Effective Agent Participation in Rescue Operations Brent Dutson CS7100 Fall 2009.

Slides:



Advertisements
Similar presentations
Soar and StarCraft By Alex Turner. What is StarCraft: Brood War? A Real-Time Strategy (RTS) computer game released in A sci-fi war simulation Continually.
Advertisements

Chapter 19: Network Management Business Data Communications, 5e.
What is a network? A network consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs) , exchange.
Garbage Collecting the World. --Bernard Lang, Christian and Jose Presented by Shikha Khanna coen 317 Date – May25’ 2005.
Click Here to Begin. Objectives Purchasing a PC can be a difficult process full of complex questions. This Computer Based Training Module will walk you.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Delivering the multiagent technology to end-users through the web D. Mitrović 1, M. Ivanović 1, C. Bădică 2 1 University of Novi Sad, Serbia 2 University.
MPI and C-Language Seminars Seminar Plan  Week 1 – Introduction, Data Types, Control Flow, Pointers  Week 2 – Arrays, Structures, Enums, I/O,
1 實驗五:媒介存取協定模擬 教師: 助教:. 2 Outline  Background  Transmission Protocols  ALOHA  CSMA/CD  CSMA/CA  Network Devices  Hub  Switch  Access Point (AP)
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
11/14/05ELEC Fall Multi-processor SoCs Yijing Chen.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Yousuf Surmust Instructor: Marius Soneru Course: CS550 Fall 2001
ATM QUEUES Kemal Cilengir Kristina Feye Jared Kredit James Winfield.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Distance Routing Effect Algorithm for Mobility (DREAM)* Stefano Basagni Irnrich Chlamtac Violet R. Syrotiuk Barry A. Woodward.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
Simulation Exercises Overview Activities designed to assess, enhance and evaluate preparedness.
Introduction to client/server architecture
Data: A collection of raw facts and figures. It may consist of numbers, characters, symbols or pictures. Information: Organized and processed form of.
RF Drive Test (Testing) Engr. Mehran Mamonai. Introduction Every good RF design, after its implantation should be evaluated. There are few ways to do.
WALRUS: Wireless Active Location Resolver with Ultrasound Tony Offer, Christopher Palistrant.
CSIT 320 (Blum)1 Client-Server Interaction Based on Appendix 1 in Computer Networks and Internets, Comer.
Load Test Planning Especially with HP LoadRunner >>>>>>>>>>>>>>>>>>>>>>
System Configuration Chapter 3. Objectives Distinguish between the various methods used to configure a computer Describe how to replace a motherboard.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Self-Organizing Agents for Grid Load Balancing Junwei Cao Fifth IEEE/ACM International Workshop on Grid Computing (GRID'04)
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley This week: Whew!!! The last homework was tough! The homework for this week.
CSCI 1101 Intro to Computers 6. Local Area Networks.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
Network Aware Resource Allocation in Distributed Clouds.
Developing a Library Marketing Plan, Part 2 Implementing the Plan Mark E. Ibach Marketing & PR Coordinator South Central Library System.
Introduction  Client/Server technology is seen by many as the solution to the difficulty of linking together the various departments of corporation.
Mr. Mark Welton.  A computer network, or simply a network, is a collection of computers and other hardware interconnected by communication channels.
Internetworking Concept and Architectural Model Chapter 3.
1 © 2006 Nokia pullola_ ppt / Extending Base Station Active Radio Link Set for Improved Uplink Scheduling Esa-Pekka Pullola Supervisor:
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
Data Structures and Algorithms Lecture 1 Instructor: Quratulain Date: 1 st Sep, 2009.
Advanced Speed Guidance for Merging and Sequencing Techniques Chris Sweeney Thomas Jefferson High School for Science and Technology MITRE Corporation Center.
Network Concepts Topologies
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
The concept of RAID in Databases By Junaid Ali Siddiqui.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
NETWORKING COMPONENTS BY: TRAVIS MARSHALL. HUBS A hub is a device within a network that has multiple Ethernet ports that devices can plug into. The hub.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Mapping IP Addresses to Hardware Addresses Chapter 5.
ALERT MESSAGING SYSTEM Submitted by Submitted by Vinish.A Vinish.A Vindhya.K.V Vindhya.K.V Drishya.T.M Drishya.T.M Leeshma.A Leeshma.A.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined Louise Barkhuus and Anind Dey The IT University of.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
System Architecture & Hardware Configurations Dr. D. Bilal IS 582 Spring 2008.
1 DIVYA K 1RN09IS016 RNSIT. 2 The main purpose in car-to-car networks is to improve communication performance. To demonstrate real scenarios with car-to-car.
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
A Web Based Job Submission System for a Physics Computing Cluster David Jones IOP Particle Physics 2004 Birmingham 1.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Distributed Cache Technology in Cloud Computing and its Application in the GIS Software Wang Qi Zhu Yitong Peng Cheng
Computer Network Collection of computers and devices connected by communications channels that facilitates communications among users and allows users.
MZR: A Multicast Protocol based on Zone Routing
Technology Literacy Hardware.
System Architecture & Hardware Configurations
Introduction to client/server architecture
Raymond'S Tree DMX Algorithm
Evacuation Simulator Project
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Presentation transcript:

Effective Agent Participation in Rescue Operations Brent Dutson CS7100 Fall 2009

Introduction In a disaster situation Rescuers need as much information as possible. Many search areas are inaccessible or too dangerous for humans to enter. The speed and power of hardware and its supporting software is continually improving.

Introduction (continued) Today we present a system architecture that uses computer agents to: – Search a disaster area – Collect large amounts of data – Analyze the collected data Use human agents to: – Direct the general activities – Analyze interesting data – Make key decisions The specific focus of the presentation deals with effective methods of communication between the various agents.

General Agent Architecture

Search Agent This agent performs the actual search of the disaster area. Capable of moving over rough terrain. Can perform the following: – Take pictures – Play audio – Record sound Remains with any survivors that are found. Each mobile agent has a corresponding computational agent that directs its movement and analyzes the collected data.

Search Agent (Continued) Begins in an IDLE state Requests work from the computational agent Moves to the search location Performs the search (photos, alert, audio) In Range of a communication agent – Sends data – Requests new work Out of range of a communication agent – Moves toward the main communication hub – When a communication agent is found Send data Becomes a communication agent

Area Communication Agent This agent provides a mobile communications platform. Capable of moving over rough terrain. Can transmit and receive multiple message simultaneously Operates as follow: – Begins in an IDLE state – Requests work – Moves to a location – Replaces the communication agent in the target location

Main Communication Agent This agent provides a main communication platform. Has limited mobility. Is hard wired to the command post. Can transmit and receive virtually unlimited messages simultaneously.

Computational Agent This agent provides the processing power behind the mobile agents. Has access to the master database. Sends work requests to the mobile agent. Receives search data and updates the database. Analyzes the search data for anything interesting.

Human Agent The human agent has ultimate control of the search. Can view all data. Analyzes data marked as interesting by other agents. Can prioritize specific regions of the search area. Can communicate with survivors through a search agent.

The Simulation The purpose of the simulation was to determine the effectiveness of Area Communication Agents. These agents are optional, but are included with the expectation that they will help speed up the search process. Search area was defined as a 200x200 cell grid. Total of 40,000 locations. A single main communication agent was placed at a random location in the grid. Each configuration was run 5 times with the main communication agent placed at a different random location for each run. Manhattan distance was used to measure distances between locations. Communication range for agents was set at 20.

The Simulation (continued) The number of mobile agents was varied from 20 to 100 including every value in-between. The percentage of total mobile agents that were assigned as area communication agents varied from 0% to 20% in 5% increments. Used a concept of time steps which is the length of time for a mobile agent to move from one location to the next. Communications were measured in time steps with: – Request = 1 step – Command = 1 step – Data = 3 steps

The Simulation (continued) Messages were sent by adding them to the queue of the next agent. The number of channels supported by area communication agents was either 5 or 20. The length of time that a communication agent would wait when there was no message traffic was either 20 or 100 time steps.

Results – Data Set 1

Results – Data Set 2

Results – Data Set 3

Best Results

Conclusions The results were unexpected The area communication agent didn’t help at all. In fact, it produced worse results. This was true both with 5 channels and with 20 channels. – Search agents may have been too spread out to take advantage of the greater communication capacity offered. – Area communication agents don’t perform any searches which reduces the overall search capacity Reducing the persistence time from 100 to 20 time steps did help the results significantly.

Recommendations Try the experiment using a more proactive area communication agent. Eliminate area communication agents altogether and use larger numbers of search agents.

Questions?