LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering 5200 Perring Parkway  Baltimore, MD 21251 Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information Framework (IIF)
Agenda Overview Why This Research? Definitions Problem Definition Insurgency Research System Methodology Agent Development Environment Object-Oriented Development Life Cycle Model Driven Architecture Multi-Agent Development Process Tools Requirements Conclusion
Why This Research? This Research Addresses Decision Support  Systems Rapid and Accurate Decision Making That  Improves Over Time (Adaptive Systems) This Research Provides A System Approach   For Resolving Problems That Arise in Social  System Environments Develop A Framework For Decision Making This Research Does Not Address Prediction!
Definitions Insurgency :   an  armed rebellion  by any irregular armed force that rises up  against an established authority, government, or administration . Those carrying out an insurgency are insurgents.  Insurgents   conduct sabotage and harassment . Insurgents usually are in  opposition to a civil authority or government  primarily in the hope of improving their condition.  Terrorism:   systematic use of terror , manifesting itself in violence and intimidation. Those carrying out terrorism are terrorist. Terrorist  conduct  violence for the purpose   of creating fear in order to achieve a political, economic, religious, or ideological   goal . Framework:  A  logical structure  for classifying and organizing complex information.
Problem Definition The Army is constantly seeking to better  understand the social phenomena of insurgency  as it assumes a peacekeeping role in the Iraqi  region and as it combats the elevated death tolls associated with insurgency.  The problem to be addressed by this research is:   1. How can insurgency data best be researched, defined and presented to military leaders for decision making? How can decisions be observed and evaluated to measure the potential impact on lives in a war zone?
How are insurgencies planned for and what is the process? How are insurgencies carried out and what is the process?  Are there any consistencies in the locations and  surroundings where insurgencies are carried out? Why are more Iraqi women becoming insurgents? Sample Insurgency Questions  That might be Addressed by This Research
Insurgency Research System
METHODOLOGY
Agent Oriented Development Environment  User Knowledge Interacts With Guides Verifies
Object-Oriented Development Life Cycle Implemented using Enterprise Architect Reference: Tsang, Curtis, et al.,  “Object-Oriented Technology,” McGraw Hill, 2005. Activity Diagram
Model Driven Architecture (MDA)
BDI Agent System Jadex BDI Architecture Goal-Oriented Reasoning Engine Agent BDI Model
Multi-Agent Systems Reference: Jennings, Nick, “Agent-Based Computing: Promise and Perils,” Presentation, Dept of Electronics and Computer Science, University of Southampton.
3D Electronic Institution Concept Only systems that have a high degree of interactions need to be structured in order to avoid violations Reference: Bogdanovych, Esteva, et al, “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).
Integrated Multi-Agent Development Process Microsoft  Access Cognitive Modeling Application JADEX Software/ JADE Platform Ontology  Database Problem Domain Database Communication Server Electronic Institution Developmental Cycle Design Verify Test Deployment Development Simulate ISLANDER:  graphical tool for specification of rules & protocols in eI AMELI:  software platform to run eI aBuilder:  agent development tool SIMDEI:  simulation tool to animate & analyze eI iGrafix  FlowCharter Enterprise  Architect 2 nd  Life Virtual World Technology Visualization Layer Behavioral Experimentation Insurgency  Questions to be Answered
Runtime Architecture Reference: Bogdanovych, Esteva, et al., “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).  Second Life ©
Tools Requirements Analysis  Microsoft Visio iGrafx FlowCharter Enterprise Architect UML Development  JADE Jadex JESS Java EIDE Visualization Second Life
Development of an Insurgency Information Framework  Using Multi-Agent Technololgy
Conclusion Application of software engineering technology can support advanced  sociological analysis in combating the Insurgency Crisis: Developing an IIF enables the Army to extract significant knowledge useful in making more informed decisions Integrating the IIF model with a Software Engineering Technology Workbench provides  a structure that can be updated, verified, and easily integrated with other models   Modeling behavior through the application of Distributed MAS implemented in a 3D virtual world environment a llows decision makers to: Model  behavior of objects Choose/ observe actions  of human like entities Calculate/ measure paths  to outcomes Assess outcomes Initiate  treatment and/ support Reform policy The social computing methodology can support decision making in any sociological environment
References 1. Taatgen, N., etl,  “Modeling Paradigm in ACT-R,”  http://www.ai.rug.nl/~niels/publications/taatgenLebiereAnderson.pdf 2. Belagoda, T., etl, “A Critical Study of Cougaar Agent Architecture,”  http://www.utdallas.edu/~kandula/docs/COUGAAR_final.pdf,  2005. 3. Braubach, L., “Jadex: Implementing a BDI-Infrastructure for JADE Agents,”  http://vsis-www.informatik.uni-hamburg.de/getDoc.php/publications/ 124/pokahrbraubach2003jadex-exp.pdf 4. Brazier, F., etl, “Beliefs, Intentions and Desire,”  http:// ksi.cpsc.ucalgary.ca/KAW/KAW96/brazier/default.html. 5. Mellor, S. J.,  Balcer, M. J., “Executable UML: A Foundation for Model-Driven Architecture,” Addison-Wesley, New York, N.Y., 2002. 6. Wooldridge, Michael, “An Introduction to Multi-Agent Systems,” John Wiley & Sons, LTD., Hoboken, N.J., 2002. 7. Arcos, Josep, etl, “An Integrated Development Environment for Electronic Institutions,”  http://www.iiia.csic.es/~jar/papers/2005/agent-book-camera.pdf 8. Brown, D. “An Introduction to Object-Oriented Analysis: Objects in Plain English,” John Wiley & Sons, Inc., New York, N.Y., 1997. 9. SPARX Systems, Enterprise Architect, Version 7.0, http://www.sparxsystems.com.au/products/ea.html 10. Grice, P., “Studies of the Ways of Words,” Harvard University Press, Cambridge, Massachusetts, 1989. 11. Bodganovych, A., etl, “A Methodology for Developing MAS as 3D Electronic Institutions,”   http://users.ecs.soton.ac.uk/mml/aose2007/accepted/assets/9-bagdanovych-fin.pdf . 12. Kapor, M., “ The Power of Second Life,”  http://www.3pointd.com/20060820/mitch-kapor-on-the-power-of-second-life/

More Related Content

PDF
Thomas
PPT
Practical Approaches to Sharing Information
PPTX
Reality Mining
PDF
Research Proposal
PPTX
Qual, Mixed, Machine and Everything in Between
KEY
Semantics in the Enterprise: Roles & Capabilities
PPT
Empowering the Intelligent Enterprise
PPT
Reality Mining (Nathan Eagle)
Thomas
Practical Approaches to Sharing Information
Reality Mining
Research Proposal
Qual, Mixed, Machine and Everything in Between
Semantics in the Enterprise: Roles & Capabilities
Empowering the Intelligent Enterprise
Reality Mining (Nathan Eagle)

What's hot (12)

PPTX
"Reproducibility from the Informatics Perspective"
PDF
Multi-objective NSGA-II based community detection using dynamical evolution s...
PPTX
Managing Confidential Information – Trends and Approaches
PPT
Linking Data to Publications through Citation and Virtual Archives
PDF
Eliciting and Visualising Trust Expectations using Persona Trust Characterist...
PPTX
Reproducibility from an infomatics perspective
PDF
Deep Neural Networks for Machine Learning
PPT
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
PDF
Model bias in AI
PPTX
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
PPTX
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
DOCX
Rainey resume 2 25-2021
"Reproducibility from the Informatics Perspective"
Multi-objective NSGA-II based community detection using dynamical evolution s...
Managing Confidential Information – Trends and Approaches
Linking Data to Publications through Citation and Virtual Archives
Eliciting and Visualising Trust Expectations using Persona Trust Characterist...
Reproducibility from an infomatics perspective
Deep Neural Networks for Machine Learning
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Model bias in AI
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
Rainey resume 2 25-2021
Ad

Viewers also liked (7)

PPT
Social Computing
PPT
Social Computing
PPT
Social Computing
PPT
Social Computing
PDF
Strike mail+crossware per creare nuove opportunità commerciali 14 01
PPT
05 Bronner Richards
PPTX
Ch3 sma-architectures-2012
Social Computing
Social Computing
Social Computing
Social Computing
Strike mail+crossware per creare nuove opportunità commerciali 14 01
05 Bronner Richards
Ch3 sma-architectures-2012
Ad

Similar to Social Computing : Virtual Worlds (20)

PDF
A Survey of Building Robust Business Models in Pervasive Computing
PDF
Teaching Methodology for Virtual Reality Practical Course in Engineering Edu...
DOCX
Below are various theories and models that have been used and can
PDF
Social media platform and Our right to privacy
PDF
Requirement analysis, architectural design and formal verification of a multi...
PDF
Goal Dynamics_From System Dynamics to Implementation
PDF
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
PDF
Agent-Based Problem Solving Methods In Big Data Environment
PDF
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
PDF
Datacentric Living Algorithms Digitization And Regulation 1st Edition V Sridhar
PDF
Terrorism Analysis through Social Media using Data Mining
PPT
Analysis of Women Safety In Indian Cities Using Machine Learning On Social Media
DOC
social networking site
PDF
From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...
PDF
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
PDF
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
PDF
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
PDF
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
PDF
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
PDF
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
A Survey of Building Robust Business Models in Pervasive Computing
Teaching Methodology for Virtual Reality Practical Course in Engineering Edu...
Below are various theories and models that have been used and can
Social media platform and Our right to privacy
Requirement analysis, architectural design and formal verification of a multi...
Goal Dynamics_From System Dynamics to Implementation
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
Agent-Based Problem Solving Methods In Big Data Environment
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
Datacentric Living Algorithms Digitization And Regulation 1st Edition V Sridhar
Terrorism Analysis through Social Media using Data Mining
Analysis of Women Safety In Indian Cities Using Machine Learning On Social Media
social networking site
From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...

Recently uploaded (20)

PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Architecture types and enterprise applications.pdf
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Configure Apache Mutual Authentication
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPT
What is a Computer? Input Devices /output devices
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Module 1.ppt Iot fundamentals and Architecture
Benefits of Physical activity for teenagers.pptx
sbt 2.0: go big (Scala Days 2025 edition)
Convolutional neural network based encoder-decoder for efficient real-time ob...
Abstractive summarization using multilingual text-to-text transfer transforme...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Architecture types and enterprise applications.pdf
UiPath Agentic Automation session 1: RPA to Agents
Enhancing emotion recognition model for a student engagement use case through...
A review of recent deep learning applications in wood surface defect identifi...
Zenith AI: Advanced Artificial Intelligence
Configure Apache Mutual Authentication
A proposed approach for plagiarism detection in Myanmar Unicode text
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
sustainability-14-14877-v2.pddhzftheheeeee
What is a Computer? Input Devices /output devices
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx

Social Computing : Virtual Worlds

  • 1. LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering 5200 Perring Parkway Baltimore, MD 21251 Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information Framework (IIF)
  • 2. Agenda Overview Why This Research? Definitions Problem Definition Insurgency Research System Methodology Agent Development Environment Object-Oriented Development Life Cycle Model Driven Architecture Multi-Agent Development Process Tools Requirements Conclusion
  • 3. Why This Research? This Research Addresses Decision Support Systems Rapid and Accurate Decision Making That Improves Over Time (Adaptive Systems) This Research Provides A System Approach For Resolving Problems That Arise in Social System Environments Develop A Framework For Decision Making This Research Does Not Address Prediction!
  • 4. Definitions Insurgency : an armed rebellion by any irregular armed force that rises up against an established authority, government, or administration . Those carrying out an insurgency are insurgents. Insurgents conduct sabotage and harassment . Insurgents usually are in opposition to a civil authority or government primarily in the hope of improving their condition. Terrorism: systematic use of terror , manifesting itself in violence and intimidation. Those carrying out terrorism are terrorist. Terrorist conduct violence for the purpose of creating fear in order to achieve a political, economic, religious, or ideological goal . Framework: A logical structure for classifying and organizing complex information.
  • 5. Problem Definition The Army is constantly seeking to better understand the social phenomena of insurgency as it assumes a peacekeeping role in the Iraqi region and as it combats the elevated death tolls associated with insurgency. The problem to be addressed by this research is: 1. How can insurgency data best be researched, defined and presented to military leaders for decision making? How can decisions be observed and evaluated to measure the potential impact on lives in a war zone?
  • 6. How are insurgencies planned for and what is the process? How are insurgencies carried out and what is the process? Are there any consistencies in the locations and surroundings where insurgencies are carried out? Why are more Iraqi women becoming insurgents? Sample Insurgency Questions That might be Addressed by This Research
  • 9. Agent Oriented Development Environment User Knowledge Interacts With Guides Verifies
  • 10. Object-Oriented Development Life Cycle Implemented using Enterprise Architect Reference: Tsang, Curtis, et al., “Object-Oriented Technology,” McGraw Hill, 2005. Activity Diagram
  • 12. BDI Agent System Jadex BDI Architecture Goal-Oriented Reasoning Engine Agent BDI Model
  • 13. Multi-Agent Systems Reference: Jennings, Nick, “Agent-Based Computing: Promise and Perils,” Presentation, Dept of Electronics and Computer Science, University of Southampton.
  • 14. 3D Electronic Institution Concept Only systems that have a high degree of interactions need to be structured in order to avoid violations Reference: Bogdanovych, Esteva, et al, “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).
  • 15. Integrated Multi-Agent Development Process Microsoft Access Cognitive Modeling Application JADEX Software/ JADE Platform Ontology Database Problem Domain Database Communication Server Electronic Institution Developmental Cycle Design Verify Test Deployment Development Simulate ISLANDER: graphical tool for specification of rules & protocols in eI AMELI: software platform to run eI aBuilder: agent development tool SIMDEI: simulation tool to animate & analyze eI iGrafix FlowCharter Enterprise Architect 2 nd Life Virtual World Technology Visualization Layer Behavioral Experimentation Insurgency Questions to be Answered
  • 16. Runtime Architecture Reference: Bogdanovych, Esteva, et al., “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07). Second Life ©
  • 17. Tools Requirements Analysis Microsoft Visio iGrafx FlowCharter Enterprise Architect UML Development JADE Jadex JESS Java EIDE Visualization Second Life
  • 18. Development of an Insurgency Information Framework Using Multi-Agent Technololgy
  • 19. Conclusion Application of software engineering technology can support advanced sociological analysis in combating the Insurgency Crisis: Developing an IIF enables the Army to extract significant knowledge useful in making more informed decisions Integrating the IIF model with a Software Engineering Technology Workbench provides a structure that can be updated, verified, and easily integrated with other models Modeling behavior through the application of Distributed MAS implemented in a 3D virtual world environment a llows decision makers to: Model behavior of objects Choose/ observe actions of human like entities Calculate/ measure paths to outcomes Assess outcomes Initiate treatment and/ support Reform policy The social computing methodology can support decision making in any sociological environment
  • 20. References 1. Taatgen, N., etl, “Modeling Paradigm in ACT-R,” http://www.ai.rug.nl/~niels/publications/taatgenLebiereAnderson.pdf 2. Belagoda, T., etl, “A Critical Study of Cougaar Agent Architecture,” http://www.utdallas.edu/~kandula/docs/COUGAAR_final.pdf, 2005. 3. Braubach, L., “Jadex: Implementing a BDI-Infrastructure for JADE Agents,” http://vsis-www.informatik.uni-hamburg.de/getDoc.php/publications/ 124/pokahrbraubach2003jadex-exp.pdf 4. Brazier, F., etl, “Beliefs, Intentions and Desire,” http:// ksi.cpsc.ucalgary.ca/KAW/KAW96/brazier/default.html. 5. Mellor, S. J., Balcer, M. J., “Executable UML: A Foundation for Model-Driven Architecture,” Addison-Wesley, New York, N.Y., 2002. 6. Wooldridge, Michael, “An Introduction to Multi-Agent Systems,” John Wiley & Sons, LTD., Hoboken, N.J., 2002. 7. Arcos, Josep, etl, “An Integrated Development Environment for Electronic Institutions,” http://www.iiia.csic.es/~jar/papers/2005/agent-book-camera.pdf 8. Brown, D. “An Introduction to Object-Oriented Analysis: Objects in Plain English,” John Wiley & Sons, Inc., New York, N.Y., 1997. 9. SPARX Systems, Enterprise Architect, Version 7.0, http://www.sparxsystems.com.au/products/ea.html 10. Grice, P., “Studies of the Ways of Words,” Harvard University Press, Cambridge, Massachusetts, 1989. 11. Bodganovych, A., etl, “A Methodology for Developing MAS as 3D Electronic Institutions,” http://users.ecs.soton.ac.uk/mml/aose2007/accepted/assets/9-bagdanovych-fin.pdf . 12. Kapor, M., “ The Power of Second Life,” http://www.3pointd.com/20060820/mitch-kapor-on-the-power-of-second-life/