An agent-based architecture for multi-modal interaction
Agent论文:AgentMulti-Agent-System动态集成框架模型脚本解释策略

Agent论文:Agent Multi-Agent-System 动态集成框架模型脚本解释策略【中文摘要】随着计算机软硬件技术的发展,软件系统的规模越来越庞大,功能也越来越复杂,如何有效的重用已有的软件单元,是目前很多研究的重点。
传统构件化的系统集成方法缺乏多角色,多用户,多层次的灵活的交互,使得集成后的系统缺乏必要的灵活性和柔性。
而人工智能领域的Agent技术,具有主动性,自治性,社会性和智能性等特性,将其应用到系统集成过程中就有可能解决面向多领域的、异构系统之间的、柔性的动态集成问题。
本文将Agent技术应用到软件系统集成领域,在对领域特征集成单元划分规则展开分析的基础上,提出了包装原集成单元的Agent模型,设计并实现了基于多Agent的系统动态集成框架模型。
把脚本语言中脚本的解释控制策略应用到系统集成过程中,提出用脚本定义集成规则、基于脚本解释控制来完成集成单元之间柔性的、动态的集成控制策略。
系统集成框架设计了Agent能力注册中心、Agent管理服务和公共消息黑板等三类管理Agent以及控制协调Agent并分发任务的控制Agent。
在单个Agent 独立求解的基础上,使用集中控制多Agent间交互的策略,柔性、动态的把被集成系统单元集成在一起。
最后将该框架模型应用到某领域仿真系统,在本文设...【英文摘要】With the development of computer software and hardware, software is becoming more hugeness and functional.It is point that how to use the existing software units in effect. The traditional method of component has the disadvantages of low flexibility and non-dynamic in the process of software system integration. With the properties of bounded autonomy, rationality, sociability, reactivity, cooperation, and responsibility, Agent is quite suitable for the software integration.This paper introduces agent t...【关键词】Agent Multi-Agent-System 动态集成框架模型脚本解释策略【采买全文】1.3.9.9.38.8.4.8 1.3.8.1.13.7.2.1同时提供论文写作定制和论文发表服务.保过包发.【说明】本文仅为中国学术文献总库合作提供,无涉版权。
基于Agent的建模方法ppt课件

领域都在借鉴或采用该概念进行本领域的研 究工作。本章主要介绍基于Agent 的建模方法, 以及用于Agent建模和仿真的Swarm平台和应 用实例等。
9.1 Agent的基本概念
基于Agent的建 模方法
▪ 如基于Agent的软件工程(ABSE:Agent-Based Software Engineering)、基于Agent的计算 (Agent-Based Computing)、面向Agent的程 序设计(AOP:Agent-Oriented Programming)
▪ Agent通信语言(ACL:Agent Communication Language)等等。
▪ 基于对Agent英文原意的理解,常被人解释为代理。 但随着Agent广泛应用的不同领域,不再局限于 “代理”。
1.Agent应具有的特性:
▪ 1)Agent是一个具有明确边界和界面的问题 求解实体。
▪ 2)Agent处于特定环境之中,它通过感知器 来观测环境,通过效应器来作用于环境。
▪ 3)自治性。这是一个Agent 最本质的特征。
▪ 9.1.1 Agent的定义
▪ Agent 最初来源于分布式人工智能的研究。目前, 由于Agent 已经渗透到计算机科学技术的许多领域 和许多非计算机领域中,所以从一般意义上很难给 出Agent 严格而清晰的定义,到目前为止,还没有 形成一个统一确定的Agent定义。
▪ 在英文中,“Agent”有三种含义:一是指对其行 为负责任的人;二是指能够产生某种效果的,在物 理、化学或生物意义上活跃的东西;三是指代理, 即接受某人的委托并代表他执行某种功能或任务。
Formation control of networked multi-agent systems

Abstract: In this study, a systematic framework is developed for the consensus control problem, particularly for formation control of networked dynamic agents. In view of the complexity of the framework with switching coupling topology and non-linearity, a new decentralised formation strategy based on artificial potential functions (APF) is proposed. Owing to the existence of local minima in the APF, the formation controller is designed to introduce some special functions to settle that limitation. A new concept of relative-positionbased formation stability is defined, and a Lyapunov approach is used along with an extended linear matrix inequalities (LMI) algorithm to analyse the condition for formation stability. Finally, an example with simulations is provided to demonstrate the effectiveness of the designed formation controller.
The International Journal of Advanced Manufacturing Technology

Ping LouÆZu-de ZhouÆYou-Ping ChenÆWu AiStudy on multi-agent-based agile supply chain management Received:23December2002/Accepted:23December2002/Published online:5December2003ÓSpringer-Verlag London Limited2003Abstract In a worldwide network of suppliers,factories, warehouses,distribution centres and retailers,the supply chain plays a very important role in the acquisition, transformation,and delivery of raw materials and products.One of the most important characteristics of agile supply chain is the ability to reconfigure dynami-cally and quickly according to demand changes in the market.In this paper,concepts and characteristics of an agile supply chain are discussed and the agile supply chain is regarded as one of the pivotal technologies of agile manufacture based on dynamic alliance.Also,the importance of coordination in supply chain is emphas-ised and a general architecture of agile supply chain management is presented based on a multi-agent theory, in which the supply chain is managed by a set of intelli-gent agents for one or more activities.The supply chain management system functions are to coordinate its agents.Agent functionalities and responsibilities are de-fined respectively,and a contract net protocol joint with case-based reasoning for coordination and an algorithm for task allocation is presented.Keywords Agile supply chainÆMulti-agent systemÆCoordinationÆCBRÆContract net protocol1IntroductionAdvanced technology and management are constantly being adopted to improve an enterpriseÕs strength and competitive ability in order to achieve predominance among hot global competition.In a report on21st century manufacturing strategy development,the author suggests that various production resources,including people,funds,technology and facilities should be inte-grated and managed as a whole;thus optimising the utilisation of resources and taking full advantage of advanced manufacturing technology,information tech-nology,network technology and computer[1].Agile manufacture based on dynamic alliance is coming into being so that enterprises can remain competitive in a constantly changing business environment and is becoming a main competitive paradigm in the interna-tional market.Agility,which has basically two mean-ings:flexibility and reconfigurability,has become a very important characteristic of a modern manufacturing enterprise.Flexibility is an enterpriseÕs ability to make adjustments according to customersÕneeds.Reconfigu-rability is the ability to meet changing demands[2,3].The ability to quickly respond to marketÕs changes, called agility,has been recognised as a key element in the success and survival of enterprises in todayÕs market.In order to keep up with rapid change,enterprises need to change traditional management in this hot competition. Through dynamic alliance,enterprises exert predomi-nance themselves,cooperate faithfully with each other, and compete jointly so as to meet the needs of the fluctuating market,andfinally achieve the goal of win-win[2,3].So how to improve agility in the supply chain, namelyflexibility and reconfigurability,is one of the important factors to win against the competition.Supply chain management(SCM)is an approach to satisfy the demands of customers for products and ser-vices via integrated management in the whole business process from raw material procurement to the product or service delivery to customers.In[4],M.S.Fox et al. describe the goals and architecture of integrated supply chain management system(ISCM).In this system,each agent performs one or more supply chain management functions,and coordinates its decisions with other rele-vant agents.ISCM provides an approach to the real timeInt J Adv Manuf Technol(2004)23:197–203 DOI10.1007/s00170-003-1626-xP.Lou(&)ÆZ.ZhouRoom107,D8Engineering Research Center of Numerical Control System,School of Mechanical Science&Engineering, Huazhong University of Science&Technology, 430074Wuhan,Hubei,P.R.ChinaE-mail:louping_98@Y.-P.ChenÆW.AiSchool of Mechanical Science and Engineering, Huazhong University of Science and Technology, 430074Wuhan,Hubei,P.R.Chinaperformance of supply chain function.The integration of multi-agent technology and constraint network for solving the supply chain management problem is pro-posed[6].In[7],Yan et al.develop a multi-agent-based negotiation support system for distributed electric power transmission cost allocation based on the networkflow model and knowledge query&manipulation language (KQML).A KQML based multi-agent coordination language was proposed in[8,9]for distributed and dy-namic supply chain management.However,the coordi-nation mechanisms have not been formally addressed in a multi-agent-based supply chain.In most industries, marketing is becoming more globalised,and the whole business process is being implemented into a complex network of supply chains.Each enterprise or business unit in the SCM represents an independent entity with conflicting and competing product requirements and may possess localised information relevant to their interests.Being aware of this independence,enterprises are regarded as autonomous agents that can decide how to deploy resources under their control to serve their interests.This paperfirst introduces concepts and characteris-tics of agile supply chains and emphasises the impor-tance of coordination in supply chain.Then,it presents an architecture of agile supply chain based on a multi-agent theory and states the agentsÕfunctions and responsibilities.Finally,it presents a CBR contract net protocol for coordination and the correlative algorithm for task allocation in multi-agent-based agile supply chains.2Agile supply chainA supply chain is a network from the topologic structure which is composed of autonomous or semi-autonomous enterprises.The enterprises all work together for pro-curement,production,delivery,and so on[10].There is a main enterprise in the supply chain that is responsible for configuring the supply chain according to the de-mand information and for achieving supply chain value using fundflow,materialflow and informationflow as mediums.There are three discontinuous buffers to make the materialflowfluently and satisfy the change in the demand.On the one hand,as every enterprise manages inventory independently,plenty of funds are wasted.As the demand information moves up-stream,the forecast is inaccurate and the respond to the change in demand is slow[11].Accordingly,the key method for competi-tiveness is improving and optimising supply chain management to achieve integrated,automated,and agile supply chain management and to cut costs in the supply chain.To optimise supply chain management and coordi-nate the processes for materialflow,fundflow and informationflow,it is necessary to make materialflow fluent,quickly fund turnover and keep information integrated.Prompt reconfiguration and coordination is an important characteristic of agile supply chain according to dynamic alliance compositing and de-compositing(enterprise reconfiguration).Agile supply chain management can improve enterprise reconfiguring agility.The agile supply chain breaks through the tra-ditional line-style organizational structure.With net-work technology an enterprise group is formed by a cooperative relationship which includes an enterprise business centre,a production design centre,a supplier,a distribution centre,a bank,a decision-making centre, etc.It reduces the lead time to the market to satisfy customer demand.Agile supply chain without temporal and spatial limits promptly expands the enterprise scale,marketing share and resource by allied enterprise.So,a key factor of the agile supply chain is to integrate heterogeneous information systems adopted in various enterprises.The integration information system can provide marketing information and supplier details.Feasible inventory, quantity and cycle of replenished stock,delivery,etc.is designed using the shared information.It is evident that agile supply chain is a typical distributed system.A multi-agent system(MAS)which is characterised byflexibility and adaptability is suit-able for an open and dynamic environment.Thus MAS is a good method for agile supply chain man-agement.3The concept of agents and MASSome people define an agent as any piece of software or object which can perform a specific given task.Presently the prevailing opinion is that an agent must exhibit three important general characteristics:autonomy,adapta-tion,and cooperation[8,12,13].Autonomy means that agents have their own agenda of goals and exhibit goal-directed behaviour.Agents are not simply reactive,but can be pro-active and take initiatives as they deem appropriate.Adaptation implies that agents are capable of adapting to the environment,which includes other agents and human users,and can learn from the expe-rience in order to improve themselves in a changing environment.Cooperation and coordination between agents are probably the most important feature of MAS. Unlike those stand-alone agents,agents in a MAS col-laborate with each other to achieve common goals.In other words,these agents share information,knowledge, and tasks among themselves.The intelligence of MAS is not only reflected by the expertise of individual agents but also exhibited by the emerged collective behaviour beyond individual agents.Of course various agents have different functions,but some functions are needed for each agent.A generic structure of agents that includes two parts is presented:agent kernel and function mod-ule.Figure1exhibits the generic structure of agents which is a plug-in model.In Fig.1,the generic agent includes the following components:198The mailbox handles communication between one agent and the other agents.The message handler processes incoming message from the mailbox,orders them according to priority level,and dispatches them to the relevant components of the agent.The coordination engine makes decisions concerning the agent Õs goals,e.g.how they should be pursued,when to abandon them,etc.,and sends the accepted tasks to the planner/scheduler.It is also responsible for coordi-nating the agents Õinteractions with other agents using coordination protocols and strategies.The planner and scheduler plans the agent Õs tasks on the basis of decisions made by the coordination engine and on resources and task specifications available to the agent.If not,a message is sent to the coordination en-gine for finding extra resources.The blackboard provides a shared work area for exchanging information,data,and knowledge among function modules.Every function module is an inde-pendent entity.These function modules execute con-currently by the control of planner/scheduler and collaborate through the blackboard.The acquaintance database describes one agent Õs relationships with other agents in the society,and its beliefs about the capabilities of those agents.The coor-dination engine uses information contained in this database when making collaborative arrangements with other agents.The resource database reserves a list of resources (referred to in this paper as facts)that are owned by and available to the agent.The resource database also sup-ports a direct interface to external systems,which allows the interface to dynamically link and utilise a proprie-tary database.The ontology database stores the logical definition of each fact type—its legal attributes,the range of legal values for each attribute,any constraints betweenattribute values,and any relationship between the attributes of that fact and other facts.The task/plan database provides logical descriptions of planning operators (or tasks)known to the agent.4Multi-agent-based agile supply chain management Multi-agent-based agile supply chain management per-forms many functions in a tightly coordinated manner.Agents organise supply chain networks dynamically by coordination according to a changing environment,e.g.exchange rates go up and down unpredictably,customers change or cancel orders,materials do not arrive on time,production facilities fail,etc.[2,14].Each agent performs one or more supply chain functions independently,and each coordinates his action with other agents.Figure 2provides the architecture of multi-agent-based agile supply chains.There are two types of agents:functional agents and mediator agents.Functional agents plan and/or control activities in the supply chain.Mediator agents play a system coordinator role s by promoting coopera-tion among agents and providing message services.Mediator agents dispatch the tasks to the functional agents or other mediator agents,and then those func-tional or mediator agents complete the tasks by coordi-nation.All functional agents coordinate with each other to achieve the goals assigned by mediator agents.The mediator-mediator and mediator-agent communication is asynchronous,and the communication mode can be point-to-point (between two agents),broadcast (one to all agents),or multicast (to a selected group of agents).Messages are formatted in an extended KQML format.The architecture is characterised by organizational hier-archy and team spirit,simplifying the organisational architecture and reducing the time needed to fulfil the task.The rest of this section briefly describes each of the mediator agents underdevelopment.Fig.1Generic structures of agents199–Customer mediator agent:This agent is responsible for acquiring orders from customers,negotiating with customers about prices,due dates,technical advisory,etc.,and handling customer requests for modifying or cancelling respective orders,then sending the order information to a scheduling mediator agent.If a customer request needs to be re-designed,the infor-mation is sent to a design mediator agent,then to a scheduling mediator agent.–Scheduling mediator agent:This agent is responsible for scheduling and re-scheduling activities in the fac-tory,exploring hypothetical ‘‘what-if’’scenarios for potential new orders,and generating schedules that are sent to the production mediator agent and logis-tics mediator agent.The scheduling agent also acts as a coordinator when infeasible situations arise.It has the capability to explore tradeoffs among the various constraints and goals that exit in the plant.–Logistics mediator agent:This agent is responsible for coordinating multi-plans,multiple-supplier,and the multiple-distribution centre domain of the enterprise to achieve the best possible results in terms of supply chain goals,which include on-time delivery,cost minimisation,etc.It manages the movement of products or materials across the supply chain from the supplier of raw materials to the finished product customer.–Production mediator agent:This agent performs the order release and real-time floor control functions as directed by the scheduling mediator agent.It monitors production operation and facilities.If the production operation is abnormal or a machine breaks down,this agent re-arranges the task or re-schedules with the scheduling mediator agent.–Transportation mediator agent:This agent is responsible for the assignment and scheduling of transportation resources in order to satisfy inter-plant movement specified by the logistics mediator agent.It is able to take into account a variety oftransportation assets and transportation routes in the construction of its schedules.The goal is to send the right materials on time to the right location as assigned by the logistics mediator agent.–Inventory mediator agent:There are three invento-ries at the manufacturing site:raw product inven-tory,work-in-process inventory,and finished product inventory.This agent is responsible for managing these inventories to satisfy production requirements.–Supplier mediator agent:This agent is responsible for managing supplier information and choosing suppli-ers based on requests in the production process.–Design mediator agent:This agent is responsible for developing new goods and for sending the relevant information to the scheduling mediator agent for scheduling,as well as to the customer mediator agent for providing technological advice.5Coordination in a multi-agent-based agile supply chainCoordination has been defined as the process of man-aging dependencies between activities [15].One impor-tant characteristic of an agile supply chain is the ability to reconfigure quickly according to change in the envi-ronment.In order to operate efficiently,functional entities in the supply chain must work in a tightly coordinated manner.The supply chain works as a net-work of cooperating agents,in which each performs one or more supply chain functions,and each coordinates its action with that of other agents [5].Correspondingly,a SCMS transforms to a MAS.In this MAS,agents may join the system and leave it according to coordinating processes.With coordination among agents,this MAS achieves the goal of ‘‘the right products in the right quantities (at the right location)at the right moment at minimalcost’’.Fig.2An architecture of multi-agent based agile supply chain management2005.1Contract net protocol combined withcase-based reasoningThe contract net is a negotiation protocol(CNP)pro-posed by Smith[15].In the CNP,every agent is regarded as a node,such as a manager or a contractor.The manager agent(MA)is responsible for decomposing, announcing,and allocating the task and contractor agent(CA)is responsible for performing the task.This protocol has been widely used for multi-agent negotia-tion,but it is inefficient.For this reason,contract net protocol is combined with case-based reasoning(CBR).In case-based reasoning(CBR),the target case is defined as problem or instance which is currently being faced,and the base case is problem or instance in the database.CBR searches the base case in the database under the direction of the target case,and then the base case instructs the target case to solve the problem.This method is efficient.But at the very beginning,it is very difficult to set up a database which includes all problems solving cases.The cases may be depicted as follows:C¼\task;MA;taskÀconstraint;agentÀset> Here,MA is task manager.Task-constraint repre-sents various constraint conditions for performing the task,depicted as a vector{c1,c2,c3,...,c m}.Agent-set is a set of performing the task as defined below:Agent set¼\sub task i;agent id;cost;time;resource>f gtask¼[ni¼1sub task iIn the supply chain,the same process in which a certain product moves from the manufacturer to the customer is performed iteratively.So,case-based rea-soning is very efficient.Consequently,combining con-tract net protocol with CBR could avoid high communicating on load,thus promoting efficiency.The process can be depicted as follows(Fig.3).5.2The algorithm for task allocation baseon CBR contract net protocolThere are two types of agents in the supply chain, cooperative and self-interested agents.Cooperative agents attempt to maximise social welfare,which is the sum of the agents utilities.They are willing to take individual losses in service of the good of the society of agents.For example,function agents come from the same enterprise.In truth,the task allocation among cooperative agents is combinational optimisation prob-lem.Self-interested agents seek to maximise their own profit without caring about the others.In such a case,an agent is willing to do other agentsÕtasks only for com-pensation[16].Function agents,for example,come from different enterprises.In the following section the algorithm for task allo-cation among self-interested agents based on CBR contract net protocol will be addressed.Before describ-ing the algorithm,there are some definitions that must be clarified:Task—A task which is performed by one agent or several agents together:T=<task,reward,con-straints>,where task is the set of tasks(task={t1,t2,..., t m}),reward is the payoffto the agents that perform the task(reward={r1,r2,...,r m}),and constraints refer to the bounded condition for performing the task(con-straints={c1,c2,...,c n}).Agent coalition(AC)—A group of agents that per-form task T,described as a set AC={agent i,i=1,2,...,n}.Efficiency of agent—Efficiency of an agent i is de-scribed as follows:E i¼rewardÀcostðÞ=costð1Þwhere reward is the payoffto the agent performing task T,and cost refers to that spend on performing the task. If agent i is not awarded the task,then E i=0.Efficiency of agent coalition—E coalition¼rewardÀX micost iÀh!,X micost iþh!ð2Þwhere reward is the payoffof the agent coalition per-forming task T;cost i refers to that spend on performing task t i;and h is the expense on forming coalition,which is shared by the members of the coalition.If the coalition is not awarded task T,then E coalition<=0.6Algorithm:1.After MA accepts the task T=<task,reward,constraint>(task is decomposable),then it searches the database.2.If itfinds a corresponding case,it assigns the task orsubtask to the related agents according to the case, and the process is over3.If no case is found,then the task T is announced toall relevant agents(agent i,i=1,2,...n).4.The relevant agents make bids for the task accord-ing to their own states and capabilities.Thebid Fig.3CBR contract net process201from agent i can be described as follows:Bid i =<agentid i ,T i ,price i ,condition i >,where i ex-presses the bidding agent (i =1,2,...,h );agentid i is the exclusive agent identifier;T i is the task set of agent i Õs fulfilment;price i is the recompense of agent i fulfilling the task T i ;and condition i is the constraint conditions for agent i to fulfil the task T i .5.If [1 i h&T i then the task T can not be performed.Otherwise MA makes a complete combination of the agents,namely to form a number of agent coalitions (or agent sets,amounting to N =2h )1).6.First MA deletes those agent coalitions where no agents are able to satisfy the constraint condition.Next the rest of the coalitions are grouped by the number of agents in coalitions and put into set P (P ={P 1,P 2,...,P h })in order of the minimum re-compense increase of the coalitions,where P i is the set of agent coalitions,including i agents.7.MA puts the first coalition from each group P i(i =1,2,...,h )into set L ,and if L is null then it returns to (10),otherwise it calculates the minimum re-compense of each coalition as follows:Min Pm iprice i ÃT is :t :P h i ¼1T i TP m icondition i constraitThen it searches for the minimal agent coalition AC min from the set L .8.MA sends the AC min to the relevant agents,namely MA requests that these agent fulfil the task to-gether.The relevant agents calculate the E coalition and E i according to Eqs.1and 2.IfE coalition !max miE i ,then all agents in the AC minaccept the proposal to form a coalition to perform the task T together.MA assigns the task to the AC min ,and the process is over.Otherwise it deletes the AC min from P i and returns to (7).9.If the relevant agents accept the task or subtask,then MA assigns the task to them.The process is over.If some agents cannot accept the subtask and the stated time is not attained,then it returns to (3),otherwise it returns to (10).10.The process is terminated (namely the task cannotbe performed).After all processes have been completed,case-based maintenance is required to improve the CBR.Thus efficiency is continuously promoted.6.1An example–A simple instantiation of a supply chain simulation is presented here and the negotiating process among agents is shown.In this supply chain instantiation,thetransportation mediator agent (TMA)has a transporttask T ,in which it has to deliver the finished product to the customer within 15units of time and must pay 1500monetary units for it,that is T =<t ,1500,15>.Four transport companies can perform task T .Each company is an autonomous agent,that is four agents,agent A,agent B,agent C and agent D.So the TMA announces the task T to the four agents.Then the four agents make a bid for the task T as shown in Table 1.–So the four agents can form 24)1coalitions (see Fig.4),which are put into set P .Cooperation between agents in the coalition requires expense and the ex-pense for forming the coalition increases with the growth of in coalition size.This means that expanding the coalition may be non-beneficial.The expense of each agent in forming a coalition h is 100.First,the coalitions in which no agents can satisfy the constraint conditions are deleted from the set P .The rest of the coalitions are grouped by the number of agents in the coalition and ordered according to the recompense of each group that was increased due to the coalition,namely P 1={B},P 2={{A,B},{A,C},{B,C},{A,D},{B,D}},P 3={{A,B,C},{A,B,D},{B,C,D}},P 4={{A,B,C,D}}.Then the cost and efficiency of coalition {B},{A,C}and {A,B,C}are calculated as follows:Price f A ;B g ¼Min ð800x 1þ1200x 2Þs :t :20x 1þ12x 2 15x 1þx 2!1x 1!0:x 2!0Price f A ;B ;C g ¼Min ð800y 1þ1200y 2þ2000y 3Þs :t :20y 1þ12y 2þ5y 3 15y 1þy 2þy 3!1y 1!0:y 2!0;y 3!Fig.4Agent coalition graphTable 1The bids of four agents Agent Id Price Conditions Agent A 80020Agent B 120012Agent C 20005AgentD25003202the following result can be obtained:Price{B}=1200; x1=0.3750,x2=0.6250,Price{A,B}=1050;and y1= 0.3750,y2=0.6250,y3=0.The above result shows that agent B does not attend the coalition{A,B,C},that is both agent B and coalition{A,B}can fulfill the task and satisfy the constraint conditions.According to Eqs.1 and2,E A,E B,E{A,B}:E A=0(because TMA does not assign the task to A.),E B=(1500)1200)/1200=0.25, E{A,B}=(1500)1050)2*100)/(1050+2*100)=0.2can be obtained.Because of E{A,B}<max{E A,E B},agent B does not agree to form a coalition.Therefore,the TMA se-lects agent B to fulfil the task.7ConclusionsIn this paper,the concept and characteristics of agile supply chain management are introduced.Dynamic and quick reconfiguration is one of important characteristics of an agile supply chain and agile supply chain man-agement is one of the key technologies of agile manu-facturing based on dynamic alliances.As agile supply chain is a typical distributed system,and MAS is effi-cient for this task.In the architecture of agile supply chain management, the supply chain is managed by a set of intelligent agents that are responsible for one or more activities.In order to realise the agility of supply chains,coordination amongst agents is very important.Therefore,it can be suggested that contract net protocol should be combined with case-based reasoning to coordinate among agents. Acknowledgement The authors would like to acknowledge the funding support from the National Science Fund Committee (NSFC)of China(Grant No.5991076861).References1.Goldman S,Nagel R,Preiss K(1995)Agile competitors andvirtual organization.Van Nostrsand Reinhold,New York, pp23–32,pp158–1662.Yusuf YY,Sarhadi M,Gunasekaran A(1999)Agile manu-facturing:the drivers,concepts and attributes.Int J Prod Eng 62:33–433.Gunasekaran A(1999)Agile manufacturing:A framework forresearch and development.Int J Prod Eng62:87–1054.Fox MS,Chionglo JF,Barbuceanu M(1992)Integrated chainmanagement system.Technical report,Enterprise Integration Laboratory,University of Toronto5.Shen W,Ulieru M,Norrie DH,Kremer R(1999)Implementingthe internet enabled supply chain through a collaborative agent system.In:Proceedings of agentsÔ99workshop on agent-based decision support for managing the internet-enabled supply-chain,Seattle,pp55–626.Sandholm TW,Lesser VR(1995)On automated contracting inmulti-enterprise manufacturing.Advanced Systems and Tools, Edinburgh,Scotland,pp33–427.Beck JC,Fox MS(1994)Supply chain coordination via medi-ated constraint relaxation.In:Proceedings of thefirst Canadian workshop on distributed artificial intelligence,Banff,Alberta, 15May19948.Chen Y,Peng Y,Finin T,Labrou Y,Cost R,Chu B,Sun R,Willhelm R(1999)A negotiation-based multi-agent system for supply chain management.In:Working notes of the ACM autonomous agents workshop on agent-based decision-support for managing the internet-enabled supply-chain,4:1–79.Wooldridge M,Jennings NR(1995)Intelligent agents:theoryand practice.Knowl Eng Rev10(2):115–15210.Barbuceanu M,Fox MS(1997)The design of a coordinationlanguage for multi-agent systems.In:Muller JP,Wooldridge MJ,Jennings NR(eds)Intelligent agent III:agents theories, architecture and languanges(Lecture notes in artificial intelligence),Springer,Berlin Heidelberg New York,pp341–35711.Hal L,Padmanabhan V,Whang S(1997)The Bullwhip effect insupply chains.Sloan Manag Rev38(4):93–10212.Yung S,Yang C(1999)A new approach to solve supply chainmanagement problem by integrating multi-agent technology and constraint network.HICASS-3213.Yan Y,Yen J,Bui T(2000)A multi-agent based negotiationsupport system for distributed transmission cost allocation.HICASS-3314.Nwana H(1996)Software agents:an overview.Knowl Eng Rev11(3):1–4015.Smith RG(1980)Contract net protocol:high-level communi-cation and control in a distributed problem solver.IEEE Trans Comput29(12):1104–111316.Barbuceanu M,Fox MS(1996)Coordinating multiple agentsin the supply chain.In:Proceedings of thefifth workshop on enabling technology for collaborative enterprises(WET ICEÕ96).IEEE Computer Society Press,pp134–14117.Jennings NR,Faratin P,Norman TJ,OÕBrien P,Odgers B(2000)Autonomous agents for business process management.Int J Appl Artif Intell14(2):145–1818.Malone TW,Crowston K(1991)Toward an interdisciplinarytheory of coordination.Center for coordination science tech-nical report120,MIT Sloan School203。
AGENT技术报告

AGENT技术报告Agent软件工程(AOSE:Agent-Oriented Software Engineering)所谓Agent是指驻留在某一环境下能够自主(Autonomous)、灵活(Flexible)地执行动作以满足设计目标的行为实体。
这一概念定义将Agent视为是软件工程化开发所需的一个计算抽象和高层的概念模型。
作为一个计算抽象,Agent能够实施自主的计算行为,这有别于对象、线程、过程和函数等计算单元。
作为一个概念模型,Agent概念既可以用于直观地描述现实世界中一个个具体的事物;也可以用于表示计算机世界中基本的软件运行单元。
将由两个或者更多个相对独立同时又相互作用的Agent所构成的系统称为多Agent系统(MAS:Multi-Agent System),并将由一个或者多个Agent所构成的系统称为面向Agent的系统。
Agent的特点主要体现在以下几个方面:Agent驻留在环境中并需要与环境进行交互Agent是行为实体Agent的行为具有一定的灵活性,主要体现为:反应性(Reactive)、社会性(Social)和自发性(Proactive)。
Agent的概念和技术出现在分布式应用系统的开发之中,并表现出明显的实效性。
以下列举几项人们在分布式应用方面所从事的涉及Agent的研究和开发工作,从中我们可以初步体会到Agent概念和技术的意义。
1. 利用Agent技术改善Internet应用例如,研制"信息找人"的Agent。
它具有"需求"与"服务"的集散能力,它接受信息分布者有关信息要点的注册,以及信息查询者有关信息需求要点的注册。
该Agent根据这些信息,主动通知用户谁能够提供其所需信息,或主动通知信息提供者谁目前需要其所能提供的信息。
2. 利用Agent技术实现并行工程的思想例如,利用Agent技术开发工作流管理者。
MEDIATOR-BASED RECOVERY MECHANISM FOR MULTI-AGENT

专利内容由知识产权出版社提供
专利名称:MEDIATOR-BASED RECOVERY MECHANISM FOR MULTI-AGENT SYSTEM
发明人:LEE, Habin,SHEPHERDSON, John, William 申请号:GB 2004 000903 申请日:2004 0303 公开号:WO04 /086163P 1 公开日:2004 1007
摘要:A method of recovering the status of a collaboration between a plurality of component agents in a multi-agent systems architecture, the method comprising: processing collaboration information forwarded by a mediator agent for each component agent; maintaining a collaboration processing status information record derived from the collaboration information provided by each collaborating agent to the mediator agent; and in the event that a device which affects the collaboration suffers an event which causes one or more component agents to lose its collaboration status,n status using one or more of said collaboration processing status information records.
美国赛博空间作战行动Cyberspace _Operations

CHAPTER II
CYBERSPACE OPERATIONS CORE ACTIVITIES
Introduction................................................................................................................II-1
3.应用
a、本出版物中确立的联合原则适用于联合参谋部、作战司令部指挥官、下属统一司令部、联合特遣部队、这些司令部的下属部门、各军种和作战支持机构。
b、本出版物中的指南具有权威性;因此,除非指挥官认为特殊情况另有规定,否则将遵循这一原则。如果本出版物的内容与出版物的内容发生冲突,则以本出版物为准,除非参谋长联席会议通常与其他参谋长联合会成员协调,提供了更为现行和具体的指导。作为多国(联盟或联盟)军事指挥部一部分的部队指挥官应遵循美国批准的多国原则和程序。对于未经美国批准的条令和程序,指挥官应评估并遵循多国司令部的条令与程序,如果适用并符合美国法律、法规和条令。
•联合职能部门和网络空间运作
第三章权限、角色和职责
•简介III-1
•当局III-2
•角色和职责
•法律考虑因素III-11
第四章规划、协调、执行和评估
•联合规划过程和网络空间运营
•网络空间运营规划考虑因素
•对网络空间的情报和操作分析支持
运营计划IV-6
•针对性IV-8
•网络空间部队的指挥与控制
Lucent Technologies

EXPLORING AGENT-BASED WIRELESS BUSINESS MODELS AND DECISION-SUPPORT APPLICATIONS IN ANAIRPORT ENVIRONMENTY. Wang(1), L. Cuthbert(1), Francis J. Mullany(2), P. Stathopoulos3), V. Tountopoulos(3), M. Senis(4),(1)Department of Electronic Engineering, Queen Mary, University of London,327 Mile End Road, London, UKTel: +44 20 7882 7408, Fax: +44 20 7882 7997Email: yapeng.wang/laurie.cuthbert@(2) Bell Labs ResearchLucent TechnologiesSwindon, UKTel: +44 1793 77 6788Email: mullany@(3)National Technical University of AthensDepartment of Electrical and Computer Engineering, Telecommunications Systems Laboratory9 Heroon Polytecheiou Street, Zographou 15773, Athens, GREECETel: +30 210 772 1495, Fax: +30 210 772 2534,Email: vttounto@telecom.ntua.gr(4)Athens International Airport SAInformation Technology & Telecommunications Department, Business Development Division Spata 19019, ATC & CONTROL Tower Building (32), GREECETel: +30 210 35 36 209, Fax: +30 210 35 37 782Email: msenis@aia.grABSTRACTThis paper describes an intelligent communication and decision support system for providing wireless services in an airport environment. A novel agent-based business model is proposed and the value chain is analysed for wireless applications. This system is studied and developed within the scope of the IST ADAMANT project, where the Athens International Airport (AIA) is used as the trial environment. First of all, a set of advanced, realistic decision-support application scenarios enhancing the airport facilities both for the passengers and for the airport staff is identified. Most of the applications can be summarised as location-based personalised services. They refer both to airport internal users and to passenger users. In order to provide these services, location-sensitive Service Level Agreements (SLAs) and Radio Resource Management (RRM) are introduced. The design of such a system is envisaged based on a generic, multi-agent architecture, which is also presented in this paper.Keywords: wireless application, multi-agent system, wireless business model, wireless SLA, radio resource management1. INTRODUCTIONThe advance in wireless communication market enables users to experience enhanced delivery of personalized services through the integration of various radio technologies. However, the existing management platforms cannot ensure the scalability and reliability for the interworking of different networks. Therefore, the need for research activities in network management by developing and validating flexible architectures for the support of heterogeneous infrastructures is apparent.This paper presents an Intelligent Decision and Management system (IDMS) for providing wireless services in an airport environment. This system is studied and developed within the scope of the IST ADAMANT (A irport D ecision A nd MA nagement N e T work) project, where AIA is used as a trial environment. The envisaged system will be capable of handling crisis situations, as its benefits are clearer under such circumstances. The approach adopted is generic covering any mode of transport; although within this paper it is limited to an airport environment, as the “hot spots” that are naturally generated there provide some of the most difficult challenges.A system, as generic as this, has not been implemented before and it is technically challenging.A set of advanced, realistic application scenarios enhancing the airport facilities both for the passengers and for the airport staff is identified, which make obvious the need for a scalable anticipatory environment able to provide roaming/location-based and personalized services based on Service Level Agreements. These scenarios include the Internal Bus Arrival Time Information Estimation, Flight Information Display on Demand, Mobile Video/Photo Information for Security and Surveillance, Automatic Billing Application for Airport Fuelling Companies, and Passenger Support in the Area of the Main Terminal Building.To meet the requirements imposed by the above scenario, an agent-based architecture is proposed. The multi-agent architecture forms a framework for implementing the interactions between the very different types of entities involved in the proposed scenarios, whether at the service level or at the network transport level. This type of architecture also has the advantage of scalability and robustness of operation in congestion and emergency situations.The SLA management for location-sensitive applications and business models for wireless applications in an airport environment are analysed. A hybrid business model balances the benefits of all business roles, where appropriate value chains ensure the market place will be running smoothly.2. SYSTEM OVERVIEW.This section presents briefly the operational environment for the functionality of the IDMS. More specifically, it describes the airport environment main structure, the airport user groups, and the existing set of services and wireless telecommunication infrastructure.The airport environment consists of the core building which is the main terminal (MTB) and satellite building, the administration buildings and the related building of all the airport providers (such as handlers, police, fire brigade, the Air-Traffic Control Tower), as well as the outdoor environment which includes the access motorway, the new Metro station and the parking spaces. Four different categories of potential users, within this operational environment, can be identified: passengers, meters and greeters, the airport staff and other airport Service & Content Providers (i.e. security companies, airlines, duty-free and facility companies).Different communications services are targeted at the different user categories listed above. For the provision of these services, a telecommunication infrastructure has been developed. GSM/GPRS, WLAN and TETRA are the wireless technologies used. An IP backbone network is provided for Internet services and the PABX network for conventional telephony services. The airport holds the Airport Services and Operations Centre (ASOC), which combines all critical airport operations mechanisms and controls. The Airport Operational Database (AODB) contains real-time information about the arriving and departing flights and other flight related information (gates, stands etc). This information is distributed within the airport community via the Flight Information Display System (FIDS). All the airport data is processed through a central security system, which is called the Universal Flight Information System (UFIS). This provides technical and logical functions for an effective and reliable data processing of operational flight information and holds the central UFIS database of the airport.3. APPLICATION SCENARIOS.In this section, the set of applications that the proposed system supports for enhancing the operational environment of the airport is described.3.1 Internal Bus arrival time informationThis application aims at developing a real-time component that estimates the waiting time of a passenger at the bus stop, prior to the arrival of the internal bus service of the airport. Towards this end, the data transfer functionality of either the airport TETRA system or the GPRS functionality of the GSM system is exploited. Real-time data regarding the location (from on-board GPS units) and the speed of the buses will be sent to the ASOC,where suitable software will estimate their arrival time at the bus stops, within the airport area. From the ASOC centre, this information will be distributed to every bus stop, where a LED Display or a flat screen will be available, or even to individuals’ hand-held devices.3.2 Flight Information Display System (FIDS) on demandThis application will provide on-demand arrival and departure information on portable wireless terminals, based on the existing non-personalized UFIS flight information system of the airport. This service is to be considered as an extension of the existing non-personalized UFIS applications, as far as new interfaces and communication infrastructure are concerned. Target users are the airport staff, ground handlers, airlines, concessionaires and passenger service providers. This service will be fully personalised according to individual customer or group preferences. For example, ground handlers are more interested in the exact time of arrival and the location of the aircraft, whereas concessionaires are more likely to be interested in time delays or predictions of the number of passengers transiting in the next hour.The system interfaces with the network resource management ADAMANT subsystem, providing relevant information to aid the resource management subsystem in its provision of pro-active congestion management mechanisms (e.g. the dropping of less critical user groups). Security issues will also be taken into consideration.3.3 Mobile video/photo information for security and surveillanceThis scenario concerns the development of a mobile photo/video camera system for the real-time transfer of photos or video to the ASOC for security and surveillance purposes and back to the security/emergency staff. Potential users of this system are the airport security personnel, airport police, fire brigade and ambulance services etc. Transmitting real time photographs and/or video of an emergency situation or accident, by the ASOC Intelligent Decision and Management system, will provide instantly the necessary elements for the immediate evaluation of the situation and the rapid activation of the necessary emergency-response teams. The remote monitoring of the crisis event through instant photos or video will result in more effective crisis evaluation and measures. The images and/or video will be directed to the system users by the ASOC, according to their profile, location, the overall situation and the user’s preferences. This application will exploit commercial off-the-shelf equipment enhanced with additional security and authentication mechanisms and the ADAMANT network resource management features, in order to provide connectivity to the security personnel under all network congestion circumstances.GSM/GPRS and W-LAN have the capability to transfer multimedia data in order to provide real-time visual information, according to the users’ location and the overall situation. The user terminal comprises a PDA equipped with a GPRS and IEEE802.11b WLAN PCMCIA cards and a GPS device in order to extract precise location information. The recently deployed Multimedia Messaging Service in GSM/GPRS networks can be an enabling technology for such an application. In the longer term, video streaming may be become possible in areas with W-LAN coverage or over future 3G networks. This service complements existing networks of fixed cameras that provide surveillance information from certain airport areas.3.4 Automatic billing application for Airport Fuelling companiesThe aim of this application is the development of a real time component that will automatically charge the amount of fuel loaded on to an aircraft from the respective fuelling company. The IMDS utilises the SDS functionality of the TETRA system (TETRA 2003). Moreover, it combines the information granted from airport’s existing FIDS system with locally stored information from fuelling trucks and drivers.3.5 Passenger support in the area of the Main Terminal BuildingThis is the core application of the project, aiming at providing passengers with personalised and location-based information related to the airport, as well as broadband Internet access during their stay to the main terminal ers of this service can access the content through their mobile terminals (PDAs or portable computers), or fixed PCs located inside the airport premises.Services depend on passenger preference profiles, as well as the status (e.g. departing, arriving, or delayed) of the user’s flight.The service will be controlled by a session manager platform able to:§Provide the passenger with the necessary flight information and according to his/her profile and flight status, guide him/her through the departure procedure of checking in, clearing security, and reporting to the departure gate.§Allow the airport to track the passenger.§Provide personalised information with respect to other airport commercial facilities such as restaurants, shopping, etc., especially to passengers who get to the gate early, or to business travellers making use of the airport lounges. Flight delays can increase the demand enormously, as travellers can be encouraged to use these commercial facilities. To this end, the IMDS can exploit knowledge about the user preferences and the type of trip (e.g. regular business travellers or travel for leisure).§Inform arriving passengers about means of transport (to and from the airport), accommodation, and local tourist information.This application will help the airport authority to offer a value-added service and increase the passenger satisfaction, and on the other hand allow them to make more efficient use of the time spent at the airport premises and to increase the concessionaires’ incomes. Finally in this system, it is possible to extend the coverage area to other "hotspots" like conference halls, hotels, restaurant and bars, etc.4. THE AGENT APPROACH OF SYSTEM ARCHITECTURE.This section describes the main agent architecture for the IDMS in the airport area. IDMS deals with resource management strategies for GSM/GPRS, WLAN and TETRA and addresses SLA management issues in the context of providing advanced services to the airport users. The IDMS architecture is based on the “one-stop-shop” business concept, which identifies all the processes that should be in place, in order to include a service in the business service portfolio. In that respect, in such a scalable anticipatory environment, the following business entities can be identified: the users, the Service Providers, the Network Providers for GSM/GPRS, WLAN and TETRA infrastructures and the Content Providers.The development of the IDMS is based on Multi-agent systems (MAS) (Walter Brenner et al 1998). This section introduces the components that comprise the main agent architecture and provide the framework for the interaction between the entities identified previously. More specifically, the following generic agent components can be defined:q User Agents (UAs);q User Resource Agents (URA);q Location Agent (LA);q Service Broker Agent (SBA);q Service Provider Agents (SPAs);q Content Provider Agents (CPAs);q Resource Broker Agent (RBA);q Network Provider Agents (NPAs);The rest of this section is dedicated to the analysis of these agents and the description of their role in the IDMS.The UA manages all the information related to the user terminal and behaviour in the airport, such as user preferences, travel information, privacy issues etc. Every user of the IDMS owns a UA, located inside the user terminal. In cases where a terminal cannot support the UA software, a Proxy User Agent located at the SBA can be used. The UA is activated any time the user registers to the IDMS. Its main role is to set and update the user profile. Any time the user wants to make use of a specific service, the UA communicates with the SBA and sends an application request. The UA also performs SLA monitoring functionality by monitoring some crucial SLA parameters, such as the received bit rate.Another important functionality of the UA is to update the user’s location at certain intervals, in order to provide location-based services. In that respect, the UA sends location update messages to a LA via the SBA, in order to inform it about the current position of the corresponding user. The LA holds a database, which keeps records of the current position of all the users registered to the IDMS. It can then maintain information about the geographical location of the user at any time.The SBA plays a key role in the whole architecture, acting as a mediator agent by providing the interface between the UAs and the SP agent components. The SBA performs on behalf of the IDMS, subscription and identity checks for incoming users. Furthermore, the SBA maintains user profiles containing information such as the set of services and applications that the corresponding users are willing to subscribe to and the reference quality level at which a specific service should be provided. The SBA undertakes the responsibility of prioritizing and delivering the incoming messages to the appropriate agents. The prioritization strategies can be based on many parameters, such as the type of the request, the SLA management policies and the preference settings of the UA. According to such information, the IDMS can decide about the priority given to multiple incoming service requests, with the aim of maximising the IDMS’s profit.The SBA can, also, act as a facilitator for SLA negotiation and notification functionality between the UAs and the SPAs. It is responsible for transferring and supporting SLA messages both from and to the SPAs. These messages may involve the SLA proposal of an SPA in response to the service request of a UA, the SLA response of the UA to the SPA and other SLA renegotiation messages.The SPA maps to the existing entities of the airport environment for the provision of the available services. It is mainly responsible for the accomplishment of the role of the Service Provider to the end users. So, the role of the SPA is to respond to the requests from the SBA and offer the requested services to the UA, according to certain criteria and to retrieve pertinent information from local databases. In that respect, it communicates with the CPA, which provides service content information messages regarding the operation of the available services. The SPA can, also, perform SLA management functionality for the negotiation and monitoring of the SLAs with the UAs, through the SBA, and report any violations of the agreed SLA contracts.The RBA is the gateway of the network domain with the other entities. Its main task is to find the best NPA to serve the incoming requests from an SPA. In that respect, the RBA should exploit theinformation gathered from the service domain and report to the most appropriate NPA about the facilitation of the specific service request. The incoming messages may involve the service type and other user related information. The RBA, also, interacts with the LA, in order to receive the user’s location in the system. It, can, then decide the appropriate NPA with resource availability for location-based services.The behaviour of the RBA is more important for the IDMS in cases of lack of resources, due to unexpected events, such as emergency cases and flight delays, which lead to local hot spots. In such cases, the challenge for the RBA is to find reliable solutions from the most appropriate NPA. In that respect, it should monitor the performance of the underlying networks, in order to identify the current congestion levels of the available networks and report any degradation in the system performance. So, at certain intervals, the RBA is informed by the NPA about (or alternatively infers itself) the current network status. Subsequently, the RBA can perform adequate functionality for finding the most appropriate NPA and ask it for resources. This functionality is crucial, especially in cases of high priority service requests, such as in emergency cases.The NPA (network provider agent) is that agent in the system with primary responsibility for provisioning of the transport function for the services supported by the system. Hence, the role of a NPA is twofold:1.Negotiation. NPAs “represent” the networks in the system’s efforts to match the requirednetwork transport capabilities to the services requested by the user. A resource broker agent will contact one or more NPAs and by some mechanism, come to a contracted arrangement whereby one or more NPAs undertake to reserve and allocate network resources to the transport link needed for an agreed price.2.Resource management. A given NPA organises its own internal resources, either in isolationor with the aid of other agents, to supply the agreed transport links with the contracted QoS arising from the first role.In the context of the IDMS, there is one NPA for each of the access networks that are associated with the system, i.e. the WLAN system, the various GSM/GPRS operators, the TETRA network, etc. It should be noted that the NPA functionality may be distributed among a number of sub-agents within the network (SHUFFLE 2001).The URA (user resource agent) is an optional agent in the user terminal, with the role of collaborating with NPAs and/or other URAs, to control the user terminal’s use of resources so as to optimise the operation of the user’s transport link over the radio interface. The resources over which the URA may have influence include the air interface and usage of battery power.Based on the description provided above, Figure 1 summarises the system agent architecture for the accomplishment of the main objectives of the IDMS. As it can be seen, some of the agent components hold interactions with external databases, which then (partially) represent the necessary interface between the agent components of the IDMS and the external world.Figure 1: System Agent Architecture5. SLA MANAGEMENT AND BUSINESS PROCESS MODEL.5.1 SLA Management framework.As users move through an airport, they are roaming through the network, and the SLA management provided should be sensitive to the local conditions, adjusting SLA guarantees according to the roaming and location conditions as well as promptly notifying the user of these changing conditions. Location dependency of SLA is envisaged when users move between locations with different coverage characteristics or with different congestion situations (e.g. different cells of a GSM/GPRS/UMTS network) or when users move between locations served by different network technologies (e.g. UMTS / WLAN / TETRA).In addition, in order to manage congestion and crisis scenarios, a service provider should be able to define policies to prioritise the allocation of resources to the most critical services and customers, to deliver the best possible service levels based on combination of SLA agreed with the customers and current conditions of the network.The SLA management framework defined here is used to develop SLA templates and SLA contracts for service subscribers in which the service level objectives may change as the user travels to or moves through the airport.It includes components to: provide resource management with contracted SLA terms in order to allocate network resources (e.g., bandwidth) accordingly; monitor the service level experienced; notify compliance or non-compliance of the service level objectives; provide reporting functions for the detailed analysis of the service level offered by the network; communicate with service components to adjust the service behaviour based upon the management policies set by the provider.Performing SLA Management also implies coordination and exchanging information between providers in the value-chain and between providers and customers. Such coordination and information exchange is formalized in ADAMANT through the definition of business process models and the corresponding business interactions amongst providers, focusing on service management processes(e.g., service subscription, service assurance, service planning).5.2 Business models and value chain.The business model of the ADAMANT system involves several different market players and can be characterized by multiple relations which, depending on the provided service, might differ.In general, the following players are expected to be involved in the ADAMANT business model:q Customers/Users:In general, we can distinguish between the User of a service and the Customer that subscribes to that service and negotiates a SLA with the Service Provider. In some cases they might coincide,e.g. in the case of passengers, in other cases they might differ, e.g. in the case in which a companysubscribes to a service for a certain number of its employees. In ADAMANT, Customers can be passengers, members of the Athens International Airport (AIA), Ground Handlers, etc.q Service Providers (SP):An SP is a company or organization that provides wireless communication services as a business.SPs may operate networks, or they may simply integrate the services of other providers in order to deliver a total service to their Customers. Providing a wireless communication service to any one end Customer may involve multiple SPs, where one provider may “sub-contract” to other providers to fulfil the Customer’s needs. According to the specific nature of the services provided we can distinguish among Content Providers, Application Service Providers, Service Integrators / Content Brokers, Internet Service Providers etc. In the ADAMANT context, depending on the specific application, Content Providers may be the AIA, e.g. providing flight information, or the Airport Concessionaires, e.g. airlines and travel agencies providing information about flight offers, or shops and duty frees providing information about special offers. The role of Application Service Provider, Service Integrator and Content Broker is typically assumed by AIA (or more precisely, by some of its internal departments, e.g. the ASOC or IT&T departments), who acts as a “One-Stop-Shop” for services offered to the airport community. The role of Internet Service Providers is again covered by AIA, through its IT&T department. Other ISPs may be involved in the ADAMANT application scenarios, such as OTENet, and Panafonet.q Network Providers:These provide wireless communication services on an underlying network infrastructure, where, in this context,the services are basic telecommunication services, such as voice and data channels, IP capacity etc. To be precise, Network Providers are actually a sort of Service Providers, i.e.providers of basic network connectivity services, so they can be considered as Network Service Providers. We can distinguish the following sub-roles for Network Providers, according to the network technology used:•Mobile Operators provide voice and data services on GSM / GPRS (and UMTS).•WLAN Operators operate WiFi (IEEE 802.11) Wireless LAN networks in hot spots such as the airport main terminal. In the ADAMANT context the WLAN is operated accordingto the neutral host model: in this model the location owner, AIA, owns the infrastructure(Access Points, Antennas, Cabling, session management software, firewalls, routers) andoffers it for exploitation to different providers, in this case to OTEnet.•Specialized network operators provide voice and data services on specific network technologies.As stated above, the classification of business roles presented above is useful to clearly separate functional roles within the business model but it might be the case that, in a certain application scenario, the same business entity plays more than one role, or even different business units within the same organization like in the case of AIA departments. It may also happen that the same business entity plays different roles in different application scenarios.For the generic business roles, the Customer (User) subscribes for a service with either a Service Provider or a Network Provider, according to the nature of the service requested and the specific business model used for providing that service. In fact, for the most generic case, it is possible that the customer, beyond having a direct relationship with the Network Provider, would also have a direct business relationship with the service provider. For example, not all services would be billed via the account the user holds with the network provider. Typically, a subscription for a value-added service could be performed with a Service Provider, while a network access / connectivity service could be subscribed to with a Network Provider. CustomerMobile Operator WLANOperator ISP Airport AuthorityASP/ContentBroker Foreign mobile OperatorForeignISPContentProviderISP Figure 2: Business actors and their relationships in the ADAMANT contextThe business relationships between roles in the ADAMANT context are depicted in Figure 2. In the figure, specialized service provider and network provider roles have been added to reflect the actual service and networks typologies that are available in the designed application scenarios.The Customer may have direct relationships with both the Service and Network Providers. Mobile and WLAN operators interact with ISPs for accessing the public Internet, and such ISPs in turn may interact with an ASP/Content Broker, either for providing Internet access to the ASP/Broker, or to buy content from it. Mobile and WLAN operators may have relationships in the cases in which an operator may want to offer its customers services using the other operators’ networks (e.g. a Mobile Operator offers download of video-clips to its customers through a WLAN when the customer is in the airport, which would be much faster). For the case of foreign visitors, foreign mobile operators are also represented, since these would have roaming relations with the local operators.6. CONCLUSIONThis paper has illustrated the on-going work of ADAMANT project, the application scenarios and the IDMS architecture. The paper also introduces the proposed the SLA management framework for location-sensitive wireless applications and business models and value chains. Through the multi-agent architecture, the IDMS can provide management of the communication resources and ensure that the service provisioning of the airport users is in line with their SLAs. The new business model and value chain balance the requirements of all the business roles and ensure the smooth operation of the future wireless marketplace. Within this project, the IDMS system and new business models will be tested and validated through experiments, trials and demonstrations based on the defined application scenarios.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
An agent-based architecture for multi-modal interactionC ATHOLIJN M. J ONKER, J AN T REUR AND W OUTER C.A. W IJNGAARDS†Department of Artificial Intelligence, Vrije Universiteit Amsterdam,De Boelelaan 1081a, 1081 HV Amsterdam, The NetherlandsURL: http://www.cs.vu.nl /~{jonker,treur,wouterw} Email: {jonker,treur,wouterw}@cs.vu.nl In this paper an executable generic process model is proposed for combined verbal and non-verbal communication processes and their interaction. The agent-based architecture can be used to create multi-modal interaction. The generic process model has been designed, implemented interactively and used to simulate different types of interaction between verbal and non-verbal communication processes: a non-verbal communication process can add and modify content to a verbal communication process, but can also provide a protocol for the (control of the) verbal communication process. With respect to the communication protocol both stimulus-response behaviour and deliberative behaviour have been modelled and simulated. The semantics of the model has been formalised by three-levelled partial temporal models, covering both the material and mental processes and their relations.KEYWORDS: intentional models; agent modelling; non-verbal communication; formalisation; human computer interaction; semantic levels; meta levels1. IntroductionCommunication is often modelled exclusively as a process of information exchange, abstracting from the physical realisation of the communication process. This approach is based on the more general perspective that a strict separation between the mental aspect (symbolic processes) and the material aspect (physical processes) has advantages in modelling. Following this perspective, the communication process is not embedded in the physical environment. In particular, for the case of embodied non-verbal communication, for example on the basis of body language or gestures, a strict separation of communication processes from interaction at the material level can be rather artificial. On the other hand, describing communication processes only in physical terms may be too restrictive as well. In the model of communication presented in this paper both the material level and the level of information, as well as the interaction between the levels are taken into account in one generic process model.At the symbolic level a distinction can be made between information representing the subject matter of the communication, and information that refers to the process of communication, for example, information on the communication protocol that is followed, or the current stage of the communication process within the protocol. Thus, in the model three semantic or representation levels are introduced:•the material level (for the physical world),•the symbolic object level (for symbolic manipulation of content information on the physical world), and •the symbolic meta-level (for symbolic manipulation of the dynamics and reflective aspects of the agents). Each of these three levels uses representations of structures of one of the other levels: the symbolic object level uses representations of the information from the material world, the symbolic meta-level uses representations of the information from the symbolic object level, and the material level uses representations of the information from the symbolic object level. The three levels of representation and the forms of interaction between verbal and non-verbal communication are detailed in Section 2. It is shown how the generic process model can be applied to model both verbal communication and non-verbal communication, as well as different types of interaction between these forms of communication, in one semantic framework. One example application of the model is presented in which the communication protocol of a verbal communication process is modelled as reflex-based non-verbal communication (one gesture triggers steps in the verbal communication and other gestures by stimulus-response behaviour). In a second example model the non-verbal communication in the communication protocol is guided by conscious deliberation. A third model addresses goal directed conscious deliberation.Next, in Section 3 an executable generic process model is introduced in which a number of processes within a communication process are distinguished. This process model is in accordance with the semantics given in Section 2.† Parts of the material of this paper were presented (in preliminary form) in WECC’98 and ACL’99.The generic process model proposed in this paper can be used to create multimodal interactive systems, such that apart from the possiblity of using a verbal language to interact with the system, also non-verbal interaction is possible. By using the components and knowledge types of the architecture, it becomes possible for the system to handle both the user integrating non-verbal cues in his or her communication and to return integrated non-verbal cues to the user as well. This makes for much more intuitive interaction, bringing the machine closer to the user by allowing a broader scope of interaction. The agent-based architecture proposed here can thus be used to easily create a system capable of verbal and non-verbal interaction.An interactive prototype has been built of the example communication process in this paper. It uses icons to display the agents’ situation. The reasoning model used inside the simulated agents can be selected. Also, the user can take on the role of an agent, interacting with the other agent, the interactive demo is presented in Section 4.The behaviour displayed by the model is described in section 5. The reflex-based, conscious deliberative and goal-directed conscious deliberative models are described seperately. In Section 6 the results are evaluated. The three levels are explained in more detail in Section 7; a process semantics is defined by means of multi-levelled traces based on triples of three-valued states, formalised by partial models (Engelfriet and Treur, 1995). Section 8 summarizes and compares this approach with other work. In Appendix A a trace of the process is given in symbolic notation, demonstrating the stimulus-response case. In appendix B the trace using conscious reasoning is given and in Appendix C the trace using goal-directed conscious reasoning is given in symbolic notation.2. Distinguishing and relating verbal and non-verbal aspectsTo create an appropriate model we first need to understand verbal and non-verbal communication and their interactions. In order to do this, in section 2.1 we first put both types of communication on a common ground by giving a semantic model.During real-life communication processes several types of communication play a role, among them are verbal and non-verbal communication. Furthermore, combining verbal and non-verbal communication can sometimes be done in a stimulus-response manner in contrast to consciously. In Section 2.2 different types of interaction between verbal and non-verbal communication are distinguished and explained. Also, an example communication process is introduced, which will be reused later on. Section 2.3 proceeds by relating verbal and non-verbal processes, showing how differences between reflex-based (also called direct stimulus-response) reactions and conscious reactions on non-verbal communication can be modelled.2.1. SEMANTIC LEVELS IN COMMUNICATIONThe semantic model is built by identifying the semantic levels involved, making the representation relations between them explicit, and by determining the state transitions at the different levels during the communication process. Three semantic levels are used in the semantic model of communication presented in this paper. The first is the material level: of the world itself, the physical reality. The second level is the level of symbolic representation of the world state: the symbolic object level. Within the agents, symbols are used to represent information regarding the world state. The third semantic level is the symbolic level where the agent reasons about aspects of its own state, e.g., its own knowledge and actions it intends to perform in the world: the symbolic meta-level. Symbolic expressions at this level do not represent information about world states, but instead are an explicit representation of information about the state of the process, of an agent’s related mental aspects, such as its state of knowledge, its goals, and its intentions.2.2. A SIMPLE EXAMPLE COMMUNICATION PROCESSAll examples in this paper are about a lecture, which is finishing. The chair person, agent A, puts up a slide expressing where to find tea and coffee. A thirsty person in the audience, agent B, interprets this information. However, the communication may be affected by an event in the material world, for example, somebody erroneously standing between the projector and the screen. A trace is shown in Table 1, the expressions used at the symbolic meta-level are explained in Table 2.In the example, agent A has a representation of the world information that pot 2 contains tea, represented at the symbolic object level by the symbolic expression contains(pot2, tea). By upward reflection to the symbolic meta-level it establishes that it has the positive belief that pot 2 contains tea. The agent A reasons at the symbolic meta-level and concludes that this world information should be communicated to agent B. Using knowledge of the meaning that can be associated to certain material configurations, it discovers that if at position p0 in the material world pattern 3 is visible then this world situation represents that pot 2 contains tea (e.g., a written text on a visible place). Moreover, still reasoning at the symbolic meta-level, it finds out that an action ‘put slide 3’exists, which has as an effect that pattern 3 is at position p0. Therefore it concludes at the symbolic meta-level that the action ‘put slide 3’ has to be performed. The action is performed, and the intended effect is realised in the world state at the material level. In the example, the two agents are assumed to have a common ontology on the world including the names of all objects in the world, like pot 2, pattern 3, and the names of the positions. Agent B performs the observation that pattern 3 is at position p0 (which provides information at the symbolic meta-level, namely the meta-fact that this has been observed), and represents the information acquired at the symbolic object level by at_position(pattern3, p0)(the agent B’s world model). Note that agent B cannot observe directly the world information that pot 2 contains tea or that slide 3 is on the projector, but it can observe that pattern 3 is at position p0. Knowing at the symbolic meta-level that to this world situation the interpretation ‘pot 2 contains tea’ can be associated, it now concludes at the symbolic meta-level that it has been communicated that pot 2 contains tea. This information is then stored by B at the symbolic object level in its representation of the world state. Note that after this process, the representation of the world state at the symbolic object level includes information that was acquired by observation (pattern 3 is at position p0), and also information that was not obtainable by observation, but acquired by the communication process (pot 2 contains tea).This example communication process can be described by tracing the states and state transitions at the different levels; see Table 1. In this table each cell describes a state, and state transitions are indicated by a line separating the two states in the transition. Time goes from top to bottom. In the table only the relevant new information elements are represented. The first part of the table gives the state of the external world (first column), and the states of the symbolic object level and meta-level of agent A (second and third column). The second part of the table gives the same for agent B. The first part of the table ‘happens’ before the second part of the table.T ABLE 1Multi-levelled trace of an example communication processE xternal World A gent Am aterial level s ymbolic object level S ymbolic meta-levelp ot 2 contains tea c ontains(pot2,tea)b elief(contains(pot2,tea),pos)h as_verbal_material_rep(contains(pot2,tea),pos,at_position(pattern3,p0), pos)h as_effect(put_slide3, at_position(pattern3,p0),pos)t o_be_observed(I:INFO_ELEMENT)t o_be_communicated(contains(pot2,tea),pos)t o_be_achieved(at_position(pattern3,p0),pos)t o_be_performed(put_slide3)s lide 3 at projectorp attern3 at p0E xternal World A gent Bm aterial level s ymbolic object level s ymbolic meta-levelp ot 2 contains tea s lide 3 at projector p attern3 at p0t o_be_observed(I:INFO_ELEMENT)h as_verbal_material_rep(contains(pot2,tea),pos,at_position(pattern3,p0), pos)o bservation_result(at_position(pattern3,p0), pos)a t_position(pattern3,p0)b elief(at_position(pattern3,p0), pos)h as_been_communicated(contains(pot2, tea), pos) c ontains(pot2, tea)b elief(contains(pot2,tea), pos)T ABLE 2Explanations for the expressions at the symbolic meta-level.Symbol Explanationbelief The beliefs of the agent. Refers to world information and a sign. The sign (pos or neg) indicates if the information is true of false.has_effect Denotes that an action is capable of bringing about some state in the world, given as the state that becomes true or false in the world.to_be_observed The information that the agent focuses on and observes in the world.to_be_communicated The information that is determined to need communication to the other agent. Includes sign. It has been kept simple in this model, but could be extended to include a recipientagent.to_be_achieved A goal to be achieved. The goal is stated as a state of the world that must be brought about. The sign indicates if the state should hold or not.to_be_performed Refers to the action(s) to be performed by the actuators of the agent.has_verbal_material_rep The first information element has the second information element as a verbal material representation. Thus the first is an interpretation of the second.observation_result The information received by the sensors of the agent. Includes sign of the information. has_been_communicated The information that has been received by communication. Includes sign of the information.2.3. TYPES OF INTERACTION BETWEEN VERBAL AND NON-VERBAL COMMUNICATIONThe example communication process in Section 2.1 shows only verbal communication. The verbal type of communication is the type that is normally exclusively considered in research in multi-agent systems in which all agents are software agents. However, in real life situations, often the non-verbal communication is as important as verbal communication. In this section, non-verbal communication is addressed and classified into three different types of interaction with verbal communication. In the classification one of the distinguishing criteria is the nature of the processing of the communication: based on reflex reactions, or on conscious reactions. For each of the types of interaction between verbal and non-verbal communication an example is presented.The following kinds of interaction between non-verbal and verbal communication are distinguished:A.Interaction of non-verbal communication with the content of verbal communication:1.non-verbal communication provides information additional to the content information transferred by theof the verbal communication:•the subject of the non-verbal communication has no connection with the subject of the verbal communication•the subject of the non-verbal communication is related to the subject of the verbal communication2.non-verbal communication affects the interpretation of the contents of the verbal communication;modified interpretationB.Interaction of non-verbal communication with the process of the verbal communication:1.the verbal communication process is affected by reflex-based reactions to the non-verbal communication2.the verbal communication process is affected by conscious reactions to the non-verbal communication Notice that non-verbal communication of type A. will lead to conscious reactions of the recipient; as the interpretation of observations as being communicated information is a conscious process. Combinations of the different types of interaction can occur during one communication process. In the examples it is assumed that the agents share a common ontology for world information. Simple examples of the different types of non-verbal communication are:A.Interaction of non-verbal communication with the content of verbal communication:1. Additional informationa) No connection. Agent A communicates verbally to B that tea can be found in pot 2. Agent B observes that agent A smiles to him and concludes that agent A recognises him. This observation does not influence the communication process concerned with where the tea can be found. Furthermore, agent B does not change his interpretation of the verbal communication on account of noticing that agent A recognises him.b) Related. Agent A communicates verbally to B that tea can be found in pot 2. During the communication Agent A points to position p3. Agent B observes the direction that agent A is pointing in and concludes that agent A is telling it that tea can be found in pot 2 that can be found at position p3.2. Modified interpretationAgent A communicates verbally to B that fresh tea can be found in pot 2. However, agent A makes a face that indicates she is disgusted at the moment the verbal communication process takes place. Agent B combines this non-verbal communication with the verbal one and, therefore, interprets the communication as follows: tea can be found in pot 2, but it is definitely not fresh. Modification of the interpretation of the verbal communication appeared to be necessary, based on the non-verbal part of the communication.B.Interaction of non-verbal communication with the process of verbal communication:Agent A initiates the communication process by walking to position p1. She notices that agent B is looking at her and she starts her communication to agent B that tea can be found in pot 2, by putting the correct slide (slide 3) on the projector. However, after performing this action agent A observes that agent B is looking in another direction; in reaction (either by reflex or consciously) she breaks off the communication process by removing the slide, and (to get attention) starts tapping the microphone. Agent B observes the noise of the microphone and (either by reflex or consciously) reacts by looking at agent A with interest. Agent A waits until she observes that agent B is looking interested, and then resumes the verbal communication process by putting the slide on the projector again. In such a case the information transferred by verbal communication is not affected by the non-verbal communication, but (the control of) the process of communication is.In (Vongkasem & Chaib-draa, 2000) this would correspond to the first level of joint action, the behavior level, where the sender gets the receiver to attend to the message. As well as level 2 of joint action, the signal level. In this level the sender verifies that the communication is well received by the receiver.An example communication process in which a combination of types of interaction occurs is the following:EXAMPLE 1. THE COMPLETE TEA STORY1.Agent A wants to communicate to agent B that non-fresh tea can be found in pot 2 that is located at positionp3.2.Agent A figures out how to perform the communication. She does not have a (verbal) slide that reflects allthat she wants to communicate; she only has a slide that says that fresh tea can be found in pot 2. The rest of the communication will, therefore, have to be non-verbal. She finds the following solution: she will put the slide on the projector, point at position p3 and pull a disgusted face at the same time.3.Agent A attracts the attention of her audience (agent B) by going to position p1.4.Agent B observes this movement and responds by looking interested.5.Agent A observes that agent B is looking interested and performs the prepared actions.6.However, in the mean time, agent B’s attention is distracted by a noise from outside. As a reaction to thenoise from outside agent B looks away from agent A and stops looking interested.7.Agent A notices that agent B no longer is looking in her direction. Therefore, she removes the slide, stopspointing, and reverts her face to a neutral expression. Furthermore, in order to attract agent B’s attention again, she taps the microphone.8.Agent B observes the noise inside the room and towards the front of the room (i.e., in the direction of agentA) and looks interested.9.Agent A waits until agent B looks interested again, and then communicates verbally to agent B that fresh teacan be found in pot 2 (she puts slide 3 on the projector). Agent A makes a face that indicates she is disgusted at the moment the verbal communication takes place. At the same time Agent A points to position p3.10.Agent B observes:a) the pattern on projection screen that is caused by the slideb) that agent A is pointing towards position p3c) that agent A has a disgusted face11.and Agent B concludes:a) tea can be found in pot 2: the interpretation of this part of the verbal communication of the pattern causedby the slide is not affected by any of the non-verbal communication of agent A.b) the tea can be found at position p3: this additional information comes from interpreting the pointinggesture of agent A.c) the tea is definitely not fresh: this interpretation is based on modification of the contents of the verbalcommunication (fresh tea) because of the non-verbal communication (disgusted face ofagent A) and the knowledge that tea has a taste.12.At the same time agent A looks questioningly towards agent B.13.Agent B observes the questioning face of agent A and puts his thumb up.14.Agent A observes that agent B’s thumb is up and walks away from position p1.3. The generic process model for communication3.1. THE PROCESS MODEL FOR COMMUNICATIONWithin a communication process as described in Section 2 a number of more specific symbolic processes can be distinguished:• observation generation• information interpretation• goal generation• action generation• maintenance of world informationTogether with the physical processes in the material world that realise action and observation execution, these processes are used as building blocks to compose an executable generic process model of communication. Within the DESIRE approach each of the processes is modelled by a component (the boxes in Figure 1). Each component processes information as soon as it becomes available. The information is processed by applying knowledge rules to the input information, deriving conclusions that are the output information of the component. Each component conceptually runs in parallel, but on a single processor the component activations are serialized. The interaction is modelled by information links (the arrows in Figure 1). By default information links transfer information from the source to the destination when it becomes available. Agent B is identical in composition to agent A.F IGURE 1. The two highest process abstraction levelsThe component observation_generation contains statements of facts, rules without preconditions. These state what the agent wishes to observe in the world, this is a subset of all possible information elements. The truth value of these elements is of interest to the agent, for example to_be_observed(at_position(agent_A, p1)) means that the agent is interested in knowing if agent A is at p1 or not. Conceptually this set of to_be_observed facts indicates the focus of attention of the agent, i.e. what it is looking at in the world. And although the agent maybe looking at something this does not mean it will receive the requested observation result. In the example, agent B is initiatingobservation of the projection screen en agent A and agent A observes agent B. And although agent B wants to observe the speakers position, at a later moment, when agent B is looking_away, it no longer receives observation results on the speakers position.The information interpretation component interprets facts. It examines the observation results and determines whether these new results should be added to the set of beliefs of the agent. Also it inspects beliefs on the world to check for additional meaning of these world configurations. First the beliefs that have additional meanings are characterized in as being communications by a particular modality, before the communications in the different modalities are combined to finally conclude the communicated information. This information is then added to the agent’s beliefs. Notice that this makes information interpretation a conscious reasoning process. In the example both agents trust their senses, and accordingly store all observed information in their belief set.The agent’s beliefs are the model of the world that the agent currently ascribes to, and it must be stored somewhere. The maintenance_of_world_information component takes care of this. The component takes care of storing the currently believed world model, possibly applying some knowledge rules to augment and extrapolate the world knowledge.The component goal_generation is a component operating at a high level of abstraction. The component takes as input goals on which information should be communicated, the current status of the communication process and the beliefs of the agent, using the available knowledge to generate intentions for changes to the world. In order to select world configurations that will communicate certain information it selects intentions to_be_achieved by first assigning modalities to the information elements, then selecting intentions to bring about representations of these information elements. When reasoning in a goal-directed manner, the necessary intentions are selected by this component. The information elements to be communicated to the other agent are fixed in the example; some other apparatus should generate the content of the communication.The agent needs to be capable of selecting actions to perform in the world. The action_generation component does this. Firstly, it takes the to_be_achieved world situations, the intentions that are transferred from goal_generation, and selects appropriate actions for them. Secondly, it takes the observation_results and applies the stimulus-response rules to them, generating the reflex actions. Thirdly, conscious reasoning takes place in the action_generation component. The to_be_performed facts are transferred to the output of the agent to be executed in the physical, or simulated, world by the external_world component.The component external world takes the observations and the actions initiated by the agents and produces the observation results for the agents. It maintains the state of the world and takes care of the changes to the world state. The physical manifestations of the agents are assumed to be in the external_world component. Thus a robot’s body would reside as an object in the external world, changing state by receiving actions, returning sensor information that is relayed as observation results. A software agent’s screen presence and program code is also part of the external world, the state of the software system being conveyed as observation results. Both these example put the agent body in the external world, and the agent ‘mind’ in the agent_A en agent_B components. For the example communication process the world stores the world situation and has knowledge on the effect of actions, applying it to simulate the effect of the actions. The relevant information elements in the world situation are known completely, i.e. in the simulation nothing is unknown. The observation_results facts are derived from this stored world situation, the requested observations and knowledge on the effect of actions on possible observations. The knowledge used by the external_world component in order to return simulated results is not further detailed in this paper.。