Enabling mobile agents to dynamically assume roles

合集下载

光电变色 英语

光电变色 英语

光电变色英语Photochromic technology is a fascinating and rapidly evolving field that has captured the attention of scientists, engineers, and consumers alike. This remarkable phenomenon, where materials change color in response to light exposure, has opened up a world of possibilities in various industries, from eyewear to construction. In this essay, we will delve into the science behind photochromic technology, its applications, and the exciting developments that are shaping the future of this innovative field.At the heart of photochromic technology is the ability of certain materials to undergo a reversible color change when exposed to specific wavelengths of light. This change is triggered by the rearrangement of molecules within the material, which alters the way they absorb and reflect light. The most common photochromic materials are organic compounds, such as spiropyrans and diarylethenes, which have the remarkable ability to switch between two different molecular structures in response to light.When these materials are exposed to ultraviolet (UV) or short-wavelength visible light, the molecules undergo a transformation that increases their conjugation and alters their electronic structure. This, in turn, changes the wavelengths of light they absorb, resulting in a visible color change. Conversely, when the material is exposed to longer-wavelength visible light or removed from the light source, the molecules revert to their original state, and the material returns to its original color.The versatility of photochromic technology has led to a wide range of applications across various industries. Perhaps the most well-known use of this technology is in the production of photochromic lenses for eyewear. These lenses are designed to darken when exposed to UV or bright light, providing wearers with adaptive sun protection and reducing eye strain. As the wearer moves from bright outdoor environments to dimly lit indoor spaces, the lenses automatically adjust their tint, offering a seamless and convenient solution for changing lighting conditions.Beyond eyewear, photochromic technology has found applications in the construction industry. Photochromic coatings and films can be applied to windows, walls, and even roofing materials, allowing them to respond to changes in light intensity. This can help regulate the amount of heat and glare entering a building, improving energy efficiency and creating more comfortable indoor environments. Additionally, photochromic materials can be incorporated into smartwindows, which can actively control the amount of light and heat transmission, enhancing the overall energy performance of a building.In the realm of consumer products, photochromic technology has made its mark on a variety of everyday items. From clothing and accessories to home decor and toys, the ability to change color in response to light has added a touch of dynamism and interactivity to these products. For example, photochromic t-shirts can reveal hidden designs or patterns when exposed to sunlight, while photochromic furniture can adapt to the mood and ambiance of a room.The potential of photochromic technology extends beyond these immediate applications. Researchers and scientists are continuously exploring new ways to harness the unique properties of these materials, leading to exciting developments in fields such as data storage, security, and even biomedical applications.In the realm of data storage, photochromic materials have shown promise as a means of high-density, rewritable optical data storage. The ability of these materials to switch between different molecular states can be leveraged to encode and store information, potentially revolutionizing the way we store and retrieve digital data.Furthermore, photochromic technology has found applications in the field of security and anti-counterfeiting. Photochromic inks and coatings can be used to create unique, tamper-evident seals or labels that change color when exposed to light, making it easier to detect forgeries or unauthorized modifications.In the biomedical field, photochromic materials have been explored for their potential in drug delivery and medical imaging. Photochromic compounds can be designed to release therapeutic agents or change their optical properties in response to specific wavelengths of light, enabling targeted and controlled drug delivery or improved imaging techniques.As the field of photochromic technology continues to evolve, researchers and engineers are pushing the boundaries of what is possible. New materials, advanced manufacturing techniques, and innovative applications are constantly emerging, promising even more exciting advancements in the years to come.One particularly promising area of research is the development of multifunctional photochromic materials. These materials can combine the color-changing properties with additional functionalities, such as sensing, energy harvesting, or self-healing capabilities. This convergence of technologies opens up a world of possibilities, from smart windows that can generate electricity to self-cleaning surfaces that adapt to their environment.Moreover, the integration of photochromic technology with other emerging fields, such as artificial intelligence and the Internet of Things, could lead to the creation of truly intelligent and adaptive systems. Imagine a future where buildings, clothing, or even personal devices can respond dynamically to changes in their surroundings, optimizing their performance and enhancing the user experience.In conclusion, photochromic technology is a remarkable and rapidly evolving field that has already made a significant impact on our lives. From eyewear to construction, and from consumer products to biomedical applications, the ability of materials to change color in response to light has unlocked a world of possibilities. As researchers continue to push the boundaries of this technology, we can expect to see even more innovative and transformative applications emerge, shaping the way we interact with the world around us. The future of photochromic technology is indeed a bright one, filled with the promise of new discoveries and the potential to revolutionize countless industries.。

recastdemo 编译

recastdemo 编译

recastdemo 编译Recastdemo, also known as Recast Navigation, is a powerful open-source library that provides functionalities for generating and navigating dynamic navigation meshes in real-time 3D environments. It is widely used in game development, virtual reality (VR), augmented reality (AR), and other interactive applications. In this recastdemo compilation, we will explore some key aspects and features of Recast Navigation without including any links.First and foremost, Recastdemo is written in C++ and supports multiple platforms such as Windows, Linux, macOS, iOS, and Android. It integrates seamlessly into various game engines, including Unity and Unreal Engine, making it accessible for developers across different platforms and environments. The library uses a voxel-based approach to build navigation meshes, which allows for efficient runtime modification and dynamic content updates.One of the core functionalities of Recast Navigation is the ability to automatically generate navigation meshes from triangle-based input geometry. It employs the Recast & Detour toolchain to process the input data and generate accurate and efficient navigation meshes that capture walkable surfaces. The process involves several steps, including voxelization, polygonization, contour generation, and mesh rasterization. Recastdemo provides a comprehensive set of parameters that can be tuned to customize the quality and performance of the generated navigation meshes. Another important feature of Recastdemo is pathfinding. Once thenavigation mesh is constructed, the library offers various methods to find the shortest path between two points in the mesh. It implements the popular A* algorithm, which efficiently explores the navigation mesh graph to find the optimal path. Recast Navigation includes many advanced features to handle complex scenarios, such as dynamic obstacles, terrain navigation, and crowd simulation. These features enable developers to create realistic and interactive environments that offer smooth and intelligent movement for characters or agents.Recastdemo also supports dynamic updates of the navigation mesh to handle changes in the environment or gameplay. It provides functions to add, remove, or modify polygons within the navigation mesh at runtime. This feature is particularly useful for scenarios where the world needs to be modified or where obstacles need to be dynamically placed or removed. It ensures that the navigation mesh remains up-to-date and accurate, facilitating seamless navigation for characters or agents.Furthermore, Recastdemo offers additional features to enhance the navigation experience. It includes functions for local steering behaviors such as obstacle avoidance and crowd simulation. These features enable agents to navigate in complex and dynamic environments, avoiding obstacles and interacting with other characters or agents realistically.In conclusion, Recastdemo is a powerful and versatile library for generating and navigating dynamic navigation meshes in real-time 3D environments. Its voxel-based approach, automatic generation of navigation meshes, and A* based pathfinding algorithm provideefficient and accurate navigation solutions. With its support for dynamic updates and additional features for steering behaviors, Recast Navigation empowers developers to create engaging and immersive experiences in games, virtual reality, and other interactive applications.。

The International Journal of Advanced Manufacturing Technology

The International Journal of Advanced Manufacturing Technology

Ping LouÆZu-de ZhouÆYou-Ping ChenÆWu AiStudy on multi-agent-based agile supply chain management Received:23December2002/Accepted:23December2002/Published online:5December2003ÓSpringer-Verlag London Limited2003Abstract In a worldwide network of suppliers,factories, warehouses,distribution centres and retailers,the supply chain plays a very important role in the acquisition, transformation,and delivery of raw materials and products.One of the most important characteristics of agile supply chain is the ability to reconfigure dynami-cally and quickly according to demand changes in the market.In this paper,concepts and characteristics of an agile supply chain are discussed and the agile supply chain is regarded as one of the pivotal technologies of agile manufacture based on dynamic alliance.Also,the importance of coordination in supply chain is emphas-ised and a general architecture of agile supply chain management is presented based on a multi-agent theory, in which the supply chain is managed by a set of intelli-gent agents for one or more activities.The supply chain management system functions are to coordinate its agents.Agent functionalities and responsibilities are de-fined respectively,and a contract net protocol joint with case-based reasoning for coordination and an algorithm for task allocation is presented.Keywords Agile supply chainÆMulti-agent systemÆCoordinationÆCBRÆContract net protocol1IntroductionAdvanced technology and management are constantly being adopted to improve an enterpriseÕs strength and competitive ability in order to achieve predominance among hot global competition.In a report on21st century manufacturing strategy development,the author suggests that various production resources,including people,funds,technology and facilities should be inte-grated and managed as a whole;thus optimising the utilisation of resources and taking full advantage of advanced manufacturing technology,information tech-nology,network technology and computer[1].Agile manufacture based on dynamic alliance is coming into being so that enterprises can remain competitive in a constantly changing business environment and is becoming a main competitive paradigm in the interna-tional market.Agility,which has basically two mean-ings:flexibility and reconfigurability,has become a very important characteristic of a modern manufacturing enterprise.Flexibility is an enterpriseÕs ability to make adjustments according to customersÕneeds.Reconfigu-rability is the ability to meet changing demands[2,3].The ability to quickly respond to marketÕs changes, called agility,has been recognised as a key element in the success and survival of enterprises in todayÕs market.In order to keep up with rapid change,enterprises need to change traditional management in this hot competition. Through dynamic alliance,enterprises exert predomi-nance themselves,cooperate faithfully with each other, and compete jointly so as to meet the needs of the fluctuating market,andfinally achieve the goal of win-win[2,3].So how to improve agility in the supply chain, namelyflexibility and reconfigurability,is one of the important factors to win against the competition.Supply chain management(SCM)is an approach to satisfy the demands of customers for products and ser-vices via integrated management in the whole business process from raw material procurement to the product or service delivery to customers.In[4],M.S.Fox et al. describe the goals and architecture of integrated supply chain management system(ISCM).In this system,each agent performs one or more supply chain management functions,and coordinates its decisions with other rele-vant agents.ISCM provides an approach to the real timeInt J Adv Manuf Technol(2004)23:197–203 DOI10.1007/s00170-003-1626-xP.Lou(&)ÆZ.ZhouRoom107,D8Engineering Research Center of Numerical Control System,School of Mechanical Science&Engineering, Huazhong University of Science&Technology, 430074Wuhan,Hubei,P.R.ChinaE-mail:louping_98@Y.-P.ChenÆW.AiSchool of Mechanical Science and Engineering, Huazhong University of Science and Technology, 430074Wuhan,Hubei,P.R.Chinaperformance of supply chain function.The integration of multi-agent technology and constraint network for solving the supply chain management problem is pro-posed[6].In[7],Yan et al.develop a multi-agent-based negotiation support system for distributed electric power transmission cost allocation based on the networkflow model and knowledge query&manipulation language (KQML).A KQML based multi-agent coordination language was proposed in[8,9]for distributed and dy-namic supply chain management.However,the coordi-nation mechanisms have not been formally addressed in a multi-agent-based supply chain.In most industries, marketing is becoming more globalised,and the whole business process is being implemented into a complex network of supply chains.Each enterprise or business unit in the SCM represents an independent entity with conflicting and competing product requirements and may possess localised information relevant to their interests.Being aware of this independence,enterprises are regarded as autonomous agents that can decide how to deploy resources under their control to serve their interests.This paperfirst introduces concepts and characteris-tics of agile supply chains and emphasises the impor-tance of coordination in supply chain.Then,it presents an architecture of agile supply chain based on a multi-agent theory and states the agentsÕfunctions and responsibilities.Finally,it presents a CBR contract net protocol for coordination and the correlative algorithm for task allocation in multi-agent-based agile supply chains.2Agile supply chainA supply chain is a network from the topologic structure which is composed of autonomous or semi-autonomous enterprises.The enterprises all work together for pro-curement,production,delivery,and so on[10].There is a main enterprise in the supply chain that is responsible for configuring the supply chain according to the de-mand information and for achieving supply chain value using fundflow,materialflow and informationflow as mediums.There are three discontinuous buffers to make the materialflowfluently and satisfy the change in the demand.On the one hand,as every enterprise manages inventory independently,plenty of funds are wasted.As the demand information moves up-stream,the forecast is inaccurate and the respond to the change in demand is slow[11].Accordingly,the key method for competi-tiveness is improving and optimising supply chain management to achieve integrated,automated,and agile supply chain management and to cut costs in the supply chain.To optimise supply chain management and coordi-nate the processes for materialflow,fundflow and informationflow,it is necessary to make materialflow fluent,quickly fund turnover and keep information integrated.Prompt reconfiguration and coordination is an important characteristic of agile supply chain according to dynamic alliance compositing and de-compositing(enterprise reconfiguration).Agile supply chain management can improve enterprise reconfiguring agility.The agile supply chain breaks through the tra-ditional line-style organizational structure.With net-work technology an enterprise group is formed by a cooperative relationship which includes an enterprise business centre,a production design centre,a supplier,a distribution centre,a bank,a decision-making centre, etc.It reduces the lead time to the market to satisfy customer demand.Agile supply chain without temporal and spatial limits promptly expands the enterprise scale,marketing share and resource by allied enterprise.So,a key factor of the agile supply chain is to integrate heterogeneous information systems adopted in various enterprises.The integration information system can provide marketing information and supplier details.Feasible inventory, quantity and cycle of replenished stock,delivery,etc.is designed using the shared information.It is evident that agile supply chain is a typical distributed system.A multi-agent system(MAS)which is characterised byflexibility and adaptability is suit-able for an open and dynamic environment.Thus MAS is a good method for agile supply chain man-agement.3The concept of agents and MASSome people define an agent as any piece of software or object which can perform a specific given task.Presently the prevailing opinion is that an agent must exhibit three important general characteristics:autonomy,adapta-tion,and cooperation[8,12,13].Autonomy means that agents have their own agenda of goals and exhibit goal-directed behaviour.Agents are not simply reactive,but can be pro-active and take initiatives as they deem appropriate.Adaptation implies that agents are capable of adapting to the environment,which includes other agents and human users,and can learn from the expe-rience in order to improve themselves in a changing environment.Cooperation and coordination between agents are probably the most important feature of MAS. Unlike those stand-alone agents,agents in a MAS col-laborate with each other to achieve common goals.In other words,these agents share information,knowledge, and tasks among themselves.The intelligence of MAS is not only reflected by the expertise of individual agents but also exhibited by the emerged collective behaviour beyond individual agents.Of course various agents have different functions,but some functions are needed for each agent.A generic structure of agents that includes two parts is presented:agent kernel and function mod-ule.Figure1exhibits the generic structure of agents which is a plug-in model.In Fig.1,the generic agent includes the following components:198The mailbox handles communication between one agent and the other agents.The message handler processes incoming message from the mailbox,orders them according to priority level,and dispatches them to the relevant components of the agent.The coordination engine makes decisions concerning the agent Õs goals,e.g.how they should be pursued,when to abandon them,etc.,and sends the accepted tasks to the planner/scheduler.It is also responsible for coordi-nating the agents Õinteractions with other agents using coordination protocols and strategies.The planner and scheduler plans the agent Õs tasks on the basis of decisions made by the coordination engine and on resources and task specifications available to the agent.If not,a message is sent to the coordination en-gine for finding extra resources.The blackboard provides a shared work area for exchanging information,data,and knowledge among function modules.Every function module is an inde-pendent entity.These function modules execute con-currently by the control of planner/scheduler and collaborate through the blackboard.The acquaintance database describes one agent Õs relationships with other agents in the society,and its beliefs about the capabilities of those agents.The coor-dination engine uses information contained in this database when making collaborative arrangements with other agents.The resource database reserves a list of resources (referred to in this paper as facts)that are owned by and available to the agent.The resource database also sup-ports a direct interface to external systems,which allows the interface to dynamically link and utilise a proprie-tary database.The ontology database stores the logical definition of each fact type—its legal attributes,the range of legal values for each attribute,any constraints betweenattribute values,and any relationship between the attributes of that fact and other facts.The task/plan database provides logical descriptions of planning operators (or tasks)known to the agent.4Multi-agent-based agile supply chain management Multi-agent-based agile supply chain management per-forms many functions in a tightly coordinated manner.Agents organise supply chain networks dynamically by coordination according to a changing environment,e.g.exchange rates go up and down unpredictably,customers change or cancel orders,materials do not arrive on time,production facilities fail,etc.[2,14].Each agent performs one or more supply chain functions independently,and each coordinates his action with other agents.Figure 2provides the architecture of multi-agent-based agile supply chains.There are two types of agents:functional agents and mediator agents.Functional agents plan and/or control activities in the supply chain.Mediator agents play a system coordinator role s by promoting coopera-tion among agents and providing message services.Mediator agents dispatch the tasks to the functional agents or other mediator agents,and then those func-tional or mediator agents complete the tasks by coordi-nation.All functional agents coordinate with each other to achieve the goals assigned by mediator agents.The mediator-mediator and mediator-agent communication is asynchronous,and the communication mode can be point-to-point (between two agents),broadcast (one to all agents),or multicast (to a selected group of agents).Messages are formatted in an extended KQML format.The architecture is characterised by organizational hier-archy and team spirit,simplifying the organisational architecture and reducing the time needed to fulfil the task.The rest of this section briefly describes each of the mediator agents underdevelopment.Fig.1Generic structures of agents199–Customer mediator agent:This agent is responsible for acquiring orders from customers,negotiating with customers about prices,due dates,technical advisory,etc.,and handling customer requests for modifying or cancelling respective orders,then sending the order information to a scheduling mediator agent.If a customer request needs to be re-designed,the infor-mation is sent to a design mediator agent,then to a scheduling mediator agent.–Scheduling mediator agent:This agent is responsible for scheduling and re-scheduling activities in the fac-tory,exploring hypothetical ‘‘what-if’’scenarios for potential new orders,and generating schedules that are sent to the production mediator agent and logis-tics mediator agent.The scheduling agent also acts as a coordinator when infeasible situations arise.It has the capability to explore tradeoffs among the various constraints and goals that exit in the plant.–Logistics mediator agent:This agent is responsible for coordinating multi-plans,multiple-supplier,and the multiple-distribution centre domain of the enterprise to achieve the best possible results in terms of supply chain goals,which include on-time delivery,cost minimisation,etc.It manages the movement of products or materials across the supply chain from the supplier of raw materials to the finished product customer.–Production mediator agent:This agent performs the order release and real-time floor control functions as directed by the scheduling mediator agent.It monitors production operation and facilities.If the production operation is abnormal or a machine breaks down,this agent re-arranges the task or re-schedules with the scheduling mediator agent.–Transportation mediator agent:This agent is responsible for the assignment and scheduling of transportation resources in order to satisfy inter-plant movement specified by the logistics mediator agent.It is able to take into account a variety oftransportation assets and transportation routes in the construction of its schedules.The goal is to send the right materials on time to the right location as assigned by the logistics mediator agent.–Inventory mediator agent:There are three invento-ries at the manufacturing site:raw product inven-tory,work-in-process inventory,and finished product inventory.This agent is responsible for managing these inventories to satisfy production requirements.–Supplier mediator agent:This agent is responsible for managing supplier information and choosing suppli-ers based on requests in the production process.–Design mediator agent:This agent is responsible for developing new goods and for sending the relevant information to the scheduling mediator agent for scheduling,as well as to the customer mediator agent for providing technological advice.5Coordination in a multi-agent-based agile supply chainCoordination has been defined as the process of man-aging dependencies between activities [15].One impor-tant characteristic of an agile supply chain is the ability to reconfigure quickly according to change in the envi-ronment.In order to operate efficiently,functional entities in the supply chain must work in a tightly coordinated manner.The supply chain works as a net-work of cooperating agents,in which each performs one or more supply chain functions,and each coordinates its action with that of other agents [5].Correspondingly,a SCMS transforms to a MAS.In this MAS,agents may join the system and leave it according to coordinating processes.With coordination among agents,this MAS achieves the goal of ‘‘the right products in the right quantities (at the right location)at the right moment at minimalcost’’.Fig.2An architecture of multi-agent based agile supply chain management2005.1Contract net protocol combined withcase-based reasoningThe contract net is a negotiation protocol(CNP)pro-posed by Smith[15].In the CNP,every agent is regarded as a node,such as a manager or a contractor.The manager agent(MA)is responsible for decomposing, announcing,and allocating the task and contractor agent(CA)is responsible for performing the task.This protocol has been widely used for multi-agent negotia-tion,but it is inefficient.For this reason,contract net protocol is combined with case-based reasoning(CBR).In case-based reasoning(CBR),the target case is defined as problem or instance which is currently being faced,and the base case is problem or instance in the database.CBR searches the base case in the database under the direction of the target case,and then the base case instructs the target case to solve the problem.This method is efficient.But at the very beginning,it is very difficult to set up a database which includes all problems solving cases.The cases may be depicted as follows:C¼\task;MA;taskÀconstraint;agentÀset> Here,MA is task manager.Task-constraint repre-sents various constraint conditions for performing the task,depicted as a vector{c1,c2,c3,...,c m}.Agent-set is a set of performing the task as defined below:Agent set¼\sub task i;agent id;cost;time;resource>f gtask¼[ni¼1sub task iIn the supply chain,the same process in which a certain product moves from the manufacturer to the customer is performed iteratively.So,case-based rea-soning is very efficient.Consequently,combining con-tract net protocol with CBR could avoid high communicating on load,thus promoting efficiency.The process can be depicted as follows(Fig.3).5.2The algorithm for task allocation baseon CBR contract net protocolThere are two types of agents in the supply chain, cooperative and self-interested agents.Cooperative agents attempt to maximise social welfare,which is the sum of the agents utilities.They are willing to take individual losses in service of the good of the society of agents.For example,function agents come from the same enterprise.In truth,the task allocation among cooperative agents is combinational optimisation prob-lem.Self-interested agents seek to maximise their own profit without caring about the others.In such a case,an agent is willing to do other agentsÕtasks only for com-pensation[16].Function agents,for example,come from different enterprises.In the following section the algorithm for task allo-cation among self-interested agents based on CBR contract net protocol will be addressed.Before describ-ing the algorithm,there are some definitions that must be clarified:Task—A task which is performed by one agent or several agents together:T=<task,reward,con-straints>,where task is the set of tasks(task={t1,t2,..., t m}),reward is the payoffto the agents that perform the task(reward={r1,r2,...,r m}),and constraints refer to the bounded condition for performing the task(con-straints={c1,c2,...,c n}).Agent coalition(AC)—A group of agents that per-form task T,described as a set AC={agent i,i=1,2,...,n}.Efficiency of agent—Efficiency of an agent i is de-scribed as follows:E i¼rewardÀcostðÞ=costð1Þwhere reward is the payoffto the agent performing task T,and cost refers to that spend on performing the task. If agent i is not awarded the task,then E i=0.Efficiency of agent coalition—E coalition¼rewardÀX micost iÀh!,X micost iþh!ð2Þwhere reward is the payoffof the agent coalition per-forming task T;cost i refers to that spend on performing task t i;and h is the expense on forming coalition,which is shared by the members of the coalition.If the coalition is not awarded task T,then E coalition<=0.6Algorithm:1.After MA accepts the task T=<task,reward,constraint>(task is decomposable),then it searches the database.2.If itfinds a corresponding case,it assigns the task orsubtask to the related agents according to the case, and the process is over3.If no case is found,then the task T is announced toall relevant agents(agent i,i=1,2,...n).4.The relevant agents make bids for the task accord-ing to their own states and capabilities.Thebid Fig.3CBR contract net process201from agent i can be described as follows:Bid i =<agentid i ,T i ,price i ,condition i >,where i ex-presses the bidding agent (i =1,2,...,h );agentid i is the exclusive agent identifier;T i is the task set of agent i Õs fulfilment;price i is the recompense of agent i fulfilling the task T i ;and condition i is the constraint conditions for agent i to fulfil the task T i .5.If [1 i h&T i then the task T can not be performed.Otherwise MA makes a complete combination of the agents,namely to form a number of agent coalitions (or agent sets,amounting to N =2h )1).6.First MA deletes those agent coalitions where no agents are able to satisfy the constraint condition.Next the rest of the coalitions are grouped by the number of agents in coalitions and put into set P (P ={P 1,P 2,...,P h })in order of the minimum re-compense increase of the coalitions,where P i is the set of agent coalitions,including i agents.7.MA puts the first coalition from each group P i(i =1,2,...,h )into set L ,and if L is null then it returns to (10),otherwise it calculates the minimum re-compense of each coalition as follows:Min Pm iprice i ÃT is :t :P h i ¼1T i TP m icondition i constraitThen it searches for the minimal agent coalition AC min from the set L .8.MA sends the AC min to the relevant agents,namely MA requests that these agent fulfil the task to-gether.The relevant agents calculate the E coalition and E i according to Eqs.1and 2.IfE coalition !max miE i ,then all agents in the AC minaccept the proposal to form a coalition to perform the task T together.MA assigns the task to the AC min ,and the process is over.Otherwise it deletes the AC min from P i and returns to (7).9.If the relevant agents accept the task or subtask,then MA assigns the task to them.The process is over.If some agents cannot accept the subtask and the stated time is not attained,then it returns to (3),otherwise it returns to (10).10.The process is terminated (namely the task cannotbe performed).After all processes have been completed,case-based maintenance is required to improve the CBR.Thus efficiency is continuously promoted.6.1An example–A simple instantiation of a supply chain simulation is presented here and the negotiating process among agents is shown.In this supply chain instantiation,thetransportation mediator agent (TMA)has a transporttask T ,in which it has to deliver the finished product to the customer within 15units of time and must pay 1500monetary units for it,that is T =<t ,1500,15>.Four transport companies can perform task T .Each company is an autonomous agent,that is four agents,agent A,agent B,agent C and agent D.So the TMA announces the task T to the four agents.Then the four agents make a bid for the task T as shown in Table 1.–So the four agents can form 24)1coalitions (see Fig.4),which are put into set P .Cooperation between agents in the coalition requires expense and the ex-pense for forming the coalition increases with the growth of in coalition size.This means that expanding the coalition may be non-beneficial.The expense of each agent in forming a coalition h is 100.First,the coalitions in which no agents can satisfy the constraint conditions are deleted from the set P .The rest of the coalitions are grouped by the number of agents in the coalition and ordered according to the recompense of each group that was increased due to the coalition,namely P 1={B},P 2={{A,B},{A,C},{B,C},{A,D},{B,D}},P 3={{A,B,C},{A,B,D},{B,C,D}},P 4={{A,B,C,D}}.Then the cost and efficiency of coalition {B},{A,C}and {A,B,C}are calculated as follows:Price f A ;B g ¼Min ð800x 1þ1200x 2Þs :t :20x 1þ12x 2 15x 1þx 2!1x 1!0:x 2!0Price f A ;B ;C g ¼Min ð800y 1þ1200y 2þ2000y 3Þs :t :20y 1þ12y 2þ5y 3 15y 1þy 2þy 3!1y 1!0:y 2!0;y 3!Fig.4Agent coalition graphTable 1The bids of four agents Agent Id Price Conditions Agent A 80020Agent B 120012Agent C 20005AgentD25003202the following result can be obtained:Price{B}=1200; x1=0.3750,x2=0.6250,Price{A,B}=1050;and y1= 0.3750,y2=0.6250,y3=0.The above result shows that agent B does not attend the coalition{A,B,C},that is both agent B and coalition{A,B}can fulfill the task and satisfy the constraint conditions.According to Eqs.1 and2,E A,E B,E{A,B}:E A=0(because TMA does not assign the task to A.),E B=(1500)1200)/1200=0.25, E{A,B}=(1500)1050)2*100)/(1050+2*100)=0.2can be obtained.Because of E{A,B}<max{E A,E B},agent B does not agree to form a coalition.Therefore,the TMA se-lects agent B to fulfil the task.7ConclusionsIn this paper,the concept and characteristics of agile supply chain management are introduced.Dynamic and quick reconfiguration is one of important characteristics of an agile supply chain and agile supply chain man-agement is one of the key technologies of agile manu-facturing based on dynamic alliances.As agile supply chain is a typical distributed system,and MAS is effi-cient for this task.In the architecture of agile supply chain management, the supply chain is managed by a set of intelligent agents that are responsible for one or more activities.In order to realise the agility of supply chains,coordination amongst agents is very important.Therefore,it can be suggested that contract net protocol should be combined with case-based reasoning to coordinate among agents. Acknowledgement The authors would like to acknowledge the funding support from the National Science Fund Committee (NSFC)of China(Grant No.5991076861).References1.Goldman S,Nagel R,Preiss K(1995)Agile competitors andvirtual organization.Van Nostrsand Reinhold,New York, pp23–32,pp158–1662.Yusuf YY,Sarhadi M,Gunasekaran A(1999)Agile manu-facturing:the drivers,concepts and attributes.Int J Prod Eng 62:33–433.Gunasekaran A(1999)Agile manufacturing:A framework forresearch and development.Int J Prod Eng62:87–1054.Fox MS,Chionglo JF,Barbuceanu M(1992)Integrated chainmanagement system.Technical report,Enterprise Integration Laboratory,University of Toronto5.Shen W,Ulieru M,Norrie DH,Kremer R(1999)Implementingthe internet enabled supply chain through a collaborative agent system.In:Proceedings of agentsÔ99workshop on agent-based decision support for managing the internet-enabled supply-chain,Seattle,pp55–626.Sandholm TW,Lesser VR(1995)On automated contracting inmulti-enterprise manufacturing.Advanced Systems and Tools, Edinburgh,Scotland,pp33–427.Beck JC,Fox MS(1994)Supply chain coordination via medi-ated constraint relaxation.In:Proceedings of thefirst Canadian workshop on distributed artificial intelligence,Banff,Alberta, 15May19948.Chen Y,Peng Y,Finin T,Labrou Y,Cost R,Chu B,Sun R,Willhelm R(1999)A negotiation-based multi-agent system for supply chain management.In:Working notes of the ACM autonomous agents workshop on agent-based decision-support for managing the internet-enabled supply-chain,4:1–79.Wooldridge M,Jennings NR(1995)Intelligent agents:theoryand practice.Knowl Eng Rev10(2):115–15210.Barbuceanu M,Fox MS(1997)The design of a coordinationlanguage for multi-agent systems.In:Muller JP,Wooldridge MJ,Jennings NR(eds)Intelligent agent III:agents theories, architecture and languanges(Lecture notes in artificial intelligence),Springer,Berlin Heidelberg New York,pp341–35711.Hal L,Padmanabhan V,Whang S(1997)The Bullwhip effect insupply chains.Sloan Manag Rev38(4):93–10212.Yung S,Yang C(1999)A new approach to solve supply chainmanagement problem by integrating multi-agent technology and constraint network.HICASS-3213.Yan Y,Yen J,Bui T(2000)A multi-agent based negotiationsupport system for distributed transmission cost allocation.HICASS-3314.Nwana H(1996)Software agents:an overview.Knowl Eng Rev11(3):1–4015.Smith RG(1980)Contract net protocol:high-level communi-cation and control in a distributed problem solver.IEEE Trans Comput29(12):1104–111316.Barbuceanu M,Fox MS(1996)Coordinating multiple agentsin the supply chain.In:Proceedings of thefifth workshop on enabling technology for collaborative enterprises(WET ICEÕ96).IEEE Computer Society Press,pp134–14117.Jennings NR,Faratin P,Norman TJ,OÕBrien P,Odgers B(2000)Autonomous agents for business process management.Int J Appl Artif Intell14(2):145–1818.Malone TW,Crowston K(1991)Toward an interdisciplinarytheory of coordination.Center for coordination science tech-nical report120,MIT Sloan School203。

肠杆菌科细菌分布及耐药

肠杆菌科细菌分布及耐药

肠杆菌科细菌是引起临床感染常见的革兰阴性杆菌,也是造成医院内感染的主要致病菌。

近年来,随着第3代头孢菌素的广泛应用,各种肠杆菌科病原菌的种类与耐药情况已发生变化,造成的感染临床治疗困难。

现对本院2006—2011年临床分离的肠杆菌科细菌的分布及耐药情况进行动态观察和分析,为临床抗菌药物的及时、合理使用提供依据,制定经验治疗方案。

1材料与方法1.1材料1.1.1菌株来源2006年12月至2011年12月本院临床科室送检的各种标本中分离到的肠杆菌科细菌,去除同一患者中同一部位所获重复菌株。

质控菌株为大肠埃希菌(ATCC25922)和肺炎克雷伯菌(ATCC700603)符合《临床检验操作规程》3版[1]。

1.1.2抗菌药物及试剂药敏纸片及琼脂均为杭州天和微生物试剂公司产品。

1.2方法1.2.1标本采集与培养按临床微生物培养操作规范进行标本的采集与培养[2]。

1.2.2细菌鉴定及药敏试验细菌鉴定采用肠杆菌科编码系统,药敏试验采用K-B法,按美国临床和实验室标准化协会(CLSI)规定判断药物敏感性。

1.2.3产超广谱-内酰胺酶(ESBLS)测定:参照NCCLS推荐的纸片扩散表型确定法[3]。

1.3数据处理将结果输入WHONET5.3软件进行分析,同一患者的相同菌株只作1次分析。

2结果2.1肠杆菌科细菌检出情况本院5年间从临床标本中分离661株肠杆菌科细菌,其中产超广谱β-内酰胺酶(ESBLs)阳性株280株,占42.4%。

2007—2011年产ESBLs菌株分布情况见表1。

2.2菌种分布与变迁肠杆菌科细菌的检出率,从2007年的98株到2011年161株,而且主要是大肠埃希菌和肺炎克雷伯菌,见表2。

肠杆菌科细菌分布及耐药分析赵海1,沙迎菁2(1.青铜峡市人民医院检验科,宁夏青铜峡751600;2.青铜峡市妇幼保健所检验科,宁夏青铜峡751600)【摘要】目的动态观察并分析该院临床标本分离的肠杆菌科细菌的分布及耐药情况。

Received Revised

Received Revised
STRATEGIES FOR SELECTING COMMUNICATION STRUCTURES IN COOPERATIVE SEARCH
SHUJI NARAZAKI, HIROOMI YAMAMURA, and NORIHIKO YOSHIDA
Department of Computer Science, Kyushu University Fukuoka, 812-81, Japan
2. Communication strategies using partial models of execution
2.1. a model of communication
On distributed systems in which communication cost can not be ignored, agents should select a communication structure. But there is uncertainty about the state of other agents. This is caused by both a limited view of agents and the inherent properties of problems. This makes selecting a proper structure dicult. Thus to avoid useless communication, it is required that agents estimate the current global state of other agents or their environments. Agents in distributed systems can not get the current status of the environment; they can only make an incomplete, partial model of execution. However, making the complete execution model by exchanging local models is not required necessarily, since the exchanging cost becomes very high.1 Thus the utility of communication that determines how agents exchange

轮机词典

轮机词典

轮机词典A 单词及词组音标注释备注Abrasive 有磨蚀的Absolute 绝对的Obsolete作废的,陈旧的Additive 添加剂Adjacent 邻近的Accommodation 住舱Actuate 开动,促使Actuator 驱动器,执行器Aeration 充气,曝气Aerobic 需(好)氧的 Anaerobic厌(不需)氧的Aftermost 最后面的,最靠近船尾的Agitation 搅动Aid 帮助,助手Aid in (doing):有助于Airborne 空运的,飞行的Anchorage 锚地,抛锚;安装,固定Ancillary 辅助的Angular 有角的Annal 一年一次的Anneal 退火T emper回火;harden淬火Alkalinity 碱度,碱性Acidic酸的Alleyway 走廊,胡同Alloy 合金Alongside 停靠alternator 交流发电机Amend 修正,修改Amplifier 放大器Annex 附件,附则Annular 环形的Aperture 孔,洞Apparent 外观上的,显然的Applicable 应用的,使用的Apron 围裙Armature 电枢Articulate 连接Asphaltene 沥青Aspirate 吸入,吸出Assembly* 组件,组装Assembly* 大会,集会Assess 评价,评定Associated 相关的,关联的Concerning:有关的,关于…的,relevant:有关的Assumption 假定,设想,前提Astern 在船尾Atomize 将。

喷成雾状Atomized 雾化的Attachment 连接,固定Attemperator 保温装置,保温器Audit 审计,查账Auxiliary 辅助的Luxurious奢侈的Axial 轴向R adial径向Axis 轴,轴线---------------------- --------------------- ---------------------- -------------------A sealing agent 密封剂Abandon ship drills 弃船演习六长一短Absorbent material 吸附材料Air lock 气塞Ambient temperature 周围温度Animal oil 动物油Vegetable oil植物油Artificial respiration 人工呼吸Associated equipment 相关设备At present 目前Automatic sprinkler 自动喷淋Average voltage 平均值电压Peak voltage峰值电压Axial clearance 天地间隙B ============ ============= ============== ==========Babbitt 巴氏合金Ballard 系缆桩Bareboat 空船的Barrel 桶,套桶Barrier 界限,障碍Battery 蓄电池Bedplate 机座Bellows 波纹管,振动膜盒Beneath 在。

高速铁路移动闭塞和多智能体协调控制文献综述

高速铁路移动闭塞和多智能体协调控制文献综述

(1)荀径, 宁滨, 郜春海. 列车追踪运行仿真系统的研究与实现[J]. 北京交通大学学报, 2007, 31(2):34-37.针对CBTC系统的列车运行间隔问题。

分别讨论了固定闭塞、准移动闭塞和移动闭塞三种情况并进行了仿真,得出准移动闭塞下列车追踪间隔时间最短。

(2)康珉. 移动闭塞条件下高速列车追踪运行控制算法研究[D]. 中南大学, 2013.移动闭塞追踪控制算法及存在的问题。

稳定的追踪算法不仅需要保证列车与前方列车不发生碰撞,同时又需要尽量缩短列车之间的距离以求提高线路的利用率。

同时列车在运行的不同区段会受到RBC的控制,如线路的限速条件,岔道口信息,进出站信息等,这使得列车追踪成为了一个带严格约束的控制问题,因此优良的算法需要在满足约束条件的前提下使得列车之间的距离尽可能小。

提出移动闭塞下列车协同控制的思想。

考虑前车和后车目标距离,若前车制动而传给后车出现延迟,则后车可能紧急制动会发生危险。

目前解决这个问题,准移动,不管任何时候,都预留出一个最大的制动区间,就算前车突然制动,也可以停在安全点。

效率低。

如果可以了解整条线路上的列车运行情况,前车和后车。

通过实时通讯来不断地更新运行曲线。

协同控制思想:协同控制是一种能够通过各智能体之间的通讯、合作、互解、协调、调度、管理及控制来表达系统的结构、功能及行为特性的控制策略。

列车之间也需要协同各自的信息和特征,保证各自的速度同时使个体之间保持一定的运行问隔,而协同控制能利用全局的速度信息和位置信息来协调个体与个体之间状态关系,构建了一个多列车网络拓扑图。

(3)07年会议——Peng L , Yingmin J , Junping D , et al. Distributed Consensus Control for Second-Order Agents with Fixed Topology and Time-Delay[C]// 中国控制会议. 2007.(4)崔艳, 贾英民. 具有时滞的二阶多智能体系统的一致性分析[J]. 计算机仿真, 2011, 28(7).非零时滞的二阶多智能体系统,通过频域分析法得到系统达到一致的充分必要条件。

getresources

getresources

getResourcesIntroductionThe getResources function is an important method in programming that is usedto retrieve or access resources in a software application. This document aims to provide a detailed explanation of the getResources function, its purpose, and itsusage.What is getResources?getResources is a function commonly found in modern programming languages and frameworks. It allows developers to access resources such as images, strings, layout files, color definitions, and more. These resources are an integral part of an application and are used for various purposes, including user interface design, localization, and theming.How does getResources work?The getResources function works by providing a way to reference specificresources within an application. It typically takes a resource identifier or a key as an input parameter and returns the corresponding resource object.The resource identifier can take different forms depending on the programming language or framework being used. For example, in Android development using Java or Kotlin, resource identifiers are integers generated by the Android resource compiler. In web development using HTML and CSS, resource identifiers can be referenced by the id or class attributes.The getResources function uses these identifiers to locate and retrieve theappropriate resource object from a predefined resource directory or file. The function abstracts the details of accessing and retrieving resources, providing a convenient and standardized way for developers to obtain the resources they need.Common use casesThe getResources function plays a vital role in various scenarios withinsoftware development. Some of the most common use cases include:1. User interface designIn user interface design, resources such as images, strings, and layout files are often required to create visually appealing and interactive interfaces. The getResources function allows developers to access these resources easily.For example, when building a mobile app, the getResources function can be used to retrieve the app’s logo image and display it on the screen. Similarly, it can retrieve localized strings for different languages to display appropriate text based on the user’s locale.2. LocalizationLocalization is the process of adapting an application to different languages and regions. The getResources function is used extensively in this process to retrieve language-specific resources.For instance, in a multilingual app, the getResources function can be used to fetch translated strings, labels, or error messages based on the user’s language preference. This provides a seamless experience for users, regardless of their language.3. ThemingTheming involves customizing the appearance and style of an application. The getResources function is instrumental in retrieving resources related to color definitions, icons, and other theme-specific elements.For example, in a web application, the getResources function can be utilized to retrieve the color palette defined in a CSS file, enabling the application to dynamically update its visual style based on the selected theme.Best practicesTo make the most out of the getResources function, it is essential to follow some best practices:1. Resource managementEnsure that resources are managed efficiently, avoiding unnecessary duplication or excessive use of resources. Leverage caching mechanisms or resource pooling, if available, to optimize resource retrieval.2. Error handlingHandle potential errors or exceptions that may occur during resource retrieval. Gracefully handle cases where a requested resource is not found or unavailable, and provide fallback options or appropriate error messages.3. Resource naming conventionsAdopt consistent naming conventions for resources to maintain clarity and organization. Use meaningful names and avoid generic terms to facilitate easier identification and retrieval.4. Resource versioningIf resources are subject to frequent updates or changes, consider implementing versioning mechanisms to ensure compatibility and consistency across multiple versions of an application.ConclusionThe getResources function is a powerful tool that simplifies the process of retrieving resources within a software application. It facilitates user interface design, localization, and theming, making it an essential function in modern software development. By understanding how to effectively use getResources and following best practices, developers can efficiently access and utilize resources for an enhanced user experience.。

sensme

sensme

sensmeSensMe: An Innovative Sensory TechnologyIntroductionIn today's modern world, technology has rapidly advanced and transformed various aspects of our lives. From smartphones to smart homes, there seems to be no limit to the possibilities that technology offers. One groundbreaking technology that has gained significant attention and has the potential to revolutionize the way we experience the world is SensMe. Developed by a team of dedicated researchers and engineers, SensMe integrates sensory technology into various devices, allowing users to interact with their surroundings in ways they never thought possible. In this document, we delve deeper into the concept of SensMe, exploring its features, applications, and potential impacts on various industries.What is SensMe?SensMe is a cutting-edge technology that enhances our sensory perception, enabling us to perceive and respond to our environment in new and exciting ways. It utilizes acombination of sensors and algorithms to collect and interpret data from our surroundings, transforming it into a comprehensive sensory experience. These sensors can detect a wide range of stimuli such as temperature, humidity, light, sound, and even more sophisticated inputs like facial expressions and gestures.How Does SensMe Work?At the core of SensMe lies a highly sophisticated algorithm that processes the data collected from the sensors. This algorithm analyzes and interprets the sensory inputs, generating meaningful content and responses tailored to the user's preferences. For example, SensMe can detect the user's mood through facial expressions and suggest appropriate music playlists to enhance their emotional state. Similarly, it can adjust lighting and temperature settings in a room based on the detected occupancy and environmental conditions, providing a comfortable and personalized experience.Applications of SensMeSensMe has wide-ranging applications across various industries. In the healthcare sector, SensMe can assist medical professionals in monitoring patients' vital signs in real-time,ensuring timely intervention in case of emergencies. In the automotive industry, SensMe can enhance the driving experience by dynamically adjusting the vehicle's settings based on the driver's preferences and environmental conditions. Additionally, SensMe can revolutionize the gaming industry by enabling more immersive and interactive gameplay, where the user's movements and gestures directly influence the virtual world.Impacts on IndustriesWith the integration of SensMe technology, industries are poised for significant transformations. In the retail sector, SensMe can revolutionize the shopping experience by personalizing recommendations based on the user's preferences and physiological state. For instance, when a shopper is browsing through a clothing store, SensMe can detect their body temperature and suggest suitable clothing options for the weather conditions. This level of personalization not only enhances customer satisfaction and loyalty but also opens up new revenue streams for businesses.In the entertainment industry, SensMe can amplify the user's experience by creating multisensory experiences. For example, while watching a movie, SensMe can synchronize the lighting, sound, and vibration patterns in a room to match the scenes,immersing the viewer in the movie's atmosphere. This level of immersion enhances the emotional impact of the content, making the entertainment experience more memorable and engaging.ConclusionSensMe is a monumental breakthrough in sensory technology that has the potential to reshape the way we experience the world. By harnessing the power of sensors and algorithms, SensMe offers a vast range of applications across industries, from healthcare to entertainment. As this technology continues to evolve, it will undoubtedly unlock new possibilities, allowing us to further enrich our daily lives and interactions with the world around us. SensMe opens the door to a future where our senses seamlessly merge with technology, creating a more personalized, interactive, and immersive reality.。

移动自组网中匿名通信方案

移动自组网中匿名通信方案

移动自组网中匿名通信方案柳杰;王晓明【摘要】Conventional ad hoc communication protocols often execute too much public key computations, consuming a longer time for route construction. Conventional public/private key signature scheme exposes node identification information, which breaches the anonymity requirement. To tackle the above problem the thesis proposes an authentieable anonymous communication protocol suitable for small ad hoc networks. The protocol depends on mobile agents to identify source and destination nodes and conceal node information, so that the network delay is reduced; it also depends on member functions to dynamically construct router control information to avoid router discontinuity due to the dropping of any single node. Both theoretical analysis and simulation results show that, the novel protocol is superior over conventional protocols on either router construction delay or information transmission rate. In addition, the anonymous links established by the protocol are bi-directional, so that its overhead is reduced to a certain extent.%由于传统Ad hoc通信协议通常采用过多的公钥运算,导致路由建立时间延长.传统的基于公/私钥的签名方案暴露了节点的身份信息,不能满足匿名性的需求.针对以上问题提出了一种适用于小型Ad Hoc网络的可认证的匿名通信协议.通过移动代理对源节点和目标节点进行判别并对节点信息进行隐藏,降低了网络延迟.通过成员函数动态建立的路由控制信息,解决了单个节点的离线造成路径中断的问题.理论分析和仿真结果表明,该协议较传统协议在路由建立时间和信息投递率方面有较大的提高.另外该协议建立的匿名链接县有双向性,在一定程度上降低了协议损耗.【期刊名称】《计算机应用与软件》【年(卷),期】2011(028)004【总页数】4页(P40-43)【关键词】移动自组网;移动代理;匿名通信;成员函数【作者】柳杰;王晓明【作者单位】暨南大学信息科学与技术学院,广东,广州,510632;暨南大学信息科学与技术学院,广东,广州,510632【正文语种】中文0 引言和有线网络相比,无论主动攻击还是被动攻击,无线自组网都显得更加脆弱。

基于lvc的军事仿真体系结构研究与应用

基于lvc的军事仿真体系结构研究与应用

基于LVC的军事仿真体系结构研究与应用沈宇婷2015年6月中图分类号:TQ028.1UDC分类号:540人工智能社会的可视化方法研究作者姓名杨林学院名称软件学院指导教师丁刚毅答辩委员会主席郑澎申请学位工程硕士学科专业软件工程学位授予单位北京理工大学论文答辩日期2014年6月Visual Analysis of Artificial Intelegent SocietyCandidate Name:YangLinSchool or Department:School of SoftwareFaculty Mentor:DingGangyiChair, Thesis Committee:ZhengPengDegree Applied: Master of Engineering Major:Software Engineering Degree by:Beijing Institute of Technology The Date of Defence:June,2014人工智能社会的可视化方法研究北京理工大学研究成果声明本人郑重声明:所提交的学位论文是我本人在指导教师的指导下进行的研究工作获得的研究成果。

尽我所知,文中除特别标注和致谢的地方外,学位论文中不包含其他人已经发表或撰写过的研究成果,也不包含为获得北京理工大学或其它教育机构的学位或证书所使用过的材料。

与我一同工作的合作者对此研究工作所做的任何贡献均已在学位论文中作了明确的说明并表示了谢意。

特此申明。

签名:日期:关于学位论文使用权的说明本人完全了解北京理工大学有关保管、使用学位论文的规定,其中包括:①学校有权保管、并向有关部门送交学位论文的原件与复印件;②学校可以采用影印、缩印或其它复制手段复制并保存学位论文;③学校可允许学位论文被查阅或借阅;④学校可以学术交流为目的,复制赠送和交换学位论文;⑤学校可以公布学位论文的全部或部分内容(保密学位论文在解密后遵守此规定)。

新时代青年英文作文

新时代青年英文作文

新时代青年英文作文Title: The New Era Youth: Shaping the Future.In the fast-paced and dynamically evolving world welive in, the role of the youth has never been more significant. They are the agents of change, the builders of tomorrow, and the custodians of hope. As we enter a new era, marked by technological advancements, global interconnectedness, and environmental challenges, the youth of today carry the mantle of shaping the future.The New Era Youth is a generation that is bothprivileged and responsible. Privileged with access to unprecedented resources and opportunities, they have the ability to learn, explore, and innovate at an unprecedented scale. At the same time, they bear the responsibility of using these privileges to create a better world for themselves and for generations to come.One of the defining characteristics of the New EraYouth is their embrace of diversity and inclusivity. They recognize that the world is becoming increasingly interconnected, and that diversity is not just a nice-to-have, but a necessary ingredient for sustainable progress. They are open to new ideas, cultures, and perspectives, and are eager to collaborate and learn from others.Another noteworthy trait of the New Era Youth is their commitment to sustainability and environmental conservation. They are deeply concerned about the impact of humanactivity on the planet, and are actively seeking solutionsto mitigate the negative effects of climate change. Whether it's through recycling, reducing carbon emissions, or promoting renewable energy, they are at the forefront of efforts to build a more sustainable future.Technology is another key aspect of the New Era Youth's life. They are digital natives, comfortable with technology and its various applications. They use it to learn, connect, and create, and they are constantly pushing the boundariesof what is possible. However, they also recognize the potential downsides of technology, such as privacy concernsand digital addiction, and are working to address these issues.The New Era Youth is also highly entrepreneurial, with a strong sense of agency and a desire to make a difference. They are not content with simply consuming what the world offers them; they want to create, innovate, and contribute to society. Whether it's through starting their own businesses, working in non-profit organizations, or engaging in community service, they are actively shaping the world around them.However, the journey of the New Era Youth is not without challenges. They face pressure to succeed, to fit in, and to meet the expectations of society. They must navigate complex social and political landscapes, and deal with the sometimes-overwhelming pace of change. But it is these challenges that help them grow, learn, and become more resilient.In conclusion, the New Era Youth is a generation of hope, change, and potential. They are the ones who willshape the future, and it is up to them to decide what that future will be. With their diversity, inclusivity, commitment to sustainability, technological prowess, and entrepreneurial spirit, they have the tools and the resources to build a better world. Let us hope that they will seize this opportunity and rise to the challenge, creating a future that is bright and full of promise for all.。

英文论文投稿信Cover-letter模板

英文论文投稿信Cover-letter模板

Dear Editor,We would like to submit the enclosed manuscript entitled "GDNF Acutely Modulates Neuronal Excitability and A-type Potassium Channels in Midbrain Dopaminergic Neurons", which we wish to be considered for publication in Nature Neuroscience.GDNF has long been thought to be a potent neurotrophic factor for the survival of midbrain dopaminergic neurons, which are degenerated inParkinson’s disease.In this paper, we report an unexpected, acute effect of GDNF on A-type potassium channels, leading to a potentiation of neuronal excitability, in the dopaminergic neurons in culture as well as in adult brain slices.Further, we show that GDNF regulates the K+ channels through a mechanism that involves activation of MAP kinase.Thus, this study has revealed, for the first time, an acute modulation of ion channels by GDNF.Our findings challenge the classic view of GDNF as a long-term survival factor for midbraindopaminergic neurons, and suggest that the normal function of GDNF is to regulate neuronal excitability, and consequently dopamine release.These results may also have implications in the treatment ofParkinson’s disease.Due to a direct competition and conflict of interest, we request that Drs.XXX of Harvard Univ., and YY of Yale Univ.not be considered asreviewers.With thanks for yourconsideration, I amSincerely yours,case2Dear Editor,We would like to submit the enclosed manuscript entitled "Ca2+-binding protein frequenin mediates GDNF-induced potentiation of Ca2+ channels and transmitter release", which we wish to be considered for publication in Neuron.We believe that two aspects of this manuscript will make it interesting togeneral readers of Neuron.First, we report that GDNF has a long-term regulatory effect on neurotransmitter release at the neuromuscularsynapses.This provides the first physiological evidence for a role ofthis new family of neurotrophicfactors in functional synaptic transmission.Second, we show thatthe GDNF effect is mediated byenhancing the expression of theCa2+-binding proteinfrequenin.Further, GDNF andfrequenin facilitate synaptic transmission by enhancing Ca2+channel activity, leading to an enhancement of Ca2+ influx.Thus, this study has identified, for the first time, a molecular target that mediates the long-term, synaptic action of a neurotrophic factor.Ourfindings may also have general implications in the cell biology of neurotransmitter release. [0630][投稿写作]某杂志给出的标准Sample Cover Letter[the exampleused is the IJEB]Case 3Sample Cover Letter[the exampleused is the IJEB]Dear Editor of the [please type in journal title or acronym]:Enclosed is a paper, entitled "Mobile Agents for Network Management." Please accept it as a candidate for publication in the [journal title].Below are our responses to your submission requirements.1.Title and the central theme of thearticle.Paper title: "Mobile Agents for Network Management." This studyreviews the concepts of mobileagents and distributed network management system.It proposes a mobile agent-based implementation framework and creates a prototype system to demonstrate the superior performance of a mobile agent-based network over the conventional client-server architecture in a large network environment.2.Which subject/theme of the Journalthe material fitsNew enabling technologies (if nomatching subject/theme, enter'Subject highly related to [subject of journal] but not listed by [please type in journal title or acronym])3.Why the material is important in its field and why the material should be published in [please type in journaltitle or acronym]?The necessity of having an effective computer network is rapidly growing alongside the implementation of information technology.Finding an appropriate network managementsystemhas become increasingly importanttoday's distributedenvironment.However, the conventional centralized architecture, which routinely requests the status information of local units by the central server, is not sufficient tomanage the growing requests.Recently, a new frameworkthat uses mobileagent technology to assist thedistributed management has emerged.The mobile agent reduces network traffic, distributes management tasks, and improvesoperational performance.Given today's bandwidth demand over the Internet, it is important for the[journal title/acronym] readersto understand this technology and its benefits.This study gives a real-life example of how to use mobile agentsfor distributed network management.It is the first in the literature that reports the analysis of network performance based on anoperational prototype of mobile agent-based distributed network.We strongly believe the contribution of this study warrants its publication in the [journaltitle/acronym].s, addresses, and email addresses of four expert referees.Prof.Dr.William GatesChair Professor of InformationTechnology321 Johnson Hall Premier University Lancaster, NY00012-6666, USAphone: +1-888-888-8888 - fax: +1-888-888-8886 e-mail:******************** Expertise: published a related paper ("TCP/IP and OSI: Four Strategies for Interconnection") in CACM, 38(3),pp.188-198. Relationship: I met Dr.Gate only once at a conference in 1999.I didn't knowhim personally.Assoc Prof.Dr.John AdamsDirector of Network Research Center College of Business AustralianUniversity123, Harbor Drive Sydney,Australia 56789phone: +61-8-8888-8888 - fax:+61-8-8888-8886e-mail:*************.au Expertise: published a related paper ("Creating Mobile Agents") in IEEE TOSE, 18(8), pp.88-98. Relationship: None.I have never metDr.Adams.Assoc Prof.Dr.Chia-Ho ChenChair of MIS DepartmentCollege of ManagementOpen University888, Putong RoadKeelung, Taiwan 100 phone: +886-2-8888-8888 - fax:+886-2-8888-8886e-mail:*************.tw Expertise: published a related paper ("Network Management forE-Commerce") in IJ ElectronicBusiness, 1(4), pp.18-28. Relationship: Former professor,dissertation chairman.Mr.Frank YoungPartner, ABC Consulting888, Seashore HighwayWon Kok, KowloonHong Kongphone: +852-8888-8888 - fax:+852-8888-8886e-mail:***************Expertise: Mr.Young provides consulting services extensively to his clients regarding networkmanagement practices. Relationship: I have worked withMr.Young in several consultingprojects in the past three years. Finally, this paper is our originalunpublished work and it has not been submitted to any other journal forreviews.Sincerely,Johnny Smith。

序列多智能体强化学习算法

序列多智能体强化学习算法

第34卷第3期2021年3月模式识别与人工智能Pattern Recognition and Artificial IntelligenceVol.34No.3Mar.2021序列多智能体强化学习算法史腾飞1王莉1黄子蓉1摘要针对当前多智能体强化学习算法难以适应智能体规模动态变化的问题,文中提出序列多智能体强化学习算法(SMARL).将智能体的控制网络划分为动作网络和目标网络,以深度确定性策略梯度和序列到序列分别作为分割后的基础网络结构,分离算法结构与规模的相关性.同时,对算法输入输出进行特殊处理,分离算法策略与规模的相关性.SMARL中的智能体可较快适应新的环境,担任不同任务角色,实现快速学习.实验表明SMARL在适应性、性能和训练效率上均较优.关键词多智能体强化学习,深度确定性策略梯度(DDPG),序列到序列(Seq2Seq),分块结构引用格式史腾飞,王莉,黄子蓉.序列多智能体强化学习算法.模式识别与人工智能,2021,34(3):206-213. DOI10.16451/ki.issn1003-6059.202103002中图法分类号TP18Sequence to Sequence Multi-agent Reinforcement Learning AlgorithmSHI Tengfei',WANG Li1,HUANG Zirong1ABSTRACT The multi-agent reinforcement learning algorithm is difficult to adapt to dynamically changing environments of agent scale.Aiming at this problem,a sequence to sequence multi-agent reinforcement learning algorithm(SMARL)based on sequential learning and block structure is proposed. The control network of an agent is divided into action network and target network based on deep deterministic policy gradient structure and sequence-to-sequence structure,respectively,and the correlation between algorithm structure and agent scale is removed.Inputs and outputs of the algorithm are also processed to break the correlation between algorithm policy and agent scale.Agents in SMARL can quickly adapt to the new environment,take different roles in task and achieve fast learning. Experiments show that the adaptability,performance and training efficiency of the proposed algorithm are superior to baseline algorithms.Key Words Multi-agent Reinforcement Learning,Deep Deterministic Policy Gradient(DDPG), Sequence to Sequence(Seq2Seq),Block StructureCitation SHI T F,WANG L,HUANG Z R.Sequence to Sequence Multi-agent Reinforcement Learning Algorithm.Pattern Recognition and Artificial Intelligence,2021,34(3):206-213.在多智能体强化学习(Multi-agent Reinforce-收稿日期:2020-10-10;录用日期:2020-11-20Manuscript received October10,2020;accepted November20,2020国家自然科学基金项目(No.61872260)资助Supported by National Natural Science Foundation of China(No. 61872260)本文责任编委陈恩红Recommended by Associate Editor CHEN Enhong1.太原理工大学大数据学院晋中0306001.College of Data Science,Taiyuan University of Technology,Jinzhong030600ment Learning,MARL)技术中,智能体与环境及其它智能体交互并获得奖励(Reward),通过奖励得到信息并改善自身策略.多智能体强化学习对环境的变化十分敏感,一旦环境发生变化,训练好的策略就可能失效.智能体规模变化是一种典型的环境变化,可造成已有模型结构和策略失效.针对上述问题,需要研究自适应智能体规模动态变化的MARL.现今MARL在多个领域已有广泛应用[1],如构建游戏人工智能(Artificial Intelligence,AI)[2]、机器人控制[3]和交通指挥⑷等.MARL研究涉及范围广泛,与本文相关的研究可分为如下3方面.1)多智能体性能方面的研究.多智能体间如何第3期史腾飞等:序列多智能体强化学习算法207较好地合作,保证整体具有良好性能是所有MARL 必须考虑的问题.Lowe等[5]提出同时适用于合作与对抗场景的多智能体深度确定性策略梯度(Multi-agent Deep Deterministic Policy Gradient,MADDPG),使用集中训练分散执行的方式让智能体之间学会较好的合作,提升整体性能.Foerster等⑷提出反事实多智能体策略梯度(Counterfactual Multi-agent Policy Gradients,COMA),同样使用集中训练分散执行的方式,使用单个Critic多个Actor的网络结构,Actor 网络使用门控循环单兀(Gate Recurrent Unit,GRU)网络,提高整体团队的合作效果.Wei等[7]提出多智能体软Q学习算法(Multi-agent Soft Q-Learning, MASQL),将软Q学习(Soft Q-Learning)算法迁至多智能体环境中,多智能体采用联合动作,使用全局回报评判动作好坏,一定程度上提升团队的合作效果.上述算法在一定程度上提升多智能体团队合作和对抗的性能,但是均存在难以适应智能体规模动态变化的问题.2)多智能体迁移性方面的研究.智能体的迁移包括同种环境中不同智能体之间的迁移和不同环境中智能体的迁移.研究如何较好地实现智能体的迁移可提升训练效率及提升智能体对环境的适应性. Brys等⑷通过重构奖励实现智能体策略的迁移.虽然可解决智能体策略的迁移问题,但在奖励重构的过程中需要耗费大量资源.Taylor等[9]提出在源任务和目标任务之间通过任务数据的双向传输,实现源任务和目标任务并行学习,加快智能体学习的进度和智能体知识的迁移,但在智能体规模巨大时,训练速度仍然有限.Mnih等[10]通过多线程模拟多个环境空间的副本,智能体网络同时在多个环境空间副本中进行学习,再将学习到的知识进行迁移整合,融入一个网络中.该方法在某种程度上也可视作一种知识的迁移,但并不能直接解决规模变化的问题.3)多智能体可扩展性和适应性方面的研究.在实际应用中,智能体的规模通常不固定并且十分庞大.当前一般解决思路是先人为调整设定模型的网络结构,然后通过大量再训练甚至是从零训练,使模型适应新的智能体规模.这种做法十分耗时耗力,根本无法应对智能体规模动态变化的环境.Khan 等[11]提出训练一个可适用于所有智能体的单一策略,使用该策略(参数共享)控制所有的智能体,实现算法可适应任意规模的智能体环境.但是该方法未注意到智能体规模对模型网络结构的影响.Zhang 等[12]提出使用降维方法对智能体观测进行表征,将不同规模的智能体的观测表征在同个维度下,再将表征作为强化学习算法的输入.该方法本质上是扩充模型网络可接受的输入维度大小,但当智能体规模持续扩大时,仍会超出模型网络的最大范围,从而导致模型无法运行.Long等[|3]改进MADDPG,使用注意力机制进行预处理观测,再将处理后的观测输入MADDPG,使用编码器(Encoder)实现注意力网络.该方法在一定程度上可适应智能体规模的变化,但在面对每次智能体规模变动时,均需要重新调整网络结构和进行再训练.针对智能体规模动态变化引发的MARL失效的问题,本文提出序列多智能体强化学习算法(Sequence to Sequence Multi-agent Reinforcement Learning Algorithm,SMARL).SMARL中的智能体可较快适应新的环境,担任不同任务角色,实现快速学习.1序列多智能体强化学习算法SMARL的核心思想是分离模型网络结构和模型策略与智能体规模的相关性,具体框图见图1.图1SMARL框图Fig.1Framework of SMARL首先在结构上,将智能体的控制网络划分为2个平行的模块一智能体动作网络(图1左侧)和智能体目标网络(图1右侧).每个智能体的执行动作由这两个网络的输出组成.为了适应算法结构,划分智能体的观测数据和动作数据.智能体的观测分为每个智能体的局部观测和所有智能体的全局观测,本文称为个性观测和共性观测.个性观测不会随智能体规模变化而变化.同理,算法中对智能体动作也分成智能体的共性动作和个性动作,所有智能体动作集的交集为共性动作,某智能体的动作集与共208模式识别与人工智能(PR&AI)第34卷性动作的差集为该智能体的个性动作.共性动作为智能体的执行动作,个性动作为智能体执行动作的目标.共性动作不会随智能体规模变化而变化.每个智能体执行的动作由共性动作和个性动作共同组成.举例说明,在二维格子世界中存在3个可移动且能相互之间抛小球的机械手臂.它们的共性观测是统一坐标系下整个地图的观测,个性观测是以自身为坐标原点的坐标系下的观测.它们的共性动作为上、下、左、右抛.个性动作由智能体ID决定:0号智能体的个性动作为1号、2号;1号智能体的个性动作为0号、2号;2号智能体的个性动作为0号、1号.经过上述分割,算法将与智能体规模相关和无关的内容分割为两部分.考虑到深度确定性策略梯度(Deep Deterministic Policy Gradient,DDPG)网络[⑷在单智能强化学习上性能较优,本文在对智能体观测和动作进行分割之后,将所有智能体的动作策略视作同个策略,选取DDPG网络作为智能体动作网络的内部结构.Khan等[||]证明使用单智能体网络和单一策略控制多个智能体的有效性.考虑到序列到序列(Sequence-to-Sequence,Seq2Seq)网络[15-16]对输入输出长度的不敏感性,本文选取Seq2Seq作为智能体目标网络的内部结构,将智能体规模视作序列长度.智能体动作网络输入为智能体的个性观测,输出为智能体的共性动作,详细框图见图2.图2智能体动作网络框图Fig.2Framework of agent action network 智能体动作网络由多个DDPG网络组成,每个智能体均有各自的DDPG网络,其中,Actor网络参数为兹,,Critic网络参数为Q,Actor-target网络参数为兹;,Critic-target网络参数为Q;,i=0,1,…,N-1.单个的DDPG网络仅接收其对应的智能体以自身作为“坐标原点”的局部观测.此时,使用单一策略(参数共享)控制所有智能体的动作是有意义的.另外,为了实现参数共享,本文参考异步优势演员评论家(Asynchronous Advantage Actor-Critic, A3C)的做法[10],在智能体动作网络中额外设置一个不进行梯度更新的中心参数网络,Actor网络参数为兹”,Critic网络参数为Q n网络接收其它DDPG网络的参数进行软更新(软更新超参数子=0.01),再使用软更新更新其它DDPG网络,最终使所有DDPG网络的参数达到同个单一策略.智能体动作网络更新方式如下.令m n l,=o D pg移(九-Q(o ib,山Q J)2达到最小以更新Critic网络,其中,Q i为Critic网络的参数,Q(•-)为网络评估,B_DDPG为算法批次(Batch Size)数量,o ib、两、r ib、0亦1为抽取样本,Ju,=r,b+酌Q'(s u,+1,滋'(s u,+1丨兹忆)Q;),酌为折扣因子.Actor网络更新如下:V兹丿抑B_DDPG移(VQ(o,a Q i)s o)V汕(o丨兹J L), ib lb lb lb其中,兹i为Actor网络的参数,m(••)为网络策略.中心参数网络和其它网络相互更新如下:兹N饮子兹i+(1-子)兹N,Q N饮子匕+(1-子)Q,兹i饮子兹N+(1-子)兹i,Q i饮t Q N+(1-子)Q i-其中:中心参数网络的Actor网络参数为如,Critic 网络参数为Q N;其它DDPG网络的Actor网络参数为兹,,Critic网络参数为Q i,i=0,1,-,N-1;t为软更新超参数.智能体目标网络输入为智能体的共性观测,输出为智能体的个性动作,框图如图3所示.网络由一个Seq2Seq网络和一个存储器组成,Seq2Seq网络参数为啄.Seq2Seq网络由编码器和解码器组成,这两部分内部结构均为循环神经网络(Recurrent Neural Network,RNN).编码器负责将输入序列表征到更高的维度,由解码器将高维表征进行解码,输出新的序列.Seq2Seq网络负责学习和预测智能体间的合作关系.智能体目标网络使用强化学习的思想,存储器起到强化学习中Q的作用,负责记录某观测(序第3期史腾飞等:序列多智能体强化学习算法209列)到动作(序列)的映射及相应获得的奖励. Seq2Seq部分相当于强化学习中的Actor,负责学习最优观测序列到动作序列的映射及预测新观测序列的动作序列.所有智能体的全局观测(共性观测)所有智能体在整体坐标下的全局观测序列存储器取数据训练“翻译”Seq2Seq编码器I RNN^rRN^k l rn N|注意力机制层解码器|RNN川RNN f RNN|智能体动作目标(个性动作)▼图3智能体目标网络框图Fig.3Framework of agent target network智能体目标网络输入的序列长度为智能体规模,序列中的元素维度为每个智能体的观测.输出序列的长度同样为智能体规模,序列中的元素是智能体编号.输入序列和输出序列的顺序均按照智能体的编号排序,每当智能体规模发生变化时,智能体重新从0开始编号.具体如下:先定义Seq2Seq的奖励函数,通过强化学习的思想筛选奖励最大的观测序列到动作序列的映射,将该映射视作一种翻译,再由Seq2Seq网络进行学习.网络输出表示智能体间的合作关系.另外,本文在Seq2Seq网络中引入Attention机制,提升Seq2Seq网络性能[17].Seq2Seq的核心公式如下:m^x Z*q=1E1s s s s s sN移ln(a0,,…,a N-1o0,o1,…,0N-1,啄),n=0其中,啄为Seq2Seq的参数,。

每一页都经典的微软官方PPTMicrosoft's Point of View(下)

每一页都经典的微软官方PPTMicrosoft's Point of View(下)
• Supports connecting to a remote session with any monitor configuration
IMPROVED
Full Fidelity RemoteApp and Desktops
with true Multi-monitor support • Provides rich media experience with Media Redirection, support for Aero Glass, and bi-directional audio • Enhanced bitmap acceleration enables remote rich content for 3D and portable graphics stacks like Silverlight and Flash
Built-in virtualization and integrated windows-based platform less than 1/6 of the upfront and on-going cost of competitors
Availability
Comprehensive capabilities including Live Migration, Failover Clustering, and Site Recovery to minimize service downtime
Office 2010 and Shell Operations WAN (100ms latency)
XP SP2 (SMB 1) Windows 7 (SMB 2)
• Communications 20-40 times faster • Better end user experience

Microbial mass movements

Microbial mass movements

Bacteria shed by domestic animals contribute to the spread of antibiotic resistance.106 – 10106 – 10108 – 10COPIES PER GRAM FECES 108 – 10Antibiotic selectionClass I integronPlasmid1100 15 SEPTEMBER 2017 • VOL 357 ISSUE 6356Global change for microbesThe clinical class 1 integron illustrates how human activities affect the abundance and distribution of genes and microorganisms. Driven by antibiotic selection, it has colonized different bacteria, vertebrate hosts, and continents. Its spectacular rise in abundance has been driven by antibiotic selection. Large numbers ofintegron copies are now being shed back into the environment, driving the spread of antibiotic resistance. See supplementary materials for data sources.Microbial mass movementsYong-Guan Zhu, Michael Gillings, Pascal Simonet, Dov Stekel, Steve Banwart and Josep PenuelasDOI: 10.1126/science.aao3007(6356), 1099-1100.357Science ARTICLE TOOLS/content/357/6356/1099MATERIALSSUPPLEMENTARY /content/suppl/2017/09/14/357.6356.1099.DC1REFERENCES/content/357/6356/1099#BIBL This article cites 15 articles, 2 of which you can access for free PERMISSIONS/help/reprints-and-permissionsTerms of ServiceUse of this article is subject to the is a registered trademark of AAAS.Science licensee American Association for the Advancement of Science. No claim to original U.S. Government Works. The title Science, 1200 New York Avenue NW, Washington, DC 20005. 2017 © The Authors, some rights reserved; exclusive (print ISSN 0036-8075; online ISSN 1095-9203) is published by the American Association for the Advancement of Science on September 14, 2017/Downloaded from。

奋发有为强国先锋读后感三年级

奋发有为强国先锋读后感三年级

奋发有为强国先锋读后感三年级After immersing myself in the book "Fen Fa You Wei: Qiang Guo Xian Feng," I was deeply inspired by the stories of young pioneers who dynamically contribute to the strengthening of our nation.It"s a book that resonates with a profound sense of patriotism and a strong call to action for the youth of today.在阅读《奋发有为:强国先锋》之后,我被书中那些充满活力、为强国贡献青春力量的年轻先锋们的故事深深打动。

这本书唤起了我对祖国的深厚情感,并对当代青年发出了强烈的行动号召。

Each character in the book embodies the spirit of hard work and enterprise, which are essential qualities for any individual aiming to make a difference in society.Their tales are a testament to the transformative power of perseverance and determination.书中每一位人物都体现了勤奋创业的精神,这是任何希望在社会中有所作为的人都必须具备的品质。

他们的故事证明了坚韧和决心所具有的变革力量。

The book serves as a motivation for readers, especially those in the third grade like me, to recognize our potential and strive to become agents of positive change.It emphasizes the importance of education and personal growth in nurturing future leaders.这本书激励着读者,特别是像我这样三年级的孩子们,认识到自己的潜力,并努力成为积极的变革推动者。

当代青年的责任英语作文

当代青年的责任英语作文

Title: The Responsibilities of Contemporary YouthIn the fast-paced and dynamically evolving world of today, the responsibilities of contemporary youth are both vast and diverse. They stand at the crossroads of tradition and modernity, inheriting the wisdom of the past while embracing the innovations of the future. This generation of young people is charged with the task of shaping society, driving progress, and safeguarding the planet for future generations.Firstly, contemporary youth are duty-bound to uphold the values of integrity, honesty, and respect. In a world increasingly influenced by social media and digital technology, it is crucial for them to maintain a strong moral compass. They must set an example by adhering to ethical principles in their personal lives and professional careers, fostering a culture of trust and cooperation.Moreover, the responsibilities of youth extend to the realm of education. They are expected to pursue knowledge with vigor and dedication, not just for personal advancement but also for the betterment of society. Through rigorous academic pursuits and continuous learning, they acquire the skills and knowledge necessary to solve complex problems and contribute to societal progress.Furthermore, the environmental crisis poses a significant challenge to contemporary youth. They are the ones who will inherit the consequences of climate change and environmental degradation. Therefore, it is imperative for them to take active measures to protect the planet. This includes adopting sustainable lifestyles, promoting environmental awareness, and engaging in activities that promote ecological conservation and renewable energy.In addition, youth play a crucial role in fostering social cohesion and inclusivity. They are agents of change who can break down barriers of race, gender, religion, and socio-economic status. By promoting diversity and inclusivity in their interactions and collaborations, they contribute to the creation of a more harmonious and just society.Moreover, contemporary youth are also responsible for upholding the principles of democracy and freedom. They must be vigilant in defending the rights and freedoms of individuals, speaking out against injustice and oppression. Through peaceful protest and activism, they can bring about positive changes in society and influence policies that affect the lives of millions.Finally, the responsibilities of contemporary youth extend beyond national borders. In an interconnected world, they arecalled upon to be global citizens, with a sense of responsibility towards the welfare of people across the globe. This involves promoting international cooperation, understanding and respecting different cultures, and working towards a more peaceful and prosperous world.In conclusion, the responsibilities of contemporary youth are diverse and multifaceted. They must uphold moral values, pursue knowledge, protect the environment, foster social cohesion, uphold democracy and freedom, and embrace a global perspective. By fulfilling these responsibilities, they not only shape their own futures but also contribute significantly to the progress and prosperity of society at large. It is a weighty mantle, but one that contemporary youth are well-equipped to carry with dignity and determination.。

Maintaining the Identity of Dynamically Embodied Agents

Maintaining the Identity of Dynamically Embodied Agents

Maintaining the Identity of DynamicallyEmbodied AgentsAlan Martin1,Gregory M.P.O’Hare1,Brian R.Duffy2,Bianca Sch¨o n1,and John F.Bradley11University College Dublin,Belfield,Dublin4,Ireland2Institut Eur´e com,Sophia-Antipolis,France{alan.martin,gregory.ohare,bianca.schoen,john.bradley}@ucd.ieBrian.Duffy@eurecom.frhttp://chameleon.ucd.ieAbstract.Virtual agents are traditionally constrained in their embod-iment,as they are restricted to one form of body.We propose allowingthem to change their embodiment in order to expand their capabili-ties.This presents users with a number of difficulties in maintaining theidentity of the agents,but these can be overcome by using identity cues,certain features that remain constant across embodiment forms.This pa-per outlines an experiment that examines these identity cues,and showsthat they can be used to help address this identity problem.1IntroductionOver the last number of years,extensive research has been carried out into the area of autonomous agents.These are software entities characterised by the at-tributes of autonomy,social ability,reactivity and pro-activity[1].A number of features of agent technologies,including their autonomy,their ability to rea-son based upon limited knowledge and their ability to react to changes in the environment,make them suitable for use within virtual environments.Agents within virtual environments are referred to as virtual agents.We propose a sys-tem in which virtual agents are controlled by a Belief-Desire-Intention(BDI) architecture[2–4].A number of different systems have sought to incorporate agents within vir-tual environments.These include the MAVE system developed by Cobel,Harbi-son&Cook[5,6],which seeks to place virtual agents within a web based VRML environment.In contrast to our use of BDI,the deliberation of these agents is based upon Bayesian reasoning.Andr´e and Rist have developed MIAU,a sys-tem that animates characters based upon either a behaviour component or a response to user interaction[7].A number of other virtual agent systems exist that embrace BDI based rea-soning,as we do.These include the VITAL system developed by Anastassakis et al.[8],systems developed by Torres et al.[9]and Huang et al.[10],the AvatarArena system developed by Rist el al.[11]and PsychSim,a system for the con-trol of synthetic characters used to educate children in how to recognise and deal with bullying[12].Traditionally an avatar is constrained to a single form,including in all of the above systems.This has a number of limitations on the avatar’s capabilities,as the capabilities are defined by the form of the avatar.We advocate a different system,the agent is capable of mutating its embodiment in order to expand upon its capabilities.The embodiment is dynamic and can change in order to take advantage of different capability sets.However,this freedom does present a number of difficulties,particularly in relation to the agents identity.Maintenance of identity,despite the ability to change form,is vital.In order to achieve this,we propose a system whereby agents are equipped with a number of identity cues.These are distinctive features that are common to all of the possible forms of the agent.In this paper we examine the influence of these cues in maintaining the agent’s identity.Sect.2introduces Agent Chameleons,a system for the provision of expanded capabilities through migration,mutation and evolution.Sect.3discusses embod-iment and suggests how the embodiment could be capable of change.Sect.4looks at identity and how it can be maintained with dynamic embodiment.Sect.5then explains the experimental methodology used to examine this notion,with the results detailed in Sect.6.2Agent ChameleonsThis research forms part of the the Agent Chameleons project[13–15],in which we endeavour to create the next generation of virtual agents,autonomic entities that can seamlessly migrate,mutate and evolve between and within virtual in-formation spaces.The Agent Chameleon can be seen as a digital spirit,capable of occupying a variety of different platforms,such as a physical entity(a robot), a virtual environment,or a mobile device such as a PDA.The key concepts of migration and mutation underpin these agents,allow-ing them to react to environmental change.Agent Chameleons are capable of migrating to a wide variety of devices and information spaces as required,in order to utilise the features and capabilities of each.For instance an agent could migrate to a real world robot in order to achieve a physical manifestation and in-fluence physical reality,to a PDA in order to travel with the user,or to a virtual environment in order to improve its abilities for interacting with the user.Additionally,the agents are capable of mutating their form.This is partic-ulary relevant within virtual environments,where the form of an agent is not constrained,as it is in the real world,and is capable of changing to suit the task at hand.Within Agent Chameleons,the agents’deliberative mechanism is based upon Agent Factory[16–19].Agent Factory provides a cohesive framework for the de-velopment and deployment of agent-oriented applications.Specifically,it delivers extensive support for the creation of Belief-Desire-Intention(BDI)agents.TheAgent Factory Run-Time Environment delivers support for the deployment of agent-oriented applications across a large number of platforms.The system has been created to provide these agents with control of a number of platforms and devices,and providing them with the ability to migrate between them.[14,15, 20,21]3EmbodimentThe relationship between mind and body has been a psychological and philo-sophical problem for many years.For example,Descartes[22]argued that the mind and the body are distinct entities and can interact independently of one another.Within the Artificial Intelligence(AI)community,this question has also arisen.Popularised by Brooks[23],the predominant position is that while the mind and body can be seen as separate components,they are not necessarily inseparable.The embodiment of the intelligent system is crucial,as it is through this embodiment that a system interacts with the world.Within virtual environments an agent’s(or a user’s)embodiment has been defined as the provision of an appropriate body image for the representation of that agent to other agents and users,as well as to itself[24].Normally,a virtual agent is embodied through an avatar,a graphical representation of the agent within the virtual environment.The use of embodiment within a virtual envi-ronments is crucial for the user to develop a sense of presence within the world. Presence refers to the subjective experience of being in one place or environment, even when one is physically situated in another[25].Gerhard et al.state that the use of avatars to embody users within multi-user virtual environments en-courages a sense of presence in those users[26].It also helps users to understand the persona of the other users,and facilitates social encounters with those users. Gerhard et al.go on to state the the form of the avatar has an influence over the level of presence felt.They carry out experiments comparing user reactions to different types of avatars,concluding that realistic or cartoon-like avatars are better at inducing presence than abstract shapes.Within Agent Chameleons,agents are not constrained to one particular envi-ronment.They are capable of migration,moving between various different plat-forms,such as a robot,a mobile device such as a PDA,or a virtual environment. Within all of these environments the agents are considered to be embodied.We define the embodiment of the Agent Chameleon to be it’s strong provision of environmental context,both individual and social.The agents have an embod-iment within all environments,provided by the robot that they are controlling, or their representation within the virtual world.Within virtual environments, this embodiment is achieved by the provision of an avatar for the agent.We define a body-form as a body that an agent can choose to adopt.This in-cludes the form of any robots that the agents can occupy,as well as the agent’s choices of representation within a virtual environment,on a desktop or on a mobile device.The body-form is limited by the abilities provided by the envi-ronment that the agent is occupying.It must,therefore,be provided by thatenvironment.Virtual agents have traditionally been confined to a single form of avatar,a single body-form.This research proposes a contrasting approach, our vision is of a system whereby an agent can mutate between various different body-forms.The choice of body-form limits the agent’s capabilities as each has its own associated sets of capabilities.For example,the body-form of a robot is equipped with that robot’s sensory and motor capabilities.Within virtual environments, Agent Chameleons are provided with a library of different body-forms that they can adopt.Each of these body-forms also presents its own set of capabilities to the agent.For instance,a representation as a face may allow an agent to express certain facial expressions whereas a representation as a car will not.The ability to change body-form,therefore,enables the agent to expand its capability set by selecting the most appropriate body-form to it’s task.This act of changing body-form is referred to as mutation.4IdentityIdentity is not a simple concept,and indeed the definition of identity,as it is used in both common speech and academic research,has expanded and changed over the years.Fearon,in an examination of this changing definition of identity, claims that it is currently seen as being either“(a)a social category,defined by membership rules and(alleged)charac-teristics attributes or expected behaviours,or(b)socially distinguishing features that a person takes a special pride in or views as unchangeable but socially consequential(or(a)and(b)at once).”[27]One important point to realise is that identity is primarily a social concept. As De Levita[28]noted,we present identity to others and have their identity presented to us.The question that defines identity is not,therefore,“Who am I?”but“Who am I in the eyes of others?”.With the ability to change the body-form,the issue of identity becomes important.If the agent can change it’s form,how can the notion of that agent be maintained?This maintenance of identity is vital if the agent is to operate successfully.In order to do this,some understanding of the how humans perceive such identity is crucial.We define an agent’s identity to be that which causes an agent to remain the same within the mind of the user.It is what remains constant for the agent, regardless of it’s chosen body-form.It should be noted that the identity of the agent is primarily a perception of the user.This identity must be preserved across all body-forms that the agent can choose to adopt.In order to achieve this an agent has a number of features, called its identity cues,that remain constant across all body-forms,whenever possible.The relationship between the the identity and the embodiment is out-lined in Fig.1.The body-form is a feature of the environment,as the environment defines the types of body-forms that are possible.On the other hand,identityFig.1.The relationship between body-form and identityand identity cues are features of the agent.Each agent has their own unique set of identity cues.When an agent is located within a virtual environment, the combination of its chosen body-form and identity cues is called the agent’s avatar.The avatar is the agent’s embodiment within the virtual world.Despite the importance of understanding what underpins identity perception, the question of how a dynamic embodiment affects how one identifies an individ-ual has,so far,remained unaddressed.There are a number of different factors that can be used as identity cues,including visual factors such as the colour scheme,markings on the body,or particular features common to all body-forms, such as eyes.Other possible identity cues include the type of character that the body-form represents(human,dog,insect)and non-visual factors such as the tone of voice used or the behaviour of the agent.The sense of identity applies not only to virtual environments,but to other platforms that the agents can oc-cupy;other platforms such as robots or PDA’s should attempt to use the same identity cues.5Experimental MethodTo investigate how identity cues can affect the users perception of a virtual agent’s identity,and to look at which identity cues are more suitable,we devised a laboratory experiment.A random sample of volunteers were placed within a virtual environment and shown a virtual character.They were able to move around within the world and examine the character.This character was then replaced by three new characters,each with a different level of similarity to the original character.An example of this experimental setup is shown in Fig.2. Participants were asked to rate“the degree you feel that each of these characters would be recognisable as the original character”,giving each a score between0 and7.This was repeated a number of times within the experiment.Fig.2.Screen shot of the experimental environment.As this is an initial experiment it was limited to characters located within a virtual environment.Additionally,the identity cues were limited to visual factors.A number of these cues were examined,specifically when:–characters share a common feature,such as a hat or glasses.–characters share a common colour scheme.–characters share a common set of markings.–characters are of the same class of objects,for example characters are both human,or are both dogs.While this is not an exhaustive set of the possible identity cues,it is adequate for this initial investigation.For each set of characters in the experiment each of the three characters shared only one identity cue with the original character.Additionally there were a number of characters that had no similarity to the original character which were used as controls.The test was carried out seven times for each participant, in a prescribed order.Each identity cue was repeated an identical number of times throughout these tests.Two examples of the character combinations are shown in Fig.3.In thefirst(the kangaroo)where A has a common feature(i.e. boxing gloves),B has the same markings and C is a control.In the second(the wasp)A maintains colour,B is a control and C is the same class of character.Participants were also asked some demographic questions,such as their age and gender,as well as being asked to rate their familiarity with both technologyin general and computer games in particular.Fig.3.Two sets of sample characters from the experiment.6ResultsThe experiment was carried out with a random sample of31individuals,13 males and18females,aged between8and50,with an average age of23.Most participants were students.The average score,out of7,for the question of“re-ceptiveness to technology”was4.90,and the average score,again out of7,for the question of“familiarity to computer games”was3.83.Table1.ANOVA Summary TableSource df SS MS F p-valueIdentity Cues469.9317.4838.970.00Error8437.680.45Total88107.61Analysis of the results suggest that the mean similarity score,for each of the identity cues,is as shown in Fig.4.In order to ascertain that this represents a statistically valid difference between the different identity cues,an Analysis of Variance(ANOVA)was employed.The ANOVA is a standard method of iden-tifying a statistically significant difference between means.A one-way ANOVA (repeated measures)was carried out on the main independent variable,the sim-ilarity score.The results,as shown in Table1,reveal a significant difference between conditions(F(4,84)=38.97;p<0.001;MSE=0.45).Post-hoc analy-sis suggested that,with a significance level of0.001,the four different identitycues were significantly different from the control case.Thus we can claim thatFig.4.The mean similarity score for each of the identity cues,with standard error indicated.the inclusion of identity cues affects the user’s perception of the character’s iden-tity.Additionally,with a significance level of0.05,the use of common features is significantly better than the use of colours and of common markings.A few observations need to be made about these results.Considering the results for colour,the choice of colour used clearly has an influence.When the colours used were black and yellow(the wasp’s colours,as is Fig.3)a much higher rating was observed,with a mean score of3.68,on the other hand when a less vivid green and blue combination was used,the rating was much lower,having a mean score of only0.97,below that of the control characters.Furthermore, the maximum mean score for the identity cues is approximately3.5,out of a maximum score of7.While this is significantly better than the control cases, it is possible that this can be improved upon using a combination of identity cues.This experiment was by design limited to purely visual identity cues.One would imagine that the inclusion of non-visual cues,such as the tone of voice or the behaviour of the agent,would also have an effter experiments will evaluate this.When the results were further analysed in relation to the gender of the partic-ipants,their level of technological familiarity and their level of games playing,no significant differences were discovered.Despite this females have a consistentlylower mean than males,as graphed in Fig.5.This is consistent withfindings intoFig.5.The mean similarity score for males and females.gender differences in visuo-spatial reasoning[29].While no factors presented a significant difference,there are a number of factors that have yet to be examined. For example,will a child present different results than an adult?7Conclusions and Future WorkWhen virtual agents are equipped with dynamic embodiment,that is the ability to mutate their form,they are afforded the ability able to take advantage of an expanded set of capabilities.However,this presents problems with the agent’s identity and specifically how this can be maintained in the mind of the user.Maintaining visual identity cues that transcend such avatar transmogrifica-tion is of paramount importance.This paper has explored this very issue and has formulated and conducted experiments that offer an understanding of visual enablers for the maintenance of agent identity.From the statistical analysis of our experimental data,it can be concluded that the use of identity cues does indeed provide a valid method of maintaining an agent’s identity when its em-bodiment is dynamic.Furthermore,it has been shown that the use of common features produces a higher level of identity than the use of common colours and markings.The Agent Chameleons must be equipped with these identity cues to order to aid the user in their identification as the agent migrates from the virtualenvironment to the physical such as to a robot or a PDA.This work raises a number of questions that are yet to be answered.These include how other identity cues affect the result.Can auditory or behavioural consistency increase the user’s perception of the agent,or can a combination of visual cues achieve this?Additionally,more questions are raised regarding the choice of colours that can be used for an identity cue,specifically what choices are appropriate and which are not.More experiments must be carried out in order to answer these questions.AcknowledgementsThe work undertaken as part of the Agent Chameleons project,a collaborative project between the Department of Computer Science,University College Dublin (UCD)and Media Lab Europe(MLE),Dublin.We gratefully acknowledge the financial support of the Higher Education Authority(HEA)Ireland and the Irish Research Council for Science,Engineering and Technology:funded by the Na-tional Development Plan.Gregory O’Hare gratefully acknowledges the support of Science Foundation Ireland under Grant No.03/IN.3/1361.References1.Wooldridge,M.,Jennings,N.R.:Intelligent agents:Theory and practice.Knowl-edge Engineering Review10(1994)2.Bratman,M.E.:What is intention?In Cohen,P.R.,Morgan,J.,Pollack,M.E.,eds.:Intentions in Communication.MIT Press(1990)15–323.Cohen,P.R.,Levesque,H.J.:Intention is choice with commitment.ArtificialIntelligence42(1990)213–2614.Rao,A.S.,Georgeff,M.P.:Modeling rational agents within a BDI-architecture.InAllen,J.,Fikes,R.,Sandewall,E.,eds.:Proceedings of the Second International Conference on Principles of Knowledge Representation and Reasoning-KR91, San Mateo,CA,USA,Morgan Kaufmann(1991)5.Cobel,J.,Cook,D.J.:Virtual environments:An agent-based approach.In:Pro-ceedings of the AAAI Spring Symposium on Agents with Adjustable Autonomy.(1999)6.Cobel,J.,Harbison,K.:MAVE:A multi-agent architecture for virtual environ-ments.(In:Proceedings of the11th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems)577–583 7.Rist,T.,Andr´e,E.,Baldes,S.:Aflexible platform for building applications withlife-like characters.In:Proceedings of the Eight International Conference on In-telligent User Interfaces-IUI2003,Miami,Florida,USA(2003)8.Anastassakis,G.,Ritchings,T.,Panayiotopoulos,T.:Multi-agent systems as intel-ligent virtual environments.In:Proceedings of Advances in Artificial Intelligence, Joint German/Austrian Conference on AI-KI2001.Volume2174of Lecture Notes in Computer Science.,Springer(2001)9.Torres,J.A.,Nedel,L.P.,Bordini,R.H.:Using the BDI architecture to produceautonomous characters in virtual worlds.In:Proceedings of the Fourth Interna-tional Working Conference on Intelligent Virtual Agents-IVA2003.Volume2792 of Lecture Notes in Computer Science.,Irsee,Germany(2003)197–20110.Huang,Z.,Eli¨e ns,A.,Visser,C.:Programmibility of intelligent agent avatars.In:Proceedings of Agent’01Workshop on Embodied Agents,Montreal,Canada(2001) 11.Rist,T.,Schmitt,M.,Pelachaud,C.,Bilvi,M.:Towards a simulation of conver-sations with expressive embodied speakers and listeners.In:Proceedings of the Sixteenth International Conference on Computer Animation and Social Agents-CASA2004,Geneva,Switzerland(2004)12.Marsella,S.C.,Pynadath,D.V.,Read,S.J.:PsychSim:Agent-based modeling ofsocial interaction and influence.In:Proceedings of the International Conference on Cognitive Modeling-ICCM2004,Pittsburg,Pensylvania,USA(2004)13.Duffy, B.R.,O’Hare,G.M.P.,Martin, A.N.,Bradley,J.F.,Sch¨o n, B.:Agentchameleons:Agent minds and bodies.In:Proceedings of the Sixteenth Interna-tional Conference on Computer Animation and Social Agents-CASA2003,New Jersey,USA(2003)14.O’Hare,G.M.P.,Duffy,B.R.:Agent chameleons:Migration and mutation withinand between real and virtual spaces.In:Proceedings of the Society for the Study of Artificial Intelligence and the Simulation of Behaviour(SSAISB)-AISB’02 Conference,London,England(2002)15.O’Hare,G.M.P.,Duffy, B.R.,Sch¨o n, B.,Martin, A.,Bradley,J.F.:Agentchameleons:Virtual agents real intelligence.In:Proceedings of the Fourth In-ternational Working Conference on Intelligent Virtual Agents-IVA2003.Volume 2792of Lecture Notes in Computer Science.,Irsee,Germany(2003)218–225 16.Collier,R.,O’Hare,G.M.P.,Lowen,T.,Rooney,C.:Beyond prototyping in thefactory of agents.In:Proceedings of the Third Central and Eastern European Conference on Multi-Agent Systems-CEEMAS’03,Prague,Czech Republic(2003) 17.Collier,R.,Rooney, C.,O’Hare,G.M.P.:A UML-based software engineeringmethodology for agent factory.In:Proceedings of the16th International Confer-ence on Software Engineering and Knowledge Engineering-SEKE2004,Alberta, Canada(2004)18.Collier,R.W.:Agent Factory:A Framework for the Engineering of Agent-OrientedApplications.Phd thesis,University College Dublin,Ireland(2001)19.Ross,R.,Collier,R.,O’Hare,G.M.P.:AF-APL-bridging principles&practice inagent oriented languages.In:Proceedings of the First International Workshop on Programming Multiagent Systems,Languages and Tools-PROMAS2004,New York,USA(2004)20.O’Hare,G.M.P.,Duffy,B.R.,Bradley,J.F.,Martin,A.N.:Agent chameleons:Moving minds from robots to digital information spaces.In:Procedings of the Second International Symposium on Autonomous Minirobots for Research and Edutainment-AMiRE2003,Brisbane,Australia(2003)133–14221.Martin,A.,Duffy,B.R.,O’Hare,G.M.P.,Sch¨o n,B.,Bradley,J.F.:Empoweringagents within virtual environments.In:Proceedings of the IEEE Systems,Man and Cybernetics UK-RI3rd Workshop on Intelligent Cybernetic Systems-ICS‘04, Derry,Northern Ireland(2004)22.Descartes,R.:Discourse on Method and Meditations.New York Library of LiberalArts(1960)Edited and Translated by fleur from original French,first published1637.23.Brooks,R.A.:Intelligence without reason.In:Proceedings of the Twelfth Inter-national Joint Conference on Artificial Intelligence-IJCAI91,Morgan Kaufmann publishers Inc.:San Mateo,CA,USA(1991)569–59524.Benford,S.,Bowers,J.,Fahl´e n,L.E.,Greenhalgh,C.,Snowdon,D.:User embod-iment in collaborative virtual environments.In:Proceedings of CHI1995.(1995)25.Witmer,B.G.,Singer,M.J.:Measuring presence in virtual environments:A pres-ence questionnaire.Presence:Teleoperators and Virtual Environments7(1998) 255–24026.Gerhard,M.,Moore,D.J.,Hobbs,D.J.:An experimental study of the effect ofpresence in collaborative virtual environments.In Earnshaw,R.,Vince,J.,eds.: Intelligent Agents for Mobile and Virtual Media.Springer(2002)113–12327.Fearon,J.D.:What is identity(as we now use the word)?Mimeo,Stanford Uni-versity(1999)28.de Levita,D.:The Concept of Identity.Mouton&Co.(1965)29.Vecchi,T.,Girelli,L.:Gender differences in visuo-spatial prcessing:The impor-tance of distinguishing between passive storage and active manipulation.Acta Psychologicia99(1998)1–16。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Enabling Mobile Agents to Dynamically Assume Roles Giacomo Cabri, Luca Ferrari, Letizia LeonardiDipartimento di Ingegneria dell’Informazione – Università di Modena e Reggio EmiliaVia Vignolese, 905 – 41100 Modena – ITALYE-mail: {giacomo.cabri, luca.ferrari, letizia.leonardi}@unimo.itABSTRACTAgent-based application development must face the issues related to the interactions among agents. In fact, their sociality allows decomposing large applications into collaborating agents, while open environments, such as the Internet, require agents belonging to different applications to compete to gain resources. In the BRAIN framework, interactions among agents are fruitfully modeled and implemented on the basis of roles. This approach achieves several advantages, from separation of concerns between the algorithmic issues and the interaction issues, to the reuse of solutions and experiences in different applications. In this paper we propose a mechanism to enable Java agents to dynamically assume roles at runtime. Our approach is based on the modification of the bytecode of Java agents, in order to implement an appropriate interface and to add the related methods. An application example and the comparison with other approaches show the effectiveness of our approach.1. INTRODUCTIONInteractions among agents are an important issue to be taken into consideration in the development of agent-based applications. The BRAIN (Behavioural Roles for Agent INteractions) framework [3] proposes an approach to agent interactions based on the concept of role. There are different advantages in modeling interactions by roles and, consequently, in exploiting derived infrastructures. First, it enables a separation of concerns between the algorithmic issues and the interaction issues in developing agent-based applications. Second, it permits the reuse of solutions and experiences; in fact, roles are related to an application scenario, and designers can exploit roles previously defined for similar applications; for instance, roles can be exploited to easily build agent-oriented interfaces of Internet sites [4]. Third, roles can also be seen as a sort of design patterns [1]: a set of related roles along with the definition of the way they interact can be considered as a solution to a well-defined problem, and reused in different similar situations. Finally, it promotes locality in interactions, since each local interaction context can define the allowed roles and rule the interactions among them. Exploiting the role advantages, the BRAIN framework aims at covering the agent-based application development in different phases, and provides for (i) a model of interactions based on roles, (ii) an XML-based notation to describe the roles, and (iii) interaction infrastructures based on the previous model and notation, which enable agents to assume roles.In this paper, we propose an implementation of an interaction infrastructure for the BRAIN framework, thanks which mobile agents can dynamically assume roles. In particular, we focus on the mechanisms that enable such dynamic assumption of roles by mobile agents. In open and dynamic environments, for instance the Internet or the pervasive computing based ones [15], the agent capability of dynamically assuming a role at runtime can grant a high degree of adaptability to runtime situations and also permit to suit unexpected situations. We can find an example of dynamic assumption of a role in the film The Matrix, where the female character dynamically downloads the role of “helicopter driver” to escape; in that case, the dynamic assumption of features is vital in order to run away from a dangerous situation. This is clearly fiction, but it gives an idea of what we want to do in the agent world, where the dynamic assumption of roles can also be useful; for instance, think at an agent that has to obtain a resource, and at runtime it discovers that such resource is on sale by an auction: it can dynamically assume the role of bidder and interact with agents playing the role of seller or auctioneer. Of course, such dynamic assumption is not trivial, because agent developers hardly deal with runtime situations, especially if they require a dynamic modification of the agents. Moreover, the dynamic assumption of roles involves several issues related to the exploited programming language, the intelligence of the agents, and the knowledge needed to assume a new role. To our purposes, we propose an implementation of an infrastructure where the code of the mobile agents is modified at runtime, adding the features related to the role they are going to assume. In addition, a mechanism to search for roles is exploited to further uncouple agents and roles. We take into consideration agents implemented in Java, for two main reasons: (i) Java is the most exploited language to implement (mobile) agent platforms, thank to its portability, security, and network-orientedness; and (ii) the fact that Java relies on an intermediate bytecode allows us to modify it (respecting the security constrains) to add new functionalities. 2. THE BRAIN FRAMEWORKThe BRAIN framework [3] is based on the concept of role and aims at covering the agent-based application development at different phases. To this purpose, it provides for a model of interactions that is based on roles, an XML-based notation to describe the roles, and infrastructures based on the previous model and relying on the previous notation, which support agents in the management of roles (see Figure 1).In BRAIN, a role is defined as a set of capabilities and an expected behavior [6]. The former is a set of actions that an agent playing such role can perform to achieve its task. The latter is a set of events that an agent is expected to manage in order toPermission to make digital or hard copies of all or part this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.SAC 2003, Melbourne, Florida, USA© 2003 ACM 1-58113-624-2/03/03...$5.00“behave” as requested by the role it plays. Interactions among agents are then represented by couples (action, event), which are dealt with by the underlying interaction system, which has to be part of the BRAIN infrastructures; the interaction system can control interactions and enforce local policies, such as allowing or denying interactions between agents playing given roles. Figure 2 shows how an interaction between two agents occurs: when an agent performs an action among the capabilities of the assumed role, such action is translated into an event by the interaction system, and the event is delivered to the addressee agent. This model of interactions is very simple and very general, and well suits the main features of the agents: the actions can be seen as the concrete representation of proactiveness (i.e., the capability of carrying out their goals), while the events reify the reactivity (i.e., the capability of reacting to environment changes).Figure 1. The BRAIN frameworkThe notation proposed by BRAIN, called XRole [5], enables the definition of roles by means of XML documents; this grants interoperability and allows different representations tailored on the needs of the different phases of the application development. It is worth noting that each different representation derives from the same information, so the different phases of the development of applications relies on the same information, granting continuity during the entire development. For instance, during the analysis phase, analysts create XRole documents following a specific XML Schema [5], which guides them in the definition of the role features. These XRole documents can be translated into HTML documents to provide high-level descriptions also for further uses. In the design phase, the same XRole documents can be translated into more detailed HTML documents to suggest functionalities of the involved entities. Finally, at the implementation phase, again the same XRole documents can be exploited to obtain Java classes that implement the role properties.Figure 2. The interaction model in BRAINWe have already implemented an infrastructure in BRAIN, called Rolesystem [7], which relies on abstract classes that represent roles. In that approach, an agent can register itself in the local interaction context with a particular role, and then can perform actions and manage events provided by the abstract class corresponding to the assumed role. Such infrastructure provides a degree of uncoupling between agents and roles. However, it does not enable agents to dynamically assume roles at runtime, and allows agents to directly access the role classes, introducing some possible inconsistencies. This paper describes a new infrastructure that aims at overcoming the mentioned limitations.3. DYNAMIC ROLE ASSUMPTIONTo help us explaining the new-implemented role infrastructure, we propose a conference as an example. Let us suppose that two kinds of persons attend the conference: the listeners and the speakers, which are the roles played by the attendees in a conference context. For simplicity’s sake, let us suppose that only one speaker can talk at a time, so that all the other attendees are listeners. During the conference, as soon as the speaker has finished her speech, she lets another person talk. This person, who was a listener before, now becomes a speaker: this means that she assumes the speaker role. Of course, with this role she can perform speaker actions such as talking to microphone, showing slides, etc. By examining better the situation, we can point that (i) she has added to herself speaker capabilities and behavior, (ii) this addition has occurred dynamically, and (iii) she is recognized by other people as playing the speaker role.Let us suppose that software agents, which assume roles corresponding to that of their owners, support people attending the conference. The agent that assumes a speaker role (but it is the same for the listener role) must be provided with the appropriate capabilities and this should be made at runtime, when the capabilities are needed. In the following we explain how our approach enables the addition at runtime of members (fields and methods) to Java classes that implement agents, thus allowing the dynamic assumption of roles.3.1 Role, Action and Event DescriptorsMobile agents can roam networks to carry out their tasks in the most appropriate site. When an agent decides to play a role needed for its purpose, it asks the local infrastructure which roles are available, chooses the one(s) that better suits its needs, and then assumes it (by the mechanism explained in the following). When the role is not needed, it can be discarded. To grant a high level of abstraction in the decision process, we propose descriptors for roles, actions and events. A descriptor is an object that describes a role, an action or an event, for example with some keywords, an aim, a version, a creation date and any further needed piece of information. A role descriptor describes what such role does but not how (with which operations) it is done. The action descriptors are exploited to associate specific methods to operations. Event descriptors tell the kind and the context of the occurred event, but not how to manage it (which is left to the agent). A role descriptor includes also the descriptors of the corresponding actions and events.Using descriptors, the agent programmer does not need to know which is the physical class that implements a role, but only the descriptor of the role to be searched for. For example, if the agent must assume the speaker role, the programmer can write code that searches not directly for a speaker role but for a role with a speaker description. The agent can further verify the retrieved descriptor(s) to be sure that the role is the right for it.Roles are described in XML exploiting the XRole notation of BRAIN. From these XML documents, we can derive the code of Java classes that concretely implement descriptors.The descriptors are useful also for hiding to the agent the physical location of the role implementation, allowing agent programmers to disregard about the work of role programmers, and viceversa, because the role behavior is described in a separate way.3.2 Adding Roles to AgentsWhile the descriptors provide a high-level description of the roles, we need also the corresponding code, which is concretely added to the agents. In our approach the Java code of a role is composed of two parts: a Java interface (called role interface ) and a Java class (called role implementation ).The fact that an agent assumes a role means that the system dynamically adds each role implementation member (both methods and fields) to agent members, in order to add the set of capabilities of the role, thus modifying the agent class bytecode. Moreover, the system forces the agent class to implement the role interface, in order to modify its expected behavior and to allow other agents to recognize it as playing that role (for instance, by means of the instanceof operator). Note that in Java there is no other way to add capabilities and to modify the expected behavior of an agent implemented by an already-defined class. Reconsider the conference example: an agent, to assume the role of listener , should inherit from two different classes, the listener role class and the base agent class such as Aglet of the IBM Aglets platform [13]. Since Java does not allow multiple inheritance, we can only force the expected behavior by means of the interfacedatabaseOriginal agentManipulatedagentFigure 3. The steps performed by an agent to assume a role To implement the dynamic role assumption, our system is based on a special class loader, called “role loader”, that could change agent behavior and external appearance. The idea is simple: an agent that wants to assume a new role, after querying the role descriptor database if necessary, asks the role loader to reload itself with the new role (see Figure 3). If everything is right, the role loader sends the agent an event to indicate that the agent has been reloaded. After the reload event the agent can resume its execution. If the role loader is unable to load the role, it throws an exception that the original agent can catch. Analyzing this exception the agent can decide what to do (for example to retry or to choose another role). To release a role, the process is the same, but this time the agent is reloaded without that role.The role loader performs bytecode manipulation to add the role to the agent. This manipulation is completely made in memory without recompilation. The manipulation is needed to work with and to modify class definitions. Note that this manipulation is not dangerous for code portability and is compliant with the Java security manager.Our implementation of role loader is based on Javassist bytecode manipulation engine [14]. The addition of the role’s members to the agent class is performed in the following steps (suppose that the agent has yet contacted the role loader):1. the role loader calculates the inheritance stack for the role (i.e., the superclasses of the role class);2. for each level of the inheritance stack, the role loader copies all the members (both methods and fields) from the role implementation to the agent; then the loader adds the role interface to the implemented interface list of the agent;3. each field value is copied into the agent so that it does not loose its current state.Figure 4. Member copy from role classes to agent classes The first step is needed to grant role-inherited properties. In fact, a role could be not a single class but the bottom (or the middle) of an inheritance chain. For example the role listener could inherit properties from the role participant . To grant that the role will work in the right way, every role superclass (that is every class at any level on the role inheritance chain) must be added to the agent classes at the corresponding level. In fact, a subclass role implementation expects to find some capabilities on its superclasses, so we must grant that this condition will remain true. To better explain this concept, we refer to Figure 4. The figure shows the inheritance chains of an agent and its role, where the role chain is lesser than the agent one. Both the role and the agent are represented by the bottom of their respective chain. This means that the bottom classes must be fused. At the superclass level the same must occur, that is the superclasses must be fused also. This must be done for each chain level. In this way our system grants that both the role and the agent, after the fusion, will continue using inherited properties; in other words, the Java’s super operator will work well. The case in which the role inheritance chain have more levels than the agent’s one is a bit more complex, but is taken into account in our implementation; the adopted solutions are not reported due to space limitations. This step does not do anything except calculate the inheritance stack, that is how a role class and an agent class must be fused and at what level.Referring to Figure 4, the computed stack is reported in Table 1; note that the root class ng.Object is kept in only one chain. Every row in the stack indicates which classes will be fused into one. Something similar is made to force the class to implement (in the Java sense) the role interface. The inheritance stack will be used in the second step to know from which class members will be copied (fuse) on the agent chain.In fact, the second step does this copy consulting the inheritance stack and then copying every member from the role chain into the agent chain on the classes of the same level. Only this step uses the bytecode manipulation that allows the system to modify the class definitions. Note that no members are removed from original agent. In our implementation only adding mechanism is provided and this grant a correct execution to the agent.At the end, in the last step, every value is copied from the original agent (and its superclasses) to the new created agent. This step grants that the agent state will not be lost during the reloading process.Table 1. The class stack calculated by the role loaderAgent inheritance chain Role inheritance chain ng.Object none … … agent superclass level 3 none agent superclass level 2 role superclass level2agent superclass level 1 role superclass level 1agent role implementation 3.3 Role Use by AgentsIn this subsection we explain how an agent can use a dynamicallyassumed role, i.e., how it can invoke a method that before roleassumption it did not have and after it has. Note that this issue is essential because we must grant to the programmers the capability of correctly compiling the agent code. In fact, the programmer does not know anything about the role implementation but know, indirectly, about which actions can be used, by the actiondescriptors, and about which events can occur, by the eventdescriptors. In the following, we focus on the action use, becausethe management of the events is similar and simpler.The use of descriptors means that the programmer cannot write code that invokes methods corresponding to role actions in the usual way, because, since the agent has not those methods yet, a compile-time error will occur. Therefore, there must be an invocation translator that can do introspection on the agent to dynamically find which method must be call to response to an invocation on an action description. When the agent invokes a role action, it specifies to the invocation translator a descriptor of the action that wants to perform, the translator searches for a method that corresponds to the description and then invokes it. Note that the invocation translator is a component of the agent. This is not a trouble for mobile agents because the invocation translator is a very small module that does not affect agent weight for movements.4. COMPARISON WITH OTHER APPROACHESThis section reports the comparison of our approach with other ones. The former subsection shows a possible implementation with the Aspect Oriented Programming approach. The latter subsection reports some approaches based on the concept of role.4.1 Aspect-Oriented ApproachEven if it has not been designed in connection with roles, Aspect Oriented Programming (AOP) seems to provide interesting mechanisms to support the management of roles for agents [8, 11]. AOP starts from the consideration that there are behaviors and functionalities that are orthogonal to the algorithmic parts of the objects [12]. So, it proposes the separate definition ofcomponents and aspects , to be joined together by an appropriate compiler (the Aspect Weaver ), which produces the final program. The separation of concerns introduced by AOP permits to distinguish the algorithmic issues from the behavioral issues. Since an aspect is a property that cannot be encapsulated in a stand-alone entity, but rather affects the behavior of components, it is evident the similarity with a role.public class MyAgent{ // intrinsic members of the class private String question; ... }____________________________________________________________ aspect Listener extends Role{ ... // introduce extrinsic member to Agentintroduce public void MyAgent.askSlides() {}// advise weaves impact extrinsic membersadvise public void MyAgent. askSlides() {// code of the asking action} ... }____________________________________________________________ ... // Java code to instantiate MyAgent and Listener// and to attach ag to the aspectMyAgent ag = new MyAgent("Bob"); Listener listenerAspect = new Listener(); listenerAspect.addObject(ag); // ag asks for slidesag.askSlides(); ... Figure 5. The listener agent in the AOP approach Figure 5 reports an example of use of AOP in our application. TheListener aspect implements the listener role, and provides theappropriate methods that are embodied in the agent code by the Aspect Weaver; for instance, in the Figure they are added to the ag instance of the class MyAgent .Even if the AOP approach is similar to ours, in our opinion it has some limitations:o First, the role/aspect must known the class which is going to modify, for instance, in the Figure the aspect Listener must known the MyAgent class to add the appropriate methods.o As a consequence of the first point, this approach lacks flexibility in the definition and usage of aspects, and this is due to the fact that AOP focuses on software development rather than addressing the issues of dynamic and wide-open environments, such as the ones considered in the BRAIN project. o Finally, interoperability among agents of different applications is hard to be achieved, since this approach does not provide an adequate uncoupling of roles from agents.As a last note, not bound to the implementation, we can say that AOP does not provide a support for the designer as effective as the one provided by XRole, our XML-based notation that allows a richer and more understandable description of the roles and the possibility of formatting appropriate presentations of roles in an easy way.4.2 Other Role-based Proposals for AgentsE. Kendall well describes the importance of modeling roles for agent systems [11], and she exploits the AOP to concretely implement the concept of role in agent applications. Anotherinteresting approach is AALAADIN [10], a meta-model to define models of organizations. It is based on three core concepts: agent, group and role. The ROPE project [2] addressing the collaboration issues and recognizes the importance of defining roles as first-class entities, which can be assumed dynamically by agents. Yu and Schmid [16] exploit roles assigned to agents to manage workflow processes. They traditionally model a role as a collection of rights (activities an agent is permitted on a set of resources) and duties (activities an agent must perform). An interesting issue of this approach is that it aims to cover different phases of the application development, proposing a role-based analysis phase, an agent-oriented design phase, and an agent-oriented implementation phase. Finally, the idea of separating the agent issues from the actual execution of jobs can be found in the PaCMAn proposal [9], where Java agents delegate the execution of their jobs to external and site-dependent objects.Differently from ours, these approaches do not support the application development during all its phases, and disregard the dynamic assumption of roles at runtime.5. CONCLUSIONSThis paper has presented the implementation of mechanisms to enable the dynamic assumption of roles by Java agents at runtime. This is achieved by modifying the bytecode of the agents, adding the features of the role(s) they want to play.In addition to the advantages deriving from a role-based approach, the specific ones of our system can be summarized as follows:o It enables agents to dynamically assume roles at runtime, granting flexibility and adaptability. Roles are not simply given to the agents, but agents are modified at code level to embody all the features of the dynamically assumed roles.The use of descriptors decouples the role assumption, improves security, and enables role composition.o It grants a high degree of role reusability, because it deals not only with the classes of agents and roles, but also with their whole inheritance chains.o It allows separation of concerns between agent issues and role issues, also allowing roles and agents to be implemented separately and joint at runtime, avoiding that agent programmers need to know role details and viceversa.As a final note, we stress that the choice of a programming language that allows multiple inheritance, such as C++, would have simplified the effort to fuse two classes, but would not have gained the advantages of the Java language (which imposes single inheritance), in terms of portability and compliance with the existing mobile agent platforms.ACKNOWLEDGMENTS: Work supported by the NOKIA Research Center of Boston, by the Italian MURST within the project “MUSIQUE - Multimedia Ubiquitous Service Infrastructure in a QoS Universal Environment” and by the Italian Research Council (CNR) within the project “Mobile software agents to enable access to multimedia services by mobile users and devices”.6. REFERENCES[1] Y. Aridor, D. Lange, “Agent Design Pattern: Elements ofAgent Application design”, International Conference onAutonomous Agents, ACM Press, 1998. [2] M. Becht, T. Gurzki, J. Klarmann, M. Muscholl, “ROPE:Role Oriented Programming Environment for MultiagentSystems”, Fourth IFCIS Conference on CooperativeInformation Systems, Edinburgh (UK), September 1999.[3] The BRAIN project, http://agentgroup.unimo.it/MOON/BRAIN/index.html[4] G. Cabri, “Role-based Infrastructures for Agents”, 8th IEEEWorkshop on Future Trends of Distributed ComputingSystems, Bologna (I), October 2001[5] G. Cabri, L. Leonardi, F. Zambonelli, “XRole: XML Rolesfor Agent Interaction”, 3rd International Symposium “FromAgent Theory to Agent Implementation”, at the 16thEMCSR, Vienna (A), April 2002.[6] G. Cabri, L. Leonardi, F. Zambonelli, “Modeling Role-based Interactions for Agents”, Workshop on Agent-oriented methodologies at OOPSLA 2002, Seattle (USA),November 2002.[7] G. Cabri, L. Leonardi, F. Zambonelli, “Implementing Role-based Interactions for Internet Agents”, 2003 InternationalSymposium on Applications and the Internet, Orlando(USA), January 2003.[8] Communication of the ACM, Special Issue on AspectOriented Programming, Vol. 33, No. 10, October 2001.[9] P. Evripidou, C. Panayiotou, G. Samaras, E. Pitoura, “ThePaCMAn Metacomputer: Parallel Computing with JavaMobile Agents”, Future Generation Computer SystemsJournal, Special Issue on Java in High PerformanceComputing, Vol. 18, No. 2, pp. 265-280, October 2001. [10] J. Ferber and O. Gutknecht, “AALAADIN: A meta-modelfor the analysis and design of organizations in multi-agentsystems”, Third International Conference on Multi-AgentSystems (ICMAS'98), 1998.[11] E. A. Kendall, “Role Modeling for Agent Systems Analysis,Design and Implementation”, IEEE Concurrency, Vol. 8,No. 2, pp. 34-41, April-June 2000.[12] G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C.Lopes, J. M. Loingtier, J. Irwin, “Aspect-OrientedProgramming”, European Conference on Object-OrientedProgramming (ECOOP), LNCS 1241, Finland, June 1997. [13] D. B. Lange, M. Oshima, “Programming and DeployingJava™ Mobile Agents with Aglets™”, Addison-Wesley,Reading (MA), August 1998.[14] M. Tatsubori, T. Sasaki, S. Chiba, K. Itano, “A BytecodeTranslator for Distributed Execution of "Legacy" JavaSoftware”, ECOOP 2001, LNCS 2072, 2001.[15] M. Weiser, “Hot Topics: Ubiquitous Computing”, IEEEComputer, Vol. 26, No. 10, October 1993.[16] L. Yu, B.F. Schmid, “A conceptual framework for agent-oriented and role-based workflow modeling”, 1stInternational Workshop on Agent-Oriented InformationSystems, G. Wagner and E. Yu eds., Heidelberg (D), June1999.。

相关文档
最新文档