SlideShare a Scribd company logo
1 of 20
LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering 5200 Perring Parkway  Baltimore, MD 21251 Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information Framework (IIF)
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why This Research? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definitions Insurgency :   an  armed rebellion  by any irregular armed force that rises up  against an established authority, government, or administration . Those carrying out an insurgency are insurgents.  Insurgents   conduct sabotage and harassment . Insurgents usually are in  opposition to a civil authority or government  primarily in the hope of improving their condition.  Terrorism:   systematic use of terror , manifesting itself in violence and intimidation. Those carrying out terrorism are terrorist. Terrorist  conduct  violence for the purpose   of creating fear in order to achieve a political, economic, religious, or ideological   goal . Framework:  A  logical structure  for classifying and organizing complex information.
Problem Definition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How are insurgencies planned for and what is the process? How are insurgencies carried out and what is the process?  Are there any consistencies in the locations and  surroundings where insurgencies are carried out? Why are more Iraqi women becoming insurgents? Sample Insurgency Questions  That might be Addressed by This Research
Insurgency Research System
METHODOLOGY
Agent Oriented Development Environment  User Knowledge Interacts With Guides Verifies
Object-Oriented Development Life Cycle Implemented using Enterprise Architect Reference: Tsang, Curtis, et al.,  “Object-Oriented Technology,” McGraw Hill, 2005. Activity Diagram
Model Driven Architecture (MDA)
BDI Agent System Jadex BDI Architecture Goal-Oriented Reasoning Engine Agent BDI Model
Multi-Agent Systems Reference: Jennings, Nick, “Agent-Based Computing: Promise and Perils,” Presentation, Dept of Electronics and Computer Science, University of Southampton.
3D Electronic Institution Concept Only systems that have a high degree of interactions need to be structured in order to avoid violations Reference: Bogdanovych, Esteva, et al, “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).
Integrated Multi-Agent Development Process Microsoft  Access Cognitive Modeling Application JADEX Software/ JADE Platform Ontology  Database Problem Domain Database Communication Server Electronic Institution Developmental Cycle Design Verify Test Deployment Development Simulate ISLANDER:  graphical tool for specification of rules & protocols in eI AMELI:  software platform to run eI aBuilder:  agent development tool SIMDEI:  simulation tool to animate & analyze eI iGrafix  FlowCharter Enterprise  Architect 2 nd  Life Virtual World Technology Visualization Layer Behavioral Experimentation Insurgency  Questions to be Answered
Runtime Architecture Reference: Bogdanovych, Esteva, et al., “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).  Second Life ©
Tools Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Development of an Insurgency Information Framework  Using Multi-Agent Technololgy
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

What's hot (12)

"Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective""Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective"
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
Managing Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and ApproachesManaging Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and Approaches
 
Linking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual ArchivesLinking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual Archives
 
Eliciting and Visualising Trust Expectations using Persona Trust Characterist...
Eliciting and Visualising Trust Expectations using Persona Trust Characterist...Eliciting and Visualising Trust Expectations using Persona Trust Characterist...
Eliciting and Visualising Trust Expectations using Persona Trust Characterist...
 
Reproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveReproducibility from an infomatics perspective
Reproducibility from an infomatics perspective
 
Deep Neural Networks for Machine Learning
Deep Neural Networks for Machine LearningDeep Neural Networks for Machine Learning
Deep Neural Networks for Machine Learning
 
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
 
Model bias in AI
Model bias in AIModel bias in AI
Model bias in AI
 
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESBROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
 
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALSBROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
 
Rainey resume 2 25-2021
Rainey resume 2 25-2021Rainey resume 2 25-2021
Rainey resume 2 25-2021
 

Viewers also liked (7)

Strike mail+crossware per creare nuove opportunità commerciali 14 01
Strike mail+crossware per creare nuove opportunità commerciali 14 01Strike mail+crossware per creare nuove opportunità commerciali 14 01
Strike mail+crossware per creare nuove opportunità commerciali 14 01
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing : Virtual Worlds
Social Computing : Virtual WorldsSocial Computing : Virtual Worlds
Social Computing : Virtual Worlds
 
05 Bronner Richards
05 Bronner Richards05 Bronner Richards
05 Bronner Richards
 
Ch3 sma-architectures-2012
Ch3 sma-architectures-2012Ch3 sma-architectures-2012
Ch3 sma-architectures-2012
 

Similar to Social Computing

Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 
Goal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to ImplementationGoal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to Implementation
Amjad Adib
 
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
IJNSA Journal
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
FACE
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
Alexander Deucalion
 

Similar to Social Computing (20)

A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...
 
Goal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to ImplementationGoal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to Implementation
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
 
Agent-Based Problem Solving Methods In Big Data Environment
Agent-Based Problem Solving Methods In Big Data EnvironmentAgent-Based Problem Solving Methods In Big Data Environment
Agent-Based Problem Solving Methods In Big Data Environment
 
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEMSTUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
social networking site
social networking sitesocial networking site
social networking site
 
From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...
From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...
From Representation to Mediation: A New Agenda for Conceptual Modeling Resear...
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
 
Complete-SRS.doc
Complete-SRS.docComplete-SRS.doc
Complete-SRS.doc
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
H1803044651
H1803044651H1803044651
H1803044651
 

Recently uploaded

如何办理(PITT毕业证书)匹兹堡大学毕业证成绩单原件一模一样
如何办理(PITT毕业证书)匹兹堡大学毕业证成绩单原件一模一样如何办理(PITT毕业证书)匹兹堡大学毕业证成绩单原件一模一样
如何办理(PITT毕业证书)匹兹堡大学毕业证成绩单原件一模一样
qyguxu
 
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
gakamzu
 
如何办理(Wintec毕业证书)怀卡托理工学院毕业证成绩单原件一模一样
如何办理(Wintec毕业证书)怀卡托理工学院毕业证成绩单原件一模一样如何办理(Wintec毕业证书)怀卡托理工学院毕业证成绩单原件一模一样
如何办理(Wintec毕业证书)怀卡托理工学院毕业证成绩单原件一模一样
qyguxu
 
如何办理(laurentian毕业证书)劳伦森大学毕业证成绩单原件一模一样
如何办理(laurentian毕业证书)劳伦森大学毕业证成绩单原件一模一样如何办理(laurentian毕业证书)劳伦森大学毕业证成绩单原件一模一样
如何办理(laurentian毕业证书)劳伦森大学毕业证成绩单原件一模一样
muwyto
 
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
qyguxu
 
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
qyguxu
 
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOALBLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
CaitlinCummins3
 
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
epyhpep
 
0851/7699/7099 JUAL OBAT ABORSI CYTOTEC Ampuh No.1 DI JAKARTA SELATAN
 0851/7699/7099 JUAL OBAT ABORSI CYTOTEC Ampuh No.1 DI JAKARTA SELATAN 0851/7699/7099 JUAL OBAT ABORSI CYTOTEC Ampuh No.1 DI JAKARTA SELATAN
0851/7699/7099 JUAL OBAT ABORSI CYTOTEC Ampuh No.1 DI JAKARTA SELATAN
ramboxxx369
 
原版一模一样加拿大卡尔顿大学毕业证(Carleton毕业证书)文凭证书制作
原版一模一样加拿大卡尔顿大学毕业证(Carleton毕业证书)文凭证书制作原版一模一样加拿大卡尔顿大学毕业证(Carleton毕业证书)文凭证书制作
原版一模一样加拿大卡尔顿大学毕业证(Carleton毕业证书)文凭证书制作
austye
 
如何办理(Monash毕业证书)莫纳什大学毕业证成绩单原件一模一样
如何办理(Monash毕业证书)莫纳什大学毕业证成绩单原件一模一样如何办理(Monash毕业证书)莫纳什大学毕业证成绩单原件一模一样
如何办理(Monash毕业证书)莫纳什大学毕业证成绩单原件一模一样
qyguxu
 
B. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfB. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdf
paraspiyush3
 

Recently uploaded (20)

如何办理(PITT毕业证书)匹兹堡大学毕业证成绩单原件一模一样
如何办理(PITT毕业证书)匹兹堡大学毕业证成绩单原件一模一样如何办理(PITT毕业证书)匹兹堡大学毕业证成绩单原件一模一样
如何办理(PITT毕业证书)匹兹堡大学毕业证成绩单原件一模一样
 
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
AGBE4223_Lab.Exercise-No.1-AY-2023-2024.docx
AGBE4223_Lab.Exercise-No.1-AY-2023-2024.docxAGBE4223_Lab.Exercise-No.1-AY-2023-2024.docx
AGBE4223_Lab.Exercise-No.1-AY-2023-2024.docx
 
如何办理(Wintec毕业证书)怀卡托理工学院毕业证成绩单原件一模一样
如何办理(Wintec毕业证书)怀卡托理工学院毕业证成绩单原件一模一样如何办理(Wintec毕业证书)怀卡托理工学院毕业证成绩单原件一模一样
如何办理(Wintec毕业证书)怀卡托理工学院毕业证成绩单原件一模一样
 
ℂall Girls Baljit Nagar ℂall Now Chhaya ☎ 9899900591 WhatsApp Number 24/7
ℂall Girls Baljit Nagar ℂall Now Chhaya ☎ 9899900591 WhatsApp  Number 24/7ℂall Girls Baljit Nagar ℂall Now Chhaya ☎ 9899900591 WhatsApp  Number 24/7
ℂall Girls Baljit Nagar ℂall Now Chhaya ☎ 9899900591 WhatsApp Number 24/7
 
如何办理(laurentian毕业证书)劳伦森大学毕业证成绩单原件一模一样
如何办理(laurentian毕业证书)劳伦森大学毕业证成绩单原件一模一样如何办理(laurentian毕业证书)劳伦森大学毕业证成绩单原件一模一样
如何办理(laurentian毕业证书)劳伦森大学毕业证成绩单原件一模一样
 
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
 
CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .
CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .
CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .
 
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
如何办理(CCA毕业证书)加利福尼亚艺术学院毕业证成绩单原件一模一样
 
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOALBLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
 
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Master SEO in 2024 - The Complete Beginner's Guide
Master SEO in 2024 - The Complete Beginner's GuideMaster SEO in 2024 - The Complete Beginner's Guide
Master SEO in 2024 - The Complete Beginner's Guide
 
0851/7699/7099 JUAL OBAT ABORSI CYTOTEC Ampuh No.1 DI JAKARTA SELATAN
 0851/7699/7099 JUAL OBAT ABORSI CYTOTEC Ampuh No.1 DI JAKARTA SELATAN 0851/7699/7099 JUAL OBAT ABORSI CYTOTEC Ampuh No.1 DI JAKARTA SELATAN
0851/7699/7099 JUAL OBAT ABORSI CYTOTEC Ampuh No.1 DI JAKARTA SELATAN
 
原版一模一样加拿大卡尔顿大学毕业证(Carleton毕业证书)文凭证书制作
原版一模一样加拿大卡尔顿大学毕业证(Carleton毕业证书)文凭证书制作原版一模一样加拿大卡尔顿大学毕业证(Carleton毕业证书)文凭证书制作
原版一模一样加拿大卡尔顿大学毕业证(Carleton毕业证书)文凭证书制作
 
Master SEO in 2024 The Complete Beginner's Guide
Master SEO in 2024 The Complete Beginner's GuideMaster SEO in 2024 The Complete Beginner's Guide
Master SEO in 2024 The Complete Beginner's Guide
 
如何办理(Monash毕业证书)莫纳什大学毕业证成绩单原件一模一样
如何办理(Monash毕业证书)莫纳什大学毕业证成绩单原件一模一样如何办理(Monash毕业证书)莫纳什大学毕业证成绩单原件一模一样
如何办理(Monash毕业证书)莫纳什大学毕业证成绩单原件一模一样
 
Sales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel LopezSales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel Lopez
 
Job Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptxJob Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptx
 
The Best VFX Course with Job Placement near Dunlop
The Best VFX Course with Job Placement near DunlopThe Best VFX Course with Job Placement near Dunlop
The Best VFX Course with Job Placement near Dunlop
 
B. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfB. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdf
 

Social Computing

  • 1. LeeRoy Bronner, Ph.D., P.E. Master Student: Akeila Richards Morgan State University Department of Industrial, Manufacturing, and Information Systems Engineering 5200 Perring Parkway Baltimore, MD 21251 Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information Framework (IIF)
  • 2.
  • 3.
  • 4. Definitions Insurgency : an armed rebellion by any irregular armed force that rises up against an established authority, government, or administration . Those carrying out an insurgency are insurgents. Insurgents conduct sabotage and harassment . Insurgents usually are in opposition to a civil authority or government primarily in the hope of improving their condition. Terrorism: systematic use of terror , manifesting itself in violence and intimidation. Those carrying out terrorism are terrorist. Terrorist conduct violence for the purpose of creating fear in order to achieve a political, economic, religious, or ideological goal . Framework: A logical structure for classifying and organizing complex information.
  • 5.
  • 6. How are insurgencies planned for and what is the process? How are insurgencies carried out and what is the process? Are there any consistencies in the locations and surroundings where insurgencies are carried out? Why are more Iraqi women becoming insurgents? Sample Insurgency Questions That might be Addressed by This Research
  • 9. Agent Oriented Development Environment User Knowledge Interacts With Guides Verifies
  • 10. Object-Oriented Development Life Cycle Implemented using Enterprise Architect Reference: Tsang, Curtis, et al., “Object-Oriented Technology,” McGraw Hill, 2005. Activity Diagram
  • 12. BDI Agent System Jadex BDI Architecture Goal-Oriented Reasoning Engine Agent BDI Model
  • 13. Multi-Agent Systems Reference: Jennings, Nick, “Agent-Based Computing: Promise and Perils,” Presentation, Dept of Electronics and Computer Science, University of Southampton.
  • 14. 3D Electronic Institution Concept Only systems that have a high degree of interactions need to be structured in order to avoid violations Reference: Bogdanovych, Esteva, et al, “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07).
  • 15. Integrated Multi-Agent Development Process Microsoft Access Cognitive Modeling Application JADEX Software/ JADE Platform Ontology Database Problem Domain Database Communication Server Electronic Institution Developmental Cycle Design Verify Test Deployment Development Simulate ISLANDER: graphical tool for specification of rules & protocols in eI AMELI: software platform to run eI aBuilder: agent development tool SIMDEI: simulation tool to animate & analyze eI iGrafix FlowCharter Enterprise Architect 2 nd Life Virtual World Technology Visualization Layer Behavioral Experimentation Insurgency Questions to be Answered
  • 16. Runtime Architecture Reference: Bogdanovych, Esteva, et al., “A Methodology for developing MAS as 3D Electronic Institutions, Proceedings from 8th International Workshop on Agent Oriented Software Engineering (AOSE'07). Second Life ©
  • 17.
  • 18. Development of an Insurgency Information Framework Using Multi-Agent Technololgy
  • 19.
  • 20.