Agent based systems for ubiquitous computing
This presentation is the property of its rightful owner.
Sponsored Links
1 / 30

Agent-based Systems for Ubiquitous Computing PowerPoint PPT Presentation


  • 71 Views
  • Uploaded on
  • Presentation posted in: General

Agent-based Systems for Ubiquitous Computing. José Viterbo [email protected] Apresentação:. Laboratory for Advanced Collaboration PUC–Rio, Brazil. Introduction. Ubiquitous computing.

Download Presentation

Agent-based Systems for Ubiquitous Computing

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Agent based systems for ubiquitous computing

Agent-based Systems forUbiquitous Computing

José Viterbo

[email protected]

Apresentação:

Laboratory for Advanced Collaboration

PUC–Rio, Brazil


Introduction

Introduction

Ubiquitous computing

  • Computer systems will seamlessly integrate into our everyday lives, providing services and information anytime and anywhere

M. Weiser – The Computer for the 21st Century.Scientific America, 265, Sep 1991.


Introduction1

Introduction

Support for mobility

  • UC infrastructures are more complex and deal with issues such as user mobility, disconnection, dynamic introduction and removal of devices, heterogeneous network connections, as well as the need to integrate the physical environment with the computing infrastructure


Introduction2

Introduction

Context-aware

  • A fundamental characteristic of a software infrastructure for UC applications is context-awareness, i.e., the capability of providing services based not only on user inputs, but also on implicit contextual information acquired (and deduced) from a wide range of distributed and heterogeneous sensors

  • Implicit information is used to automatically trigger services


Introduction3

Introduction

Some chalenges for Ubicomp researchers:

  • Discovery

  • Adaptation

  • Integration

  • Robustness

  • Security

T. Kindberg and A. Fox - System Software for Ubiquitous Computing.Pervasive Computing, Jan/Mar 2002.


Introduction4

Introduction

  • Using agent technology to support UC Is motivated by agent’s intrinsic properties such as autonomy, mobility, proactivity

Agents in UC

  • The use of multi-agent systems allows the natural partitioning of the whole application in a set of basic and independent tasks

H. Harroud., M. Khedr and A. Karmouch - University of Ottawa.

Building Policy-Based Context-Aware Applications for Mobile Environments.

Mobility Aware Technologies and Applications, MATA 2004.


Example travel aide

ACAI

Example: Travel aide

  • A university professor flies to a new city and stays the night for two project meetings, one in the morning, one in the afternoon

  • With a MAS, the professor’s PDA has a connection with the local weather and traffic network, his agent matches this information with his calendar and wakes him up 15 minutes earlier, preventing him to be delayed by a traffic jam

  • In the first meeting, his agent receives the information that the second meeting was postponed, and arranges for another night’s stay

H. Harroud., M. Khedr and A. Karmouch - University of Ottawa.

Building Policy-Based Context-Aware Applications for Mobile Environments.

Mobility Aware Technologies and Applications, MATA 2004.


Agent based systems for ubiquitous computing

UA

UA

User moves

ACAI Architecture

CPM

CPM

SA

SA

PSA

SAT

PSA

SAT

Network

Network

H. Harroud., M. Khedr and A. Karmouch - University of Ottawa.

Building Policy-Based Context-Aware Applications for Mobile Environments.

Mobility Aware Technologies and Applications, MATA 2004.


Agent based systems for ubiquitous computing

  • POLICY SERVICE AGENTManages policies of the domain under its administration to control the behavior and decision-making of the system agents

PSA

  • SITE ASSISTANTIs in charge of preparing and setting up a temporary working environment to a user at a visited site

SAT

ACAI Agents

  • CONTEXT POLICY MANAGERResponsible for monitoring the context information and managing the environment resources based on this context

CPM

H. Harroud., M. Khedr and A. Karmouch - University of Ottawa.

Building Policy-Based Context-Aware Applications for Mobile Environments.

Mobility Aware Technologies and Applications, MATA 2004.


Example 2 middleware infrastructure

CHIL

Example 2: Middleware infrastructure

  • Devised and developed in the project called Computers in the Human Interaction Loop (CHIL), with a view to easing service development and application integration.

  • CHIL emphasizes on the development of ubiquitous, context-aware services in ‘smart rooms’ equipped with numerous sensors (i.e., microphones and cameras).

J. Soldatos, I. Pandis, K. Stamatis, L. Polymenakos and J. L. Crowley

Agent Based Mid. Infrastructure for Autonomous Context-Aware Ubiquitous Computing.

Journal of Computer Communications, 2006.


Chil smart rooms

CHIL smart rooms

  • One 64 channel microphone array

  • Microphones for localization, in particular three clusters, each consisting of four microphones

  • Four fixed cameras, used for overall monitoring of the room

  • One active camera with pan, tilt and zoom (PTZ camera)

  • A panoramic (or fish-eye) surveillance camera.


Chil agent platform

CHIL: Agent platform

Agent infrastructures:

  • facilitate the implementation of communication between distributed entities based on rich semantics

  • ease the implementation of transparent ad hoc communication between distributed components

  • agents provide a certain degree of autonomy which constitutes a sound basis for implementing autonomic features

Shortcoming:

  • Software agents lack the capabilities required to support high performance transfer of sensor streams

Infrastructures for distributed transfer of sensor streams are usually built as system level components that do no feature the high level capabilities of software agents


Chil low level middleware components

CHIL Low level middleware components

Low level middleware components are wrapped with agent based middleware, so that they behave as software agents


Moca architecture

MoCA Architecture


Regulation

Regulation

Ubiquitous systems are typically open systems

  • Regulation may be useful to control the interaction among heterogeneous devices and users, helping adaptation and providing security.


Dynacrom

DynaCROM


1st case study

1st Case Study

  • Organizations

  • PUC-Rio, LIP6

  • Environments

  • Brazil, France

  • Classrooms, Professors’ Rooms, etc

  • Roles

  • Students, professors, etc

Marie, a computer science student at LIP6, is travelling to Brazil tospend one year at PUC-Rio as a visiting student.


Inference

Inference


Inference1

Inference


Inference2

Inference


Proposal

Proposal

Multi-agent application

JADE

MoCA/MAX

DynaCROM

MoCA

Other services

  • infrastructure to regulate agents interaction in a ubiquitous environment


Contribution

Contribution

  • While current ubiquitous support is mainly concerned withtopological aspects, we provided a way of considering the social context and itsinfluence in the entities’ interaction process.


Ongoing work

Ongoing work

Context:

  • Propose case studies with a broader range of context scopes (device capabilities, sensors, etc...)

Inference:

  • Describe compound situations using Ontologies, and being capable to infer if some situation holds

Response:

  • Provide mechanisms to localize and trigger services and applications


2nd case study

2nd Case Study

  • Organization

  • PUC-Rio

A teacher using a Tablet-PC inside the Active Classroom may send slides to the students using Smartphones and to be presented by the datashow connected to the Server.

  • Environment

  • Active Classrooms

  • Roles

  • Professor, student

  • Person

  • P1, P2

  • Mobile devices

  • TabletPC-01, Smartphone-01, Server-01

  • Applications

  • SlideShowApp-1, SlideShowApp-2 , SlideShowApp-2


Agent based systems for ubiquitous computing

Base Ontology


Norm enforcement

Norm enforcement

Norm

Permission to control data-show server

isImplementedBy

hasCondition

DatashowClient Agent

Person isLocatedIn ACL && Role==Teacher


Infered ontology

Infered Ontology

1) Infering the location of devices

  • [R1: (?Dev1 ontologyURI:isCarriedBy?Person)

    • (?Dev1 ontologyURI:isInside?Env)

      • (?Person ontologyURI:isInside?Env)

  • [R2:(?Person ontologyURI:isInside?Env)

    • (?Env rfd:ID “AC-RDC”)

    • (?Person ontologyURI:playsRole?Role)

    • (?Role rfd:ID?“Teacher”)

    • (?Norm ontologyURI:appliesTo?Person)


Ongoing implementation

Ongoing Implementation

  • Monitor Agent

    • knows the general norms in a given Organization (ontology + rules)

    • is “aware” of agents entering end leaving the room (service provided by MoCA)

    • must be able to assign a proper role to each agent

    • Is capable of infering the set of applicable norms (DynaCROM)


Ongoing implementation1

Ongoing Implementation

  • Monitor Agent

    • When a norm is applicable:

  • A mobile agent encapsulating an application is created and sent to the user’s mobile device


Agent based systems for ubiquitous computing

FIM


  • Login