatics, 11(1):94–103, 2015.Google Scholar
  16. 16.
    A. Cilardo. Efficient bit-parallel GF(2m) multiplier for a large class of irreducible pentanomials. IEEE Transactions on Computers, 58(7):1001–1008, 2009.Google Scholar
  17. 17.
    A. Cilardo and E. Fusella. Design automation for application-specific on-chip interconnects: A survey. Integration, the VLSI Journal, 52:102–121, 2016.Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Flora Amato
    • 1
  • Nicola Mazzocca
    • 1
  • Francesco Moscato
    • 2
    Email author
  1. 1.DIETI - University of Naples ”Federico II”NaplesItaly
  2. 2.Dipartimento di Scienze PoliticheSecond University of NaplesCasertaItaly

Personalised recommendations